On Sun, Jan 15, 2017 at 08:47:51AM -0600, Andr??s Leopoldo Pacheco Sanfuentes wrote: > Anybody serious about decryption cannot use standard social networks, > which are predicated on access to private data for marketing and > "development" (eg, as test data for new features, debugging, etc) > purposes, and naturally open to government intrusion with few > exceptions that have proven irrelevant in the final analysis [snip]
I concur completely. I'd also like to ask a pointed question, in re the phrase "naturally open to government intrusion": Do you [generic you] think that everyone working AT Facebook is working FOR Facebook? Of course they're not. Any intelligence agency worth its name has long since planted their own people inside. It's an obvious, cheap, effective, easy, very-low-risk potentially-high-reward move. Plus: they get paid twice. And if caught, they don't get executed for espionage: they just get fired. (Fired *quietly*. Do you really think Facebook would want it publicly known that an Elbonian agent was working in devops for 6 years? Hint: what would that do to their stock price and 4Q earnings?) And then they get replaced. (And please don't tell me that Facebook could stop this. Given that intelligence agencies routinely plant people *inside each other*, I sincerely doubt that they'd have any trouble getting their folks past whatever security theater Facebook uses to screen employees.) The same is no doubt true of any sufficiently-large "social network" or cloud computing operation: Twitter, AWS, etc. All that fruit hangs much too low to be left unpicked. The upside is huge, the downside is negligible. So I think the operational question is not "are they present?" -- the question is "what do they have access to?" ---rsk -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.