![]() ![]() ![]() Who so sorely depend on Iraq even still for oil. ISIS is a non-entity in any palpable terms but to scare China with. I did not even hear of such stories, but glad I did not. They want, I am sure, considerably more devious systems then S Their grabbing Embassy employees who have clearance but have it not noted is laughable. There are a lot of obvious and easy ways they could use this information to track back operations aimed at them, beyond the WP one noted. And, probably, the USG is very aware of this, so that release of information was very much pointed at them according to their perceived intentions. Probably what China is really interested in is evidence of intelligence groups that operate more like their own, which would include deep cover CIA agents. “But it’s certainly worth taking a look at.” official, who spoke on the condition of anonymity to discuss the sensitive topic. “That’s not conclusive that the person might be undercover CIA,” said one U.S. embassies but are missing from the OPM records might, through a process of elimination, reveal the identities of CIA operatives serving under diplomatic cover. intelligence operatives by scrutinizing the OPM files. officials have said that a foreign spy service might be able to identify U.S. For instance, from this WP article…Įven so, some U.S. There are various ways they could use this data to get some actually valuable information. This definitely, then, includes people not just from the military, or contracting agencies (many of whom, including as Snowden was, are, in fact, ‘undercover’). So, the 90% percentage is not unreasonable. You have 4.5 million people now with active clearance. And expose undercover agents overseas in other agencies besides the CIA. And this leaves out everyone else they may work with, and other agencies. ![]() After waking up a few minutes later the call worked as if nothing happened.The critical information, which was not encrypted, involves a complete rundown of the personal lives of some 90 percent of applicants for security clearances, mainly excepting most undercover CIA agents. The amazing part? During testing my lappy suspended to ram. And is already encrypted, so no one can listen-in on your communication. No account on any server needed, no trusting a third party, works behind NATs (tested!). ![]() Now add a friend, start a chat and voilà, VoIP works. Just download the software, install it and have the keys generated (that happens automagically), and download the VoIP plugin if you don’t have it already included (chances are, you have if not, on Linux retroshare-voip-plugin package is your friend, the other OS users can look here). One project that was closest to being usable was QuteCom… “was”, as there hasn’t been a single new release for 2 years now. SIP is hard to set-up Jitsi works on a single server but for some reason I have never been able to get a working VoIP call via Jitsi with a contact from a different server. Now, I know there are many free software projects trying to do VoIP, but none seems to be “there” yet. But today RetroShare really shined, and in an area that is constantly a chore for free software… VoIP ¶ There are some good things (full peer-to-peer decentralisation, full encryption), there are some less good things ( using SHA1 and the daunting GUI). A very interesting communication and file-sharing tool that does deserve a proper, full review – for which I do not, unfortunately, have time. Some of you might have already noticed (for example via my Diaspora profile) my infatuation with RetroShare. This is an ancient post, published more than 4 years ago.Īs such, it might not anymore reflect the views of the author or the state of the world. ![]()
0 Comments
Leave a Reply. |