There's always Tor...
--- In FairfieldLife@yahoogroups.com, obbajeeba <no_reply@...> wrote:
>
> Great bribery material on both sides of a NDA, the NSA and its fumbling
> agencies backdoor offshores could really fuck someone up.
> Someone could easily shut up either side , and/or make it impossible for
> people to reap any gain, in case of "embarrassment," to whoever is targeted
> by a rogue employee or agency.
> People having nothing to hide or nothing to loose have no worries, and I
> think this can be looked at as one big happy family orgy and can easily blow
> up in our faces.
> Very dangerous practices these days.
> Boom. Come and get me big brother.
>
> --- In FairfieldLife@yahoogroups.com, Bhairitu <noozguru@> wrote:
> >
> > Which also means that all those "secret" projects that companies do to
> > "disrupt" the tech world and that team members sign NDAs for are all
> > know to the government. Must make tech execs feel "real good."
> >
> > BTW, for those who don't know the term "disrupt" or "new disruptive
> > technology" is a buzzword a lot of tech companies are using nowadays. I
> > crack up every time I see it in a job posting. It makes it sound like
> > their project is a terrorist activity. :-D
> >
> > We've posted keywords here on FFL posts. Also just typed in junk to
> > keep their computers crunching. What they still haven't figured out is
> > that ALL email on Internet is code and they're the only ones who don't
> > know it.
> >
> > On 06/10/2013 08:51 PM, obbajeeba wrote:
> > > Yes, Dr. Da,
> > > My brother shared these similar things with me and my family in the early
> > > nineties too. "Everything we type or upload to the internet, never
> > > disappears," is how he worded it. It is good for others to know, there
> > > are no secrets in cyberspace. Therefore be all and bare all! LOL
> > >
> > > --- In FairfieldLife@yahoogroups.com, doctordumbass@ <no_reply@> wrote:
> > >> I worked with the first digital protocol analyzers in 1992 - Remember
> > >> the Network General Sniffer (Compaq lunchbox hardware)? Anyway, that is
> > >> when any engineer with a protocol analyzer, and an Ethernet cable, could
> > >> plug into a Central Office phone switch, and download as much [filtered]
> > >> data as there was memory on the box. Spoofing is also ridiculously easy
> > >> (if you want data to appear to originate from another location). As is
> > >> stripping headers off tunneled data. And that was in 1992 - 21 years ago.
> > >>
> > >> That's probably when they started doing this shit. I obviously have no
> > >> proof it was warrantless at the time, but it has been easy, and
> > >> possible, since that time. As a result, I am hardly upset that this has
> > >> finally been revealed.
> > >>
> > >> --- In FairfieldLife@yahoogroups.com, obbajeeba <no_reply@> wrote:
> > >>>
> > >>>
> > >>> --- In FairfieldLife@yahoogroups.com, Bhairitu <noozguru@> wrote:
> > >>>> On 06/09/2013 07:38 AM, obbajeeba wrote:
> > >>>>> http://whatreallyhappened.com/node/244954
> > >>>>>
> > >>>>>
> > >>>> Good ol' Michael. He posted my "PeopleVille" video on his site and
> > >>>> that
> > >>>> day was when it got the most views. He is an effects specialist for
> > >>>> TV
> > >>>> shows and movies. He worked on "Lost" and that's why he and his wife
> > >>>> live in Hawaii. He's an atheist and his wife writes gospel music. Go
> > >>>> figure.
> > >>>>
> > >>>> PeopleVille:
> > >>>> http://www.youtube.com/watch?v=MbgBpldEazo
> > >>>>
> > >>>> I've been thinking about doing a "Don't Pay the Rich Man's Bills"
> > >>>> video.
> > >>>>
> > >>> Good idea.
> > >>>
> > >>> http://trollthensa.com/
> > >>>
> > >
> > >
> >
>