www.transicionestructural.NET es un nuevo foro, que a partir del 25/06/2012 se ha separado de su homónimo .COM. No se compartirán nuevos mensajes o usuarios a partir de dicho día.
0 Usuarios y 6 Visitantes están viendo este tema.
Hombre, en linux duraría menos que un banquero en la cárcel... pero por intentar, que lo intenten.
Cita de: wanderer en Febrero 28, 2013, 10:35:26 amPregunta para quién de esto sepa:Si igual que el teclado permite hacer un pantallazo de lo que en ése momento aparezca en el monitor (lo cual, por cierto, permite saltarse las restricciones de privacidad que pueda tener una página de archivo PDF o JPG), y luego salvarla en una copia de Word, PDF sin licencia, etc, de igual modo podría hacerse eso de manera continua para cada página de un libro electrónico o cada imagen de un archivo de vídeo, ¿no es cierto?Hay sistemas a lo burro para hacer pdfs a lo bestia de cualquier página:"save as pdf" es una extensión de navegadores, por ejemplo.También está jdownloader, que sirve para gestionar archivos de descarga pero si se le suministra una url que contenga un vídeo, descarga este en múltiples formatos, por ejemplo, de youtube.
Pregunta para quién de esto sepa:Si igual que el teclado permite hacer un pantallazo de lo que en ése momento aparezca en el monitor (lo cual, por cierto, permite saltarse las restricciones de privacidad que pueda tener una página de archivo PDF o JPG), y luego salvarla en una copia de Word, PDF sin licencia, etc, de igual modo podría hacerse eso de manera continua para cada página de un libro electrónico o cada imagen de un archivo de vídeo, ¿no es cierto?
Cita de: pringaete en Mayo 22, 2013, 20:57:08 pmHombre, en linux duraría menos que un banquero en la cárcel... pero por intentar, que lo intenten. Eso en Windows. A Linux, ni llegaría. ¿Como? Cada distribución tiene unos cuantos zelotes vigilando cada paquete nuevo. Cada desarrollo tiene un montón de zelotes vigilando cada línea. Veo imposible que llegue a entrar, a menos que sea via repositorios específicos (Como el de google), pero claro, para eso esta Chromium, y demás, las versiones libres, etc......
Cita de: Starkiller en Mayo 28, 2013, 21:31:46 pmCita de: pringaete en Mayo 22, 2013, 20:57:08 pmHombre, en linux duraría menos que un banquero en la cárcel... pero por intentar, que lo intenten. Eso en Windows. A Linux, ni llegaría. ¿Como? Cada distribución tiene unos cuantos zelotes vigilando cada paquete nuevo. Cada desarrollo tiene un montón de zelotes vigilando cada línea. Veo imposible que llegue a entrar, a menos que sea via repositorios específicos (Como el de google), pero claro, para eso esta Chromium, y demás, las versiones libres, etc......No colaría a escondidas. Otra cosa es el BOE. Debian NO se saltaría la Ley. Ahora, tampoco incluiría el paquete. Si hace falta se vuelve al modem , al FTP, o al puerto serie... FREE as in FREE SPEECH !!
Estimado Stuyvesant. Creo detectar en su posting una cierta ironía. Sepa usted que don Jorge Fernández, hoy Ministro de Interior, tuvo la revelación que le devolvió a la gracia de Dios, precisamente en Las Vegas. Allí entendió que su vida solo había sido disipación y pecado. Pero que el Padre le esperaba con los brazos abiertos.Digo para que tome nota y añada Las Vegas a otros lugares santos, como Lourdes, Sinai, Damasco (bueno, el camino, y no es indirecta)Desde la gracia y el perdónXoshe
vivía de espaldas a Dios, como si no existiera, y sólo me acordaba de él en los momentos difíciles
fue un hombre de la providencia de Dios, Él salió a mi encuentro
Fue el año en el que el Señor dijo: "Hasta aquí hemos llegado. O Caixa o Faixa
sólo tenía sentido a la luz de Dios
Dios es el gran legislador del Universo
Los grandes de Internet podrían haber dado acceso a EEUU a la información de sus usuariosSegún informaciones publicadas en The Washington Post y en The Guardian, la NSA (Agencia Nacional de Seguridad de EEUU) y el FBI habrían tenido desde el 2007 acceso directo a los servidores de nueve de las más grandes compañías estadounidenses de Internet, entre las que están varios gigantes de sobra conocidos como Google, Microsoft, Facebook y Apple.Estos datos han sido obtenidos por ambas publicaciones a través de una presentación en la que se habla de un programa de alto secreto cuyo nombre en código es PRISM. Según el Washington Post, la fuente que la ha filtrado es un oficial de inteligencia que tuvo experiencia de primera mano con este programa y que lo ha hecho para exponer lo que considera como una grave intromisión en la intimidad de los usuarios.
Escándalo de privacidad en EEUU: el Gobierno recopila datos de usuarios de Apple, Google y otras siete tecnológicas Las empresas son Microsoft, Facebook, Google, Apple, Yahoo, Skype, YouTube, AOL y PalTalk. El programa PRISM se puso en marcha en los últimos años de Bush y ha seguido con Obama. Es ya la herramienta más prolífica para elaborar los informes que recibe el presidente. La mayoría de las nueve empresas han desmentido ya su participación en el programa.(Europa Press) - La Agencia Nacional de Seguridad (NSA) y el FBI han accedido a los servidores de nueve empresas de Internet para extraer información útil para Inteligencia, según ha revelado este jueves el diario estadounidense 'The Washington Post'.'The Washington Post' ha indicado, basándose en un documento secreto, que la NSA y el FBI se han servido para ello del programa PRISM, que se puso en marcha en los últimos años de la administración de George W.Bush y que ha seguido con la de Barack Obama.El PRISM surgió de las cenizas del programa secreto del Gobierno de Bush de órdenes de vigilancia nacional, que concluyó en 2007, después de que los medios de comunicación y de que la Corte de Inteligencia Extranjera obligaran a la Casa Blanca a cancelarlo.Entonces, el Congreso aprobó dos leyes para garantizar la inmunidad a las empresas privadas que cooperaran voluntariamente con la Inteligencia, lo que permitió la creación del PRISM. Solo dos legisladores conocían su existencia, pero estaban obligados a guardar secreto.En el PRISM participarían voluntariamente Microsoft, Facebook, Google, Apple, Yahoo, Skype, YouTube, AOL y PalTalk, que ha sido muy útil para el seguimiento de la Primavera Árabe y de la guerra civil siria. Además, el documento secreto apunta a que Dropbox podría sumarse "pronto".El objetivo del PRISM es recabar información a través del tráfico internacional - aunque también estadounidense - que pasa por los servidores de estas compañías en correos electrónicos, fotografías, audios y vídeos para seguir la pista a un objetivo extranjero o nacional de interés para la Inteligencia.Hasta la aprobación del PRISM, el Gobierno tenía que demostrar la conexión entre un "objetivo" y una "instalación" a las redes terroristas o de espionaje para acceder a la información contenida en esta "instalación".Los responsables del PRISM han tratado de proteger al máximo a los participantes. "El 98 por ciento de la producción del PRISM se basa en Microsoft, Google y Yahoo. Necesitamos asegurarnos de que estas fuentes no sufran daños", reza el documento secreto.Funcionarios de Inteligencia han descrito al PRISM como la herramienta más prolífica para los informes presidenciales, ya que fue mencionada hasta en 1.477 ocasiones el año pasado. De hecho, "se está convirtiendo en la mayor soporte de la NSA".El PRISM es heredero de una larga historia de cooperación entre la Inteligencia estadounidense y alrededor de un centenar de empresas privadas asentadas en el país norteamericano que comenzó en la década de 1970.Las empresas lo desmientenLa mayoría de las nueve empresas citadas por 'The Washington Post' han desmentido ya que hayan permitido a la Inteligencia estadounidenses acceder a sus servidores centrales.Microsoft, que según el diario estadounidense fue el primero en sumarse al PRISM, ha asegurado que no participa voluntariamente en ninguna campaña de recolección de datos del Gobierno y que solo cumple "con solicitudes sobre cuentas o identidades específicas"."No hemos proporcionado a ninguna organización gubernamental acceso directo a nuestros servidores", ha dicho el jefe de Seguridad de Facebook. "Cuando recibimos una solicitud de ese tipo, la escrutamos cuidadosamente con la legislación vigente", ha aseverado.Google, en la misma línea, ha negado tajantemente que haya creado una "entrada secreta" para la Inteligencia estadounidense, subrayando que nunca ha dado semejante acceso a los datos de sus usuarios."Nunca hemos oído hablar del PRISM", ha sostenido, por su parte, un portavoz de Apple. "No damos acceso a nuestros servidores a ninguna agencia gubernamental y cualquiera que quiera hacerlo debe traer una orden judicial", ha subrayado.Yahoo, a través de un comunicado, ha dicho que se toma "muy en serio la privacidad de los usuarios". "No damos al Gobierno acceso directo a nuestros servidores, sistemas o redes", ha aclarado.
US collects data on virtually everyone, leaked docs revealposted by Thom Holwerda on Fri 7th Jun 2013 11:40 UTCIconThis story is getting bigger and bigger. Even though most Americans probably already knew, it is now official: the United States government, through its National Security Agency, is collecting the communications and data of all American citizens, and of non-Americans using American services, through a wide collaboration with the large companies in technology, like Apple, Google, Microsoft, Facebook, and so on. Interestingly enough, the NSA itself, as well as the US government, have repeatedly and firmly denied this massive spying on Americans and non-Americans took place at all.The project is called PRISM, which is fitting when you think about how data travels through fibre these days. The Washing Post has gained access http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_1.html to a set of very detailed slides from the NSA explaining how it all all works and who the NSA is collaborating with, and it includes all the big names in technology, from Apple to Facebook, from Google to Microsoft. It covers all information flows, whether from Americans or non-Americans. Considering virtually each and every one of uses one or more American services or software products, we are all targets. Nearly 1 in 7 intelligence reports in the US is now based on PRISM data.What's most peculiar is that the companies involved in PRISM all deny being part of it. The Washington Post contacted the companies involved, and Facebook and Apple said they have no knowledge of the program, and thus are not involved with it - which is odd, because the official government documentation clearly mentioned them. The Verge contacted Google, and the search and advertisement giant, too, denies involvement http://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism/in/4167369 - even though they, and several of its companies like youTube, are listed as well. Microsoft was the first company to join the program (and is also denying involvement, others joined in later. Twitter has yet to join.The PRISM program has access to everything - phone call recordings, file transfers, browsing history, email, your files stored on the internet, and so on. Just about anything you can imagine is part of PRISM. Suddenly, it starts to make even more sense why China is so hell-bent on creating its own alternatives to American products and services; they obviously knew about PRISM long before we did.The program is technically legal and court-approved (by the FISA court), but that's only because that FISA court convenes in secret, behind closed doors, is unchecked by the people, and rarely releases any documentation whatsoever. "I would just push back on the idea that the court has signed off on it, so why worry?" Jameel Jaffer, deputy legal director of the American Civil Liberties Union, told the Washington post, "This is a court that meets in secret, allows only the government to appear before it, and publishes almost none of its opinions. It has never been an effective check on government.”What's more, when under oath only a few months ago in March 2013, the NSA, by mouth of director of national intelligence James Clapper, denied that the NSA and the US government was spying on its citizens. Six minutes and forty seconds in https://www.youtube.com/watch?v=QwiUVUJmGjs&feature=youtu.be&t=6m40s , a clearly fidgeting and uncomfortable Clapper responds "No sir. Not wittingly." Looking back, it's clear the guy is lying, as he's showing all the telltale signs.Clapper is clearly disconnected from reality, as his response to the uncovering of PRISM is borderline idiotic. In several press releases, he reiterates the program is legal (and thus, confirms its existence) http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/869-dni-statement-on-activities-authorized-under-section-702-of-fisa , and that the reports by The Washington Post and The Guardian contain several inaccuracies - but as a crystal clear sign of weakness, he doesn't actually detail the supposed inaccuracies. Furthermore, and this is where he really goes off his rocker, he accuses the two newspapers of endangering the lives of Americans, and that reporting on PRISM is "reprehensible".CitarInformation collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats.The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.PRISM isn't even the worst of it. The NSA has collected records on every phone call made in the US in the last seven years, and has that data stored on servers right now. In addition, the NSA receives data on every American from US internet service providers and credit card companies. Combine PRISM data with this additional data - and probably from a variety of other sources - and it's pretty clear the US is now officially a surveillance state, not much better or worse than China. In addition, the NSA has collected loads of information on non-Americans as well, which looks a lot like an act of aggression against foreign, independent nations to me.But, my dear American and non-American friends, you need not worry. That same man, director of national intelligence James Clapper, says http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dni-statement-on-recent-unauthorized-disclosures-of-classified-information we can all safely go to sleep since the US government is bound by law and can't sift through all this data at will. Of course, we all trust the US government. Right?CitarBy order of the FISC, the Government is prohibited from indiscriminately sifting through the telephony metadata acquired under the program. All information that is acquired under this program is subject to strict, court-imposed restrictions on review and handling. The court only allows the data to be queried when there is a reasonable suspicion, based on specific facts, that the particular basis for the query is associated with a foreign terrorist organization. Only specially cleared counterterrorism personnel specifically trained in the Court-approved procedures may even access the records.This scandal is growing like an oil stain, and even though the supposed 'legal' nature of it all will most likely mean nothing will happen, you'd hope some heads are going to roll here. Ideally, the program would be stopped the data destroyed, but that will never happen. It's a universal truth in governance that a government's power can only grow; it can never shrink. Once power is owned, it is never released. Government don't shrink; they either grow, or topple.One thing is clear though: while we were all worrying about data collected by Google, Microsoft, Facebook, Apple, and others - we should have been focussing on the government all along. Just remember that if you buy an Xbox One, your next game console will have a microphone-equipped camera permanently peering into your living room, built by the first company to join the PRISM program.It has been quoted to death the past 30 years, but we can now safely say that George Orwell was right - he was just off by 30 years. Welcome to the surveillance state. http://en.wikipedia.org/wiki/Surveillance_state
Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats.The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.
By order of the FISC, the Government is prohibited from indiscriminately sifting through the telephony metadata acquired under the program. All information that is acquired under this program is subject to strict, court-imposed restrictions on review and handling. The court only allows the data to be queried when there is a reasonable suspicion, based on specific facts, that the particular basis for the query is associated with a foreign terrorist organization. Only specially cleared counterterrorism personnel specifically trained in the Court-approved procedures may even access the records.
RetroShare is free software for encrypted, serverless email, Instant messaging, BBS and filesharing based on a friend-to-friend network built on GPG. It is not strictly a darknet since peers can optionally communicate certificates and IP addresses from and to their friends.After installation, the user either generates a pair of GPG keys with RetroShare, or selects an existing keypair to use. After authentication and exchanging an asymmetric key, ssh is used to establish a connection. End to end encryption is done using OpenSSL. Friends of friends cannot connect by default, but they can see each other if the users allow it.[...]RetroShare offers several services to allow friends to communicate. A private chat and a private mailing system allow secure communication between known friends. A forum system allowing both anonymous and authenticated forums distributes posts from friends to friends. A channel system offers the possibility to auto-download files posted in a given channel to every subscribed peer.[...]
NSA whistleblower Edward Snowden: 'I do not expect to see home again'Source for the Guardian's NSA files on why he carried out the biggest intelligence leak in a generation – and what comes nextLink to video: NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of things'http://www.guardian.co.uk/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-videoEdward Snowden was interviewed over several days in Hong Kong by Glenn Greenwald and Ewen MacAskill.Q: Why did you decide to become a whistleblower?A: "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards."I don't want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under."Q: But isn't there a need for surveillance to try to reduce the chances of terrorist attacks such as Boston?A: "We have to decide why terrorism is a new threat. There has always been terrorism. Boston was a criminal act. It was not about surveillance but good, old-fashioned police work. The police are very good at what they do."Q: Do you see yourself as another Bradley Manning?A: "Manning was a classic whistleblower. He was inspired by the public good."Q: Do you think what you have done is a crime? A: "We have seen enough criminality on the part of government. It is hypocritical to make this allegation against me. They have narrowed the public sphere of influence."Q: What do you think is going to happen to you?A: "Nothing good."Q: Why Hong Kong?A: "I think it is really tragic that an American has to move to a place that has a reputation for less freedom. Still, Hong Kong has a reputation for freedom in spite of the People's Republic of China. It has a strong tradition of free speech."Q: What do the leaked documents reveal?A: "That the NSA routinely lies in response to congressional inquiries about the scope of surveillance in America. I believe that when [senator Ron] Wyden and [senator Mark] Udall asked about the scale of this, they [the NSA] said it did not have the tools to provide an answer. We do have the tools and I have maps showing where people have been scrutinised most. We collect more digital communications from America than we do from the Russians."Q: What about the Obama administration's protests about hacking by China?A: "We hack everyone everywhere. We like to make a distinction between us and the others. But we are in almost every country in the world. We are not at war with these countries."Q: Is it possible to put security in place to protect against state surveillance?A: "You are not even aware of what is possible. The extent of their capabilities is horrifying. We can plant bugs in machines. Once you go on the network, I can identify your machine. You will never be safe whatever protections you put in place."Q: Does your family know you are planning this?A: "No. My family does not know what is happening … My primary fear is that they will come after my family, my friends, my partner. Anyone I have a relationship with … I will have to live with that for the rest of my life. I am not going to be able to communicate with them. They [the authorities] will act aggressively against anyone who has known me. That keeps me up at night."Q: When did you decide to leak the documents?A: "You see things that may be disturbing. When you see everything you realise that some of these things are abusive. The awareness of wrong-doing builds up. There was not one morning when I woke up [and decided this is it]. It was a natural process."A lot of people in 2008 voted for Obama. I did not vote for him. I voted for a third party. But I believed in Obama's promises. I was going to disclose it [but waited because of his election]. He continued with the policies of his predecessor."Q: What is your reaction to Obama denouncing the leaks on Friday while welcoming a debate on the balance between security and openness?A: "My immediate reaction was he was having difficulty in defending it himself. He was trying to defend the unjustifiable and he knew it."Q: What about the response in general to the disclosures?A: "I have been surprised and pleased to see the public has reacted so strongly in defence of these rights that are being suppressed in the name of security. It is not like Occupy Wall Street but there is a grassroots movement to take to the streets on July 4 in defence of the Fourth Amendment called Restore The Fourth Amendment and it grew out of Reddit. The response over the internet has been huge and supportive."Q: Washington-based foreign affairs analyst Steve Clemons said he overheard at the capital's Dulles airport four men discussing an intelligence conference they had just attended. Speaking about the leaks, one of them said, according to Clemons, that both the reporter and leaker should be "disappeared". How do you feel about that? In Dulles UAL lounge listening to 4 US intel officials saying loudly leaker & reporter on #NSA stuff should be disappearedrecorded a bit — Steve Clemons (@SCClemons) June 8, 2013A: "Someone responding to the story said 'real spies do not speak like that'. Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process – they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general."Q: Do you have a plan in place?A: "The only thing I can do is sit here and hope the Hong Kong government does not deport me … My predisposition is to seek asylum in a country with shared values. The nation that most encompasses this is Iceland. They stood up for people over internet freedom. I have no idea what my future is going to be."They could put out an Interpol note. But I don't think I have committed a crime outside the domain of the US. I think it will be clearly shown to be political in nature."Q: Do you think you are probably going to end up in prison?A: "I could not do this without accepting the risk of prison. You can't come up against the world's most powerful intelligence agencies and not accept the risk. If they want to get you, over time they will."Q: How to you feel now, almost a week after the first leak?A: "I think the sense of outrage that has been expressed is justified. It has given me hope that, no matter what happens to me, the outcome will be positive for America. I do not expect to see home again, though that is what I want."
NSA Built Back Door In All Windows Software by 1999 In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.