I get G A P, Daily Whistleblower News, now http://www.climatesciencewatch.org/2014/06/08/recalling-a-climate-change-whistleblower-action-nine-years-ago-today/ On Monday, June 9, 2014 10:16 AM, Jeremy Compton <j.compton@xxxxxxxxxxx> wrote: Well, thats interesting because if you watch his interview on NBC or was it MSNBC he paints a rather interesting view on this one. To be quiet honest l dont really know what to make of this. Its a case of he said, she said routine :) How do we know what truly happened? We dont. Its kind of also like watching people playing table tennis, with one side saying this that and the other. :) I was referring to the link below. Sorry my post has little to do with this one. http://www.nakedcapitalism.com/2014/06/exclusive-report-nsa-whistleblower-snowden-never-access-juiciest-documents-far-damning.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+NakedCapitalism+%28naked+capitalism%29 Jeremy ________________________________ Date: Mon, 9 Jun 2014 08:07:26 -0700 From: nl1816a@xxxxxxxxxxxxx Subject: [cryptome] Re: [cryptography] Help investigate cell phone snooping by police nationwide To: cryptome@xxxxxxxxxxxxx http://www.nakedcapitalism.com/2014/06/exclusive-report-nsa-whistleblower-snowden-never-access-juiciest-documents-far-damning.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+NakedCapitalism+%28naked+capitalism%29 On Monday, June 9, 2014 9:57 AM, John Young <jya@xxxxxxxxxxxx> wrote: I have here a list of the most scurrilous practitioners of "encryption works" culled from 3,000 years of work by the black-hearted magicians. Or get it from The Codebreakers," or from the usual suspect online bibliographies of cryptography, provided by "highly trustworthy" encryption workers of these noble lists of more lurkers than workers. Many interpretations of "encryption works," besides advocating its public use. It works to falsely assure, it works to lure victims, it works to boost the industry, it works to keep cryptographers employed, it works to conceal government, commerce and individual perfidy. All these are regularly discussed in these cryptic mail lists along with related essential subterfuges, lies, cheating, shading, marketing, false confessions, vicious attacks and counterattacks, deceptions, siphoning and corrupting mail lists, well, the list is quite long and growing as long as stego noses. Main reason to read these cryptic railings, enthusiasms and digital stench of lurking snake oilers, is to pick up tips on who's up and who's down, who's products and research to avoid, and who is spreading vile comsec diseases by contracts, by legislation, by implants, backdoors, trap doors and brazen front doors (top global corps and govs), by protection against the easiest protected and no protection against the hardest kept quiet for exploitation and handsome sales on black, white, grey and technicolor markets (the top corps and govs). Hardly an industry group has benefited from the Internet as greatly as the comsec and privacy protection workers of the world's greatest spying machine. At 09:06 AM 6/9/2014, you wrote: On 2014.06.08, at 16:47, coderman <coderman@xxxxxxxxx> wrote: > > >Or for that matter, Ed's laughable assurance that "encryption works." >How paranoid can we get? Can you explain how this phrase is laughable? > >While the link below, albeit two years old, seams to indicate that there are no quantum computers capable of breaking my (our) encryption methods, I seams to recall somewhere that there were 17 or so of these computers in the world scattered in underground rooms at more than 200 below freezing for those who could afford the price tag. You bet the Gov. of the United States (via CIA I think RUMINT) has access to one. However, if you are doing something serious enough to get your data tagged, tasked, and processed through this kind of computer, it is no laughing matter. The rest of us are not that important, nor are there the resources available to process all of our traffic, much less the sum of our data! > >http://security.stackexchange.com/questions/23085/are-there-really-functioning-quantum-computers > > >If you think encryption is a “laughable assurance” why would you even subscribe to these emails? > >Regards, > >Mark > >P.S. I say this tung in cheek … Please son’t tell me that they have developed mind readers. "F*ck Man, nothing is safe anymore, and they are ruining everything!” ;-) > >P.P.S To the original question about cell phones. If you have an iPhone or something similar that you 1) can't remove the battery, 2) is too cost prohibitive to remove the battery etc. you can remove the SIM card and power the phone off. With the SIM card removed, you can rest assured that only 200 or so people who have the knowledge to find your IMEI on the grid and have access to the equipment to do that are probably out seeking bigger fish. If that doesn’t give you the peace you need, then my advice to you is whatever your are doing should be paying you enough to smash that iPhone at anytime you want. :-)