Re: Strong Security Processes Require Strong Privacy Protections, Re: [liberationtech] Foxacid payload
On two related threads: It's a challenge to work counter-spying without access to all of Snowden's alleged, note alleged -- nobody knows except Ed how many or where multiply-accumulated and -stashed from 2008-2013 and afterwards -- documents. But parsing the unknown, imagining and acting on possibilities, is the purpose counter-spying as well as spying. Failure expected, narrowing it for modest utility, no lasting triumph. Privacy as elusive as security. It could be, has been, argued that open source coding, like the Internet, is a ploy, or decoy, like comsec standards committees and spy oversight committees, even, some claim, Tor and PKC, AV and Blacknet, so forth and so on paraded here for Internet dog years. Duplicity, buyer beware and who watches the watchers inherent, is that not the wee chihuahua way of survival against greater powers of Fort Huachuca whisperers, GMO vegetables, fracked minerals, DoD-fabricated asteroids and black hos of nightsweat zombies. Whistling in the dark, whistleblowing sunshine, coding out of sight except for sneaky supra-Tempest io-germs gnawing backbone taps into HUMINT dervishing switch doctors.
participants (1)
-
John Young