Announcement

Collapse
No announcement yet.

demonsaw

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    demonsaw

    Hmmmmm......

    https://www.demonsaw.com/


    Annnndddd something worthy of note is what is at the BOTTOM:

    August 28, 2016
    As of the date above, Demonsaw has not received any National Security Letters or any orders under the Foreign Intelligence Surveillance Act. Demonsaw does not have any knowledge of any search orders that have been issued or carried out. Demonsaw will update this statement monthly with any changes, the next being on or before September 28, 2016.
    John McAfee My company will make the cloud obsolete

    woodsmoke

    #2
    30 Days between Canary chirps? How about ONEday. The Feds could have swooped in on Aug 29 and replaced Demon with spyware and it would be a month and who knows how many downloads before anyone else would know. Even then a lot of folks wouldn't pay any attention to the Canary date. Or, the Feds could simply update the date themselves. Besides, how do you know that is not a honey pot?

    Besides, I have problems with anyone who'd quote the Bible and then use profanity like a sailor.
    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.

    Comment


      #3
      LOL the Grey Geek in great form as usual!!

      woodsmoke

      Comment


        #4
        I asked myself what Demon would do that I can't do already? Store my own files on my own computer or server? Check. Send msgs and files securely? My 4096 byte RSA key will do that already. Encrypt a msg or file and embed it in a jpg? Old stuff.

        The big weakness in all this stuff is that in order to communicate between two computers NOT on on the same subnet they'll have to go through the Internet. The ISP owns those servers and the CIA, NSA, the Russians and the Chinese owns them. Intercept your msgs, store them, and IF they have a quantum computer than can brute force passwords, and I believe they do, then they'll use it to decrypt your stuff at their leisure. The only ones we'll be able to keep secrets from are other folks like you and I, who don't have our own private Internet, swat teams,subpoena power, or quantum computers.

        I used to believe that Linux was the most secure OS around, and it may have been in the past. Ditto for Windows, Mac, iPhone or Android. Now I don't believe that such an animal exists. Malware written by Joe or Sally Sixpack may not be able to penetrate a current Linux distro running an iptables firewall, even if they can puncture WinXX, iOS or JellyBean X.Y with ease, but the folks who created StuxNet have all the ability and tools to penetrate any OS on the planet, including Linux. And so do the Russians and Chinese, and probably several other nations as well.

        A month ago I spent a lot of time investigating Tor, ZeroNet and IPFS. The last two are P2P. All of them give a false sense of security. In fact, for me, I felt less secure in the case of the last two because your HD became a respository for all sorts of files you have to share by virtue of just connecting. You might as well drop your pants and hang your fanny out the window because you are going to get it in the end, one way or another.
        "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
        – John F. Kennedy, February 26, 1962.

        Comment


          #5
          LOL

          NICE COMMENTS!!

          I was amazed when I saw the anti-hero on Mr. Robot actually drilling, chopping and then putting his hard drives in a microwave! lol

          i do not store ANYthing "on the net" except "school stuff".

          I have dozens of cheap hard drives some with data, some with OS's and all in one box except the single one that stands beside the computer and the other IMPORTANT ones scattered throughout the house! lol.

          Not that I have ANYthing to hide except recipes for SkyJuice!

          I can plug or unplug the hard drive or usb drive in less than a minute if I do....'safely remove".

          AND.....the cable to the internet is about....... two feet from my keyboard.

          I turn the computer off when not actually using it and unplug it.

          And, if I don't have to actually use "the net" it stays unplugged.

          That is one reason why there are a LOT of Linux people that have their OS on a usb drive.

          (And BTW) I have never understood the whole thing about having a problem installing on a usb. I just use the standard install of whatever OS I want to install on the USB but...

          I also...........REMOVE the hard drive that has a functioning OS on it so that there is no possibility of messing it up.

          but, the point being that, if it is not connected to the machine, and the machine is not connected to the net then it is kind of hard for anyone to actually get at the data without entering my humble abode when I'm not here.

          I really DO think that NEITHER the Repubicats or the Demmicans either want the presidency.

          Because the powers that be, know, just as you do, oh Grey Geekness, that "relying on "sigint"" went way of the dodo a few years ago, except for for finding the real dummies out there.

          When we trashed the CIA we last "humint" and that is the only REAL way to get information because NONE of the "terrorists" except the ones walking around in the sand in white walking shoes with machetes or AK-47s actually THINK that they can actually "hide" information "on the net for very long.

          they talk in code and then dump the portal and fire up a new one.

          And our "sigint" goes scurrying from one portal to the next, just one step behind.

          Back at Castle Cops in the moderator forum the general discussion came to the same conclusion.

          Anybody who actually thinks that "spies" actually wear funky clothes or black suits and meet in the park to feed pigeons and pass information is waaaaay out of the loop.

          http://canyouactually.com/these-hidd...-secret-files/


          Nice comments oh Grey One!

          woodsmoke
          Last edited by woodsmoke; Sep 12, 2016, 11:38 PM.

          Comment


            #6
            Don't plug in your HD, don't connect the Internet and pull the power plug and you won't get infected?

            That's what the Iranians thought, until someone found a USB stick "laying around" and plugged it in out of curiosity. Their "unconnected" Centrifuges got destroyed by StuxNet. It goes beyond that into peripheral hardware and the mobo itself. Before Gulf War I Saddam bought a bunch of printers from TI. The CIA had TI put kill switches in their firmware that could be activated remotely. When his commanders tried to print up orders they had to resort to handwriting. Not good. China makes MOST of the computers today, including the CPUs, GPUs, and mobo PROMs and controllers. Backdoors anyone?



            Sent from my iPhone using Tapatalk
            "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
            – John F. Kennedy, February 26, 1962.

            Comment


              #7
              LOL....well yeah....buuut..... I don't think that I can ever remember the time when I "picked up a usb drive and plugged it in". lol

              HOWEVER, I never really thought about.... in what country the cpu itself is made...hmmm





              But yea, it is all about minimizing the attack surface.

              woodparanoidsmoke
              Last edited by woodsmoke; Sep 13, 2016, 05:31 PM.

              Comment

              Working...
              X