ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > Living Room

Computers Outlawed in Florida

<< < (5/6) > >>

app103:
I think a lot of the motivation behind laws like this is to ultimately eliminate the ability to anonymously access the web. Small surprise really since you need an account or a license to use almost any other communication technology. Even public speech is starting to require a permit in many places.

So in Florida's case, I think one unspoken goal is to get the Internet equivalent of a public pay phone off the streets. Because it's just one more way to get a handle on the illegal migrant worker community.
-40hz (July 16, 2013, 07:48 AM)
--- End quote ---

Was it also their goal to remove computers from all libraries, a place where one can still go to access a computer anonymously, or access a computer if one can't afford to own one or pay for an internet connection? It would be really weird if their intention was to become the only state where economically disadvantaged students can't go to a library to complete homework assignments or do research online. Pretty much anything that one could do at an internet cafe can be done at a library, and with free access, rather than paying the fees charged at the cafes.

40hz:
<*Note - my original post here contained so many errors (pays to check on what current rules are rather than go on something you remember coming up that it turns out never went into effect) that I'm redoing the whole post. Apologies. :-[ >

My town requires a driver's license, photo student ID, or other "acceptable form of identification" to get a library card. So so much for completely anonymous access.

app103:
^^ In my town, you must meet 1 of 3 requirements to get a library card:

A. Live in our town.
B. Work in our town.
C. Go to school in our town.


* Proof of A can be as simple as a utility bill, bank statement, or voter registration card.
* Proof of B can be as simple as a letter from your employer.
* Proof of C can be a report card, or in the case of one of the schools housing a branch of the library, a teacher bringing the class in, and you happen to be in it.
In each case they are only looking for 2 things: that the name on whatever document supplied matches the library card application, and that the town matches our own. They don't even make copies of whatever you supply as proof, and no photo ID is required to prove that the name is yours.

A library card is NOT required to use the computers, you are not required to meet any of the 3 conditions for a card, and no logs are kept any longer than physically necessary (meaning there may be a history kept till the machine is rebooted and deepfreeze will take care of that). Anyone can come in off the street and use the computers, no questions asked. BUT, if a local student comes in and says they need to use a computer for school work, you will be kicked off in favor of allowing them access, if necessary.

Our library was one of the first in the state to go digital, networked with all branches, and toss their card catalog (back in the 80's); and one of the ones that stood up to the DHS in defiance of turning over records, even going as far as deleting the entire borrowing history and altering their logging system so that going forward the only records now kept are who has a card and who has what books currently out on loan. Once a book is checked back into the system as returned, the record of who last borrowed it is gone, as long as there are no overdue fines owed. This was deliberate so that if asked by the government, it would not be possible to comply with a request for privacy invading information, that they thought could have a chilling effect on what they felt was a fundamental part of free speech rights, namely the right of authors to be read by those that choose to do so. (nice to have a public library run by a private non-profit organization made up of ethical idealist volunteers, rather than owned by the local government)

As far as computer use rules, there is pretty much only one: Don't let a librarian catch you looking at porn (if you somehow find a way to bypass their filters), or you will be kicked out of the library.

40hz:
^It's a bit differet here:

Library Cards

For residents

Library Cards are available free to all residents.

With your library card you are eligible to check out books, movies, magazines, museum passes, access our databases, download books & music from our website, use the Internet and more. A Library Card is honored at ... all public libraries in Connecticut. ...

Residents may apply for a library card online or apply in person.

Adult Residents: May use either 1: a current CT driver’s license or 2: a government issued picture ID with birth date AND one of the following as proof of current Fairfield street address: car registration; car insurance card; real estate tax bill, or any other business mail with your address.

Residents Under 18 years Old: May use student ID along with mail addressed to them or “to the parents of” with their resident address. Children accompanied by parents may use parent’s ID as proof of address.

Non-Resident Cards: Current hometown library card plus 1: a current CT driver’s license or 2: a government issued picture ID with birth date AND one of the following as proof of current street address: car registration; car insurance card; real estate tax bill, or any other business mail with your address.

University Students: Must show student ID plus: 1. a current driver’s license or 2: a government issued picture ID with birth date AND one of the following as proof of current street address: car registration; car insurance card; or any other business mail with your home address.
--- End quote ---

Oh...and I stand corrected on the official internet access policy here! (Oh happy day!) What I had previously mentioned was a proposed policy that never got approved. The official policy is that there is NO monitoring or nanny-style censoring of any kind - on  the part of the library - for either the library's own computers, or through their public access wifi link for laptops.

As part of its commitment to providing quality materials that reflect the needs and interests of the people ...Library provides internet access through its public access terminals. The internet is a global information network that is growing and ever changing. It provides the means of accessing a wealth of information and can be an invaluable research tool.  ...Library does not monitor and has no control over the information accessed on the internet and cannot be held responsible for its content. Internet resources accessible at the Library are provided equally to all Library users. Parents or guardians, not the Library, are responsible for internet information selected or accessed by their children. The Library does not censor nor protect your children from controversial or inappropriate resources.  
--- End quote ---

They do have an acceptable use policy that is quite rational and workable:

Internet computers may only be used for legal purposes.

         Unacceptable uses include, but are not limited to: harassment of other users; libeling or slandering other users; destruction of or damage to equipment, software or data belonging to the library or other users; changing the library’s setup of software or hardware; disruption or unauthorized monitoring of electronic communications; unauthorized copying of copyright-protected material; viewing or downloading of pornographic or potentially offensive information and images, text, videos or sounds.

          Misuse or abuse of the library’s computers will result in a warning and a one month suspension of Internet privileges. A second violation may lead to a permanent loss of Internet privileges
--- End quote ---

There's no mention of what sort of logging they do. But I assume they keep some logs for legal purposes and to support any suspension of privilege in the event of a violation of acceptable use rules.

The only problem is, anything in a log can be accessed and analyzed. So I'd hesitate to say you're completely anonymous when using my town's public internet access resources.

Real online anonymity is pretty much a thing of the past although 'stealthing' or 'cloaking' your presence is still a possibility. About the closest I think you could come to "cloaking' your internet use would be to hack into some poorly secured broadband router (there are still many of them) via wifi and browse around using somebody else's IP address.

But you'd also need to spoof your MAC address and any other identifiable machine/OS information - and make sure no traces of anything actually hit your hard drive during your online session before you could feel even semi-cloaked. That means booting a verified "stealth" Linux OS from a USB key or disk - ideally on a used PC without a hard drive - which you bought from a complete stranger or built from used parts - which you paid cash for.

Hardly be worth it to me btw. I'd rather not use the Internet at all if it ever came to my actually needing to do something like that.

Renegade:
Real online anonymity is pretty much a thing of the past although 'stealthing' or 'cloaking' your presence is still a possibility. About the closest I think you could come to "cloaking' your internet use would be to hack into some poorly secured broadband router (there are still many of them) via wifi and browse around using somebody else's IP address.

But you'd also need to spoof your MAC address and any other identifiable machine/OS information - and make sure no traces of anything actually hit your hard drive during your online session before you could feel even semi-cloaked. That means booting a verified "stealth" Linux OS from a USB key or disk - ideally on a used PC without a hard drive - which you bought from a complete stranger or built from used parts - which you paid cash for.
-40hz (July 22, 2013, 12:29 PM)
--- End quote ---

AFAIK, your MAC address isn't broadcast through a browser, but is identifiable by the router. If using a trusted VPN and TOR, finding that router is nigh unto impossible. But still... remotely possible.

But a wireless USB device could serve to replace the MAC address there, and is far cheaper to replace (or easier to conceal) than a full laptop.

Is that about right?

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version