Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

21
posted 3 years ago by StayForTheEmpathy 3 years ago by StayForTheEmpathy +22 / -1
16 comments share
16 comments share save hide report block hide replies
Comments (16)
sorted by:
▲ 5 ▼
– Snailracer 5 points 3 years ago +5 / -0

They copy every packet, that's how they broke TOR when they took down Silk Road. Theoretically you can encrypt stuff that they can't decode, but they still know where it came from and where it went to.

permalink save report block reply
▲ 3 ▼
– IGOexiled 3 points 3 years ago +3 / -0

Fortunately, the crypto market created massive incentive to build factories that produce chips designed solely for brute-forcing encryption.

permalink parent save report block reply
▲ 1 ▼
– Snailracer 1 point 3 years ago +1 / -0

If it's even theoretically possible to brute force decode some encryption, then the NSA can use quantum computers to instantly break it. It's like time travel for computer code.

permalink parent save report block reply
▲ 1 ▼
– nautica 1 point 3 years ago +1 / -0

For that not happening I have an easy solution. I have not published it since 2006 when I discovered it. The task is that they do not know who is sending what to whom. A hint; Cascading encription with at least 2 post offices.

permalink parent save report block reply
▲ 4 ▼
– CrazyRussian 4 points 3 years ago +4 / -0

There can't be third-party privacy services. If a privacy service is not your own, it can't be private and have no sense.

Switch to p2p decentralized tech if you can't rise your own privacy services.

permalink save report block reply
▲ 4 ▼
– alltheleavesarebrown 4 points 3 years ago +4 / -0

As someone capable of using keystroke logger to get my gf's emale pass (holy fuck. She really did get a private meetup with team poppa.)...I just dont want my landlady reading my email...etc.

Of course the agency sees all traffic.

That was obvious the first time i logged into aol back when nixon was president.

Ive been in an AT&T room where the guy pointed to a closet of hardware and said, all the area traffic goes through here.

permalink save report block reply
▲ 3 ▼
– no_ez 3 points 3 years ago +8 / -5

The internet is a DARPA project, everything is recorded and attached to a digital avatar, AI, that walks talks looks sounds and acts like you. There is no need to keep a “dossier” of everyone. You can actually talk to it and ask it questions like a regular human clone in a digital space.

permalink save report block reply
▲ 3 ▼
– brahbruh 3 points 3 years ago +3 / -0

Wut.

permalink parent save report block reply
▲ 3 ▼
– deleted 3 points 3 years ago +3 / -0
▲ 1 ▼
– no_ez 1 point 3 years ago +6 / -5

This Article is just the tip of the iceberg fam: https://futurism.com/the-byte/google-company-voodoo-doll-avatar

permalink parent save report block reply
▲ 3 ▼
– no_ez 3 points 3 years ago +7 / -4

And Here’s how it knows how you walk: https://www.thesun.co.uk/tech/17517616/iphone-walking-steadiness-asymmetry/

permalink parent save report block reply
▲ 6 ▼
– alltheleavesarebrown 6 points 3 years ago +6 / -0

More reason to leave it at home and take side streets through the parque.

The corps have been doing 3d holographic teleconferencing in special rooms for at least ten years.

permalink parent save report block reply
▲ 1 ▼
– brahbruh 1 point 3 years ago +1 / -0

Interesting / terrifying. Thanks for linking me to these articles! I mean, even though DARPA started the Internet I never considered that they did it for a very specific reason.

permalink parent save report block reply
▲ 2 ▼
– deleted 2 points 3 years ago +2 / -0
▲ 2 ▼
– Phlow 2 points 3 years ago +3 / -1

And anything based on whispersystems is garbage, including telegram.

permalink save report block reply
▲ 2 ▼
– Blinker-Aerospace7 2 points 3 years ago +2 / -0

Can an entity not claim "Look at our source code and see for yourself" while at the same time run code that is altered slightly to spy on its users.

The idea here is typically client vs server

You run the open source client code, which handles the encryption, then pass it to the server (which purports to be the same as the open source code that is published) which essentially just acts as a coordinator / message passer. Very high level.

Of course, there are ways this breaks down:

  1. Server code is not the same as the open source code, and has been altered to either keep more logging (where and when messages are going, but not necessarily whats in them), or store messages for later attempts at breaking the encryption
  2. The client code is not actually the open source code, in the case that it came from a marketplace of some sort and depending on if/how it was signed/hashed
  3. Operating system - I'm assuming you're running the app on some sort of device with an OS

There are ways to secure against some or all of these, but each step takes more effort, usually for both the sender and receiver (i.e. sending messages as encrypted attachments, using relays/proxies, etc)

And, in general, just assume that these things are happening and act accordingly

permalink save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No excessive, unnecessary and/or bullying "meta" posts.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
Message the Moderators

Terms of Service | Privacy Policy

2025.03.01 - qpl2q (status)

Copyright © 2024.

Terms of Service | Privacy Policy