This reminds me of a Grigori Perelman quote (the guy who turned down the Fields Medal and the Millennium Prize on principal):
"There are many mathematicians who are more or less honest. But almost all of them are conformists. They are more or less honest, but they tolerate those who are not honest.”
Apple not only "tolerates" walled-gardens, they build them and encourage others to do so. That is enough reason to not use a Mac.
This is why I stopped releasing source code. Idiots who want 15 mins of fame and constant attention but cannot create, so they consume what others create.
You own the copyright. The declaration is an option. If you have been financially damaged by this, then you have legal recourse, but you must be able to prove damages with a dollar figure.
Be sure to push your DNS through the OpenSSH tunnel too, or they'll see your client's DNS requests. Here is a very short write-up on safe web browsing while on untrusted networks: http://16systems.com/OpenBSD/untrusted.pdf
Instead of an OpenSSH tunnel, use OpenVPN. It has settings to automatically push DNS, and on my Mac for example using Tunnelblick (a wrapper) I can have a GUI that can give me status updates on my tunnels, and when they get disconnected, to make sure I don't accidentally sent information down the wrong line.
For proxied services, the proxy (e.g., squid) server on the other end of the ssh tunnel will be making the DNS requests.
If you want to be fastidious enough to hide the DNS for un-proxied services, you'll probably also want to have a firewall blocking and logging most outgoing non-tunneled services so you can identify them and configure the clients and proxy appropriately.
Perhaps combined with another operating system which performs the tasks mentioned in the article? [Taking a picture, and sending it, the ip address, and anything else interesting/identifying about the network (nmap dumps, nearby access points - assuming that it just connects to any unencrypted one - traceroutes, and so forth), to a predetermined email address].
Forensic guys want to take images of the storage devices. They use tools such as dcfldd or purpose-built devices (Tableu) to do this. They'll then analyze the images and probably never touch the guy's hardware again. It will sit in a evidence room for eons. They could return the hardware as soon as they've done the imaging, but I've never seen that happen. Use whole disk encryption everywhere :)
Most who are fairly paid, valued and treated as human beings won't "walk out". If they like the area and have friends and family close by and they are respected by the company, they will stay.
Disrespect them (low pay, no pay raises, no down time, 80 hour weeks all the time, uncertain/unstable company, etc) and they will leave.
These scanners are pretty much worthless. They are written by script kiddies for accountants who pretend they know something about IT when most of them have never administered a system.
Does anyone worry about the built-in Law Enforcement Access systems that the cloud services have? Bruce Schneier wrote an essay (http://www.cnn.com/2010/OPINION/01/23/schneier.google.hackin...) describing why that was bad and how it played into the Chinese hack of gmail. I hate to be a wet blanket, but just can't help to wonder, how many people stop and think of their privacy and the privacy of their corporate data, or do they just rush, following the herd over this particular cliff?
In the case of Nasuni and the Filer product; we have thought about this. All data is encrypted using your encryption keys, before being stored in the cloud. You're perfectly right to be concerned though.
Storing your data in the cloud, in the clear does open you to risk, which is one of the reasons cloud storage has not "taken off" for businesses in general, and why we do so much work to encrypt and protect all data before it is sent over the wire.
Oh! Another question (and I'm not trying to be a dick; I'm just really curious - data storage/retrieval in the cloud solves 1,000 other problems): how's Nasuni different than Cleversafe? Cleversafe runs their own data centers, I believe, but other than that, it seems similar: http://www.cleversafe.com/
"There are many mathematicians who are more or less honest. But almost all of them are conformists. They are more or less honest, but they tolerate those who are not honest.”
Apple not only "tolerates" walled-gardens, they build them and encourage others to do so. That is enough reason to not use a Mac.