MRO wrote to All <=-
Don't you guys find it pathetic that there's a fucking ballon
floating in the usa and the military says they can't get it?
they've had skyhook since the 1950s. they couldn't grapple the
thing and pull it into a cargo plane?
like since 1950 they have been able to pluck one dude off the
ground into the air without stopping the plane.
a balloon or some planes crashing into buildings is impossible to
stop.
Don't you guys find it pathetic that there's a fucking ballon floating
in the usa and the military says they can't get it?
they've had skyhook since the 1950s. they couldn't grapple the thing and pu
like since 1950 they have been able to pluck one dude off the ground into th
a balloon or some planes crashing into buildings is impossible to stop.
If China has all these high tech satellites, why are they relying on a spy balloon? The Chinese look like idiots when they claim it's a weather balloon flown off course.
Re: fucking chinese balloon
By: Moondog to MRO on Fri Feb 03 2023 07:07 pm
If China has all these high tech satellites, why are they relying on a sp balloon? The Chinese look like idiots when they claim it's a weather balloon flown off course.
china says it's civilian. i doubt that.
i think they are testing us.
"Asked about the balloon, the Chinese foreign ministry said on Friday: "The
from its planned course."
A later statement from China's foreign ministry claimed that some politician
there is now a 2nd balloon going over latin america.
i thought were were getting a missle defense system like israel has.
i guess we dont have jack shit.
they've had skyhook since the 1950s. they couldn't grapple the thing and pull
t into a cargo plane?
they've had skyhook since the 1950s. they couldn't grapple the thing and pull
t into a cargo plane?
They were saying on the news that it was too high for an airplane to fly. Some have suggested they could hit it with smaller munitions so that it would fall slowly rather than crash, but to be accurate they probably have to be fired from near-range.
But, yeah, I have wondered, just as I have wondered why they didn't shoot
it down while it was over uninhabited areas of Montana or the Dakotas.
Last I heard, it was too late now... it is over areas with denser populations.
they've had skyhook since the 1950s. they couldn't grapple the thing and t into a cargo plane?
They were saying on the news that it was too high for an airplane to fly. Some have suggested they could hit it with smaller munitions so that it would fall slowly rather than crash, but to be accurate they probably have to be fired from near-range.
But, yeah, I have wondered, just as I have wondered why they didn't shoot
it down while it was over uninhabited areas of Montana or the Dakotas.
Last I heard, it was too late now... it is over areas with denser populations.
* SLMR 2.1a * This is a School-Free Drug Zone.
It's been shot down now. The balloon probably had parachutes like a weather balloon would (even thought it isn't )
But, yeah, I have wondered, just as I have wondered why they didn't shoot it down while it was over uninhabited areas of Montana or the Dakotas. Last I heard, it was too late now... it is over areas with denser populations.
It's been shot down now. The balloon probably had parachutes like a weather balloon would (even thought it isn't )
it transmitting data back to base, you'd not wait until it was finished
with its fly-over.
Now, if it was just to shoot it down to say you shot it down and to impress John Q. Public, that plan might work.
...it probably self destructed in some form when it went
down.
the chinese must have been pissing their pants laughing at us.
This shit wouldn't have happened with trump.
the chinese must have been pissing their pants laughing at us.
This shit wouldn't have happened with trump.
The media is rpeorting that several of these incidents occurred
during Trumps' reign - as if to suggest that the same type of
thing didn't occur during any other president's reign. Instead,
this type of incident is probably very common, except that the
military doesn't make it public front-page news to the average
citizen.
people are just so stupid.
some are convinced that shooting down the balloon was too hard.
some think it didn't collect any data because sattelites are better.
the chinese must have been pissing their pants laughing at us.
This shit wouldn't have happened with trump.
The media is rpeorting that several of these incidents occurred
during Trumps' reign - as if to suggest that the same type of
thing didn't occur during any other president's reign. Instead,
this type of incident is probably very common, except that the
military doesn't make it public front-page news to the average
citizen.
people are just so stupid.
some are convinced that shooting down the balloon was too hard.
some think it didn't collect any data because sattelites are better.
Some think that shooting it down might cause China to shoot down a plane.
I don't trust them, but I am sure even they know the difference between an unmanned balloon and a plane full of passengers when it comes to world opinion.
But, yeah, I have wondered, just as I have wondered why they didn't sho it down while it was over uninhabited areas of Montana or the Dakotas. Last I heard, it was too late now... it is over areas with denser populations.
It's been shot down now. The balloon probably had parachutes like a weath balloon would (even thought it isn't )
After it had already finished crossing the US. If the intent were to stop it transmitting data back to base, you'd not wait until it was finished
with its fly-over.
Now, if it was just to shoot it down to say you shot it down and to impress John Q. Public, that plan might work.
* SLMR 2.1a * Acid bath? You're soaking in it...
Re: fucking chinese balloon
By: Dumas Walker to MOONDOG on Sun Feb 05 2023 06:04 pm
it transmitting data back to base, you'd not wait until it was finished with its fly-over.
Now, if it was just to shoot it down to say you shot it down and to impre John Q. Public, that plan might work.
people are just so stupid.
some are convinced that shooting down the balloon was too hard.
some think it didn't collect any data because sattelites are better.
They wanted to listen and learn from the balloon. That is why they waited so long. All of it's tranmissions were intercepted.
MRO wrote to Moondog <=-
Re: fucking chinese balloon
By: Moondog to Dumas Walker on Mon Feb 06 2023 05:54 pm
They wanted to listen and learn from the balloon. That is why they waited so long. All of it's tranmissions were intercepted.
They could have took it down before it entered out airspace and
examined the unit.
Re: fucking chinese balloon
By: Moondog to Dumas Walker on Mon Feb 06 2023 05:54 pm
They wanted to listen and learn from the balloon. That is why they waite so long. All of it's tranmissions were intercepted.
They could have took it down before it entered out airspace and examined the
how were the transmissions intercepted?
why do you think that?
people are just so stupid.
some are convinced that shooting down the balloon was too hard.
some think it didn't collect any data because sattelites are better.
Some think that shooting it down might cause China to shoot down a plane. I don't trust them, but I am sure even they know the difference between an unmanned balloon and a plane full of passengers when it comes to world opinion.
i dont think they would give a shit if we shot down one of their balloons.
if something goes in a country's airspace that's free game.
broadcast.
The CIA has the crypto abilities to crack any encryption
Any time something foreign comes close to the US, the CIA is going to want to analyze how it works and what it reports back. During the cold war the Soviets would tail the US fleets with fishing trawlers covered in antennas. The US knew they were tailing them, and listened to anything they broadcasted. While the ballon is in the air, the CIA had the ability to liste n to it.
The equipment under the ballon broadcast radio frequencies. I'm not an RF guy but if a signal is broadcast, it can be picked up. Agencies such as the CIA and NSA could scan the entire RF spectrum and detect what is being broadcast.
The CIA has the crypto abilities to crack any encryption
The CIA has the crypto abilities to crack any encryption
Any time something foreign comes close to the US, the CIA is going to want to analyze how it works and what it reports back. During the cold war the Soviets would tail the US fleets with fishing trawlers covered in antennas. The US knew they were tailing them, and listened to anything they broadcasted. While the ballon is in the air, the CIA had the ability to liste n to it.
Quoting Dumas Walker to Mro <=-
plane. I don't trust them, but I am sure even they know the difference between an unmanned balloon and a plane full of passengers when it
comes to world opinion.
Quoting Moondog to Dumas Walker <=-
Re: fucking chinese balloon
By: Dumas Walker to MOONDOG on Sun Feb 05 2023 06:04 pm
They wanted to listen and learn from the balloon. That is why they
waited so long. All of it's tranmissions were intercepted.
Quoting Daitengu to Moondog <=-
No, the CIA does not have the ability to crack "any encryption".
wait, you're being serious, aren't you?
HAHHAHAHAHAHAHHAHAAH
No, the CIA does not have the ability to crack "any encryption".
MRO wrote to DaiTengu <=-
Re: fucking chinese balloon
By: DaiTengu to Moondog on Tue Feb 07 2023 06:10 pm
wait, you're being serious, aren't you?
HAHHAHAHAHAHAHHAHAAH
No, the CIA does not have the ability to crack "any encryption".
i'm pretty sure most decryption they do now is via backdoors in
the protocols that they are given by the developers.
i'm pretty sure most decryption they do now is via backdoors in the protocols that they are given by the developers.
No, the CIA does not have the ability to crack "any encryption".
Wait, you mean we've been lied to? It makes me question everything
we've heard or read...
Hah!
Re: fucking chinese balloon
By: MRO to DaiTengu on Tue Feb 07 2023 10:24 pm
i'm pretty sure most decryption they do now is via backdoors in the protocols that they are given by the developers.
the vast majority of encryption protocols in use these days are open source
DaiTengu
...Ignorance is no excuse-it's the real thing.
---
þ Synchronet þ War Ensemble BBS - The sport is war, total war - warensemble
Re: fucking chinese balloon
By: MRO to DaiTengu on Tue Feb 07 2023 10:24 pm
i'm pretty sure most decryption they do now is via backdoors in the protocols that they are given by the developers.
the vast majority of encryption protocols in use these days are open source, so a backdoor would have been spotted a long, long time ago.
Re: fucking chinese balloon
By: Moondog to MRO on Tue Feb 07 2023 02:48 pm
broadcast.
The CIA has the crypto abilities to crack any encryption
Any time something foreign comes close to the US, the CIA is going to wan to analyze how it works and what it reports back. During the cold war t Soviets would tail the US fleets with fishing trawlers covered in antenna The US knew they were tailing them, and listened to anything they broadcasted. While the ballon is in the air, the CIA had the ability to liste n to it.
yeah but the balloon was floating coast to coast with and i don't think ther
Re: fucking chinese balloon
By: Moondog to MRO on Tue Feb 07 2023 02:48 pm
The equipment under the ballon broadcast radio frequencies. I'm not an guy but if a signal is broadcast, it can be picked up. Agencies such as the CIA and NSA could scan the entire RF spectrum and detect what is be broadcast.
This is true, it's not that difficult to figure out what frequency somethi
The CIA has the crypto abilities to crack any encryption
Right, and the president has a direct line to the military that guards the
wait, you're being serious, aren't you?
HAHHAHAHAHAHAHHAHAAH
No, the CIA does not have the ability to crack "any encryption".
DaiTengu
...Among economists, the real world is considered to be a special case.
Re: fucking chinese balloon
By: Moondog to MRO on Tue Feb 07 2023 02:48 pm
The CIA has the crypto abilities to crack any encryption
Any time something foreign comes close to the US, the CIA is going to w to analyze how it works and what it reports back. During the cold war t Soviets would tail the US fleets with fishing trawlers covered in antennas. The US knew they were tailing them, and listened to anything they broadcasted. While the ballon is in the air, the CIA had the abili to liste n to it.
Oh yeah, and I forgot one other thing -
The CIA isn't authorized to operate independently on US soil. It would lik
DaiTengu
...Never try to out-stubborn a cat.
Quoting Moondog to Dumas Walker <=-
Re: fucking chinese balloon
By: Dumas Walker to MOONDOG on Sun Feb 05 2023 06:04 pm
They wanted to listen and learn from the balloon. That is why they waited so long. All of it's tranmissions were intercepted.
Ever the optimist! :)
Military intelligence...
Cougar
... Open mouth, insert foot, echo internationally.
___ Blue Wave/QWK v2.20
You don't have to follow it with a car. The balloon will fly within range of
statinary listening posts. If they were sending data back to China, the sgnal would be easy to pick up once it was identified.
The ballon wasn't on US soil. It was 12.5 miles above the US. It is communication with peopel outside the US, so it would CIA and NSA territory (outside the US and foriegn tranmissions.)
Quoting Daitengu to Cougar428 <=-
Re: fucking chinese balloon
By: Cougar428 to DAITENGU on Tue Feb 07 2023 11:01 pm
No, the CIA does not have the ability to crack "any encryption".
Wait, you mean we've been lied to? It makes me question everything
we've heard or read...
Hah!
who told you the CIA could crack any encryption? the CIA/FBI/etc. certainly wouldn't make that claim.
Heck, even if they COULD crack some kind of popular encryption, they'd probably keep themselves extremely tight-lipped about it so that
people didn't move to something they couldn't exploit.
the vast majority of encryption
protocols in use these days are open
source, so a backdoor would have bee
spotted a long, long time ago.
who told you the CIA could crack any encryption? the CIA/FBI/etc. certainly wouldn't make that claim.
the vast majority of encryption
protocols in use these days are open
source, so a backdoor would have bee
spotted a long, long time ago.
Most of that stuff these days uses
pubilc/private key pairs. You very much
could make an algorithm with a "master
key" that is undetectable just looking
at the code.
key" that is undetectable just looking
at the code.
But I would imaging that it is hard to hide the functionality
of "master key" in open-source code.
Re: fucking chinese balloon
By: Ogg to Phigan on Sat Feb 11 2023 08:41 am
key" that is undetectable just looking
at the code.
But I would imaging that it is hard to hide the functionality
of "master key" in open-source code.
dude, opensource has been a security risk since it's been open source.
heartbleed
But I would imaging that it is hard to hide the functionality
of "master key" in open-source code.
dude, opensource has been a security risk since it's been open source.
heartbleed
Open source is *more* secure than closed. The Heartbleed vulnerability was discovered and fixed *because* it was open source.
Open source doesn't mean *anyone* can make changes (e.g. adding bugs or intentional vulnerabilities) - but it does mean that *anyone* can thoroughly analyze the source code and report issues and even suggest fixes.
dude, opensource has been a security risk since it's been open source.
heartbleed
dude, opensource has been a security risk since it's been open source.
heartbleed
Open source is *more* secure than closed. The Heartbleed vulnerability was discovered and fixed *because* it was open source.
Open source doesn't mean *anyone* can make changes (e.g. adding bugs or intentional vulnerabilities) - but it does mean that *anyone* can thoroughly analyze the source code and report issues and even suggest fixes.
heartbleed was introduced in the openssl lib in 2012. it was discovered and fixed in 2014. there's still unpatched systems on the internet.
is that any better than closed source?
I'm sure closed sourced programs have
their exploits fixed in a comparable time.
Or they don't get fixed because they're not disclosed. There's really no way to know for sure. But with open source, you can know for sure.
Re: fucking chinese balloon
By: Digital Man to MRO on Sat Feb 11 2023 06:44 pm
Or they don't get fixed because they're not disclosed. There's really no way to know for sure. But with open source, you can know for sure.
You only know for sure if someone catches it. And in the past that's been demonstrated to be years. 2 years is a long time (in heartbleed's case).
Heartbleed was known about for 2 years and exploited by the NSA.
I'm just using heartbleed as an example because that's the only one i followed because it affected me because I was running server software.
The best way to hide something is out in the open. With any opensource project someone can add dangerous code and it can be overlooked. Even with extensive apparent oversight it's happened.
The best way to hide something is out in the open. With any opensource project someone can add dangerous code and it can be overlooked. Even with extensive apparent oversight it's happened.
And someone can not add dangerous code that's overlooked to close source code? Of course they can, except you have a lot fewer eyes and tools to can
find and fix the issues.
Re: fucking chinese balloon
By: Digital Man to MRO on Sat Feb 11 2023 08:57 pm
The best way to hide something is out in the open. With any opensource project someone can add dangerous code and it can be overlooked. Even with extensive apparent oversight it's happened.
And someone can not add dangerous code that's overlooked to close source code? Of course they can, except you have a lot fewer eyes and tools to can
find and fix the issues.
my point is there's a false sense of security in open source software.
I think in the end, it's a wash. I think closed source and open source might be on the same level. Possibly, even closed source is safer.
is that any better than closed source? I'm sure closed sourced programs have t
ir exploits fixed in a comparable time.
my point is there's a false sense of security in open source software.
MRO wrote to Ogg <=-
key" that is undetectable just looking
at the code.
But I would imaging that it is hard to hide the functionality
of "master key" in open-source code.
dude, opensource has been a security risk since it's been open
source.
But I would imaging that it is hard to hide the functionality
of "master key" in open-source code.
dude, opensource has been a security risk since it's been open
source.
ok, you guys think its so easy to upload a virus to a linux distro,it's open-source, he thought anyone could go in and put malware in it. And he said he trusted Windows more because Windows is made by a small group of people who are paid to develop it, so they have a vesteddude, opensource has been a security risk since it's been open
source.
interest in making sure it works well and is secure.
is that any better than closed source? I'm sure closed sourced programs have t
ir exploits fixed in a comparable time.
Maybe but, with fewer eyes on it, potentially exploitable code can languish in a project for years before someone finds the hole and takes advantage.
ok, you guys think its so easy to upload a virus to a linux distro,it's open-source, he thought anyone could go in and put malware in it. And he said he trusted Windows more because Windows is made by a small group of people who are paid to develop it, so they have a vested interest in making sure it works well and is secure.dude, opensource has been a security risk since it's been open
source.
then go ahead and upload one...
John H. Guillory
call sign KF5QEO
URL: kf5qeo.servebbs.net
KF5QEO's Shack BBS
my point is there's a false sense of security in open source software.
If you believe it is 100% safe then, yes, that is correct and, yes, I have met some people who think that is true.
dude, opensource has been a security risk since it's been open
source.
Years ago, I was looking for a job and I had a job interview at one company where the interviewer asked what I thought about Linux. I've always had a mostly positive view of Linux. He said he thought Linux was basically inherently something you couldn't trust because, since it's open-source, he thought anyone could go in and put malware in it.
Nightfox wrote to Gamgee <=-
Re: Re: fucking chinese balloon
By: Gamgee to MRO on Sun Feb 12 2023 09:09 am
But I would imaging that it is hard to hide the functionality
of "master key" in open-source code.
dude, opensource has been a security risk since it's been open
source.
Years ago, I was looking for a job and I had a job interview at
one company where the interviewer asked what I thought about
Linux. I've always had a mostly positive view of Linux. He said
he thought Linux was basically inherently something you couldn't
trust because, since it's open-source, he thought anyone could go
in and put malware in it. And he said he trusted Windows more
because Windows is made by a small group of people who are paid
to develop it, so they have a vested interest in making sure it
works well and is secure.
MRO wrote to Dumas Walker <=-
I think a large amount of people who say they like opensource
because it's so secure due to public scrutiny believe it's 100%
safe deep down.
Like I said, the easiest place to hide something is out in the
open.
dude, opensource has been a security risk since it's been open
source.
it's open-source, he thought anyone could go in and put malware in
it. And he said he trusted Windows more because Windows is made by a
small group of people who are paid to develop it, so they have a
vested interest in making sure it works well and is secure.
ok, you guys think its so easy to upload a virus to a linux distro,
then go ahead and upload one...
Years ago, I was looking for a job and I had a job interview at
one company where the interviewer asked what I thought about
Linux. I've always had a mostly positive view of Linux. He said
he thought Linux was basically inherently something you couldn't
trust because, since it's open-source, he thought anyone could go
in and put malware in it. And he said he trusted Windows more
because Windows is made by a small group of people who are paid
to develop it, so they have a vested interest in making sure it
works well and is secure.
<GRIN>
I'm thinking (hoping?) that maybe you didn't take that job... ;-)
ok, you guys think its so easy to upload a virus to a linux distro, then go ahead and upload one...
I wasn't saying it was - I was talking about someone who interviewed me for a job once. I disagree with that.
dude, opensource has been a security risk since it's been open
source.
Years ago, I was looking for a job and I had a job interview at one company where the interviewer asked what I thought about Linux. I've always had a mostly positive view of Linux. He said he thought Linux was basically inherently something you couldn't trust because, since it's open-source, he thought anyone could go in and put malware in it. And he said he trusted Windows more because Windows is made by a small group of people who are paid to develop it, so they have a vested interest in making sure it works well and is secure.
group of people who are paid to develop it, so they have a vested interest in making sure it works well and is secure.
It turns out, MRO was that interviewer.
DaiTengu
But I would imaging that it is hard
hide the functionality
of "master key" in open-source code.
Sysop: | Gary Ailes |
---|---|
Location: | Pittsburgh, PA |
Users: | 132 |
Nodes: | 5 (0 / 5) |
Uptime: | 109:37:59 |
Calls: | 733 |
Files: | 2,171 |
Messages: | 81,483 |