Re: How NSA access was built into Windows

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2007-01-21 at 01:14 -0500, R. G. Newbury wrote:
> David Boles wrote:
> 
> You are making a mountain out of a mole hill here. If, I said if, the 
> NSA was
> really  interested in what you are doing on your computer they would go to
> your ISP and ask for your records. Your ISP keeps copies of every email that
> you have ever sent. And copies of every email, this one included, that you
> have ever received. They also keep records of every site that you have
> visited. What day and time and how long you stayed. What files you have
> downloaded. Maybe a pirated game? Maybe pirated music files. Maybe a little
> p0rn? Many things. And if the NSA really did want to see what is on your HD
> they would walk in and take it with them when they left.
> - --
> 
> David, For all of your misdirection and ad hominem slurs, you still have 
> not given any answers to the original question. It's all very nice to 
> say that the NSA could get records from your ISP, every email, every 
> website etc. Or just walk in and take your hard drive. But not every ISP 
> in the USA keeps email records for a long time, nor web access logs. 
> They do not have to do that.
> And most will not just turn over such records without a search warrant 
> being served on them.
> And the NSA would need a search warrant to wander in and take your hard 
> drive...But the NSA is forbidden to do those things within the USA, 
> except (as now agreed) under the authority of a FISA warrant.
> 
> Or have you been drinking the cool-aid from moveon.org or the huffington 
> post, that the guys in the black helicopters just do what they want 
> whenever they want and GWB and DC let them.
> 
> And I hope you are not so disconnected from reality to recognize that 
> the NSA has no legal capability of asking for those neat email logs in 
> any other country in the world. So they eavesdrop on every electronic 
> communication they can capture. They do what is illegal for you or I. It 
> their job. So of COURSE it would be extremely useful for the NSA to be 
> able to subvert a particular computer by way of a backdoor. If the NSA 
> was NOT trying to do that they would not be doing their job. And of 
> course that is why the DOJ still lists encryption software as 
> 'munitions' so they can ban exports. (Interesting that the 
> constitutional questionibility of banning the export of what is 
> elsewhere clearly recognized as covered under the First Amendment has 
> never been argued at the appeal level.)
> 
> So lets hear your answer to the question: is it possible that Selinux 
> could have a backdoor in it. and how difficult is it to compile a system 
> that has no selinux modules included.
> The answers does not require any analysis of the probabilities attached 
> to the reasoning that the NSA would not bother to do this.
> 
> Geoff

Excellent and civilized post.  Only problem is that it's directed
towards a troll that normally trolls on the Mandrakeot list.

We are used to seeing minimum content and maximum propaganda from that
vector.

LX
-- 
°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
Off Topic or Political Discussions:
http://mandrakeot.mdw1982.com/
http://www.mdw1982.com/mailman/listinfo/mandrakeot

"Character is what you do when nobody's looking." - J.C. Watts
°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux