{"id":14703,"date":"2014-12-24T13:08:49","date_gmt":"2014-12-24T19:08:49","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=14703"},"modified":"2014-12-24T13:08:49","modified_gmt":"2014-12-24T19:08:49","slug":"how-laws-restricting-tech-actually-expose-us-to-greater-harm","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=14703","title":{"rendered":"How Laws Restricting Tech Actually Expose Us to Greater Harm"},"content":{"rendered":"<blockquote><p>Code always has flaws, and those flaws are easy for bad guys to find. But if your computer has deliberately been designed with a blind spot, the bad guys will use it to evade detection by you and your antivirus software. That&#8217;s why a 3-D printer with anti-gun-printing code isn&#8217;t a 3-D printer that won&#8217;t print guns\u2014the bad guys will quickly find a way around that. It&#8217;s a 3-D printer that is vulnerable to hacking by malware creeps who can use your printer&#8217;s \u201csecurity\u201d against you: from bricking your printer to screwing up your prints to introducing subtle structural flaws to simply hijacking the operating system and using it to stage attacks on your whole network.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.wired.com\/2014\/12\/government-computer-security\/\">How Laws Restricting Tech Actually Expose Us to Greater Harm | WIRED<\/a>.<\/p>\n<blockquote><p>This amounts to a criminal sanction for telling people about vulnerabilities in their own computers. And because today your computer lives in your pocket and has a camera and a microphone and knows all the places you go; and because tomorrow that speeding car\/computer probably won&#8217;t even sport a handbrake, let alone a steering wheel\u2014the need to know about any mode that could be exploited by malicious hackers will only get more urgent. There can be no \u201clawful interception\u201d capacity for a self-driving car, allowing police to order it to pull over, that wouldn&#8217;t also let a carjacker compromise your car and drive it to a convenient place to rob, rape, and\/or kill you.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Code always has flaws, and those flaws are easy for bad guys to find. But if your computer has deliberately been designed with a blind spot, the bad guys will use it to evade detection by you and your antivirus &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=14703\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1091],"tags":[430,1125,101],"class_list":["post-14703","post","type-post","status-publish","format-standard","hentry","category-editorial","tag-dmca","tag-exploit-vector","tag-security"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14703"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14703\/revisions"}],"predecessor-version":[{"id":14704,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14703\/revisions\/14704"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14703"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}