[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Let's settle the FUD once and for all

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 10
Thread images: 1

File: tin-foil-hat-guy.jpg (625KB, 3000x1688px) Image search: [Google]
tin-foil-hat-guy.jpg
625KB, 3000x1688px
I want to find a way to fight fear, uncertainty and doubt regarding NSA spying via Windows 10 and hardware.

I am putting together a new pc and I've been asking around for opinions on builds. Occasionally, someone will mention something like "Windows 10 is a botnet" and "pc hardware made after 19xx contains backdoors", and so forth.

I am not one to succumb to fear, uncertainty and doubt. Surely someone has tested to see if their software and hardware is calling home. Surely there are technological and scientific ways to monitor for outbound transmissions from your own pc. Is there an abundance of evidence that indicates our newest software and hardware does indeed act like trojans, or is there scant evidence and we are just afraid of the boogeyman?
>>
>>59393251
It is not FUD if it is true.
>>
>>59393447
Yes, but is it true? There must be a way to verify whether or not our hardware and software is making an unauthorized transmission through our routers.
>>
>>59393485
It is true.

https://en.wikipedia.org/wiki/Vault_7

>to compromise smart TVs,[1] web browsers (including Firefox, Google Chrome, and Microsoft Edge), and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.
>Firefox
>Google Chrome
>Microsoft Edge
>iOS
>Android
>Windows
>OS X
>Linux
>>
>turn off all spying options
>open wireshark
>still making connections every time you do anything
>>
>>59393507
why do they name Linux 2 times?
>Android
>Linux
>>
>>59393601
Referring to the mobile and desktop flavours.
>>
>>59393617
So Android an GNU?
>>
>>59393507
That is more reporting on documents that mention capability. What I want is hard evidence. There must be a lab or a basement of curious and determined geeks who have first done all they could to strip out known tracking functionality from hardware and software and then monitored that hardware and software for unauthorized outgoing transmissions all in an effort to put confirmation on what is currently fear, uncertainty and doubt. I want to see the procedure logs and results of that kind of scientific study.
>>
>>59393891
>What I want is hard evidence.
There isn't any, and there isn't ever going to be. Exploits and malicious code are being used by three letter government agencies. Are they targeting/infecting you? Or anyone else here? Nope. Are they "backdooring" your hardware? Nope again. Is anything in "Vault 7" on your machine right now? Nope, thrice.

This isn't to say this isn't some really scary shit, because it is, but it shouldn't be affecting your daily computer usage in any of the ways the usual wannabe hacker /g/tard wants you to believe it should. This also isn't to say that the government isn't seriously overstepping its bounds with data collection and retention. They are, and this is something that needs to be addressed sooner rather than later, but this isn't affecting you (or anyone else here) on any level at all. Your "data" is almost entirely in the hands of advertising companies as opposed to overstepping alphabet soup agencies, as you're more than likely not a pedophile, child porn producer, terrorist, high profile political dissenter, whistleblower, or some other person of actual interest to the government.

Don't believe for a second that some nightmarish "Minority Report" scenario isn't possible, or that we're not headed straight for it right now, but it isn't here yet, and you're not a part of it. And neither is any other overly paranoid pretend hacker neckbeard that frequents this board. A combination of too much free time and a desperate need to feel important are what feeds their unfounded paranoia. Don't fall into the same trap. Google is a much bigger threat to your personal privacy right now than the government is. You're just not that interesting.
Thread posts: 10
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.