IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New One can't forget that machines can be intercepted while new and moving from maker to customer.
So, physical possession of a machine is not necessarily a problem for someone like say CIA. But, unless they tamper with them all, there is a difference between walking into a store and buying one getting one from Amazon when you have been identified.
Alex

"There is a cult of ignorance in the United States, and there has always been. The strain of anti-intellectualism has been a constant thread winding its way through our political and cultural life, nurtured by the false notion that democracy means that "my ignorance is just as good as your knowledge."

-- Isaac Asimov
New Or malware can be put on the "restore" DVDs, etc., etc.
E.g. https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal

If someone can touch the hardware or software at any point along the way, one cannot guarantee that the computer hasn't been compromised.

Relatedly, I wonder how many of the VPN companies out there end up being less secure communications routes than simply trying to remain anonymous. And, IIUC, the NSA can keep any encrypted communications it finds for N years - even if that communications couldn't legally be kept if it weren't encrypted. IOW, one (in some sense) draws attention to oneself by using encryption... :-/

Cheers,
Scott.
New Catch ..2018 and --> onwards
In summary, this minor brohaha suggests that, even were there er, Actualized: a brand-new turbocharged Intarweb some. day. this situation of now-guaranteed Insecurity ... shall remain the same.
(Could this be Nature's Way of (trying to..) Remind Us'ns-All: that in This omniverse, the word Certainty is both a chimera and ... a demonstrable oxymoron?)

(It's assuredly the case within all metaphysical wonderings) so.. I calls it a glimpse. a palpable glimpse of Reality. But I'm biased; I may not pass the Turing test either. Likely too: "acute testosterone poisoning" is apt to be big on the homo-sap necropsy (isn't Hacking just another form of Mine's Bigger?)

Carrion



Does not Gödel's Incompleteness Theorem demonstrate this Finally? (except for Itself proving to be somewhat, er incomplete also too?)
Bring on all them NRA-armed-to-teeth minions; my Ronald's Raygun Quantum-Blaster can disintegrate a case of .44 Magnums from a mile away.

;^> Sorry.. all of 2016 thru today has been so Irregularly-irregular that, only the Goddess of Humour can make sense of the whole schmeer. Endorphins appear wherever a one can find them :-)
     TR: Newly reported AMD chipset vulnerabilities. - (Another Scott) - (6)
         They're insanely hard to trigger - (drook)
         Interesting soap opera.. - (Ashton)
         One can't forget that machines can be intercepted while new and moving from maker to customer. - (a6l6e6x) - (3)
             Or malware can be put on the "restore" DVDs, etc., etc. - (Another Scott) - (1)
                 Catch ..2018 and --> onwards - (Ashton)
             Very true - (crazy)

1500: The Goal, the Mission, the Odyssey.
423 ms