Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 02/13/2009 3:27:55 PM PST by Joiseydude
[ Post Reply | Private Reply | View Replies ]


To: Joiseydude

Im sure all our enemies are already at work on it


2 posted on 02/13/2009 3:29:22 PM PST by al baby (Hi mom. I love sarcasim)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude
The Chinese probably have an entire division of IT geeks on it.

Then again, Obama probably gives the Chinese full access, so belay my last.

3 posted on 02/13/2009 3:30:21 PM PST by SampleMan (I'm not drinking the kool aid! Is it 2013 yet?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude
he was warned by the Secret Service, but insisted....guess he takes security real serious
4 posted on 02/13/2009 3:30:38 PM PST by Doogle (USAF.68-73..8th TFW Ubon Thailand..never store a threat you should have eliminated))
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

I’d think that anything that isn’t hard-wired can be breached.


5 posted on 02/13/2009 3:30:58 PM PST by MayflowerMadam (I feel much better since I gave up hope.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

Mitnick is not a “Hacker” in the sense that he figures out software and the weaknesses in it. Rather, he is a proponent of “social engineering”, whereby passwords and other critical data are searched out by other means such as lax security, phishing, and the like. He could no sooner crack Obama’s blackberry than I could. He could, however, perhaps find a way to steal the password, which is a hazard all secure networks must contend with.


7 posted on 02/13/2009 3:33:30 PM PST by domenad (In all things, in all ways, at all times, let honor guide me.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

What does he have to worry about? He is already friends with all of America’s enemies.


8 posted on 02/13/2009 3:33:53 PM PST by Soothesayer (The United States of America Rest in Peace November 4 2008)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

A honeypot for the technically adept but super-stupid.


9 posted on 02/13/2009 3:34:08 PM PST by SpaceBar
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude
Can you imagine what you would find on his Blackberry?

To Nazi Pelosi - AYSOS? IM BBMFIC!!!!

To Pinky Reid - NIMJD!!!!!

To Chillary - UR A PIAPS!!!

11 posted on 02/13/2009 3:37:57 PM PST by BossLady (Fauxbama is a lipsomaniac....)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

Putin already has Obama’s PIN number.


12 posted on 02/13/2009 3:40:50 PM PST by Oldeconomybuyer (The democRATS are near the tipping point.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude
"If I was the attacker, I would look to Obama's close circle of friends, family and associates and try to compromise their machines at home,"

A good starting point would be his two little skullsful of mush.

16 posted on 02/13/2009 3:44:20 PM PST by libh8er
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

What could they learn?

The pager number of his coke supplier? His mister(ess)’s number?

Could be some very actionable blackmail materials on bammy’s crackberry.


21 posted on 02/13/2009 3:48:32 PM PST by Dr.Zoidberg
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

Mitnick is a script kiddie. Nothing more.

He is great for a laugh when he opens his mouth, though.


27 posted on 02/13/2009 4:08:48 PM PST by Glenn (Free Venezuela!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

I can’t wait to see the email exchanges that Obama and Ayers are having.


29 posted on 02/13/2009 4:20:29 PM PST by Jeff Gordon ("An appeaser is one who feeds a crocodile hoping it will eat him last." Churchill)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

but but but the great says he “neeeeeeeeeeeeeeds” it


32 posted on 02/13/2009 4:40:10 PM PST by yldstrk (My heros have always been cowboys--Reagan and Bush)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

“Despite warnings from his advisers, the president insisted on keeping his beloved PDA, which now has specially designed superencrypting security software.”

Well, DUHHH. The encryption only protects what is on the blackberry. As soon as he brings up text on his screen or sends an email it has to be decrypted unless the person receiving the email has the same encryption.

When encryption isn’t enough, resort to superencryption.


34 posted on 02/13/2009 5:31:50 PM PST by yazoo
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Joiseydude

Old Eagle’s first rule of security “If somebody can build it, somebody can break it”.


35 posted on 02/13/2009 5:32:25 PM PST by OldEagle
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson