30c3: To Protect And Infect, Part 2
bamccaig

{"name":"you-think-this-is-a-motherfucking-game.jpg","src":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382.jpg","w":460,"h":416,"tn":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382"}you-think-this-is-a-motherfucking-game.jpg

video

Arthur Kalliokoski

Over an hour? I'll just get the Readers Digest condensed version from the upcoming comments.

Mark Oates

Eeeehhhhh... I dunno. He sounds a bit fanatic and I would prefer he give working examples rather than Alex Jones evidence (It must be fake, it has layers). Where's the TED talk or YouTube video where a guy demonstrates any of these things? Where's the code? What's the architecture? What's the scope? Are they using UIMA (Apache license, might be compatible with GPL!)?

Crazy Photon

Thank you for sharing! is there a Part 1?

bamccaig

No clue. I was wondering the same thing, but I didn't immediately see it being recommended by Google. I know that a lot more of this type of content exists though because YouTube did lead me on a trip. With each talk being about an hour you can easily lose an evening or weekend or week. Some of these people are involved in the development of the onion routing framework, Tor, so there are plenty of talks about Tor and why it's important and on and on. I'm not sure what it stands for, but 30c3 seems to be in many of them. Perhaps it was some kind of privacy/security conference? ...Googles... Perhaps Chaos Communication Congress, a hacker meeting hosted by the Chaos Computer Club.

Thomas Fjellstrom

There is a part one, I watched it, but I can't be bothered to go find it ;) just look for other 30c3 videos.

bamccaig

This perhaps:

video

FMC

Any chance of a short summary for people who cannot spend one hour on a video? :)

Dennis

The summary is: On the internet (or actually regardless of whether you are on the internet or not), the NSA knows you're a dog.

He talks about how the NSA mass-observes everything and everyone and what exploits and flaws in hard- and software they employ to do so and speculates which companies supposedly cooperate with the NSA to "accidentally" leave such flaws in their products instead of fixing them, so they can continue to use the security holes to go about their business of mass-observation.

And then there are also proprietary products which are specifically build to include and/or create/add hard to detect/remove back-doors (for example for use by the NSA) into any system (your computer, cellphone, wireless router, ...).

There is no proof of any of the information given to be true. All that is shown are bullet point list of "facts", photos and schemes of hardware and network topographies and a bunch of screenshots of supposedly classified documents. Some sources for those things are mentioned. I did not check any of them.

I personally do not find it unreasonable to believe these things to be true as it is well within the nature of an organization like the NSA to try to do everything they possibly can to collect as much information they possibly can by any means necessary (legally or illegally).

Thomas Fjellstrom
Dennis said:

There is no proof of any of the information given to be true

except for all of the official leaked documents from the NSA. Most/all of that has been confirmed.

FMC

Thanks Dennis! :)

Thread #614837. Printed from Allegro.cc