The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
The Forum - On Line Opinion's article discussion area



Syndicate
RSS/XML


RSS 2.0

Main Articles General

Sign In      Register

The Forum > General Discussion > NSA Micosoft Windows Back Door Spying

NSA Micosoft Windows Back Door Spying

  1. Pages:
  2. 1
  3. 2
  4. Page 3
  5. 4
  6. 5
  7. 6
  8. All
WmTrevor - You show your complete stupidity in the event it arrived at someones desk they would be able to understand the context it was written, unlike yourself.

Please activate brain before applying fingers to keyboard in future so as to save yourself more embarrassment.
Posted by Philip S, Sunday, 30 June 2013 6:59:34 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Clare Daly of the Irish Parliament absolutely rips into Obama calling him a hypocrite and war criminal. This is worth seeing. http://www.youtube.com/watch?v=GF5PChW5WDY

Now,there is no doubt that Daly has ruffled some feathers. Organisations like the NSA can use their access to Microsoft to get dirt on people like her and thus silence them. In the wake of 911, we've lost a lot of rights and privacy which cannot be justified.
Posted by Arjay, Sunday, 30 June 2013 9:01:31 PM
Find out more about this user Visit this user's webpage Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Microsoft has been sending info "home" since "95" You agree to it when you sign up.
Gates did a deal with Chins to register for updates every pirated copy of windows in China for 20 cents. A cunning way to have 200 million machines going "home" for regular visits.
Your home phone can be switched on remotely anytime they want to listen in. Your TV is in constant contact with the transmitters when in sleep mode just as is your mobile phone, even your web cam can be triggered by some "smartie" wanting to see what you are up to.
Every anti virus program has its own built in malware.
In Canberra at Deakin there is a massive computer housed in an eight story building gathering all that cyber data. For what purpose I don't know maybe its just for fun like building Lego models.
Posted by chrisgaff1000, Monday, 1 July 2013 10:27:03 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Arjay, if it worries you buy an Apple.

Microsoft is a compendium of apps and routines from 2000 plus developers, ie. “Open” Software. Apple is proprietary software owned, certified and maintained by Apple.

If you think that MS applications are stitched together “seamlessly” you are kidding yourself. There are so many “joins” that very little spyware is needed to crack it. Since the 1980’s you could open the back door, do what you want inside and close the door when you leave.

The only thing that protects the humble “stand alone, internet connected” home PC is that few are interested in looking inside them. That’s not to say that there aren’t plenty of people having fun with downloading stuff that screws your PC but most business PC’s are just workstations to a server. It’s the system administrator’s job to keep the server as secure as possible, not the PC’s.

Below your applications and routines is a seven layer OSI “stack”, below that is the POPS interpretive layer and below that is the “machine code” which speaks your computer chips language and “interprets” the application needs.

Every layer, every driver routine, every individual chip and every application is a potential point of entry. If you really understood just how frail and insecure PC’s were, you would never connect to the internet or would throw yours in the bin.

Add to that the fact that every nation on the planet has been spying and stealing data and intellectual properties, now we have private citizens and corporations doing it.

More to worry you should be the idiot that “modifies” the machine code in the “function specific” chips that drive almost every appliance and transport we use.

Then we might see cars failing, you know like VW, das auto, das recall? Oh sorry, I forgot that we just did that one.

Get over it; accept the reality and stop being so paranoid because the world has already decided it’s out to get you.
Posted by spindoc, Monday, 1 July 2013 1:14:04 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Trevor Arjay disappeared some years back. A CIA operative has been using that ID for the last few years to see who they flush out.

Now you will never be sure will you ;)

R0bert
Posted by R0bert, Monday, 1 July 2013 2:07:19 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
In all seriousness, that won't work, spindoc.

>>Arjay, if it worries you buy an Apple.<<

That is not where the problem lies any longer. Here's what Edward Snowden told us:

“We hack network backbones — like huge Internet routers, basically — that gives us access to the communications of hundreds of thousands of computers without having to hack every single one.”

http://www.dailykos.com/story/2013/06/23/1218102/-US-NSA-Accused-of-Criminal-Privacy-Violations-in-Dozens-of-Nations-Snowden-Blowback#

There's an awful lot of stable doors being shut right now, but the horse has well and truly bolted. The problem is in the exponential growth of online traffic, and the fact that communications security is the last thing on the mind of your average app developer. Building security retrospectively into the networks is a mammoth - and expensive - task. No-one is likely to tackle it, the backlash would be too great, both from the taxpayer if the governments attempt it, or the majority of users if it is conducted commercially.

And you do appear to have options, even now. Lots of discussion about TOR, for example.

https://www.torproject.org/

What you cannot know for absolute certain, however, is whether TOR is what it claims on the packet, or whether it is a cunning scheme by the US Government to entrap people into using a facility they have already cracked...

Interesting times. Especially for paranoids.
Posted by Pericles, Monday, 1 July 2013 5:26:26 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
  1. Pages:
  2. 1
  3. 2
  4. Page 3
  5. 4
  6. 5
  7. 6
  8. All

About Us :: Search :: Discuss :: Feedback :: Legals :: Privacy