Last week the Obama Administration announced that it would be shortly submitting legislation intended to force providers of all kinds of digital communication services (mail, voice, chat, Twitter, etc.) to install back doors in their services to allow government monitoring of all encrypted digital communication. No explicit details were given of how this is going to work, nor has the actual legislation yet been introduced. Hopefully it never will, because it simply won’t work.
It’s not that such technical back doors can’t be written (they can), nor is it even so onerous to force communication providers to change all their software since these services are rewritten often anyway. The problem is that such back doors will simply force terrorists and privacy freaks to roll their own encryption products often using technology that is already in the public domain and readily available.
All Osama has to do is encrypt his messages with a product like Pretty Good Privacy (PGP) before sending them. With tens of thousands of suspicious techies already using PGP and similar products, real terrorist communications will get lost in the flux.
For those who are unlikely to show such technical initiative, the feds may force Verizon, Google, and even Skype, to install back doors, but they can’t do so as effectively to two-guys-in-a-garage web encryption services that appear and disappear overnight and are given away for free.
Only the dumb crooks will be caught and at a terrible cost to the rest of us.
I have been covering this story since the Reagan Administration and in that time law enforcement has consistently worried about a growing technology gap that would keep it from intercepting criminal communications. A variety of standards have been proposed over the past 30 years with the general goal being to monitor virtually all communication in real time, something the National Security Agency is rumored to be capable of doing right now.
While this may seem very reasonable in a post-9/11 world, it isn’t. First there is the proposed scale of these activities, which is massive. As far back as the first Bush and early Clinton Administrations law enforcement agencies pushed for the capability to intercept up to 10 million simultaneous communication sessions. Yet according to a Congressional report issued annually on federal wiretaps, fewer than 2,000 legal taps have been ordered in any year.
Such an expansion of federal wiretap authorizations was ludicrous then, when there wasn’t the law enforcement manpower to implement it. And today when automation can probably replace manpower, making 10 million simultaneous wiretaps maybe a breeze to do, there are even more reasons to decry it as an invasion of privacy and even a possible violation of the Constitution.
When encryption is made illegal (that’s where this trend threatens to go) its presence creates a situation where we are guilty until proven innocent. That’s when encryption may well give way to obfuscation — hiding secret communications in plain sight in a process known as steganography — with the next terrorist plan easily hidden in the background noise on a Miley Cyrus music video.
Even if there were actually a backdoor for Internet communication services, it would eventually be used and abused by both the government and hackers. That would make government communications equally insecure — a huge threat to national security.
This is simply not a tool we need.
DOWN WITH THE TALIBAN.
ALSO, DOWN WITH JESSE VENTURA “CONSPIRACY THEORY”.
PROPS TO DOG THE BOUNTY HUNTER THOUGH. WOOO!
Osama is dead. So is Goldstein.
Elvis is alive.
Another problem with mandating this sort of technology is that the U.S. is not the only government that would avail itself of its use. Do we really want the likes of Iran and North Korea to be in a position to compel comms companies to hand over the keys to the backdoor installed by Uncle Sam? I think it’s already too late.
Take the word “government” out of your sentence. The moment a backdoor is installed, it becomes questionable WHO is able to use it. It’s always hard to serve two masters. Normally security software should serve only one master, that master to be as secure as posslble. In the real world security software often serves a second master, to be as profitable as possible. We all know how well that frequently turns out.
Now we’re asking security software to be secure, EXCEPT when we want it to be insecure, and only for the specific party for whom we want it to be insecure. Good luck with that.
I guess an analogy would be the “secure content delivery” stuff like HDCP being forced into appliances and OS’s. We want this thing to work, EXCEPT when we don’t want it to work, and we always want you to be able to figure out which is the right thing to do. We’ve already seen how well that’s working out.
Actually it does put a significant hurdle in the way of casual piracy. Of course it also discourages people from buying drm’d content when it doesn’t let normal people time shift and location shift which should be part of the definition of “working right”.
Next up: all houses will be required to have government microphones and cameras, to protect us from terrorists of course. Welcome to 1984 in 2011.
Legislation has already been introduced requiring periodic in-home inspections by the light-bulb police.
Have you got a link to the story?
1984 in 2011?
Every single cellphone has a GPS.
Every single cellphone has a microphone.
Uncle Sam, ‘with a warrant’ can activate any cellphone’s microphone at any time and listen in on any phone conversation within its range.
Its been 1984 for quite a while now.
We still have terrorists.
http://news.cnet.com/2100-1029_3-6140191.html
Spying on ordinary citizens in order for that one in a million chance of finding a crook or terrorist is ridiculous. What a waste of money!
People encrypt to ensure privacy. Its bad enough that the United States government wants a “Master Key” to private communications but it even worse that there is no oversight to prevent abuse of this access. I mean its not like when the State Department outsourced passport processing to contractors who perused famous people’s data? Installing Back Doors for law enforcement purposes can only lead to abuse, just look a Vodaphone in Greece.
I’ve no recollection of the author, but it’s been said that the most paranoid politician wins. Traditionally, that was the province of the Right Wingnuts. With Clinton and Obama, the Democrats have gone over the cliff too.
How soon will it be that Christine O’Donnell is played by the Right Wingnuts as a Mainstream God Fearing Christian American???? Nutballs one and all.
You do realize that Wingnuts come with both Right and Left hand thread
I’m beginning to think your country has gone completely bananas. Kind of scary.
Oh, wait. On second thought, all countries have gone bananas including my own.
Remember that the Stasi in East Germany were among the most effective and repressive intelligence and secret police in the world (at a ration of 1 agent per 166 citizens and perhaps 1 informer per 7 citizens).
Yet, they failed to figure out that a popular uprising was going to occur and stop it.
I doubt the Department of Homeland Security can be any more effective even if they are able to monitor every bit of electronic communication in the US.
Something like 80% of the security cameras in London are broken. What percentage of those “terr’ist” calls do you think will actually be monitored? And don’t give me that computer screening bull. Call a bomb a “cheeseburger with fries” and the stupid computer won’t even blink.
Well said, Bob.
The thing that continues to baffle me is the lack of general first year IT education that our friends in the houses of Congress seem to be lacking. How is it even possible to make laws requiring things that cannot be done? The internet is not now, nor has it ever been a telephone system. Although it can be used as a monitoring system, it’s not designed to be one. And if the internet is a true international effort… why is the US allowed to take these kinds of liberties to begin with.
Maybe I’m missing something…
You’re missing the fact that Hitler and his gang were serious believers in everything from spiritualism to the hollow earth (we’re on the inside!). Expecting right-wing ideologues to actually understand a technical subject is pretty much a lost cause.
And you’re ignoring that it is a left-wing idealogue writing this legislation, and expecting his left-wing Congress to pass it for him. Might be better to set up Stalin or Castro as your straw-man.
“Right” and “Left” are ceasing to matter – no matter which bunch we put in power, more govt = less liberty.
Hitler and company were NATIONAL SOCIALISTS. That would be NAZI for short.
…….that is to say he was a LEFT WINGER.
We right wingers don’t believe in authoritarian government. Or even impolite coercion. But you lefties sure love it!
OMG… I hope you’re being satirical because if your not showing the world that the far right of American politics (you don’t actually have a left by world standards) has no concept of history. Hitler was a lefty? Are you nuts? he was a Fascist which is as far RIGHT as you can get. One of his main political assertions was that he was fighting the USSR to protect Western Europe from Communism. For pitty sake go read a book.
Hitler was a socialist. The modern usage is “right wing” = anti-socialist. “left Wing” = Socialist. The original usage came from the Fascists (National Socialist) in Italy. In the Italian parliament, Communists sat ot the left side, Fascists sat on the right. Both were socialist. There is no where on the right/left spectrum for non socialists. Libertarians and most republicans are not even on that scale.
Your assumptions are invalid. Bad assumptions usually lead to bad results.
Gigo.
Another aspect of wiretapping is the example of Nokia-Siemens Networks selling GSM network equipment to Iran. Now, my knowledge of GSM standards is over 10 years old but already back then the ITU-T standards specified that a GSM network MUST include govenment wiretapping systems. Seeing how the world spins, that requirement has more likely become more stringent than loosened…
So Iran bought a telephone network that is 100% internationally compatible from one of the leading phone network suppliers. And suddenly the suppliers is accused of supporting government oppression by the same nations that put the wiretapping requirement into the standard.
Its quite ironic that apparently the standard meant wiretapping is only to be included in “the free world” or something.
[…] the door open Posted on October 8, 2010 by chrisainslie It always scares me to see supposedly democratic first world countries talking about legislation like this. Last week the Obama […]
Bob where have you been?
Microsoft provides a document (Global Criminal Compliance Handbook) that explains how Stasi officials can access all Microsofts online products like Hotmail Xbox etc:.
“The document lists the sorts of data it can provide, including photographs, contact lists and internet addresses all stored by users of Microsoft services like Windows Live, Xbox Live and MSN Messenger.”
Any Hotmail account could always be accesed using the password ‘eh’ but Microsoft spells out, in exacting detail,what is available for intelligence agenies:
http://blogs.computerworld.com/15655/leaked_microsoft_intelligence_document_heres_what_microsoft_will_reveal_to_police_about_you
The handbook is available at Wikileaks.
Thanks for coming down on the right side of this issue, Bob!
The proposed legislation would not be able to stop technology providers from foreign countries from enabling users to communicate securely. Like you said, anyone who wants to keep their communications secret will start using technologies that enable them to do so. That will leave the feds with mountains of data collected from innocent people who have no intention of attacking the united states. It would be naive of us to assume that the feds won’t be looking through that data for personal reasons. (Of course, naivete is Congress’ most pronounced trait)
“Only the dumb crooks will be caught and at a terrible cost to the rest of us.”
My stepfather works in law enforcement, and I have heard him say on more than one occasion, “You don’t catch the smart ones.”
A wise man once said that if the other guy (good or bad) believes that his encryption system is so secure that nobody will be able to read his messages, then he will send the most “secret” secrets.
I have much more confidence that our guys and gals up in those big buildings halfway between Washington and Baltimore are a lot smarter than they look plus they have the resources and the time to figure out just about anything.
So just shut down the back doors and let the other guys (good or bad) “think” that they have secure networks and let these guys and gals go to work.
You might be surprised what they see and hear………
All that the criminals have to do is (steganography) encode their communications in SPAM. Then let the governmental entities try to figure out the messages amongst all the spam that no one can seem to stop.
I haven’t much to say on this time but you do great job and appreciate your blog.
Bob, lately we’ve been getting more and more of this type of link spam. Perhaps it would help to eliminate the “website” field for the comments.
Cringe, the steganography point is frightening.
As a precaution, I think a federal ban on Miley Cyrus is in order.
It’s for the children.
Ok, lets think about this.
1. The Gov’t will continue to spy on us citizens, because it believes it should and it can. While nice to have, the Constitution does not stop determined bureaucrats who think we are all Taliban sympathizers
2.
3. Profit.
Ok, lets think about this.
1. The Gov’t will continue to spy on us citizens, because it believes it should and it can. While nice to have, the Constitution does not stop determined bureaucrats from thinking all 300 million of us are Taliban sympathizers. Conclusion: efforts to stop gov’t spying will fail.
2. Since the gov’t wil continue to spy, there will be an equal and opposite reaction. Newton’s law applies in more locations that the minds of physics profs. conclusion: the equal reaction will be cryptography.
3. Cryptography should be easier to use and deploy for the masses. Right now it is not. Conclusion: some Bill Gates-George Washington wannabe will pull together from the threads of cryptography practice an easy to use, practically unbreakable add on to e-mail/smart phone/IM/texting that makes it really really hard to read individual messages.
4. That person will make a lot of money.
It’s called GPG. A simple add on to Mozilla/Thunderbird.
But, any court can order you to de-encrypt for them. If you refuse, that is a felony. By current US law.
Innocent until proven guilty…
Innocent until we finish with the interregation
Well said Bob!
My favourite thriller author once wrote a story in which it was revealed that leading diamond dealers sent their wares in the normal post. This was much safer than making special courier arrangements which were observable, time-able and targetable. The run-of-the-mill postal service deals with umpteen millions of small envelopes stuffed with data or product and unless the right one is stopped and opened, it is very secure.
Contrarily, in this sense, all electronic data is completely visible; no envelope, unshielded … Unless, of course, it is steganographically enclosed (rather than encrypted). However even this is superficial in that a single data stream down a wire is serial transmission and thus observable. I guess patterns are watched for.
As ever a government talks itself into horrendous spends when an obvious get-around costs very little. One person just has to write a letter or even, shock horror, actually talk to someone face-to-face (or maybe given the criminals being targeted, they will actually whisper behind their lapels!)
Is there a back door in PGP already?
Can encryption be made illegal if it is free speech?
Perhaps the Obama staff and Congress are not as dumb as they seem. They could just be playing to a dumb electorate! The burden of educating the electorate on why you, as a public representative, are NOT taking action is much less likely to get you reelected than just playing to the general stupidity.
I truly believe when I read stories like this that when congress finally passes “Net Neutrality” law, it will require ISPs to scan every packet we send over the network.
Yes, that exactly the opposite of what “Net Neutrality” means, but I have NO faith that that is not what is going to happen.
Our government seems to always get internet regulation COMPLETELY wrong, whether its this encryption stuff or anything else.
купить виагру в киеве
I heard about a guy who burnt over 10,000 dual layer DVDs each full up with random data then used them as a table cloth for eating Pizza, then scratched them just a tiny bit, then carefully packed then into several filing cabinets in his home with his actual backups. His purpose? If the Government comes knocking one day, the costs they will be forced to incur cleaning and reading and fruitlessly trying to decrypt those stinky DVDs will be astronomical. If it looks like the Government will be scanning every packet we send, I predict the use of open source software designed to do something similar to our on line communications e.g. add 10,000 apparently real messages to your Gmail account, each with a 1Mb ‘encrypted’ rubbish attachment, or generate call records to 100,000 other Skype users each day and so on. I would take great satisfaction in paying a bit extra for storage / bandwidth in order to bump up the cost of spying by the Government up by a couple orders of magnitude. I am pretty sure I’m not alone on that..
dont underestimate government. they will check all the 10,000 DVD, it will take them years and they will be able to claim they need more staff and equipment, paid for by your taxes of course, which is good for government anyway.
i have been involved in an investigation. cops came and took all my many computers, even the broken ones, anything that resembled the look of an electronic device however working (including old radios, GPS, fancy remote controls, failed hard disks and memory modules etc) hundreds of cd’s and dvd’s with TV movies and family pics, then kept them months, years (there was apparently no law saying they need to complete investigation within a certain time) going through them at huge cost for the taxpayer. anything that contributes to the growth in scope, size and cost of government is good for government regardless of the results or usefulness. thats why governments will end up introducing massive scale internet monitoring and they are already doing it. and thats why i see a great business case in privacy and encryption products and services.
The greatest damage terrorists are continuously doing to our country is the money and resources we keep flushing down the toilet in this country and around the world in order to “keep us safe”.
To keep our children safe, we can cash in their college fund and our retirement account to buy the safest home esecurity system and locks and fences, and quit our jobs or hire someone to follow and watch them everywhere they go at all times. Then stay up all night to read their emails and online posts. This is our current plan.
Look past the ignorance on basic IT budgeting and security strategy these proposed plans are faking and ask, who is really benefiting here?
the final purpose of these programs is not safety, but to grow scope and size of government and of course the amount of taxes required to pay for it.
I think you are 100% right, but most people don’t want to hear it.
[…] I, Cringely » Spies Like Us – Bob Cringely weighs in on privacy and the ‘net […]
With such a system in place why stop at terrorists? Why not “spy” on political opponents, campaign donors and such and cross tabulate that data to voting districts for the uber inside track on the path to money and power?
They have been doing that since World War I.
Some claim since before Custer.
I think anyone who follows the spy world would agree that the NSA is doubtless grabbing every phone, radio, e-mail, and other communication out there. The fascinating question is what do they do with all that stuff? Clearly they are not sharing it with the FBI, CIA, NRO, and endless other spy groups or this new initiative would not be needed. Are those 41,000 NSA employees just passing the stuff around among themselves?
If you want to put an alternative explanation on it — this is a piece of disinformation intended to encourage users of these services to believe that their communications aren’t already hopelessly compromised. Ideally, from this point of view, the legislation would fail to pass.
The worst case is for terrorists, et al, to get really paranoid and start treating online communications as suspiciously as they do, say, cellphones.
Everything you said is exactly right. The real criminals are not afraid of this. But the average citizen should be.
When counterterrorism efforts lead to the loss of privacy and freedom, the terrorists win. Our government seems to be in the midst of another “Mission Accomplished” moment.
I remember a story a few years ago on some magazine show… Currently, communication that is already being watched gets flagged by an automated system (? I think) then the flagged messages are reviewed.
This reviewing is the big problem. You have a bunch of 20-something enlisted intelligence people sitting in cubes for 8 hours a day scanning through piles of false positives. Backlog is huge. Easy for things to get missed.
The story’s conclusion was that adding more intelligence sources won’t necessarily produce more actionable info.
This is just downright incredible.
amy wrote “but you should not afraid of this if you are not a terrorist.”
Bruce Schneier is an expert in computer security, and his latest “Crypto-Gram Newsletter” (https://www.schneier.com/crypto-gram-1010.html) covers this very same subject in an article titled “Wiretapping the Internet”. Here is an excerpt:
“Any surveillance system invites both criminal appropriation and government abuse. Function creep is the most obvious abuse: New police powers, enacted to fight terrorism, are already used in situations of conventional nonterrorist crime. Internet surveillance and control will be no different.
“Official misuses are bad enough, but the unofficial uses are far more worrisome. An infrastructure conducive to surveillance and control invites surveillance and control, both by the people you expect and the people you don’t. Any surveillance and control system must itself be secured, and we’re not very good at that. Why does anyone think that only authorized law enforcement will mine collected internet data or eavesdrop on Skype and IM conversations?”
“.. It’s bad civic hygiene to build technologies that could someday be used to facilitate a police state. No matter what the eavesdroppers say, these systems cost too much and put us all at greater risk.”
What a joke. The NSA has been scanning everything for a very long time. There are satellites and drones photographing the whole world. He**, in most cities there’s a video camera on every other lamp post. Yet the terrorists are never caught, let alone stopped in advance.
All law enforcement does is hassle law abiding citizens. Like giving traffic tickets to motorists while serious criminals run around free. The real crooks/terrorists are smart enough and careful enough to evade any snooping. “Say hello to Grandma” means begin the plan in 24 hours. The US will waste billions and that’s all it takes to evade detection.
Not to mention the fact that software development will move off shore out of US reach. Well, that already happened so the whole thing is moot. This is just another form of prohibition, which the US still hasn’t learned cannot work.
I would like to thank you for the efforts you have made in composing this article. I am going for the same best work from you in the future as well. In fact your fanciful writing abilities has prompted me to start my own blog now. Actually the blogging is spreading its wings rapidly. Your write up is a fine example of it.
Howdy, i study your weblog occasionally and i personal a similar one and i was just wondering if you get lots of spam comments? If so how do you avoid it, any plugin or anything you can advise? I get so much lately it is driving me mad so any assistance is really much appreciated.
Awesome Blog. I add this Blog to my bookmarks.. I’m currently working on Fishbone Diagram project.
Oh,nice article. Good informations..
Oh,nice article. Good informations..
Oh,nice article. Good informations..
Oh,nice article. Good informations..
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
Oh,nice article. Good informations..
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
Oh,nice article. Good informations..
Oh,nice article. Good informations..
Oh,nice article. Good informations..
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
I will tell fairly … the first time has come on your site on purpose “clever spam”. 🙂 But to write that that close on a theme it is necessary to read. Has started to read – it was pleasant, Has subscribed and with pleasure I read. Very to be pleasant your site – interesting The maintenance, pleasant design for reading … 🙂
Nice webpage, keep up the very good operate
Thanks for the great info. I find these posts have a lot of information. I can’t wait to get a chance to impliment all these great posts. Thank you very much.
When I say that this site shares hot penny stocks before promo’s I really mean it ! Anyone can subscribe free !
I find these posts have a lot of information. I can’t wait to get a chance to impliment all these great posts. Thank you very much.
I always appreciated watching movies. This serves as great inspiration for me. I shall become a subscriber of this blog.
I find these posts have a lot of information. I can’t wait to get a chance to impliment all these great posts. Thank you very much.
Buy $10 Replica Designer Sunglasses with 3-day FREE SHIPPING
Designer Sunglasses – Buy $10 Replica Designer Sunglasses with 3-day FREE SHIPPING
You can share some of your article, I’m like you write something, really very good! I will continue to focus on
Never done in the article comments, this is my first network comments, appreciate you sharing. Very good article
You actually make it seem so easy with your presentation but I find this topic to be actually something which I think I would never understand. It seems too complicated and extremely broad for me. I am looking forward for your next blog post, I’ll try to get the hang of it! Regards, Frank Leisten
Such a good writing, or by I saw for the first time. I’m quite happy, you are a good writer!
In the united kingdom, studies demonstrate that about 70% from the woman human population do not use the beats by dr dre headphones and rather straps on ill-fitting, not comfortable ones.
manpower to implement it. And today when automation can probably replace manpower, making 10 million simultaneous wiretaps maybe a breeze to do, there are even more reasons to decry it as an invasion of privacy and even a possible violation of the Constitution.
An espresso machine is used to make the traditionally Italian coffee beverage known as espresso. Espresso machines are fitted using a metal filter container that’s filled with ground coffee that is tamped down to compact the coffee grounds, as well as the metal filter is locked in spot inside the machine.
Hey, I think your site might be having browser compatibility issues. When I look at your blog site in Ie, it looks fine but when opening in Internet Explorer, it has some overlapping. I just wanted to give you a quick heads up! Other then that, very good blog!
was there, look for it. you can…
take steps to put that rss feed to work for you, there are many sites out there that accept rss feed submissions, aggregate your feed with other feeds and help you to distribute your content.readers will see your feed on other…
motocourier
[…]usually posts some quite interesting stuff like this. If you?re new to this site[…]
gümrük
[…]we prefer to honor a lot of other web web-sites around the web, even when they aren?t linked to us, by linking to them. Below are some webpages worth checking out[…]
naples pet sitter
[…]the time to study or go to the subject material or web-sites we have linked to below the[…]
car dealers uae
[…]check below, are some completely unrelated internet sites to ours, even so, they are most trustworthy sources that we use[…]
follow me
[…]Wonderful story, reckoned we could combine a few unrelated data, nevertheless definitely worth taking a appear, whoa did 1 learn about Mid East has got a lot more problerms also […]
Botox
[…]just beneath, are many absolutely not related internet sites to ours, nevertheless, they may be certainly really worth going over[…]
GreenSmoke review
[…]we like to honor a lot of other internet web sites around the web, even though they aren?t linked to us, by linking to them. Under are some webpages worth checking out[…]
website
[…]Sites of interest we have a link to[…]
PILLS SHOP
[…]very handful of internet sites that transpire to become comprehensive beneath, from our point of view are undoubtedly very well worth checking out[…]
mattresses reviews
[…]The info talked about within the write-up are a number of the ideal out there […]