New York Post : FBI encrypted phone app leads to hundreds of global underworld arrests
New York Post : FBI encrypted phone app leads to hundreds of global underworld arrests. https://nypost.com/2021/06/07/fbi-encrypted-phone-app-leads-to-hundreds-of-g... "Hundreds of criminal gang members around the world were tricked into using a phone encryption app operated by the FBI to plan their heinous crimes, leading to their arrests, according to authorities. Law enforcement officers in Australia and New Zealand began to unveil the scope of what is known as Operation Trojan Shield late Monday." "Authorities in Europe were scheduled to make their own announcement early Tuesday, with the FBI’s San Diego field office doing the same at noon." "Antipodean authorities credited the scheme with the arrest of more than 250 individuals and the seizure of more than 100 illegal firearms and other weapons, as well as millions of dollars in cash, drugs and other assets."
The USA FBI directed the dispersal of a fake encrypted chat app that fed data to law enforcement agencies in a wide variety of countries across the globe. A web search for "ANOM", the fake chat app company, gives hits for both ios and android, but with different capitalisation. The news implies that the possibly widespread device compromise in the USA that I've personally experienced demonstration of, and seems to me associated with the misbehavior of isps and/or corporate servers, is not something that most national law enforcement workers have access to, or they wouldn't have needed the fake app.
GoldBug Messenger is still out there doing really scammy things too, never audited, never reproducibly compiled, authors caught lying, censoring users, never responding to questions, trolling sensitive lists to install and use it, etc. https://duckduckgo.com/?ia=web&q="an0m' https://webcache.googleusercontent.com/search?q=cache: https://archive.org/ https://anom.io/ The TLA's "seized" their own domain, a scam inside of a scam, lol. https://anomexposed.wordpress.com/2021/03/29/anom-encrpted-scam-exposed/ ANOM ENCRYPTED SCAM EXPOSED Posted bycanyouguess67March 29, 2021March 29, 2021Posted inUncategorized ANOM EXPOSED VS CIPHR I did a comparison between both CIPHR and ANOM after receiving a message stating ANOM was this and this while CIPHR was able to be infiltrated (which is not TRUE) so I decided to do some of my own testing. To deliberate let’s start with some answers to some of the statements made by ANOM: – Yes Ciphr does use UEM but they are incorrect about an EXPLOIT being made by Blackberry as every update via UEM that is remotely pushed to the mobile device would need to be individually signed by the encrypted keys that Ciphr setup for their own infrastructure. Only Ciphr has access to these keys – A Device is signed individually with it’s own set of keys derived from Ciphr and delivered via Blackberry UEM working in unison with the Samsung Knox Security System. Not even Blackberry can push updates without this signed key by Ciphr for applications running on Ciphr phones. Ciphr phones are also locked down with custom policies to prevent them from doing something without prior authorisation by Ciphr. This is an ENTERPRISE MILITARY GRADE Encrypted setup. – Correct Ciphr does use the Stock Android Operating system with special Enterprise level Encryption and customisations on their network as well as their handsets which also include hardening making it one of the most secure handsets in the World. Custom group policies implemented by Ciphr also prevent access to anything other than the BLACKBERRY UEM Server which is a tunnel which then connects to the Ciphr Offshore Proxy Server via a secure and Encrypted Military Grade Encryption. Updates can only be authorised by Ciphr making it one of the most secure and locked hardened locked down handsets in the World. All applications must have authorisation from both Ciphr & their Enterprise grade policy level settings modified with the Ciphr Access Keys to access anything beyond the Blackberry UEM Firewall & the Ciphr Encrypted Offshore Servers. Even if Blackberry UEM was somehow compromised, due to Blackberry’s inability to sign with the Ciphr Encrypted Key then it would still not be possible to force compromised updates to any Ciphr devices whatsoever. -ANOM this statement about Rooting is incorrect, Rooting is required to install a custom android operating system on any pixel device or android device any device unless it has been signed specifically by the handset manufacturer. Anom has initially rooted their device by simply unlocking the android boot loader which secures file integrity and then installed their own custom android operating system followed by locking the boot-loader again with their own keys, much like we have our own signed keys for using Blackberry UEM, ANOM has their own keys for the Operating System. According to my testing ANOM’s custom android OS unfortunately has many more evident flaws within it’s design and updates a lot less than the regular stock Android OS making it physically vulnerable if it were to get into the wrong hands not to mention it has no custom group policies or built in firewall to stop the android os operating system from accessing google remotely. In fact upon a visual DISPLAY of all telecommunication connections I was quite concerned to see the amount of IP addresses relating to many corporations within the 5 eyes Governments (Australia, USA, Canada, UK, NZ who share information with one another) and to make matters worse they were direct connections to the actual proxy servers etc giving me the ability to locate their remote offshore Romanian Server with an IP of 193.27.15.41: ip: “193.27.15.41” city: “Bucharest” region: “Bucureşti” country: “RO” loc: “44.4180,26.1691” org: “AS9009 M247 Ltd” postal: “020331” timezone: “Europe/Bucharest” – ANOM is wrong to state that their Android Operating Systems purpose is built for Privacy and Security. Some google services are not removed or blocked by even a VPN or Firewall. -This setup used by ANOM gives Google the ability to fingerprint their device and monitor it remotely in a DIRECT way with no safeguards in place at all via the internet. The ANOM device I tested professionally was actually in constant contact with Google servers which was quite concerning. The following IP’s 216.58.200.99 & 142.250.70.196 both lead back to Google servers in both NSW, Australia and California, USA. – ANOM has a setup more vulnerable to attack as they don’t even use a secure VPN or FIREWALL to even safeguard the use of their APPLICATION remotely, that means imagine you were meeting up with someone like an EX-LOVER your partner may not approve of (much like a VPN protects you from outside entities seeing which websites or messaging systems you use) you would do this behind closed doors within the confides of a HOTEL room. – With ANOM’s setup imagine meeting up with that particular EX-LOVER your partner didn’t approve in full public sight with no safeguards in place. Eavesdroppers who may be seeking to find ANOM users over the mobile telecommunications network. ANOM easily gives this information away when their phones are constantly BROADCASTING without the ANOM application even being opened on their devices to the following IP addresses 99.83.192.129, which leads to anom.io and then while using their service the following IP’s are leaked constantly as packets while using the application: 75.2.32.148 – amazon web server USA – Proxy 35.171.36.131 – Amazon Web Servers – Proxy 76.223.70.181 – Amazon Web Servers – Proxy 35.176.253.60 – Amazon Web Servers – Proxy 75.2.90.136 – Amazon Web Server USA – Proxy 169.46.82.180 – logs5.papertrailapp.com – Remote Logging App 216.58.200.99 – Google Servers 142.250.70.196 – Google Servers 99.83.192.129 – anom.io – This is shown without even opening up the application within Calculator 13.248.215.128 – Voiceping router (Used most likely for their Walkie Talkie Talk Function) – voicepingapp.com – If for some particular reason an update server was somehow breached and malicious code was uploaded, it still would not make it to a CIPHR device as the update/application needs to be signed with the CIPHR keys before it can even be sent by Blackberry UEM Encrypted Server. – Sky ECC can only be infiltrated from the INSIDE by a rogue employee who gave authorities access to the Sky Signed Certification Keys which gave authorities the ability to access the Sky System and locate their servers and push rogue updates without the Sky Developers knowing until the as it was officially signed with their certificates without their knowledge due to a rogue employee working on the inside. – According to ANOM their statement “If our update server was hijacked as was the case with ENRO and SKY the attacker would not be able to install malicious code on the device. The same cannot be said for providers that use consumer grade operating systems managed by Blackberry UEM” is vastly incorrect. — CIPHR runs both the Blackberry UEM VPN and their own Secure Encrypted Offshore Servers alongside Customised Enterprise Grade Work Policies which limits the devices functionality for both Enterprise Safety and Security. In fact much like what occurred with unfortunately ENROCHAT when their servers were infiltrated bypassing the Blackberry UEM altogether the same can easily be said for ANOM who don’t even use a VPN to safeguard anybody actually using ANOM. If you knew a person used ANOM you would easily be able to identify all users over the normal telecommunications network without decrypting any of their communications at all, something you cannot simply do with CIPHR let alone know that particular individual is actually using a CIPHR phone, true anonymity, -ANOM have incorporated many features from already available apps such as the VOICEPING APP meaning you also have to rely on VOICE PING APP for securing your encrypted communications which works with their Walkie Talkie Functionality, there are a lot of similarities between that application and ANOM, something which appears to worry anyone if PRIVACY and ANONYMITY are your number 1 goal. With ANOM I was able to locate all of their PROXY servers including their MAIN servers with minimal ease, all operating within the 5 eyes alliance. About the only thing ANOM is good at is spreading misinformation without presenting the facts. ANOM uses the following for their application: – JIRA for tracking tasks as well as Q & A – Wire Messenger (Free application like wickr) for Communication (Their head office is in the USA) – Agile Development – Jenkins for their builds when they push updates (Your relying on ANOM to secure your communications when they can’t even secure their own servers from eavesdropping). – SQL Lite Database for storing USERS Information – Now if ANOM is so serious about safety and security I would fix their entire setup which seems just as bad as a normal android handset running WICKR. If the authorities were to access ANOM’s server of 193.27.15.41 in ROMANIA which is a third world country that may state they take privacy seriously but as the old saying goes “shit walks, money talks” they could easily infiltrate their Offshore Romanian Server and install special hardware devices on those servers without ANOM’s knowledge. Authorities could completely infiltrate every users devices as well as their operations and worse of all authorities would have the ability to decrypt and intercept their messages much like what occurred with ENROCHAT. . ANOM states they own the infrastructure but this couldn’t be further from the truth, they lease their servers off other entities meaning they do not have full control over their servers. Another way they could infiltrate ANOM is by getting access to FIELDX.io who most likely built their customised Android OS as the company is owned by an individual in FRANCE, obtaining a warrant would not be difficult. – To finish off my testing I did in fact perform the same tests on CIPHR and the only server I was able to see was the Blackberry UEM Encrypted VPN, nothing more or less. This is perfectly legal and to any outside entities monitoring they would not even be able to tell whether your communication device was for CIPHR or other Enterprise related purposes. – ANOM also states their company is in PANAMA, that may be the case but their servers are not located in PANAMA let alone owned by them which means any reasonable authority would be able to access their servers with relative ease. More information regarding ANOM: anom.one 75.2.32.148 anom.one 99.83.192.129 conference.anom.one 75.2.32.148 conference.anom.one 99.83.192.129 share.anom.one 75.2.32.148 share.anom.one 99.83.192.129 logging.anom.one 18.134.176.181 talk.anom.one 75.2.25.172 xmpp.anom.one 75.2.32.148 xmpp.anom.one 99.83.192.129 genesis.anom.one 18.134.176.181 vpprxy.anom.one 76.223.70.181 vpprxy.anom.one 13.248.215.128 www.fieldx.io (used to control the ANOM DEVICES) STAY AWAY FROM ANOM IF YOU VALUE YOUR PRIVACY & SAFEY, THEY ARE COMPROMISED, LIARS AND YOUR DATA IS RUNNING VIA USA – Passed onto LAW ENFORCEMENT and other Entities Posted bycanyouguess67March 29, 2021March 29, 2021Posted inUncategorized " https://www.dailymail.co.uk/news/article-9662457/ANoM-AN0M-app-Australian-Fe... https://www.dailymail.co.uk/news/article-9663125/Fake-encrypted-app-cooked-b... "the idea for the app, called AN0M, was hatched by American and Australian law enforcement officers “over a couple of beers” in 2018. Undercover Australian agents would give phones with the AN0M app pre-installed to certain high-level criminals who recommended the app to their associates. The phones could not make calls or send emails, and they could only be obtained through the black market. They also gave authorities access to up to 25 million encrypted messages in real time. " " How Australia's biggest organised crime sting - which yielded mountains of drugs, cash and guns - was almost blown when tech blogger warned the fake AN0M app being used to spy on mafia and bikie figures was a SCAM Blogger pointed out in March that the FBI-designed ANoM app was a 'scam' 'THEY ARE COMPROMISED, LIARS AND YOUR DATA IS RUNNING VIA USA' Development casts Australian Federal Police announcement in new light AFP revealed 224 people arrested across country as part of Operation Ironside Sting centred around the use of ANoM branded phones and messaging apps Criminals unknowingly used the tech, not realising police read their messages By Daniel Piotrowski for Daily Mail Australia Published: 04:00 BST, 8 June 2021 | Updated: 08:47 BST, 8 June 2021 A secret Australian police operation using a fake app to spy on the texts of senior mafia and bikie figures was put at risk when a tech geek correctly accused it of being a scam months ago. Authorities sensationally carried out the country's biggest ever organised crime bust on Tuesday morning, announcing 224 people had been arrested as a result of an elaborate sting using technology designed by the FBI. Some of Australia's most sinister criminal networks began using 'AN0M' branded phones and encrypted messaging almost three years ago, not realising the Federal Police were using the platform to read their messages. The app gained currency in the underworld after being promoted by drug kingpins such as Australia's most wanted man, Hakan Ayik, after first being distributed by police informants. Through the covert operation, detectives allegedly uncovered 21 murder plots - saving the lives of a family of five - and shut down gun distribution and mass drug trafficking rings. Mafia bosses, bikies and reality TV stars have been arrested.. A luxury Ducati motorcycle, Audi sedan, Rolex watches, ammunition, bullet-proof vests, firearms and even memorabilia from the 1972 cult classic The Godfather was seized from a number of properties. However, Daily Mail Australia can reveal the operation was in jeopardy of being compromised earlier this year - and authorities may have wound it up earlier as a result. In late March, an anonymous blogger known only as 'canyouguess67' posted an article warning users to keep off ANOM for their 'own safety'. Mafia figures and bikies purchased ANoM-branded phones with encrypted messaging technology already downloaded. When criminals used the phones, the messages were intercepted by Australian Federal Police law enforcement agencies +14 Mafia figures and bikies purchased ANoM-branded phones with encrypted messaging technology already downloaded. When criminals used the phones, the messages were intercepted by Australian Federal Police law enforcement agencies An anonymous tech geek posted a blog online in March, titled 'AN0M ENCRYPTED SCAM EXPOSED' +14 An anonymous tech geek posted a blog online in March, titled 'AN0M ENCRYPTED SCAM EXPOSED' Blogger 'canyouguess67' posted a chilling warning to users of the AN0M app on March 29, warning people: 'STAY AWAY .... IF YOU VALUE YOUR PRIVACY & SAFETY' Blogger 'canyouguess67' posted a chilling warning to users of the AN0M app on March 29, warning people: 'STAY AWAY .... IF YOU VALUE YOUR PRIVACY & SAFETY' Among the items seized by the AFP was memorabilia from the 1972 cult classic The Godfather +14 Among the items seized by the AFP was memorabilia from the 1972 cult classic The Godfather Australia's biggest ever police bust has seen 3.77 tonnes of drugs, $45 million in cash, guns, luxury cars, motorcycles and watches pictured) seized +14 Australia's biggest ever police bust has seen 3.77 tonnes of drugs, $45 million in cash, guns, luxury cars, motorcycles and watches pictured) seized Ninja Warrior 2017 contestant Sopiea Kong was among those arrested. The 33-year-old was charged last week following a raid at a Kangaroo Point home, where police allegedly seized 154g of meth +14 Ninja Warrior 2017 contestant Sopiea Kong was among those arrested. The 33-year-old was charged last week following a raid at a Kangaroo Point home, where police allegedly seized 154g of meth A tactical police officer guards a handcuffed arrested man during a raid. He was one of 224 people arrested as part of Operation Ironside +14 A tactical police officer guards a handcuffed arrested man during a raid. He was one of 224 people arrested as part of Operation Ironside Another tattooed man sits on a bed guarded by police as officers execute a search warrant on his home +14 Another tattooed man sits on a bed guarded by police as officers execute a search warrant on his home 'STAY AWAY FROM ANOM IF YOU VALUE YOUR PRIVACY AND SAFETY,' the blogger wrote in an article, which has since been pulled down. 'THEY ARE COMPROMISED, LIARS AND YOUR DATA IS RUNNING VIA USA.' In what now seems to be a telling clue, the blogger expressed serious concerns about the fact that the AN-M device he had tested 'was actually in constant contact with Google services' in both New South Wales, Australia and California. RELATED ARTICLES Previous 1 Next Inside the 'AN0M' bust: How fake encrypted app sting saw... Operation Ironside 'piggybacked' gang chat 'I was quite concerned to see the amount of IP addresses relating to many corporations within the Five Eyes Governments (Australia, USA, Canada, UK, NZ who share information with one another),' he wrote. Following a technical analysis, the blogger - correctly - recommended people not use ANoM technology, warning authorities could 'completely infiltrate every users' devices (sic) as well as their operations, and worse of all authorities would have the ability to decrypt and intercept messages'. In an incredible twist, the unnamed tech blogger warned that they had contacted law enforcement agencies with their concerns. The blog, named 'ANOMEXPOSED', has since been taken down but it was still publicly available via Google on Tuesday. It is unclear whether the tech expert's concerns reached the ears of the Federal Police or played a role in the project being sensationally unveiled today. The bust exposed new details about how one of Australia's most wanted fugitives gave police extensive access to the world's criminal underworld. Pictured: one man being arrested by AFP officers +14 The bust exposed new details about how one of Australia's most wanted fugitives gave police extensive access to the world's criminal underworld. Pictured: one man being arrested by AFP officers A tradie is seen kneeling with his hands tied behind his back after being arrested following raids +14 Millions of dollars in assets have been seized including this sparking collection of expensive watches A fire engine red Ducati which is also now in the possession of the Australian Federal Police +14 A fire engine red Ducati which is also now in the possession of the Australian Federal Police Prime Minister Scott Morrison said the AFP operation, known as Operation Ironside, had struck a 'heavy blow' against organised crime. 'The operation puts Australia at the forefront of the fight against criminals who peddle in human misery and ultimately, it will keep our communities and Australians safe,' he said on Tuesday. 'Illicit drug use ruins lives and fuels organised crime.' AFP Commissioner Reece Kershaw said federal agents had been in the 'back pockets' of criminals through the encryption app. The idea, Mr Kershaw said, came over a 'couple of beers' between officers and FBI agents years back. 'The FBI had the lead on this. We provided the technical capability to decrypt those messages,' he said. 'Some of the best ideas come over a couple of beers.' Ninja Warrior 2017 contestant Sopiea Kong was among those arrested. The 33-year-old was charged last week following a raid at a Kangaroo Point home, where police allegedly seized 154g of meth. Kong, who was also allegedly in possession of $2,030 cash and a revolver, was granted bail and will appear in court on June 28. Former Bachelorette star Samuel Minkin, who appeared on Becky and Elly Miles' season of the dating show, was charged with possessing a large commercial quantity of cannabis after police stopped a van in Byron Bay last month. Former Bandito bikie Benjamin Joseph Thornton, 31, was arrested after police seized two mobile phones and a small quantity of cocaine. He was denied bail and will reappear in court next week. What is ANoM? On its glitzy website, the 'ANoM' phone looks like any new tech innovation with sleek black lines, 'invite only' exclusivity and a pledge to 'enforce your right to privacy'. But its best feature - and for most of its users, the worst - wasn't promoted in its marketing material. The phone, which supposedly allowed encrypted communications safe from the eyes of the law, was actually a cunning trap laid for a who's who of organised crime. The Australian Federal Police on Tuesday revealed a breathtaking three-year tech ploy which led to 4,000 police executing 525 search warrants. 'Enforce your right to privacy': This is how the ANoM website advertised its product - with users not realising that law enforcement officials could read each and every message +14 'Enforce your right to privacy': This is how the ANoM website advertised its product - with users not realising that law enforcement officials could read each and every message Senior bikies and mafia figures were tricked into buying hi-tech phones that would supposedly let them messages one another, free of police snooping. But the ANoM phones were actually designed by the FBI and allowed Australian police to read the texts of organised crime figures. Police watched in real time as alleged crooks spilled their secrets to one another on their own app. Some 21 execution plots were foiled and drug and gun smuggling networks dismantled. Some 224 people have been arrested, $44,934,457 in cash seized, as well as 104 weapons, 3.7 tonnes of drugs and multi-million dollar assets. Alleged crooks even paid six-monthly subscription fees to the police - the money only further reinforcing law enforcement methods. How did it all work? Users could buy phone handsets costing between $1,500 and $2,500 from what has been described as underground distributors. The phones were stripped down - they couldn't even make calls, access the internet or send emails. What did do was send encrypted messages, photos and videos, using a foreign SIM card to apparently avoid Australian data snooping laws. Crooks could buy a six month subscription to use the app - the funds raised unknowingly redirected to the police. The app was invitation-only as of Tuesday morning - before the page was sensationally taken down and replaced with a warning by the FBI +14 The app was invitation-only as of Tuesday morning - before the page was sensationally taken down and replaced with a warning by the FBI Anom's Twitter account claimed the company was based in the famously neutral nation of Switzerland +14 Anom's Twitter account claimed the company was based in the famously neutral nation of Switzerland The app was accessed by entering a PIN number into the phone's calculator, the stuff of spy dramas. ANoM's website, which was only deleted about 10am on Tuesday, made the technology sound bulletproof. The company was apparently based in famously neutral Switzerland and boasted of 'military grade encrypt and sanitise'. For its encryption, it claimed to use 'OMEMO Double Ratchet Algorithm ... independently audited by Dutch security research group Radically Open Security'. That may have been an in-joke - as all the supposedly self-destructing messages sent on the app was radically open to the Australian Federal Police to read. Australia's most wanted drug kingpin Hasan Ayik (centre) was influential in spreading the AN0M app through his criminal networks, it has been claimed Australia's most wanted drug kingpin Hasan Ayik (centre) was influential in spreading the AN0M app through his criminal networks, it has been claimed Police have been coy about just how Australian mafia and bikie figures first came across the devices. That is likely to remain a secret, as it involves police informants. But what is clear is that the 'business' began to grow of its own accord beginning in about October 2018. Criminal 'influencers', including drug kingpin Hasan Ayik, eventually became so enthralled by the technology they distributed the devices around the world. The Federal Police and even Prime Minister Scott Morrison have crowed about the success of the scheme, rolled out in Australia due to its world-first data snooping laws. 'This is as a warning to organised crime in Australia, and abroad – the AFP and Australia's law enforcement agencies have a laser-like focus in bringing them to justice,' Mr Morrison said. But it is clear that AN0M is no secret anymore - with its details splashed across some of the nation's biggest newspapers today and hundreds of cases before the courts, many no doubt unaware that someone was sounding the alarm about the app months ago. This is how the Anom.io website looked as of late Tuesday morning +14 This is how the Anom.io website looked as of late Tuesday morning "
https://anomexposed.wordpress.com/2021/03/29/anom-encrpted-scam-exposed/ This url displays this to me: anomexposed.wordpress.com is no longer available. The authors have deleted this site.
On Tue, Jun 8, 2021, 5:54 AM grarpamp <grarpamp@gmail.com> wrote:
GoldBug Messenger is still out there doing really scammy things too, never audited, never reproducibly compiled, authors caught lying, censoring users, responding to questions, trolling sensitive lists to install and use it, etc.
??? What you say about open fabs is incredible, but why are you saying this? Are you sure you meant "goldbug" and not some other messenger? Goldbug looks a smidge funny but its audit is over 300 pages long, dated 2016, and publicly downloadable at https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf . Goldbug is open source and freely auditable by any independent entity. It is so important to support open source software. So individuals can modify them to their needs, build them to their specifications, and review them freely for anything dangerous.
The GoldBug Messenger fraud was already well documented on this and many other lists... they never defended the charges laid against them, just kept dodging and shilling their warez.
https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf
Anyone can write, post, print, and sell a bogus "audit". Good luck finding these so called "auditors" too... "David Adams (Tokyo)" "Ann-Kathrin Maier (Munich)"
n Tue, Jun 8, 2021, 8:03 AM grarpamp <grarpamp@gmail.com> wrote:
The GoldBug Messenger fraud was already well documented on this and many other lists... they never defended the charges laid against them, just kept dodging and shilling their warez.
I haven't found evidence of this in what my isp shows me. https://searx.be/search?q=site:cpunks.org+goldbug doesn't appear to display what you describe at all, to me, maybe you see something different.
https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf
Anyone can write, post, print, and sell a bogus "audit".
Good luck finding these so called "auditors" too...
"David Adams (Tokyo)" "Ann-Kathrin Maier (Munich)"
So I'm inferring that goldbug is real, and Adams and Maier are further endangered, now, and you were possibly hoping to protect them, not sure. Anyway the big fakes are crummy. I can't tell what the story around an0n and ciphr are, but anything we can do to protect users is helpful, in my opinion. It's obviously not always public good or justice guiding public discourse around cryptography, or guiding law enforcement. It's clear intense pressures develop. I'm not expecting you to diss something like goldbug without backing it up incredibly well. We appreciate your other privacy advocacy on this somewhat-stale list.
LMGTFY... download the list archives, search goldbug. If the internet hasn't been erased, the evidences all those threads reference will still be online.
endangered
Deepfakes aren't real thus can't be endangered, only challenged and exposed... https://thispersondoesnotexist.com/ GoldBug failed the challenges posed, thus exposing itself even further beyond their fishy actions that people were observing that led to the challenges. Until they pass them, users need to beware GoldBug, and/or do/pay/seek their own audit to satisfy themselves.
On Tue, Jun 8, 2021, 9:20 AM grarpamp <grarpamp@gmail.com> wrote:
LMGTFY... download the list archives, search goldbug.
If the internet hasn't been erased, the evidences all those threads reference will still be online.
Well, I'm not prioritising this atm, but I don't believe you. I tried to start a tiny blockchain archival project around the list archives, ... so it is very hard for me to download them, no biggy, we can disagree.
endangered
Deepfakes aren't real thus can't be endangered, only challenged and exposed...
It's cool you're mentioning deepfakes. I clicked your link and started learning just a little bit about generative adversial networks. Ever feel like your whole country is a big GAN filled with clear and direct stories showing how this is true? The fact that we still have world problems does not say a lot about freedom of software development nor freedom of communication. Conflict is stirring in the huge communal tower of babel. Let's change what you said. Quoted for flavor, not meaning to imply you said this:
karl and grarpamp failed the challenges posed, thus exposing themselves even further beyond their fishy actions that people were observing that led to the challenges.
If either karl or grarpamp, or honestly anyone still posting to this list, is an actual real human being, rather than simply a generative model, and honestly I am very skeptical that they would not be, then they are clearly simply following the direction of one.
Until they pass these challenges, users need to beware of karl, grarpamp, or any others still posting to this list, and/or themselves make use of cryptographic signatures to verify things.
But that's obvious! Everyone's expected to do their own review, especially if the code isn't signed by somebody in their network of trust. It's important to safely state what's obvious when the world is saying something different. A lot of people will learn it when you do.
participants (4)
-
grarpamp
-
jim bell
-
Karl
-
Karl Semich