On 11/12/07, Sagun <[EMAIL PROTECTED]> wrote: > > guys if u really read all the pages of facebook's agreement, you will > find that what ever we create in facebook like picture, will be owned > by them. so be aware of the uses. try not using it if u dont want to > give away your copyrights to facebook company. >
- it is said US, other governments and business houses use such social networks for identity profiling, background checking etc. Funk social engineering skills as Kelvin Mitnick? We have loooot smarter people out there. - All your messenger communication is being logged an associated with your social network data, so as with your emails and so with your web-search. - The encryption algorithm of A5/1 GSM is deliberately weakened by shortening the key length for easy eavesdropping of mobile phone from hundreds of meters away. - NSA projects like ENRON log all your internet communication going through USA and allies So as your telephone conversation and records. - in developed countries so called security camera with face recognition capability log all your physical move with your associates. - Smart screening device can penetrate within your cloth and give away things you are carrying. - Your mobile phone can give away your current location and the places you have visited and narrowing it down to people you met, most likely, even when switched off. - all the paper forums you have ever filled is/will be digitalized and interlinked probably here in Nepal too in future with all your details only to be associated to you. To say a few, bir hospital keeps your basic medical record in digital forum, valley mapping project has mapped your home location which can be associated to your telephone number or GPS data, the forums you'd filled for your exams (TU, SLC?) most likely has records of your home telephone number and other private details so will.... when your citizenship certificate will be digitalized (maybe with your fingerprint scaned records) and all can be associated and interlinked to everything with details about social and friend circle from early school. - people use cryptography, security products to protect their information BUT without knowing its limitations or technical details to make full use of its capability.It will highly likely leave loopholes to people who understand these limitations and want access on it. - your monitors radiation and keystrokes can be logged from hundred meters away to interoperate what you are typing or seeing as u do it. Also your voice conversation inside your assumed private space with parabolic microphone with some noise filtering. - Even leak your underwear info if jockey has tagged it with RFID. (20$ paper note has it too) - your computer stores your clear tale-tell activity for months/years hanging there to be recovered via digital forensics and most likely your passwords too. - With intelligence analysis (surveillance, profiling etc) with forensics and capabilities as in information security I could most likely distinguish and/or track you to your home with all your details about you my side as you/your closest friend knows about you without you giving ANY details about yourself. - The scary thing is you don't have to be into billion dollars govermnent projects to have all or equivalent access to above mentioned capabilities. Just having know-how and little bit of motivation ...like turning on my RFID scanner near your pant to see if its tagged by passive RFID so that next time if i have to wait in front of the toilet for too long for my turn i could say if its you or someone else with pants down the other side of door ;) (of course without peeping... hehehe ) See brother there are lots to worry about and worry about things that we do not know if you start worrying, isn't it? regards, -bipin --~--~---------~--~----~------------~-------~--~----~ FOSS Nepal mailing list: [email protected] http://groups.google.com/group/foss-nepal To unsubscribe, e-mail: [EMAIL PROTECTED] Community website: http://www.fossnepal.org/ -~----------~----~----~----~------~----~------~--~---
