When I try to access the website of our national postal-service I get a SSL-warning, because the certificate belongs to the Norwegian national...
Please close this stupid thread .
What country-flags ?? I'm not using some 'fancy' newbee GUI-traceroute app . I see the IP's of the hops my packets take and look them up in...
Not for ANYTHING that can be linked to your real identity .. Does it contain a SSN ? FORGET about using TOR . Does it contain a e-mail address...
The TC-documentation is 'horrible' ? Name me ONE other free program that comes with a 150 page manual ! Are you ****ing kidding ?? Besides :...
In reality, there is no difference between the 3 ! You don't get to write IP-law, steal others inventions and pass them as your own, OR become...
http://seclists.org/bugtraq/2005/May/322 http://it.slashdot.org/story/10/01/19/0147239/d-link-warns-of-vulnerable-routers Don't be naive, it...
Your post nails the problems of using encrypted mail pretty well .. Most 'normal' private citizens consider it to complicated and not worth the...
If the NSA really wants to listen on a VPN the will simply route the traffic so everything passes one of their servers .. And if your VPN only...
So, you are p2p'ing over TOR ?
Remember the Zone-Alarm scandal ? http://www.wilderssecurity.com/showthread.php?t=116345 Check Point Software Technologies Ltd, who owns/develops...
And since TLA's can monitor 'both ends of the conversation', unlike most other criminal crackers, it may be more than difficult to remain...
So, networking was available while you installed windows ?
If you are a 'EU-citizen' and want a passport, you get finger-printed .. If you want to enter the United States, you get finger-printed ......
I am flabbergasted by the lack of comments ! Did y'all already know this ? What it really means is : PKI has a PATENTED !! backdoor ! Apple...
United States Patent 7,734,048 The "invention" (SIC!!) is a cryptographic system using chaotic dynamics. A chaotic system is used to generate a...
Yes, it does . You may want to research a bit on how intel(ligence) and all the other transnational corporations operate and where they hire the...
http://www.intel.com/content/www/us/en/enterprise-security/3rd-gen-core-vpro-data-protection-paper.html No matter how intel(ligence)(c)(R)(TM)...
It used to be called 'IBM-PC', not 'Windblows-PC' .. Introduced in 1985 and it does not have windblows-key :...
Here's what most VPN's do : Some also do this : The reason they do it ? Certificate-management is time-consuming and costs money. Much...
That is EXACTLY the FUD they hope people will believe ! If encryption was to be useless, they wouldn't need to 'back-door' the hardware, would...
That is really not good advice..
Exactly what does that mean ? Note that it says 'remotely unlock' NOT 'bypass' ! This would in fact be a good thing, because it would allow to...
He didn't clarify a damn thing and the idea that M$ would admit to it and patch it is just laughable . They will do exactly what the US...
'Become a secret hacker in the military intelligence. Military Intelligence seeks warriors for digital battle-fields ' Required qualifications :...
Separate names with a comma.