Re: How NSA access was built into Windows

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



David Boles wrote:

You are making a mountain out of a mole hill here. If, I said if, the NSA was
really  interested in what you are doing on your computer they would go to
your ISP and ask for your records. Your ISP keeps copies of every email that
you have ever sent. And copies of every email, this one included, that you
have ever received. They also keep records of every site that you have
visited. What day and time and how long you stayed. What files you have
downloaded. Maybe a pirated game? Maybe pirated music files. Maybe a little
p0rn? Many things. And if the NSA really did want to see what is on your HD
they would walk in and take it with them when they left.
- --

David, For all of your misdirection and ad hominem slurs, you still have not given any answers to the original question. It's all very nice to say that the NSA could get records from your ISP, every email, every website etc. Or just walk in and take your hard drive. But not every ISP in the USA keeps email records for a long time, nor web access logs. They do not have to do that. And most will not just turn over such records without a search warrant being served on them. And the NSA would need a search warrant to wander in and take your hard drive...But the NSA is forbidden to do those things within the USA, except (as now agreed) under the authority of a FISA warrant.

Or have you been drinking the cool-aid from moveon.org or the huffington post, that the guys in the black helicopters just do what they want whenever they want and GWB and DC let them.

And I hope you are not so disconnected from reality to recognize that the NSA has no legal capability of asking for those neat email logs in any other country in the world. So they eavesdrop on every electronic communication they can capture. They do what is illegal for you or I. It their job. So of COURSE it would be extremely useful for the NSA to be able to subvert a particular computer by way of a backdoor. If the NSA was NOT trying to do that they would not be doing their job. And of course that is why the DOJ still lists encryption software as 'munitions' so they can ban exports. (Interesting that the constitutional questionibility of banning the export of what is elsewhere clearly recognized as covered under the First Amendment has never been argued at the appeal level.)

So lets hear your answer to the question: is it possible that Selinux could have a backdoor in it. and how difficult is it to compile a system that has no selinux modules included. The answers does not require any analysis of the probabilities attached to the reasoning that the NSA would not bother to do this.

Geoff

[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux