It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Odd question on social media....

page: 3
9
<< 1  2    4 >>

log in

join
share:

posted on Jan, 10 2021 @ 10:15 AM
link   

originally posted by: ArMaP
a reply to: combatmaster

That would be a huge waste of resources, as there would be gathering information they will never look at.

But I'm sure they do that for certain countries, organisations and ISPs.


Even so, it is more efficient to simply gather everything, rather than waste resources specifically targeting what you want which is far more tedious and dynamic and is a bigger waste of resources in the long run!



posted on Jan, 10 2021 @ 10:21 AM
link   
a reply to: ArMaP
I see it like that, too.

When I use something at least I have to understand the consequences.

In this case:
Whenever I can upvote someone just one time, a consequence of it is that it is stored somewhere that I did that.

Plain and simple.




posted on Jan, 10 2021 @ 10:23 AM
link   
a reply to: ThatDamnDuckAgain

Exactly, you just have to think about what your eyes are seeing.



posted on Jan, 10 2021 @ 10:28 AM
link   

originally posted by: Vasa Croe
So I have wondered for a while if everything typed into a social media app you are on is actually captured.

Even when you backspace or clear what you just typed....basically capturing in real time.

So regardless of if you were hot-headed for a second and then deleted what you were about to post.....it would still capture your initial response or message.

Does that make sense?

I don’t think that could be implemented on a forum like ATS, but it could definitely be coded into an app and part of the T&A that nobody reads.

Think about it....keyloggers are one of the oldest tricks in the book.....


Yes, makes perfect sense.

Typically, you would write an algorithm that monitors key words so you aren't copying too much data. Even if backspaced, it would record this data.

Or

Just keylog all of it and have the al gore rythyms go through it after....either way.

But, yes they do it, for research and other less noble reasons.

Look up AutoHotKey, you could write a simple one in minutes. This is for beginners.


edit on 1/10/2021 by MykeNukem because: sp.



posted on Jan, 10 2021 @ 12:38 PM
link   

originally posted by: More1ThanAny1
a reply to: chr0naut

I'm calling BS on the "every keystroke" part. This is testable and is not true.


Well, they have to with browsers all using HTTPS now.

I believe that the NSA would use mostly kernel level metadata collection on compliant operating systems with key escrow held by the NSA.

The metadata about how the data is submitted is more valuable than the data itself.



posted on Jan, 10 2021 @ 01:21 PM
link   

originally posted by: chr0naut
Well, they have to with browsers all using HTTPS now.

The sites, not the browsers.



posted on Jan, 10 2021 @ 03:36 PM
link   
a reply to: chr0naut

I am an experienced kernel level driver developer for Windows. No matter what, that keystroke data would have to travel through the network stack and would be detectable. People would have found such a thing by now. I am only talking about on Windows of course.

However, I am not denying that if one were to be spied on by the government they couldn't flip a switch and do this. I am mostly saying its not on by default.

Also, keystroke data is useless if they can't identify the machine its coming from within a subnet. So the packets sent over the network would be larger and much more detectable than just sending single bytes per keystroke because it would require a unique identifier to go with it.

-

Regarding the "user is typing..." implementation. I was responsible for developing a similar feature and the most common way to do it is to not send every keystroke. Its more efficient to fire an event using a text box "onChange" trigger to tell the other user that the person is typing. That would then timeout after a few seconds if the user stopped typing. If they keep typing that timer is reset. So it's not tracking every keystroke.



edit on 10-1-2021 by More1ThanAny1 because: (no reason given)



posted on Jan, 10 2021 @ 03:39 PM
link   
a reply to: ArMaP

HTTPS requires both browsers and websites to handshake and utilize a public key to encrypt the data for transit.



posted on Jan, 10 2021 @ 03:51 PM
link   

originally posted by: chr0naut

originally posted by: More1ThanAny1
a reply to: chr0naut

I'm calling BS on the "every keystroke" part. This is testable and is not true.


Well, they have to with browsers all using HTTPS now.

I believe that the NSA would use mostly kernel level metadata collection on compliant operating systems with key escrow held by the NSA.

The metadata about how the data is submitted is more valuable than the data itself.


This reads like a techno-babble.

"Kernel level metadata" in most *nix platforms won't have anything of personally incriminating/identifiable value. It's mostly concerned about things like what kernel modules are loaded, drivers in use, memory layout and servicing hooks from applications in userland.

Not to mention, e.g. Linux kernel, is among the most audited/scrutinized source code on the planet Earth.

I do remember Snowden mentioning the criticality of "metadata" for the spooks, but my understanding is that this is in relation to tracking things like phone records, from party A to party B, what time it occurred and where the participants were when the call happened.

Nevertheless, you stumbled into a worthwhile point, which is that it pays to use open source software where every line of code is audited, vs. black box/walled garden OS that can do whatever they please with no recourse.



posted on Jan, 10 2021 @ 04:42 PM
link   

originally posted by: More1ThanAny1
Regarding the "user is typing..." implementation. I was responsible for developing a similar feature and the most common way to do it is to not send every keystroke. Its more efficient to fire an event using a text box "onChange" trigger to tell the other user that the person is typing. That would then timeout after a few seconds if the user stopped typing. If they keep typing that timer is reset. So it's not tracking every keystroke.

It doesn't need to track every keystroke, but it's possible.



posted on Jan, 10 2021 @ 04:42 PM
link   

originally posted by: More1ThanAny1
HTTPS requires both browsers and websites to handshake and utilize a public key to encrypt the data for transit.

Obviously.

But if the site doesn't use HTTPS the fact that the browser can use it is irrelevant.



posted on Jan, 10 2021 @ 04:44 PM
link   

originally posted by: SleeperHasAwakened
Nevertheless, you stumbled into a worthwhile point, which is that it pays to use open source software where every line of code is audited, vs. black box/walled garden OS that can do whatever they please with no recourse.

Even then, wasn't there a case of something related to networks, I think, that was found to have some kind of "flaw" that was there for many years and nobody noticed?



posted on Jan, 10 2021 @ 04:54 PM
link   

originally posted by: ArMaP

originally posted by: chr0naut
Well, they have to with browsers all using HTTPS now.

The sites, not the browsers.


Researchers link QWERTY keylogger code to NSA and Five Eye's Regin espionage malware - CSO/IDG Communications



posted on Jan, 10 2021 @ 04:59 PM
link   

originally posted by: More1ThanAny1
a reply to: chr0naut

I am an experienced kernel level driver developer for Windows. No matter what, that keystroke data would have to travel through the network stack and would be detectable. People would have found such a thing by now. I am only talking about on Windows of course.

However, I am not denying that if one were to be spied on by the government they couldn't flip a switch and do this. I am mostly saying its not on by default.

Also, keystroke data is useless if they can't identify the machine its coming from within a subnet. So the packets sent over the network would be larger and much more detectable than just sending single bytes per keystroke because it would require a unique identifier to go with it.

-

Regarding the "user is typing..." implementation. I was responsible for developing a similar feature and the most common way to do it is to not send every keystroke. Its more efficient to fire an event using a text box "onChange" trigger to tell the other user that the person is typing. That would then timeout after a few seconds if the user stopped typing. If they keep typing that timer is reset. So it's not tracking every keystroke.



It would make programmatic sense to buffer keystrokes and other metadata to produce a packet of sufficient size to encrypt and compress. It still would represent every keystroke sequence and timings.

This kind of metadata may also indicate the possibility of different typists using a common terminal, or of someone spoofing someone else's account.

The metadata is clearly vital to a prosecutable case.

edit on 10/1/2021 by chr0naut because: (no reason given)



posted on Jan, 10 2021 @ 05:17 PM
link   

originally posted by: SleeperHasAwakened

originally posted by: chr0naut

originally posted by: More1ThanAny1
a reply to: chr0naut

I'm calling BS on the "every keystroke" part. This is testable and is not true.


Well, they have to with browsers all using HTTPS now.

I believe that the NSA would use mostly kernel level metadata collection on compliant operating systems with key escrow held by the NSA.

The metadata about how the data is submitted is more valuable than the data itself.


This reads like a techno-babble.

"Kernel level metadata" in most *nix platforms won't have anything of personally incriminating/identifiable value. It's mostly concerned about things like what kernel modules are loaded, drivers in use, memory layout and servicing hooks from applications in userland.

Not to mention, e.g. Linux kernel, is among the most audited/scrutinized source code on the planet Earth.

I do remember Snowden mentioning the criticality of "metadata" for the spooks, but my understanding is that this is in relation to tracking things like phone records, from party A to party B, what time it occurred and where the participants were when the call happened.

Nevertheless, you stumbled into a worthwhile point, which is that it pays to use open source software where every line of code is audited, vs. black box/walled garden OS that can do whatever they please with no recourse.


The kernel code of open-source operating systems is definitely well scrutinized but there also is exploit code that talks to and intercepts standard I/O. On an open-source OS, these sorts of interceptions are trivial.

I once worked on a mouse 'driver' that utilized just such I/O interception to add features like additional buttons and mouse wheels for a generic cheaply manufactured mouse and that used a completely separate open-source driver for actual I/O directly to the mouse chipset (which is quite limited in the information it can buffer and transmit).

edit on 10/1/2021 by chr0naut because: (no reason given)



posted on Jan, 10 2021 @ 05:22 PM
link   

originally posted by: More1ThanAny1
a reply to: ArMaP

HTTPS requires both browsers and websites to handshake and utilize a public key to encrypt the data for transit.


Which is why, for ease of access to the unencrypted data, the three-letter agencies must get in either before, or after, or both before and after, encryption.

Encrypted data transmission is a pain to those who would bulk collect. However, they have workarounds.



posted on Jan, 10 2021 @ 09:13 PM
link   

originally posted by: MotherMayEye
a reply to: Vasa Croe

I followed you on Twitter, I don't now if you knew that or not. I am wondering if you bailed? I did on Wednesday afternoon.

I did a Tweet delete before I left. I am sure SM captures everything they can capture....including keylogging.
Why did you bail on Twitter? I was never a fan myself, though I remember reading some astronaut tweets from the ISS. But in general it seemed like a stunted form of communication.


originally posted by: chr0naut
Which is why, for ease of access to the unencrypted data, the three-letter agencies must get in either before, or after, or both before and after, encryption.
Thanks to Edward Snowden, we know how they get around the https encryption, on the slide with the famous smiley face, or should I say infamous?

Leaked Slide Shows NSA Celebrated Victory Over Google's Security With A Smiley Face



posted on Jan, 11 2021 @ 01:15 AM
link   

originally posted by: Arbitrageur
Why did you bail on Twitter? I was never a fan myself, though I remember reading some astronaut tweets from the ISS. But in general it seemed like a stunted form of communication.


It made my skin crawl to be on Twitter during the staged storming of the Capitol. I knew the censorship was coming but what happened after I left was way beyond what I expected.

I'm on TG now...it's so cozy. A group of us left. We still go to read some tweets offline but I can see some content that makes me sick. People celebrating the censorship feeling righteous about it...calling for more censorship and the crushing of any new platforms.

But I have noticed the occasional Trump hater that is aghast. Not many though. The content is sketchy on the Left anyway....stuff like this goes on:



They fake being conservatives and they did it at the Capitol, too.

I have a few other quote searches that yield copy and paste bot users. For every Biden supporter on Twitter...there are 10 frauds.



posted on Jan, 11 2021 @ 10:19 AM
link   
a reply to: MotherMayEye

Wow, Copy paste repeat.





posted on Jan, 11 2021 @ 01:06 PM
link   
a reply to: MotherMayEye
Silly games in that screenshot, I don't see how anybody on the left or on the right can take such an obvious "copy pasta" seriously. Thanks for explaining why you bailed.




top topics



 
9
<< 1  2    4 >>

log in

join