It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by DrMattMaddix
reply to post by coder22
How could you guarantee that buggy code is created at the source???
Create the most popular compilers and be sure that THEY contain even buggy code.
OMG there are issues that have followed many MSVC iterations going completely unrepaired for a decades.
Post those minutes! ... but anyone that has worked with ANY MS compilers from Pascal 1.0 ( or even through any one of the many products that MS acquired and rebranded ) knows there are recurring bugs and can identify the compiler used just by testing what ever the programmer has written. Heh, including any OS components.
It'll be nice to see some proof. But it will NOT be any surprise. So good that the masses haven't found Unix.(?)
Originally posted by bhornbuckle75
reply to post by coder22
I suppose the only problem with this Idea is that U.S. Government Officials would also be using same software. Wouldn't this just jeopardize the U.S. as much as help us? Putting a back door into a program means that anyone can open it....and unless you are suggesting that every single government official is in on this, and that they all have specially coded software without the holes.....well That seems somewhat unlikely to me. If there is a hole, then others will be able to find it and abuse it. If not just your average hacker, then to be sure, some super hacker employed by China or some other country should be able to find a hole like this and exploit it pretty easy. I guess that makes me a bit skeptical of this claim.
Originally posted by Ahmose
Originally posted by 547000
Originally posted by Nobama
reply to post by 547000
What are you talking about? spending hours getting software to work? your just spewing crap that isn't true, im running a fully customized version of Gentoo, it took me a total of 2 hours to install, set up a GUI, and install commonly used softwaren, and I used the Gentoo documents as a guide, not a single problem was had.
My experience was different. I installed ArchLinux, then spent many, many hours just to get wmii to work the way I wanted to because the documentation was abysmal. Also the wiki I searched was out of date and I had to play around, creating an unobvious symlink to install a few drivers. Much of my experience was like that, undocumented gotchas where you have to guess the way to get it to work.
I also tried to install Gentoo once, and the installer did not work.edit on 23-4-2011 by 547000 because: (no reason given)
Why am i not surprised?
So you had a bad experience with Arch (which is not for "newbs" anyway)
and you "tried gentoo once" (also not the most "newb" friendly).
and you feel you can say that "Linux" (all of Linux, no less), is no good? lol
Well that seems like more than enough to give a proper assessment!
and you had the balls to talk about "experience" to me? lol, Come on man, Please.
again, no surprise.
Well im gonna tell you this 10 times out of 10 its a problem between keyboard and user...
True story.edit on 23-4-2011 by Ahmose because: (no reason given)
Originally posted by LadySkadi
Originally posted by christof94
Just another reason to use Mac. OP, are you an Apple employee?
Two security researchers have discovered a simple way to map out where you've been almost anywhere in the world—without any hacking involved. The information comes from a location cache file found within your iPhone's backups on your Mac or PC, bringing out serious privacy concerns and opening the door for a jealous spouse, thief, or even a crafty trojan to take a detailed look at your whereabouts. And it's information that no one should have access to—not even law enforcement, barring a court order.
So your iPhone—and probably your computer—now both have a file that mirrors data that was previously limited to law enforcement, which itself was only able to obtain it from a court order. Without encrypted backups, someone who has access to your computer can see your whereabouts. "By passively logging your location without your permission, Apple have made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements," the team wrote. But even if you check the box to encrypt your iPhone backups on the computer, the file is still unencrypted on your iPhone, and it wouldn't be hard for someone with ill intentions to access it. (1)
Pretty convenient no? Especially considering the police (Michigan example) are now downloading phone information at traffic stops, legally and without a need for court orders.
So, is there anywhere you've been in the last year that you don't want anyone to know about?
Neuter Consolidated.db iPhone location tracking
Author: BigBoss // Category: Jailbreak, News
Thanks to developer Ryan Petrich, you can now neuter your iPhone location tracking.
Now, understand what this is. In its current state, this is a process daemon that runs every 5 minutes if the device is not asleep and clears the location data off your device.
Search for untracker in cydia and install it.
Originally posted by Invariance
Alternatively, check out Linux.. it's free and it's safe. May I suggest Ubuntu 10?
Originally posted by coder22
Guys - I have a friend on the "inside" - he's a microsoft employee that claims there is a team of programmers that purposefully write vulnerable code (at the request of the guys at the top).
This malicious code is ****written in a way to look like it could be passed off as an "accidental bug"**** for plausible deniability!!! He is going to be passing me the minutes of one of their meetings to upload so I can whistle-blow.
I have been told that these software holes are frequently written and installed in updates etc etc - at the request of CIA. - And in fact, some of the programming team ***IS*** CIA.
The beauty really is, is that when they are discovered, they just look like, "oops!! I little bug - we'll fix that with a patch..." but the reality is, that when holes are being patched, new holes are being opened. Accidentally on purpose. It's all about plausible deniability. I mean seriously, a code myself, simply missing a closing ] etc in the right place can cause all sorts of problems. - And that's the kind of thing they're doing. Or writing "error checking" code that is actually malicious.
Hopefully I'll get these minutes in the next few days. People will be named and shamed.
EDIT TO ADD: I don't think these bugs are written to spy on your average Joe, these are bugs written for global spying. Governmental stuff.
Soundbite by me from later in thread :
...imagine having a backdoor in the worlds most popular operating system? And also, if discovered, it looks like a totally innocent bug that could have happened to anyone? What you have then, is a VERY powerful weapon.
edit on 22-4-2011 by coder22 because: (no reason given)edit on 22-4-2011 by coder22 because: (no reason given)edit on 22-4-2011 by coder22 because: (no reason given)