![]() |
Ben-Menashe is not a complete liar. I don't see it as black and white. Many of his claims have checked out: see Vanunu, Maxwell, Iran-Contra etc.
Anyway this is turning into a political argument which it wasn't intended to be ... I just wanted to know how secure the computer system is for macs. It looks like it's a case of backing the data up and being aware that anyone can spy on your computer if you use the internet. And I believe man landed on the moon :) |
oops, what happened? Sorry wrong thread for some reason.
|
.
As I recall, the NSA has publicly posted a number of excellent guidelines to system security. (You’re welcome to search and download those.) I do not have an inbred trust of government agencies, particularly those dealing in the intelligence field. However, in this instance I am actually inclined to believe that the NSA’s involvement is benevolent. Why? A vast number of American companies are, in one way or another, involved as providers to the military sector. The NSA has a vested interest in keeping those systems secure. Which means closing, rather than opening, back doors. What ThreeDee writes seems to confirm that. -- ArcticStones . |
Quote:
I won't get into the NSA debate, since that's all over the Internet, but C is not some kind of impenetrable cryptic construct. Typical conspiracy theorist stuff, taking one or two pieces of disturbing truth and then freaking out like a defective toy robot. I'd love to see the inside of this guy's apartment. I wonder how many deadbolts are on his door. http://content.imagesocket.com/image...oil_hat2a8.jpg |
.
Macuserhere, one little matter of protocol: Unless these articles are public domain, they should not be quoted at such length. Rather, copyright material should be linked to, summarised, and/or quoted briefly. :) ArcticStones |
Quote:
And I guess that people with the ability to know whether macs can be spied on, mainly experts who work for Apple, would not divulge this for obvious reasons. They want to protect the company and not reveal things that would make its customers lose confidence in their product (although we don't have much choice anyway, and also Apple may not have had a choice either). Anyway, I just threw that out there as I thought it might spark some interesting discussion by Apple 'insiders' who could give details about the security of macs or how to make them more secure and clear up that ambiguity about macs in the last part of the article in the OP. But it seems to have sparked off more of a political debate than a technological debate so perhaps I was better off posting this in a technologically-minded conspiracy forum in the first place. * And Linux being open source (more eyes can pick up anomalies than fewer ones can) does make it less likely for the software to have been compromised. That makes me have faith in that system although I wouldn't have a clue as to how to operate that software. Quote:
|
There is always paper and pencil. ;)
|
Or use Linux and keep clear of the random-number generator Dual_EC-DRBG.
Backdoor to Vista Quote:
random number generator. Quote:
Do macs use this random number generator? And what are the implications of the new macs that have the option of switching to a Windows OS? Another article about NIST and the random number generator: NIST encryption standard may have NSA backdoor Quote:
|
|
Quote:
Quote:
There will always be the possibility that some one could be spying on you, and they may or may not be using computers to do it. If you're worried that somebody might be, get a router and use Little Snitch. That will add a couple of difficult layers of defense for them to penetrate. |
Quote:
|
Let me say this:
Any computer can be spied upon, no matter what. Even with some super-complex firewall, anti-intrusion programs, etc, even if there is no actual NSA backdoor, someone is always going to find a way in. Security programs just make it harder for someone to hack into your system. There are possibly many other flaws and holes to exploit. It might be pretty difficult to find them, but it is possible. Oh, and: What exactly is the NSA trying to find by spying on us? They can easily go through government files and find our SSN, credit card numbers, etc. without having to hack into our computers. |
1 Attachment(s)
It seems this goes much deeper than I gave credit. We're through the looking glass here, people...
|
Re: The technological debate
Quote:
Then again, I assume that all my digital communication passes through NSA filters (without attracting interest), be they word or phrase trigger filters or whatever. I really do wish that I had the prerequisite knowledge to go into the technological side of this. But I don’t, so I readily admit that what I have ventured so far is mere conjecture. I’ll be reading with fascination the thoughts of those of you who are qualified do so. Thanks for well-organised posts and links to a wealth of material on the subject! :) -- ArcticStones |
Considering that AES 128 is approved by the NSA for classified documents up to Secret, and AES 256 is approved for Top Secret, I consider it highly unlikely that these security measures have a backdoor for NSA or any other US government agency. Even if they did, the secrecy of the ability to do so would be so valuable that it could be utilized only extremely rarely such that only a handful of people in the world would be at risk of being compromised by such measures.
|
Is this really something that needs to be debated?
AT&T domestic spying Uncle Sam trying to protect it's stool pidgeons COINTELPRO Yellow Dots on my resume? Does NSA have a back door? Who cares! They can spy on us whenever they want. |
Quote:
|
Quote:
Quote:
|
"The only secure computer is one that's unplugged, locked in a safe,
and buried 20 feet under the ground in a secret location... and i'm not even too sure about that one" -Dennis Huges, FBI. I've heard this quote in many different forms...but Mr. Hughes (if he really exists ;)) will get credit this time. I guess my "who cares" statement wasn't meant to disregard your quest for knowledge Arctic...but more to say that if they want to spy, "they" will find a way...and they have been finding ways. I've read that it's possible to monitor one's activity by monitoring emitted radiation from CRT monitors. I'm not sure if anything similar exists for LCDs. |
Quote:
Seeing through walls |
| All times are GMT -5. The time now is 11:16 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.