Jabber
John Young
jya at pipeline.com
Sun Jun 29 08:39:15 PDT 2014
At 10:20 AM 6/29/2014, you wrote:
>any add. info on 'compromised jabber'?
>Got some hints as well - nothing clear.
"Compromised" is the time's opportunistic word for ever more anti-NSA
comsec, mom.
Cisco Jabber Client (scroll down):
http://www.dailykos.com/story/2014/04/11/1291357/-NSA-Kept-You-Unsecure-It-Knew-of-Hearbleed-Bug-But-Used-it-Instead-of-Fixing-the-Security-Breach
"
Linked In Microsoft Office + Jabber Listed in Spy Program Specialty"
(scroll down)
https://www.techdirt.com/articles/20130617/13482623512/discovering-names-secret-nsa-surveillance-programs-via-linkedin.shtml
US Secret Service reportedly rigged access to Jabber to take down
Silk Road and others. Can't find reference.
Allegations also made against Chaos Computer Club being "compromised."
No question that all these could be disinfo ops to distrust the
services, discourage use and drive users to less
trustworthy servcies. However, the post-Snowden rise in "secure drop
boxes," "NSA-proof email," and the bountiful other snake oils by the
comsec industry and peculiarly opportunistic do-gooders suggests there are
willing and unwilling cooperators with the spooks industry, and not
least, the thriving anti-spooks industry consulting the spooks on
what can be done "without harming national security."
Cypherpunks laid the foundation for this, no question, and a few have
gone on to do rather well at working both sides of comsec, that is
what comsec has always been: duplicitous, sneaky, treacherous, lying,
cheating, why not tell it snakily, downright upright-humans raping
the planet and beyond the blob, the stars.
Examine speaker bureau offerings for who is traveling the blob
peddling prime snake fracking.
More information about the cypherpunks
mailing list