According to the NSA, if any of you visit the Linux Journal, you are extremists.
All users of TOR are extremists.
All of you are being monitored.
Gheez, me out of a trillion other Linux users who all agree on the same topic awkwardly.
>Google Sucks, and it reeks of NSA back doors.
>Linux was built for us!
>E-Cigarettes are for assholes.
>NSA DOES EXIST, and it may be spying on you.
>Google Sucks, and it reeks of NSA back doors.
Did you also notice how the entire media response to those Google protestors at Google IO all have the whole "look at those silly foil retards" attitude? Even the people commenting about it share that same sentiment.
Civilization is a lost cause at this point
I changed my wallpaper as I read this in the morning
Wether you set off flags such as crypto, specific keywords, visiting specific sites or whatnot, makes no difference really. The point is 90% of the crowd will go into pussy mode, and this is what it is, a sort of psychological warfare. They are neutralized without force.
The fact of the matter is, either your surveiled, or your surveiled and labeled an extremist. One bends over and takes it up the ass, at least the extremist has some balls.
Using Gnu/Linux systems in combination with privacy increasing software may not be bulletproof but it at least makes their job a little harder.
Security exploits take time. Even for the NSA. We might as well push back surveillance as long as we can.
>NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance
and 4chan users are not being monitored ??
no reason to panic , were all being watched by the botnet
>mfw /g/ made me an NSA target by interesting me in searching for privacy software so as not to become an NSA target
>It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
nsa confirmed for colluding with microsoft interests
>spending millions of american tax dollars to track linux weeaboos on /g/
>The former NSA director General Keith Alexander stated that all those communicating with encryption will be regarded as terror suspects and will be monitored and stored as a method of prevention
Didn't /g/ tell me that using encryption would make me less of a target?
Hell, even Snowden himself told us to encrypt everything
Well I guess while we're getting fucked over we might as well keep on sticking it to the man
The thing with encryption is that even though it puts you on the map for the NSA, they still have to go through the process of actually crunching numbers and decrypting your communications rather than just logging your raw traffic and filing it in a database. It's considerably more work for them.
It doesn't make you any less of a target, but they're less likely to actually find out what you've been doing. And boy would they feel stupid if it turns out the worst you've done on the net was ordering dragon dildos. Tax money!
>According to the NSA, if any of you visit the Linux Journal, you are extremists.
>All users of TOR are extremists.
>All of you are being monitored.
sorry how the fuck is this news?
something like this the problem isn't the source code, it's the scale. The basic ideas behind it are not difficult, just the scale is. You essentially need google or amazon level of infrastructure to even begin to implement it. What the source code DOES reveal, however, is exactly how the NSA is using it and what their capabilities are.
So if you had the proper hardware to support the software theoretically it could be possible to recompile and run?
How long until "terrorists" would be able to pull this off?
I wouldn't dream/dare of running and compiling this shit. Just asking if it was theoretically possible to use whatever source which has been revealed could be used; what it would take to make it work, if it could be deployed in any sort of manner by means of malicious intent.
I'm curious ultimately about what would happen if the source was used by say another world super power. What the repercussions could be and what would happen in said scenario.
The funny thing about this is that both the far left and far right are both up in arms about it. Makes for some strange bed fellows when you have greenpeace, the EFF, and the 10th amendment center all on the same side of an issue.
>I'm curious ultimately about what would happen if the source was used by say another world super power.
Nothing, what the fuck do you think this program do that any other couldn't accomplish by making it a week?
Its not "OMG super secret special program", its just a common program that do X thing, now people know how it work so anyone could make a similar program in a week or less, hell, other goverments have similar software right now.
You should go back to /b/
I just wanted to talk about chinese cartoons and my desktop.
I hate /b/ with a passion.
The only reason I bring up these simple questions is merely because it has yet to be discussed in any threads on the subject until now. I have also resorted to using simple language to address my question because people from /g/ with no understanding of what the fuck we may be talking about could perhaps understand it.
There is a huge misunderstanding I feel of what the repercussions of this source code now being readily available could be. It seems to be the biggest underlying unspoken issue surrounding this whole ordeal.
It just a part of their database system I think, which is the large part and requires Governmental powers to be able to wiretap communications. You can run a similar thing in a smaller scale on your network if you wanted, but not in a larger scale.
The code isn't what you think it is, its shit, you just know what it does now.
You sound like you took Computer Science class.
If you want to discuss how people
I've been seeding Tails for over a year. That's got to put me on a special list.
lol nope no CS for me.
I'm not a massive faggot.
The topic wasn't brought up at all, or being discussed anywhere I looked. I thought I brought up a valid question of "Could the code be recompiled and successfully run if the hardware it was being run on was powerful enough to run it."
It's a good question.
Now just make a sticker of it or something
Made a sticker thingy
Its not a good question because you don't understand how coding works.
1- If you have the source you dont need to "recompile" it.
2- You dont need specific hardware to run it, its standard C.
3- Goverments and most ISP have their own version of monitoring/censoring/filtering software since the beggining of the internet era.
If you want to talk about the repercusion on people opinion go to >>>/pol/.
Tecnically wise, you're lost here.
It's time to do something about it. What can we do (even if it is something small as beefing up personal security) to protect our privacy? The thing is, this surveillance is not being done on a large scale by ONE person. It is a collective of actions that invades our privacy. We can respond in kind. If one million people beef up their personal security, that increases the difficulty of the task a million-fold. I don't know about you, but I deeply believe in personal privacy. The problem is that if one party has control over such large amounts of personal information, they can use that to paint you/the world in the flavor of their choice.
So, for example, say you're a reasonable, hard-working individual who happens to be a fucking furry. Well, if you keep that fetish private and it doesn't affect anyone elses life, what does it matter? Now say, you are the leader of a civil liberties activist group challenging government authority. In n attempt to discredit the group, the government paints a picture of you as a horrible sexual deviant using information collected on your fetishes as evidence. This is why it is dangerous for the information to be in the hands of a small, powerful collective. They can utilize that information for purposes of personal gain, power and control. They can use it to maintain control.
Well fuck that. The people in control are screwing us pretty soundly and, I don't think we shpuld allow them to make it more difficult for us to incite change (whatever that may eventually look like). So, again, I'm willing to do something about it rather than sitting at my computer, afraid and fapping to anime. They want you to be afraid, because the fearful are easy to control. Well, I will not buy into that bullshit. Who will join me?
So, again I ask, what steps can we take to protect our privacy. Even if they are not fullproof (as nothing will be), I would like to learn. Point us to places where we can learn more.
Oh my. Activism is a serious NONO.
You just made it to the top of the list buddy.
No it makes you more of a target. But encryption, if it is working properly, should not be broken by them.
Besides, hoping to slip by unnoticed when it's computers doing the flagging and tracking is futile.
So what would stop someone from using the code?
Please enlighten me as to how simple it would be to execute the source in a manner that yields somewhat similar results to the NSA program.
You mean to tell me this software can run on basic hardware? With a basic ISP? Without any specific network or processing hardware?
Yes, but it redirects all the traffic via tor so if hypothetically an exploit allowed to run code outside the browser scope they wouldn't be able to send the real IP. Also, since it is a live cd it doesn't leave a trace in your computer (this part could be accomplished with any live cd, though).
Is that fear talking or antagonism? Regardless, it doesn't change the situation. Will you be a cowering dog in the corner or will you bite back?
Fuck, I remember when 4chan had balls.
They employ 200.000 People with a budget of tens of billions.
You can't escape the. There is nothing you can do about it.
Nothing expect wait until the corrupt system collapses under it's own weight.
See you in deathcamps fellow patriots.
I thought about this lately.... perhaps IF the current financial system collapses.... what if crypto currencies replace it? What if Bitcoin is legit and is completely decentralized? What if there doesn't have to be some great depression collapse but instead a transitional phase?
Watching Lain is definitely watchlist worthy.
Terrorist h4xx0r cartoon
>can't explain shit about the complexities of running a system capable of aggregating any sort of data sent over the internet.
>calls me out as a summer fag for asking that very fucking question
been here for years.
This is the defeatist attitude I'm talking about. One man with a gun will win against a solitary man. One man with a gun is fucked if he tries to take on 100. We are the 100, the 100,000 even. If you feel powerless, it's because you've forgotten the power of collective action. YOU vs. 200,000 is certainly hopeless, but when we act in accord we are so much more than that.
Do not call yourself a "fellow patriot" if you can't even be bothered to fucking try. If that's the case, you've put in no more effort than my grandmother. I can at least excuse her for her ignorance. What's your excuse?
xkeyscore is the frontend to their databases. you'd not only need passive surveillance around the world to populate those databases, but the infrastructure to store and query that data.
this is just a random bit of code that shows a built-in filter in xkeyscore. something that analysts can just click on instead of typing the same shit again and again.
Thanks for not being a dick.
I was under the impression the entire source of xkeyscore was released. Thanks for clearing this up. You basically reaffirmed my idea, that if the entire source was put in the public eye, it would be near impossible to actually use it.
Now wouldn't this question/answer squash the idea that the entire system was compromised or "able to be used by terrorists to covertly intercept communications"
I've heard this from like 10 different people today that since the source was released it could be used maliciously against our populace and government, by an entity that is not the US gov't.
How legitimate is this claim, because all the people I have talked to thus far have claimed just that.
I'm not trolling; this hasn't been discussed in too many places, figured I would bring it up and see what you guys had to say.
I totally understand that it's pretty much impossible, but a lot of people think it's fucking lala fairly land, and anyone can run this source code.
Don't you remember that about a year ago they destroyed silk road and 90% of the child porn and numerous other sites at roughly the same time.
They own that network.
>but muh Core security of the tor network still remains intact
no it's fucked
>>Don't you remember that about a year ago they destroyed silk road and 90% of the child porn and numerous other sites at roughly the same time.
Or the part where DPR was a shitty programmer and the FBI was able to get into his server via RCE, and the fact that he linked his real name with accounts advertising silk road?
You don't know what you're talking about, dipshit. Go back to /pol/.
According to Tor they did that through actual detective work and not by exploiting some technical flaw with Tor.
Not sure who to trust now though.
>Not building your own network out of raspberrys and old radios
>Raspberry Pi$ vrms
Non-free packages installed on tsukiko
firmware-atheros Binary firmware for Atheros wireless cards
firmware-brcm80211 Binary firmware for Broadcom 802.11 wireless cards
firmware-libertas Binary firmware for Marvell Libertas 8xxx wireless car
firmware-ralink Binary firmware for Ralink wireless cards
firmware-realtek Binary firmware for Realtek wired and wireless network
5 non-free packages, 0.8% of 612 installed packages.
Ironically, the US has been a full blown soviet state since the cold war
>you think the wrong things
>you read the wrong books
>you use the wrong tools
>you close your windows
>you want property/privacy
>you are an enemy of the party/terrorist
But with a horrid touch of globalism, and a tendency to mask their economic planning behind "property rights" to make it less obvious
What if it actually is too late?
What if, after a few more elections, this stuff becomes illegal? What if we're all rounded up and put in camps?
What if we can't fight it? What if there aren't enough willing to fight?
I know it's a longshot but it really scares me sometimes.
>intel AMT in the processor
>BIOS locked to keep you from replacing wireless chipset with a freedom respecting one
>coincidentally, doing that makes intel AMT's wireless functionality useless
>IBM/Lenovo: "we did it for an obscure FCC regulation nobody else follows except for HP"
>tfw all I wanted to do was talk about technology and international cultures
i wish snowden never happened. i'd feel more comfortable without knowing all of this crap.
i'd love to see the actual data they're collecting, though. so far all we've got are powerpoint slides, not the data they have on individual 'targets'
It's probably a database with your name/personal info in it attached to a bunch of tags like "privacy_concerned", "linux", "crypto_fanatic", "mild_dissident" and "free_software" that only set off a red flag when they catch wind that you're planning a trip to the middle east, russia, or china
>i'd feel more comfortable without knowing all of this crap.
Ignorance is bliss, friend. You're better off knowing rather than not knowing and having something that seems innocent come back and bite you in the ass.
Pipe bombs are kinda cool. They look good not near World Trade Center, cause pork isnt on the menu. I guess Jihad is not coming to the meeting. I wonder yesterday if I need to terrorist purchase a new suitcase or black backpack, lol, ever since I took a fucking shit in it. #Greenpeace #Wikileaks #Osama Bin Laden #Sadam Hussein #Communism #RussiawithLove #PutinIsALotOfFun
More like if you're planning a trip to the USA from one of those places. Didn't it exclude collection from 5 eyes members?
Since I'm from a country other than those it's weird to think I could be stopped at an airport if I travel to the USA just because of being privacy conscious and tech savvy.
You'll never know until you try. However, try framing it this way:
1. If it is too late, so be it. Go down fighting. Even then, the people always have power. Socialist/communist regimes have been overthrown. A police state can also be overthrown. We aren't at that point yet though.
2. If it isn't too late, it will become too late if we do nothing.
Either way, from a point of uncertainty, I think both possibilities point to the necessity for action.
I wonder what happen if I do it >>42798953 many time, like more convincing throughout weeks without protections. I bet it would not be good, like a big problem or something not good like that.
// START_DEFINITION /* These variables define terms and websites relating to the TAILs (The Amnesic Incognito Live System) software program, a comsec mechanism advocated by extremists on extremist forums. */
$TAILS_terms=word('tails' or 'Amnesiac Incognito Live System') and
or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or '
$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');
This fingerprint identifies users searching for the TAILs (The Amnesic
Incognito Live System) software program, viewing documents relating to
or viewing websites that detail TAILs.
fingerprint('documents/comsec/tails_doc') or web_search($TAILS_terms) or
url($TAILS_websites) or html_title($TAILS_websites);
Your example sucks. Not everyone has anything to hide, some of us simply don't wan't to be targeted for the logical act of securing our shit.If people are going to speak out about this, they need to stop condemning themselves before they make their point.
>he doesnt know about ECHELON and other roaming microphone programs for dragnet recording
>he doesnt know about the acoustic surveillance currently employed by LEAs all over the country (hint: shotspotter isnt used for only gunfire)
>he doesnt know about STINGRAYs
I'm not sure how using Linux would necessarily arouse suspicion. It's not like anything intrinsic to Linux can somehow encrypt all your Web traffic and render your browsing completely invisible. There are too many external variables that won't allow that on any computer / platform. Even if you were using proxies or a VPN, the person / company supplying it probably keeps records and would gladly cooperate with a federal investigation. Basically, there's no such thing as privacy on the Internet.
Please stop. The NSA has software, but it is only useful because they are tapped directly into Googles data centers. You or anyone else can not do this.If you could, you could use one of many skiddie tools to accomplish the same thing. The power is not in the software but in where they are connected.
The fact that they can spy on anyone they want to is scary to me.
Its like the people running the show down there have no morals and think they can justify spying on the people they're supposed to be protecting.
This way of thinking is cancerous and other countries are starting to realize it. This could become a huge problem in the area of foreign relations. Hell, it already has shown that it will be with Germany (I think) not renewing their contract with Verizon.
I don't have "Intel Inside" font. It's called Neo Sans.
>So, again I ask, what steps can we take to protect our privacy. Even if they are not fullproof (as nothing will be), I would like to learn. Point us to places where we can learn more.
then go on over to w3school. it a link fart somwhere around just not have it.
-From India wirh love. thank you for question
>tfw now every employer in the world will think I'm an extremist
The NSA hates tech saavy people, ie people who know how to defend themselves against surveillance and cyber attacks. Linux users are typically elite hobbyists, sysadmins, and programmers, all of whom know how all sorts of things the NSA wishes they didn't know and have habits the NSA wishes they didn't have. Linux users usually encrypt their /home folders, they have well secured systems, they keep their systems very up to date, the OS has no backdoors because every bit of it is peer reviewed and Linux users often balk at using any kind of proprietary software, and such users are also likely aware of how to anonymize web traffic, spoof their MAC address, erase digital fingerprints (or even prevent them from being made in the first place), and crack wireless APs.
Linux is also the best supported OS for exploit tools (hell, there's an entire distro dedicated to them), and is the basis of every liveOS out there which I'm sure the NSA really hates because with a properly configured liveOS you're not going to be leaving any traces of activity behind.
To put it simply, Linux users are too smart for their own good.
Chill out, it doesn't matter that much
>use Tor all the time
>download gentoo library
>tons of documents about improvised explosives
>have to get security clearance to commission as officer in US Navy
>background check so I can get clearance (so I can board USBN subs)
I seriously doubt the NSA gives a fuck about your porn habbits
I'm sure all of Silicon Valley is laughing their asses off right now. I'll be surprised if "NSA Certified Extremist" stickers aren't being sold by the end of the week. They'll probably be as common as EFF and Tux stickers.
No, they're not too smart for their own good. That's making them sound like the bad guy for not being sheep.
Everyone should be close to this level of computing know-how because eventually, governments will exploit them more and more and they won't know how to react.
put in the keyboard and time will help. with little help from friends -ringo starr lol
>all sorts of things the NSA wishes they didn't know
>Linux users usually encrypt their /home folders
which is useless when you have a keylogger and they have the SSL private keys
>the OS has no backdoors because every bit of it is peer reviewed
This made me laugh.
>anonymize web traffic, spoof their MAC address, erase digital fingerprints
Seriously? You think spoofing your MAC address does ANYTHING against the NSA?
>crack wireless APs.
Ever heard of honeypots?
Is this entire post is a joke?
>No, they're not too smart for their own good. That's making them sound like the bad guy for not being sheep.
That line was meant to be from the NSA's point of view. Like you said, if everyone was on that level of technical know-how the NSA would find wanton collection of data to be outright impossible, which they don't want. So they label anyone with that kind of knowledge as an "extremist".
>This made me laugh.
It's a lot harder to put a backdoor in open-source software than it is to stick one in closed-source software.
>Seriously? You think spoofing your MAC address does ANYTHING against the NSA?
By itself it won't do anything, but combine it with a hacked/public AP and the trail will stop dead cold at that AP unless they find other evidence they can use to figure out who you were.
>Ever heard of honeypots?
For some reason I doubt the NSA is setting up honeypot APs in Starbucks and neighborhoods.
>government adviced to use services like Tor a few months ago after Snowden's reveals
>now this shit
It stopped being creepy and keeps getting more and more hilarious with every single new piece of information.
>It's a lot harder to put a backdoor in open-source software than it is to stick one in closed-source software.
Lol seriously? You've never heard of OpenSSL?
>For some reason I doubt the NSA is setting up honeypot APs in Starbucks and neighborhoods.
lol what's this? http://www.dailywireless.org/2013/12/30/nsa-wifi-honeypot-works-8-miles-away/
make an indiegogo page and only allow wiretransfer or something so everyone will actually be registered by the nsa.
>You've never heard of OpenSSL?
Heartbleed was a bug/exploit, not a backdoor.
>lol what's this?
>The Linux-powered device can exploit Windows systems from up to eight miles away.
Like I said, NSA hates the shit out of Linux for a reason.
Sure, Linux systems wouldn't have nearly as many vulnerabilities as Windows or some other proprietary system, but as far as Web browsing is concerned, there's really nothing you can do to ensure anonymity. If you're using a landline, your ISP can record everything you do. Spoofing your MAC address makes no difference. That only makes it harder to identify which physical computer you're using. The landline account is still registered under your name, thus any traffic on that line traces back to you personally.
Proxies and VPNs can obfuscate your traffic, but you're placing your trust in third parties. What's stopping them from cooperating with law enforcement? Who's to say they don't keep records at all? Besides, they're not a very practical solution anyway. Your bandwidth is going to depend on whatever is provided by this service, and if you're using something like Tor, I doubt many Tor relays are going to be generous and give you any more than a few kilobytes of upstream.
Now, if you own a laptop, netbook or similar mobile computer and restrict all your online activity to anonymous WiFi cafes or something, that's probably the only way to remain truly anonymous. Of course, you also have to be careful not to create a paper trail by logging into any personal email accounts and such.
I am from where I see things, sure. It appears to get the point across that I do these things for them and it works with bizarre shit that hurts and it sells and it...
ya nothing works.
Cheerio. If it doesn't work for you, try something new or ask questions until it does. You'll find this sucks and eventually move on anyway, with the simple guise of `it sucks, but I deal with it too' and nobody will listen to you, then welcome to a new brand of hell.
The best thing we could do for our privacy is to make anonymization networks mainstream. The more users, the better. If something like Tor or I2P became the normal way to browse the internet government surveillance would be a thing of the past.
It really is a shame most people don't understand why an anonymous internet is such a good thing. They only start to figure it out when they get sued for a negative Yelp review they wrote or for a couple songs they downloaded, or when they find themselves getting blackmailed/discredited using their private browsing history. Hell, a surprising amount of people don't even realize that the surface net isn't anonymous to begin with; incredibly, the concept of an IP address still blows people's minds, as does the idea that deleting their browser history doesn't actually do anything.
I'm not so sure the NSA wants to go around extorting random people because of their lifestyles of political beliefs. I think the biggest threat is societal attitudes. e.g. If you're publishing details about your personal life on social networking platforms, and your teachers, employers, relatives, exes, etc. get a hold of that information, I'm sure there's someone out there who would like to blackmail you or otherwise try to make your life miserable in some way. I remember reading about a gay teenager who was banned from a private college because staff accessed his Facebook page and found out he was gay. Apparently the college was founded by a bunch of bigots who have nothing better to do than judge what goes on in the bedrooms and personal lives of other individuals.
In that sense, I think people need to exercise more discretion. For instance, stay away from social networking; don't volunteer so much personal information online, especially if that information is personally identifiable.
>Not everyone has anything to hide
See, the problem with that is that youre not the one that decides what youve got to hide. The guys who can put you in a cage forever are. And they can store your life story and change their mind about any of it at any time.
Say, if you actually did something constructive with your life and tried to change the status quo for the better (for normal people).
They tried to do this to martin luther king with COINTELPRO in the 60s, if they had had the capabilities then that they do today, they would have succeeded, just think about that.
>I'm not so sure the NSA wants to go around extorting random people because of their lifestyles of political beliefs.
>top secret document
What I find funny is that someone spent time making a shitty WordArt graphic for "XKeyscore".
I always figured the intelligence agencies would just use ominously boring/plain slideshows and documents to discuss all their nefarious shit, but apparently the NSA has a really shitty graphics design department to do logos for little fucking thing they do. I wonder if they spend more time thinking up cool names and logos for their pet projects than working on the projects themselves.
Democracy is more than elections. It might been funded on democratic principles, but it's extremely corrupt currently with agencies trying to fuck over anyone that they think threatens the oligarchic system.
can we all just calm the fuck down!
seeing who can make the best Fizz buzz or debating which fucking thinkpad is better hardly makes 4chan /g/ fucking extremists... get a grip
It wasn't used, no, but OpenSSL implemented it, so theoretically if it hadn't been bugged, people could have used it.
The issue is that open source software do have backdoors, even if nobody uses them.
you ever wonder why there are so many ms loving sheep here? well, i bet they are nsa luring in more prey.
The best way to make sure the masses can safely hide is to make hiding normal
Everyone should start flagging themselves to make dragnet surveillance a frustrating and pointless exercise. This is how we bring back privacy
If the NSA wants your data, they should come take it like normal law enforcement.
Anyone ever seen the film cube?
Theres a bit in the middle where they all question why the fuck the govt would build something like this, and why put people inside it. A huge conspiracy? They come to the conclusion its something that just sort of happened, a sprawling project that evolved organically out of many people all working on their own little piece of contracted government work, collecting their paycheck and going home to their wives, no one ever really looking at the bigger picture, and before anyone know it theyve got this terrible top secret classified machine on their hands that has no real utility towards any officially stated aim of government (remember NSA missed the boston bomb). And then they put random ass people inside it because, well, its there now and the budget has to be justified somehow.
Ive been thinking about this more and more lately.
According to the man Alex Jones, he says that after the government enacts the total police state they'll begin to put people inside FEMA camps where they mark you with electronic tattoos.
He was saying this about 15 years ago. Every passing year it gets closer to that reality.
If TOR is encrypted then how are they able to label their users as extremists?
Is TOR now deprecated?
Send this article to all your friends and family.
We need everyone to be a part of this movement.
>If you’re just getting to this stuff, welcome. Seriously. We need everyone to be worried about this stuff, and not just because it will help us get governments to put a leash on the spies. More important is the fact that security isn’t an individual matter.
>A really good way to understand this is to think about e-mail. Like many long-time Internet users, I was suspicious of Google’s Gmail and decided that I’d much rather host my own e-mail server, and download all my incoming mail my laptop, which is with me most of the time (I also have a backup or two, in case I lose my laptop), but over time, lots of other people started using Gmail, including a large slice of the people I correspond with. And they don’t host their own e-mail. They don’t pull their mail off the server and move it to a computer that’s with them at all times. They use Gmail, like a normal person, and that means that a huge slice of that ‘‘private’’ e-mail I send and receive is sitting on Google’s servers, which are pretty well maintained, but are also available for mass surveillance through NSA programs like Prism.
>Effectively, that means that I’m a Gmail user too, even though I pay to host and maintain my own mail server.
>Richard stallman points out the obvious
>Nobody listens because other obvious things he points out (ie: child-adult/man-animal sexual relations are not inherent harmful, only forceful abuse is) are controversial, challenge social norms, and easily discredited with this simple phrase that points out his ignorance: "we know. the law is for the majority of sick fucks who abuse, not the minority who don't"
Great movie. I dig David Hewlett.
That is an interesting analogy too, anon.
I like that view of evil that appears sinister and shrouded in mystery but also manages to have mundane, even inept origins.
C is like saying "forget seat belts, child seats, anti-lock breaks, and adaptive steering! How can I power-slide? I want full control; I need to pump the breaks. People should just drive better, then we'd have fewer accidents".
We've been trying to "drive better" for decades (Valgrind, lint, code reviews, static analysis tools, education, ASLR, NX protection, et al). We still regularly see massive security-smashing epic failures.
It hasn't worked. Furthermore the C standard library has been proven turing-complete for ROP gadgets in the presence of a buffer overflow. So no matter what you do, the presence of a single stack smash is enough to allow code execution, subject to payload size limits and execution time.
At some point we have to admit C is no longer acceptable. Not for libraries, not for drivers, not for operating systems. It has to go.
All the performance benefits ever derived from writing everything in C has been more than erased, by orders of magnitude, by the damage caused from even simple innocent mistakes.
Software allows us as programmers to greatly magnify our impact on the world; we like to think of that in positive ways. But the inverse is also true: thanks to the continued use of non-memory-safe languages we have the power to negatively affect the world on a massive scale.
It is unethical to continue writing code in non-memory-safe C or C-based languages, for any purpose. Period.
cept they can go back anytime and pick you out of that crowd for whatever data patterns you left behind, regardless of how many of you there are.
it's like taking cover when someone is shooting at you. they know you're there, but at least you have some defense.
>I don't remember registering for anything.
He wasn't wrong, just ignorant of the actual scope of the issue. Then again, he's an autist so he often communicates without context.
Inherent harmfulness of socially unacceptable practices is typically a myth used to get people incapable of higher objective reasoning on board with a cause. It's best not to challenge it so audaciously unless you want to alleviate pressure from the harmful majority simply to benefit a negligible harmless minority like a small minded 'tard.
How long before people who purchase AMD CPUs are cataloged and considered extremists?
People who express dissatisfaction with non-free drivers and intel AMT already are
>lol you nigger, it's an anti-theft feature not a government killswitch
Is definitely propaganda