Watching the watchers: spook database
This is good clean fun. Watch: https://www.youtube.com/watch?v=xipI-0HU010 Kurzthese: Secret surveillance programs have metadata too. The same people and companies that operate secret surveillance programs also publish details about their work on the open internet. We can use this data to watch the watchers. Beschreibung: “Proficient in Microsoft Word and Xkeyscore” and similar phrases are surprisingly common on LinkedIn profiles. NSA contractors, military, and others involved in the surveillance state post seemingly coded and harmless details about their work in job listings, social media, and other open websites. But this information provides useful metadata that can be used to understand the function of secret programs and map the surveillance state. Transparency Toolkit has been building open source tools to collect and analyze this open source intelligence. This talk discusses how we can use these data sources and tools to build a sousveillance state that holds the surveillance state accountable.
On Thu, May 7, 2015 at 3:12 AM, Bethany <groundhog593@riseup.net> wrote:
This is good clean fun.
They are not engaged in a clean fight against you, so why try to bullshit them and play games with baloney phrases like that.
Watch: https://www.youtube.com/watch?v=xipI-0HU010
Secret surveillance programs have metadata too. The same people and companies that operate secret surveillance programs also publish details about their work on the open internet. Transparency Toolkit has been building open source tools to collect and analyze this open source intelligence. This talk discusses how we can use these data sources and tools to build a sousveillance state that holds the surveillance state accountable.
See also names at: http://cryptocomb.org/ Physical and virtual doxing has been going on in the darknets for years. Even sites for AP and other accountability services have popped up.
On Thu, May 07, 2015 at 09:12:29AM +0200, Bethany wrote:
This is good clean fun.
except it is not clean. it is a honeypot, even if unintentionally (aka plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers
but the data is indeed cool, get it from github directly, it's a bit biggish though. -- otr fp: https://www.ctrlc.hu/~stef/otr.txt
On Thu, May 07, 2015 at 11:08:30AM +0200, stef wrote:
plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers
Conspiracy theories scale exponentially, even if true ;) [0] Who watches sheeple? [1] Who watches [0] ... [n] Who watches [n-1]? A real world implementation of the above is unbounded recursion and will terminate due to lack of resources.
We're sorry, but something went wrong.
If you are the application owner check the logs for more information.
On 05/08/2015 07:50 AM, Georgi Guninski wrote:
On Thu, May 07, 2015 at 11:08:30AM +0200, stef wrote:
plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers Conspiracy theories scale exponentially, even if true ;)
[0] Who watches sheeple? [1] Who watches [0] ... [n] Who watches [n-1]?
A real world implementation of the above is unbounded recursion and will terminate due to lack of resources.
On Fri, May 8, 2015 at 7:50 AM, Georgi Guninski <guninski@guninski.com> wrote:
On Thu, May 07, 2015 at 11:08:30AM +0200, stef wrote:
plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers
Conspiracy theories scale exponentially, even if true ;)
[0] Who watches sheeple? [1] Who watches [0] ... [n] Who watches [n-1]?
A real world implementation of the above is unbounded recursion and will terminate due to lack of resources.
Not if everyone is a watcher. Kurt
On Fri, May 08, 2015 at 10:43:53PM -0700, Kurt Buff wrote:
On Fri, May 8, 2015 at 7:50 AM, Georgi Guninski <guninski@guninski.com> wrote:
On Thu, May 07, 2015 at 11:08:30AM +0200, stef wrote:
plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers
Conspiracy theories scale exponentially, even if true ;)
[0] Who watches sheeple? [1] Who watches [0] ... [n] Who watches [n-1]?
A real world implementation of the above is unbounded recursion and will terminate due to lack of resources.
Not if everyone is a watcher.
Kurt
You mean everyone watches everyone? Strange game this is and technically illiterate people might be dependent on others. If everyone watches proper subset of the others, my argument appears to apply. On second thought since $n$ appears bounded, the recursion appears bounded too.
Dnia sobota, 9 maja 2015 15:20:02 Georgi Guninski pisze:
On Fri, May 08, 2015 at 10:43:53PM -0700, Kurt Buff wrote:
On Fri, May 8, 2015 at 7:50 AM, Georgi Guninski <guninski@guninski.com> wrote:
On Thu, May 07, 2015 at 11:08:30AM +0200, stef wrote:
plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers
Conspiracy theories scale exponentially, even if true ;)
[0] Who watches sheeple? [1] Who watches [0] ... [n] Who watches [n-1]?
A real world implementation of the above is unbounded recursion and will terminate due to lack of resources.
Not if everyone is a watcher.
Kurt
You mean everyone watches everyone?
I see what you did there. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147
On Fri, May 08, 2015 at 05:50:32PM +0300, Georgi Guninski wrote:
On Thu, May 07, 2015 at 11:08:30AM +0200, stef wrote:
plausibly deniably), let me quote twitter:
"watching the watchers" https://icwatch.transparencytoolkit.org/ going over cloudflare, so the watched watchers can watch the watching watchers Conspiracy theories scale exponentially, even if true ;)
hah, so they have a tor HS, and now they partnered with wikileaks which is also not "managed" by cloudflare. why not do things properly from the beginning? -- otr fp: https://www.ctrlc.hu/~stef/otr.txt
participants (7)
-
Bethany
-
Georgi Guninski
-
grarpamp
-
Kurt Buff
-
Razer
-
rysiek
-
stef