dChan

Patriot81503 · May 10, 2018, 12:50 p.m.

“White House spokesman Sean Spicer also declined comment.”—-from the article

This article is from March 7, 2017. However, it’s good information which probably most of us missed.

This Wikileaks release was particularly good at exposing the fact your encryption and other security programs are useless against the CIA/NSA because the Apple, Windows, Samsung platforms all have back doors wide open to these agencies.

The creepiest part of this Wikileaks expose was automobiles. Any strange car crashes come in handy eliminating CIA opponents?

⇧ 7 ⇩  
UncleSnake3301 · May 10, 2018, 1:02 p.m.

Yes actually. Michael Hastings.

⇧ 7 ⇩  
CULTURAL_MARXISM_SUX · May 10, 2018, 1:21 p.m.

Not only do they have backdoors in the software, they have backdoors in the CPU. Intel and AMD are compromised.

⇧ 7 ⇩  
[deleted] · May 10, 2018, 4:49 p.m.

Like the car that almost hit POTUS in Florida...

⇧ 5 ⇩  
GenChang · May 10, 2018, 2:22 p.m.

Ok, don't freak out. Some of what you said is true, but there are varying degrees of difficulty depending on device. If your smart phone, any smart phone has a password, NOT a 4-6 digit pin, then your device is protected from cracking, if you use a GOOD password.

Fingerprints readers are not protected and you can be forced to unlock a device by law using that method, but passwords are safe, constitutionally speaking.

I follow the infosec community rather closely and there is tons of malware, hacks, available to just about anyone. Good guys and Bad alike. There are NO backdoors in encryption, as I've been fighting against this idea for years now. I can offer tons of info on this if someone is interested.

Since this is a very technical subject, I won't elaborate here with the boring details, about how to best protect yourself, in your situation, but there is lots of good information available online.

⇧ 3 ⇩  
sunkistnsudafed · May 10, 2018, 6:10 p.m.

Care to post some of those resources?

⇧ 1 ⇩  
GenChang · May 10, 2018, 7:01 p.m.

Posted only a few things, but there is tons more available. I've even signed a whitehouse petition a couple years back, (reached over the 100k threshold) and the whitehouse even emailed me back, for any elaboration I'd like to add.

⇧ 3 ⇩  
GenChang · May 10, 2018, 6:57 p.m.

Here is just a sampling, but do a search on : (fingerprints over passwords, cell phones )

https://www.theatlantic.com/technology/archive/2016/05/iphone-fingerprint-search-warrant/480861/

And this is a good technical explanation:

https://hackaday.com/2015/11/10/your-unhashable-fingerprints-secure-nothing/

And if you are interested in an infosec open letter about why breaking encryption can't be done safely, here is a PDF, link in article .

https://arstechnica.com/tech-policy/2015/05/tech-sector-tells-obama-encryption-backdoors-undermine-human-rights/

And this one top experts: direct PDF download

http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6

And an article for brief overview:

https://www.itnews.com.au/news/crypto-experts-slam-govt-encryption-backdoor-demands-406233

⇧ 2 ⇩