Strong Security Processes Require Strong Privacy Protections, Re: [liberationtech] Foxacid payload

John Young jya at pipeline.com
Fri Jul 18 08:19:58 PDT 2014


On two related threads:

It's a challenge to work counter-spying without access to all of
Snowden's alleged, note alleged -- nobody knows except Ed
how many or where multiply-accumulated and -stashed from
2008-2013 and afterwards -- documents.

But parsing the unknown, imagining and acting on possibilities,
is the purpose counter-spying as well as spying. Failure expected,
narrowing it for modest utility, no lasting triumph. Privacy as
elusive as security.

It could be, has been, argued that open source coding, like the
Internet, is a ploy, or decoy, like comsec standards committees
and spy oversight committees, even, some claim, Tor and PKC,
AV and Blacknet, so forth and so on paraded here for Internet
dog years.

Duplicity, buyer beware and who watches the watchers inherent,
is that not the wee chihuahua way of survival against greater powers of
Fort Huachuca whisperers, GMO vegetables, fracked minerals,
DoD-fabricated asteroids and black hos of nightsweat zombies.

Whistling in the dark, whistleblowing sunshine, coding out of
sight except for sneaky supra-Tempest io-germs gnawing backbone
taps into HUMINT dervishing switch doctors.






More information about the cypherpunks mailing list