LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 04-11-2017, 06:31 PM   #16
rob.rice
Senior Member
 
Registered: Apr 2004
Distribution: slack what ever
Posts: 1,076

Rep: Reputation: 205Reputation: 205Reputation: 205

this is a shinning example of what the U.S. government thinks about it's people
"we can screw them over anyway we want and they will still reelect us"
 
Old 04-11-2017, 07:04 PM   #17
cousinlucky
Member
 
Registered: Nov 2005
Location: Staten Island N.Y.
Distribution: Antix 16 and PCLinuxOS Mate
Posts: 303

Rep: Reputation: 515Reputation: 515Reputation: 515Reputation: 515Reputation: 515Reputation: 515
Quote:
Originally Posted by rob.rice View Post
this is a shinning example of what the U.S. government thinks about it's people
"we can screw them over anyway we want and they will still reelect us"
Unfortunately, that is very true!!
 
Old 04-11-2017, 07:20 PM   #18
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,640
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
"So, I guess that I must be 'in the minority,'" for having never(!) "logged on to FaceBook," in all these many years?

Frankly, in my opinion, we are all "simply waiting for the other shoe to drop." And, when it does, "it will be far bigger than '9/11' ever was."

"Yes, Virginia,™" when faced with any technological cliff, we wasted no time flinging ourselves across it. "Merely(!) because that we could!"

Just as we paid no attention whatsoever to those "maintenance crews" who expected access to WTC #1, #2, and(!) #7, today we seem to perceive "no act of war(!) at all" with regard to any "recent Internet possibilities."

Quote:
Originally Posted by Puck, 'A Midsummer Night's Dream':
"What fools these mortals be!"
 
Old 04-11-2017, 07:54 PM   #19
PrideOfUsingLinux
LQ Newbie
 
Registered: Apr 2017
Posts: 4

Rep: Reputation: Disabled
I seen VPN providers claim they don't log your activities, but we really can't know for sure. Any VPN can make claims like that to get your business. You need to have a strong gut feeling if their claims are valid.

As for free VPN's, don't put to much trust in them. There has to be a catch to the free service. VPNs are expensive to maintain to offer it completely free. They have to be compensated some how.

Last edited by PrideOfUsingLinux; 04-11-2017 at 08:37 PM.
 
Old 04-11-2017, 09:25 PM   #20
rob.rice
Senior Member
 
Registered: Apr 2004
Distribution: slack what ever
Posts: 1,076

Rep: Reputation: 205Reputation: 205Reputation: 205
Quote:
Originally Posted by PrideOfUsingLinux View Post
I seen VPN providers claim they don't log your activities, but we really can't know for sure. Any VPN can make claims like that to get your business. You need to have a strong gut feeling if their claims are valid.

As for free VPN's, don't put to much trust in them. There has to be a catch to the free service. VPNs are expensive to maintain to offer it completely free. They have to be compensated some how.
I saw something in the news that a VPN provider was hauled in to court over the web history of one of it's clients and they said we don't keep those records the law dose
not require us to
forget who forget when
think it might have something to do with pizza gate ????????????????
 
Old 04-11-2017, 09:56 PM   #21
PrideOfUsingLinux
LQ Newbie
 
Registered: Apr 2017
Posts: 4

Rep: Reputation: Disabled
Quote:
Originally Posted by rob.rice View Post
I saw something in the news that a VPN provider was hauled in to court over the web history of one of it's clients and they said we don't keep those records the law dose
not require us to
forget who forget when
think it might have something to do with pizza gate ????????????????
Unless you're a fly on the wall, you don't really know if a VPN provider will log and or sell your history.

It's hard to fight the privacy battle, when they have already won the war. :/

Last edited by PrideOfUsingLinux; 04-11-2017 at 09:58 PM.
 
Old 04-12-2017, 08:50 AM   #22
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,640
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
Right now, companies are IMHO rather infatuated with the amount of "information" they can get their hands on. There are not yet laws which call this "protected information," which is a pariah only in health-care where we do (in the USA) have the HIPAA Act:
Quote:
Originally Posted by Wikipedia:
The effective compliance date of the Privacy Rule was April 14, 2003, with a one-year extension for certain "small plans".

The HIPAA Privacy Rule regulates the use and disclosure of Protected Health Information (PHI) held by "covered entities" (generally, health care clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain transactions.) By regulation, the Department of Health and Human Services extended the HIPAA privacy rule to independent contractors of covered entities who fit within the definition of "business associates". PHI is any information held by a covered entity that concerns health status, provision of health care, or payment for health care that can be linked to an individual. This is interpreted rather broadly and includes any part of an individual's medical record or payment history. Covered entities must disclose PHI to the individual within 30 days upon request. They also must disclose PHI when required to do so by law such as reporting suspected child abuse to state child welfare agencies.

Covered entities may disclose protected health information to law enforcement officials for law enforcement purposes as required by law (including court orders, court-ordered warrants, subpoenas) and administrative requests; or to identify or locate a suspect, fugitive, material witness, or missing person.

A covered entity may not disclose PHI (Protected Health Information) to facilitate treatment, payment, or health care operations without a patient's express written authorization. Any other disclosures of PHI (Protected Health Information) require the covered entity to obtain written authorization from the individual for the disclosure. However, when a covered entity discloses any PHI, it must make a reasonable effort to disclose only the minimum necessary information required to achieve its purpose.

The Privacy Rule gives individuals the right to request that a covered entity correct any inaccurate PHI. It also requires covered entities to take reasonable steps to ensure the confidentiality of communications with individuals. For example, an individual can ask to be called at his or her work number instead of home or cell phone numbers.

The Privacy Rule requires covered entities to notify individuals of uses of their PHI. Covered entities must also keep track of disclosures of PHI and document privacy policies and procedures. They must appoint a Privacy Official and a contact person responsible for receiving complaints and train all members of their workforce in procedures regarding PHI.

An individual who believes that the Privacy Rule is not being upheld can file a complaint with the Department of Health and Human Services Office for Civil Rights (OCR). However, according to the Wall Street Journal, the OCR has a long backlog and ignores most complaints.
To date, this is the only significant Federal law (that I am aware of) which formally discusses "privacy." But, I think that the day is not too far off when the public (around the world) begins to demand and to receive protection for other forms of privacy, and most of all, accountability for how information may be used. For instance, there's no reason for a grocery store to demand personal information and to penalize you with a 30% hike in prices if you don't give it. Companies should not be allowed to read your e-mails and analyze them for content, even if they tender the messages and even if the messages are not encrypted. (They should be "protected speech.") The mere fact that it is technically possible to gather information does not mean that it should be gathered, much less disseminated, much less sold.

But it's going to take an Act of <Congress|Parliament> to make this happen. And that will only follow a determined public outcry that "what is happening right now is Not Okay With Us.™"

Last edited by sundialsvcs; 04-12-2017 at 08:51 AM.
 
Old 04-12-2017, 02:11 PM   #23
rob.rice
Senior Member
 
Registered: Apr 2004
Distribution: slack what ever
Posts: 1,076

Rep: Reputation: 205Reputation: 205Reputation: 205
Quote:
Originally Posted by PrideOfUsingLinux View Post
Unless you're a fly on the wall, you don't really know if a VPN provider will log and or sell your history.

It's hard to fight the privacy battle, when they have already won the war. :/
it's not just VPNs it's your own O/S that may have a backdoor in it YES LINUX

don't forget a government contractor is an extension of the government
consider the source of systemd Red Hat a government contractor who will do anything if the price is right
now if congress will so blatantly sell us out and spy on us anyway they can why dose damn near every body assume that the government would not have one of there employees ( Red Hat ) install a backdoor in linux it would be so easy to hide a back door in something like systemd with out doing extreme things like building up an array of machine code then executing it IF nobody is looking for a backdoor then that's who will find the backdoor well the same person who is looking for it nobody

even things like mounting the system BIOS firmware didn't raise a red flag isn't anybody else asking why on earth would systemd bypass the kernel to access the BIOS every thing the BIOS can do has been replaced by a kernel function
the bottom line is
If you can't trust the government you can't trust it's contractors including RedHat

Last edited by rob.rice; 04-12-2017 at 02:42 PM.
 
Old 04-12-2017, 02:38 PM   #24
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,640
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
Personally, I wouldn't "finger" Red Hat, nor "systemd." This source-code is examined pretty closely.

Nevertheless, right now we live in a "surveillance state" the likes of which George Orwell could not have dreamed of. In spite of Apple's famous (Macintosh introduction) ad, in which Apple promised that "1984 won't be like 1984," thirty-three years later we see that it is actually much worse, and there's no doubt that the Macintosh is every bit as much an instrument of "surveillance" as any of the other toys we use – our cars, our phones, our thermostats, even our refrigerators.

So far, in the United States we have passed almost no laws regarding privacy, relying only on executive policies handed down by bureaucrats in various departments. No one, anywhere, is minding the store. No one, anywhere, is clearly thinking this thing through. No one seems to find anything (desperately ...) wrong with allowing personally identifiable information – of any and of every(!) sort – to be covertly collected (just because we can), and then used absolutely anywhere and perhaps sold to anyone. "There's just so goddamned much money to be made ..."

But we will one day rue these days, and curse ourselves for our collective stupidity, ignorance, and hubris.
 
Old 04-12-2017, 04:29 PM   #25
rob.rice
Senior Member
 
Registered: Apr 2004
Distribution: slack what ever
Posts: 1,076

Rep: Reputation: 205Reputation: 205Reputation: 205
Quote:
Originally Posted by sundialsvcs View Post
Personally, I wouldn't "finger" Red Hat, nor "systemd." This source-code is examined pretty closely.
.
You may not finger Red Hat but I do why there a government contractor part of the problem not part of the solution

Who is looking at the systemd source code and what are they looking for ?
they would have to be backdoor hunting to find it even then IT could still be hidden

check out http://www.ioccc.org/ then ask your self what could these guys hide in 10 million lines of code just one line of programming nonsense here and there ... ... adds up to a wide open Swiss cheese program (full of holes)

just because something is open source doesn't mean there is nothing hidden in it
all it means is if there is something hidden it has to be well hidden

dudes I even found a 10 line bash script that installs a backdoor on the system using holes in systemd is that close enough to having a backdoor in systemd to raise
an alarm about the security of systemd

I'm sure posting a link to that script would get me banned from this forum
Sorry guys I can't post it

Last edited by rob.rice; 04-12-2017 at 05:41 PM.
 
Old 04-12-2017, 06:26 PM   #26
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,640
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
Then you should switch back to init and consider your problems to be over.

Seriously, yes there have been security vulnerabilities discovered – including the not-exactly-secret one you refer to – and I would argue that, "anytime you think there aren't security holes all the time in the software that you use, you're not looking hard enough." We all rely on "white hat" people who make it their business to constantly look for vulnerabilities and to patch them.

Speculation about "government contractors" who are conspiring to do bad things and to cover them up is just that – speculation. We need systems that we can use.

- - - -

The basic problem in the US today is that we do not yet have an "[Internet or otherwise ...] Privacy Law." An administrative ruling by the FCC, etc., is not the same as an Act of Congress.

Last edited by sundialsvcs; 04-12-2017 at 06:28 PM.
 
Old 04-12-2017, 11:49 PM   #27
rob.rice
Senior Member
 
Registered: Apr 2004
Distribution: slack what ever
Posts: 1,076

Rep: Reputation: 205Reputation: 205Reputation: 205
what good would privacy laws do when we have a lawless government that has private contractors distributing trojan horses as init systems

dude I deal with the illegal side of one government contractor every day



I run slack still systemd free

BTW this is a working system
what we don't need is our computers spying on us for the U.S. government

Last edited by rob.rice; 04-12-2017 at 11:55 PM.
 
Old 04-13-2017, 12:32 AM   #28
PrideOfUsingLinux
LQ Newbie
 
Registered: Apr 2017
Posts: 4

Rep: Reputation: Disabled
Quote:
Originally Posted by rob.rice View Post
it's not just VPNs it's your own O/S that may have a backdoor in it YES LINUX

don't forget a government contractor is an extension of the government
consider the source of systemd Red Hat a government contractor who will do anything if the price is right
now if congress will so blatantly sell us out and spy on us anyway they can why dose damn near every body assume that the government would not have one of there employees ( Red Hat ) install a backdoor in linux it would be so easy to hide a back door in something like systemd with out doing extreme things like building up an array of machine code then executing it IF nobody is looking for a backdoor then that's who will find the backdoor well the same person who is looking for it nobody

even things like mounting the system BIOS firmware didn't raise a red flag isn't anybody else asking why on earth would systemd bypass the kernel to access the BIOS every thing the BIOS can do has been replaced by a kernel function
the bottom line is
If you can't trust the government you can't trust it's contractors including RedHat
That's way I don't use commercial enterprise distros like redhat/SUSE or others like them.

As for systemd, I'm not to familiar with it. I still use an init based distro. BTW, outside of systemd, I thought it was SELinux that we were supposed to be worried about of a potential backdoor as the NSA has contributed to the project.

Not to mention, hardware can have backdoors too. I remember reading about the NSA putting backdoor code on hard drive's firmware that were shipped to Europe. I'm not sure if it was done for here too, I don't remember all the specifics.

Lastly, I wouldn't be surprise if all mobile phones have a secret backdoor as well.

Last edited by PrideOfUsingLinux; 04-13-2017 at 12:34 AM.
 
Old 04-13-2017, 09:23 AM   #29
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,640
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
There are back doors in the microcode of Intel processors.

You'd better just assume that information can be prized from you without your knowledge or consent.

In the meantime: put your e-mail in encrypted envelopes. Yes, they can be steamed open. But still, the envelope is there. Likewise, use VPN in coffee shops, and don't allow your computer to share anything.

Even though there is, and no doubt always will be, very clever back-door eavesdroppers, I submit that most of what you should be looking out for is simply crimes of opportunity. The pizza-burglar twists the knob, and the door is open and the alarm is off. Gigabytes of e-mail traffic are passing through my server, and none of it is encrypted, and there are no laws which say I can't analyze it and sell the data. (Yet.)

A good friend of mine kept an expensive guitar in a cardboard case secured with the flimsiest lock available. It was, he said, "to keep the honest people out."

Good point.

If you take even the slightest effort to make your communications "less than trivially available," and if you are not the target of some criminal investigation because you are not engaging in a crime, then why would the 'perps' waste their time with you when there's so much "easy pickin's?"

Last edited by sundialsvcs; 04-13-2017 at 09:25 AM.
 
Old 04-13-2017, 10:47 AM   #30
Jeebizz
Senior Member
 
Registered: May 2004
Distribution: Slackware15.0 64-Bit Desktop, Debian 11 non-free Toshiba Satellite Notebook
Posts: 4,180

Original Poster
Rep: Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377Reputation: 1377
The Humanist Report - FCC Chairman's Shady Plan to Kill Net Neutrality to be Announced VERY Soon
Quote:
Published on Apr 12, 2017

FCC Chairman Ajit Pai made it very clear that he plans on rolling back the FCC's net neutrality laws, and is set to unveil his official plans as early as May or June. He's given telecom trade associations some details about his new plan, and it's incredibly shady to say the least. Pai plans to kill net neutrality by undercutting it in two ways: (1) giving the FTC the authority to enforce net neutrality laws (they won't), and (2) undoing its reclassification as a Title II utility. In short, he's giving Americans something very different than what he's selling it as in an Orwellian manner. In this segment we discuss how you can take action to put pressure on the FCC ahead of his upcoming announcement.

Net Neutrality Assault Beings on May: http://www.theverge.com/2017/4/7/152...source=twitter

Comcast Sells Customer’s Personal Information: http://forums.xfinity.com/t5/Custome...on/td-p/926807

WaPo Publishes FCC Chairman’s Propaganda Piece: https://www.washingtonpost.com/opini...=.7a7acd31118f

Stop Ajit Pai: http://www.humanistreport.com/-savetheinternet.html
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Canonical “abused trademark law” to target a site critical of Ubuntu privacy LXer Syndicated Linux News 0 11-08-2013 05:51 AM
Google in breach of privacy law Jeebizz Linux - News 0 10-19-2010 11:53 AM
LXer: Internet Censorship in the US? Or Just Law Enforcement? LXer Syndicated Linux News 0 05-01-2009 04:41 PM
LXer: The Internet May Eventually Be Scrapped LXer Syndicated Linux News 0 04-14-2007 04:16 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 10:10 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration