Do banking in person and pay bills with checks. Besides, your bank account is paying for the teller anyway. On Thu, Jul 3, 2014 at 3:48 AM, doug <douglasrankine2001@xxxxxxxxxxx> wrote: > Hi Ryan, > Thank you for your posting...you have reassured me. I feel exactly the > same way. It was my wifes bank account being broken into and her i.d. > stolen that got me really interested in studying it more closely, and I > have only recently started learning how to use the Ubuntu version of > Linux. Linux is very hands-on and one has to learn a lot to get a little. > All very complicated... > > I joined this list because I thought it would have lots of those clever > people on it who know such things and can offer advice...and of course I > have a side but much abiding interest in unofficial secrets. One of the > things I noticed about the document was that there was an incorrect > interpretation of the UK Official Secrets Act of 1989. It got the year > wrong, and misquoted the Act regarding the release of secret material. It > was this that led me in to thinking that it might be a hoax. And I did > wonder why such organisations would go to the bother of doing such a thing, > when there are far more efficient ways of doing it, and from afar too. > > But, wouldn't it be wonderful all the same if there was such a backdoor to > GCHQ and the NSA, just think they would be able to encrypt and store all of > ones secret and private papers, and after they had finished perusing them; > they could keep them for posterity and then release them for public > consumption at a later date, even though they are being rather mean and > won't allow one to use them as a free back up...and even though we pay them > all those taxes. They could set up a social research facility at NSA and > use all the information to gather statistics on what people were doing > throughout the world, what their views are on particular subjects and use > it to satisfy majority needs, all at efficient cost, instead of just > catering for the terrorists and bombers and so called liberation > movements. Dual use and multipurpose is the ball game for all of this new > technology...don't you think...And the Chinese and all the other nations > could get direct copies too... > > I understand too, that they have all this specialised remote controlled > software which can do magic with ones machine, install new software, clean > it up, get rid of the bugs which slow it up; make it work better so that it > collects all the information and data on it much more > efficiently...packages it up and sends it up the line...error free. > ATB > Dougie. > > > On 03/07/14 09:32, Ryan Carboni wrote: > > I don't trust anything I don't understand or could do myself. > > I personally would prefer to avoid encryption and maintain physical > security. > > > On Wed, Jul 2, 2014 at 4:11 PM, Shaun O'Connor <capricorn8159@xxxxxxxxx> > wrote: > >> hmmmm interesting yes however some of the links within the document >> either lead to a blank page or just time out. >> coincidence or otherwise this info and similar has been popping up within >> days of me complaining about unexplained multiple connection drop-outs. >> >> On 02/07/2014 21:16, Andrew Hornback wrote: >> >> Hoax or not, this is exactly why my home network includes a strategically >> placed hub and a separate system dedicated to traffic analysis. >> >> --- A >> >> >> On Wed, Jul 2, 2014 at 3:59 PM, doug <douglasrankine2001@xxxxxxxxxxx> >> wrote: >> >>> http://cryptome.org/2013/12/Full-Disclosure.pdf >>> >>> Anyone got any views on this one...surprised that no one has mentioned >>> it since I last posted it. >>> ATB >>> Dougie. >>> >>> >> >> -- >> * PRIVACY IS A BASIC RIGHT - NOT A CONCESSION * >> > > >