Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v1hkoo$f7le$2@dont-email.me>
Deutsch   English   Français   Italiano  
<v1hkoo$f7le$2@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!feeds.phibee-telecom.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Wed, 8 May 2024 21:51:35 -0700
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <v1hkoo$f7le$2@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
 <v1hjbm$1nrp$2@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 09 May 2024 06:51:36 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="2ab1cbf92348a8ed74075118eecb5845";
	logging-data="499374"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/lCi+f9aCYjgVjD+OYVJWNnjYJj3p3WDU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:cq5/yuy/tzeMmJTqf1gIA/hmNTI=
Content-Language: en-US
In-Reply-To: <v1hjbm$1nrp$2@solani.org>
Bytes: 1877

On 5/8/2024 9:27 PM, Marco Moock wrote:
> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
> 
>> Backdoors.
>>
>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>> public channel.......
>>
>> ......backdoors are the least of their worries!
> 
> Isn't enough. There is a time when that message is unencrypted (e.g.
> when entering it to the crypto application). The operating system can
> then read the cleartext. If the backdoor is in the OS, X11 etc., it
> still works here.
> 

Go to a 100% "clean room", cloaked, cannot receive and/or send anything...

Encrypt a message on a clean thumb drive. Take out the clean disk with a 
single file on it. Destroy the computer... Exit the clean room. This 
disk contains an encrypted file.

Is it safe?