[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

UK economy on brink of collapse (Needs IMF Bailout)

How Red Light Unlocks Your Body’s Hidden Fat-Burning Switch

The Mar-a-Lago Accord Confirmed: Miran Brings Trump's Reset To The Fed ($8,000 Gold)

This taboo sex act could save your relationship, expert insists: ‘Catalyst for conversations’

LA Police Bust Burglary Crew Suspected In 92 Residential Heists

Top 10 Jobs AI is Going to Wipe Out

It’s REALLY Happening! The Australian Continent Is Drifting Towards Asia

Broken Germany Discovers BRUTAL Reality

Nuclear War, Trump's New $500 dollar note: Armstrong says gold is going much higher

Scientists unlock 30-year mystery: Rare micronutrient holds key to brain health and cancer defense

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today

In Britain, they are secretly preparing for mass deaths

These Are The Best And Worst Countries For Work (US Last Place)-Life Balance

These Are The World's Most Powerful Cars

Doctor: Trump has 6 to 8 Months TO LIVE?!

Whatever Happened to Robert E. Lee's 7 Children

Is the Wailing Wall Actually a Roman Fort?

Israelis Persecute Americans

Israelis SHOCKED The World Hates Them

Ghost Dancers and Democracy: Tucker Carlson

Amalek (Enemies of Israel) 100,000 Views on Bitchute

ICE agents pull screaming illegal immigrant influencer from car after resisting arrest

Aaron Lewis on Being Blacklisted & Why Record Labels Promote Terrible Music

Connecticut Democratic Party Holds Presser To Cry About Libs of TikTok

Trump wants concealed carry in DC.

Chinese 108m Steel Bridge Collapses in 3s, 16 Workers Fall 130m into Yellow River

COVID-19 mRNA-Induced TURBO CANCERS.

Think Tank Urges Dems To Drop These 45 Terms That Turn Off Normies


Science/Tech
See other Science/Tech Articles

Title: Why Bush's NSA Wire tapping is defeated by VoIP Networks
Source: [None]
URL Source: http://video.google.com/videoplay?d ... 8493098426180726284&pr=goog-sl
Published: Oct 23, 2006
Author: ???
Post Date: 2006-10-23 00:09:06 by Neil McIver
Keywords: None
Views: 415
Comments: 17

http://video.google.com/videoplay?docid=-8493098426180726284&pr=goog-sl

Good listen. About 13 minutes long.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 2.

#2. To: Neil McIver, Tauzero, Jethro Tull, lodwick, christine, Esso, angle, bluegrass, Eoghan, Mekons4, BTP Holdings, SKYDRIFTER, Dakmar, Horse, Max, ladybug, mirage, randge, bluedogtxn, Red Jones, RickyJ, loner (#0)

Great explanation of VoIP.

robin  posted on  2006-10-23   1:20:12 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 2.

#3. To: robin (#2)

The Titanic was supposed to be unsinkable too. IMHO there is no level of encryption that can't be cracked given enough time and desire. Right now I would say this type of communication would be very secure, but to think it will always stay secure would be foolish.

RickyJ  posted on  2006-10-23 01:51:01 ET  Reply   Untrace   Trace   Private Reply  


#4. To: robin (#2)

Nothing is 100% secure. The best one can do is to make as daunting a target as possible in hopes an attacker goes somewhere else.

mirage  posted on  2006-10-23 02:19:39 ET  Reply   Untrace   Trace   Private Reply  


#6. To: robin, Neil McIver, Tauzero, Jethro Tull, lodwick, christine, Esso, angle, bluegrass, Eoghan, Mekons4, BTP Holdings, SKYDRIFTER, Dakmar, Horse, Max, ladybug, mirage, randge, bluedogtxn, Red Jones, RickyJ, loner (#2)

You've got to get over the encryption seduction of computer communications. Computer communication is the LEAST secure method of communicating with other people covertly. Encryption cannot protect ANYTHING on the internet. There are at least two major vulnerabilities to internet communications. First,mechanically, email communications can be recorded, and are recorded, in your computer. Even if you delete them, they're still in there, and the FBI (being the least technically capable of the agencies) can often pull them back out and reconstruct them. Secondly, systemically, it is impossible to know ho much of your electronic communication is recorded by the ISP, by agencies monitoring the web, etc. Even if you encrypt what you send, it is basically out there forever for someone to decrypt; which means that you are relying on today's encryption to protect you from tomorrows decryption programs. Additionally, you don't know that the programmers putting together encryption software haven't given the gummint the keys and backdoors to decrypt your stuff when the DHS agent comes and says it's a "matter of national security"...

The best way to communicate covertly is old school. Face to face in the middle of nowhere, or using a private code that only you know, etc. The very best means is to stay under the radar and to not be suspected in the first place. While that may be impossible for people who are psyops or propagandists, due to the nature of the work, it is relatively easy for their friends.

bluedogtxn  posted on  2006-10-23 09:56:27 ET  Reply   Untrace   Trace   Private Reply  


#12. To: robin (#2) (Edited)

Great explanation of VoIP.

I don't think this is so much an explanation of VoIP as it is VoIP *networks*. The "asterisk" software that's described can be used to replace an office phone system. Except that the "office" with this network doesn't have to be confined to one building. The office can be virtual with each cubicle located anywhere in the world.

The author makes the point that as long as he is only communicating with people tied into his virtual phone network, the communications never enter the standard telephone grid, and therefore doesn't pass the fed's wire tappers. In fact I don't think he can call into the phone grid from his network phone unless I missed that.

What's interesting to me is the likelihood that two of these virtual networks (i.e. two "businesses" each with their own internet based phone servers or phone "centers"), might be free to interact with one another without going through the telephone grid. If so, then the stage is set for the complete demise of the telephone grid itself, as all phone communications would/could just be made from one internet phone server to another internet phone server just like email today never enters the phone grid. All transpires solely over the internet.

Neil McIver  posted on  2006-10-23 11:21:23 ET  Reply   Untrace   Trace   Private Reply  


End Trace Mode for Comment # 2.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]