Skip to content

The weaponization of Waymo

Technology
26 19 24
  • FairPhone AMA

    Technology technology
    5
    14 Stimmen
    5 Beiträge
    13 Aufrufe
    alcan@lemmy.worldA
    Ask Me Anything
  • 350 Stimmen
    72 Beiträge
    84 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • 1 Stimmen
    2 Beiträge
    4 Aufrufe
    X
    How many times is this putz going to post this article under new titles before they are banned?
  • 0 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • 74 Stimmen
    13 Beiträge
    44 Aufrufe
    B
    This appears to just be a compilation of other leaks: https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/ Still not a bad idea to change passwords and make sure MFA is enabled.
  • 137 Stimmen
    41 Beiträge
    114 Aufrufe
    R
    And I think you swallowed one too many Apple ads.
  • 46 Stimmen
    35 Beiträge
    104 Aufrufe
    M
    You guys sure display a crazy obsession with "Apple Fanboys" in this sub… The amount of Applephobia… Phew! As if the new release had you all flustered or something… Gotta take a bite and taste the Apple at some point! Can’t stay in the closet forever, ya know?
  • 342 Stimmen
    43 Beiträge
    119 Aufrufe
    G
    highly recommend using containerized torrents through a VPN. I have transmission and openvpn containers. when the network goes down transmission can't connect since it's networked through the ovpn container. once the vpn is restored, everything restarts and resumes where it left off. ever since I've had this setup running, I haven't had a nastygram sent to me.