GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hmm, I see. That would be more like something from the Ministry of Love in 1984. Torture you until you are convinced that you love Big Brother. And later, they'll whack you in whatever way they find creative.
Exactly. But use drugs, sensory deprivation, and other subtle means, rather than physical methods to elicit a confession. Plausible deniability. "We don't use torture. We are a democracy. He/she confessed freely because his/her conscience was troubled. We are concerned because he/she now shows suicidal tendencies."
Then, days later, it's in the media that whatstheirname, serving 30 years for terrorist offenses, has committed suicide while working on the prison farm by jumping into a woodchipper.
I like to think that my new computer is completely safe as it will never find a complete connection to the internet. It doesn't have either an rj45 or rj11 port on it, and will the computer in which I will be learning to program on and probably end up learning to code viruses and other attack forces on.
But I'm sure some how they will find a way on to it.
At least they are good kids and believe in sharing:
The strategy will allow French, German and other EU forces to ask British officers to hack into someone’s UK computer and pass over any material gleaned.
(from timesonline)
Observe the 'forces' part - used to be courts.
Last edited by crashmeister; 01-07-2009 at 01:59 AM.
Then, days later, it's in the media that whatstheirname, serving 30 years for terrorist offenses, has committed suicide while working on the prison farm by jumping into a woodchipper.
Yeah, I hear that a lot from the media. Indeed, that's probably what happens to them. Many times it's a transportation-related accident ... I guess for the ones that must be done away with quickly.
But wouldn't it be more fun just to take those accused of a crime ... call them terrorists ... put them in a camp (this was done in New York in the warehouses sometime after 9/11) and whatever happens in Vegas stays in Vegas. Then they can write in the news whatever they want. Easier, simpler, funner.
But wouldn't it be more fun just to take those accused of a crime ... call them terrorists ... put them in a camp...[snip] ...and whatever happens in Vegas stays in Vegas...
Good luck with that and don't go for the soap on the floor in the shower.....
Blacklist the NSA, your machine will not respond to there servers.
And the NSA as no right to search my machine, in Canada you need a warrant to do anything, so there still fair game!
You can't 'blacklist the NSA' and friends.They tap directly into satellite and cable connections.How stupid do think those people are?
Officially they only search what passes thru the US which includes a lot since it might be routed thru the US.
Besides they monitor almost anything half-officially.On whose authority I dunno but nobody sued them so far...
This reminds me of that book by George Orwell - 1984 with the government known was Big Brother. However one interesting thing that could be done is to setup an infected computer and open ports to that computer where they could potentially infect themselves.
You can't 'blacklist the NSA' and friends.They tap directly into satellite and cable connections.How stupid do think those people are?
Officially they only search what passes thru the US which includes a lot since it might be routed thru the US.
Besides they monitor almost anything half-officially.On whose authority I dunno but nobody sued them so far...
Keep in mind nothing is 100% secure, nothing is 100% fool proof
Use the web on a remote and I mean very remote setup, get 10 or 20 shell accounts and through every one of them use SSH (using a 4096bit DSA/RSA key) I want to see them break that on the fly and I want them to tell me how I obtained the information if every box has a different key there is no way in hell they can tell me what I am accessing, it's not possible it would take them multiple half lives of the universe just to decipher the data never mind doing anything about it. They may be able to tell what the last box is accessing because the internet itself is not encrypted but they have no way of telling where the data goes from there and since they have no way to do this they have already lost.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.