[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

You Know What Happens Next

Cash Jordan: Half-Built Tower Abandoned… as ICE Deports Entire ‘Migrant Workforce’

Heavy rainfall causes flash flooding Tuesday night, some cars stuck in high water on Chicago's West

Biden Doctor PLEADS THE FIFTH, Refuses To Testify To Congress, Biden Pardons ARE VOID

Joe Rogan says FBI director Kash Patel played him for a fool and maga for fools with the Jeff Epstein files

Elon's AI System "Grok" Went Rogue And Has Been SHUT DOWN in an Emergency!

Earthquake Swarms at One of the MOST DANGEROUS Volcanoes in the USA

Ben Shapiro Declares Epstein Case CLOSED: ‘Facts on the Ground Have Changed’

Iran receives 40 Chinese J10-C Fighter Jets

China’s Railgun Is Now Battle-Ready, Thanks to Nuclear Power

Chinese Hypersonic Advancements! Deadly new missile could decimate entire US fleet in 20 minutes

Iran Confirms Massive Chinese HQ 9 B Missile Deal

Why Is Europe Hitting 114°F And Still Rising?

The INCREDIBLE Impacts of Methylene Blue

The LARGEST Eruptions since the Merapi Disaster in 2010 at Lewotobi Laki Laki in Indonesia

Feds ARREST 11 Leftists For AMBUSH On ICE, 2 Cops Shot, Organized Terror Cell Targeted ICE In Texas

What is quantum computing?

12 Important Questions We Should Be Asking About The Cover Up The Truth About Jeffrey Epstein

TSA quietly scraps security check that every passenger dreads

Iran Receives Emergency Airlift of Chinese Air Defence Systems as Israel Considers New Attacks

Russia reportedly used its new, inexpensive Chernika kamikaze drone in the Ukraine

Iran's President Says the US Pledged Israel Wouldn't Attack During Previous Nuclear Negotiations

Will Japan's Rice Price Shock Lead To Government Collapse And Spark A Global Bond Crisis

Beware The 'Omniwar': Catherine Austin Fitts Fears 'Weaponization Of Everything'

Roger Stone: AG Pam Bondi Must Answer For 14 Terabytes Claim Of Child Torture Videos!

'Hit Us, Please' - America's Left Issues A 'Broken Arrow' Signal To Europe

Cash Jordan Trump Deports ‘Thousands of Migrants’ to Africa… on Purpose

Gunman Ambushes Border Patrol Agents In Texas Amid Anti-ICE Rhetoric From Democrats

Texas Flood

Why America Built A Forest From Canada To Texas


Science/Tech
See other Science/Tech Articles

Title: Why Bush's NSA Wire tapping is defeated by VoIP Networks
Source: [None]
URL Source: http://video.google.com/videoplay?d ... 8493098426180726284&pr=goog-sl
Published: Oct 23, 2006
Author: ???
Post Date: 2006-10-23 00:09:06 by Neil McIver
Keywords: None
Views: 338
Comments: 17

http://video.google.com/videoplay?docid=-8493098426180726284&pr=goog-sl

Good listen. About 13 minutes long.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 11.

#2. To: Neil McIver, Tauzero, Jethro Tull, lodwick, christine, Esso, angle, bluegrass, Eoghan, Mekons4, BTP Holdings, SKYDRIFTER, Dakmar, Horse, Max, ladybug, mirage, randge, bluedogtxn, Red Jones, RickyJ, loner (#0)

Great explanation of VoIP.

robin  posted on  2006-10-23   1:20:12 ET  Reply   Untrace   Trace   Private Reply  


#6. To: robin, Neil McIver, Tauzero, Jethro Tull, lodwick, christine, Esso, angle, bluegrass, Eoghan, Mekons4, BTP Holdings, SKYDRIFTER, Dakmar, Horse, Max, ladybug, mirage, randge, bluedogtxn, Red Jones, RickyJ, loner (#2)

You've got to get over the encryption seduction of computer communications. Computer communication is the LEAST secure method of communicating with other people covertly. Encryption cannot protect ANYTHING on the internet. There are at least two major vulnerabilities to internet communications. First,mechanically, email communications can be recorded, and are recorded, in your computer. Even if you delete them, they're still in there, and the FBI (being the least technically capable of the agencies) can often pull them back out and reconstruct them. Secondly, systemically, it is impossible to know ho much of your electronic communication is recorded by the ISP, by agencies monitoring the web, etc. Even if you encrypt what you send, it is basically out there forever for someone to decrypt; which means that you are relying on today's encryption to protect you from tomorrows decryption programs. Additionally, you don't know that the programmers putting together encryption software haven't given the gummint the keys and backdoors to decrypt your stuff when the DHS agent comes and says it's a "matter of national security"...

The best way to communicate covertly is old school. Face to face in the middle of nowhere, or using a private code that only you know, etc. The very best means is to stay under the radar and to not be suspected in the first place. While that may be impossible for people who are psyops or propagandists, due to the nature of the work, it is relatively easy for their friends.

bluedogtxn  posted on  2006-10-23   9:56:27 ET  Reply   Untrace   Trace   Private Reply  


#11. To: bluedogtxn (#6)

You've got to get over the encryption seduction of computer communications. Computer communication is the LEAST secure method of communicating with other people covertly.

I'm not sure that's literally true, as postal letters are arguably less secure, but what you suggest is far, far from practicable. You might as well say to avoid phone tapping you should stop using phones, and to avoid car accidents you should sell your car and ride a bike everywhere. Janis Joplin sang about freedom being another word for "nothing left to lose", which unfortunately describes the result of many patriots who preemptively ensure that the government can't take anything from them. Making yourself immune from government activity by bankrupting yourself of phone use, cars, or what have you is no solution.

We need something that works. Sure, there are no guarantees. But IF you are going to use phones to communicate, THEN this kind of encryption is better than nothing. Granted we should not be lulled into a false sense of security. All things in moderation.

Yes you do point out that sound encryption requires assurances that the gov doesn't already have a decryption key for everything, and Microshaft was accused of creating one for the NSA. Another good reason to go with open source linux. The phone service described in the article is linux based. (Which I downloaded).

Neil McIver  posted on  2006-10-23   11:08:36 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 11.

        There are no replies to Comment # 11.


End Trace Mode for Comment # 11.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]