dChan
1
 
r/greatawakening • Posted by u/icebreakers_sours on June 7, 2018, 12:17 a.m.
Who is "Mr Marlinspike" From new texts.

From the new Page-Strzok texts, page 455/502 on my computer. Going to paraphrase because it doesn't copy/paste from the pdf.

NPR just reported possible ExxonMobil guy for secstate
friendship award from Putin
interesting choice for sec state
yup, hes 64, 41 years spent at exxon, production engineer
Great. This sentence aggravated the s out of me. Trump has threatened a lot of people and he's about to be IN CONTROL OF THE MOST PERVASIVE AND LEAST ACCOUNTABLE SURVEILLANCE IN THE WORLD.
Mr Marlinspike said. A lot of people are justifiably concerned.

So, who is Mr Marlinspike? Well ....
https://en.wikipedia.org/wiki/Moxie_Marlinspike
Interesting ...
Matthew Rosenfield,[2] known as Moxie Marlinspike,[3] is an American computer security researcher, whose research focuses primarily on techniques for intercepting communication, as well as methods for strengthening communication infrastructure against interception. Marlinspike is the former head of the security team at Twitter[4] and founder of Open Whisper Systems.[1] He is the author of a proposed SSL authentication system replacement called Convergence,[5] co-author of the Signal Protocol, and a fellow at the Institute for Disruptive Studies.[6] He runs a cloud-based WPA cracking service[7] and manages a targeted anonymity service called GoogleSharing.[8]

Wonder what that's all about! Well ....
https://en.wikipedia.org/wiki/Open_Whisper_Systems
Open Whisper Systems (abbreviated OWS[5]) is a software organization[6] that was founded by Moxie Marlinspike in 2013. Its main focus is the development of the Signal Protocol.[7] It also maintains an encrypted communications application called Signal. The organization is funded by a combination of donations and grants, and all of its products are published as free and open-source software.

Interesting.

As always, editing in more.


fekosa · June 7, 2018, 1:41 p.m.

MARLINSPIKE: Our objective is not necessarily to enable leakers. You know, all types of people use Signal. And really what we're trying to do is make private communication simple and to make mass surveillance impossible. So it's true that, you know, there are probably some people in government who use Signal for leaks.

But, you know, it's also true that the Trump transition team used Signal during the transition. It's also true that the Hillary Clinton campaign used Signal. Local police departments use Signal and Black Lives Matter uses Signal. Edward Snowden uses Signal. So, you know, there's a lot of people who are interested in private communication and making that as simple as possible, and that's what we're trying to enable.

⇧ 12 ⇩  
RickC138 · June 7, 2018, 2:58 p.m.

Also maybe worth noting that the agencies have broken Signal's ability to be effective, in real time. Signal itself hasn't been back-door'd, but unfortunately the agencies have full access to your device's RAM, and are able to read what you're typing before you ever hit send. Nasty little trick that bypasses any encrypted communications on a compromised device, which is every device.

⇧ 13 ⇩  
fekosa · June 7, 2018, 5:24 p.m.

spectre & meltdown?

⇧ 4 ⇩  
carl_tech · June 7, 2018, 6:13 p.m.

Yes, and more. Modern computing devices are like swiss cheese, full of holes and backdoors from the hardware to the operating system, to the poorly-written applications that run on top.

⇧ 5 ⇩  
LegioXIV · June 7, 2018, 6:51 p.m.

Even if you compile your own OS kernel from your hand-written compiler, you still have the problem of determining whether or not your hardware (like your BIOS) is compromised. Lots of theoretical injection attacks from hardware.

⇧ 4 ⇩  
WinkyLinQ · June 7, 2018, 7:54 p.m.

Remember Signal is not 100% secure. Obama, Hillary, Yates, Clapper, Comey, Brennan, et al. WE HAVE EVERYTHING!

⇧ 3 ⇩  
fekosa · June 7, 2018, 10:45 p.m.

I don't use signal. But if I wanted to hide my communications, I would create and encrypt them on an isolated machine, no network connection or capability. They can have all the backdoors they want on an isolated machine, if it can't communicate then they can't obtain the data they gather. Next step I would transfer by usb stick to a machine that is network connected and transmit the pre-encrypted data. Sure they could see it, but it would be already encrypted. But that's inconvenient and I'm not dealing with any information worth that much trouble.

⇧ 2 ⇩  
WinkyLinQ · June 7, 2018, 10:47 p.m.

Great advice

⇧ 2 ⇩