On Mon, Nov 12, 2007 at 10:31:37PM -0000, gigavault wrote: > > See brother, the fact that all the aforementioned in your message, is > widely known or claimed. As long as the regular law abiding citizen > takes the usual steps to protect themselves and doesn't visit dodgy > websites, then they have nothing to worry about. It's only those doing
This is =everyday= reason me-you hear from people who don't know jack shit. 'So long people don't do dodgy stuff, nothing will happen to those people'. I mean, what a load of crap this is? First of all define =dodgy= websites. Is dodgy=p**n website? Is dodgy=te******t website (Define te******t first)? Is dogdy=fraudulant activities? These are some of questions that is really -not- easy to know about. Good reference regarding this for you - Noam Chomsky. Read up. Pretty interesting. Especially read up 'Distorted Morality'. > dodgy stuff and the paranoid that should be concerned. Regular users Paranoid? Maybe. > should just get about with ther business and just beaware of how to > take precautionary measures when securing their machine. When securing their machine. i.e.. No more beyond that. When talking about Internet. Nobody really owns Internet. I am of the view that information should be freed and people should have the choice in what they want to learn without being made a victim of. If tomorrow rfid, dna db makes it to mainstream, what will happen to personal freedom? Do you want a message on your snailmail asking you "if you'd like to get HIV+ tested at the best XYZ clinic"? Would you like tomorrow if your private rfid information is in the hand of a crooked adversary (be it some giant corp, govt.) and use that against you? Would you prefer your personal information logged in the internet and used in viral marketing (aka customised SPAM)? What happens to the already blithering state of 'freedom of speech'? > > On Nov 12, 4:40 pm, "Bipin Gautam" <[EMAIL PROTECTED]> wrote: > > On 11/12/07, Sagun <[EMAIL PROTECTED]> wrote: > > > > > > > > > guys if u really read all the pages of facebook's agreement, you will > > > find that what ever we create in facebook like picture, will be owned > > > by them. so be aware of the uses. try not using it if u dont want to > > > give away your copyrights to facebook company. > > > > - it is said US, other governments and business houses use such > > social networks for identity profiling, background checking etc. Funk > > social engineering skills as Kelvin Mitnick? We have loooot smarter > > people out there. Typo - Kevin Mitnick. > > > > - All your messenger communication is being logged an associated with > > your social network data, so as with your emails and so with your > > web-search. If this is being done, we as a netizen should have the right to ask them if it is being logged and provide us with 'what is being logged'. Usually EULA and agreement sort of mask this out so netizens =mostly= have to bow down. > > - The encryption algorithm of A5/1 GSM is deliberately weakened by > > shortening the key length for easy eavesdropping of mobile phone from > > hundreds of meters away. There are reports of weakend key-strength used in DES (not 3-DES) so that some agency could break the encrypted information in less time than others and within reasonable amount of time. This was said to be deliberate. You all should know the agency in context. God knows what all those supercomputers with alien interconnect fabrics are being used for. > > - NSA projects like ENRON log all your internet communication going > > through USA and allies So as your telephone conversation and records. > > > > - in developed countries so called security camera with face > > recognition capability log all your physical move with your > > associates. > > > > - Smart screening device can penetrate within your cloth and give away > > things you are carrying. > > > > - Your mobile phone can give away your current location and the places > > you have visited and narrowing it down to people you met, most > > likely, even when switched off. This is possible today. > > - all the paper forums you have ever filled is/will be digitalized > > and interlinked probably here in Nepal too in future with all your > > details only to be associated to you. From what I've learnt, higher security always comes at a price. The price is user's freedom. > > To say a few, bir hospital keeps your basic medical record in digital > > forum, valley mapping project has mapped your home location which can > > be associated to your telephone number or GPS data, the forums you'd > > filled for your exams (TU, SLC?) most likely has records of your home > > telephone number and other private details so will.... when your > > citizenship certificate will be digitalized (maybe with your > > fingerprint scaned records) and all can be associated and interlinked > > to everything with details about social and friend circle from early > > school. > > > > - people use cryptography, security products to protect their > > information BUT without knowing its limitations or technical details > > to make full use of its capability.It will highly likely leave > > loopholes to people who understand these limitations and want access > > on it. > > > > - your monitors radiation and keystrokes can be logged from hundred > > meters away to interoperate what you are typing or seeing as u do > > it. Also your voice conversation inside your assumed private space > > with parabolic microphone with some noise filtering. Van-eck radiation. > > > > - Even leak your underwear info if jockey has tagged it with RFID. > > (20$ paper note has it too) Giant corporations have huge-huge vested interest in this. Also, on the contrary there are people working on maintaining freedom and till today, they have seemed to be able to stop this from happening. > > - your computer stores your clear tale-tell activity for months/years > > hanging there to be recovered via digital forensics and most likely > > your passwords too. > > > > - With intelligence analysis (surveillance, profiling etc) with > > forensics and capabilities as in information security I could most > > likely distinguish and/or track you to your home with all your > > details about you my side as you/your closest friend knows about you > > without you giving ANY details about yourself. > > > > - The scary thing is you don't have to be into billion dollars > > govermnent projects to have all or equivalent access to above > > mentioned capabilities. Just having know-how and little bit of > > motivation ...like turning on my RFID scanner near your pant to see > > if its tagged by passive RFID so that next time if i have to wait in > > front of the toilet for too long for my turn i could say if its you > > or someone else with pants down the other side of door ;) (of course > > without peeping... hehehe ) > > > > See brother there are lots to worry about and worry about things that > > we do not know if you start worrying, isn't it? Two word for this comes to my mind - Big brother and Vigilante. Both unwarranted. -- Cheers, Bikal. GPG: 0x5DAE3BE5 "Rule 6: There is no Rule 6." - Rob Pike
pgp6GPBIogj6l.pgp
Description: PGP signature
