NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    The NSA Will Destroy the Bulk Phone Records It Collected

    -- Tom
     
  2. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    The problem here is can we believe them.

    So the solution to keeping the data is to file a secret lawsuit against themself in their secret FISA court.
     
  3. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    EXCLUSIVE: Edward Snowden Explains Why Apple Should Continue To Fight the Government on Encryption
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  6. Justintime123

    Justintime123 Registered Member

    Joined:
    Jun 15, 2013
    Posts:
    99
    Plugging Leaks: Merkel's War on Germany's Press and Parliament
    ...More
     
    Last edited by a moderator: Aug 9, 2015
  7. Snoop3

    Snoop3 Registered Member

    Joined:
    Jan 2, 2011
    Posts:
    474
    Last edited: Aug 9, 2015
  8. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Last edited: Aug 12, 2015
  9. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    https://gist.github.com/mnot/382aca0b23b6bf082116

    Nice to see:
     
    Last edited by a moderator: Aug 15, 2015
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  11. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    The network is hostile dated Sunday, August 16, 2015 by Matthew Green, a cryptographer and professor at Johns Hopkins University.

    -- Tom
     
  12. Excellent article by Mathew Green. I recommend everyone read it.
     
  13. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    If you even need to put the final nail in the coffin of the notion "if you've got nothing to hide, you've got nothing to fear", the admission of pre-crime placement on the no-fly list should do the job:

    http://www.theguardian.com/us-news/2015/aug/10/us-no-fly-list-predictive-assessments

    This MUST be based on algorithmic assessment based on the "full take" collection by NSA and data mining, with at most, a tick-box by a bored operator, and hey presto, you're on the list. No articulable evidence, probable cause (the justice department says it uses "reasonable suspicion"), and there has only recently been, since March, a process by which people are informed of it and have some kind of redress or ability to appeal). They are only just having to justify the algorithms or it's ratings to a judge to know if they're even remotely accurate,

    According to the Wikipedia article on no-fly, the list is now up to 50,000 or so, growing rapidly.
     
    Last edited: Aug 20, 2015
  14. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  15. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    23,933
    Location:
    UK
  16. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    The Way GCHQ Obliterated The Guardian’s Laptops May Have Revealed More Than It Intended
     
  17. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/
     
    Last edited: Sep 28, 2015
  18. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
  19. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Hey, nothing to hide ;)
     
  20. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  21. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    Very informative read. I really want to drive over to family members' homes and setup their networks to take them off the grid in many ways. I have found that desire to be a waste of time. Even though they know it is happening they just don't seem to care. At least not enough to even attempt any couter-measures.

    Personally I sort of live a double life (not in a bad way). I don't even attempt to hide my banking, social stuff, and real name email from high level backbone snoops. I only use my Android for "clean" stuff that I would look at in front of my Grandma. LOL! In fact I consider my OPEN real name activity as a counter measure of sorts. By conducting "that part" of my internet life so openly my hope is to deflect any attention and send "them" along to find a more interesting subject. What I do out in the open makes me look like a conforming "average joe". Then the other side grabs a totally different machine and its full lockdown with linux and 5 hops to the exit node. Seriously, I am smart enough to never mix the personna of those two type users.
     
  22. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Same here :)
     
  23. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    That's correct, seemingly there is "nothing to see, move along..." which seems to be the desired mainstream media stance nowadays.
     
  24. Paranoid Eye

    Paranoid Eye Registered Member

    Joined:
    Dec 15, 2013
    Posts:
    175
    Location:
    io
    All those tracking issues from exploited cookies !

    Always a good time to tweak and secure your browser while under a VPN naturally
     
  25. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    Self-destructing cookies is great add-on to prevent this from happening
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.