BWAAAAAHAHAHAHAHAHAHAAAAAAAAAA!!!!!treadlightly wrote:But not at San Moritz.ninjabread wrote:The snow this year is better at Innsbrook.







BWAAAAAHAHAHAHAHAHAHAAAAAAAAAA!!!!!treadlightly wrote:But not at San Moritz.ninjabread wrote:The snow this year is better at Innsbrook.
Funny thing...... My son and I were recently talking about setting up some book pads, just for the purpose of communications security in the event we were no longer digitally secure. Not that we ARE secure now; it's just that we're not particularly "anyone of interest". I take it for granted that if I wanted to have a secure conversation with someone in person, we'd have to leave any digital devices inside, and have it outside in the back yard. I also take it for granted that if I need to have secure communications with someone at a distance, it would have to involve dead drops and book pads.treadlightly wrote:The CIA can't break a one time pad. You just have to communicate the pad separately from the ciphertext. Not convenient.
Code: Select all
<a href="http://www.stealyouridentity.com">https://www.checkyourcredit.com</a>!
You may well be right in that part, but it still doesn't mean that highly placed gov't employees who have access to very sensitive information aren't at risk. HRC and her minions used iPhones, and they refused to use the SCIF when using those iPhones to handle sensitive information. If CIA didn't hoard iOS Zero Day hacks, maybe those phones would be more secure.......assuming they actually kept up with updates, etc.ScottDLS wrote:The one part of the above where I'm not sure...The Annoyed Man wrote:
...
Of course, the net effect of their entirely rogue policy is that everyone's affected devices are LESS secure to ALL such penetration, not just the CIA's devices, and not just the nation's enemies' devices. The CIA does not employ the only talented hackers out there. And if the CIA can find these vulnerabilities, so can the Chinese, and ISIS, and anyone else who applies themselves to the task. Adding to the problem, it's not just the digital devices belonging to private citizens that are exposed to exploitation. Gov't employees in positions of responsibility ALSO use these devices. Just ask Hillary Clinton.
...
I think the zero day hacks and other backdoors are probably not in the devices that NSA develops (and shares with the rest of DoD and IC), they are in the commercially available devices, that the rest of us mere mortals use. The Wikileaks revelations are unlikely to show vulnerabilities in DoD and Intelligence hardware, because the specs for such, and availability of such is extremely limited. I've "heard" that the only people with the known technical ability to intercept US encrypted communications are the NSA itself and even that they don't give their best hardware to the rest of the Intelligence Community.