Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

The Tube Warriors: The silent battleground on the net.

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-05-06 10:31 AM
Original message
The Tube Warriors: The silent battleground on the net.
Just how much do we have to worry about IT and/or computer specialists who are politically motivated? All of us are already convinced about the electronic hacking of voting machines, but are there other secret battlefields that we non masters of cyber-space need to know about?

The answer is obviously, yes, and those of us who are not experts in the IT field or are not computer specialists should make an effort to pay attention when our side of experts reveal something about the hacking world. For example, this video is a must see:


http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=385x3197

But I have an important question for our DU computer experts: How easy would it be for an IT specialist neighbor to identify us through the net? What kind of contacts would be needed to trace that kind of information?
Printer Friendly | Permalink |  | Top
Mist Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-05-06 10:41 AM
Response to Original message
1. If you use wireless, it should be password accessed and encrypted. Then
no one can "piggyback" on your wireless connection, and I would think they couldn't therefore identify you.
Printer Friendly | Permalink |  | Top
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-05-06 10:51 AM
Response to Reply #1
2. Are there levels of encryption which are not legal in the US?
Many years ago I read about encrypted e-mails, but I also read that the US did not allow them, where the rest of the world did.
Printer Friendly | Permalink |  | Top
 
Mist Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-05-06 11:02 AM
Response to Reply #2
3. That might be for messages or e-mail. There should be an encryption
program in your wireless set-up. (If you're using wireless). It's designed to prevent others jumping on your service.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 09:10 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC