[Another layer of the conspiracy onion comes off and it stinks.]
Will security firms detect police spyware?
,----[ Quote ]
| A recent federal court decision raises the question of whether antivirus
| companies may intentionally overlook spyware that is secretly placed on
| computers by police.
`----
http://news.zdnet.com/2100-1009_22-6197020.html
Related:
http://www.youtube.com/watch?v=KGlNTEQ0RzM
German government admits it is already conducting online searches
,----[ Quote ]
| Piltz called on the German government to block funding for the
| programming of software used in online searches; she also said it
| was urgent that the government "discontinue these searches until
| the German Supreme Court has reached a ruling on the matter."
`----
http://www.heise.de/english/newsticker/news/88895/from/rss09
Microsoft patents the mother of all adware systems
,----[ Quote ]
| The adware framework would leave almost no data untouched in its quest to
| sell you stuff. It would inspect "user document files, user e-mail files,
| user music files, downloaded podcasts, computer settings, computer status
| messages (e.g., a low memory status or low printer ink)," and more. How could
| we have been so blind as to not see the marketing value in computer status
| messages?
`----
http://arstechnica.com/news.ars/post/20070717-microsoft-patents-the-mother-of-all-adware-systems.html
http://news.softpedia.com/news/Forget-about-the-WGA-20-Windows-Vista-Features-and-Services-Harvest-User-Data-for-Microsoft-58752.shtml
http://www.abanet.org/journal/ereport/jy13tkjasn.html
,----[ Quote ]
| Vista—Microsoft’s latest operating system—may prove to be most
| appropriately named, especially for those seeking evidence of how a
| computer was used.
`----
"Trusted" Computing
,----[ Quote ]
| Do you imagine that any US Linux distributor would say no to the
| US government if they were requested (politely, of course) to add
| a back-door to the binary Linux images shipped as part of their
| products ? Who amongst us actually uses the source code so helpfully
| given to us on the extra CDs to compile our own version ? With
| Windows of course there are already so many back-doors known and
| unknown that the US government might not have even bothered to
| ask Microsoft, they may have just found their own, ready to
| exploit at will. What about Intel or AMD and the microcode on
| the processor itself ?
`----
http://tuxdeluxe.org/node/164
Data Protection Commissioner criticizes search of private PCs online
,----[ Quote ]
| "In the case of a search via the Internet a police officer covertly,
| without the person knowing about it, accesses a person's computer."
| During such an operation he or she might copy data and obtain all
| kinds of personal documents; the police officer was acting as a "state
| hacker," so to speak. Mr. Schaar observed. "Such an approach is in
| conflict with the legal obligation to protect the core of
| individuals' privacy," Mr. Schaar stated emphatically.
`----
http://www.heise.de/english/newsticker/news/82529/from/rss09
'---[ Quote ]
| In relation to the issue of sharing technical API and protocol
| information used throughout Microsoft products, which the
| states were seeking, Allchin alleged that releasing this
| information would increase the security risk to consumers.
|
| "It is no exaggeration to say that the national security is
| also implicated by the efforts of hackers to break into
| computing networks. Computers, including many running Windows
| operating systems, are used throughout the United States
| Department of Defense and by the armed forces of the United
| States in Afghanistan and elsewhere."
`----
http://en.wikipedia.org/wiki/Jim_Allchin
|
|