Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

crypto-terrorists [part II]

Name: Anonymous 2015-08-03 16:34

Back in the old /prog/ I warned you about it; now things are getting more clear:
Encryption a growing threat to security [...]
Unfortunately, this scenario is not at all far-fetched. Recently, FBI Director James Comey testified before Congress that terror groups such as ISIS are using encrypted programs to hide their communications and recruiting messages from U.S. federal agencies.[...]
What could a solution look like? The most obvious one is that U.S. tech companies keep a key to that encrypted communication for legitimate law enforcement purposes.
they should also keep a master key, because it may one day save thousands of lives
http://edition.cnn.com/2015/08/01/opinions/rogers-encryption-security-risk/index.html

So don't worry, we will make those damn encryption ``algorithms'' (an arab/terrorist word) illegal in the next couple of years!

Name: Anonymous 2015-08-05 2:24

Stephan, a 24 year old gay male, encrypts all his medical records to hide the fact that he is HIV positive. By keeping the secret, he has infected 143 of his fellow degenerates with the disease. Good work, Stephan!

Mikhail is working abroad in Brazil. He is a political activist, and uses encryption to coordinate with his organization in Russia. He is working to make the world a better place by bringing Brazil closer to Russia. Good job, Mikhail!

Rotem is a banker. He provides liquidity for several small businesses. Due to the unique needs of these businesses, he has to work very closely with them to find deals that are best for them. Sometimes, for tax purposes, they need some creative accounting. Rotem uses encryption to keep his ledgers safe and his clients operating. Good job, Rotem!

Name: Anonymous 2015-08-06 4:10

>>21
Maria runs a family business that provides entertainment to vacationing foreign men. She uses encryption and anonymity networks to maintain her clients confidentiality, and crypto currencies to collect payment. She also always recommends ways to keep her clients memorabilia confidential as well. Her and her children couldn't be happier. Good job, Maria!

Aisha wants to stay up to date about things going on in her home country. She uses encryption to talk to people back home and to arrange transportation there, in hopes of a romantic marriage and helping out a popular political movement. Good job, Aisha!

Ladasha works for a courier service. Her job involves transporting parcels from the supplier to the customer. To adequately meet the of the clients in a fast-changing environment, the business she works at had to adopt a peculiar business model, where the package might be sent out without even knowing where it's supposed to go. She uses encrypted phone calls to coordinate with the clients to find out where they would like their product delivered as fast as possible. Good job, Ladasha!

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List