<div class="entry">
- <div class="title"><a href="http://people.skolelinux.org/pere/blog/Nedlasting_fra_NRK__som_Matruska_med_undertekster.html">Nedlasting fra NRK, som Matruska med undertekster</a></div>
+ <div class="title"><a href="http://people.skolelinux.org/pere/blog/Using_appstream_in_Debian_to_locate_packages_with_firmware_and_mime_type_support.html">Using appstream in Debian to locate packages with firmware and mime type support</a></div>
+ <div class="date"> 4th February 2016</div>
+ <div class="body"><p>The <a href="https://wiki.debian.org/DEP-11">appstream system</a>
+is taking shape in Debian, and one provided feature is a very
+convenient way to tell you which package to install to make a given
+firmware file available when the kernel is looking for it. This can
+be done using apt-file too, but that is for someone else to blog
+about. :)</p>
+
+<p>Here is a small recipe to find the package with a given firmware
+file, in this example I am looking for ctfw-3.2.3.0.bin, randomly
+picked from the set of firmware announced using appstream in Debian
+unstable. In general you would be looking for the firmware requested
+by the kernel during kernel module loading. To find the package
+providing the example file, do like this:</p>
+
+<blockquote><pre>
+% apt install appstream
+[...]
+% apt update
+[...]
+% appstreamcli what-provides firmware:runtime ctfw-3.2.3.0.bin | \
+ awk '/Package:/ {print $2}'
+firmware-qlogic
+%
+</pre></blockquote>
+
+<p>See <a href="https://wiki.debian.org/AppStream/Guidelines">the
+appstream wiki</a> page to learn how to embed the package metadata in
+a way appstream can use.</p>
+
+<p>This same approach can be used to find any package supporting a
+given MIME type. This is very useful when you get a file you do not
+know how to handle. First find the mime type using <tt>file
+--mime-type</tt>, and next look up the package providing support for
+it. Lets say you got an SVG file. Its MIME type is image/svg+xml,
+and you can find all packages handling this type like this:</p>
+
+<blockquote><pre>
+% apt install appstream
+[...]
+% apt update
+[...]
+% appstreamcli what-provides mimetype image/svg+xml | \
+ awk '/Package:/ {print $2}'
+bkchem
+phototonic
+inkscape
+shutter
+tetzle
+geeqie
+xia
+pinta
+gthumb
+karbon
+comix
+mirage
+viewnior
+postr
+ristretto
+kolourpaint4
+eog
+eom
+gimagereader
+midori
+%
+</pre></blockquote>
+
+<p>I believe the MIME types are fetched from the desktop file for
+packages providing appstream metadata.</p>
+</div>
+ <div class="tags">
+
+
+ Tags: <a href="http://people.skolelinux.org/pere/blog/tags/debian">debian</a>, <a href="http://people.skolelinux.org/pere/blog/tags/english">english</a>.
+
+
+ </div>
+ </div>
+ <div class="padding"></div>
+
+ <div class="entry">
+ <div class="title"><a href="http://people.skolelinux.org/pere/blog/Creepy__visualise_geotagged_social_media_information___nice_free_software.html">Creepy, visualise geotagged social media information - nice free software</a></div>
+ <div class="date">24th January 2016</div>
+ <div class="body"><p>Most people seem not to realise that every time they walk around
+with the computerised radio beacon known as a mobile phone their
+position is tracked by the phone company and often stored for a long
+time (like every time a SMS is received or sent). And if their
+computerised radio beacon is capable of running programs (often called
+mobile apps) downloaded from the Internet, these programs are often
+also capable of tracking their location (if the app requested access
+during installation). And when these programs send out information to
+central collection points, the location is often included, unless
+extra care is taken to not send the location. The provided
+information is used by several entities, for good and bad (what is
+good and bad, depend on your point of view). What is certain, is that
+the private sphere and the right to free movement is challenged and
+perhaps even eradicated for those announcing their location this way,
+when they share their whereabouts with private and public
+entities.</p>
+
+<p align="center"><img width="70%" src="http://people.skolelinux.org/pere/blog/images/2016-01-24-nice-creepy-desktop-window.png"></p>
+
+<p>The phone company logs provide a register of locations to check out
+when one want to figure out what the tracked person was doing. It is
+unavailable for most of us, but provided to selected government
+officials, company staff, those illegally buying information from
+unfaithful servants and crackers stealing the information. But the
+public information can be collected and analysed, and a free software
+tool to do so is called
+<a href="http://www.geocreepy.com/">Creepy or Cree.py</a>. I
+discovered it when I read
+<a href="http://www.aftenposten.no/kultur/Slik-kan-du-bli-overvaket-pa-Twitter-og-Instagram-uten-a-ane-det-7787884.html">an
+article about Creepy</a> in the Norwegian newspaper Aftenposten i
+November 2014, and decided to check if it was available in Debian.
+The python program was in Debian, but
+<a href="https://tracker.debian.org/pkg/creepy">the version in
+Debian</a> was completely broken and practically unmaintained. I
+uploaded a new version which did not work quite right, but did not
+have time to fix it then. This Christmas I decided to finally try to
+get Creepy operational in Debian. Now a fixed version is available in
+Debian unstable and testing, and almost all Debian specific patches
+are now included
+<a href="https://github.com/jkakavas/creepy">upstream</a>.</p>
+
+<p>The Creepy program visualises geolocation information fetched from
+Twitter, Instagram, Flickr and Google+, and allow one to get a
+complete picture of every social media message posted recently in a
+given area, or track the movement of a given individual across all
+these services. Earlier it was possible to use the search API of at
+least some of these services without identifying oneself, but these
+days it is impossible. This mean that to use Creepy, you need to
+configure it to log in as yourself on these services, and provide
+information to them about your search interests. This should be taken
+into account when using Creepy, as it will also share information
+about yourself with the services.</p>
+
+<p>The picture above show the twitter messages sent from (or at least
+geotagged with a position from) the city centre of Oslo, the capital
+of Norway. One useful way to use Creepy is to first look at
+information tagged with an area of interest, and next look at all the
+information provided by one or more individuals who was in the area.
+I tested it by checking out which celebrity provide their location in
+twitter messages by checkout out who sent twitter messages near a
+Norwegian TV station, and next could track their position over time,
+making it possible to locate their home and work place, among other
+things. A similar technique have been
+<a href="http://www.buzzfeed.com/maxseddon/does-this-soldiers-instagram-account-prove-russia-is-covertl">used
+to locate Russian soldiers in Ukraine</a>, and it is both a powerful
+tool to discover lying governments, and a useful tool to help people
+understand the value of the private information they provide to the
+public.</p>
+
+<p>The package is not trivial to backport to Debian Stable/Jessie, as
+it depend on several python modules currently missing in Jessie (at
+least python-instagram, python-flickrapi and
+python-requests-toolbelt).</p>
+
+<p>(I have uploaded
+<a href="https://screenshots.debian.net/package/creepy">the image to
+screenshots.debian.net</a> and licensed it under the same terms as the
+Creepy program in Debian.)</p>
+</div>
+ <div class="tags">
+
+
+ Tags: <a href="http://people.skolelinux.org/pere/blog/tags/debian">debian</a>, <a href="http://people.skolelinux.org/pere/blog/tags/english">english</a>, <a href="http://people.skolelinux.org/pere/blog/tags/nice free software">nice free software</a>.
+
+
+ </div>
+ </div>
+ <div class="padding"></div>
+
+ <div class="entry">
+ <div class="title"><a href="http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html">Always download Debian packages using Tor - the simple recipe</a></div>
+ <div class="date">15th January 2016</div>
+ <div class="body"><p>During his DebConf15 keynote, Jacob Appelbaum
+<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
+that those listening on the Internet lines would have good reason to
+believe a computer have a given security hole</a> if it download a
+security fix from a Debian mirror. This is a good reason to always
+use encrypted connections to the Debian mirror, to make sure those
+listening do not know which IP address to attack. In August, Richard
+Hartmann observed that encryption was not enough, when it was possible
+to interfere download size to security patches or the fact that
+download took place shortly after a security fix was released, and
+<a href="http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/">proposed
+to always use Tor to download packages from the Debian mirror</a>. He
+was not the first to propose this, as the
+<tt><a href="https://tracker.debian.org/pkg/apt-transport-tor">apt-transport-tor</a></tt>
+package by Tim Retout already existed to make it easy to convince apt
+to use <a href="https://www.torproject.org/">Tor</a>, but I was not
+aware of that package when I read the blog post from Richard.</p>
+
+<p>Richard discussed the idea with Peter Palfrader, one of the Debian
+sysadmins, and he set up a Tor hidden service on one of the central
+Debian mirrors using the address vwakviie2ienjx6t.onion, thus making
+it possible to download packages directly between two tor nodes,
+making sure the network traffic always were encrypted.</p>
+
+<p>Here is a short recipe for enabling this on your machine, by
+installing <tt>apt-transport-tor</tt> and replacing http and https
+urls with tor+http and tor+https, and using the hidden service instead
+of the official Debian mirror site. I recommend installing
+<tt>etckeeper</tt> before you start to have a history of the changes
+done in /etc/.</p>
+
+<blockquote><pre>
+apt install apt-transport-tor
+sed -i 's% http://ftp.debian.org/%tor+http://vwakviie2ienjx6t.onion/%' /etc/apt/sources.list
+sed -i 's% http% tor+http%' /etc/apt/sources.list
+</pre></blockquote>
+
+<p>If you have more sources listed in /etc/apt/sources.list.d/, run
+the sed commands for these too. The sed command is assuming your are
+using the ftp.debian.org Debian mirror. Adjust the command (or just
+edit the file manually) to match your mirror.</p>
+
+<p>This work in Debian Jessie and later. Note that tools like
+<tt>apt-file</tt> only recently started using the apt transport
+system, and do not work with these tor+http URLs. For
+<tt>apt-file</tt> you need the version currently in experimental,
+which need a recent apt version currently only in unstable. So if you
+need a working <tt>apt-file</tt>, this is not for you.</p>
+
+<p>Another advantage from this change is that your machine will start
+using Tor regularly and at fairly random intervals (every time you
+update the package lists or upgrade or install a new package), thus
+masking other Tor traffic done from the same machine. Using Tor will
+become normal for the machine in question.</p>
+
+<p>On <a href="https://wiki.debian.org/FreedomBox">Freedombox</a>, APT
+is set up by default to use <tt>apt-transport-tor</tt> when Tor is
+enabled. It would be great if it was the default on any Debian
+system.</p>
+</div>
+ <div class="tags">
+
+
+ Tags: <a href="http://people.skolelinux.org/pere/blog/tags/debian">debian</a>, <a href="http://people.skolelinux.org/pere/blog/tags/english">english</a>, <a href="http://people.skolelinux.org/pere/blog/tags/sikkerhet">sikkerhet</a>.
+
+
+ </div>
+ </div>
+ <div class="padding"></div>
+
+ <div class="entry">
+ <div class="title"><a href="http://people.skolelinux.org/pere/blog/Nedlasting_fra_NRK__som_Matroska_med_undertekster.html">Nedlasting fra NRK, som Matroska med undertekster</a></div>
<div class="date"> 2nd January 2016</div>
<div class="body"><p>Det kommer stadig nye løsninger for å ta lagre unna innslag fra NRK
for å se på det senere. For en stund tilbake kom jeg over et script
gjorde det <a href="https://github.com/liangqi/nrkopptak">tilgjengelig
via github</a>.</p>
-<p>Scriptet kan lagre som MPEG4 eller Matruska, og bake inn
+<p>Scriptet kan lagre som MPEG4 eller Matroska, og bake inn
undertekster i fila på et vis som blant annet VLC forstår. For å
bruke scriptet, kopier ned git-arkivet og kjør</p>
</pre></p>
<p>URL-eksemplet er dagens toppsak på tv.nrk.no. Argument 'k' ber
-scriptet laste ned og lagre som Matruska. Det finnes en rekke andre
+scriptet laste ned og lagre som Matroska. Det finnes en rekke andre
muligheter for valg av kvalitet og format.</p>
<p>Jeg foretrekker dette scriptet fremfor youtube-dl, som
</div>
<div class="padding"></div>
- <div class="entry">
- <div class="title"><a href="http://people.skolelinux.org/pere/blog/Snurpenot_overv_kning_av_sensitiv_personinformasjon.html">Snurpenot-overvåkning av sensitiv personinformasjon</a></div>
- <div class="date"> 9th November 2015</div>
- <div class="body"><p>Tenk om et norsk sykehus delte informasjon om hva som blir lest og
-hvem som leser på sykehusets nettsted, med noen som samarbeider med et
-fremmed lands etterretningsvesen, og at flere andre fremmede lands
-etterretningstjenester kan snappe opp informasjonen.</p>
-
-<p>Tenk om flere sykehus, kommuner, helsestasjoner, universitet,
-høyskoler, grunnskoler, Stortinget, det meste av offentlig
-forvaltning, medier, adopsjonstjenester og krisesenter gjør det
-samme?</p>
-
-<p>Tenk om de som lytter kan holde oversikt over norske borgeres
-interesser, sykdommer, rusmisbruk, adopsjon, abort, barnehager,
-politiske interesser og sympatier samt hvilke argumenter som har best
-effekt på beslutningstagere og måter de kan påvirkes. Ville det gitt
-grunn til bekymring?</p>
-
-<p>Høres det ut som noe tatt ut fra fantasien til George Orwell,
-forfatteren av dystopien 1984? Det er virkeligheten i Norge i dag,
-takket være bruken av statistikktjenester som Google Analytics.</p>
-
-<p><strong>Du kan beskytte deg</strong></p>
-
-<p>Men borgerne har et forsvar mot dette angrepet på privatsfæren.
-Dagens nettlesere har utvidelser som støtter å blokkere slik
-utlevering av informasjon. Personlig bruker jeg Privacy Badger,
-Ghostery, NoScript og AdBlock, og anbefaler alle å gjøre noe
-tilsvarende. Merk at noen av verktøyene lekker informasjon, i tillegg
-til å gjøre en nyttig jobb, så det er lurt å bruke flere sammen. I
-tillegg bør hver og en av oss sende inn protest til organisasjonene
-bak nettsteder som bidrar til dette inngrepet i privatsfæren.</p>
-
-<p><strong>Hvem bidrar til overvåkningen?</strong></p>
-
-<p>Takket være Ghostery la jeg merke til at flere og flere norske
-nettsteder begynte å la Google Analytics overvåke brukerne. Jeg ble
-nysgjerrig på hvor mange det gjaldt, og gikk igjennom ca. 2700 norske
-nettsteder, hovedsakelig offentlig forvaltning. Jeg laget et system
-for å koble seg opp automatisk og sjekke hvor nettstedene spredte
-informasjon om besøket. Jeg ble overrasket både over omfanget og hva
-slags nettsteder som rapporterer besøksinformasjon ut av landet.
-Omtrent 70 prosent av de 2700 sender informasjon til Google Analytics.
-Noen tilfeldige eksempler er Akershus Universitetssykehus, Sykehuset
-Østfold, Lommelegen, Oslo krisesenter, Stortinget, den norske
-regjering, de fleste politiske partier på Stortinget, NAV, Altinn,
-NRK, TV2, Helse Førde, Helse Stavanger, Oslo kommune,
-Nasjonalbiblioteket, Pasientombudet, Kongehuset, Politiet,
-Teknologirådet, Tollvesenet, Norsk romsenter, Forsvarsbygg og
-Sivilforsvaret. Og det er mange flere.</p>
-
-<p>Hvordan kan det offentlige Norge omfavne en slik praksis? Det er
-gode hensikter bak. Google har laget en god tjeneste for
-nettstedseiere, der de uten å betale med noe annet enn en bit av de
-besøkenes privatsfære får tilgang til nyttig og presis statistikk over
-nettstedets bruk ved å besøke netttjenesten hos Google. De færreste
-merker ulempene angrepet på privatsfæren som nettstedene og Google
-utgjør.</p>
-
-<p><strong>Hvordan foregår det?</strong></p>
-
-<p>I nettsider kan nettsteder legge inn lenker til programkode som
-skal kjøres av brukerens nettleser. De som tar i bruk Google
-Analytics legger typisk inn lenke til et javascript-program hos Google
-som ber nettleseren ta kontakt med Google og dele IP-adresse, side
-besøkt, aktuelle cookies og endel informasjon om nettleseren med
-Google Analytics. Programmet trenger ikke være det samme for alle som
-henter det fra Google. Det finnes et Google Analytics-tilvalg kalt
-«anonymisering» som nettstedeier kan ta i bruk. Dette instruerer det
-omtalte programmet om å be Google slette deler av den oversendte
-IP-adressen. Full IP-adresse sendes likevel over og er tilgjengelig
-for alle som snapper opp informasjonen underveis.</p>
-
-<p>Takket være varsleren Edward Snowden, som bidro til uvurderlig
-dokumentasjon på snurpenot-overvåkningen som nordmenn blir utsatt for,
-vet vi at Google samarbeider med USAs etteretning som avlytter trafikk
-sendt til Google Analytics.</p>
-
-<p>Men allerede før Snowden var det bekreftet at både britiske GCHQ og
-USAs NSA avlytter og lagrer blant annet Internett-trafikk som er innom
-et av landene, i tillegg til at FRA i Sverige avlytter og lagrer
-trafikk som passerte grensa til Sverige.</p>
-
-<p>Og som
-<a href="http://www.dn.no/tekno/2013/02/03/amerikanerne-kan-se-hvert-ord-du-skriver">Datatilsynet
-sa til Dagens Næringsliv i 2013</a> kunne de vanskelig nekte bruk av
-skytjenester som Google Analytics når Norge var bundet av EUs «Safe
-Harbour»-avtale med USA. De måtte derfor se bort fra
-f.eks. FISAAA-loven (som lar NSA avlytte Internett-trafikk) i sine
-vurderinger. Når nå EUs «Safe Harbour»-avtale er underkjent, og det
-foreslås å bruke individuell avtalerett mellom selskaper som juridisk
-grunnlag for å sende personopplysninger til USA, er det greit å huske
-på at FISAA-loven og andre som brukes av USA som grunnlag for
-masseovervåkning overstyrer slike avtaler.</p>
-
-<p>For øvrig burde varsleren Edward Snowden få politisk asyl i
-Norge.</p>
-</div>
- <div class="tags">
-
-
- Tags: <a href="http://people.skolelinux.org/pere/blog/tags/norsk">norsk</a>, <a href="http://people.skolelinux.org/pere/blog/tags/personvern">personvern</a>, <a href="http://people.skolelinux.org/pere/blog/tags/surveillance">surveillance</a>.
-
-
- </div>
- </div>
- <div class="padding"></div>
-
- <div class="entry">
- <div class="title"><a href="http://people.skolelinux.org/pere/blog/TISA___nok_en_problematisk_og_hemmelig_handelsavtale.html">TISA - nok en problematisk og hemmelig handelsavtale</a></div>
- <div class="date"> 5th November 2015</div>
- <div class="body"><p>Norge er aktiv i Trade in Services Agreement-forhandlingene, og
-regjeringen forteller at
-«<a href="https://www.regjeringen.no/no/tema/utenrikssaker/handelspolitikk/tisa/id2403335/">TISA
-vil sikre norske tjenesteeksportører forutsigbar og
-ikke-diskriminerende adgang til utenlandske tjenestemarkeder</a>».
-Det er mulig at det stemmer. Men den gjør mye mer enn det. Avtalen
-forhandles i hemmelighet, og kun takket være
-<a href="https://wikileaks.org/tisa/">Wikileaks</a> er
-utkast og biter kjent i offentligheten. Det som er blitt kjent er
-for eksempel at TISA kan
-<a href="https://www.techdirt.com/articles/20150604/06324931218/tisa-agreement-might-outlaw-governments-mandating-open-source-software-many-situations.shtml">blokkere
-myndigheter fra å kreve bruk av fri programvare i mange
-situasjoner</a>, hvilket vil fjerne muligheten vår til å ha kontroll
-over egne datasystemer i slike tilfeller. Den kan også
-<a href="https://www.eff.org/deeplinks/2015/05/tisa-yet-another-leaked-treaty-youve-never-heard-makes-secret-rules-internet">blokkere
-Norges mulighet til å holde kontroll med overføring av
-personinformasjon ut av landet</a>, hvilket Snowden-bekreftelsene har
-dokumentert er svært problematisk.
-
-<p>Jeg ble derfor veldig glad da jeg i dag ble tipset i dag om at det
-allerede finnes en aktiv organisasjon,
-<a href="http://www.folkeaksjonenmottisa.no/">Folkeaksjonen mot
-TISA</a>, som jobber for å hindre at Norge signerer på TISA-avtalen.
-Her må alle gode krefter jobbe sammen. Jeg skal sende dem litt
-penger, og se om jeg har kapasitet til å bidra med mer.</p>
-</div>
- <div class="tags">
-
-
- Tags: <a href="http://people.skolelinux.org/pere/blog/tags/norsk">norsk</a>, <a href="http://people.skolelinux.org/pere/blog/tags/opphavsrett">opphavsrett</a>, <a href="http://people.skolelinux.org/pere/blog/tags/personvern">personvern</a>.
-
-
- </div>
- </div>
- <div class="padding"></div>
-
- <div class="entry">
- <div class="title"><a href="http://people.skolelinux.org/pere/blog/Is_Pentagon_deciding_the_Norwegian_negotiating_position_on_Internet_governance_.html">Is Pentagon deciding the Norwegian negotiating position on Internet governance?</a></div>
- <div class="date"> 3rd November 2015</div>
- <div class="body"><p>In Norway, all government offices are required by law to keep a
-list of every document or letter arriving and leaving their offices.
-Internal notes should also be documented. The document list (called a mail
-journal - "postjournal" in Norwegian) is public information and thanks
-to the Norwegian Freedom of Information Act (Offentleglova) the mail
-journal is available for everyone. Most offices even publish the mail
-journal on their web pages, as PDFs or tables in web pages. The state-level offices even have a shared web based search service (called
-<a href="https://www.oep.no/">Offentlig Elektronisk Postjournal -
-OEP</a>) to make it possible to search the entries in the list. Not
-all journal entries show up on OEP, and the search service is hard to
-use, but OEP does make it easier to find at least some interesting
-journal entries .</p>
-
-<p>In 2012 I came across a document in the mail journal for the
-Norwegian Ministry of Transport and Communications on OEP that
-piqued my interest. The title of the document was
-"<a href="https://www.oep.no/search/resultSingle.html?journalPostId=4192362">Internet
-Governance and how it affects national security</a>" (Norwegian:
-"Internet Governance og påvirkning på nasjonal sikkerhet"). The
-document date was 2012-05-22, and it was said to be sent from the
-"Permanent Mission of Norway to the United Nations". I asked for a
-copy, but my request was rejected with a reference to a legal clause said to authorize them to reject it
-(<a href="http://lovdata.no/lov/2006-05-19-16/§20">offentleglova § 20,
-letter c</a>) and an explanation that the document was exempt because
-of foreign policy interests as it contained information related to the
-Norwegian negotiating position, negotiating strategies or similar. I
-was told the information in the document related to the ongoing
-negotiation in the International Telecommunications Union (ITU). The
-explanation made sense to me in early January 2013, as a ITU
-conference in Dubay discussing Internet Governance
-(<a href="https://en.wikipedia.org/wiki/International_Telecommunication_Union#World_Conference_on_International_Telecommunications_2012_.28WCIT-12.29">World
-Conference on International Telecommunications - WCIT-12</a>) had just
-ended,
-<a href="http://www.digi.no/kommentarer/2012/12/18/tvil-om-usas-rolle-pa-teletoppmote">reportedly
-in chaos</a> when USA walked out of the negotiations and 25 countries
-including Norway refused to sign the new treaty. It seemed
-reasonable to believe talks were still going on a few weeks later.
-Norway was represented at the ITU meeting by two authorities, the
-<a href="http://www.nkom.no/">Norwegian Communications Authority</a>
-and the <a href="https://www.regjeringen.no/no/dep/sd/">Ministry of
-Transport and Communications</a>. This might be the reason the letter
-was sent to the ministry. As I was unable to find the document in the
-mail journal of any Norwegian UN mission, I asked the ministry who had
-sent the document to the ministry, and was told that it was the Deputy
-Permanent Representative with the Permanent Mission of Norway in
-Geneva.</p>
-
-<p>Three years later, I was still curious about the content of that
-document, and again asked for a copy, believing the negotiation was
-over now. This time
-<a href="https://mimesbronn.no/request/kopi_av_dokumenter_i_sak_2012914">I
-asked both the Ministry of Transport and Communications as the
-receiver</a> and
-<a href="https://mimesbronn.no/request/brev_om_internet_governance_og_p">asked
-the Permanent Mission of Norway in Geneva as the sender</a> for a
-copy, to see if they both agreed that it should be withheld from the
-public. The ministry upheld its rejection quoting the same law
-reference as before, while the permanent mission rejected it quoting a
-different clause
-(<a href="http://lovdata.no/lov/2006-05-19-16/§20">offentleglova § 20
-letter b</a>), claiming that they were required to keep the
-content of the document from the public because it contained
-information given to Norway with the expressed or implied expectation
-that the information should not be made public. I asked the permanent
-mission for an explanation, and was told that the document contained
-an account from a meeting held in the Pentagon for a limited group of NATO
-nations where the organiser of the meeting did not intend the content
-of the meeting to be publicly known. They explained that giving me a
-copy might cause Norway to not get access to similar information in
-the future and thus hurt the future foreign interests of Norway. They
-also explained that the Permanent Mission of Norway in Geneva was not
-the author of the document, they only got a copy of it, and because of
-this had not listed it in their mail journal.</p>
-
-<p>Armed with this
-knowledge I asked the Ministry to reconsider and asked who was the
-author of the document, now realising that it was not same as the
-"sender" according to Ministry of Transport and Communications. The
-ministry upheld its rejection but told me the name of the author of
-the document. According to
-<a href="https://www.regjeringen.no/no/aktuelt/unga69_rapport1/id2001204/">a
-government report</a> the author was with the Permanent Mission of
-Norway in New York a bit more than a year later (2014-09-22), so I
-guessed that might be the office responsible for writing and sending
-the report initially and
-<a href="https://www.mimesbronn.no/request/mote_2012_i_pentagon_om_itu">asked
-them for a copy</a> but I was obviously wrong as I was told that the
-document was unknown to them and that the author did not work there
-when the document was written. Next, I asked the Permanent Mission of
-Norway in Geneva and the Foreign Ministry to reconsider and at least
-tell me who sent the document to Deputy Permanent Representative with
-the Permanent Mission of Norway in Geneva. The Foreign Ministry also
-upheld its rejection, but told me that the person sending the document
-to Permanent Mission of Norway in Geneva was the defence attaché with
-the Norwegian Embassy in Washington. I do not know if this is the
-same person as the author of the document.</p>
-
-<p>If I understand the situation correctly, someone capable of
-inviting selected NATO nations to a meeting in Pentagon organised a
-meeting where someone representing the Norwegian defence attaché in
-Washington attended, and the account from this meeting is interpreted
-by the Ministry of Transport and Communications to expose Norways
-negotiating position, negotiating strategies and similar regarding the
-ITU negotiations on Internet Governance. It is truly amazing what can
-be derived from mere meta-data.</p>
-
-<p>I wonder which NATO countries besides Norway attended this meeting?
-And what exactly was said and done at the meeting? Anyone know?</p>
-</div>
- <div class="tags">
-
-
- Tags: <a href="http://people.skolelinux.org/pere/blog/tags/english">english</a>, <a href="http://people.skolelinux.org/pere/blog/tags/offentlig innsyn">offentlig innsyn</a>, <a href="http://people.skolelinux.org/pere/blog/tags/opphavsrett">opphavsrett</a>, <a href="http://people.skolelinux.org/pere/blog/tags/personvern">personvern</a>.
-
-
- </div>
- </div>
- <div class="padding"></div>
-
<p style="text-align: right;"><a href="index.rss"><img src="http://people.skolelinux.org/pere/blog/xml.gif" alt="RSS feed" width="36" height="14" /></a></p>
<div id="sidebar">
<li>2016
<ul>
-<li><a href="http://people.skolelinux.org/pere/blog/archive/2016/01/">January (1)</a></li>
+<li><a href="http://people.skolelinux.org/pere/blog/archive/2016/01/">January (3)</a></li>
+
+<li><a href="http://people.skolelinux.org/pere/blog/archive/2016/02/">February (1)</a></li>
</ul></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/chrpath">chrpath (2)</a></li>
- <li><a href="http://people.skolelinux.org/pere/blog/tags/debian">debian (116)</a></li>
+ <li><a href="http://people.skolelinux.org/pere/blog/tags/debian">debian (119)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/debian edu">debian edu (154)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/drivstoffpriser">drivstoffpriser (4)</a></li>
- <li><a href="http://people.skolelinux.org/pere/blog/tags/english">english (298)</a></li>
+ <li><a href="http://people.skolelinux.org/pere/blog/tags/english">english (301)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/fiksgatami">fiksgatami (23)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/multimedia">multimedia (37)</a></li>
- <li><a href="http://people.skolelinux.org/pere/blog/tags/nice free software">nice free software (6)</a></li>
+ <li><a href="http://people.skolelinux.org/pere/blog/tags/nice free software">nice free software (7)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/norsk">norsk (273)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/scraperwiki">scraperwiki (2)</a></li>
- <li><a href="http://people.skolelinux.org/pere/blog/tags/sikkerhet">sikkerhet (44)</a></li>
+ <li><a href="http://people.skolelinux.org/pere/blog/tags/sikkerhet">sikkerhet (45)</a></li>
<li><a href="http://people.skolelinux.org/pere/blog/tags/sitesummary">sitesummary (4)</a></li>