• 0 Posts
  • 156 Comments
Joined 2 years ago
cake
Cake day: August 6th, 2023

help-circle



  • Read the linked source FFS.

    Me: Provides evidence that in decades past last century they were paid for and did dirty work of British intelligence, at no point were the people responsible cast out, at no point was this influence purged and processes and organs put in place to prevent this

    Me: Also provides evidence they are in the bag as of the twenty-teens they were doing propaganda work for the British against Russia in coordination with the British state through cutouts

    You: um acktually do you have any proof they’re still doing that this month? No? Checkmate.

    Yeah it’s called a pattern of behavior. Why would they change? What would cause this? Sudden secret come to Jesus moment that fits your idealistic wants and needs in this particular argument? The burden of proof is on YOU and on THEM to show a sustained pattern of change. More than to show that but to admit, call out, and have a reckoning about their past behavior, bring it to the front, make everyone aware of it, apologize, and explain how they’re changing and what they’re specifically doing to prove this isn’t happening.

    Partnering with Tass in what way? As wire agencies? Carrying some of their stories? That’s proof of nothing. You think because some org that’s deep in with the intelligence apparatus of one state has some casual or professional cover level contact with a state media organ of a rival state that is proof of what? Impartiality? That they’re actually Russian spies using British intelligence?

    What I linked claims they agreed to use journalistic contacts within Russia to influence Russians and others within the CIS sphere for the interests and goals of the UK. If I was doing that I’d want contacts like that including contracts to carry out that work and legitimize my stories to my targets. I’d want to pretend to be friendly, professional and open while carrying out this work.

    The new leaks illustrate in alarming detail how Reuters and the BBC – two of the largest and most distinguished news organizations in the world – attempted to answer the British foreign ministry’s call for help in improving its “ability to respond and to promote our message across Russia,” and to “counter the Russian government’s narrative.” Among the UK FCO’s stated goals, according to the director of the CDMD, was to “weaken the Russian State’s influence on its near neighbours.”

    Reuters and the BBC solicited multimillion-dollar contracts to advance the British state’s interventionist aims, promising to cultivate Russian journalists through FCO-funded tours and training sessions, establish influence networks in and around Russia, and promote pro-NATO narratives in Russian-speaking regions.

    In several proposals to the British Foreign Office, Reuters boasted of a global influence network of 15,000 journalists and staff, including 400 inside Russia.


  • No.

    They are a British government and intelligence cut-out. That doesn’t mean they always lie but they skew coverage, are manipulative, dishonest, and serve the interests of the British state. They’ve been that way for decades, receiving funding in the 1960s and 1970s from MI6.

    https://thegrayzone.com/2021/02/20/reuters-bbc-uk-foreign-office-russian-media/

    A series of official documents declassified in January 2020 revealed that Reuters was secretly funded by the British government throughout the 1960s and 1970s to assist an anti-Soviet propaganda organization run by the MI6 intelligence agency. The UK government used the BBC as a pass-through to conceal payments to the news group.

    In the modern era they still target Russia under the direction and funding of the UK government. One cannot be in bed with spies like these and hope to hold them and their friends like the US, EU, etc to account.

    The fourth estate in general in the west is highly compromised. Russia and China and many others openly fund state media and the west decries it as propaganda, but they never hide it. Whereas the west secretly funds, manipulates, and controls supposedly independent press and declares itself the free one while it lies to the rest of the world and their own populations.

    As a wire agency Reuters does tend to have less room for deception than say Fox News due to a lot of short form news breaks. So in that regard they’re more trustworthy than say CNN or Fox News but that doesn’t mean a lot.



  • Three basic options exist:

    1. Burner: Take a device that isn’t a normally used device for each category. Make sure it has nothing you care about on it, no incriminating web history, no accounts logged in or saved as cookies that are incriminating, etc, etc. This is simplest, most expensive, but also most fool-proof against all possible threats.

    2. Wiped: Wipe the device before travel, possibly backing things up in the cloud to download after arriving. You’ll have to back up again with any changes you make and wipe again before traveling back then at your final destination again restore the device from backups. If you have serious fears of close inspection or forensic analysis then it would behoove you to use a secure erase feature on the drive and reinstall the OS rather than just trying to delete problematic files. For smartphones especially doing this and restoring from a cloud back-up can be pretty easy, for laptops it’s more of a pain.

    3. Mail ahead: Take the devices to a package service, UPS, FedEx, DHL, etc ahead of time, mail them ahead of or just behind you so they arrive just before or slightly after you. For this to work you need a fixed accommodation that can accept packages and which you trust to store them and give them to you. This technically doesn’t prevent mail interception but unless you’re a high value target that’s unlikely at present as its kind of a multi-agency intentional effort thing. Still I’d mail the device in a fully encrypted state.

    No other feasible options exist. You can encrypt yes and if you are a US citizen you cannot be denied re-entry (non-citizens can be not only denied entry but barred for years after for refusing to decrypt a device/cooperate) but they can seize your device and hold it for up to a year while trying to crack it and you’ll have to expend effort to get it back at the end of that period. They can also put you in a holding cell for hours or hypothetically up to a couple days if they really want to press it accuse you of something and be unpleasant during that time.


  • I need at least sheets that are thick enough not to let light through, not super thin sheets. It’s annoying in summer months. I need my feet covered because I’m paranoid about mosquitos though it’s rare for them to actually get inside and I need my head/eyes covered as well or it just doesn’t feel right, partly about light and muffling noise.

    And for me it’s definitely a horizontal sleeping thing too. Propped up I can fall asleep while being only partially covered or hardly at all but horizontal I have to have it.



  • If the UK is serious about blocking VPNs that don’t comply they’ll mostly succeed for the big ones. They’ll get them removed from app stores which will prevent most normies from finding and using them. They’ll apply network blocks to their entrance IP addresses (laughably easy, there are commercial vendors who sell data like this so they don’t even need to invent the wheel here) and make it difficult. They wouldn’t be able to prevent truly determined VPN providers from providing service but the days of $4/month for privacy/torrenting would be gone as the prices would likely be higher and you’d have to do things like mail cash.

    Beyond the known IPs, VPN traffic is fairly easy to flag with DPI solutions and could be detected and blocked or dropped by ISPs acting under the law. This could also be used to stop people running tunnels to hosted VPS solutions outside of the country or run by friends from their homes. There are obviously ways around these, disguising traffic, various techniques but for most people they’d give up and either stop browsing porn or cough up their ID. Of course this would create a dangerous state of affairs where anyone using a VPN without being KYC’ed is clearly a criminal, at the very least a suspected video pirate, at the most a dangerous child predator or terrorist.

    Additionally the UK isn’t like Russia or China, lots of western CEOs and employees pass through and within its jurisdictions and if a particular VPN is providing service without this they could try and arrest c-suite people or engineering staff associated with it and slam them with jail time. So that’s a problem.


  • then some wealthy business donor has a quiet word to them because businesses need VPNs to function

    A little credit here. They’d rephrase the law to only target VPNs whose purpose is offering as a service to the general public (as opposed to exclusively employees and contractors) the ability to connect to a private network with exit points / the ability to appear as if their traffic originates from outside of the UK.

    On a related matter they could also require know your customer for all VPNs, require all VPNs keep logs available on request for police inspection and those who don’t are banned. All companies keep extensive logs for corporate VPNs so this wouldn’t present any additional burden to private enterprise but would be the end of anonymous VPN services.

    I really don’t think this is more of the spectacle and move on. Not this time. I think Palestine has them spooked because they lost control of the narrative and the best way to seize control of the internet and clamp down on people conveying information they don’t like is starting with things like this.


  • No. It’s fine.

    Tor uses its own DNS system to my recollection. It’s true there is DNS as part of fingerprinting and DNS leaks are a concern for VPNs (see for example https://www.dnsleaktest.com/) but Tor is not vulnerable to this and it’s more a problem of you’re using a VPN to appear to be in NYC but your DNS shows Phoenix so that’s a big discrepancy that raises the uniqueness of your fingerprint on a VPN and even lets threat actors guesstimate where you actually are. As I said though this is not an issue on Tor.

    So understand that the DNS from Mullvad will only affect other programs not Tor. It will prevent say your ISP’s DNS from seeing your video games calling their domains that way. Your ISP can still see you’re connecting to infrastructure for as an example Genshin Impact when you launch the game because they can see where your traffic is flowing and the IP addresses as well as traffic patterns, ports, etc. It somewhat limits the data and visibility they get but there is something called SNI snooping as well as of course the fact they know the IP addresses where your connections go. So it’s perhaps better than nothing but understand the limits of it as they still have a lot of visibility though they shouldn’t be able to see your web searches regardless just that you’re accessing google or bing or duckduckgo as those sites use HTTPS.


  • Pretty easy honestly.

    You do something like remove section 230 (or whatever the EU equivalent is) that provides safe harbor from liability for transit providers like ISPs and content providers like websites that host user submitted content. You condition any safe harbor on the services in question being able to turn over and ID exactly who the offending person was without fail and tie any and every packet to a real world person. You make explicit that not being able to scrutinize content (because of encryption) is not an excuse. Thus someone pirating or sending CSAM over your network via a VPN makes you liable for not stopping them.

    As a result this forces ISPs to block all encrypted traffic detected via deep packet inspection. Only traffic encrypted with public key infrastructure that has government issued keys that allow snooping on it is allowed.

    Tada. There’s no way around this that doesn’t involve painstaking steganography which can possibly be nailed by AI anyways. Things like embedding a secret message in pictures you send with some pixels shifted to hide the data and your friend having a program and key that can decode it. Or things like taking all the capitalized letters and applying rot13 or something to them with some sort of algorithm but then you need to find a way to make the message intelligible on the surface as if you’re sending constant unintelligible messages you might get flagged and blocked or visited by the police (or the police get a warrant and have your mobile company deploy malware onto your devices and spy on you as a threat because of that).

    The only other alternative is using alternative infrastructure. HAM radio type network transmission via a series of hops with similar activists but this wouldn’t be practical for most given the expense and the bandwidth would be awful. Also probably illegal and if they wanted to it would be trivially easy to identify and arrest those running these nodes and relays due to triangulation.

    Turns out the whole liberal west with freedom of thought and speech was in fact a lie. Kept around to use as a stick to whack at the USSR with but now dropped at the first signs of serious popular discontent and trouble in favor of total control. Supposed values quickly dropped with no more excuse than “Russians” or “think of the children” or the usual criminals and terrorists.

    They can’t stop a really determined actor from engaging in encrypted messaging but they can stop 98% of the population and that’s more than enough to control thought and action of the population.



  • The billionaire tech class was created by the Internet and are actively damaging the world for their own personal gain.

    I hate to tell you but there were billionaires and multi-millionaires way before the internet and they were damaging the world horrendously for greed and personal gain. They even have this system structured around allowing them to do that called capitalism.

    So no the internet didn’t create that. Capitalism created that. Just as it created the climate change denial oil industry and the people who made money off of destroying the planet with that and would still be doing so without the internet. Just as it made dishonest press barons who loved Nazi Germany such as Randolph Hearst way before the internet existed and for a more modern example Rupert Murdoch. Just as before that it created incentives to hide and denial tobacco caused cancer or that asbestos caused cancer and other diseases or that lead poisoned us especially children. And on and on. Or the Triangle Shirt-waist fire and thousands of incidents just like that around the world where people are killed in poorly maintained factories kept that way out of greed. Or companies that pump poison into the water and air because it’s cheaper. I could go on forever.





  • This move makes sense if you plan on decoupling from China and accelerating global warming to destroy the rest of the world to enshrine your hegemony for the rest of this century and next by being one of the few livable, somewhat insulated places that can be a viable climate fortress.

    You need China to make things like solar with batteries viable. But if you know you’re going to war with them, decouple from them, etc you want to be on dirty things like coal you can just use entirely locally. All while helpfully poisoning those unnecessary workers you’re positive that AI and robotics will replace.