Comments by "Terry Daktyllus" (@terrydaktyllus1320) on "Be a Subversive with Linux! We are under Attack!" video.
-
90
-
33
-
9
-
8
-
8
-
6
-
6
-
5
-
5
-
4
-
4
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@peterlittlehorse5695 "And it's all a sham because they have backdoor access to all the machines anyway."
Incorrect because you miss out one extremely important and very relevant point - that with ever computer and computing device that gets released, particularly those linked to big corporations like Apple, Google, Amazon, Microsoft and Faecesbook, there are many thousands of people across the globe taking those devices apart, testing them and trying to expose flaws in their design - if for nothing more than because the kudos for exposing one of these big names as "evil" through some nefarious activities would be huge.
Intel Management Engine, for example, has known POTENTIAL flaws that we should be aware of and we should protect against with firewalls and network access controls, but there are NO known real world exploits that have taken place using it - and had there been, they would have been exposed because of the people working very hard in the public space to find such things.
"Even computers that are not connected to the internet are spied upon by a sub-processor within all of the computer chips manufactured since the early 2000's because these chips connect to the cell network, unbeknownst to the owner of the phone or computer."
Utter nonsense which tells me you have no idea how the technology works, or you're just a paranoid loony - or both.
A signal traveling down a piece of wire from point A to point B creates a detectable series of voltage changes. A signal traveling through the air from point A to point B is a detectable electromagnetic wave. Mirroring a switch port or creating a "man in the middle" access point is a very easy thing to do and allows you to look at all traffic going to and from the device you are looking at - as above, thousands of people are doing this all of the time anyway. So, again, if this was happening, many people would have seen it happening and let the rest of us know.
"Nothing is hidden from them if they want to see it."
Incorrect. Data can be hidden from them if you encrypt it with good encryption keys and ONLY YOU control those encryption keys. The metadata associated to that encrypted data can reveal a lot about you but this is where VPN and Tor help - as well as counteracting browser fingerprinting and cookies. These are all techniques that Rob has been teaching for years anyway, where have you been?
"So them claiming that they have a right to demand your passwords is just a sham designed primarily to reinforce the peoples belief that their computers are secure otherwise."
Wrong. They are demanding your passwords and your encryption keys because the LOONY ideas that you've ranted on about above are near impossible to implement in the real world for the reasons I have given. Having those to hand would mean they don't need the back doors that you claim exist anyway - so you're contradicting your own arguments because they would not request passwords and encryption keys if they had those back doors.
"Remember a few years back when Apple and Blackberry were supposedly in negotiations with the government as to whether or not they would allow the government to have access to the encrypted communications massaging systems?"
"Supposed to be"... so you've no evidence that it actually happened, then? Only hearsay?
"Think about that for a minute."
I have. You're a paranoid loony that doesn't understand how the technology works and how it can be intercepted - POTENTIALLY by governments, corporations and individuals.
"Do you really believe that these companies would for a minute not comply with everything that the government demanded of them?"
I believe these companies care about profits which depend upon maintaining their reputations and not paying millions of dollars in fines because of GDPR or PCI-DSS data breaches. They also employ teams of well-paid lawyers such that if we accuse them of data theft then they can point to a bit of small print in an EULA to say "but we told you that here".
Data breaches occur because of bad internal processes and an unwillingness by corporations to spend money on the correct mitigations to avoid such things happening in the first place - but they also cannot hand over that data to anyone who asks for it, which is why search warrants and subpoenas are needed through legal means to get access to data in criminal investigations.
Ultimately, the individual is responsible for protecting their own data and if they do not trust a particular company, then they should not deal with them.
"When is the last time any company simply thumbed it's nose at a court order or government decree? Never."
What's that got to do with anything you've said here? I see a "straw man" argument.
"In this day and age of the Patriot Act, be serious."
No government wants to spend tax payers' money on law enforcement or crime detection because high taxes lose votes - human officers are the biggest cost in that.
Automated systems that collect and analyse logs and recordings are far cheaper to deploy, but to be effective they have to capture and analyse everything possible. Therefore the government wants our PERMISSION to analyse everything that we do and uses the "think of the children" argument to justify it. It is right that we continue to fight against that, and to use encryption and obfuscation as much as possible. That is down to all of us to understand the technology and to become better informed - that is what Rob does here, he provides that information.
"These 'negotiations' were nothing more than 'fake news' with the intent of making people believe that these companies were on their side and that the government is limited in what capabilities they have for spying on the population."
And you, Trump and any loony on social media can claim any piece of news is fake, so it's a completely meaningless point that you finished with anyway. The solution is to be better informed and "read between the lines" of any information that comes from a source that you don't trust.
In summary, you're "all mouth but no trousers" as we say where I am from - lots of words whining about the problem but nothing about solving the problems.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@hitogokochi "But that's why we pay for broadband, as opposed to dial-up"
That's a side issue - we are talking about processing on the client side or the server side - how much bandwidth is available really isn't relevant to the discussion.
"unfortunately, some bad comes with the good."
That means nothing, it's a throwaway statement.
"Anyway, it's a bit different to a third party hijacking our computers for nefarious ends."
Why? How many people actually know what is being processed on their PC when they access a web site? Have you never heard of "drive-by attacks" when someone can me made to run malicious Javascript on their own PC from a seemingly innocent web site that has been compromised?
What about ransomware? How does that get onto PCs?
"There is worthless EU legislation, for example, forcing every website to tell its users that cookies are being stored on their computers, when browser fingerprinting is the real threat to online privacy, along with software calling home without our knowledge or consent."
I am in the EU, it is very valid legislation and good for privacy.
One does not negate the other, they are separate privacy techniques - one controls cookies, the other controls the browser identity.
It's a bit like someone saying that you don't need seat belts in a car if you have airbags. Completely nonsensical logic that doesn't apply in the first place.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@DarkerCry And you are more than welcome to voice your opinion of course.
But in a public messaging space, you don't get to say what others can or cannot say here, unless you have no self awareness and don't see how that makes you sound very self-entitled and a complete hypocrite.
Of course my experience counts for something here, absolutely! And I will mention that whenever I feel it's appropriate to add strength to my points. I do not have to take instructions from you on how to either make or not make my points.
You are free to ignore my comments, or disbelieve them, I really don't care. This advice I give is done as a "good Internet citizen" and once it is written here, my job is done.
If you choose not to take that advice, I will still sleep soundly tonight.
Good, I'm glad that is sorted, and it's the last time we talk about "me" because you know nothing about "me" and therefore cannot debate the topic of "me".
Next time stay on topic and do try to keep up, there's a good chap because we were talking about computers anyway.
Discussion closed.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1