Allegro.cc - Online Community

Allegro.cc Forums » Off-Topic Ordeals » 30c3: To Protect And Infect, Part 2

This thread is locked; no one can reply to it. rss feed Print
30c3: To Protect And Infect, Part 2
bamccaig
Member #7,536
July 2006
avatar

{"name":"you-think-this-is-a-motherfucking-game.jpg","src":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382.jpg","w":460,"h":416,"tn":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382"}you-think-this-is-a-motherfucking-game.jpg

video

Arthur Kalliokoski
Second in Command
February 2005
avatar

Over an hour? I'll just get the Readers Digest condensed version from the upcoming comments.

They all watch too much MSNBC... they get ideas.

Mark Oates
Member #1,146
March 2001
avatar

Eeeehhhhh... I dunno. He sounds a bit fanatic and I would prefer he give working examples rather than Alex Jones evidence (It must be fake, it has layers). Where's the TED talk or YouTube video where a guy demonstrates any of these things? Where's the code? What's the architecture? What's the scope? Are they using UIMA (Apache license, might be compatible with GPL!)?

--
Visit CLUBCATT.com for cat shirts, cat mugs, puzzles, art and more <-- coupon code ALLEGRO4LIFE at checkout and get $3 off any order of 3 or more items!

AllegroFlareAllegroFlare DocsAllegroFlare GitHub

Crazy Photon
Member #2,588
July 2002
avatar

Thank you for sharing! is there a Part 1?

-----
Resistance is NEVER futile...

bamccaig
Member #7,536
July 2006
avatar

No clue. I was wondering the same thing, but I didn't immediately see it being recommended by Google. I know that a lot more of this type of content exists though because YouTube did lead me on a trip. With each talk being about an hour you can easily lose an evening or weekend or week. Some of these people are involved in the development of the onion routing framework, Tor, so there are plenty of talks about Tor and why it's important and on and on. I'm not sure what it stands for, but 30c3 seems to be in many of them. Perhaps it was some kind of privacy/security conference? ...Googles... Perhaps Chaos Communication Congress, a hacker meeting hosted by the Chaos Computer Club.

Thomas Fjellstrom
Member #476
June 2000
avatar

There is a part one, I watched it, but I can't be bothered to go find it ;) just look for other 30c3 videos.

--
Thomas Fjellstrom - [website] - [email] - [Allegro Wiki] - [Allegro TODO]
"If you can't think of a better solution, don't try to make a better solution." -- weapon_S
"The less evidence we have for what we believe is certain, the more violently we defend beliefs against those who don't agree" -- https://twitter.com/neiltyson/status/592870205409353730

bamccaig
Member #7,536
July 2006
avatar

FMC
Member #4,431
March 2004
avatar

Any chance of a short summary for people who cannot spend one hour on a video? :)

[FMC Studios] - [Caries Field] - [Ctris] - [Pman] - [Chess for allegroites]
Written laws are like spiders' webs, and will, like them, only entangle and hold the poor and weak, while the rich and powerful will easily break through them. -Anacharsis
Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover. -Mark Twain

Dennis
Member #1,090
July 2003
avatar

The summary is: On the internet (or actually regardless of whether you are on the internet or not), the NSA knows you're a dog.

He talks about how the NSA mass-observes everything and everyone and what exploits and flaws in hard- and software they employ to do so and speculates which companies supposedly cooperate with the NSA to "accidentally" leave such flaws in their products instead of fixing them, so they can continue to use the security holes to go about their business of mass-observation.

And then there are also proprietary products which are specifically build to include and/or create/add hard to detect/remove back-doors (for example for use by the NSA) into any system (your computer, cellphone, wireless router, ...).

There is no proof of any of the information given to be true. All that is shown are bullet point list of "facts", photos and schemes of hardware and network topographies and a bunch of screenshots of supposedly classified documents. Some sources for those things are mentioned. I did not check any of them.

I personally do not find it unreasonable to believe these things to be true as it is well within the nature of an organization like the NSA to try to do everything they possibly can to collect as much information they possibly can by any means necessary (legally or illegally).

Thomas Fjellstrom
Member #476
June 2000
avatar

Dennis said:

There is no proof of any of the information given to be true

except for all of the official leaked documents from the NSA. Most/all of that has been confirmed.

--
Thomas Fjellstrom - [website] - [email] - [Allegro Wiki] - [Allegro TODO]
"If you can't think of a better solution, don't try to make a better solution." -- weapon_S
"The less evidence we have for what we believe is certain, the more violently we defend beliefs against those who don't agree" -- https://twitter.com/neiltyson/status/592870205409353730

FMC
Member #4,431
March 2004
avatar

Thanks Dennis! :)

[FMC Studios] - [Caries Field] - [Ctris] - [Pman] - [Chess for allegroites]
Written laws are like spiders' webs, and will, like them, only entangle and hold the poor and weak, while the rich and powerful will easily break through them. -Anacharsis
Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover. -Mark Twain

Go to: