to defeat encrypted mail..
ppl u gotta stop being so sloppy and depending only on encrypted mail..
http://news.cnet.com/8301-10784_3-9741357-7.html
This is old news but ppl obviously still not getting the message
to defeat encrypted mail..
ppl u gotta stop being so sloppy and depending only on encrypted mail..
http://news.cnet.com/8301-10784_3-9741357-7.html
This is old news but ppl obviously still not getting the message
Sponsored Links |
This was the equivalent of a telephone wire tap which was installed at the internet provider company and there is no software or email provider that could have prevented these interceptions.......
The judges' conclusion: federal agents did not violate the Fourth Amendment when spying on the Escondido DSL line without any evidence of criminal wrongdoing on his behalf, a legal standard known as probable cause. All the feds must do is prove the information is "relevant" to an ongoing investigation.
The wiretap was done at PacBell's connection facility at 650 Robinson Rd. in San Diego. The DEA obtained what's known as a "mirror port," a feature that many network switches made by companies including Cisco Systems include for troubleshooting purposes.
A mirror port duplicates all the Internet traffic of one user to a second port on the same switch, without the suspect being alerted that electronic surveillance is under way. The scheme is probably easier to accomplish with a static Internet Protocol (IP) address, which is what the Escondido case involved.
"All the feds must do is prove the information is "relevant" to an ongoing investigation"......among other things, always be smart with your trash and don't tell other people about your business.
The only option to beating the Keyloggers ( AKA wire tap) is to avoid giving the feds "relevant information" to get to that point.
Protect your IP addy
Put your dirty trash in a smart place
Don't talk about your use
Avoid making giant orders
Use your common sense
Hey Grim, why don't you lay out a step by step plan for us to follow to keep safe. Dumb it down for those of us who are lacking in the I.T department. List exactly what is needed, where to get it, how much it costs, etc.
#1 definitely do not use US hosted boards. LE can easily monitor EVERYTHING
#2 i personally recommend a vpn as its more secure but if you want the anonymity you can run tor over the top.
#3 Basic common sense don't open attachments in emails that you are not 100% sure on
#4 Use an antivirus program that detects keyloggers and has a policy not to give in to big brother. Most of your name brand antivirus programs actually put in back doors.
Do the same for your firewall, and other misc security programs. You can find pages that list programs who have refused to open back doors for the government.
There are also programs that are supposed to scramble your typing to defeat keyloggers, I never used 1 though.
Point is there is so much more to secure than just your email. Most can be done for free, very easily. Such as encrypting your hard drive
http://www.truecrypt.org/ free easy to use program, who refuses to give big brother backdoor access
Bookmarks