Who are the the adversaries in technology ?

I've began a list of who are the adversaries we face in technology for freedom of use of our computers and freedom of speech for communities.

Freedom of use of our computers and electronics who uses computers.
Gorverment:
I won't do them all because it's enormous so I'll do the fives eyes in this case.
en.wikipedia.org/wiki/Five_Eyes
Canada:
en.wikipedia.org/wiki/List_of_intelligence_agencies#Canada
UsA:
en.wikipedia.org/wiki/United_States_Intelligence_Community
UK:
en.wikipedia.org/wiki/British_intelligence_agencies
Australia:
en.wikipedia.org/wiki/Australian_Intelligence_Community
New Zealand:
en.wikipedia.org/wiki/New_Zealand_intelligence_agencies
Other than these see this list:
en.wikipedia.org/wiki/List_of_intelligence_agencies

Globally all cellphones in general:
schneier.com/blog/archives/2006/12/remotely_eavesd_1.html

Hardware manufacturers and assemblers:
Nvidia
TLK
w3.org/2012/webcrypto/webcrypto-next-workshop/papers/webcrypto2014_submission_25.pdf
BSD license used.
AMD-GPU
Requires proprietary blobs to work:
phoronix.com/scan.php?page=news_item&px=AMDGPU-FW-UVD-VCE-VCN-Update
ME
en.wikipedia.org/wiki/Intel_Management_Engine
BSD licensed Minix3 used.
TXT
en.wikipedia.org/wiki/Trusted_Execution_Technology
SGX
en.wikipedia.org/wiki/Software_Guard_Extensions
en.wikipedia.org/wiki/Trusted_execution_environment
PSP
en.wikipedia.org/wiki/AMD_Platform_Security_Processor
Secure Execution Environment
openvirtualization.org/open-source-arm-trustzone.html#TrustZone-6
en.wikipedia.org/wiki/Trusted_execution_environment
Violating the GPL
linux-sunxi.org/GPL_Violations
TrustZone
en.wikipedia.org/wiki/ARM_architecture#Security_extensions
QSEE
bits-please.blogspot.com/2016/04/exploring-qualcomms-secure-execution.html
blackhat.com/docs/us-14/materials/us-14-Rosenberg-Reflections-on-Trusting-TrustZone.pdf
Collaborates with secrets services by installing/enabling backdoors.
infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html
BIOS spywware:
computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html
backdoors
infoworld.com/article/2611419/data-security/hp-admits-to-undocumented-backdoors-in-two-separate-storage-lines.html
Keylogers
www.bbc.com/news/technology-42309371
bleepingcomputer.com/news/security/keylogger-found-in-audio-driver-of-hp-laptops/
Backdoors
zdnet.com/article/hidden-backdoor-account-found-in-dell-network-security-software/
Communist spying
arstechnica.com/information-technology/2016/11/chinese-company-installed-secret-backdoor-on-hundreds-of-thousands-of-phones/
Backdoors
fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor
Backdoors
itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html
Backdoors
sekurak.pl/tp-link-httptftp-backdoor/
Backdoors
techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate
Spying
theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance
Service: TV
Backdoor/spying
news.ycombinator.com/item?id=16727319

Other urls found in this thread:

theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud
zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep
theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/
web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263
marketoracle.co.uk/Article40836.html
google.com/intl/en/chromebook/termsofservice.html
pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/
boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html
nytimes.com/2015/08/16/us/politics/att-helped-nsa-spy-on-an-array-of-internet-traffic.html
theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
lobste.rs/s/txpia8/copperheados_has_imploded
uj3wazyk5u4hnvtk.onion/
archive.fo/vapZg
twitter.com/NSFWRedditImage

Megacorps promoting services based on saas and similar:
Spying
theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud
Collaboration with secret services
zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep
Backdoors and collaboration with secret services.
-Function:Encryption
theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/
Service: Windows XP
web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263
Service: All windows since 1999
Spying
marketoracle.co.uk/Article40836.html
Product/services: ChromeOS
sgoogle.com/intl/en/chromebook/termsofservice.html
Search engine.
Service: Kindle
Backdoor
pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/
boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html
Spying
nytimes.com/2015/08/16/us/politics/att-helped-nsa-spy-on-an-array-of-internet-traffic.html
Collaborating with mass spying
theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order

As for free speech communities what do we have ?
I know that RMS is a free speech absolutist but what about the FSF ? The linux foundation ? who are the people that we can trust in such subject ?

...

GNUtards are the real adversaries

Attached: DXhIzZWVoAA1xGT.jpg (848x1200, 97.34K)

If you paid attention to the FSF's license guidelines, or, say, GNU itself, you would know the FSF has nothing against permissive licenses. Intentional abuse of an inappropriate license, on the other hand, such as a permissive license for a large, end-user-facing codebase, is just as abusive as distributing data with no license.

However, I will say this: take for example CopperheadOS, released under creative commons. Technically it's open sauce, and by extension free software, but it isn't libre. A license like that makes people disinclined to do anything with that software, including its original author, who gave over the copyrights to Copperhead for some Godawful reason when all reasonable ends to collaboratively editing the software could have been encompassed by a free license is an example of this abuse. In this case–and the case of many other seemingly copycenter projects–it's not a glamorous choice to use a more permissive license in a competitive ecosystem, where you can at least have the means to explicitly define what your collaborators can do to your work, even if you have low self-esteem/are desperate and can't stand up for yourself and tell them exactly what you want from them via the GPL.

It's so disingenuous when open source pretends like they're free software knowing fully well that they're lobotomizing themselves just to please their employers. There's a whole generation of engineers who simply can't advocate for libre software because of the technical limitations of open source logic.

More like all chink companies

Next time include all kike-owned tech companies

...

No legal/governmental actions to stop or censor what someone says.

There is a difference between a observation and a causation, you are accusing OP that he said that the BSD license is bad while there is no such line.
In my opinion it's getting redundant that permissive licenses are often used by corporations to have control of other peoples computer without consciousness from the supposed owners of these functions.

...

u have to go

Attached: DdL1ncvXkAAV7YE.jpg (609x802, 73.36K)

Everyone that glows

CopperheadOS imploded recently.
lobste.rs/s/txpia8/copperheados_has_imploded

Pottering
FBI/CIA/NSA/etc.
Disney,MPAA,RIAA,etc.
My Dad
EU Article 13
FCC
ISPs
Anyone with an encrypted Wi-Fi AP
Car manufacturers
LexisNexus
Advertisers
Metallica

A comment on that thread suggests that glow-in-the-darks were possibly involved.


They're irrelevant since the early/mid-90's.

They killed Napster in the early 00s.

How ?

That's community or personality section.
Isn't article 11 or 3 a problem too ?
These should be classified has "legal" adversaries.
Hardware
Both hardware and legal.


Which one ?

lawsuit.

Redditards and faceberg users. I also blame web technologies for inviting too many low skilled programmers into the field, so we end up playing to the lowest common denominator. For proof of this, you only need to see how popular Atom is.

...

The design of shitty fucking tech news sites like Toms Hardware.

now look in contrast look at Anandtech (also have no idea what they talk about, but much less harmful web design)

...

Nice attempt at obscurity department of homeland security.

Damn right son.

Attached: cf58640a07584d1605bb4b3c4d5f06d7191b6df6a14e058fabe92ab202dd05a4.jpg (640x422, 31.23K)

With China its guaranteed, with USA companies there is at least a (even now) history of corporations not cooperating with the government.

Every one knew in the communism era that the Прадва was wrong; what makes the USA worste than communism is that americans believed WSJ and others well telling the truth.
You're in the eye of the tornado yet you don't see it.

Lol user Americans hate the media and think they are all liars. Have you never actually talked to an American?

Attached: DWSPHNnU8AAiOXl.jpg (958x1200, 157.48K)

Edgy autists aren't representative of the entire population.

You have never talked to a normie have you? American approval for media is at an all time low.

Mainstream news being a joke has been a thing for decades. Stop being retarded user and stop doubling down on being wrong

You have to talk to people outside the big cities. But even in cities, not everyone is identical, and you'll find NRA members with nice gun collection who despise the media. I even met a tow truck operator who had so little trust in the bankers that he only invested in gold and cows. There's lots of different people in the US.

Approval is low but the dumbfucks keep watching.


They're not in on the joke.


I never said they were impossible to find.

Everybody is an adversary, except the GPL.
Note that I am in no way a communist, or remotely a leftist, but I have swallowed the Stallman redpill because I recognize Stallman is a student of history, he took a shitload of it at Harvard and realized it always repeats itself and they will absolutely do whatever they can to create dumb terminals that deny us any kind of freedom and spy on everything we do regardless of the regime in charge left or right wing.

The tide turned recently with webAssembly, imagine a world without app stores or desktop apps. You can just push a proprietary binary through the browser and all your computation is done remotely through the """cloud''' meaning spying. There is some interesting shit going on right now with PeerTube, and even the Hurd, you can combine NetBSD rumpkernels with the Hurd to run on hardware and use their drivers. It's less ideological than regular GNU projects but I understand why they are ideological, holy fuck is the future frightening and Stallman saw it all back in the 1980s.

Daily reminder that the GPL3 has nothing to do with server side programs and protects you in no way.

Yes the GPLv3 doesn't protect for SERVER side programs (except when the server is located on your own computer). The AGPLv3 covers that specific problem.
Note that the GPLv3 covers DRM and tivoization problems.

Only thing the GPL protects against is good software ever being written.

Attached: DWdt_S9X4AAeBGC.jpg (1016x1024, 138.64K)

The AGPL doesn't cover spying at all.


Didn't Stallman go to the MIT though?

Throw the jews down the well.
#################################
block 103.243.12.0/23 # instart logic - washington post
block 159.180.64.0/20 #
block 159.180.80.0/22 #
block 185.89.20.0/23 #
block 185.89.22.0/24 #
block 192.33.24.0/21 #
block 198.180.186.0/23 #
#################################
block 23.235.32.0/20 # fastly - vox, guardian, new yorker,
block 43.249.72.0/22 # nytimes, new republic, cnn, reddit,
block 103.245.222.0/23 # wired, independent uk, bbc,
block 103.245.224.0/24 # businessinsider, inquisitr
block 104.156.80.0/20 # nr
block 151.101.0.0/16 # v,g,ny,nyt,cnn,r,w,i,b,i
block 157.52.64.0/18 #
block 185.31.16.0/22 #
block 199.27.72.0/21 #
block 199.232.0.0/16 #
#################################
block 52.3.0.0/16 # amazon / cloudfront - vice news
block 52.54.0.0/15 # salon.com
block 52.200.0.0/13 #
block 52.204.0.0/16 #
block 54.83.0.0/16 #
block 54.84.0.0/16 #
block 54.230.0.0/16 #
#################################
block 23.4.176.0/20 # bloomberg
#################################
block 96.16.0.0/15 # akamai - thehill.com, politico,
# cbsnews, usatoday, dw, ynetnews
# abc au, news au, dailymail
#################################
block 134.213.0.0/16 # rackspace - politico.eu
#################################
block 192.0.64.0/18 # automattic - people, newyorktimes,
# nypost, nationalpost
#################################

#################################
block 184.50.240.0/20 # akamai - nbc
#################################
block 50.204.4.0/22 # comcast - nbcnews
#################################
block 184.50.32.0/20 # akamai - msnbc
#################################
block 72.21.80.0/20 # verizon cdn - huffington post,
# breitbart
#################################
block 104.16.64.0/20 # cloudfare - daily beast, 4chan
#################################
block 157.166.224.0/19 # turner - cnn
block 198.81.230.0/24 #
#################################
block 184.51.128.0/23 # akamai - cnbc
#################################
block 64.30.224.0/20 # sportsline - cbs.com
block 216.239.112.0/20 # cbs interactive - cbs
#################################
block 98.139.128.0/17 # yahoo
#################################
block 173.194.219.0/24 # google
#################################
block 46.229.160.0/20 # strange
#################################

#################################
block 2001:41d0::/32 # asn16276 OHV SAS
block 2402:1f00:8000::/40 #
block 2402:1f00:8100::/40 #
block 2402:1f00::/32 #
block 2604:2dc0::/32 #
block 2607:5300::/32 #
block 5.39.0.0/17 #
block 5.135.0.0/16 #
block 5.196.0.0/16 #
block 8.7.244.0/24 #
block 8.18.128.0/24 #
block 8.18.136.0/21 #
block 8.18.172.0/24 #
block 8.20.110.0/24 #
block 8.21.41.0/24 #
block 8.24.8.0/21 #
block 8.26.94.0/24 #
block 8.29.224.0/24 #
block 8.30.208.0/21 #
block 8.33.96.0/21 #
block 8.33.128.0/21 #
block 8.33.136.0/24 #
block 8.33.137.0/24 #
block 37.59.0.0/16 #
block 37.60.48.0/21 #
block 37.60.56.0/21 #
block 37.187.0.0/16 #
block 46.105.0.0/16 #
block 46.105.192.0/20 #
block 46.105.192.0/23 #
block 46.105.194.0/23 #
block 46.105.196.0/23 #
block 46.105.198.0/24 #
block 46.105.205.0/24 #
block 51.254.0.0/15 #
block 54.36.0.0/16 #
block 54.37.0.0/16 #
block 54.38.0.0/16 #
block 54.39.0.0/16 #
block 62.245.0.0/19 #
block 66.70.128.0/17 #
block 79.137.0.0/18 #
block 79.137.64.0/18 #
block 87.98.128.0/17 #
block 91.90.88.0/21 #
block 91.121.0.0/16 #
block 91.134.0.0/16 #
block 92.222.0.0/16 #
block 94.23.0.0/16 #
block 103.5.12.0/22 #
block 137.74.0.0/16 #
block 139.99.0.0/17 #
block 139.99.128.0/17 #
block 142.4.192.0/19 #
block 142.44.128.0/17 #
block 144.217.0.0/16 #
block 145.239.0.0/16 #
block 147.135.0.0/17 #
block 147.135.128.0/17 #
block 149.56.0.0/16 #
block 149.202.0.0/16 #
block 151.80.0.0/16 #
block 158.69.0.0/16 #
block 164.132.0.0/16 #
block 167.114.0.0/17 #
block 167.114.128.0/18 #
block 167.114.192.0/19 #
block 167.114.224.0/19 #
block 176.31.0.0/16 #
block 176.31.176.0/22 #
block 176.31.184.0/22 #
block 176.31.188.0/22 #
block 178.32.0.0/15 #
block 178.32.134.0/24 #
block 178.32.135.0/24 #
block 185.12.32.0/23 #
block 188.165.0.0/16 #
block 192.95.0.0/18 #
block 192.99.0.0/16 #
block 193.70.0.0/17 #
block 193.104.19.0/24 #
block 193.109.63.0/24 #
block 195.110.30.0/23 #
block 195.246.232.0/23 #
block 198.27.64.0/18 #
block 198.27.92.0/24 #
block 198.50.128.0/17 #
block 198.100.144.0/20 #
block 198.245.48.0/20 #
block 213.32.0.0/17 #
block 213.186.32.0/19 #
block 213.251.128.0/18 #
block 217.182.0.0/16 #
#################################

#################################
block 2a02:26f0:8000::/48 # asn8551 Bezeqint and akamai
block 2001:4cd0::/32 #
block 2001:4cd0:b014::/48 #
block 2001:4cd0:dc00:e00::/56 #
block 2.20.152.0/22 #
block 23.34.224.0/20 #
block 23.195.8.0/22 #
block 31.168.0.0/16 #
block 62.219.0.0/16 #
block 72.246.151.0/24 #
block 79.176.0.0/13 #
block 81.218.0.0/16 #
block 82.80.0.0/15 #
block 84.108.0.0/14 #
block 85.130.128.0/17 #
block 89.38.28.0/22 #
block 92.122.128.0/15 #
block 95.101.4.0/22 #
block 104.67.0.0/16 #
block 104.68.0.0/14 #
block 104.72.0.0/13 #
block 104.80.0.0/12 #
block 104.96.0.0/11 #
block 109.64.0.0/14 #
block 128.139.194.0/24 #
block 184.27.128.0/23 #
block 192.114.0.0/15 #
block 192.116.0.0/15 #
block 192.118.0.0/16 #
block 206.82.140.0/24 #
block 212.25.64.0/18 #
block 212.179.0.0/16 #
block 217.194.200.0/24 #
block 217.194.201.0/21 #
#################################

Attached: th.jpeg (377x534, 43.82K)

You do realise that ISP's can just redirect IPV4 adressess to another website via ICAAN IP reassignment, right? For example if I were the NSA or (((ICAAN))) and I wanted to MITM cuckchan without being noticed I could ask all ISP's I control to redirect all it's IP's to one the NSA controls. From there I use my government controlled SSL provider that browsers trust by default, verisign and globalsign, to passively MITM traffic without any being the wiser unless someone not under my control points out the IP's are different. But if someone did that I would just shill against them being stupid and falsely accuse them of idiocy for noticing the wiles of such action. Like trying to kill them such as snowden or making false claims like it is the ISP's fault such a thing happened. Listing the IPV4 ranges is not as useful as listing all their SSL certificate hashes and what to avoid, such as verasign and globalsign certificates.

That list is about improving the internet experience by removing MSM content, Israeili CDN's, other advertising and a couple scurilous sites. I've add a few sites like this one to a hosts file. My goal isn't to avoid the NSA, at all. Sure, my ISP could still conceivably redirect or inject traffic to or from other addresses but I don't use their DNS and treat the DSL modem as a hostile device. I haven't seen any evidence of them doing that and don't believe it would be transparent. Even if they would do it, and I can't at the moment imagine why they would considering some of the pitfalls, as it would require altering the routing tables of a number of routers, and well designed endpoints; I believe it would be noticed by myself and others. Anyway, when I want to browse more securely I use tor or i2p rather than rely on soley on SSL.

Doesn't matter, at the ISP level you can put in a IP redirect at the IPV4 level. So say most DNS server direct an ip to 8.8.8.8. If you avoided most dns server and used one at 1.1.1.1 you could still be redirected to the one at 8.8.8.8 at the ISP level even though you, at the IPV4 level, have connected to 1.1.1.1.
I have witnesses a few ISP's do this such as connecting to mega.nz in the USA if you use a proxy in the USA. At a national level there is a firewall/ISP redirect in the USA to block them from getting to mega's file sharing service. Not a problem if you are in new zealand though :>.

True, but I use my own DNS, not google or cloudfare's either. I'd not heard that about mega or used them.

host mega.nz
mega.nz has address 31.216.148.10
mega.nz has IPv6 address 2001:67c:1998:2212::10
mega.nz mail is handled by 10 mail.mega.co.nz.

curl ipinfo.io/31.216.148.10
{
"ip": "31.216.148.10",
"city": "",
"region": "",
"country": "LU",
"loc": "49.7500,6.1667",
"org": "AS24611 Datacenter Luxembourg S.A."

It looks accessible to me from the USA. You made the point about noticing. A DNS redirect wouldn't effect me unless propogated by the root servers. Even so there has been some piratebay spoopiness lately so I switched to uj3wazyk5u4hnvtk.onion/ the pirate bay onion for now, which is very nice.

Well someone here is being fucked with because an american whois company reports mega.nz as archive.fo/vapZg
And your reported IP of 31.216.148.10 ain't on the list. So either you are being MITM'd, this whois company is reporting false data, if I used a proxy in said locality then I could be MITM'd, or we are both being MITM'd and don't know mega.nz's true IP. And there's your smoking gun that IP redirects not only exist, but happen to be used to MITM websites with SSL traffic.
But not the same, just like 1.1.1.1 and 8.8.8.8 are similar but not the same.

Just be aware of fuckery like this when your proxy's ISP is owned by a (((hostile government))) intent on your death or subversion. Get a better proxy tbh.

Dude, this isn't evidence of a MITM. You did an ns lookup so you got their name servers. Mega has 512 ip addresses at that ASN in addition to however many they have in NZ. It's just normal CDN shit.

Tom's Hardware's current editor is (((Avram Piltch)))