I wonder if Lemmy users are also on a watch list.

  • @AgreeableLandscapeOP
    link
    3
    edit-2
    4 years ago

    I’m no expert, but I’m pretty sure labeling something as mundane as Linux enthusiasts as extremist, most of whom are entirely innocent, is not a good way of tracking down actual extremists. You’re excessively expanding your search surface which will add a lot more noise than targets and actually make each search more difficult and time consuming. But who knows what their actual intentions are.

    • @k_o_tM
      link
      34 years ago

      You don’t really think NSA is actually trying to find actual extremists, do you?

    • DessalinesA
      link
      34 years ago

      I forget what that software was called, xkeyscore or something, where they can see your entire digital footprint in a centralized place. I don’t think they’re using it to solve murderers or anything, just find people who could potentially embarrass the US in the same way manning or snowden did.

      • @AgreeableLandscapeOP
        link
        14 years ago

        “The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power, pure power.” – George Orwell, 1984

        I will keep posting this quote because it is one of the most relevant things I’ve ever read.

    • @AgreeableLandscapeOP
      link
      2
      edit-2
      4 years ago

      I’m 95% sure SELinux has undiscovered spyware. It’s a front to get NSA code into libre projects. Are they still updating/maintaining it? If so it’s even harder to prove that it’s not malicious because any one commit could have obfuscated spyware.

        • @AgreeableLandscapeOP
          link
          1
          edit-2
          4 years ago

          We would need to audit the entire code base initially and then every commit afterward.

          Also, any account on GitHub or elsewhere could be a double agent from any country’s intelligence agency that wants to insert obfuscated spying code or a backdoor. All the security flaws found in software and hardware could just be honest mistakes, but they could also be intentionally placed there. It’s a terrifying prospect but it’s true.

            • @AgreeableLandscapeOP
              link
              14 years ago

              I want intelligence agents to keep their hands out of open source projects. There is a fundamental conflict of interest between the two.

    • @nutomicA
      link
      24 years ago

      I dont konw how you managed to post this in the wrong thread the same second I created the thread :o

        • @nutomicA
          link
          24 years ago

          What the hell, I saw your response over in this thread. Should have taken a screenshot, it looked like a normal top level reply. /u/dessalines this looks like some weird race condition on the frontend.

          • DessalinesA
            link
            24 years ago

            What happened? That thread is empty.

            • @nutomicA
              link
              14 years ago

              I know. I created the thread, and right after it finished loading and i saw it for the first time, it had that comment that I replied to.

          • DessalinesA
            link
            24 years ago

            Hrm…

            We have to come up with a way to replicate it. It probably has to do with the fact that new comments have multiple websocket sends: once to the user directly, and once to the post. I thought I had this filtered correctly but it might need some tweaking.

            • @nutomicA
              link
              14 years ago

              I’m almost certain it has something to do with the timing, probably because the thread and the comment were created in the same second or such.