Sadly, I am not electrified enough to go snooping through extensive amounts of data looking for CITM,So I pulled my vpn from my router and put it on my hardened funtoo laptop. Initially, it worked fine.
then, it stopped working. Now, I swapped my configs and it runs again. Probably just a configuration
mismatch somewhere right?
so there will be no juicy reveal on information located in this machine. Recent events however, have shown me that
Problem Child does exist, is extensive, growing every day, and that there are few if any platforms truly resistant.
I am not at liberty to discuss how i know this or what I have experienced. Regardless, this socialist has become much
more rabid and libertarian when considering the concepts of self-determination and independent individual sovereignty.
The unabomber's concerns seems more lucid and sane with each passing moment, even as his solutions remain unacceptable.
Surely the NSA's involvement with SHA, AES, SELinux, and more is problematic?
Who if any of us has the time to conduct a comprehensive audit of the source code for current compiles of these libraries?
Heartbeat, Dual EC, and much, much more.. are they accidents? Intentionally shoddy code, written by longstanding part-time contributors to
core packages and programs, perhaps a slipstreamed modification to code enroute or uploaded to a repository, then pushed back
downstream to the system of the original coder, small modifications that would go unnoticed by busy and preoccupied people?
We can take this budgeted expenses story much further. Welcome to a future(let's say by 2020). Secret government
agencies conduct extensive attacks on library, application, and operating system distributors with the sole intent of compromising
their compile chain and inserting modified binaries at the point of release. Windows store apps compile in the cloud, customized for
your platform and even, possibly, to your specific machine? A lovely point of attack. And we paid for it. Paid for access to the source code
and hardware diagrams for every single component of every single appliance, physical or digital, that we could get our hands on.
Paid for training for our coders, to design the malicious libraries, for our engineers, to design the slightly modified PCI networking card
with a flash module that doesn't really reset when you upload new firmware, for our membership in ISO to silently compromise standards.
This is a reality we can look forward to. The internet of tomorrow, rampant with ubiquitous encryption, anonymized communications,
virtual currency, and an unsettling amount of uncontrolled information(the real free speech) shook up the law enforcement world of the 90s.
Now we have agencies on all levels cooperating to target and expose citizens so that they might not be suspected of having things to hide.
The forces responsible for these efforts are NOT novel and cannot be underestimated. From a philosophical perspective, which goes well
beyond reality into the world of nightmares, These forces largely do not represent protection but an immune system of sorts, seeking out everything
that is potentially hazardous to the body and destroying it. Paid for convictions equals paid to sniff and sniff and hunt and peck until they find
someone guilty of anything that can preserve their funding as necessary, and, eventually, conjoined with the forces that decide what is a crime
through the power of money, which is all-pervasive and controls everything.. except cRazy people like cryptostormers.
What I am saying is.. the things I have introduced in my rambling.. they are ONLY a matter of time. The system will and has continuously sought
to remove the privacy and individualism inherent to the human nature, to enforce and expand a conformity of sorts. We see a change and
we live in an era of change.
Temporarily, we can winThe system has not changed, it is merely adapting to a new environment.
battles in this ongoing war by evolving beyond the threat that the system presents. Are we ahead of it right now? Barely.