On Sun, 2007-01-21 at 01:14 -0500, R. G. Newbury wrote: > David Boles wrote: > > You are making a mountain out of a mole hill here. If, I said if, the > NSA was > really interested in what you are doing on your computer they would go to > your ISP and ask for your records. Your ISP keeps copies of every email that > you have ever sent. And copies of every email, this one included, that you > have ever received. They also keep records of every site that you have > visited. What day and time and how long you stayed. What files you have > downloaded. Maybe a pirated game? Maybe pirated music files. Maybe a little > p0rn? Many things. And if the NSA really did want to see what is on your HD > they would walk in and take it with them when they left. > - -- > > David, For all of your misdirection and ad hominem slurs, you still have > not given any answers to the original question. It's all very nice to > say that the NSA could get records from your ISP, every email, every > website etc. Or just walk in and take your hard drive. But not every ISP > in the USA keeps email records for a long time, nor web access logs. > They do not have to do that. > And most will not just turn over such records without a search warrant > being served on them. > And the NSA would need a search warrant to wander in and take your hard > drive...But the NSA is forbidden to do those things within the USA, > except (as now agreed) under the authority of a FISA warrant. > > Or have you been drinking the cool-aid from moveon.org or the huffington > post, that the guys in the black helicopters just do what they want > whenever they want and GWB and DC let them. > > And I hope you are not so disconnected from reality to recognize that > the NSA has no legal capability of asking for those neat email logs in > any other country in the world. So they eavesdrop on every electronic > communication they can capture. They do what is illegal for you or I. It > their job. So of COURSE it would be extremely useful for the NSA to be > able to subvert a particular computer by way of a backdoor. If the NSA > was NOT trying to do that they would not be doing their job. And of > course that is why the DOJ still lists encryption software as > 'munitions' so they can ban exports. (Interesting that the > constitutional questionibility of banning the export of what is > elsewhere clearly recognized as covered under the First Amendment has > never been argued at the appeal level.) > > So lets hear your answer to the question: is it possible that Selinux > could have a backdoor in it. and how difficult is it to compile a system > that has no selinux modules included. > The answers does not require any analysis of the probabilities attached > to the reasoning that the NSA would not bother to do this. > > Geoff Excellent and civilized post. Only problem is that it's directed towards a troll that normally trolls on the Mandrakeot list. We are used to seeing minimum content and maximum propaganda from that vector. LX -- °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°° Off Topic or Political Discussions: http://mandrakeot.mdw1982.com/ http://www.mdw1982.com/mailman/listinfo/mandrakeot "Character is what you do when nobody's looking." - J.C. Watts °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°