Great. So that means if the NSA builds their embedded AGI successfully it's going to have a huge upper hand at world domination.
Too many things to worry about :( John From: Nanograte Knowledge Technologies via AGI [mailto:[email protected]] Sent: Monday, March 2, 2015 7:23 PM To: AGI Subject: RE: [agi] Couple thoughts @John, Yes, the message may have come from you, but it did not only go to the recipient(s). There are layers of networked and/or "lone ranger" middlemen hardware and software, which intercept and decode and promote. The technologies for doing so for email and internet is already 15 years old. National-security laws strictly govern the public release of all encryption algorithms. Such technologies are layered over networked architectures as watchdogs, harvesters and messengers. In another role, they could also become assassins and saboteurs. These days, they simply get the data straight from social-networked cloud platforms, as we have seen in the news. Big data = centralized accessibility. Out of sight in the cloud = out of mind and personal control. Voila! Agent software are snooping, even locally-resident, content-driven objects. If needs be, they would record your keystrokes on your computer even before you encrypt. No commercial issues there then. Apparently, such technologies for touch screens read your fingerprints from the bottom of the screen and translate what you're saying, event hat you chose to delete and retype. The full record of every session. Even your editing profile. Bam! Bam! Try saying: "It wazn't me!" They'll have you type on a keyboard and match your typing profile (behavior) to the database and match your fingerprints and geo-location to the record you just produced in front of legal witnesses. patterns in everything then. "The Typer profile is ready Sir!" Agent-software types are invisible and only detectable via super-smart means. They are adaptive in that they could morph or relay messages via other types of networked layers specifically designed for them: eg, swarm. So, even if you catch the little bastard, his package is safe. It's a waste of time to even try. No secured work ethics, transmission or message encryption would ever be able to stop them for long. >From what I've read, the rule is quite clear: No decryption key handed to government = no government security release permission granted. Serious jail time, and perhaps even worse, for offenders. _____ From: [email protected] <mailto:[email protected]> To: [email protected] <mailto:[email protected]> Subject: RE: [agi] Couple thoughts Date: Tue, 3 Mar 2015 01:58:15 +0200 @Mike There is something unhackable, but we'll need to build it first. > Date: Mon, 2 Mar 2015 14:22:08 -0800 > Subject: Re: [agi] Couple thoughts > From: [email protected] <mailto:[email protected]> > To: [email protected] <mailto:[email protected]> > > I get the feeling there is nothing left unhackable. Even a > typewriter, they can plant a effing video recorder somewhere and film > you typing. It used to be you made fun of the guy with tin foil on > his head to "block transmissions." > > On 3/2/15, John Rose via AGI <[email protected] <mailto:[email protected]> > wrote: > >> -----Original Message----- > >> From: Matt Mahoney via AGI [mailto:[email protected]] > >> > >> Peers need to know when two messages are from the same source. If a peer > >> earns a reputation for being a reliable source of information (like Google > >> or > >> your bank), then malicious peers will try to spoof messages from them. To > >> prevent this, peers sign their messages using a mutually agreed secret > >> key > >> chosen at random. After an initial exchange (using e.g. Diffie-Hellman), > >> I > >> send you a message and a signature like SHA256(message + key). You > >> receive > >> the message, compute the signature, and compare it to the signature that > >> I > >> sent you. Since nobody else knows the key, and the hash is not invertible, > >> you > >> know the message must have come from me. > >> > > > > > > Well, that's the same as using HTTPS or another application layer protocol > > over TLS/SSL with certificates signed by a certificate authority no? Though > > in your communications protocol you control the signing and encryption > > algorithm and everyone need not get a CA signed cert I suppose. > > > > John > > > > > > > > > > > > > > ------------------------------------------- > > AGI > > Archives: https://www.listbox.com/member/archive/303/=now > > RSS Feed: https://www.listbox.com/member/archive/rss/303/11943661-d9279dae > > Modify Your Subscription: > > https://www.listbox.com/member/? <https://www.listbox.com/member/?&> & > > Powered by Listbox: http://www.listbox.com > > > > > ------------------------------------------- > AGI > Archives: https://www.listbox.com/member/archive/303/=now > RSS Feed: https://www.listbox.com/member/archive/rss/303/26941503-0abb15dc > Modify Your Subscription: https://www.listbox.com/member/? <https://www.listbox.com/member/?&> & > Powered by Listbox: http://www.listbox.com AGI | <https://www.listbox.com/member/archive/303/=now> Archives <https://www.listbox.com/member/archive/rss/303/26941503-0abb15dc> | <https://www.listbox.com/member/?&> Modify Your Subscription <http://www.listbox.com> AGI | <https://www.listbox.com/member/archive/303/=now> Archives <https://www.listbox.com/member/archive/rss/303/248029-82d9122f> | <https://www.listbox.com/member/?&> Modify Your Subscription <http://www.listbox.com> ------------------------------------------- AGI Archives: https://www.listbox.com/member/archive/303/=now RSS Feed: https://www.listbox.com/member/archive/rss/303/21088071-f452e424 Modify Your Subscription: https://www.listbox.com/member/?member_id=21088071&id_secret=21088071-58d57657 Powered by Listbox: http://www.listbox.com
