There's always Tor...

--- In FairfieldLife@yahoogroups.com, obbajeeba <no_reply@...> wrote:
>
> Great bribery material on both sides of a NDA, the NSA and its fumbling 
> agencies backdoor offshores could really fuck someone up.  
> Someone could easily shut up either side , and/or make it impossible for 
> people to reap any gain, in case of "embarrassment," to whoever is targeted 
> by a rogue employee or agency. 
> People having nothing to hide or nothing to loose have no worries, and I 
> think this can be looked at as one big happy family orgy and can easily blow 
> up in our faces. 
> Very dangerous practices these days. 
> Boom. Come and get me big brother.
> 
> --- In FairfieldLife@yahoogroups.com, Bhairitu <noozguru@> wrote:
> >
> > Which also means that all those "secret" projects that companies do to 
> > "disrupt" the tech world and that team members sign NDAs for are all 
> > know to the government.  Must make tech execs feel "real good."
> > 
> > BTW, for those who don't know the term "disrupt" or "new disruptive 
> > technology" is a buzzword a lot of tech companies are using nowadays.  I 
> > crack up every time I see it in a job posting. It makes it sound like 
> > their project is a terrorist activity. :-D
> > 
> > We've posted keywords here on FFL posts.  Also just typed in junk to 
> > keep their computers crunching.  What they still haven't figured out is 
> > that ALL email on Internet is code and they're the only ones who don't 
> > know it.
> > 
> > On 06/10/2013 08:51 PM, obbajeeba wrote:
> > > Yes, Dr. Da,
> > > My brother shared these similar things with me and my family in the early 
> > > nineties too. "Everything we type or upload to the internet, never 
> > > disappears," is how he worded it.  It is good for others to know, there 
> > > are no secrets in cyberspace. Therefore be all and bare all!  LOL
> > >
> > > --- In FairfieldLife@yahoogroups.com, doctordumbass@ <no_reply@> wrote:
> > >> I worked with the first digital protocol analyzers in 1992 - Remember 
> > >> the Network General Sniffer (Compaq lunchbox hardware)? Anyway, that is 
> > >> when any engineer with a protocol analyzer, and an Ethernet cable, could 
> > >> plug into a Central Office phone switch, and download as much [filtered] 
> > >> data as there was memory on the box. Spoofing is also ridiculously easy 
> > >> (if you want data to appear to originate from another location). As is 
> > >> stripping headers off tunneled data. And that was in 1992 - 21 years ago.
> > >>
> > >> That's probably when they started doing this shit. I obviously have no 
> > >> proof it was warrantless at the time, but it has been easy, and 
> > >> possible,  since that time. As a result, I am hardly upset that this has 
> > >> finally been revealed.
> > >>
> > >> --- In FairfieldLife@yahoogroups.com, obbajeeba <no_reply@> wrote:
> > >>>
> > >>>
> > >>> --- In FairfieldLife@yahoogroups.com, Bhairitu <noozguru@> wrote:
> > >>>> On 06/09/2013 07:38 AM, obbajeeba wrote:
> > >>>>> http://whatreallyhappened.com/node/244954
> > >>>>>
> > >>>>>
> > >>>> Good ol' Michael.  He posted my "PeopleVille" video on his site and 
> > >>>> that
> > >>>> day was when it got the most views.   He is an effects specialist for 
> > >>>> TV
> > >>>> shows and movies.  He worked on "Lost" and that's why he and his wife
> > >>>> live in Hawaii.  He's an atheist and his wife writes gospel music.  Go
> > >>>> figure.
> > >>>>
> > >>>> PeopleVille:
> > >>>> http://www.youtube.com/watch?v=MbgBpldEazo
> > >>>>
> > >>>> I've been thinking about doing a "Don't Pay the Rich Man's Bills" 
> > >>>> video.
> > >>>>
> > >>> Good idea.
> > >>>
> > >>> http://trollthensa.com/
> > >>>
> > >
> > >
> >
>


Reply via email to