Sciencemadness Discussion Board
Not logged in [Login ]
Go To Bottom

Printable Version  
 Pages:  1    3  
Author: Subject: more frightening privacy stuff
woelen
Super Administrator
*********




Posts: 8014
Registered: 20-8-2005
Location: Netherlands
Member Is Offline

Mood: interested

[*] posted on 10-3-2010 at 00:02


I needed the second harddrive to install a fresh OS without having to overwrite my first harddrive. The first one contained a lot of personal data and that of course should not be overwritten.



The art of wondering makes life worth living...
Want to wonder? Look at https://woelen.homescience.net
View user's profile Visit user's homepage View All Posts By User
MagicJigPipe
International Hazard
*****




Posts: 1554
Registered: 19-9-2007
Location: USA
Member Is Offline

Mood: Suspicious

[*] posted on 10-3-2010 at 03:38


Good excuse then.



"There must be no barriers to freedom of inquiry ... There is no place for dogma in science. The scientist is free, and must be free to ask any question, to doubt any assertion, to seek for any evidence, to correct any errors. ... We know that the only way to avoid error is to detect it and that the only way to detect it is to be free to inquire. And we know that as long as men are free to ask what they must, free to say what they think, free to think what they will, freedom can never be lost, and science can never regress." -J. Robert Oppenheimer
View user's profile View All Posts By User This user has MSN Messenger
quicksilver
International Hazard
*****




Posts: 1820
Registered: 7-9-2005
Location: Inches from the keyboard....
Member Is Offline

Mood: ~-=SWINGS=-~

[*] posted on 12-3-2010 at 14:36


Back in DOS days I had the privilege of meeting Phil Zimmerman (wrote PGP) prior to his trial. The older versions were the ones that caused all the fuss. Microsoft has built so many way to data-mine an erased HDD they they are teaching classes in it for LE agencies' computer people. Apparently the slick ones to get stuff back from are Vista and WIN7. These are not back-doors in the most common sense but methods to undelete and skirt around MS's own privacy & encryption. The reason I mention Zimmerman was that recently many OLD computers are being used as DOS/FAT machines using Zimmerman's PGP 6 or lower for DOS on a command line level. There is a possibility that if such a thing were used making several levels of encryption: one within another; the time some of the REAL machines would need to open it up would be days or more.

He released the code, HASHES, etc with each release so folks would know it was genuine. This was when encryption was a munition. It's not dealt with that way as most public material can be defeated by the real computers. However the old FAT based computers could be MORE tough than today's.
At a Cisco conference a speaker was politely asked to drop a topic dealing with the problems of older OS's, encryption and deletion. In fact, MIT had a contest some years back to resurrect drives that were not physically damaged. The winner's (it was a draw between two) was a 486 with Novell DOS v7 and a GUI on it for simple apps Windows for work groups v3.11 and OS2 v2.1. material deleted and over written on both those platforms was not available once the MBR (that's what what it was called back then) was wiped.
Runner's Up were: a tiny program that over-wrote a FAT running computer and deleted it's place on track 0 it; all in one key stroke which could be configured as a Function Key and something else together, total program (written in Assembler) was less than 1K.
Another one was Microsoft's own WIN95 (it's MSDOS 7) in FAT16 with a program written in DOC ANSI C that moved the FAT16 MDR to the next available space; thus the user over wrote it and that user could be out of luck or he could remember what it was he was doing and what he wrote when it was started & could bring it back with exactly the same eight key strokes. So it's either set to hide or set to destroy. It even remembers what app you were in size 12K ! the only hurdle with DOS was the naming convention; especially the naming convention for an executable. But they hurdled that by using two programs that could find it's hidden sister called "uninstall.moc" to uninstall.com (remember "com" files? - anything under 64K and that's a LOT of program for assembler without macros! Or keep the standard EXE file, but there's no need because the sister file renames and starts the program in a package that 1K ! like temp-cln.exe in the root directory run it and -"netlog.012" & turn that into "netlog.exe"


[Edited on 12-3-2010 by quicksilver]
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 27-4-2010 at 13:48
Brave new world



Links for the full article , scroll down for the text

" Your ISP Is a Copyright Cop "
" 'Private' or 'Incognito' Browsing...Isn't "
http://www.pcworld.com/article/191312

http://www.pcworld.com/article/191312-2
http://www.pcworld.com/article/191312-3
http://www.pcworld.com/article/191312-4
http://www.pcworld.com/article/191312-5

Some here are already ahead of this
http://www.sciencemadness.org/talk/viewthread.php?tid=1372
" Your Passport Could Make You a Target for Crime--Wirelessly "
http://www.pcworld.com/article/191312-6
http://www.pcworld.com/article/191312-7

.
View user's profile View All Posts By User
Lala
Harmless
*




Posts: 1
Registered: 12-7-2010
Location: i'm in your head...
Member Is Offline

Mood: ..like a pimp

[*] posted on 13-7-2010 at 02:18


you know what...think about this..we are talking here about having no privacy on our computers but at least it IS possible to decide fuck it and not use one and then that problem would over with right..but check this out..i dont know if this has been discussed here before but where i live is just about the worst place in this country as far as having any rights and privacy..here in good old los angeles more and more ( all in the name of "PUBLIC SAFETY") they are installing CCtv cameras that are recording the streets and sidewalks and storing it all...about a year and half ago i was reading local beverly hills paper and there was a story that talked about how beverly hills is striving to be the SAFEST CITY in the US and how within 5 years every inch of street and ally will be CCtv and how it senses motion and will be able to tell the difference of a human creeping instead of a raccoon or cat walking around at night..oh and also the use of the wonderful ALPR that all their cars now have and now more and more LAPD cars on the road with aswell as la county sheriff's ..incase you aren't aware of what that is it's the AUTOMATIC LICENSE PLATE RECOGNITION software that captures the license plates of every car that it passes even one's going the opposite direction..it takes snapshots of the plate and runs it through the hot sheet database of course ..but it also picks up 'hits' if the car's registration has been suspended if the r/o is wanted or their license is suspended..i find this to be the very end of rights and privacy.....here's a demo on youtube and some other links showing us how fucked we are letting ourselves become..

..http://www.youtube.com/watch?v=itolga3Hi8c

http://sheriff.lacounty.gov/wps/portal/lasd/!ut/p/c5/04_SB8K...

http://sheriff.lacounty.gov/wps/portal/lasd/!ut/p/c4/04_SB8K...

http://sheriff.lacounty.gov/wps/portal/lasd/!ut/p/c4/04_SB8K...

you know last year i got pulled over and didnt have my license on me and the lapd officer got all excited to get to use his new toy that had me just put my index finger on a little tiny pad and with a minute they had pulled me up off my print...its all bad and getting worse..
View user's profile View All Posts By User
quicksilver
International Hazard
*****




Posts: 1820
Registered: 7-9-2005
Location: Inches from the keyboard....
Member Is Offline

Mood: ~-=SWINGS=-~

[*] posted on 13-7-2010 at 06:00


Britain has a shit-load of cameras; perhaps way more than LA. but your point is well taken.


A method (not a complete answer) to reduce the effectiveness of many systems was to use a transparent covering over the plate which cannot be determined to be against code. Almost anything can reduce the effectiveness of these systems, including heavy rain (wet plates) drops of mud (recognition software pulls too many hits & is forced to "choose") therefore defaulting, etc. The transparency often (but not always) reduce legibility due to glare. The companies that sell these systems push for privacy intrusion based on the LE "force multiplier" sales pitch: which you heard in the video.
One of the major problems is the "probable cause" element that it introduces into traffic stops. ....Making a situation worse by introducing a "cried wolf" phenomenon into a really serious man-hunt.



[Edited on 13-7-2010 by quicksilver]




View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 7-10-2011 at 09:34


Halloween all the time , will masks become fashionable ?

http://money.cnn.com/video/technology/2011/10/05/t-ts-iphone...

.
View user's profile View All Posts By User
IrC
International Hazard
*****




Posts: 2710
Registered: 7-3-2005
Location: Eureka
Member Is Offline

Mood: Discovering

[*] posted on 20-10-2011 at 12:48


EU Parliament Member Proposes ‘Black Box’ to Trace Citizens’ Web History

http://www.theblaze.com/stories/eu-parliament-member-propose...

Europe's version of big brother?




"Science is the belief in the ignorance of the experts" Richard Feynman
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 5-10-2012 at 05:57


Your stuff isn't yours to sell - all your stuff belong to us. Will this be the end of Ebay ?
www.marketwatch.com/story/your-right-to-resell-your-own-stuf...

" The more numerous the laws, the more corrupt the state."
-Tacitus - AD 69

.
View user's profile View All Posts By User
Morgan
International Hazard
*****




Posts: 1694
Registered: 28-12-2010
Member Is Offline

Mood: No Mood

[*] posted on 28-1-2013 at 12:39


"It is the definition of “observe” in this case that will blow your mind, though."
http://www.extremetech.com/extreme/146909-darpa-shows-off-1-...
View user's profile View All Posts By User
SM2
Hazard to Others
***




Posts: 359
Registered: 8-5-2012
Location: the Irish Springs
Member Is Offline

Mood: Affect

[*] posted on 28-1-2013 at 13:07


Yep, it's been like that in UK for quite some time. Longer in some Scandinavian countries, I would guess. In W. Germany at the time, there were some local revolts against it.

Part of the impetus for this is the re-gentrification of inner cities. I can still remember like it was yesterday, when Hoboken and Jersey City were basically slums, or mob only zones. Yuppi yippy yuppi :( BigApple, NyNy uses to imply Manhattan only.

oh, I forgot to say, Guten Morgan!

[Edited on 28-1-2013 by SM2]
View user's profile View All Posts By User
Morgan
International Hazard
*****




Posts: 1694
Registered: 28-12-2010
Member Is Offline

Mood: No Mood

[*] posted on 5-2-2013 at 13:00


The Threat of Silence
http://www.slate.com/articles/technology/future_tense/2013/0...
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 28-5-2013 at 22:44


www.wired.co.uk/news/archive/2013-05/28/password-cracking
www.wired.co.uk/news/archive/2013-05/28/password-cracking/pa...
www.wired.co.uk/news/archive/2013-05/28/password-cracking/pa...
_______________________

www.dailymail.co.uk/sciencetech/article-2331984/Think-strong...

.
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 24-6-2013 at 14:38


Back in the heday of seruptitious bugging, before everyone got in on the act,
a small appliance that attached to a phone called an "infinity transmitter" or
"harmonica bug" allowed one to dial that phone and with the appropriate tone
disconnect the ringer " hookswtich bypass" so that one could eavesdrop on nearby conversation.

Now this feature is built in to your cell phone

www.zerohedge.com/contributed/2013-06-24/single-most-importa...

.
View user's profile View All Posts By User
AndersHoveland
Hazard to Other Members, due to repeated speculation and posting of untested highly dangerous procedures!
*****




Posts: 1986
Registered: 2-3-2011
Member Is Offline

Mood: No Mood

[*] posted on 24-6-2013 at 14:42


Quote: Originally posted by IrC  
EU Parliament Member Proposes ‘Black Box’ to Trace Citizens’ Web History

I have long suspected that protecting against child pornography will just be used as an excuse for the government to consolidate direct control over the internet. "Think of the children!"
We have heard that before.

The EU would just love to regulate the internet, I have no doubt. They have a history of trying to silence historical, scientific, and social opinions they do not like. Similar mentality to the former Soviets in many ways.

[Edited on 24-6-2013 by AndersHoveland]
View user's profile Visit user's homepage View All Posts By User
phlogiston
International Hazard
*****




Posts: 1379
Registered: 26-4-2008
Location: Neon Thorium Erbium Lanthanum Neodymium Sulphur
Member Is Offline

Mood: pyrophoric

[*] posted on 24-6-2013 at 14:59





[Edited on 24-6-2013 by phlogiston]




-----
"If a rocket goes up, who cares where it comes down, that's not my concern said Wernher von Braun" - Tom Lehrer
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 10-7-2013 at 07:16


Your phone software has hidden capabilities _
www.businessweek.com/articles/2013-07-03/security-enhanced-a...

Historically _
www.heise.de/tp/artikel/5/5263/1.html

.
View user's profile View All Posts By User
Fantasma4500
International Hazard
*****




Posts: 1681
Registered: 12-12-2012
Location: Dysrope (aka europe)
Member Is Offline

Mood: dangerously practical

[*] posted on 18-7-2013 at 06:45


about technology:
some druggies i know, because obvs. pretty much anybody at my age are deep in drugs because thats fashionable, showed me one thing, they are agaisnt the law because drugs, so some good thing the drugs do
anyhow..
if you take illuminati
spell it backwards
itanimulli
then it was .net .com or .org
seemingly i cant get it to work now..? it worked for 2 months straight i remember
now what this thing did was that it went straight to US' government site, the actual site, not some knockoff
some might say this is somewhat small time propaganda, anyhow if a mirror site was created i would believe that they would be notified about it and cancel it immediately, so i find this unlikely

the people doesnt know what power they posess, after all powerful men are people like the people
the government is people controlling people




~25 drops = 1mL @dH2O viscocity - STP
Truth is ever growing - but without context theres barely any such.

https://en.wikipedia.org/wiki/Solubility_table
http://www.trimen.pl/witek/calculators/stezenia.html
View user's profile View All Posts By User
ElectroWin
Hazard to Others
***




Posts: 224
Registered: 5-3-2011
Member Is Offline

Mood: No Mood

[*] posted on 18-7-2013 at 10:39


http://itanimullihoax.wordpress.com/
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 31-7-2013 at 21:48


www.sovereignman.com/personal-privacy/think-your-password-is...

Review
http://www.sciencemadness.org/talk/viewthread.php?tid=7144&a...

.
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 17-2-2014 at 07:58
As nasty as they come


Ransomware denies you your computer files and for a fee will restore their use.
I do not think it came from here , and do not know the source of this pestilence.
But given the number of members here it is probable some will succumb also.
Cryptorbit is the name of the thing which slayed me. It encrypts all manner of
data files undetected in the background then announces it's deed with three 2 kb
files in every folder it's visited. See the .gif , .htm , .txt , inside the
Additionally I include a screen capture .jpg of the extortion site you are told to visit
to make your payment in Bitcoin ~ $ 600 , through Tor. , and just to mock one
all the more they provide a link ( I highlighted in yellow with red border ) to a
youtube video - www.youtube.com/watch?v=WV3wzN3OV2I

Cryptolocker works the same way , this explains how and precautions to take.
www.youtube.com/watch?v=cYVqJ0N0FDY

http://blog.teesupport.com/infected-by-cryptorbit-ransom-vir...
www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware...
The tool available from bleepingcomputer does not restore my files , likely because
as Kaspersky states below about Cryptolocker , it now fully encrypts the whole file
not just it's header as told in the next account at Malwarekillers. Terminating the
infestation as fast as possible is the best one can do.
http://blog.kaspersky.com/cryptolocker-is-bad-news
www.malwarekillers.com/how-to-decrypt-cryptorbit-files
www.pelstar.com/big-mikes-blog


N O T E : The support for Windows XP with Service Pack 3 ends April 8, 2014

Now is a good time to install the operating system again and start fresh


<!-- bfesser_edit_tag -->[<a href="u2u.php?action=send&username=bfesser">bfesser</a>: deleted upload]

[Edited on 17.2.14 by bfesser]




Techniques to Disrupt, Deviate and Seize Control of an Internet Forum In case you wonder W T F ! is going on here ?
www.zerohedge.com/contributed/2012-10-28/cointelpro-techniques-dilution-misdirection-and-control-internet-forum https://web.archive.org/web/20120814124000/www.washingtonsblog.com/2012/08/the-15-rules-of-internet-disinformation.html
___________________________________________________________________________________________________________________
___________________________________________________________________________________________________________________
___________________________________________________________________________________________________________________
View user's profile View All Posts By User
bfesser
Resident Wikipedian
*****




Posts: 2114
Registered: 29-1-2008
Member Is Offline

Mood: No Mood

[*] posted on 17-2-2014 at 09:19


I deleted the .zip file you uploaded&mdash;<em>please don't upload files from virus-infected machines.</em>



View user's profile View All Posts By User
roXefeller
Hazard to Others
***




Posts: 463
Registered: 9-9-2013
Location: 13 Colonies
Member Is Offline

Mood: 220 221 whatever it takes

[*] posted on 17-2-2014 at 13:31


At least those guys are putting their creative talents to a remuneration scheme and getting paid for their handiwork. :) In a way they are being honest about their highway robbery. I can pay them to free my ransomed computer, or I can pay norton (annually) to 'free' my yet-to-be-ransomed computer. Now the malware writers are getting a cut of the market share. Either way, owning a computer is a depreciating scenario, financially that is.

It's hard to polish a terd.
View user's profile View All Posts By User
franklyn
International Hazard
*****




Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline

Mood: No Mood

[*] posted on 21-6-2014 at 05:21
This time we were lucky


http://easysyncbackup.com/decryptorbit

www.bleepingcomputer.com/forums/t/517689/howdecrypt-or-crypt...

.
View user's profile View All Posts By User
aga
Forum Drunkard
*****




Posts: 7030
Registered: 25-3-2014
Member Is Offline


[*] posted on 22-6-2014 at 13:33


Hello ?

Did ANYONE ever think any of this easy-to-hack crap was ever Secure Ever ?

Windows wasnt designed as Insecure, it was/is just crap programming, and the Idea of security was an add-on that came after the money deluge began.

Every single bit of data you transfer goes *somewhere* on it's way from you to them or vice versa (i.e. Internet)
Where the data goes is Beyond Your Control.

Due to the inexplicable ineptitude of M$, your computer is also vulnerable to Smarter people simply finding a Hole, poking through it, and then taking absolute control over it.
To be fair, M$ isn't the Only OS provider with Holes, just they get more heavily targetted, and seem to have a surplus of holes.

ALL safety is an Illusion.
Regarding Your Computer data, there is no Safety or Security at all.

[Edited on 22-6-2014 by aga]




View user's profile View All Posts By User
 Pages:  1    3  

  Go To Top