Linked by Thom Holwerda on Tue 23rd Oct 2012 18:24 UTC, submitted by Jane Doe
Privacy, Security, Encryption "Last week, the Dutch Minister of Safety and Justice asked the Parliament of the Netherlands to pass a law allowing police to obtain warrants to do the following: install malware on targets’ private computers, conduct remote searches on local and foreign computers to collect evidence, and delete data on remote computers in order to disable the accessibility of 'illegal files'. Requesting assistance from the country where the targetted computer(s) were located would be 'preferred' but possibly not required. These proposals are alarming, could have extremely problematic consequences, and may violate European human rights law." You get true net neutrality with one hand, but this idiocy with another. This reminds me a lot of how some of our busy intersections are designed; by people who bike to city hall all their lives and have no clue what it's like to drive a car across their pretty but extremely confusing and hence dangerous intersections.
Thread beginning with comment 539718
To read all comments associated with this story, please click here.
Comment by MOS6510
by MOS6510 on Tue 23rd Oct 2012 18:30 UTC
MOS6510
Member since:
2011-05-12

Thom, just boot in to BeOS. That will have them scratching their heads for a while trying to figure out why their hack tool doesn't work on your computer.

Reply Score: 6

RE: Comment by MOS6510
by Yehppael on Tue 23rd Oct 2012 18:56 in reply to "Comment by MOS6510"
Yehppael Member since:
2012-08-01

Some people consider Linux & company to be hacker tools, so instead, run Windows in a virtual machine, and redirect everything from port 22 to it.

Reply Parent Score: 2

RE[2]: Comment by MOS6510
by Alfman on Tue 23rd Oct 2012 19:52 in reply to "RE: Comment by MOS6510"
Alfman Member since:
2011-01-28

If I were a government entity, I'd research ways to break into ordinary computers through the channels manufacturers grant themselves access to, such as OS update mechanisms (which work independently of any inbound firewall techniques, and updates are ostensibly legitimate to an administrator).

How likely is it that no governments have infiltrated the ranks of apple, microsoft, google, ubuntu, etc to copy their signing keys?


Consider that allegedly microsoft implanted a security key to have windows validate NSA signatures:
http://www.darkgovernment.com/news/remembering-the-nsakey/

Edited 2012-10-23 19:53 UTC

Reply Parent Score: 2

RE: Comment by MOS6510
by some1 on Tue 23rd Oct 2012 19:19 in reply to "Comment by MOS6510"
some1 Member since:
2010-10-05

They can always pass a law to disallow incompatible operating systems and other hacking tools.

Reply Parent Score: 2