Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsSelling Your Secrets: The Invisible World of Software Backdoors and Bounty Hunters
from TomDispatch:
Selling Your Secrets
The Invisible World of Software Backdoors and Bounty Hunters
By Pratap Chatterjee
Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night. Imagine that, once inside, you could observe everything happening, unnoticed by others -- from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybodys actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.
That scenario out of some futuristic sci-fi novel is, in fact, almost reality right now. After all, globalization and the Internet have connected all our lives in a single, seamless virtual city where everything is accessible at the tap of a finger. We store our money in online vaults; we conduct most of our conversations and often get from place to place with the help of our mobile devices. Almost everything that we do in the digital realm is recorded and lives on forever in a computer memory that, with the right software and the correct passwords, can be accessed by others, whether you want them to or not.
Now -- one more moment of imagining -- what if every one of your transactions in that world was infiltrated? What if the government had paid developers to put trapdoors and secret passages into the structures that are being built in this new digital world to connect all of us all the time? What if they had locksmiths on call to help create master keys for all the rooms? And what if they could pay bounty hunters to stalk us and build profiles of our lives and secrets to use against us?
Well, check your imagination at the door, because this is indeed the brave new dystopian world that the U.S. government is building, according to the latest revelations from the treasure trove of documents released by National Security Agency whistleblower Edward Snowden. ......................(more)
The complete piece is at: http://www.tomdispatch.com/post/175803/tomgram%3A_pratap_chatterjee%2C_the_wild_west_of_surveillance/#more
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
5 replies, 846 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (12)
ReplyReply to this post
5 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
Selling Your Secrets: The Invisible World of Software Backdoors and Bounty Hunters (Original Post)
marmar
Feb 2014
OP
Its to keep us safe from terrorists doncha know. For our own good. And will never be abused
riderinthestorm
Feb 2014
#2
dixiegrrrrl
(60,010 posts)1. You come upo with the most interesting posts..
I do appreciate it.
riderinthestorm
(23,272 posts)2. Its to keep us safe from terrorists doncha know. For our own good. And will never be abused
Carl Bernstein said so....
dixiegrrrrl
(60,010 posts)3. aaaahhh...........a suggested solution:
So in a world where, increasingly, nothing is private, nothing is simply yours, what is an Internet user to do?
As a start, there is an alternative to most major software programs for word processing, spreadsheets, and layout and design -- the use of free and open source software like Linux and Open Office, where the underlying code is freely available to be examined for hacks and flaws. (Think of it this way: if the NSA cut a deal with Apple to copy everything on your iPhone, you would never know.
If you bought an open-source phone -- not an easy thing to do -- that sort of thing would be quickly spotted.)
You can also use encrypted browsers like Tor and search engines like Duck Duck Go that dont store your data.
As a start, there is an alternative to most major software programs for word processing, spreadsheets, and layout and design -- the use of free and open source software like Linux and Open Office, where the underlying code is freely available to be examined for hacks and flaws. (Think of it this way: if the NSA cut a deal with Apple to copy everything on your iPhone, you would never know.
If you bought an open-source phone -- not an easy thing to do -- that sort of thing would be quickly spotted.)
You can also use encrypted browsers like Tor and search engines like Duck Duck Go that dont store your data.
That is reassuring.
cui bono
(19,926 posts)4. If you get an Android phone you can root it and flash a custom ROM.
Pretty sure the devs would know/find if the OS was going to allow anything like that. They clean out all the bloat and add lots of features.
However, I think some of this stuff that's going on is hardware based, so is there a way for them to do something without software on our electronics?
dixiegrrrrl
(60,010 posts)5. I barely understand how they are spying on us
and get lost in the details of software and etc.
All I know is they are working harder at snooping than we are at blocking the snooping.
I used to worry they would attack the internet.
Now it seems they are happy as hell for us to be on it because they can look over our shoulder.
Pirate Bay is supposed to be coming out with a snoop proof browser soon....I am eagerly waiting.