Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Leaked NSA Software

Name: Anonymous 2013-08-27 6:02

https://encyclopediadramatica.se/PRISM#Parabon_Leaks
https://mega.co.nz/#F!00xx1QjA!G1kBmCk0C5Qo8H8kZ-Qhjg!dxxxXCQJ

It can easily hack HTTPS/SSL. They key encryption software is rendered as useless garbage. You have been warned. All online banking is now over. The Internet as we know it, is now over.

Expect the media to ignore it for a few weeks, while the governments start WW3 and use it to justify taking down the Internet.

Name: Anonymous 2013-08-27 23:25

>>40
alternatively, create a darknet or sneakernet for only those you trust

my high school had a sneakernet and it was great

no need to worry about MITM attacks when none of the data transfers were done on a network

Name: Anonymous 2013-08-28 0:05

>>41
Doesn't that just mean the MITM attacks are more literal?

Name: Anonymous 2013-08-28 0:51

apt-get remove --purge ca-certificates

I triple nigger dare you.

Name: Anonymous 2013-08-28 2:04

>>42
not if you're careful about who you trust
plus, it's easier for the government to take over a server than an individual person

>>43
your package manager sucks

Name: Anonymous 2013-08-28 2:23

>>44
It's not so easy. You have to be careful about who you trust, but you have to make sure the people you trust are also careful about the people they trust, etc etc. Redundancy would be good to have.

Name: Anonymous 2013-08-28 2:41

what we need is a distributed mapping:

domain name -> public key

link in to the network using someone with a verified public key. Get as many links in as you can. Then everyone shares the mapping.

Conflicting assignments may crop up. Some people may be compromised, or some members may be corrupt. The important thing is to have enough trusted connectivity so these conflicts are exposed. But once a conflict is exposed, how do you deal with it? Do you trust the nodes with closer trusted links to the domain name owner? Or would there be a case where another group is more trustworthy? What if the domain owner is compromised? What kinds of attacks should this resist?

Name: Anonymous 2013-08-28 7:47

>>46
stand back, people, someone just invented web of trust!

Name: Anonymous 2013-08-29 3:13

In 1998, "Assange co-founded his first and only Australian company, Earthmen Technology".[41] Assange was characterised as a "cryptographer" in a Suelette Dreyfus article published in The Independent, 15 November 1999 – "This is just between us (and the spies)", and was said to have been the moderator of "the online Australian discussion forum AUCRYPTO", and during this time Assange claimed to have found a new patent relating to the US National Security Agency's technology for monitoring calls, "while investigating NSA capabilities". Assange said that "this patent should worry people. Everyone's overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency".[79] In 1999, he registered the domain leaks.org, but he says he "didn't do anything with it."[80]

http://www.theaustralian.com.au/in-depth/wikileaks/julian-assange-wild-child-of-free-speech/story-fn775xjq-1225969230839
http://pandora.nla.gov.au/pan/39152/20040206-0000/www.agitprop.org.au/stopnato/1999111608.htm
http://www.theage.com.au/national/keeper-of-secrets-20100521-w230.html

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List