The betrayal of tech companies

Topic by

Home Forums Political Corner The betrayal of tech companies

This topic contains 17 replies, has 6 voices, and was last updated by Solid  Solid 1 year, 8 months ago.

Viewing 18 posts - 1 through 18 (of 18 total)
  • Author
    Posts
  • #815625
    +5

    Anonymous
    3

    Hi everyone, I found a good summary article, just written in a local men’s rights site, on internet censorship topic:

    https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fwww.ferfihang.hu%2F2018%2F05%2F25%2Fa-tech-cegek-arulasa%2F&edit-text=&act=url

    (does anyone know any alternative to this translation service, that I can just link in? … )

    Also, a good summary on how the internet works, and what are the weak points:
    https://www.eff.org/free-speech-weak-link/#home
    it is worth to click around and read it…

    #815628
    +4

    Anonymous
    3

    S~~~, what they don’t want us to know about:
    https://www.eff.org/issues/shadow-regulation

    The first linked (translated) article also links to some “Return of the kings” articles in the topic.
    For example this one is very insane crazy: http://www.returnofkings.com/129207/france-adopts-law-that-uses-informants-to-monitor-private-conversations-for-hate-speech

    This one is also linked, about “liberals” against pua: http://www.returnofkings.com/159286/the-death-of-the-pua-community

    This one is good, too: http://www.returnofkings.com/128584/night-of-the-digital-knives-silicon-valley-launches-biggest-internet-censorship-purge-in-history

    Another one: http://www.returnofkings.com/88292/the-european-union-partners-with-facebook-google-and-twitter-to-censor-hate-speech

    So, free speech is (has been in recent years) under a large-scale attack!

    I don’t think, it is a really new information for anyone. But anyway, what happens now towards any non-mainstream opinion about things, can happen to men’s rights & manosphere topics too. Even if we do not hate anyone…

    #815634
    +9
    Solid
    Solid
    Participant
    7520

    Brother, it all started with “we need to limit the bandwidth to some websites”, so they could NOT put money to have a better infrastructure, this s~~~ is called “traffic shaping”. So when the government realized that, instead of f~~~ing those telecom companies, they just “hey, let’s talk, you do your dirty job as you want, but I only let you get away with it if you help me to do my dirty job too”.

    There is a f~~~ing huge conspiracy, websites use nowadays in the vast majority TLS (that https in your url means that it is encrypted). But in the header of your packets you have to say wich website you are accessing so the server knows what key to use.

    This sound safe, until you realize that the government HAS POWER over the companies that issue those certificates and also they can issue them. For example they can issue a certificate for mgtow.com, redirect the network traffic for this website to their servers so they can capture what you say, send you the fake keys, and be between you and this website, analyzing everything, including passwords. This is called Man In The Middle attack (MITM).

    You may thing, “this s~~~ isn’t that big”, well, it is, they can hijack a whole country. Search for “bgp hijacking” and you will read some scary stories, if you know any network admin or if you are one, you will know that not even 10% of those millenials configuring the critical internet infrastructure know that they are doing, others do ON PURPOSE, and there is a huge conspiracy that several companies including Cisco work with the government to put backdoors inside their products.

    Search for cinnamon and earl grey and what NSA used they for.

    There is a f~~~ing huge conspiracy around tech industries and they being the puppets for the government.

    #815637
    +5
    Solid
    Solid
    Participant
    7520

    I don’t think, it is a really new information for anyone. But anyway, what happens now towards any non-mainstream opinion about things, can happen to men’s rights & manosphere topics too. Even if we do not hate anyone…

    Why did you think that TOR & other alternative networks are so hated by the government ?
    Because they can’t directly censorship them. Is a huge pain in the ass for them to know what is going on. More people use TOR, more “trash” (encrypted data) is added to the network, so it become even harder to know what is going on.

    Feds can find you using tor, but they can’t prove s~~~. If everyone uses it, they will lose their minds. But this is only one layer, intel has even a shadow operating system running inside their chips, we can expect all kinds of backdoors in everything that we use. But that isn’t an excuse to be sloppy with privacy and not protect ourselves.

    Do the best that you can to keep your information safe from them, useless laws only exist to put you in jail if there isn’t anything else that they can use to frame you when they need to take you down.

    #815640
    +4

    Anonymous
    3

    This sound safe, until you realize that the government HAS POWER over the companies that issue those certificates and also they can issue them. For example they can issue a certificate for mgtow.com, redirect the network traffic for this website to their servers so they can capture what you say, send you the fake keys, and be between you and this website, analyzing everything, including passwords. This is called Man In The Middle attack (MITM).

    Yes, I know about this.
    1. ANY certificate authority can issue a certificate to ANY website. And the browser will accept it, show the green lock in title bar and you feel safe…. maybe false feeling of safety…
    2. Certificate authorities are companies under legal pressure from governments.
    3. Certificate authorities employ humans, humans may mage mistakes, and it may get hacked.
    4. Governments “security” agencies collect & weaponize vulnerabilities of software instead of actually caring for security and fixing them… There is no such thing as “safe backdoor” in practice, said by many experts too, but they don’t listen… A backdoor that might be used to catch some evil criminals can also be used to do large scale evil s~~~, like oppressing the whole world population…

    points 1 & (2 or 3) make MITM veery easy for someone with lot of power. HTTPS is absolutely not to be considered secure…

    Somehow, one would really need to make sure that he uses the correct certificate of the site… Meet the site owner in person, and get a printed version of the certificate key? Or what the heck would solve this?

    #815645
    +4
    Faust For Science
    Faust For Science
    Participant
    22577

    Two words: My Space.

    At one point, My Space was the social media service to use. Then, those at My Space messed with their system so much that now My Space is a shell of its former self.

    This censorship has been done to early. Now, the people have time to find alternative services and use them to help with their political support for the upcoming mid-term elections.

    #815650
    +3

    Anonymous
    3

    Another MITM stuff:
    It is alternatively called as “SSL inspection”.

    my employer also does this, when I use the office network. Probably others too. When you right click the green lock in the title bar, and see some unusual CA name (for that site), then it may be “inspected” and all the info goes through the company’s antivirus, and who knows what else, maybe get logged, session cookies and passwords collected and so on… Although they do not dare to do it on the network banking sites, because that would be obvious and probably very illegal.

    Technically, also any ISP is capable of doing that, or anyone that the network wire goes through.

    #815656
    +2
    Solid
    Solid
    Participant
    7520

    Somehow, one would really need to make sure that he uses the correct certificate of the site… Meet the site owner in person, and get a printed version of the certificate key? Or what the heck would solve this?

    How TOR do it, the problem with tor is that you can’t have a half descent replication of your service in another zone/datacenter.

    On tor you use a hashed version of the public key of the certificate as your host address.
    The key is completely generated by you, and you can use certain tools to get some nice names.
    But it doesn’t scale, the internal routing of the tor network will map one endpoint for that key, there is no way to distribute the traffic, and nowadays this is a huge limitation (and also can be viewed as a way that they can breach your privacy, by systematically shutting down routes for the tor nodes on the internet and analyzing if your hidden service still available).

    A good alternative would be using GPG to sign the website certificate, and make a chain using only those signatures (no CA). For example, you trust my key, gargamels key, KM key, mgtower key, etc… so you trust the signature that we made saying that a certain key is the key from this website. If the key changes, we all need to sign it again to make it valid (making the old key sign the new one could be dangerous because someone can compromise the old private key and everything is screwed).

    But those signatures need time, usually you do some event with your friends, so everyone can sign the key of everyone (so users can’t impersonate each other), these events are called key signing parties https://en.wikipedia.org/wiki/Key_signing_party.

    Talking about this, would be good if we did some key exchange between members here.

    #815658
    +5
    Solid
    Solid
    Participant
    7520

    Two words: My Space.

    At one point, My Space was the social media service to use. Then, those at My Space messed with their system so much that now My Space is a shell of its former self.

    A long time ago, when facebook become a “thing” I started to think about it, so many social networks, so many BETTER social networks, how can facebook become so popular so fast ?

    The first thing was what you just said brother, they already born f~~~ed up and sold themselves to the government. I won’t be surprised if there was any “special contract” with them and the government, like “you give me money, and you can have access to everyones data”.

    #815659
    +2
    Solid
    Solid
    Participant
    7520

    Technically, also any ISP is capable of doing that, or anyone that the network wire goes through.

    That is my paranoia brother !!

    #815660
    +1

    Anonymous
    3

    Feds can find you using tor,

    yes, that is a big flaw of the alternative networks. There is no real free speech if one can be put on a watch list for using alternatives. They may just make it illegal, by some bulls~~~ blahblah that also terrorists and criminals use it. (by that logic, they could also illegalize kitchen knives and vehicles…)

    Without owning the physical layer, and relying on wires controlled by government and huge companies, there will not be free speech. Of course, there will always be opinions or content that one does not like. But without free speech, we are heading into an invincible tyranny.

    #815661
    +1
    Solid
    Solid
    Participant
    7520

    yes, that is a big flaw of the alternative networks. There is no real free speech if one can be put on a watch list for using alternatives. They may just make it illegal, by some bulls~~~ blahblah that also terrorists and criminals use it. (by that logic, they could also illegalize kitchen knives and vehicles…)

    hahahahaha I hate when they start doing those comparisons ! They did the same with bitcoin, they do it with everything that don’t fit in their agenda !

    #815663
    +2
    Solid
    Solid
    Participant
    7520

    Without owning the physical layer, and relying on wires controlled by government and huge companies, there will not be free speech. Of course, there will always be opinions or content that one does not like. But without free speech, we are heading into an invincible tyranny.

    I know several hobbyists that are into SDR (Software Defined Radio). This is a good solution to connect alternative networks at distance, while you keep using cables for a smaller local infrastructure. But unfortunately the internet wasn’t build for the scale that we have today, we are too dependent to “central” servers (DNS, content, etc…), ipfs is the future IMHO, but it still in a very embryonic stage (https://ipfs.io/).

    #815729
    +2
    743 roadmaster
    743 roadmaster
    Participant

    Control of the narrative almost always has been the agenda. Tech wants it because simple mistake cost millions in lost sales. Keep it out of the news or control the information.
    We all know why the big government wants it,..

    mgtow is its own worst enemy- https://www.campusreform.org/

    #815888
    +2
    IMickey503
    iMickey503
    Participant
    12467

    Ahem. Yea.. I’ve only been talking about this s~~~ since…. Oh… 2001. Tor weirdly was made by the US NAVY. Pretty cool stuff hugh?

    Well, as far as communications go, you can hide in the stream. There are ways.

    It’s also one of the reasons why they don’t want to push IPV6 on the internet. To hard to track. TO many address to use. Plus all the built in encryption in the protocall.

    The truth is, if you don’t have PHYSICAL FREEDOM. THe online stuff is kind of pointless.

    As always, you have to know your internet routes. And be able to mask you traffic.

    And the BACK DOORS are WELL IN PLACE> THere is a reason why the Linux guys are flipping their s~~~ over hardware. And why so many items run in a protected kernel.

    You are all alone. If you have been falsely accused of RAPE, DV, PLEASE let all men know about the people who did this. http://register-her.net/web/guest/home

    #815946
    +2

    Anonymous
    1

    A long time ago, when facebook become a “thing” I started to think about it, so many social networks, so many BETTER social networks, how can facebook become so popular so fast ?

    Yes you are absolutely correct. Google, Facebook and so many other companies are controlled by the “Big Boys.” The way it is done is through front companies.

    Just like how the CIA had many different front companies owning newspapers and financing programs like (Gloria Steinem’s Feminism). Some of these companies are legitimate, but they operate for a “hidden” purpose.

    What they do is selectively finance and support these chosen gate keepers like Google and Facebook. They help them corner the market and in turn they can use these companies as intelligence assets.

    #816041
    +1
    Solid
    Solid
    Participant
    7520

    THere is a reason why the Linux guys are flipping their s~~~ over hardware. And why so many items run in a protected kernel.

    Yes brother !! That is a point that bug a lot of us !!

    For those reading this topic that aren’t familiar with @imickey503 is pointing out. Imagine the example of a wireless cards for notebooks, those cards (mini-pcie) have DMA (direct memory access).
    It means that your wireless card can dump your whole memory or write to it, in other words, it can put anything to execute in your machine (change the code of a running process to inject a backdoor/keylogger, etc…) , or get everything from your computer memory and send it over the air. They don’t need to have any access to your machine besides being just nearby if it has a backdoor in that level !

    Those cards need a firmware to operate, and the vast majority of cards don’t have an open source firmware, so you don’t have idea of what really is going on there. That is why a lot of people use USB wireless cards, to prevent this issue since USB don’t have this kind of privilege.

    #816048
    +1
    Solid
    Solid
    Participant
    7520

    Just like how the CIA had many different front companies owning newspapers and financing programs like (Gloria Steinem’s Feminism). Some of these companies are legitimate, but they operate for a “hidden” purpose.

    I really love this theories because you just need a little digging and you find proof ! Thank you brother !!

    Here is a video if anyone is interested

Viewing 18 posts - 1 through 18 (of 18 total)

You must be logged in to reply to this topic.