Found the blog post I originally read. It covers a Czech post that did a traffic analysis of Windows 10. In fact, search for sites using the phrase "traffic analysis of windows 10" will pull up a few sites that cover the whole thing. The blog I read is linked below.
"According to Aeronet, on any normal day, Windows 10 performs a collection of texts entered on the keyboard, these texts are stored in temporary files and every 30 minutes, this data is sent to following websites:
Just wanted to thank you for that info and the link. I found one of those installed on my system. When I have a day off I'm going to looking at my Mom's computer to see which, if any, of those are installed on hers. She also has updates set to automatically install, so I'll be changing that as well.
Indeed. I didn't expect him to do something like this, but I am amused. His comic (Questionable Content) has www.QUESTIONABLECONTENT.HORSE as the comment on his most recent comic. The link took me by surprise. He has an unusual sense of humor.
The Streisand Effect doesn't necessarily cause something to go viral, though it often can. It does, how ever, increase awareness of the thing one is attempting to censor.
Viral only describes how well known/popular a thing has become, but doesn't touch reasoning. Hearing that it's gone viral sounds like "this is the new cool thing that everyone is talking about". The Streisand Effect on the other hand makes clear that some one out there doesn't want you to know about it.
I don't think "viral" is a good choice for the description, as the meaning is incomplete, it's not always accurate, and implies something that isn't necessarily true.
I don't have access to any documentation really, and none of it that I've seen is incriminating. Also, screwing up computer systems (and badly) isn't illegal. Disturbing, definitely, incompetent, absolutely, but legal.
As an employee of ACS, faulty computer software causing serious problems is sadly not a surprise. Although, I wasn't in the company around the time of most of the other issues in the article (loss of personal information or credit cards), I have been witness to some very serious computer issues. At one point it was occuring nearly twice a week, and serious enough to bring the entire set of systems we work with to a halt.
Communism isn't about removing the rights of the citizens, and could theoretically be achieved with out doing that. Communism is supposed to be about preventing the regular masses from being exploited by the rich. A government with supreme power is the method used for this, because it makes it harder for a business to try and influence it. It was great in theory, but failed in practice. Yes, the communist governments that formed did remove all ideas of privacy, but that isn't actually a part of what communism is about.
After reading the article, I noticed Masnick mention that the Beastie Boyz have been trying to shy away from the song. Perhaps this is yet another foolish attempt to try and hide something that they feel causes embarrassment. Get rid of the Girls parody, make people once again forget about the original. But, as we all know, that pretty much always fails.
I'm guessing Hague has seen some speculation regarding intelligence capabilities that are accurate, but not yet revealed. He's likely just trying to cover up what ever speculation he saw, which leaves one to guess what speculation it was.
If "an outsider" did something like this, I would expect the NSA to create talking points about terrorists hacking us, and using it as an excuse to demand more power and funding, than it already has right now.
The point being made is 20% of applicants, as a whole, is most likely inaccurate. For example, if out of all the applicants they interview, only 20% raise flags, and 20% of those have the terrorist ties, you're sitting at 4% of all applicants having terrorist ties is all, not the 20% as per the title.
Also worth noting, since they don't specify what counts as a terrorist tie, that number might also be inaccurate. Imagine that NSA feels a chance encounter while shopping at a store with some one the NSA suspects counts as a "tie", or your mother's ex-husband's second cousin twice removed is suspected as a terrorist. Once again, the tie is not one that you can really see as realistic. The numbers here just aren't all that informative. Far more worrying is the history of the whole interviewing process that was described, including "contractors being caught interviewing dead people" and falsifying background checks.
Part of the reason the DoJ isn't concerned with the way these bankers uses these funds is they are going to have to pay the money back, with interest, eventually. Some of the banks are constantly paying interest back to the government as well, so this is a bit of a cash cow for them. Would you care if you "bailed" some one out with your money, while constantly having them pay you back interest over the course of several years, knowing eventually you'll get back everything you spent and more, and the person you bailed out misused the money?
Geeks already have been. BitMessage is one such example. Functions like email, except your "address" in this instance is actually a public encryption key, with a private key locally saved. Data transmitted between computers/servers on the way to destinations do not have the ultimate source or destination IP addresses, only the current computer's IP address, and the next computer in line to receive the data. When you connect, you simply download a copy of all the encrypted data, filter for anything with your public key, unencrypt and store in your Inbox, and forward anything that's not yours received further down the line. The result is that any message you send out, goes to literally everyone connected to the system, yet only the recipient can read it. Anyone snooping on your connection won't be able to distinguish between which messages are yours, vs some one else's.
It's still in testing, and looking for independent security experts to audit the encryption system to confirm the level of security they're after, but they have had some people examining the encryption and trying to break it already, then reporting their results. It's a work in progress, but already it's functioning quite well.