Tumgik
#since i won't put my user on my wall what if my parents find the list of things i licked or swallowed
kathegoose · 2 months
Text
Tumblr media
i heard you people really like finnish middle-aged laptop man here he is on my wall
16 notes · View notes
Text
Explaining My DR
⚠️ Before you read, please keep in mind my DR is based from a lot of mythology. Please do not feel offended (I mean you can feel offended but I mean please don't feel like I'm purposely trying to offend you) if your group is not mentioned (such as magic users) or if they are misinterpreted. It's a DR based from the past and from old mythology and lore. It isn't going to be the same as the present. We are also using old terms and meanings. It's also based from an anime too. ⚠️
⚠️I'll also be updating this from time to time if I find more information I want to place. So if you ever get bored, just head on back and see if anything is new! ⚠️
Click read more to see~
What is my reality based from?
Mine is heavily referenced from an anime called "The Ancient Magus Bride." The anime itself is beautiful, and based off of many legends and mythology and it somehow blends together beautifully.
My reality is going to be somewhere in the 1700's (but without slavery and a few wars) because I am sharing my DR with my online friends (and those I classify as my online "Family") and we decided we wanted to see how much history we could change.
So far, we have decided to save Marie Antoinette.
The reality itself has "fae" who don't like to be called "Fairies" and would rather be called "neighbors." They are friendly, in their own way, though some can be aggressive but we have decided that we are safe from those and won't fight them. But here's a catch - you can't see them unless you have "The Sight." Some people do have the sight such as mages (a rare form of magic user in our reality) or "Sleigh Beggy" otherwise known as "Slay Vega."
Slay Vega's have the ability to see and attract fae. As Wiki put it:
--------
Sleigh Beggies are a type of human who have a natural affinity towards the fae and other supernatural entities, drawing their kind towards them unintentionally. Because their bodies naturally absorb magic but they typically lack the means of controlling it, they die fairly young. This is why, despite the fact that there are more Sleigh Beggy than natural-born mages, their numbers are few and far between. Sleigh Beggy are highly prized by both other sorcerers and fae. The former because their organs naturally absorb magic and so they can be used as batteries for magic and the latter because they are naturally drawn to them as they view Sleigh Beggy as being closer to their kind. This often brings them misfortune as well, because the fae drawn to them will act against their wishes, more so for those who are not gifted with the Sight and cannot see the fae. The fae's goodwill does not always result in the happiness and, when left to their own interpretation, their love and loyalty manifests into both luck and ill fortune. Sleigh Beggy unconsciously absorb a lot of magical energy, but lack the means of expressing it unless they are trained in magic or other methods. As a Sleigh Beggy draws attention from Fae, they will have little difficulty becoming mages if they find a mentor to train them and be capable of powerful magic.
--------
I will be a Sleigh Vega/Beggy but I will also have immortality, so I won't be hurt by this magic absorption; because of this the fae will be attracted to me and I can help my s/o with his magic too.
Other than Sleigh Beggys, what are there?
Well there are many magic types. For my DR we have
Sleigh Beggy: The rarest of all the types, even to the point they are even unheard of. They have the abilities of both a mage and sorcerer. They passively absorb and exude magic energy. Almost unlimited. However, their bodies are still human and they will eventually have pain from the constant strain. Fae are attracted to this type but their friendship isn't always beneficial to Sleigh Beggies. A Sleigh Beggy without a mentor or teacher may feel cursed being around them as they can't understand the world around them or why the Fae behave as they do.
Mages: Are magic users who absorb magic and cast spells using it or they borrow magic from Fae. However, this is draining for the caster.
Sorcerers: They are different from other magic users. They turn their own energy into magic to perform sorcery. Unlike the Mages, they don't contort or use the Natural Laws by breaking them, instead they study these laws and manipulate said laws.
Witches: Are magical users similar to mages, but the difference is they dive into more forbidden arts and choose to gather in groups known as covens.
The History Of Magic:
In the new age of mankind, some humans could perform what we know as "miracles.' They could see beings known as fae. Or live fairly longer than others. As time went on, these people passed on techniques, knowledge, skills and shared with each other what is now known as "Magic." Those who could possess it were known as "Mages."
But as time went on, less and less humans were born with this ability and due to the "Great War" many magical users died. Ever since then, it was unusual, rare, and strange to find humans with this ability. Eventually, this was hidden from the world to ensure the safety of the magic users.
Overview Of Magic
Magic is a result of using the energy inside your body or using the energy of the world around you. This is a process that is referred to as "Magic" or a "Miracle." While magic users can use the worlds natural laws or the use of magical beings they can also use magic with chants or wands.
For some sorcerers, they have a magical core that can "act" as an internal organ which generates magical energy. It can pass on through generations genetically. Sometimes there are some born with non-magical parents.
Magic can be used in many ways. The results vary depending on the use such as shape, form, or requirements needed. It can be used for teleportation, purification, and giving life to inanimate objects. It can also be used for attacks like summoning spikes, thorns, using shadows or light, or breathing fire.
Magic can also be used by Artificers, like Angelica, who makes magic tools such as rings or wands.
What Are Fae?
Fae, or Neighbors, are a race of magical beings who can use, conjure, or absorb magic for themselves or other beings. They can be found everywhere around the world, but they are most commonly found in Tir Na nÓg which is ruled by Titiana and Oberon.
This silly couple:
Tumblr media
There are many different types such as Ariels, Banshees, Church Grims, Brownies, Changelings, Elfs, Fire Sprites, Muryans, Selkies, and Vodyanoi!
Each fae is capable of something different and some are friendly, and some are aggressive. Similar to humans XD.
Random Things About My DR
➭ Even though it's set in the 1700s we have plumbing and pipes for baths, phones we can use to contact eachother and see media from Jean's reality (a very close friend of mine), and we plan to make some technology early. Because why not???
➭ We plan to mess up history a bit because we want to see how much we can change. And before you say "that's forcibly changing lives" technically no. It's not like the CR. Period. It's the 1700s where magic exists. We're not forcing a change in anyone's life. We're just going to mess with historical events that were bound to happen one way or another. #and they literally could've changed with or without us.
➭ There's a magic library where fae can exist alongside humans without any issue. No one can harm eachother within the library. It's also a rest good place to nap and it's really cozy.
➭ We live in a small cottage away from the village, it has a small pond and a garden. And just along the path in the back there's a forest. Keeping going down the path and you'll find a passage to Tir na nÓg.
➭ What's Tir na nÓg? It's an old legend of a place where you never age, that is, if you can get there. It's a place full of fae and where the king and queen of fae live. The plants never wither or die and it's always lively.
➭ My DR backstory is that I'm born as a king's daughter. I have a brother and a sister. That's all. Father and brother are Castelios which is a family that was given powers by the demons or fae from the Great War. They tend to scare everyone, due to their aura, except close family. Not even close friends are used to the aura. Though my sister and I didn't develop this, which is rare. I'll shift around the time I first meet my dad and brother after my mother left me and my sister with them. (No it won't be traumatizing, it's just my choice.) I'll grow up within the castle walls and learning magic from my brother and sword fighting from my sister. I'll eventually convince my dad to let me go outside the walls, to which he agrees, where I'll try to mess around with history a bit. On my 16th birthday I'll meet Elias Ainsworth in the greenhouse outside the walls when I snuck away at night. A huge chunk of years later I plan to already be a mage under his mentoring and be married by then, and the cottage is just our choice despite having an estate somewhere else. I only have until age 18 scripted so far but if you ask in like.... a week from now I might have something fjsbdjsnskssm
➭ There's a hunting event where any knight (male or female) can enter and so can royalty. A person from their familiy (or really anyone) can give them their handkerchief and whoever's handkerchief they had will recieve all that they hunted. It's a way to symbolize popularity, typically you'd want the biggest game or the most. For example if I have my s/o my handkerchief then whatever he hunted will go to me. Similarly if he gave me his then whatever I hunted will go to him. The more admired a person is, the more handkerchiefs a person has to give out and they have more game.
(If you're anti-hunting I am very sorry if this just offended you so please don't @me djeanjss please.)
➭ We have a room in the library that has many windows leading to different DRs. There's a wall full of keys that open the windows because the windows can't be broken or opened without a key, phew. When you look through each window it has a different scenery because each is a different DR. They are usually labeled and if you want to enter that reality you have to open the window and to right through. That's how Jean and I get to eachothers realities and also contact eachother. We decided to connect our DRs in a way.
My Desired Reality Members:
First, my DR husband!
Elias Ainsworth!
He is a mage who is both fae and human, though no one knows why he was this way and it was hinted that he was cursed. He also my mentor who will teach me magic.
Appearance
He's taller than most humans, reaching around 6'7". Because of the curse, he doesn't look human though will take a human form using magic. He likes to decorate his horns with gold string that holds a red cloth to cover his face.
A Mood board of him:
Tumblr media
Personality
He's very kind and polite (to most) but he's... not antisocial but not social either. He has a hard time relating to people (big mood) but he's like that because he has no understanding of the emotions he feels nor does he remember anything of his life before. Because of this, he's extremely fascinated with emotions. He decided to adopt a "gentleman" mannerism to seem more friendly. He closely studies others but finds it a bit hard to follow their example. He doesn't tend to lie - but if he doesn't know you or knows you slightly then he leaves out any bit of information and tries to hide things. Once you get to know him, he's not so secretive and more child-like. But despite that, he's very willing to make up for, amend, and apologize for any childish behavior that was out of line.
Jeans comment on Elias: "Elias: nice, tall, protective and sweet from what I know, lowkey shy and is trying to understand humans and in the anime is learning emotions AND AJJSJDJSJD thats so SWEET, has lots of money-"
His Magic Abilities
He can manipulate the shadows and he leans toward destructive magic. He can hide in the shadows and create thorns. This gave him the name, given by the fae, "Child of Thorn" or simply "Thorn" as well as "Pilum Murialis." He can also shapeshift and remove memories.
Myself! Online, I go by a few names but in any DR it's Estelle.
Appearance
I'll have waist length black hair, styled in either a braid or simply let down. I have pale skin, blue eyes, and a small birthmark on my collarbones.
Mood board of myself:
Tumblr media
Personality
I'll have the same as I do here but I felt really weird typing it out so I'm going to use how my friend described me!
Jeans opinion on Estelle: "Estelle - very soft and caring, maternal I’d say, great listener, really fun to talk to, shy and introverted but SJDJJDKFODOSOSOD when she comes out of her shell, has lots of nice memes, overall a good person to talk to about problems or just to have fun with and MEME, video game and reading nerd HAJDJDJSJKS, sympathetic and empathetic, smart, understanding"
Skills
Mental link: An ability shared with Ruth. We have a shared mind and memory.
Shapeshifting: I can shapeshift into a Pheonix which I'll mainly only use for fun.
Healing: I can heal, either by a chant or with the help of fae or tools
Light manipulation: I can manipulate light and use it against or for people
{Before I get onto the subject about my kids. Yes, I do know them in the CR. I have raised Adam and Asher despite us being close in age, I've always been the more "motherly" figure in my friends and relatives lives. (And I have recently became a mother figure for Nutmeg for about three years now.) I've organized the appointments, cook, cleaned, been there emotionally and so on. I am Asher and Adams aunt as well, so before you ask "Isn't that weird?" In my opinion, no. There are many people I've met who are the same and just straight up become the mother figure in someone's life. I am young, but I've been doing this job for years and a few comments aren't going to stop me from my job.}
Artificer: I have artificer abilities that I typically use to make a creature called a "Maker." They simply like making things. They're smart but really emotional and made from fabric similar to a doll. They like to swear masks and they basically look like a fabric version of a Korok.
Nutmeg
Nutmeg will be my daughter in the future. She is also a person from this reality who sees me as a mother figure and I see her as a daughter. So we agreed this is something we wanted to do. How it will work is she will try shift to the future of my DR after i've been married for a few years. (And before you say "That's not possible!" or "That won't work!" Let me make it clear I said "try." We are going to try this and we have a code to and we scripted that if this isn't possible, the other us wouldn't know the code.) Nutmeg is the youngest of all of my kids.
Appearance
Nutmeg has hazel eyes with a yellowish color and freckles scattered across her nose and cheeks. She likes styling her brown and reddish hair into pig tails and she's typically seen in yellow.
Mood board of her:
Tumblr media
Personality
She is very kind and doting, especially towards her siblings. She's not big into typical school but wants to go to the magic college for magic users. She likes baking and flower picking! She's very sweet towards fae and tries her best 100% of the time. A hugger and also someone who would bONK you if you upset her brothers or really anyone she cared about.
Jean's comment on Nutmeg: "Nutmeg - I’ve not talked to her much BUT SHES THE CUTEST WITTLE ANGEL BEAN, she’s super nice, worries/panics a lot for people from what I know, extremely caring, big gay and we love it (i once said to Estelle nutmeg can be a cottagecore lesbian and I just JSKSKSJDJDJ), loving towards y’all and it just makes me JSKDKDKDMDMMFJF"
Her skills
She has more celestial and healing magic that she got from my side. She can manipulate light, heal others, and manipulate the stars or use them as guides.
"Hey sweetie can you please not move that..."
Asher, Adam, and Her who secretly plotted to move the stars to prank astrologists with Jean's kids:
Adam
Another person who's shifting with us. He's the oldest of the siblings and he's a person I've actually raised in the CR from an early age.
Mood board of him:
Tumblr media
Appearance
He has red eyes, taking after Elias and black hair that takes after me. He's the tallest of all the kids and typically has the more "mature" fashion by wanting to wear suits or formal attire.
Personality
He's typically the type to be stern and distant but once you know him he's more open and kind. He doesn't like people who judge and he's usually the type to do stuff he most certainly shouldn't jump into it. Adam to Asher in our Discord server: "Hey so LETS INVENT BOMBS."
Jean's comment on Adam: "Adam - smart, literally what the fuck, he’s really nice and a big home dog,,, literally like a big brother like I feel like he’ll be there when you need him, SMART DID I MENTION SMART, has an exterior shell but thats why you have to take things with him at a pace, super fcking sweet like with his stupid ex but god dammit that was sweet"
Skills
He can destroy things like Elias, summon fire, and can summon thorns. He can teleport and he has his artificer abilities that were taught by Angelica and I.
Asher
Asher is the middle child and also someone I've raised. Asher and Adam are related to me and each other in the CR as well.
Appearance
Asher has white hair, pale skin, and blue eyes. He likes the color blue and green so he typically uses it in any piece of clothing he owns. He mentioned he will wear blue more often to compliment his eyes and make his darker horns more apparent.
Mood board of him:
Tumblr media
Personality
He's really sweet, caring, and attentive. You tell him once you like one small thing and he will remember it for years. He's really hyper and full of energy unlike his other siblings who are much more calm than him.
Jean's comment on Asher: "Asher - chaos, chaos, chaos okay anyway tbh really funny, has funny ass memes and random ass thoughts that are funny, loves affection, caring as well since I see how you care for nutmeg especially, loving and sweet, smart and retains random info like JFJDKEKDKDK-, space boy and religion boy, meme, sarcastic, 10/10 humor, energetic and extremely fun, someone you’d want at a small party with friends to hype everything up, loves kids and animals"
Skills
Asher can manipulate fire and electricity. He has super speed and super hearing, along with enhanced strength.
Silver Lady!
Also known as Silky or Silver! She was a former Banshee before being transformed by Spriggan (Titiana's bodyguard sort of speak.) She's our housekeeper.
Appearance
Silver likes to wear a, pink, Victorian dress with a matching shawl and bonnet. Her hair is blonde and short and her eyes are a shiny pink.
Mood board of her:
Tumblr media
Personality
She doesn't chat much and often has a stoic or deadpan facial expression. But despite that, once knowing her you learn and are exposed to her emotions. She tends to dote on guests that she likes but will simply ignore those she doesn't trust. If someone she doesn't like enters the house for business, she will hover over me or the other residents and simply ignore the guest. Silver also has a sense of humor and enjoys playing pranks every now and then. She likes sewing hearts into clothes where we won't notice. Silver tends to only stay within the house or near the house, due to her past home being ruined she fears that if she leaves she will be forgotten or left behind.
Her Skills:
Silky/Silver is able to do housekeeping magic. She can change details of the house, including wallpaper or the floorboards using a simple spell.
Ruth, A Church Grim
Ruth is my familiar who can shapeshift between being a Church Grim and Human.
Appearance
Ruth can shapeshift between his two forms. A Church Grim, which is a large black dog which reaches to my rib cage in height. In this form, he has red eyes. In a human form however, his eyes appear brown or somewhat red. With he has light brownish skin and black hair. He likes to sweat striped shirts :D
Mood board of Ruth:
Tumblr media
Personality
Ruth is very doting and diligent. He uses our mental link which causes a shared memory, feeling, and lifespan, to tell others how I'm feeling if I can't put it into words. He's also protective and won't hesitate to b0nK someone across the head. He's more of a big brother to those he's close with.
Skills
Familiar skills: He shares a lifespan with me, can share dreams, and be summoned from long distances through a mind link.
Shadow: He can hide in my shadow if needed.
Angelica Barley
Angelica is a mage and artificer. She owns her own magic shop that is hidden behind her book shop.
Appearance
Angelica has sharp features, and typically braids her hair up to show them off. She's commonly seen wearing sleeves when working because of the crystals that were embedded in her arms from an accident.
Mood board of her:
Tumblr media
Personality
She's kind but stern. Typically, to new mages she acts as a distant mentor. She takes pride in her work but she's also cautious due to her accident. She's possibly one of the only people that can tell Elias off, and she won't hesitate to do it.
Skills
Angelica has the sight similar to that the mages possess. Just like mages, she can borrow magic from fae and she's quite knowledgeable about it too. As an artificer, she embeds magic within tools or makes them with the purpose of magic. She had a Vodanoi named Hugo who is bound to her, he's a prankster but sweet nonetheless. Hugo and Angelica have longevity. This means that they both have increased life spans and she hasn't aged much at all.
Lindel
Lindel is a mage and the current care taker of the Dragons. He was both Elias and Adolf's first master.
Appearance
Lindel is a human and despite being a thousand years old, he looks to be in his 20s. He has pale skin and blonde hair that be ties or braids that frame his face and blue eyes. He typically wears a hood and robe with odd designs on the hood and back piece.
Mood board of Lindel
Tumblr media
Personality
Before he became a Mage and Keeper Of Dragons, he hated fae. The fae caused him many problems which caused him to isolate himself. But now, he is calm and playful and he takes pride in his job as the dragon keeper. Despite his usual demeanor, when it comes to the dragons he isn't so kind to poachers.
There are many other people I'll be getting to later such as my dad, my brother, my sister, my friend and her kids and s/o, other important people, etc. But for now I'm tired ainjsndjwsn
25 notes · View notes
Text
BNHA x BE CROSSOVER
Ch. 3
Rin's Hero Costume, Mk. 1 👇
Tumblr media
Alright guys, we get our first look at the ExWire gang in this chapter. I made Bon's personality a bit more out there just because he has a seduction quirk and holds power over everyone else because of it. He's still the same genius, straight-laced guy, and that will show up in later chapters once we spend more time with Rin's friends.
-------------------
Over the days, routines were made. Get up, shower, get dressed, eat breakfast, and head off to school. And every day Yukio insisted on hugging Rin goodbye, while Rin kept trying to punch him for it.
Some of Rin's classmates saw and seemed very confused.
"Hey, Okumura!" Kirishima called him over. He walked to him, Kaminari, Ashido, and Hagakure. "What's up?" He greeted. "Who's the guy that's always hitting on you?" Ashido wondered. "Mina! You can't just blurt things out like that!" Hagakure hissed.
They were cut off by Rin's laugh. "Nah, it's ok. That's my twin. He's got some attachment issues. Guess that's what happens when you've got no one to take care of you but a brother a couple hours older than you, huh?" Rin rubbed the back of his neck sheepishly. "Wait, you don't have parents?!" Hagakure exclaimed. Rin shook his head. "Nope! But don't feel bad. It's better this way. Trust me."
"Yeah, no curfew and no rules." Kaminari grinned. Rin sighed. "That would be a lot of fun, but Yukio insisted we needed curfew and rules to keep us safe and under control. We kinda just raised ourselves since no one else could. We had to grow up real quick." Rin shrugged. Kaminari frowned. "Aww, party pooper." He joked. They all laughed.
At that point, class started. They went to their regular classes like English and Math.
§~•~§~•~§
Finally, lunch rolled around. Rin found his brother with his friends and sat with them. He knew Yukio didn't really like anyone but Shiemi.
"Hey Suguro! How're you holding up in the second hero course?" Rin wondered. He groaned. "If fuckin' Monoma doesn't shut his trap about beating Class 1A, I'm gonna bring him to his knees and it's gonna be painful." He growled. Rin laughed. "Shiemi, Shima, what about you guys?"
Shiemi smiled, playing with the little leaf-man she'd made out of seeds and leaves."Oh, things are going well. Everyone is nice. They're kind of noisy though..." She trailed off. "There's this one chick named Hatsume. She keeps hitting on Shiemi, but Shiemi's too oblivious." Shima snickered. They all laughed at the girl's red face. "H-Hey! I don't really know how to handle that stuff!" She cried.
"It's okay, Shiemi. If you find you don't mind Hatsume's presence and don't mind spending time with her, I can help you figure out what to do for a date and what goodies to give her." Shima promised. "Uh, no, I will. I don't trust you and other people's partners." Rin shook his head.
"Oh, so you trust the guy with a seduction quirk, but not me?!" Shima huffed indignantly. "Yes. Because I have total control of the guy with the seduction quirk." Rin answered. Suguro smirked and pulled the fire user into his lap–something he knew would annoy the younger, placing his chin on the boy's shoulder. "What was that about having control over me, blueberry?" He snickered. "Hey! Suguro!" He growled, elevating his body temperature with flames so the boy let go of him. Rin laughed at his friend's grumbling before he spotted Midoriya across the cafeteria watching them curiously. He waved.
The green haired boy blushed at being noticed and then looked down at his food.
"Deku, what's wrong?" Uraraka questioned. Iida looked at him. "Something is bothering you, Midoriya?" He guessed. "Uh...no, it's just...Okumura-kun and his friends. They look so comfortable together." He said wistfully. Just as he said so, the aforementioned people walked up and sat down around the trio. Midoriya wondered how they'd gotten there so fast.
"Hey Midoriya. Whatcha up to?" Rin greeted. The poor boy jumped out of his skin. "Kinda skittish, huh? He's like Shiemi." Izumo commented. The blonde smiled at the green haired boy. "Hello. I'm Moriyama Shiemi. I'm Rin's friend. It's nice to meet you." She introduced. Rin's friends gave their introductions, following her lead.
"And I'm Yukio, Rin's twin." The taller boy sitting on the other side of Iida said. "Hmm, you guys don't really look alike." Hagakure and Ashido had apparently made their way over. "Mina!" Hagakure sounded exasperated. Suguro guessed she just blurted out whatever she was thinking a lot of the time. "That's okay. I wouldn't wanna be a pretty boy like Nii-san." Yukio teased. "Watch it genius, I feed you and you don't know what I put in that food." Rin warned playfully.
"Rin's kinda snappy today, huh Okumura?" Suguro grinned, wrapping his arm tighter around Rin's waist. Ashido squealed. "Is this the guy with the seduction quirk?" She asked.
"Well, nothing escapes you, does it?" Izumo snarked. "Hey," Rin shot a small flame at her arm, where it sizzled on her sleeve. "Be nice. Not everybody is as observant and snobby as you, Eyebrows."
"I told you my name is Kamiki Izumo!"
"Ooh, cat fight." Shima grinned, leaning forward. "Do I look like a girl to you?" Rin turned to the pink haired boy.
"You guys are so mean to Rin." Uraraka giggled. "How is that funny?" Iida questioned. "Nah, s'okay. We know each other well enough to trash talk each other and still be friends. Long as no one steps over the line, we're good. I can call Kamiki a stone cold bitch all I want and she won't do anything cause she knows it's true." Rin brushed it off.
Except right after that, birds started pecking at his head. "Ow, ow, Kamiki, call off the birds!" Rin held his arms up in defense.
Rin heard a familiar laugh and glared at Bakugou from across the room. "Uh oh. I sense a rivalry." Hagakure sang. "I think Bakugou has a three way rivalry with Midoriya, Rin, and Todoroki. That guy's got some serious issues." Ashido added. When the explosive blonde in question turned away, Rin spit a tiny ball of fire and they all watched until it hit it's target: Bakugou's hair. Rin cursed("Ohshit") and ducked behind Suguro. Bakugou turned to glower at Rin and didn't see him, so he immediately got up and ran out of the room, no doubt hunting the boy down.
Rin came back up, grinning. "Nice one, Rin. Now he'll be running in the halls like a maniac until he realizes you're still here and that he just looks like an angry psycho." Shima snickered. "We should refrain from using our quirks out of classes." Konekomeru put in quietly. "Yes, I agree with Miwa-kun." Iida did karate chops in the air with his hands. Rin snorted. "Little too late for that, guys."
The bell rang and the group split, going to their more abnormal courses.
§~•~§~•~§
As they waited for the teacher to arrive, Rin heard running in the hallway and cocked his head to the side in confusion right before All Might burst into the room.
"I HAVE.....COME THROUGH THE DOOR LIKE NORMAL!!!" He yelled. Rin snorted out a laugh. It seemed like he would rather have come in through the window. Some students freaked out and got excited, some students fanboyed(Midoriya), and then some just smiled and laughed.
The Number One Hero posed in front of the class and began talking(well, it was more like shouting....).
"Hero Basic Training-The class that'll put you through all sorts of special training to mold you into heroes!"
He showed them a card. "No time for dallying, today's activity is this! Battle!" He shouted. Rin couldn't help but smile at the man's excitement. He seemed genuinely happy to be here teaching them, whereas Aizawa was more like a teacher that never wanted to be a teacher in the first place, but needed a job and just took what he could get.
Something slid out of the walls, revealing cases with numbers on them. Are those.....?
Rin grinned once All Might announced that these were their hero costumes they'd ordered. They all retrieved their numbers. Everybody cheered and headed to the changing rooms to put on their costumes.
§~•~§~•~§
Rin grinned as he slipped on his gloves and moved to lace his boots up. He went out to meet everyone else. Kirishima was with Kaminari. The redhead had metal all over his body and even across his face and Kirishima just had some kind of device on the side of his head. "Hey Okumura!" He greeted. "So, what's up with your costume? Going for the Assassin's Creed look?" Kaminari teased. Rin grinned. "It's all fire proof and it's easy to move in. Plus, the material guards me from anything like Mina's poison." Rin explained.
"Oh yeah, your quirk. What exactly is your quirk?" Kaminari wondered. "It's fire." Rin held a hand out and a small blue flame appeared, flickering in his palms and on his fingers. "I can breathe it, I can blast it from my hands, I can cover my body in it. My brother and I grew up in a rough neighborhood, so we made sure to keep our quirks trained in case anything happened so I can even control the temperature of my flames too, though the lowest I can get it is about 23°C." Rin answered. "It's so hot it's blue? Interesting!" Kirishima examined he small flame in tins palm.
"Wow, that sounds awesome! I can only do one big blast, but it kinda fries my brain, so...." Kaminari scratched the back of his head in embarrassment.
"I can harden!" Kirishima shouted excitedly, hardening his arm until it looked like rock. Rin stifled a laugh behind his hand. "I'm pretty sure every guy can do that, Kirishima." He sniggered. "Oi, that's not what I meant!" The redhead complained. Rin and Kaminari laughed, leaning on each other while Kirishima's face turned redder than his hair.
"Alright! Now that you have these costumes, from now on, you are all heroes!" All Might announced. Rin heard footsteps and looked behind him. Midoriya was just arriving from the tunnel behind everybody. Man, this guy is a mess.
Rin had to cover his mouth to keep from laughing out loud. The boy's costume was his own signature color, but it was pretty obvious who he modeled it after. Rin looked between Izuku and All Might and he could tell the Number One Hero had noticed. Midoriya, stop trying so hard!
All Might explained how they were going to work in teams and fight each other as heroes against villains.
This is either gonna be insane fun or a complete disaster......
1 note · View note
Text
#1yrago Theresa May wants to ban crypto: here's what that would cost, and here's why it won't work anyway
Tumblr media
Aaron Swartz once said, "It's no longer OK not to understand how the Internet works."
He was talking to law-makers, policy-makers and power-brokers, people who were, at best, half-smart about technology -- just smart enough to understand that in a connected world, every problem society has involves computers, and just stupid enough to demand that computers be altered to solve those problems.
Paging Theresa May.
Theresa May says that last night's London terror attacks mean that the internet cannot be allowed to provide a "safe space" for terrorists and therefore working cryptography must be banned in the UK.
This is a golden oldie, a classic piece of foolish political grandstanding. May's predecessor, David Cameron, repeatedly campaigned on this one, and every time he did, I wrote a long piece rebutting him. Rather than writing a new one for May, I thought I'd just dust off a pair of my Cameron-era pieces (1, 2), since every single word still applies.
Theresa May says there should be no "means of communication" which "we cannot read" -- and no doubt many in her party will agree with her, politically. But if they understood the technology, they would be shocked to their boots.
It’s impossible to overstate how bonkers the idea of sabotaging cryptography is to people who understand information security. If you want to secure your sensitive data either at rest – on your hard drive, in the cloud, on that phone you left on the train last week and never saw again – or on the wire, when you’re sending it to your doctor or your bank or to your work colleagues, you have to use good cryptography. Use deliberately compromised cryptography, that has a back door that only the “good guys” are supposed to have the keys to, and you have effectively no security. You might as well skywrite it as encrypt it with pre-broken, sabotaged encryption.
There are two reasons why this is so. First, there is the question of whether encryption can be made secure while still maintaining a “master key” for the authorities’ use. As lawyer/computer scientist Jonathan Mayer explained, adding the complexity of master keys to our technology will “introduce unquantifiable security risks”. It’s hard enough getting the security systems that protect our homes, finances, health and privacy to be airtight – making them airtight except when the authorities don’t want them to be is impossible.
What Theresa May thinks she's saying is, "We will command all the software creators we can reach to introduce back-doors into their tools for us." There are enormous problems with this: there's no back door that only lets good guys go through it. If your Whatsapp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (like those who fed sensitive information to the tabloids who were implicated in the hacking scandal -- and like the high-level police who secretly worked for organised crime for years), and criminals will eventually discover this vulnerability. They -- and not just the security services -- will be able to use it to intercept all of our communications. That includes things like the pictures of your kids in your bath that you send to your parents to the trade secrets you send to your co-workers.
But this is just for starters. Theresa May doesn't understand technology very well, so she doesn't actually know what she's asking for.
For Theresa May's proposal to work, she will need to stop Britons from installing software that comes from software creators who are out of her jurisdiction. The very best in secure communications are already free/open source projects, maintained by thousands of independent programmers around the world. They are widely available, and thanks to things like cryptographic signing, it is possible to download these packages from any server in the world (not just big ones like Github) and verify, with a very high degree of confidence, that the software you've downloaded hasn't been tampered with.
May is not alone here. The regime she proposes is already in place in countries like Syria, Russia, and Iran (for the record, none of these countries have had much luck with it). There are two means by which authoritarian governments have attempted to restrict the use of secure technology: by network filtering and by technology mandates.
Theresa May has already shown that she believes she can order the nation's ISPs to block access to certain websites (again, for the record, this hasn't worked very well). The next step is to order Chinese-style filtering using deep packet inspection, to try and distinguish traffic and block forbidden programs. This is a formidable technical challenge. Intrinsic to core Internet protocols like IPv4/6, TCP and UDP is the potential to "tunnel" one protocol inside another. This makes the project of figuring out whether a given packet is on the white-list or the black-list transcendentally hard, especially if you want to minimise the number of "good" sessions you accidentally blackhole.
More ambitious is a mandate over which code operating systems in the UK are allowed to execute. This is very hard. We do have, in Apple's Ios platform and various games consoles, a regime where a single company uses countermeasures to ensure that only software it has blessed can run on the devices it sells to us. These companies could, indeed, be compelled (by an act of Parliament) to block secure software. Even there, you'd have to contend with the fact that other EU states and countries like the USA are unlikely to follow suit, and that means that anyone who bought her Iphone in Paris or New York could come to the UK with all their secure software intact and send messages "we cannot read."
But there is the problem of more open platforms, like GNU/Linux variants, BSD and other unixes, Mac OS X, and all the non-mobile versions of Windows. All of these operating systems are already designed to allow users to execute any code they want to run. The commercial operators -- Apple and Microsoft -- might conceivably be compelled by Parliament to change their operating systems to block secure software in the future, but that doesn't do anything to stop people from using all the PCs now in existence to run code that the PM wants to ban.
More difficult is the world of free/open operating systems like GNU/Linux and BSD. These operating systems are the gold standard for servers, and widely used on desktop computers (especially by the engineers and administrators who run the nation's IT). There is no legal or technical mechanism by which code that is designed to be modified by its users can co-exist with a rule that says that code must treat its users as adversaries and seek to prevent them from running prohibited code.
This, then, is what Theresa May is proposing:
* All Britons' communications must be easy for criminals, voyeurs and foreign spies to intercept
* Any firms within reach of the UK government must be banned from producing secure software
* All major code repositories, such as Github and Sourceforge, must be blocked
* Search engines must not answer queries about web-pages that carry secure software
* Virtually all academic security work in the UK must cease -- security research must only take place in proprietary research environments where there is no onus to publish one's findings, such as industry R&D and the security services
* All packets in and out of the country, and within the country, must be subject to Chinese-style deep-packet inspection and any packets that appear to originate from secure software must be dropped
* Existing walled gardens (like Ios and games consoles) must be ordered to ban their users from installing secure software
* Anyone visiting the country from abroad must have their smartphones held at the border until they leave
* Proprietary operating system vendors (Microsoft and Apple) must be ordered to redesign their operating systems as walled gardens that only allow users to run software from an app store, which will not sell or give secure software to Britons
* Free/open source operating systems -- that power the energy, banking, ecommerce, and infrastructure sectors -- must be banned outright
Theresa May will say that she doesn't want to do any of this. She'll say that she can implement weaker versions of it -- say, only blocking some "notorious" sites that carry secure software. But anything less than the programme above will have no material effect on the ability of criminals to carry on perfectly secret conversations that "we cannot read". If any commodity PC or jailbroken phone can run any of the world's most popular communications applications, then "bad guys" will just use them. Jailbreaking an OS isn't hard. Downloading an app isn't hard. Stopping people from running code they want to run is -- and what's more, it puts the whole nation -- individuals and industry -- in terrible jeopardy.
That’s a technical argument, and it’s a good one, but you don’t have to be a cryptographer to understand the second problem with back doors: the security services are really bad at overseeing their own behaviour.
Once these same people have a back door that gives them access to everything that encryption protects, from the digital locks on your home or office to the information needed to clean out your bank account or read all your email, there will be lots more people who’ll want to subvert the vast cohort that is authorised to use the back door, and the incentives for betraying our trust will be much more lavish than anything a tabloid reporter could afford.
If you want a preview of what a back door looks like, just look at the US Transportation Security Administration’s “master keys” for the locks on our luggage. Since 2003, the TSA has required all locked baggage travelling within, or transiting through, the USA to be equipped with Travelsentry locks, which have been designed to allow anyone with a widely held master key to open them.
What happened after Travelsentry went into effect? Stuff started going missing from bags. Lots and lots of stuff. A CNN investigation into thefts from bags checked in US airports found thousands of incidents of theft committed by TSA workers and baggage handlers. And though “aggressive investigation work” has cut back on theft at some airports, insider thieves are still operating with impunity throughout the country, even managing to smuggle stolen goods off the airfield in airports where all employees are searched on their way in and out of their work areas.
The US system is rigged to create a halo of buck-passing unaccountability. When my family picked up our bags from our Easter holiday in the US, we discovered that the TSA had smashed the locks off my nearly new, unlocked, Travelsentry-approved bag, taping it shut after confirming it had nothing dangerous in it, and leaving it “completely destroyed” in the words of the official BA damage report. British Airways has sensibly declared the damage to be not their problem, as they had nothing to do with destroying the bag. The TSA directed me to a form that generated an illiterate reply from a government subcontractor, sent from a do-not-reply email address, advising that “TSA is not liable for any damage to locks or bags that are required to be opened by force for security purposes” (the same note had an appendix warning me that I should treat this communication as confidential). I’ve yet to have any other communications from the TSA.
Making it possible for the state to open your locks in secret means that anyone who works for the state, or anyone who can bribe or coerce anyone who works for the state, can have the run of your life. Cryptographic locks don’t just protect our mundane communications: cryptography is the reason why thieves can’t impersonate your fob to your car’s keyless ignition system; it’s the reason you can bank online; and it’s the basis for all trust and security in the 21st century.
In her Dimbleby lecture, Martha Lane Fox recalled Aaron Swartz’s words: “It’s not OK not to understand the internet anymore.” That goes double for cryptography: any politician caught spouting off about back doors is unfit for office anywhere but Hogwarts, which is also the only educational institution whose computer science department believes in “golden keys” that only let the right sort of people break your encryption.
(Image: Facepalm, Brandon Grasley, CC-BY))
https://boingboing.net/2017/06/04/theresa-may-king-canute.html
8 notes · View notes
susanqje437737-blog · 6 years
Text
60fps On PS4 & Xbox One Yet Won't Weaken Awesome Competing Stuff.
For this reason, I 'd like to recommend The Carpool Protocols, a handbook that takes care of the sensible needs of parents as they put their youngsters in the treatment of others to discuss trips to as well as from usual locations. The United States's anti-pollution efforts should focus on independently owned vehicles since that would certainly enable most residents to support national initiatives as well as appreciate the end result. If anybody else has tips concerning effective ways to make a vehicle steer (while certainly not increasing), that will be excellent. Two from the absolute most frequently talked to concerns concerning the Apple Vehicle are whether it is going to be actually (1) electricity, and (2) driverless. Presently, a traffic control may recognize when a vehicle is coming close to, yet that has to do with it. Companies are operating to develop technology that will certainly enable a car to inform traffic control bodies certainly not only that it is present, yet also where it is going and exactly how quick this is traveling. I'm readied to begin my 1st day of work at my brand-new task this morning and really hoped the energy going out had not spoiled the possibility for me. Commonly speaking you'll probably find your best available fee at your local bank or cooperative credit union. However somewhere else the state of mind in Stuttgart, the auto funding from Europe where the auto was actually shouldered in 1886 and also where Porsche, Mercedes-Benz, Bosch and many significant automotive providers have their Headquarters, is actually much off positive. So the Skycar still possesses a very long way to go, but as far as that being a signboard on a youngster's bed room wall surface, this is currently the Lamborghini Countach from flying vehicles. Having said that, the excellent appears has Infiniti's 2nd creation Straight Flexible Steering technology, also called steer-by-wire. In unique interviews concerning the far-future vehicles, numerous primary vehicle suppliers talked with our company regarding concepts for the potential cars and truck. If you do not know what situation your auto remains in, like Beglane, nevertheless, you can easily sue as well as acquire an insurance policy adjustor to check out. Locating brake specials as well as vouchers coming from an automobile solution business you know and count on is a great way to conserve vehicle work. Customer services readied however told to manage phone up to no power which I carried out. If you have any concerns pertaining to exactly where and how to use http://botalus.info/, you can speak to us at the website. Allowing customization is crucial to having the experience appeal to both customers as well as car manufacturers, Thomas explains. They possess a really good red or white wine checklist, yet in my adventure your home reddish and also white colored is actually extremely drinkable. Android Vehicle as well as Apple CarPlay help making use of a car's FAMILY DOCTOR aerial to offer turn-by-turn navigation, which offers far better receiving. You do not want to think therefore indebted to the dealer for providing" you a lending that you fail to negotiate on the price from the vehicle, he pointed out. This will definitely possess all the problems of the Cart Problem and much more: an in-built capacity to drive a cars and truck in a manner that its own travelers challenge is a gift to any type of rapist, scoundrel or murderer who could effectively impersonate a police policeman to the auto - and also using such a location by police from governments we consider as lacking legitimacy - mention, Bashar al-Assad's hidden cops, or even the self-appointed police officers in Isis-controlled regions. After Cyclone Sandy, ABC Information discovered automobiles swamped in the course of the hurricane that were being actually sold at dealers around the nation Federal laws was recommended after Typhoon Katrina to help consumers pinpoint utilized autos that had recently been ravaged or even flooded, however the costs never ever passed. Modern road cars and trucks - Brand new stiffer tyres for strengthened drivability to a lot more carefully match the real life expertise, producing these cars and trucks a lot more fun as well as involving to own. When you go into the manufacturing facility, the first thing you observe are carpenters at the office, which seems to be strange in a vehicle manufacturing facility. Cars with sensors may be new to many of us, yet dash-cams are common around the globe. That is actually FINE for metropolitan areas like Copenhagen to outlaw autos however they don't possess a cars and truck industry. Manufacturers are dealing with Thatcham - an analysis organisation moneyed by insurance provider - to discover an option, with BMW supplying consumers a software application upgrade to prevent such thefts. Graphically the cars and trucks appear excellent (externally), internally they appear excellent as well nothing at all fantastic but really good. On a really good time, and also probably other time other than his sibling's special day, the trip from the flight terminal in Warwick to his sibling's lean-to had ten moments. Sadly you need to suppose that a lot of auto salesmen carry out not know the 10 commandments from selling. Google's line from autonomous autos have covered over 2m kilometers and has actually been actually involved in around two loads collisions, along with a single - a collision with a bus - being actually the error of the self-driving auto. The lot of residential property purchases drop on Friday THIRTEEN. Research study by located that between 2005 and also 2012, there were actually 43 per cent fewer transactions on Friday 13 as compared to other Fridays in the month. These are actually a few of the factors you must properly decide on a vehicle maintenance garage with fully trained specialists who will definitely have the equipment as well as expertise to optimize the performance and also security of your cars and truck. The location's brand new $234m (₤ 140m) cable car system, which whips passengers in between sleek modern-day terminals in regulated silence, was provided its first public day trip today. The vehicle functions on basic control technique typical to all driving games along with the add-on from regulating the player's electronic camera. A good male's drive as well as passion will certainly rub off on you as he pursues his very own passions. A amazing as well as diverse collection of vehicles as well as rivals are actually currently verified for the activity, featuring pre-war Grand Prix Bugatti Kind 35s, a historical Monaco-winning Alfa Romeo P3 Tipo B and a lot of 1950s sports cars, including C-Type as well as D-Type Jaguars. Ask an individual just what they think was actually the biggest net change of the 21st century and they'll probably state that was YouTube As well as with good reason - the user-generated video-blogging website has actually modified the online yard for life.
0 notes
Text
Theresa May wants to ban crypto: here's what that would cost, and here's why it won't work anyway
Tumblr media
Aaron Swartz once said, "It's no longer OK not to understand how the Internet works."
He was talking to law-makers, policy-makers and power-brokers, people who were, at best, half-smart about technology -- just smart enough to understand that in a connected world, every problem society has involves computers, and just stupid enough to demand that computers be altered to solve those problems.
Paging Theresa May.
Theresa May says that last night's London terror attacks mean that the internet cannot be allowed to provide a "safe space" for terrorists and therefore working cryptography must be banned in the UK.
This is a golden oldie, a classic piece of foolish political grandstanding. May's predecessor, David Cameron, repeatedly campaigned on this one, and every time he did, I wrote a long piece rebutting him. Rather than writing a new one for May, I thought I'd just dust off a pair of my Cameron-era pieces (1, 2), since every single world still applies.
Theresa May says there should be no "means of communication" which "we cannot read" -- and no doubt many in her party will agree with her, politically. But if they understood the technology, they would be shocked to their boots.
It’s impossible to overstate how bonkers the idea of sabotaging cryptography is to people who understand information security. If you want to secure your sensitive data either at rest – on your hard drive, in the cloud, on that phone you left on the train last week and never saw again – or on the wire, when you’re sending it to your doctor or your bank or to your work colleagues, you have to use good cryptography. Use deliberately compromised cryptography, that has a back door that only the “good guys” are supposed to have the keys to, and you have effectively no security. You might as well skywrite it as encrypt it with pre-broken, sabotaged encryption.
There are two reasons why this is so. First, there is the question of whether encryption can be made secure while still maintaining a “master key” for the authorities’ use. As lawyer/computer scientist Jonathan Mayer explained, adding the complexity of master keys to our technology will “introduce unquantifiable security risks”. It’s hard enough getting the security systems that protect our homes, finances, health and privacy to be airtight – making them airtight except when the authorities don’t want them to be is impossible.
What Theresa May thinks she's saying is, "We will command all the software creators we can reach to introduce back-doors into their tools for us." There are enormous problems with this: there's no back door that only lets good guys go through it. If your Whatsapp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (like those who fed sensitive information to the tabloids who were implicated in the hacking scandal -- and like the high-level police who secretly worked for organised crime for years), and criminals will eventually discover this vulnerability. They -- and not just the security services -- will be able to use it to intercept all of our communications. That includes things like the pictures of your kids in your bath that you send to your parents to the trade secrets you send to your co-workers.
But this is just for starters. Theresa May doesn't understand technology very well, so she doesn't actually know what she's asking for.
For Theresa May's proposal to work, she will need to stop Britons from installing software that comes from software creators who are out of his jurisdiction. The very best in secure communications are already free/open source projects, maintained by thousands of independent programmers around the world. They are widely available, and thanks to things like cryptographic signing, it is possible to download these packages from any server in the world (not just big ones like Github) and verify, with a very high degree of confidence, that the software you've downloaded hasn't been tampered with.
May is not alone here. The regime he proposes is already in place in countries like Syria, Russia, and Iran (for the record, none of these countries have had much luck with it). There are two means by which authoritarian governments have attempted to restrict the use of secure technology: by network filtering and by technology mandates.
Theresa May has already shown that she believes she can order the nation's ISPs to block access to certain websites (again, for the record, this hasn't worked very well). The next step is to order Chinese-style filtering using deep packet inspection, to try and distinguish traffic and block forbidden programs. This is a formidable technical challenge. Intrinsic to core Internet protocols like IPv4/6, TCP and UDP is the potential to "tunnel" one protocol inside another. This makes the project of figuring out whether a given packet is on the white-list or the black-list transcendentally hard, especially if you want to minimise the number of "good" sessions you accidentally blackhole.
More ambitious is a mandate over which code operating systems in the UK are allowed to execute. This is very hard. We do have, in Apple's Ios platform and various games consoles, a regime where a single company uses countermeasures to ensure that only software it has blessed can run on the devices it sells to us. These companies could, indeed, be compelled (by an act of Parliament) to block secure software. Even there, you'd have to contend with the fact that other EU states and countries like the USA are unlikely to follow suit, and that means that anyone who bought her Iphone in Paris or New York could come to the UK with all their secure software intact and send messages "we cannot read."
But there is the problem of more open platforms, like GNU/Linux variants, BSD and other unixes, Mac OS X, and all the non-mobile versions of Windows. All of these operating systems are already designed to allow users to execute any code they want to run. The commercial operators -- Apple and Microsoft -- might conceivably be compelled by Parliament to change their operating systems to block secure software in the future, but that doesn't do anything to stop people from using all the PCs now in existence to run code that the PM wants to ban.
More difficult is the world of free/open operating systems like GNU/Linux and BSD. These operating systems are the gold standard for servers, and widely used on desktop computers (especially by the engineers and administrators who run the nation's IT). There is no legal or technical mechanism by which code that is designed to be modified by its users can co-exist with a rule that says that code must treat its users as adversaries and seek to prevent them from running prohibited code.
This, then, is what Theresa May is proposing:
* All Britons' communications must be easy for criminals, voyeurs and foreign spies to intercept
* Any firms within reach of the UK government must be banned from producing secure software
* All major code repositories, such as Github and Sourceforge, must be blocked
* Search engines must not answer queries about web-pages that carry secure software
* Virtually all academic security work in the UK must cease -- security research must only take place in proprietary research environments where there is no onus to publish one's findings, such as industry R&D and the security services
* All packets in and out of the country, and within the country, must be subject to Chinese-style deep-packet inspection and any packets that appear to originate from secure software must be dropped
* Existing walled gardens (like Ios and games consoles) must be ordered to ban their users from installing secure software
* Anyone visiting the country from abroad must have their smartphones held at the border until they leave
* Proprietary operating system vendors (Microsoft and Apple) must be ordered to redesign their operating systems as walled gardens that only allow users to run software from an app store, which will not sell or give secure software to Britons
* Free/open source operating systems -- that power the energy, banking, ecommerce, and infrastructure sectors -- must be banned outright
Theresa May will say that she doesn't want to do any of this. She'll say that she can implement weaker versions of it -- say, only blocking some "notorious" sites that carry secure software. But anything less than the programme above will have no material effect on the ability of criminals to carry on perfectly secret conversations that "we cannot read". If any commodity PC or jailbroken phone can run any of the world's most popular communications applications, then "bad guys" will just use them. Jailbreaking an OS isn't hard. Downloading an app isn't hard. Stopping people from running code they want to run is -- and what's more, it puts the whole nation -- individuals and industry -- in terrible jeopardy.
That’s a technical argument, and it’s a good one, but you don’t have to be a cryptographer to understand the second problem with back doors: the security services are really bad at overseeing their own behaviour.
Once these same people have a back door that gives them access to everything that encryption protects, from the digital locks on your home or office to the information needed to clean out your bank account or read all your email, there will be lots more people who’ll want to subvert the vast cohort that is authorised to use the back door, and the incentives for betraying our trust will be much more lavish than anything a tabloid reporter could afford.
If you want a preview of what a back door looks like, just look at the US Transportation Security Administration’s “master keys” for the locks on our luggage. Since 2003, the TSA has required all locked baggage travelling within, or transiting through, the USA to be equipped with Travelsentry locks, which have been designed to allow anyone with a widely held master key to open them.
What happened after Travelsentry went into effect? Stuff started going missing from bags. Lots and lots of stuff. A CNN investigation into thefts from bags checked in US airports found thousands of incidents of theft committed by TSA workers and baggage handlers. And though “aggressive investigation work” has cut back on theft at some airports, insider thieves are still operating with impunity throughout the country, even managing to smuggle stolen goods off the airfield in airports where all employees are searched on their way in and out of their work areas.
The US system is rigged to create a halo of buck-passing unaccountability. When my family picked up our bags from our Easter holiday in the US, we discovered that the TSA had smashed the locks off my nearly new, unlocked, Travelsentry-approved bag, taping it shut after confirming it had nothing dangerous in it, and leaving it “completely destroyed” in the words of the official BA damage report. British Airways has sensibly declared the damage to be not their problem, as they had nothing to do with destroying the bag. The TSA directed me to a form that generated an illiterate reply from a government subcontractor, sent from a do-not-reply email address, advising that “TSA is not liable for any damage to locks or bags that are required to be opened by force for security purposes” (the same note had an appendix warning me that I should treat this communication as confidential). I’ve yet to have any other communications from the TSA.
Making it possible for the state to open your locks in secret means that anyone who works for the state, or anyone who can bribe or coerce anyone who works for the state, can have the run of your life. Cryptographic locks don’t just protect our mundane communications: cryptography is the reason why thieves can’t impersonate your fob to your car’s keyless ignition system; it’s the reason you can bank online; and it’s the basis for all trust and security in the 21st century.
In her Dimbleby lecture, Martha Lane Fox recalled Aaron Swartz’s words: “It’s not OK not to understand the internet anymore.” That goes double for cryptography: any politician caught spouting off about back doors is unfit for office anywhere but Hogwarts, which is also the only educational institution whose computer science department believes in “golden keys” that only let the right sort of people break your encryption.
https://boingboing.net/2017/06/04/theresa-may-king-canute.html
70 notes · View notes