New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
You're an idiot who has heard that word here and there and now abuse it in every post you make.
@sman you are an idiot who thinks that its government has the right to spy the whole world.
You're not looking at the big picture. Or maybe you're trolling. Either way, you're wrong (IMO). First, with respect to your 'highly illegal' qualification: in theory, it's sound...assuming there are adequate procedural safeguards in place to prevent the dissemination of data suggesting relatively benign criminal activity. But there's not. Second, with respect to 'they don't read anything they don't suspect...'. Erm, I'm not sure what you've read to inspire such confidence, but you're misinformed. The three-degrees of Kevin Bacon strategy they employ means that they invariably will reach material and persons that have nothing to do with "big time bad guy stuff."
Again, the problem here isn't bad faith. I don't doubt that the analysts who have access to this data have anything but the best intentions. The problem is the inadequacy of the procedural safeguards. People naturally test the limits of their authority, particularly when that authority is critical to the public welfare. That's to say: IMO, it's not the NSA who's to blame; it's the legislators and FISA court that enabled them.
Maybe it's time you moved on to the whmcs source code conspiracy theory thread. I mean it's been like 48 hours already so time for a new shiny object for your outrage addiction.
I wonder if I can get back the $1.99 that I paid for an SSL cert The weakest link of the chain is still the part in between the chair and the keyboard.
@sman: have you ever read 1985 by George Orwell? Or do you just remember V for Vendetta?
Total control is never something good.
Maybe 1984 ?
You would have to be crazy sane not to worry about fictional book plots coming true.
Without using quantum supercomputers, AFAIK, it's really hard to "break" symmetric key encryption using really long key.
Don't get worried about that. If it were a mathematical work with theoretical proof of concept, I would be interested. Mass media 'hot news' are mostly junk.
More out from Der Spiegel: http://www.spiegel.de/international/world/a-920971.html
Encryption standards like AES and Blowfish are still secure. Just don't use encryptions like RC4. I guess the NSA puts more effort into breaking these old ones because they know that decrypting AES256 is mostly a waste of time. Trust the mathematics!
Sorry man, mistyping from the phone
No no, don't trust the math. Trust some people who make a living posting click bait on the internet and cannot balance their check book. Yes even the NYT is to blame for this hyperbole quite often. They know nobody will care after 24hrs when credible scientists disprove the story.
You should not believe everything your read on the internet regardless of the source.
You are right, I dont believe you.
This is an interesting thread in its own right, and I did not want to hijack it for my own purposes, so I started another thread. I am interested in learning more about the threats and mitigations from a VPS customer point of view, where the VPS provider may be untrusted. My thread is about tools, techniques, and risk management. If you are interested in the practical aspects of securing your customer VPS from your VPS provider, please join me there.
http://lowendtalk.com/discussion/13275/securing-your-unmanaged-vps-vps-provider-threats-and-mitigations
You're right. My post was insane. Clearly, my paranoid outrage got the better of me.