Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ

Wtf is happening

Freewheeling spot to chew the fat on anything cryptostorm-related that doesn't fit elsewhere (i.e. support, howto, &c.). Criticism & praise & brainstorming & requests for explanation... this is where it goes when it's hot & ready for action! :-)
User avatar

Topic Author
hashtable
Posts: 40
Joined: Sat Mar 26, 2016 4:27 pm

Wtf is happening

Postby hashtable » Fri Sep 16, 2016 2:25 pm

Does anybody know what is happening? What's real and what's fake? Everyday a new hack, scandal. Was Dropbox hacked? Or was Dropbox spyware? Or has the Dropbox spyware been hacked and now is being used by.. who knows? Can we distinguish a nation state from a hacker in a basement? How many high profile hacks have occurred in the last 2-3 months? What provoked it? donald trump? Are we being distracted? Who can we trust?

Has the back door been implemented? Multiple instituons have expressed intent - is that probable cause? Has it been implemented? If so, what are the consequences?

Let's take a step back. Multiple geopoticial institutions with adequate resources have publicly admitted interest in implementing back Door's.

I support those efforts. If it was done, it was done elequencly. My purpose is not to interfere with that. My concern is this: what are the unforeseen consequences?

If you create a passive backdoor, how do you make it invisible to the system, without allowing others to also use the invisibility cloak? Do you have any way of knowing if anyone else would be using the cloak at the same time? Maybe modify the cloak? Or is the system so isolated and specific to a domain that it has no way of knowing?

If everything is IO - and every program has expectations - how does the program know if the input is legit? It doesn't. As long as it sings the song, it's assumed legit. Computers are stupid as fuck. No context awareness unlike humans.

Modify this fake that. Good intentions, I assume. But it needed to be done, so, maybe the consequences weren't fully understand.

I'm not a hacker. I can't write a line of code in that shit. But I see the system, I see mistakes, and I see brilliance beyond comprehension, beauty... just kept by this beast locked in a chamber.

If time is unreasonable - by I mean that time has no mathemical / philosophical / physical or linguistic representation that makes sense. Can we program constructs in computer science that are literally unreasonable? No. We can't. We can't program that which has no mathematical / logical/ linguistic understanding. Because technology - media - is an extension of our self. (Marshall McLuhan). So... does that mean there are - by logical necessity-zero days ( pun?) inherent within every operating system's representation of time?

This is just a hypothetical conjecture, I literally have no knowledge regarding anything in these matters, just queer ideas I've been contemplating. i don't know anything - I merely contemplate strange ideas - that's all. Maybe material for a sci-fi thriller?

Return to “general chat, suggestions, industry news”

Who is online

Users browsing this forum: No registered users and 11 guests

cron

Login