sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

592
active users

#nsa

7 posts7 participants0 posts today
Continued thread

non dimenticherò mai le parole che mi disse il direttore tecnico della #NSA #BillBinney,che si dimise dopo l'11 settembre in protesta contro l'abuso del suo programma per identificare reti terroristiche, trasformato in un programma di sorveglianza di massa

nextgov.com/cybersecurity/2025

"…they often think that what they do is not important enough to be targeted. But when you have the significant resources like that to conduct mass scanning and mass exploitation, there is no company and no target too small…” so Bailey Bickley, chief of Defense Industrial Base defense at the #NSA #Cybersecurity Collaboration Center,

“They’re not thinking about two-year-old vulnerabilities. They’re thinking about building the best antenna for #DOD that money can buy.”

Nextgov.comSmall defense industrial base firms pose tempting targets for nation-state hackers, NSA official saysSome 80% of the defense industrial base are actually small firms, according to the NSA’s head of DIB security, who has helped over 200 providers identify thousands of vulnerabilities in their systems.

ok...so we have to talk about this.
m.youtube.com/watch?v=1MoYHJaK
first off, encrypted messengers, like whatssapp, *require* #kyc in order for you to sign up.
that is also baught by law enforcement. ayour contence, granted, are encrypted, but sometimes metadata is even more important. as #nsa director michael haden once said: "we kill based on metadata".
should tell ya something. even if some providers, such as mint mobile in the US, don't require direct identification via a government ID, it is still kyc eitherway. and as @kkarhan once said, KYC is the elicit activity.
second, privacy and security settings? lol don't make me laugh. you don't actually know what the client is collecting when you use it. it's offen not open source, and offen still is able to gather data on you in other ways.
or it could just saay off, but actually be on.
the only way to *truely* regane privacy would be to use #selfhosted applications and open source apps.
#surveillance #tor #whatsapp #signal #privacy #cybersecurity

In 2021 I bought a small Chinese ultrabook, the One Netbook A1. You can find a review at liliputing.com/one-netbook-a1- and the official site for the company appears to be 1netbook.com. I wanted a small computer with USB ports so I could teach a hybrid course with a USB webcam pointed at the blackboard.

It was a bit hard to get the One Netbook A1. Despite positive Western reviews, no American company was selling it anymore, and I couldn't order it directly from the the PRC. I had to use a European intermediary in order to obtain it. I would joke that the ultrabook had the PRC's version of our NSA's spyware built in, so I wasn't supposed to have it. In any case, it worked well for my purposes and I had fun using it over the next couple years.

I was letting the machine collect dust for a while, and I finally decided to give it new life by switching it from Linux Mint to Linux Mint Debian Edition. When I did so, I found that (again) the screen wanted to be in tablet mode and I couldn't get it to switch through the Display menu. I had an applet that solved this before, but it was no longer available. I ended up writing my own script for switching screen layouts quickly. In the process, I found reddit.com/r/GPDPocket/comment which says that the Reddit One Netbook community is «banned». Maybe my joke was more right than I thought?

Liliputing · One Netbook A1 handheld computer preview - LiliputingOne Netbook A1 handheld computer preview

“Encryption Backdoors and the Fourth Amendment”

Law journal article that looks at the Dual_EC_PRNG backdoor from a US constitutional perspect... schneier.com/blog/archives/202

Schneier on Security · "Encryption Backdoors and the Fourth Amendment" - Schneier on SecurityLaw journal article that looks at the Dual_EC_PRNG backdoor from a US constitutional perspective: Abstract: The National Security Agency (NSA) reportedly paid and pressured technology companies to trick their customers into using vulnerable encryption products. This Article examines whether any of three theories removed the Fourth Amendment’s requirement that this be reasonable. The first is that a challenge to the encryption backdoor might fail for want of a search or seizure. The Article rejects this both because the Amendment reaches some vulnerabilities apart from the searches and seizures they enable and because the creation of this vulnerability was itself a search or seizure. The second is that the role of the technology companies might have brought this backdoor within the private-search doctrine. The Article criticizes the doctrine­ particularly its origins in Burdeau v. McDowell­and argues that if it ever should apply, it should not here. The last is that the customers might have waived their Fourth Amendment rights under the third-party doctrine. The Article rejects this both because the customers were not on notice of the backdoor and because historical understandings of the Amendment would not have tolerated it. The Article concludes that none of these theories removed the Amendment’s reasonableness requirement...

@tromo @hologram @dougroudouvari
That's a big one! btw I have edited a little wikipedia, but those pages were not involved in political controversy.
I corrected a few links of the page for Earth Day - at the time I didn't know the NSA was spying on the first Earth Day under the direction of Richard Nixon - I now have those documents -- somewhere -- , and wonder if I should try adding them to the story.
I didn't have trouble before, but now, I wonder. #NSA #EarthDay