Friday, June 14, 2013

Multiple Breaches

I wonder what those security experts would say if they could look at Mike and my computers? [More]

[Via several of you]

2 comments:

Crotalus said...

"Breeches": a style of pants, or in reference to a breech loading gun, as opposed to a muzzle loader.

"Breach": to break through a defense.

I suggest that the word for your title would be "Breaches", unless you have a hidden meaning.

Mark Matis said...

If you're using a computer with Microsoft or Apple or Google software on it, you are INDEED susceptible to intrusion by Your Betters. Smart money says those fine entities have provided back doors for the FedPigs. On the other hand, if your computer is running open source software, such back doors are FAR less likely. Of course, the FedPigs have free access to anything you send or receive over the internet, and even if you encrypt all that, if they KNOW it is coming from a device that belongs to you, they can intercept it and have the horsepower to decode should they choose.

If you REALLY do not want them to know what you are doing, go to a big box store and purchase a laptop with cash. Do NOT give them a name, phone number, or address "for warranty purposes". When you get the computer home, do NOT let it connect to the Internet through your ISP. Instead, wipe the hard drive and install an open source operating system such as Ubuntu. Then install TOR. Then take that laptop to a free wireless access point such as Mickey D's. Fit in. If you're at Mickey's, order enough food to last as long as you're using their access. Be polite to their staff. And don't ALWAYS use the same access point. Mickey's one day, your local library the next, and so on.

By the way, the above only secures YOUR end of the connection. If you're communicating with someone who's running Windows or such, or if you're unintentionally dealing with one of those FedPigs who live to infiltrate, incite, and indict, well...