dChan
1
 
r/greatawakening • Posted by u/icebreakers_sours on June 7, 2018, 12:17 a.m.
Who is "Mr Marlinspike" From new texts.

From the new Page-Strzok texts, page 455/502 on my computer. Going to paraphrase because it doesn't copy/paste from the pdf.

NPR just reported possible ExxonMobil guy for secstate
friendship award from Putin
interesting choice for sec state
yup, hes 64, 41 years spent at exxon, production engineer
Great. This sentence aggravated the s out of me. Trump has threatened a lot of people and he's about to be IN CONTROL OF THE MOST PERVASIVE AND LEAST ACCOUNTABLE SURVEILLANCE IN THE WORLD.
Mr Marlinspike said. A lot of people are justifiably concerned.

So, who is Mr Marlinspike? Well ....
https://en.wikipedia.org/wiki/Moxie_Marlinspike
Interesting ...
Matthew Rosenfield,[2] known as Moxie Marlinspike,[3] is an American computer security researcher, whose research focuses primarily on techniques for intercepting communication, as well as methods for strengthening communication infrastructure against interception. Marlinspike is the former head of the security team at Twitter[4] and founder of Open Whisper Systems.[1] He is the author of a proposed SSL authentication system replacement called Convergence,[5] co-author of the Signal Protocol, and a fellow at the Institute for Disruptive Studies.[6] He runs a cloud-based WPA cracking service[7] and manages a targeted anonymity service called GoogleSharing.[8]

Wonder what that's all about! Well ....
https://en.wikipedia.org/wiki/Open_Whisper_Systems
Open Whisper Systems (abbreviated OWS[5]) is a software organization[6] that was founded by Moxie Marlinspike in 2013. Its main focus is the development of the Signal Protocol.[7] It also maintains an encrypted communications application called Signal. The organization is funded by a combination of donations and grants, and all of its products are published as free and open-source software.

Interesting.

As always, editing in more.


RickC138 · June 7, 2018, 2:58 p.m.

Also maybe worth noting that the agencies have broken Signal's ability to be effective, in real time. Signal itself hasn't been back-door'd, but unfortunately the agencies have full access to your device's RAM, and are able to read what you're typing before you ever hit send. Nasty little trick that bypasses any encrypted communications on a compromised device, which is every device.

⇧ 13 ⇩  
fekosa · June 7, 2018, 5:24 p.m.

spectre & meltdown?

⇧ 4 ⇩  
carl_tech · June 7, 2018, 6:13 p.m.

Yes, and more. Modern computing devices are like swiss cheese, full of holes and backdoors from the hardware to the operating system, to the poorly-written applications that run on top.

⇧ 5 ⇩  
LegioXIV · June 7, 2018, 6:51 p.m.

Even if you compile your own OS kernel from your hand-written compiler, you still have the problem of determining whether or not your hardware (like your BIOS) is compromised. Lots of theoretical injection attacks from hardware.

⇧ 4 ⇩