<?xml version="1.0"?>
<rss version="2.0">
	<channel>
		<title>30c3: To Protect And Infect, Part 2</title>
		<link>http://www.allegro.cc/forums/view/614837</link>
		<description>Allegro.cc Forum Thread</description>
		<webMaster>matthew@allegro.cc (Matthew Leverton)</webMaster>
		<lastBuildDate>Wed, 03 Dec 2014 23:31:32 +0000</lastBuildDate>
	</channel>
	<item>
		<description><![CDATA[<div class="mockup v2"><p><span class="remote-thumbnail"><span class="json">{"name":"you-think-this-is-a-motherfucking-game.jpg","src":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382.jpg","w":460,"h":416,"tn":"\/\/djungxnpq2nug.cloudfront.net\/image\/cache\/a\/8\/a8001d539a5b844a474064b69bcf1382"}</span><img src="http://www.allegro.cc//djungxnpq2nug.cloudfront.net/image/cache/a/8/a8001d539a5b844a474064b69bcf1382-240.jpg" alt="you-think-this-is-a-motherfucking-game.jpg" width="240" height="217" /></span></p><p><div class="media-player youtube"><div style="margin: 1em 2em; background: url(/images/movie.png); width: 180px; height: 100px; text-align: center;"><a href="http://www.allegro.cc//www.youtube.com/watch?v=b0w36GAyZIA" target="_blank"><img src="http://www.allegro.cc//djungxnpq2nug.cloudfront.net/image/object/c/8/c8ebf64b59734181a969a1e81dbf4eb5.jpg" border="0" alt="video" title="Click to play video" /></a></div></div>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Mon, 01 Dec 2014 06:04:41 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Over an hour?  I&#39;ll just get the Readers Digest condensed version from the upcoming comments.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Mon, 01 Dec 2014 12:54:25 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Eeeehhhhh... I dunno.  He sounds a bit fanatic and I would prefer he give working examples rather than Alex Jones evidence (<a href="https://www.youtube.com/watch?v=3g30VCl_cgk">It must be fake, it has layers</a>).  Where&#39;s the TED talk or YouTube video where a guy demonstrates any of these things?  Where&#39;s the code?  What&#39;s the architecture?  What&#39;s the scope?  Are they using <a href="http://uima.apache.org/">UIMA</a> (Apache license, might be compatible with GPL!)?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Mark Oates)</author>
		<pubDate>Mon, 01 Dec 2014 13:10:33 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Thank you for sharing! is there a Part 1?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Crazy Photon)</author>
		<pubDate>Tue, 02 Dec 2014 19:07:23 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>No clue. I was wondering the same thing, but I didn&#39;t immediately see it being recommended by Google. I know that a lot more of this type of content exists though because YouTube did lead me on a trip. With each talk being about an hour you can easily lose an evening or weekend or week. Some of these people are involved in the development of the onion routing framework, Tor, so there are plenty of talks about Tor and why it&#39;s important and on and on. I&#39;m not sure what it stands for, but 30c3 seems to be in many of them. Perhaps it was some kind of privacy/security conference? <i>...Googles...</i> Perhaps <a href="http://en.wikipedia.org/wiki/Chaos_Communication_Congress">Chaos Communication Congress</a>, a hacker meeting hosted by the <a href="http://en.wikipedia.org/wiki/Chaos_Computer_Club">Chaos Computer Club</a>.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Tue, 02 Dec 2014 22:16:37 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>There is a part one, I watched it, but I can&#39;t be bothered to go find it <img src="http://www.allegro.cc/forums/smileys/wink.gif" alt=";)" /> just look for other 30c3 videos.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 03 Dec 2014 08:40:56 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>This perhaps:</p><p><div class="media-player youtube"><div style="margin: 1em 2em; background: url(/images/movie.png); width: 180px; height: 100px; text-align: center;"><a href="http://www.allegro.cc//www.youtube.com/watch?v=sW-N7qQU-tA" target="_blank"><img src="http://www.allegro.cc//djungxnpq2nug.cloudfront.net/image/object/1/e/1e5d7f495427ff3e1ece7bca1c3bcf29.jpg" border="0" alt="video" title="Click to play video" /></a></div></div>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Wed, 03 Dec 2014 12:25:45 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Any chance of a short summary for people who cannot spend one hour on a video? <img src="http://www.allegro.cc/forums/smileys/smiley.gif" alt=":)" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (FMC)</author>
		<pubDate>Wed, 03 Dec 2014 15:36:54 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>The summary is: On the internet (or actually regardless of whether you are on the internet or not), the NSA knows you&#39;re a dog.</p><p>He talks about how the NSA mass-observes everything and everyone and what exploits and flaws in hard- and software they employ to do so and speculates which companies supposedly cooperate with the NSA to &quot;accidentally&quot; leave such flaws in their products instead of fixing them, so they can continue to use the security holes to go about their business of mass-observation.</p><p>And then there are also proprietary products which are specifically build to include  and/or create/add hard to detect/remove back-doors (for example for use by the NSA) into any system (your computer, cellphone, wireless router, ...).</p><p>There is no proof of any of the information given to be true. All that is shown are bullet point list of &quot;facts&quot;, photos and schemes of hardware and network topographies and a bunch of screenshots of supposedly classified documents. Some sources for those things are mentioned. I did not check any of them.</p><p>I personally do not find it unreasonable to believe these things to be true as it is well within the nature of an organization like the NSA to try to do everything they possibly can to collect as much information they possibly can by any means necessary (legally or illegally).
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Dennis)</author>
		<pubDate>Wed, 03 Dec 2014 15:52:52 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/614837/1007650#target">Dennis</a> said:</div><div class="quote"><p>There is no proof of any of the information given to be true</p></div></div><p>except for all of the official leaked documents from the NSA. Most/all of that has been confirmed.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 03 Dec 2014 20:43:02 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Thanks Dennis! <img src="http://www.allegro.cc/forums/smileys/smiley.gif" alt=":)" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (FMC)</author>
		<pubDate>Wed, 03 Dec 2014 23:31:32 +0000</pubDate>
	</item>
</rss>
