SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Booms, Busts, and Recoveries

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: TobagoJack who wrote (6665)8/4/2001 10:51:41 PM
From: Ilaine  Read Replies (2) of 74559
 
>>First they want to know who you are, place a diagramatic design on you, then they know where to come get you.<<

I am to math as illiterates are to reading, so you or DJ are going tell that this doesn't make any sense, but I was told by a former CIA encryption expert that the RSA public key encryption algorithm has a "hole" in it, and if you know the hole (the CIA does) then you can read stuff encrypted using that technology.

rsasecurity.com

His boss was the guy who designed the encryption system that is on the sculpture in front of the CIA headquarters at Langley.

washingtonpost.com

If they want you bad enough, they can find you. And if they want what you've got bad enough, they will just take it away from you. It's older than mankind, it's hardwired into the anatomy at the lowest level. The guy I know invented the software that his boss is selling, but he signed away his rights on the advice of his boss's lawyer, whose name is now on the patent. Doesn't make me feel a whole lot of trust. It could be the plot of a book, but watching the mammal get devoured by the dinosaur doesn't make that great of a plot.

gcn.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext