Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Leaked NSA Software

Name: Anonymous 2013-08-27 6:02

https://encyclopediadramatica.se/PRISM#Parabon_Leaks
https://mega.co.nz/#F!00xx1QjA!G1kBmCk0C5Qo8H8kZ-Qhjg!dxxxXCQJ

It can easily hack HTTPS/SSL. They key encryption software is rendered as useless garbage. You have been warned. All online banking is now over. The Internet as we know it, is now over.

Expect the media to ignore it for a few weeks, while the governments start WW3 and use it to justify taking down the Internet.

Name: Anonymous 2013-08-28 2:41

what we need is a distributed mapping:

domain name -> public key

link in to the network using someone with a verified public key. Get as many links in as you can. Then everyone shares the mapping.

Conflicting assignments may crop up. Some people may be compromised, or some members may be corrupt. The important thing is to have enough trusted connectivity so these conflicts are exposed. But once a conflict is exposed, how do you deal with it? Do you trust the nodes with closer trusted links to the domain name owner? Or would there be a case where another group is more trustworthy? What if the domain owner is compromised? What kinds of attacks should this resist?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List