|
|
| 30c3: To Protect And Infect, Part 2 |
|
bamccaig
Member #7,536
July 2006
|
{"name":"you-think-this-is-a-motherfucking-game.jpg","src":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382.jpg","w":460,"h":416,"tn":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382"} -- acc.js | al4anim - Allegro 4 Animation library | Allegro 5 VS/NuGet Guide | Allegro.cc Mockup | Allegro.cc <code> Tag | Allegro 4 Timer Example (w/ Semaphores) | Allegro 5 "Winpkg" (MSVC readme) | Bambot | Blog | C++ STL Container Flowchart | Castopulence Software | Check Return Values | Derail? | Is This A Discussion? Flow Chart | Filesystem Hierarchy Standard | Clean Code Talks - Global State and Singletons | How To Use Header Files | GNU/Linux (Debian, Fedora, Gentoo) | rot (rot13, rot47, rotN) | Streaming |
|
Arthur Kalliokoski
Second in Command
February 2005
|
Over an hour? I'll just get the Readers Digest condensed version from the upcoming comments. They all watch too much MSNBC... they get ideas. |
|
Mark Oates
Member #1,146
March 2001
|
Eeeehhhhh... I dunno. He sounds a bit fanatic and I would prefer he give working examples rather than Alex Jones evidence (It must be fake, it has layers). Where's the TED talk or YouTube video where a guy demonstrates any of these things? Where's the code? What's the architecture? What's the scope? Are they using UIMA (Apache license, might be compatible with GPL!)? -- |
|
Crazy Photon
Member #2,588
July 2002
|
Thank you for sharing! is there a Part 1? ----- |
|
bamccaig
Member #7,536
July 2006
|
No clue. I was wondering the same thing, but I didn't immediately see it being recommended by Google. I know that a lot more of this type of content exists though because YouTube did lead me on a trip. With each talk being about an hour you can easily lose an evening or weekend or week. Some of these people are involved in the development of the onion routing framework, Tor, so there are plenty of talks about Tor and why it's important and on and on. I'm not sure what it stands for, but 30c3 seems to be in many of them. Perhaps it was some kind of privacy/security conference? ...Googles... Perhaps Chaos Communication Congress, a hacker meeting hosted by the Chaos Computer Club. -- acc.js | al4anim - Allegro 4 Animation library | Allegro 5 VS/NuGet Guide | Allegro.cc Mockup | Allegro.cc <code> Tag | Allegro 4 Timer Example (w/ Semaphores) | Allegro 5 "Winpkg" (MSVC readme) | Bambot | Blog | C++ STL Container Flowchart | Castopulence Software | Check Return Values | Derail? | Is This A Discussion? Flow Chart | Filesystem Hierarchy Standard | Clean Code Talks - Global State and Singletons | How To Use Header Files | GNU/Linux (Debian, Fedora, Gentoo) | rot (rot13, rot47, rotN) | Streaming |
|
Thomas Fjellstrom
Member #476
June 2000
|
There is a part one, I watched it, but I can't be bothered to go find it -- |
|
bamccaig
Member #7,536
July 2006
|
-- acc.js | al4anim - Allegro 4 Animation library | Allegro 5 VS/NuGet Guide | Allegro.cc Mockup | Allegro.cc <code> Tag | Allegro 4 Timer Example (w/ Semaphores) | Allegro 5 "Winpkg" (MSVC readme) | Bambot | Blog | C++ STL Container Flowchart | Castopulence Software | Check Return Values | Derail? | Is This A Discussion? Flow Chart | Filesystem Hierarchy Standard | Clean Code Talks - Global State and Singletons | How To Use Header Files | GNU/Linux (Debian, Fedora, Gentoo) | rot (rot13, rot47, rotN) | Streaming |
|
FMC
Member #4,431
March 2004
|
Any chance of a short summary for people who cannot spend one hour on a video? [FMC Studios] - [Caries Field] - [Ctris] - [Pman] - [Chess for allegroites] |
|
Dennis
Member #1,090
July 2003
|
The summary is: On the internet (or actually regardless of whether you are on the internet or not), the NSA knows you're a dog. He talks about how the NSA mass-observes everything and everyone and what exploits and flaws in hard- and software they employ to do so and speculates which companies supposedly cooperate with the NSA to "accidentally" leave such flaws in their products instead of fixing them, so they can continue to use the security holes to go about their business of mass-observation. And then there are also proprietary products which are specifically build to include and/or create/add hard to detect/remove back-doors (for example for use by the NSA) into any system (your computer, cellphone, wireless router, ...). There is no proof of any of the information given to be true. All that is shown are bullet point list of "facts", photos and schemes of hardware and network topographies and a bunch of screenshots of supposedly classified documents. Some sources for those things are mentioned. I did not check any of them. I personally do not find it unreasonable to believe these things to be true as it is well within the nature of an organization like the NSA to try to do everything they possibly can to collect as much information they possibly can by any means necessary (legally or illegally). --- 0xDB | @dennisbusch_de --- |
|
Thomas Fjellstrom
Member #476
June 2000
|
Dennis said: There is no proof of any of the information given to be true except for all of the official leaked documents from the NSA. Most/all of that has been confirmed. -- |
|
FMC
Member #4,431
March 2004
|
Thanks Dennis! [FMC Studios] - [Caries Field] - [Ctris] - [Pman] - [Chess for allegroites] |
|
|