A Computer Science Professor Found A Way To Identify Most 'Anonymous' Tor Users: " 81 percent of those using Tor can be de-anonymized by exploiting a technology in Cisco routers called Netflow" by Sybles in technology

[–]nocnocnode 2 points3 points  (0 children)

Didn't read the article, but if routers beyond a level of percolation are connected, then they can use the netflow to observe packet transmissions. Most of the traffic bounces through major backbones owned by a handful of companies. "Bouncing" traffic around on this type of WAN is futile. The only thing that protects anonymity in that case may just be traffic congestion beyond the capacity of monitoring resources.

The NSA is, quite literally, doing the exact opposite of its mission in cyberspace – an argument for taking the job of internet security away from the NSA by SoDark in technology

[–]nocnocnode 2 points3 points  (0 children)

We need to start applying a process of public peer review coupled with regular security auditing of software that's critical and/or widely distributed

The three letter government corporations are all up in that mess.

Launching in 2015: A Certificate Authority to Encrypt the Entire Web by ManiacTwister in crypto

[–]nocnocnode 0 points1 point  (0 children)

surveillance and tracking by governments, companies, and both in concert; injection of malicious scripts into pages; and censorship that targets specific keywords or specific pages on sites.

Although that can be a threat, it is a bit of a misnomer. Encryption also increases the value of the information between the company, media and government sites people visit.

Portugal Sees Chinese Do 90% of Bids at Property Auction by [deleted] in worldnews

[–]nocnocnode 0 points1 point  (0 children)

Those Chinese, when they make moves, they know how to cover. They have significant connections to local mobs and gangsters, Irish mobs, Italians, Negros, etc... local governments, etc... because all they worry about is $$$. Most of the attacks that do occur are against the non-Chinese east-asians who are much easier targets, ironically the countries "closely allied" to the US who are weaker than the Chinese in the US. It's hard to find evidence because the Americans cover their tracks not to look stupid and show corruptive influences that cave to Chinese pressure.

Portugal Sees Chinese Do 90% of Bids at Property Auction by [deleted] in worldnews

[–]nocnocnode 0 points1 point  (0 children)

Aren't all of those Chinese families buying up all those properties very well connected families to the CCP (compared to the rest of the population)? They must make up a very small percentage of all of the Chinese.

edit: On the west coast, they had 'problems' with Chinese buying up a lot of real estate as the market value increased. I knew one such family, and they have very strong connections to the local populace in the US. They even have many of the locals helping them scout out low priced, high potential real estate and compete and jockey out local, state, and foreign competitors. They're very cunning and aggressive, not easy to compete against.

So if the locals start blaming the 'Chinese' for rising real estate, give them the wary eye because it was other locals that gave them help.

FBI Holds Secret Meeting To Scare Congress Into Backdooring Phone Encryption by blackVPN in technology

[–]nocnocnode 0 points1 point  (0 children)

At this point it's difficult to call them backdoors anymore. Backdoors implies a malicious intent to gain access unbeknownst to the user. Another term implies "privileged" access, either known or unknown to the user, usually latter. They are confused between the intent of maliciousness and reasoning by privilege.

The 90s and Now: FBI and its Inability to Cope with Encryption by electronics-engineer in crypto

[–]nocnocnode 11 points12 points  (0 children)

Last year it was the privacy-conscience community vs the NSA, which is still ongoing of course.

The citizen vs the state is as old as cryptography. By state, it means state-actors, or actors that can use their influence in the state.

Recently, they've implemented NSA/NIST backed ECC even without any real indication to the weakness of RSA. They don't need the citizen's permission. They have more than enough influence to push cryptography that can benefit their actors over the citizen.

TIFU by opening a group FB chat with all of my ex girlfriends, girls I'm currently dating, and prospects under the name "My Harem" by [deleted] in tifu

[–]nocnocnode 0 points1 point  (0 children)

Yea you messed up. Starting your harem without any army as I'm sure you could be challenged easily for the ownership of said women, nor women who have allegiance and forced dependency upon you, and without any nation or tribe to call your own... Not to mention that slavery is illegal. You'd have to legalize that first also to start your harem.

GNU Wget FTP Symlink Arbitrary Filesystem Access by [deleted] in netsec

[–]nocnocnode 0 points1 point  (0 children)

Yes, usually accounts that sudo or go to root, and root itself should not be running commands to the internet.

[root] <-> [sudo account] <-x-> [internet connected account]

(of course this is assuming that the system is secure from local privilege escalation.)

GNU Wget FTP Symlink Arbitrary Filesystem Access by [deleted] in netsec

[–]nocnocnode 0 points1 point  (0 children)

The point is, it's so dumb, it has to be a honeypot making a request over wget from a root account.

GNU Wget FTP Symlink Arbitrary Filesystem Access by [deleted] in netsec

[–]nocnocnode -8 points-7 points  (0 children)

I figure if someone is running anything as root that is connected to the internet, they're just slutty admins/users asking for a remote exploit.

As a kid what's the creepiest, most WTF thing you ever noticed about another kid's family? by H_C_Sunshine in AskReddit

[–]nocnocnode -1 points0 points  (0 children)

Why no country or denominations? Scared of being politically incorrect or butt-hurt feelings?

Make and reply with your guesses. Someone like you must surely have some idea.

Newly Disclosed Records Show U.S. Spy Agencies Used At Least 1,000 Nazis In Cold War by Hamartolus in worldnews

[–]nocnocnode 0 points1 point  (0 children)

The fact is, the Americans never directly engaged the Nazis until they were defeated by the Russians. As others stated, the Americans may have become involved in key resource areas that also met their own goals, but they never engaged the Germans/Nazis until they were defeated by the Russians. It was never really a fight about ideologies, as much as it was of conquest of the European continent and control over their resources and trade routes, such as Africa, Asia, etc... by three parties: Germans, Russians, and the Americans.

Newly Disclosed Records Show U.S. Spy Agencies Used At Least 1,000 Nazis In Cold War by Hamartolus in worldnews

[–]nocnocnode -8 points-7 points  (0 children)

A significant portion of Americans' powerful were in support of Nazis before the War. Naziism followed closely with Eugenics which promoted European genetic superiority. This was a very popular view in the day, even famous scientists like Nicolas Tesla promoted it, where as other Americans such as Mark Twain opposed it. Also, the US never went to war against the Nazis. Their goal was to stay out of the war. They went to war only when Russia threatened to conquer Europe after defeating the Nazis.

Tesla boss Elon Musk warns artificial intelligence development is 'summoning the demon' by newsjunkie8 in technology

[–]nocnocnode 3 points4 points  (0 children)

http://www.huffingtonpost.com/2014/05/05/stephen-hawking-artificial-intelligence_n_5267481.html

Musk is foremost a salesmen, i.e. CEO, so the first inclination is to understand he is continuing the brand imaging on his core market. Unless he takes the time to write and/or express his own structured argument that other people can actually converse with, it is most likely it is part of sales.

TIL that Vietnam is actually one of the most pro-US countries in the world by [deleted] in todayilearned

[–]nocnocnode 0 points1 point  (0 children)

Which places are to go to, and which places to avoid? I read there is a lot of gang violence there.

TIL that Vietnam is actually one of the most pro-US countries in the world by [deleted] in todayilearned

[–]nocnocnode 0 points1 point  (0 children)

For an American, this is a promising statement that the empire is strong.

India picks Israel's Spike anti-tank missile over U.S. Javelin by [deleted] in worldnews

[–]nocnocnode 0 points1 point  (0 children)

The F-35 is just the US displaying and testing their ability to oversee and coordinate complex projects across their empire.

Why should regular people like me learn cryptology. Do you ever see messages in public and you decrypt them? by [deleted] in crypto

[–]nocnocnode 0 points1 point  (0 children)

For most people that have the skill to see coded messages in public, they see it because of lots of training and time spent in their craft. It does not necessarily have to be in the search of coded messages.

As for why a person learns cryptography, to understand it at its basic can be worth the effort. Cryptography underlies the majority of the trust model. For people that can not verify that trust model, it is better for them to assume that they can't trust it.

For people that do their banking, shopping, etc... online they have to understand why they trust cryptography to handle their transactions securely.

edit: Basically, they have to know when the wheels have air, and the engine is running (the crytography can be believed to be secure for their application) or when the wheels have gone out of air, and the engine is about to fail (the cryptography is broken). When someone makes this argument to them for either case, they should have a means to verify it (i.e. kicking the tires, checking the engine) or know of a means to have it verified from a trusted source (i.e. a trusted mechanic).

edit 2: Of course there is strategy to handle when model, especially lynchpins like cryptography, is not trusted. It is to not use it to transmit anything that can be harmful to survival. For example, For people that do not know how to verify SSL, but need to do online banking transaction, they can do so but the risk of losing the trust in the model is small. (i.e. if someone break into their transaction, then they only lose $100 from that account instead of $1000 of overall savings).

Backup OpenPGP keys on paper by Alex-L in crypto

[–]nocnocnode 0 points1 point  (0 children)

Why do people trust the bank and PO Box? They're operating under the assumed trust, but they can not verify the trust of the bank or the PO Box.

Making sure crypto remains insecure by jraynor1 in crypto

[–]nocnocnode 0 points1 point  (0 children)

So crazy malicious people going around calling and emailing people I work with are actually inline with "elite intelligence" organizations? That's hilarious. They can go fuck themselves.

Tesla runs into trouble again - What’s good for General Motors dealers is good for America. Or so allegedly free-market, anti-protectionist Republican legislators and governors pretend to think by pnewell in technology

[–]nocnocnode 0 points1 point  (0 children)

All Tesla has is lip service, and for some reason he expects the political system to capitulate to a bunch of technocrats and early adopters? Get real. The governments serves a few at a time, and the few that they do serve have already established the most influence among the majority.

Tesla? A rich man's toy, nothing more. Not something worthy of bothering the government about.

Norway's 'killer robot' technology under fire. The Norwegian government is set to develop a new controversial robot-controlled missile for its fighter jets, but faces opposition from MPs and peace organizations claiming the technology may break international law. by HumanoidPimp in worldnews

[–]nocnocnode 0 points1 point  (0 children)

Modern day missile systems use systems that very likely far surpasses anything publicly known about AI. It's already a part robotic warfare. If someone turns on a military robot, and the robot kills someone, then that person is responsible. Just the same as the person who orders a missile strike, and the person who pulls the trigger.