Yeh, well...The US government brought in on themselves the past 10-12 years, thinking they could enforce US laws across the globe. They forgot the concept of "Soveriegn Nation"
Yeh, well...The US government brought in on themselves the past 10-12 years, thinking they could enforce US laws across the globe. They forgot the concept of "Soveriegn Nation"
Every nation does this. Its not a US thing. We just got 'caught'.
IP: Logged
06:47 PM
spark1 Member
Posts: 11159 From: Benton County, OR Registered: Dec 2002
Iridium was Motorola's $5 billion project that sold in bankruptcy for 25 million so it's still around. Worldwide satellite phone system worked well in middle east war zones and the polar regions but cell phones are much cheaper anywhere else. A huge problem with a worldwide system is that each government controls telecommunications inside it's borders. Motorola had to reach agreement with every country in the world on rates to charge if a call originated or terminated there even though no local facilities were used. In fact high rates were put in place to discourage bypassing local phone use. The government owns the phone system in many countries.
[This message has been edited by spark1 (edited 09-17-2013).]
Govt controls the phone system in EVERY country, especially the USA.
Is it government control or government ownership? Interested to compare to here, where Telstra, our largest phone company is 51% government owned. It used to be the only company and 100% government until about 15 or 20 years ago. The other few major players are all private companies but only 1 other really has it's own infrastructure.
to much real business gets done to walk away from the internet as it stands. not going anywhere.
encrypt, dummies. not that hard.
If you believe some of the hype, the NSA has access to most(if not all) of the encryption algorithms used that cross the US's borders. There's also rumors that any computer running Intel hardware and/or Windows software the NSA has pre-encryption access, so in either case encrypting is pretty much a lost cause unless you design and build all of your own hardware, code all of your own software and write your own encryption algorithm.
*snip*The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.
The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
If you believe some of the hype, the NSA has access to most(if not all) of the encryption algorithms used that cross the US's borders. There's also rumors that any computer running Intel hardware and/or Windows software the NSA has pre-encryption access, so in either case encrypting is pretty much a lost cause unless you design and build all of your own hardware, code all of your own software and write your own encryption algorithm.
there is no "pre-encryption" access to transmitted data. and, encryption is ever evolving & bountiful. easy to get an existing algorithm and modify it to make it yours. even stack them.
there is way to much good they will lose by separating vs the "evil" of the spying.
IP: Logged
12:34 PM
2.5 Member
Posts: 43235 From: Southern MN Registered: May 2007
No--they're just a willing and paid tool of those who caused it, as are the providers and communication services. Govt blames Snowden for the backlash but he was simply the messenger.
No--they're just a willing and paid tool of those who caused it, as are the providers and communication services. Govt blames Snowden for the backlash but he was simply the messenger.
1 - Everyone does it, so blame all governments. 2 - Its being used an an excuse to lock things down 3 - They don't make the "rules". The administrations do. They just do as they are told.
IP: Logged
01:01 PM
Boondawg Member
Posts: 38235 From: Displaced Alaskan Registered: Jun 2003
1 - Everyone does it, so blame all governments. 2 - Its being used an an excuse to lock things down 3 - They don't make the "rules". The administrations do. They just do as they are told.
Like good little sheeple, and it's big bu$$ine$$ too.
"everyone does it" the lamest excuse in the entire universe.
Like good little sheeple, and it's big bu$$ine$$ too.
"everyone does it" the lamest excuse in the entire universe.
I wasn't making excuses for the actions, i was trying to say that it wasn't solely the fault of the NSA. Spread the blame equally to ALL governments, and don't centralize it on just the NSA. Also to blame the actual government, and not the 'agencies'. Put blame where it belongs and hold them responsible..
[This message has been edited by User00013170 (edited 09-18-2013).]
IP: Logged
02:35 PM
Rallaster Member
Posts: 9105 From: Indy southside, IN Registered: Jul 2009
That is what rootkits are good for. Capture the data at the end point, where its not encrypted as you view/edit.
That's why off-line encryption is used before sending over an encrypted circuit. A machine that is never connected to the outside world is used for first stage encryption. This is called "super-encryption" and it is extremely hard to break. It's easier to go through trash cans to find what you want.
IP: Logged
03:35 PM
Boondawg Member
Posts: 38235 From: Displaced Alaskan Registered: Jun 2003
That's why off-line encryption is used before sending over an encrypted circuit. A machine that is never connected to the outside world is used for first stage encryption. This is called "super-encryption" and it is extremely hard to break. It's easier to go through trash cans to find what you want.
Bingo. I have an off-line machine. Things transfered off that machine can be flashdrived to the internet active machine. Then the flashdrive is wiped & formatted after every use to avoid someone trying to worm it while you are plugged into the on-line machine, in an attempt to get into the off-line machine the next time you plug the thumbdrive into it.
I don't use it that way, but it can be used that way...
That's why off-line encryption is used before sending over an encrypted circuit. A machine that is never connected to the outside world is used for first stage encryption. This is called "super-encryption" and it is extremely hard to break. It's easier to go through trash cans to find what you want.
If they know you are trying that, they can just come into your home and install the root kit manually and use the 'transfer media' to get their data across. This isn't even getting into some chip level stuff they can do, or simple 'addons'... When was the last time you looked IN your computer.. how many people would know what to look for? Would you recognize a component that had been replaced?
if they want you, they will get you.
[This message has been edited by User00013170 (edited 09-18-2013).]
IP: Logged
04:43 PM
Boondawg Member
Posts: 38235 From: Displaced Alaskan Registered: Jun 2003
Yup. That's what makes this illusion of freedom all the more.....transparent. Everything you do or don't do is allowed. Within that granted allowance lies your limited choices........your "free will".
But as long as we all silently pretend to agree to see the same thing, it's as good as our reality is ever gonna' get.
Yup. That's what makes this illusion of freedom all the more.....transparent. Everything you do or don't do is allowed. Within that granted allowance lies your limited choices........your "free will".
But as long as we all silently pretend to agree to see the same thing, it's as good as our reality is ever gonna' get.
The trick is to not get on their radar in the first place, and if you are, to make it more difficult than its worth to go after you. Like an alarm on the car, it doesn't stop the thief, but it makes them wonder if its worth the trouble and choose another car.