<?xml version="1.0"?>
<rss version="2.0">
  <channel>
    <title>Mike Gerwitz's Thoughts and Ramblings</title>
    <link>https://mikegerwitz.com</link>
    <description>
      Posts and articles from a free software hacker and activst with a focus on user privacy and security
    </description>
    <item>
  <title><![CDATA[LibrePlanet 2021: Adopting Free Software Ideals]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2021/02/libreplanet-2021</link>
  <pubDate>2021-02-24</pubDate>
  <description><![CDATA[
    <p>I will be speaking again at this year’s <a href="https://libreplanet.org/2021">LibrePlanet</a> on March 20th, which will be online. This year, I’ll be talking about challenges with adopting free software ideals and the impact that it can have not only on individuals, but also on our community as a whole. This talk will be personal, drawing upon my evolution over the past fifteen or so years.</p>
    <p><a href="https://mikegerwitz.com/2021/02/libreplanet-2021">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[Writing As a Means to Another End]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2020/06/writing-as-a-means-to-another-end</link>
  <pubDate>2020-06-30</pubDate>
  <description><![CDATA[
    <p>To anyone who’s looked at the number of posts I’ve made in the past few years on this blog, it may surprise you to learn that I do a lot of writing. It’s just that the majority if it is never read by anyone other than myself. When I write—as I am now—I certainly <em>intend</em> for others to read it. But that’s not usually what happens.</p>
<p>Writing articles is a means to an end. But the end isn’t always the written word. Writing is a journey, and sometimes it leads far from where one may expect.</p>
    <p><a href="https://mikegerwitz.com/2020/06/writing-as-a-means-to-another-end">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[Social Responsibility Amid COVID-19 Outbreak]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2020/03/social-responsibility-covid-19</link>
  <pubDate>2020-03-15</pubDate>
  <description><![CDATA[
    <p>Most of my posts here relate somehow to software freedom, user privacy, or some other issue driven by technology. As an activist for user freedom, my goal is usually to figure out ways in which to empower people using technology—to put them on equal footing with those that are in a position to exhert control. To make the vulnerable less vulnerable.</p>
<p>But all of that is a focused fight as part of broader goal for social freedom and equality. If we take a moment to look up from out focus on technology to see the bigger picture, we can see that our activism and advocacy follow a moral framework that necessitates certain responsibility during this outbreak of COVID-19 caused by the novel coronavirus.</p>
    <p><a href="https://mikegerwitz.com/2020/03/social-responsibility-covid-19">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[GHCQ’s “Exceptional Access”, End-To-End Encryption, Decentralization, and Reproducible Builds]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2019/02/ghcq-exceptional-access-e2ee-decentralization-reproducible</link>
  <pubDate>2019-02-18</pubDate>
  <description><![CDATA[
    <p>Late last November, Ian Levy and Crispin Robinson of the GHCQ (the British intelligence agency) published a proposal for intercepting end-to-end encrypted communications, entitled <a href="https://www.lawfareblog.com/principles-more-informed-exceptional-access-debate">“Principles for a More Informed Exceptional Access Debate”</a>. Since then, there have been a series of notable rebuttals to this proposal arguing why this system would fail in practice and why it should be rejected. Completely absent from these responses, however, is any mention of existing practices that would prohibit this attack outright—the combination of free/libre software, reproducible builds, and decentralized or distributed services.</p>
    <p><a href="https://mikegerwitz.com/2019/02/ghcq-exceptional-access-e2ee-decentralization-reproducible">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[I Will Be Speaking At LibrePlanet 2019]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2019/02/i-will-be-speaking-at-lp2019</link>
  <pubDate>2019-02-15</pubDate>
  <description><![CDATA[
    <p>Please join me <a href="https://libreplanet.org/2019">this year at LibrePlanet</a> for my talk, titled “Computational Symbiosis: Methods that Meld Mind and Machine”.</p>
    <p><a href="https://mikegerwitz.com/2019/02/i-will-be-speaking-at-lp2019">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[Webmasters: Please, Don’t Block Tor]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2018/10/webmasters-please-dont-block-tor</link>
  <pubDate>2018-10-05</pubDate>
  <description><![CDATA[
    <p><a href="https://www.torproject.org/">Tor</a> is a privacy and anonymity tool that <a href="https://www.torproject.org/about/overview.html.en#whyweneedtor">helps users to defend themselves</a> against traffic analysis online. Some people, like me, use it as an important tool to help defend against <a href="/talks/sapsf">various online threats to privacy</a>. <a href="https://www.torproject.org/about/torusers.html.en">Others use it</a> to avoid censorship, perhaps by the country in which they live. Others use it because their lives depend on it—they may live under an oppressive regime that forbids access to certain information or means of communication.</p>
<p>Unfortunately, some people also hide behind Tor to do bad things, like attack websites or commit fraud. Because of this, many website owners and network administrators see Tor as a security threat, and choose to block Tor users from accessing their website.</p>
    <p><a href="https://mikegerwitz.com/2018/10/webmasters-please-dont-block-tor">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[LibrePlanet 2019 will be March 23–24 in Boston, MA]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2018/09/libreplanet-2019-will-be-march-23-24-in-boston-ma</link>
  <pubDate>2018-09-06</pubDate>
  <description><![CDATA[
    <p>It’s already time to start thinking about LibrePlanet 2019, which will be March 23–24 in the Greater Boston Area in MA:</p>
<p><a href="https://libreplanet.org/2019/" class="uri">https://libreplanet.org/2019/</a></p>
<p>This is the one event that I must make it to each year, and I encourage everyone to attend and see the faces of many that are at the heart of the free software community.</p>
    <p><a href="https://mikegerwitz.com/2018/09/libreplanet-2019-will-be-march-23-24-in-boston-ma">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[When Talking About Mobile Tracking, Don’t Veil Bad Actors With Blanket Statements]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2018/04/when-talking-about-mobile-tracking-dont-veil-bad-actors-with-blanket-statements</link>
  <pubDate>2018-04-15</pubDate>
  <description><![CDATA[
    <p>It’s difficult to have useful conversations about mobile tracking when someone says “your phone / mobile device tracks you”; such statements don’t often lead to constructive conversation because they are too vague and therefore easily dismissed as sensationalism or paranoia. And they are all too often without substance because, while users do have legitimate concerns, they aren’t necessarily aware of the specific problems contributing to those concerns.</p>
    <p><a href="https://mikegerwitz.com/2018/04/when-talking-about-mobile-tracking-dont-veil-bad-actors-with-blanket-statements">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[Meltdown/Spectre and the Web]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2018/01/meltdown-spectre-and-the-web</link>
  <pubDate>2018-01-08</pubDate>
  <description><![CDATA[
    <p>The recently-released <a href="https://meltdownattack.com/">Meltdown</a> and <a href="https://spectreattack.com/">Spectre</a> CPU timing attacks affect virtually every user in some way; the consequences are profound. There are plenty of good write-ups on the topic, so I don’t feel the need to re-iterate the technical details here. (See an easily digestible one <a href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">from the Raspberry Pi</a> project, and an in-depth analysis <a href="https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html">from Project Zero</a>.)</p>
<p>What I do want to draw attention to is that these attacks <a href="https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/">are exploitable via web browsers</a>.</p>
    <p><a href="https://mikegerwitz.com/2018/01/meltdown-spectre-and-the-web">(Read full post)</a></p>
  ]]></description>
</item>
<item>
  <title><![CDATA[The Ethics Void: Join Me at LibrePlanet 2018!]]></title>
  <author><![CDATA[Mike Gerwitz <mtg@gnu.org>]]></author>
  <link>https://mikegerwitz.com/2018/01/the-ethics-void-join-me-at-libreplanet-2018</link>
  <pubDate>2018-01-05</pubDate>
  <description><![CDATA[
    <p>I got word today that I’ll be speaking again at this year’s <a href="https://libreplanet.org/2018/">LibrePlanet</a>! I was going to attend even if I were not speaking, but I’m very excited to be able to continue to build off of last year’s talk and further my activism on these topics.</p>
<p>The title of this year’s talk is <em>The Ethics Void</em>. Here’s a rough abstract:</p>
    <p><a href="https://mikegerwitz.com/2018/01/the-ethics-void-join-me-at-libreplanet-2018">(Read full post)</a></p>
  ]]></description>
</item>
  </channel>
</rss>
