[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

The INCREDIBLE Impacts of Methylene Blue

The LARGEST Eruptions since the Merapi Disaster in 2010 at Lewotobi Laki Laki in Indonesia

Feds ARREST 11 Leftists For AMBUSH On ICE, 2 Cops Shot, Organized Terror Cell Targeted ICE In Texas

What is quantum computing?

12 Important Questions We Should Be Asking About The Cover Up The Truth About Jeffrey Epstein

TSA quietly scraps security check that every passenger dreads

Iran Receives Emergency Airlift of Chinese Air Defence Systems as Israel Considers New Attacks

Russia reportedly used its new, inexpensive Chernika kamikaze drone in the Ukraine

Iran's President Says the US Pledged Israel Wouldn't Attack During Previous Nuclear Negotiations

Will Japan's Rice Price Shock Lead To Government Collapse And Spark A Global Bond Crisis

Beware The 'Omniwar': Catherine Austin Fitts Fears 'Weaponization Of Everything'

Roger Stone: AG Pam Bondi Must Answer For 14 Terabytes Claim Of Child Torture Videos!

'Hit Us, Please' - America's Left Issues A 'Broken Arrow' Signal To Europe

Cash Jordan Trump Deports ‘Thousands of Migrants’ to Africa… on Purpose

Gunman Ambushes Border Patrol Agents In Texas Amid Anti-ICE Rhetoric From Democrats

Texas Flood

Why America Built A Forest From Canada To Texas

Tucker Carlson Interviews President of Iran Mosoud Pezeshkian

PROOF Netanyahu Wants US To Fight His Wars

RAPID CRUSTAL MOVEMENT DETECTED- Are the Unusual Earthquakes TRIGGER for MORE (in Japan and Italy) ?

Google Bets Big On Nuclear Fusion

Iran sets a world record by deporting 300,000 illegal refugees in 14 days

Brazilian Women Soccer Players (in Bikinis) Incredible Skills

Watch: Mexico City Protest Against American Ex-Pat 'Invasion' Turns Viole

Kazakhstan Just BETRAYED Russia - Takes gunpowder out of Putin’s Hands

Why CNN & Fareed Zakaria are Wrong About Iran and Trump

Something Is Going Deeply WRONG In Russia

329 Rivers in China Exceed Flood Warnings, With 75,000 Dams in Critical Condition

Command Of Russian Army 'Undermined' After 16 Of Putin's Generals Killed At War, UK Says

Rickards: Superintelligence Will Never Arrive


Science/Tech
See other Science/Tech Articles

Title: Why Bush's NSA Wire tapping is defeated by VoIP Networks
Source: [None]
URL Source: http://video.google.com/videoplay?d ... 8493098426180726284&pr=goog-sl
Published: Oct 23, 2006
Author: ???
Post Date: 2006-10-23 00:09:06 by Neil McIver
Keywords: None
Views: 336
Comments: 17

http://video.google.com/videoplay?docid=-8493098426180726284&pr=goog-sl

Good listen. About 13 minutes long.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 10.

#2. To: Neil McIver, Tauzero, Jethro Tull, lodwick, christine, Esso, angle, bluegrass, Eoghan, Mekons4, BTP Holdings, SKYDRIFTER, Dakmar, Horse, Max, ladybug, mirage, randge, bluedogtxn, Red Jones, RickyJ, loner (#0)

Great explanation of VoIP.

robin  posted on  2006-10-23   1:20:12 ET  Reply   Untrace   Trace   Private Reply  


#6. To: robin, Neil McIver, Tauzero, Jethro Tull, lodwick, christine, Esso, angle, bluegrass, Eoghan, Mekons4, BTP Holdings, SKYDRIFTER, Dakmar, Horse, Max, ladybug, mirage, randge, bluedogtxn, Red Jones, RickyJ, loner (#2)

You've got to get over the encryption seduction of computer communications. Computer communication is the LEAST secure method of communicating with other people covertly. Encryption cannot protect ANYTHING on the internet. There are at least two major vulnerabilities to internet communications. First,mechanically, email communications can be recorded, and are recorded, in your computer. Even if you delete them, they're still in there, and the FBI (being the least technically capable of the agencies) can often pull them back out and reconstruct them. Secondly, systemically, it is impossible to know ho much of your electronic communication is recorded by the ISP, by agencies monitoring the web, etc. Even if you encrypt what you send, it is basically out there forever for someone to decrypt; which means that you are relying on today's encryption to protect you from tomorrows decryption programs. Additionally, you don't know that the programmers putting together encryption software haven't given the gummint the keys and backdoors to decrypt your stuff when the DHS agent comes and says it's a "matter of national security"...

The best way to communicate covertly is old school. Face to face in the middle of nowhere, or using a private code that only you know, etc. The very best means is to stay under the radar and to not be suspected in the first place. While that may be impossible for people who are psyops or propagandists, due to the nature of the work, it is relatively easy for their friends.

bluedogtxn  posted on  2006-10-23   9:56:27 ET  Reply   Untrace   Trace   Private Reply  


#9. To: bluedogtxn (#6)

Encryption cannot protect ANYTHING on the internet.

I beg to differ, but hey, you can believe what you want to.

If you don't trust any of the encryption software providers you can just write your own up and encrypt it yourself. Encryption can give you good to very good protection now. I wouldn't say it is 100% totally secure today, but it would be very close to that today. It's about as secure as it will ever get IMO right now. In the future I can see it being much less secure.

RickyJ  posted on  2006-10-23   10:30:07 ET  Reply   Untrace   Trace   Private Reply  


#10. To: RickyJ, bluedogtxn, Neil McIver (#9)

Basically, the govt does not release any encryption scheme it cannot decrypt.

Fine, are they really going to go to all the trouble of decrypting every frame of every video conferencing call?

No, but if they want to put someone away, they might.

As the links I posted above mention, the endpoints are still vulnerable.

But measures can be taken. Most people won't do much more than a firewall.

If you are really paranoid perhaps a separate cheap computer for communication that can be reformatted and reinstalled quickly, or a ghosted image copied over quickly.

You lose everything you don't backup, but the system is clean.

I use a creditcard with a small amount on it for my online purchases for similar reasons. Not quite the same, but the point is we can take measures.

robin  posted on  2006-10-23   10:38:48 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 10.

        There are no replies to Comment # 10.


End Trace Mode for Comment # 10.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]