Did WikiLeaks Sound the Death Knell of Western Tech Dominance? - Politics Forum.org | PoFo

Wandering the information superhighway, he came upon the last refuge of civilization, PoFo, the only forum on the internet ...

All general discussion about politics that doesn't belong in any of the other forums.

Moderator: PoFo Political Circus Mods

#14786532
Exactly three years after the mysterious disappearance of Malaysia Airlines MH370 on March 7 2014 (17:19 UTC time), the international whistleblowing site WikiLeaks dropped a bombshell on how the US Central Intelligence Agency could weaponize just about every "smart device" on the planet.

The US intelligence community has turned the global village into a prison planet; one where bedrooms are no longer sacrosanct, bank accounts are no longer secure and national secrets can be retrieved from deceptively "secure" channels and archives. Smart cars can be remotely commandeered to snuff out pesky citizens who get in the way of a train wreck called the United States!

But what apocalyptic scenarios were Year Zero and Zero Day referring to? Did Russia earlier get wind of them? Did the election of Donald Trump finally throw a spanner into the works?

Read the rest of the article here: https://sputniknews.com/analysis/201703 ... dominance/
#14786551
[highlight=]No, the actual documents don't really show that kind of amazing power. Most of their hacks were patched holes in older models and operating systems. The actual encryption that is used is fundamentally sound.[/highlight]

Yes, true. But Wikileaks seem to have released this tranche as a teaser. According to some reports, they are setting the stage for a far more explosive set of revelations down the line.
#14786914
I kind of sympathize with John Kerry when he tried to explain that a lot of US spying programs were on auto-pilot and the government wasn't even sure themselves what it meant to have all of this data. Also not discussed much is how data retention has developed with the tech itself. Most people don't even know what to do with all of the information on the internet that is available at their fingertips.
#14787021
I kind of sympathize with John Kerry when he tried to explain that a lot of US spying programs were on auto-pilot and the government wasn't even sure themselves what it meant to have all of this data. Also not discussed much is how data retention has developed with the tech itself. Most people don't even know what to do with all of the information on the internet that is available at their fingertips.


That's interesting. I never knew Kerry said that.
#14787030
There is the argument that worrying too much about government surveillance is pointless because the resources they would need to monitor one person, much less millions, much less tens of millions, would be prohibitive, but we are protected from search in the constitution.
#14787794
[highlight=]There is the argument that worrying too much about government surveillance is pointless because the resources they would need to monitor one person, much less millions, much less tens of millions, would be prohibitive, but we are protected from search in the constitution.[/highlight]

Actually, cyber-surveillance is now much easier thanks to supercomputing and Artificial Intelligence. All the human monitors need to do is focus on individuals flagged by the system.
#14787802
Except that the collection of meta data is different than the collection of the content of everything everyone says or does on electronic devices. The collection of such content, we can see from these documents, has to be targeted at a specific person to crack their specific set of devices. It cannot be done en masse to be analyzed by a supercomputer.
#14788092
[highlight=]Except that the collection of meta data is different than the collection of the content of everything everyone says or does on electronic devices. The collection of such content, we can see from these documents, has to be targeted at a specific person to crack their specific set of devices. It cannot be done en masse to be analyzed by a supercomputer.[/highlight]

True. But they are archived and can be retrieved as soon as someone earns the red flag. Or upon official requests. Who oversees the procedures and protocols anyway?

@FiveofSwords On e again, you fail to provide […]

Russia-Ukraine War 2022

I'm just free flowing thought here: I'm trying t[…]

Left vs right, masculine vs feminine

…. the left puts on the gas pedal and the right […]

@QatzelOk DeSantis got rid of a book showing chi[…]