For ten years you have been carefully updating your "Java security updates" that whenever you ask for a script from your browser, you would in fact have done the complete opposite of what you had believed, by making your machine a colander for the Yankee secret services (or even other countries, and why not companies deprived of match with the former government Bu $ h like Harry Burton while we are there ... who have probably carved the lion's share - not only in access to private or even commercial data without our knowledge - and certainly also in any other branch of espionage, even industrial espionage, because we no longer know very well today where would be the limit between legality, illegality, the limitless flouting of the rules of international law and even the espionage for occult purposes, without a mandate from a prosecutor and without any control whatsoever - or not - remained within the limited framework of the possibly legitimate defense of American interests ...
But it is better to be seated when reading this, even though these security barrier updates plunged the entire planet into a kind of permanent planetary paranoia:
Gizmodo, fred, on December 15, 2010 at 17:46 pm wrote:Internet coping: the FBI has implemented backdoors in secure protocols
Ten years ago, the FBI implemented "a number of backdoors" in OpenBSD's Internet Protocol Security (IPSEC) stack.
It is the person paid to implant them who reveals it today:
IPSEC is a secure communication protocol used by sites around the world. Secure provided that no one has a master key to unlock the security. It is precisely this kind of backdoor access that the FBI has implemented.
Gregory Perry's testimony is cold in the back:
"I wanted to bring to your attention the fact that the FBI has implemented a number of backdoors and key recovery mechanisms in OCF (OpenBSD / FreeBSD Cryptographic Framework), with the proven goal of being able to monitor site-to-site exchanges. VPN (Virtual Private Network) site.
This is probably the reason why you lost your funding for DARPA, they most likely got wind of these backdoors and did not want to create derivatives on this basis. "
If these allegations by Gregory Perry, former technical director of NETSEC are proven, all those who used this protocol may have been spied on electronically by the FBI without knowing it.
In an email to OpenBSD project manager Theo de Raadt, Gregory Perry says he was paid by the FBI to do the dirty work. Or his duty as a patriot, it all depends on which point of view you take. Ten years have passed, Gregory Perry explains that he is no longer bound by his non-disclosure agreement and wants everyone to know.
Theo de Raadt in turn sent an email to the OpenBSD community to start hunting for the FBI backdoors:
"It is alleged that some ex-developers (and the company they worked for) accepted money from the United States government to install backdoors in our network stack. Since our first IPSEC stack was available for free, large portions of the code are now scattered across many other projects / products. In 10 years, the IPSEC code has undergone many changes and fixes, so we are not sure what the actual impact of these allegations is. "
The problem is probably much larger. If this happened once, how many more of these backdoors exist in allegedly secure internet protocols and tools? We would really like to know. [Ars Technica]
http://www.gizmodo.fr/2010/12/15/flicag ... rises.html
But the most interesting thing in all of this is that it fits perfectly with the agenda for setting up the "war on terror" paradigm, since this global espionage was initiated well before 9/11 ... Once moreover, the indices are converging ... Why did you launch such an operation on a planetary scale, when America was not threatened or attacked then!! ???
Besides, the arrest of Kim [dot] Com of Még @ uplaud, it's cat pee, right?
Relative subject:
https://www.econologie.com/forums/societe-so ... 11193.html