Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 06/11/2013 11:48:05 AM PDT by Nachum
[ Post Reply | Private Reply | View Replies ]


To: Nachum

The #1 use for Skype is video sex.

Thus Obama has the blackmail goods on a WHOLE lotta people


2 posted on 06/11/2013 11:52:03 AM PDT by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

Unplug it and throw it in the lake.


3 posted on 06/11/2013 11:52:52 AM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum; a fool in paradise

Disconnect from the internet, which is what I’ve done.


4 posted on 06/11/2013 11:53:28 AM PDT by Revolting cat! (Bad things are wrong! Ice cream is delicious!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum
Wrap it up!


5 posted on 06/11/2013 11:54:55 AM PDT by Revolting cat! (Bad things are wrong! Ice cream is delicious!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

TOR over commercial VPN.


6 posted on 06/11/2013 11:55:32 AM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum
Is this something that should be encouraged to fight domestic terrorism, or is this sort of government intrusion something that should be deeply distrusted?

When any objection to a government program or action is likely to be considered an act of domestic terror (the regime is terrified that we will come to our senses and remove them), you bet it should be distrusted!

7 posted on 06/11/2013 11:55:38 AM PDT by JimRed (Excise the cancer before it kills us; feed &water the Tree of Liberty! TERM LIMITS, NOW & FOREVER!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

I’m wondering if they have a back door in all the firewalls and anti-virus software out there. I am sure there are some freepers who would be well informed on this.


8 posted on 06/11/2013 11:56:10 AM PDT by Principle Over Politics (Is this a free country or what?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

9 posted on 06/11/2013 11:56:43 AM PDT by COBOL2Java (Fighting Obama without Boehner & McConnell is like going deer hunting without your accordion)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

10 posted on 06/11/2013 11:57:12 AM PDT by Sopater (Is it not lawful for me to do what I will with mine own? - Matthew 20:15a)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

If someone here can tell me how to improve the speed of TOR, I’d appreciate it.


11 posted on 06/11/2013 11:57:17 AM PDT by GeorgeWashingtonsGhost
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

13 posted on 06/11/2013 11:58:08 AM PDT by COBOL2Java (Fighting Obama without Boehner & McConnell is like going deer hunting without your accordion)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

14 posted on 06/11/2013 11:58:48 AM PDT by Utah Binger (Southern Utah where the world comes to see America)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

If you connect to the Internet they have you. There’s nothing you can do to stop them. They don’t even have to get into your computer. They’re piped straight into the servers. Anything that comes to you or you send to anywhere has to go past their listening programs.
They are reading this right now!


16 posted on 06/11/2013 11:59:54 AM PDT by servo1969
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

Unplug it.

As a software developer I have lamented to all about this cloud nonsense for years. No matter what you do, if you do not have physical control of your data it is not secure, period! Nothing will prevent a hacker or a lapse in simple security (like leaving a laptop laying around) from getting your data.


17 posted on 06/11/2013 12:01:51 PM PDT by Resolute Conservative
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

Any computer connected to a network is subject to being compromised.

As for encrypting email? That’s pointless as the NSA has a budget to crack encryptions and they’ll spend billions to break encryptions while most people spend a few bucks to nothing at all (open source) to buy encryption.

The one-time cipher pad is still the single most reliable way to defeat spies. Book ciphers are simple and easy to use and are practically impenetrable especially if you use obscure books as your reference.


19 posted on 06/11/2013 12:02:01 PM PDT by MeganC (You can take my gun when you can grab it with your cold, dead fingers.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

Bookmarked.


27 posted on 06/11/2013 12:08:21 PM PDT by Navy Patriot (Join the Democrats, it's not Fascism when WE do it, and the Constitution and law mean what WE say.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

52 posted on 06/11/2013 3:08:19 PM PDT by hawkboy
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson