Sciencemadness Discussion Board » Non-chemistry » Legal and Societal Issues » more frightening privacy stuff Select A Forum Fundamentals   » Chemistry in General   » Organic Chemistry   » Reagents and Apparatus Acquisition   » Beginnings   » Responsible Practices   » Miscellaneous   » The Wiki Special topics   » Technochemistry   » Energetic Materials   » Biochemistry   » Radiochemistry   » Computational Models and Techniques   » Prepublication Non-chemistry   » Forum Matters   » Legal and Societal Issues

Pages:  1  2    4
Author: Subject: more frightening privacy stuff
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

www.hackingteam.it/index.php/remote-control-system
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

Consider for a moment exactly what Google can do. It is able to scan through the billions of emails that flow across its network every day, and , based on hashes — mathematical formulas used in database searches and information encryption — it can pluck out an offending email that matches a database of flagged content and then alerts law enforcement.

Google claims as part of a class-action lawsuit against the company regarding email scanning that " a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties." Got that , in an era of electronic communications , emails between you and your friends or business partner , or between you and your brokerage firm , bank , accountant , lawyers , or even your doctor , spouse and child , are never to be considered private.

What happens if an increasingly paranoid government grows suspicious about references to patriotism and deems patriotic speech and imagery worthy of scrutiny ? What happens if government decides those who invest offshore are traitors who must be identified and persecuted ?

When Edward Snowden's revelations broke last year , it sent shock waves through CERN , a particle physics laboratory in Switzerland. A young MIT PhD student working there expressed concern , and soon 40 of the smartest physicists and computer programmers on the planet were pooling their knowledge to found ProtonMail , a Gmail-like email system which uses end-to-end encryption , making it impossible for outside parties to monitor messages sent back and forth. ProtonMail's two-week " crowd funding " campaign had set a target of $100,000 , but collected more than$300,000 in just a few hours. => https://protonmail.ch

In June, PayPal — the same U.S. money-transfer company that blocked contributions to Julian Assange's WikiLeaks at the U.S. government's behest — froze ProtonMail's funds and blocked all further contributions , without notice or explanation. Why would PayPal do such a thing ? Andy Chen, the MIT PhD student who dreamed up ProtonMail , explained that , " When we pressed the PayPal representative on the phone for further details , he questioned whether ProtonMail is legal and if we have government approval to encrypt emails." PayPal's officiousness verifies the fact that American tech companies are increasingly an extension of the U.S. government , and so regrettably cannot ever be trusted with anyone's business.

Excerpts of articles from http://thesovereigninvestor.com

_______________________

Duh I'm with stupid up there
www.sovereignman.com/trends/heres-the-dumbest-thing-youll-he...

.
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

http://www.csoonline.com/article/2360945/security/malicious-...

http://www.csoonline.com/article/2599437/data-protection/cry...

.
aga
Forum Drunkard

Posts: 7030
Registered: 25-3-2014
Member Is Offline

Everything you do on the internet is scanned, analysed, recorded.

It's easy to do, and is done all of the time.

The telephone/mobile networks went digital decades ago.

Likely that a 'Market' exists between Governments (including Mafias) to trade data on who said/did what.

The sheer Quality of Surveillance satellite optics means that what you Say can be derived from the vibrations of something near you.

In these mildly paranoid times, literally Everything you say or do is analysed.

What will be made of the data in Wartime will be interesting.

Texium

Posts: 3808
Registered: 11-1-2014
Location: Salt Lake City
Member Is Offline

Mood: Triturated

 Quote: Originally posted by aga Everything you do on the internet is scanned, analysed, recorded.
I think we need a new internet.

Come check out the Official Sciencemadness Wiki
They're not really active right now, but here's my YouTube channel and my blog.
roXefeller
National Hazard

Posts: 463
Registered: 9-9-2013
Location: 13 Colonies
Member Is Offline

Mood: 220 221 whatever it takes

Someone call Al Gore.
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

 Quote: Originally posted by aga The sheer Quality of Surveillance satellite optics means that what you Say can be derived from the vibrations of something near you.

Not so. The laser bug is over 40 years old. The limitations inherent cannot be overcome without very stringent control of the environmental setting.
Adaptive optics to which you allude cannot possibly compensate.

www.williamson-labs.com/laser-mic.htm

.
aga
Forum Drunkard

Posts: 7030
Registered: 25-3-2014
Member Is Offline

High speed camera, isolate the movement of a small part of the image, such as the edge of a crisp packet, add some DSP, DAC it, and you have sound.

The key ingredients are camera resolution and frame capture speed.
Essentially the frame rate is what determines the max frequency you can resolve.

http://newsoffice.mit.edu/2014/algorithm-recovers-speech-fro...

 Quote: Originally posted by roXefeller Someone call Al Gore.

OK. Al is Gore.

[Edited on 1-9-2014 by aga]

Antiswat
International Hazard

Posts: 1593
Registered: 12-12-2012
Location: Dysrope (aka europe)
Member Is Offline

Mood: dangerously practical

my classmate keeps yapping about some damn app trying to install itself on his smartphone, he says he read through what it does, it does so the software can pretty much fully control his smarthphone in exchange of some lame game of some sort.. however killswitch technique has been used lately to shut off loads of iphones (smartphones all in all?) not to mention stingray phone tracker

the arguments for installing killswitch technique on iphones when theyre manufactured is so that the all devious thieves cannot steal your phone and use it..

http://en.wikipedia.org/wiki/Stingray_phone_tracker

http://www.examiner.com/article/in-the-wake-of-ferguson-crit...

we live in an age of technology where criminals are out in the open, and the criminals ofcourse wouldnt want to be on camera and later on the internet

i never wanted a smartphone, the more technologically advanced you get, the easier it will be to be limited by the same technology

~25 drops = 1mL @dH2O viscocity - STP
Truth is ever growing - but without context theres barely any such.

https://en.wikipedia.org/wiki/Solubility_table
http://www.trimen.pl/witek/calculators/stezenia.html
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

The martians have landed ?

Great what's next.

http://money.msn.com/now/mysterious-fake-cellphone-towers-fo...

http://www.popsci.com/article/technology/mysterious-phony-ce...

My question is if someone takes one down and helps themself to the parts , will the police respond ? Who will be the complainant.

See this other related post above

Private sector hacking.

___________________________________________________________

Since when did I don't like what you're doing , stop that , become enforcible.

www.inquisitr.com/1474279/comcast-tells-customers-to-stop-us...

.
careysub
International Hazard

Posts: 1339
Registered: 4-8-2014
Location: Coastal Sage Scrub Biome
Member Is Offline

Mood: Lowest quantum state

 Quote: Originally posted by aga High speed camera, isolate the movement of a small part of the image, such as the edge of a crisp packet, add some DSP, DAC it, and you have sound. The key ingredients are camera resolution and frame capture speed. Essentially the frame rate is what determines the max frequency you can resolve. http://newsoffice.mit.edu/2014/algorithm-recovers-speech-fro...

That is an interesting article.

But it has nothing to do with satellite imaging - they cannot image the surface of a potato chip bag at 3000 frames a second.

Read the brand on the label, yes. Maybe some of the other larger text as well. That's about it.
IrC
International Hazard

Posts: 2710
Registered: 7-3-2005
Location: Eureka
Member Is Offline

Mood: Discovering

Does it matter when they will not stop until they have high tech cameras on every street light in the nation? Not only that, I have seen banks of cameras on a power pole on a two lane rural highway between two towns 50 miles apart. One population ~5,000, the other ~1,500. If they are there you can bet they are going up along every highway nationwide at a never ending pace. Your plates are on record and your travels are already cataloged. While those highway setups may not be listening you know the ones on city poles are. If they can be panned and controlled what are the odds that in addition to the microphones on the poles the technology aga describes will not be added. Pan the camera at whatever building or house they want to spy on and little privacy remains. Add to that thermal imaging which can provide internal images and precise analysis of power use, water use. Next toilet use. Orwell could not begin to understand the technical advances in 1984 that would exist by 2014 when governments are busy building the reality.

"Science is the belief in the ignorance of the experts" Richard Feynman
chemrox
International Hazard

Posts: 2953
Registered: 18-1-2007
Location: UTM
Member Is Offline

Mood: LaGrangian

Thanks franklyn. I reserved an invitation.

"When you let the dumbasses vote you end up with populism followed by autocracy and getting back is a bitch." Plato (sort of)
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

http://techcrunch.com/video/lavabit-founder-talks-snowden-an...
See ' The legal premise ' below

With this stuff in the wild everyone has a need for security in communication.
http://www.bloomberg.com/video/malware-used-for-surveillance...
http://finance.yahoo.com/news/unidentified-country-likely-be...
http://fortune.com/2014/11/23/regin-malware-surveillance/?xi...
http://techcrunch.com/2014/11/24/regin-spying/?ncid=txtlnkus...

The legal premise for secret indictments , particularly as applied to accused terrorists or combatants is that Grand Jury proceedings are secret as enacted in constitutional law. In Gerstein v. Pugh, 420 U.S.103 (1975) , the Court held that a suspect can be detained for a significant length of time after arrest when the legality of the confinement is reviewed by a neutral decision maker. Normally that review is supplied by a magistrate in a post arrest hearing; but when a grand jury indictment precedes the arrest, the Court concluded that no further review is needed. Substituting a grand jury's review of the evidence for a magistrate's review is permissible,

.
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

Homing Pigeons are still secure

No kidding, those are used in New York.

http://www.computerworld.com/article/2872292/nsa-secretly-us...

http://www.computerworld.com/article/2474275/cybercrime-hack...

.
franklyn
International Hazard

Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

Zombie
Forum Hillbilly

Posts: 1700
Registered: 13-1-2015
Location: Florida PanHandle
Member Is Offline

Mood: I just don't know...

I've been saying it for years.

If you think you are free to do as you please... you're wrong. IF the government has an interest in you or a use for you, you are theirs.

All of this spyware/malware, ect, is only for one purpose. Analytic marketing.
What are people doing, and how can we steer them thru our cattle runs. Where are they, what are they doing, and how can we make money off of this information?

That's all it is. Money!

They tried to have me "put to sleep" so I came back to return the favor.
Zom.
WGTR
International Hazard

Posts: 958
Registered: 29-9-2013
Location: Online
Member Is Offline

Mood: Outline

I have a question about general interest in a somewhat-related topic. I have been thinking of designing a hardware access control list for a network. Basically an ACL operates on layer 3 of the OSI model, and it allows one to limit access to or from a network based solely on IP address. Packets coming or going to IP addresses other than those which are allowed get dropped. Conceptually the design is simple, and can be done with stateless hardware.

Tor can be configured to go through certain entry nodes. These nodes can be programmed into an access control list, essentially blocking all network traffic except for that of the selected node. What this means, is that if malware or a browser extension attempts to access the internet outside of the selected Tor node (or a VPN, etc.), those packets never even make it out to the modem. Most expensive (and some inexpensive) routers have an ACL functionality built-in. However, what I am thinking of is a hardware solution that implements only the ACL. This would be an additional box that would be installed between the router and the modem.

Instead of a web interface, the ACL could be programmed directly at the box itself. This eliminates problems with web server exploits. The modular design, i.e., having the ACL physically separate from the hardware router, would greatly simplify both the design and the security auditing that would follow. Of course, the design would be open source.

The overall goal is to offer an internet safety net to those who feel the need to have one, a first line of defence of sorts. The device would be a brick upon arrival, unable to pass any network traffic until the ACL is programmed with selected IP addresses. The lack of a web interface, and the very simple software function implemented, allow hard coding of the design into FPGA fabric. Parties outside (or inside) the network could not hack into the ACL remotely and run code, because there would be no state machine to run it. The software should be simple enough for reasonably experienced parties to audit it. The fact that no single point failure (ACL in series with a router) would allow rogue traffic to pass the network would improve overall security. If someone wanted to access the 'net normally, all that would be needed would be to unplug the ACL box and bypass it manually.

So, am I explaining this well enough? Does it sound interesting, or perhaps like I'm smoking my socks?
Zombie
Forum Hillbilly

Posts: 1700
Registered: 13-1-2015
Location: Florida PanHandle
Member Is Offline

Mood: I just don't know...

This exists in software... PeerBlock. http://www.peerblock.com/

As you said the trick is in blocking all the known threat IP addresses. In reality, you don't know which ones to block until they are discovered so the bottom line is in blocking the entire "net", and only allowing known IPs to travel thru.

This creates new problems as many sites are "in bed" with the powers that be, and these sites will not function unless you allow the third party access at the same time.

It's a time consuming process to "fix" the issues. I've been avoiding the majority of eavesdroppers for decades but you can't beat them all. I give it up to "risk reduction" vs. risk proof.

Now if you came up with an automatic "Who Is" box oe software, that would help BUT again, these fellas aren't going under Super Sucker Inc. Washington D.C.
They go under Candy Corn, and Unicorn Logic Software Inc. Lakeside N.J.

It's a tough fight. Keep throwing the idea around... you never know what may develop

They tried to have me "put to sleep" so I came back to return the favor.
Zom.
Pages:  1  2    4

 Sciencemadness Discussion Board » Non-chemistry » Legal and Societal Issues » more frightening privacy stuff Select A Forum Fundamentals   » Chemistry in General   » Organic Chemistry   » Reagents and Apparatus Acquisition   » Beginnings   » Responsible Practices   » Miscellaneous   » The Wiki Special topics   » Technochemistry   » Energetic Materials   » Biochemistry   » Radiochemistry   » Computational Models and Techniques   » Prepublication Non-chemistry   » Forum Matters   » Legal and Societal Issues