On 11/12/07, Sagun <[EMAIL PROTECTED]> wrote:
>
> guys if u really read all the pages of facebook's agreement,  you will
> find that what ever we create in facebook like picture, will  be owned
> by them. so be aware of the uses. try not using it if u dont  want to
> give away your copyrights to facebook company.
>

- it is said US, other governments and business houses use  such
social networks for identity profiling, background  checking etc. Funk
social engineering skills as Kelvin Mitnick?  We have loooot smarter
people out there.

- All your messenger communication is being logged an associated with
your social network data, so as with your  emails and so with your
web-search.

- The encryption algorithm of A5/1 GSM is deliberately weakened  by
shortening the key length for easy eavesdropping of mobile phone from
hundreds of meters away.

- NSA projects like ENRON log all your internet communication going
through USA and allies So as your telephone conversation and records.

- in developed countries so called security camera with face
recognition capability log all your physical move with your
associates.

- Smart screening device can penetrate within your cloth and give away
things you are carrying.

- Your mobile phone can give away your current location and the places
you have visited and narrowing it down to people you met,  most
likely, even when switched off.

- all the paper forums you have ever filled is/will be  digitalized
and interlinked probably here in Nepal too in  future with all your
details only to be associated to you.

To say a few, bir hospital keeps your basic medical record in  digital
forum, valley mapping project has mapped your home  location which can
be associated to your telephone number or  GPS data, the forums you'd
filled for your exams (TU, SLC?)  most likely has records of your home
telephone number and other  private details so will.... when your
citizenship certificate will be digitalized (maybe with your
fingerprint scaned records) and all  can be associated and interlinked
to everything with details about social and friend circle from early
school.

- people use cryptography, security products to protect their
information BUT without knowing its limitations or technical  details
to make full use of its capability.It will highly likely leave
loopholes to people who understand these limitations and want access
on it.

- your monitors radiation and keystrokes can be logged from  hundred
meters away to interoperate  what you are typing or  seeing as u do
it. Also your voice conversation inside your assumed private space
with parabolic microphone with some noise filtering.

- Even leak your underwear info if jockey has tagged it with RFID.
(20$ paper note has it too)

- your computer stores your clear tale-tell activity for  months/years
hanging there to be recovered via digital  forensics and most likely
your passwords too.

- With intelligence analysis (surveillance, profiling etc) with
forensics and capabilities as in information security I could  most
likely distinguish and/or track you to your home with all  your
details about you my side as you/your closest friend knows about you
without you giving ANY details about yourself.

- The scary thing is you don't have to be into billion dollars
govermnent projects to have all or equivalent access to above
mentioned capabilities. Just having know-how and little bit of
motivation ...like turning on my RFID scanner near your pant to  see
if its tagged by passive RFID so that next time if i have  to wait in
front of the toilet for too long for my turn i could  say if its you
or someone else with pants down the other side  of door ;) (of course
without peeping... hehehe )

See brother there are lots to worry about and worry about things that
we do not know if you start worrying, isn't it?

regards,
-bipin

--~--~---------~--~----~------------~-------~--~----~
FOSS Nepal mailing list: [email protected]
http://groups.google.com/group/foss-nepal
To unsubscribe, e-mail: [EMAIL PROTECTED]

Community website: http://www.fossnepal.org/
-~----------~----~----~----~------~----~------~--~---

Reply via email to