What's new
  • As of today ICMag has his own Discord server. In this Discord server you can chat, talk with eachother, listen to music, share stories and pictures...and much more. Join now and let's grow together! Join ICMag Discord here! More details in this thread here: here.

The SNOWDEN Saga continues...

Skinny Leaf

Well-known member
Veteran
One Fox News report says as much as 5 zettabytes — 1 zettabyte = 1 billion terabytes = 1 trillion gigabytes — and with just 1 zettabyte (1024 exabytes) of space, the NSA can store a year's worth of the global Internet traffic (which is estimated reached 966 exabytes per year in 2015).
 

vta

Active member
Veteran
q82K7nDxCV.jpg



Sen. Rand Paul to File Class-Action Lawsuit over NSA Spying

(WASHINGTON) -- Sen. Rand Paul, R-Ky., will file a class-action lawsuit against President Barack Obama and National Intelligence Director James Clapper over the collection of private data regarding American citizens.

Paul's communications director, Sergio Gor, confirmed that the suit will be filed in Washington, D.C. District Court as an individual and not as a U.S. Senator. On Friday, Paul said that as many as 300,000 people have indicated that they would sign onto the lawsuit once it is filed in court.

New York Magazine reports that Paul's legal team is constructing a complaint that argues that the searches violate the fourth amendment rights of American citizens.

Other than targeting Obama, it is unclear how different Paul's lawsuit would be from another case against the NSA's data collecting project, brought forward by Larry Klayman. In that case, U.S. District Court Judge Richard Leon sided with the complainants and ruled the NSA's program unconstitutional.

The U.S. Justice Department appealed Leon's ruling earlier this week.
 

trichrider

Kiss My Ring
Veteran
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.

When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.

Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

A 50-Page Catalog

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.


http://www.spiegel.de/international...a-940994.html#spRedirectedFrom=www&referrrer=
 

trichrider

Kiss My Ring
Veteran
there's a conspiracy to make the theorists out as insane.
conspiracy theorist is used to denigrate anyone who actually examine issues closely and finds the truth out.
anyone who calls you a conspiracy theorist is trying to shout louder to detract from your position/perception whether or not they actually have a rebuttal is irrelevant.
from small minds come small solutions.

puff puff pass
 

CannaBunkerMan

Enormous Member
Veteran
At least open-source is, by it's nature, peer reviewed. Even if the NSA could modify a code base for nefarious means, it would be detected by the 1% who care about such things, who will in turn inform the rest of us that something doesn't look right. We need open source encryption software. Actually, it doesn't really matter for the case of encryption, since quantum computing will be able to crack any current day encryption methods when the technology matures.
 

gaiusmarius

me
Veteran
not sure about saving the planet and all that, but we can have dgital privacy if thats what you are talking about. there are many folks working on total internet privacy. there is a company in Switz. making a small home server, that will encrypt all traffic to the highest level, generating a new password for every session. this plug and play box makes you totally invisible on the internet as it includes a list of servers in certain countries that are used for your connection. it's called the enigma box. more and more companies are looking for ways to keep their communications private.
 

gaiusmarius

me
Veteran
At least open-source is, by it's nature, peer reviewed. Even if the NSA could modify a code base for nefarious means, it would be detected by the 1% who care about such things, who will in turn inform the rest of us that something doesn't look right. We need open source encryption software. Actually, it doesn't really matter for the case of encryption, since quantum computing will be able to crack any current day encryption methods when the technology matures.

the thing about the super computer that will bust open all encryption is just a bluff. there is no way they can read and dis-encrypt every thing all over all the time. they will have to choose their targets as the super computer uses power like a major city. so yeah it's much better for them to use back doors as that allows reading everything in real time. the encrypted stuff is mostly just stored. the more people encrypt everything they can the better as it makes the sea bigger making the individual fish harder to spy on.

the best encryption generates new password keys for every single session, making it useless to bust as each session will need to be rebusted.
 

Gumanitary

Member
No guys, using open-source software or private software isn't enough for good privacy. It should be an open source ideology.
Snowden alluded to the fact that not OSes' backdoors are main trouble but backdoors in low-level code which we still call BIOS. This proprietary code is fully closed and no one can tell what it actually do (i.e. how it actually creates RND values). And it is easier to control cause very few companies are the real producers of the hardware.
 

devilgoob

Active member
Veteran
Saying a "Conspiracy Theorist" is insane, doesn't change reality.

I would like for people to observe things for what they are - and not judge them from who they come from.

Your computer security has been nullified exponentially since OCT 26 2001.

Judge those statements based on the person only, and it doesn't work. You would say I am paranoid. Now you have the truth, now I am "not paranoid."

Frequently the government inserts it agents into places they believe to have influence, then they go ahead and plot out to make the leader look like he was cooperating with the government. I can see this as "not so evil", as it is just piggish application of law to control people, and people believing other's freedoms threaten theirs. FREEDOM IS ACSHULLY SLAVERY.
 

gaiusmarius

me
Veteran
No guys, using open-source software or private software isn't enough for good privacy. It should be an open source ideology.
Snowden alluded to the fact that not OSes' backdoors are main trouble but backdoors in low-level code which we still call BIOS. This proprietary code is fully closed and no one can tell what it actually do (i.e. how it actually creates RND values). And it is easier to control cause very few companies are the real producers of the hardware.

are you saying certain components used to create the computer in the first place have this proprietary code? so even if you run linux the machine is most likely compromised just by the pieces used to make the device? can you elaborate more about this or link us to more info. been wondering for a while if there is such a thing as a safe computer made only with the customers interests at heart? but just like this thing i was mentioning above, people will create open source computers using clean components sooner or later, i bet it's being worked on as we speak.
 

Gumanitary

Member
Yes. It was in discussed in Russian computer press concerning to Snowden case, and I have no link now.
people will create open source computers using clean components sooner or later
Even now U should remember about linux ppl struggle against nvidia corp. because of nviidia's drivers.
So there's no difference between windows, Mac, linux (and android also) if they just run over low-level proprietary core code of our PC's, tablets, smartphones, etc.
For example, this is the only reason for prohibition of usage China-made PC's in goverment offices in US and UK, though there's only china bios, all the other soft could be installed over later.
 

Latest posts

Latest posts

Top