Puppy Linux Discussion Forum Forum Index Puppy Linux Discussion Forum
Puppy HOME page : puppylinux.com
"THE" alternative forum : puppylinux.info
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

The time now is Sat 20 Sep 2014, 03:59
All times are UTC - 4
 Forum index » Off-Topic Area » Security
NSA "helped" MS design Windows 7... do they help Linux too?
Post new topic   Reply to topic View previous topic :: View next topic
Page 2 of 3 [31 Posts]   Goto page: Previous 1, 2, 3 Next
Author Message
TheAsterisk!


Joined: 10 Feb 2009
Posts: 403
Location: SE Wisconsin, US

PostPosted: Sat 27 Feb 2010, 11:46    Post subject:  

Quote:
Wow! Where have you been? Patents WERE issued years ago and ARE being enforced against farmers across the world - see 2004 patent infringement paper

Perhaps I am mistaken, but as I understand it, patents are commonly used for the seeds and plants themselves, but I'm talking about patented genes specifically, as they would spread more easily than whole seed or plants.

As is- assuming the law is actually followed, of course- someone has to unwisely agree to Monsanto's TUA and then contractually backs themselves into a corner, but if genes themselves were patented, and a GM population were to crossbreed with another population, the patented genes could then end up in crop or livestock populations whose owner never agreed to use the patented genes but could still be sued for royalties at all stages of production. At least with seeds floating in, you could ideally remove those troublesome seeds and plants, but if patented genes make their way into a population, you're screwed until the patent expires, which could take a decade or two, or you'd have to completely kill off that particular, compromised population.

If I'm still missing something, tell me, but I think we're talking about different applications of poor patents.


It's kind of a neat idea for a bad sci-fi novel though, isn't it? Genetically engineer incredibly fertile plants, perhaps ones closely related to popular crops, allowing your patented genes to spread all over the place, and then, a few years down the road, start tossing lawsuits left and right.
If only I could work in a gunfight somewhere...
Back to top
View user's profile Send private message Visit poster's website 
Aitch


Joined: 04 Apr 2007
Posts: 6825
Location: Chatham, Kent, UK

PostPosted: Sat 27 Feb 2010, 12:28    Post subject:  

What I'd like to know is, when was god in court answering if he has released or relinquished his eternal patent on the original seed for monsanto to claim they created it

Now there's a real patent infringement!! Wink

In the beginning was the word CGTA * patent god.inc Very Happy

Aitch Smile
Back to top
View user's profile Send private message 
Caneri

Joined: 04 Sep 2007
Posts: 1580
Location: Canada

PostPosted: Sat 27 Feb 2010, 13:11    Post subject:  

@benali72
Well it looks like I may have hijacked your thread but GMO and gov surveillance may be closely related.

@TheAsterisk!
Quote:
but if genes themselves were patented, and a GM population were to crossbreed with another population, the patented genes could then end up in crop or livestock populations whose owner never agreed to use the patented genes


This is exactly what has happened. Farmers in the Canadian west are being sued for patent infringmennt without ever planting GMO soy beans,canola and whatever.

This is also happening world wide and Monsanto's aggressive litigious attitude is destroying small farmers and entire communities. These things are not a "what if" as they are real and spreading....ta ta to freedom of food.

As well you may notice where retired politicians end up....mostly on the board of directors/law firms of these very same corporations.
The corporations have spent enough money fighting the US health bill that they could have paid for 10 million people's yearly billing for health care...go figure....and do they use surveillance courtesy of NSA to keep tabs on a citizens health status...I wonder.

Eric

_________________
Be not afraid to grow slowly, only be afraid of standing still.
Chinese Proverb

Back to top
View user's profile Send private message 
Sit Heel Speak


Joined: 30 Mar 2006
Posts: 2595
Location: downwind

PostPosted: Sat 27 Feb 2010, 15:35    Post subject:  

Caneri wrote:
This is exactly what has happened. Farmers in the Canadian west are being sued for patent infringement without ever planting GMO soy beans,canola and whatever.
The best known case of Monsanto's abuse of the criminal justice system is Percy Schmeisser, canola farmer in Saskatchewan, chronicled in The Future of Food. A must-see.

Here is an example of a hole in SELinux. So much for the watchful eyes of all the king's horses and men. Down in the comments, Linus Torvalds is reported as saying that this is not a kernel issue, but rather a compiler issue. And he is right; the gcc compiler *has* been patched to fix it, but this has led to a conflict with libc.so.6 version 2.10 (which Puppies 4.3.n are built around), see here. In order to build the newest hal-less dbus+udev, and full gnome 2.29, on my heavily-modified (2.5 gigabytes, at the moment--still whittling it down) upup, I have found it necessary to use an extravagantly-patched gcc 4.4.3, or the compile fails on all those "invalid conversion" errors.
Back to top
View user's profile Send private message 
nooby

Joined: 29 Jun 2008
Posts: 10557
Location: SwedenEurope

PostPosted: Sun 28 Feb 2010, 11:56    Post subject:  

I have not read the thread after my latest post.

Here is a link to some evidence

Quote:

Global Criminal Compliance Handbook


http://cryptome.org/

_________________
I use Google Search on Puppy Forum
not an ideal solution though
Back to top
View user's profile Send private message 
Lobster
Official Crustacean


Joined: 04 May 2005
Posts: 15117
Location: Paradox Realm

PostPosted: Sun 28 Feb 2010, 12:32    Post subject:  

Quote:
I have found it necessary to use an extravagantly-patched gcc 4.4.3


Many thanks for keeping us informed.
What can be done with these exploits and what should Puppy be doing?

Some interesting forces at work.

Part of the push to Cloud computing will be on how secure it is.
In fact data will be open to those with access to the major servers.

Personally I won't be running OpenBSD for a level of security I don't need.
Or using any of these tips (some are quite fun)
http://blogs.techrepublic.com.com/10things/?p=359

However one day my secret stock of sardines
might need protecting . . . Smile

Puppy Linux
Vigilant

_________________
Puppy WIKI
Back to top
View user's profile Send private message Visit poster's website 
Sit Heel Speak


Joined: 30 Mar 2006
Posts: 2595
Location: downwind

PostPosted: Sun 28 Feb 2010, 17:21    Post subject:  

Quote:
What can be done with these exploits and what should Puppy be doing?
Dunno. Within the 238 separate modules in the gnome build sequence there are hundreds, perhaps even thousands, of these "invalid conversions," though, I noticed, the number was decreasing every time I built gnome (about eight times; it takes a week each time)...I presume because jhbuild is constantly comparing the local codebase with fresh source from git, and knowledge of proper coding practice for gcc-4.4+libc.so.6-2.10 is still steadily percolating into the individual coding repertoires of the gnome-module developer community. I was not watching the make on every single module for instances of an invalid conversion, because, on most of the modules, the compile breezes right through. On a few, -Werror is set, so the compile halts, but on most of these, manually editing the makefile to remove the -Werror switch is all it takes to get the compile to finish.

The first module in the gnome build sequence on which removing -Werror does not work to get the compile to succeed, is perl-net-dbus, followed in rapid succession by a cluster of non-finishers. This roadblock was what goaded me to google around, and presently chance upon the two posts linked above.

But it's really over my head at this point. Are all these instances of "invalid conversion" just innocent mistakes, i.e. never ascribe to Tonya Harding what is sufficiently explained by Lindsey Lohan, or is gnome in reality a hidden-in-plain-sight spooks' banquet of backdoor invocation opportunities? To answer that question, one would need to trace back every instance of a wrongly-returned constant type. Something which I am not quite qualified for, nor do I have the time.

The author of the second post cited above, probably knows the answer. The author of the 20100211 lookaside cache patch-set to Fedora gcc-4.4.3, probably could tell you, too. And probably a thousand others.

Not being so expert, I exercize caution. I don't Facebook, I don't Twitter, I only rarely Skype, I bank face-to-face with a live banker at my local credit union. Except for purchasing gasoline I do not use credit cards, only debit, and keep the account balances small. I keep my shrine to Bellatrix LeStrange, my Paul McCartney brownie recipes, and that map I won at poker from Mel Fisher, all on encrypted sticks. My addresses, passwords, and phone numbers are all still in a leather-bound pocket notebook given me by my grandma, thirty-eight years ago.
Back to top
View user's profile Send private message 
Aitch


Joined: 04 Apr 2007
Posts: 6825
Location: Chatham, Kent, UK

PostPosted: Mon 01 Mar 2010, 00:41    Post subject:  

For those who stayed focused on the 'how to secure my puppy box', I suggest looking, even if only briefly, at the NSA's 'lawful spying' data html & pdf's on the link provided by nooby

Spot on, nooby Very Happy

Example: Lawful Intercepts, attached

Amplifies my information on many unreferenced suspicions, thanks

Aitch Smile
lawful intercepts.jpg
Description 
jpg

 Download 
Filename  lawful intercepts.jpg 
Filesize  188.9 KB 
Downloaded  357 Time(s) 
Back to top
View user's profile Send private message 
Lobster
Official Crustacean


Joined: 04 May 2005
Posts: 15117
Location: Paradox Realm

PostPosted: Mon 01 Mar 2010, 01:56    Post subject:  

Quote:
Not being so expert, I exercize caution.

A valid approach. I throw caution to the wind, use twitter, order things online and generally use all the services available.
Being hacked would be a form of social interactions for me Smile

Quote:
I keep my shrine to Bellatrix LeStrange

Secret 'Death Eater' eh?
I keep my muggle shrine here . . .
http://tmxxine.com/s4/

Maybe we can create some Puppy 'honey pot'
servers open for our erstwhile spooks, hackers
and malware practitioners?

_________________
Puppy WIKI
Back to top
View user's profile Send private message Visit poster's website 
Sit Heel Speak


Joined: 30 Mar 2006
Posts: 2595
Location: downwind

PostPosted: Mon 01 Mar 2010, 02:31    Post subject:  

Quote:
...Secret 'Death Eater' eh?
Heh...just the first example that popped into mind. Yesterday I happened to see this photo gallery on the actress who plays her, Helena Carter. Just before posting that...I had woken up from a nap...from a dream, just before waking. I was in a small office; actresses were being sent in to me, one at a time, to read an audition line. Four or five walked in, they were only so-so, and then the last one was Ms. Carter in her wig and glasses. She stood all straight and jiggly, put her left wrist to her forehead palm out, looked up and to the left, and in a voluptuous comic despair belted out:

Apocalyse, calamity, and collapse!
Glibbon, oh glibbon, and glibbon again!

...and then I woke up. The most embarrassing part of this is, "glibbon" is not a real word. Although I see that someone has tried to pass it off as a Scrabble word meaning "a smart-assed primate."
Back to top
View user's profile Send private message 
Aitch


Joined: 04 Apr 2007
Posts: 6825
Location: Chatham, Kent, UK

PostPosted: Mon 01 Mar 2010, 10:45    Post subject:  

LOL Great dream, SHS

Haven't had one that good in ages Wink

Aitch Smile
Back to top
View user's profile Send private message 
out_fisherman

Joined: 06 Oct 2009
Posts: 17

PostPosted: Thu 04 Mar 2010, 20:38    Post subject: Yeg, well,,,,,  

Back long ago, I worked for a company that made
"supercomputers", as they were called then. Some of
us on the test floor wondered what the Govt. could
possibly want with all this computer power. Then in the
early '90s I learned of a program called the 'eschelon
project' - a joint venture between the US, UK, and Australia
to intercept, 'listen to', and flag (based on software) any
transmission containing certain 'code-words', like 'bomb;,
'anthrax', etc. Given the secrecy used to ship these systems,
I came to believe it.......there were times we actually had
2 trucks leave the loading dock, but only one contained
the actual system. The other went the opposite direction -
Now, why make such effort to decieve satellites if there
was nothing to hide??? At one point in my naive early life,
I put my utmost trust in my govt. But, after 'being there'
and witnessing this.......WTF ???
Back to top
View user's profile Send private message 
Sit Heel Speak


Joined: 30 Mar 2006
Posts: 2595
Location: downwind

PostPosted: Thu 04 Mar 2010, 23:15    Post subject:  

The Pentagon's Cyber Command was inaugurated last year, headed by the then-Director of the National Security Agency:
http://dissidentvoice.org/2009/04/pentagons-cyber-command-to-be-based-at-nsas-fort-meade/

And, the U.S. government is now entertaining bids to build a new 1-million-square-foot data center in Utah:
http://www.standard.net/topics/business/2010/03/02/companies-vying-build-nsa-data-center-utah

It is a reasonably sure bet that, between Echelon and Tempest and similar programs, your government is already intercepting and archiving everything you download or transmit online. There is probably a copy being forwarded to Israel, too.

Charlie Smith, proprietor of http://www.softwar.net/, stated in interview recently, on the Jeff Rense show, that the phased-array radars on the F-22 Raptor and EA-18 Growler aircraft are capable of targeting individual computers. They can, he says, not only surveill screen content and keyboard strokes, and blow up the mainboard with a focussed pulse, but even can implant content with to-the-bit accuracy in both memory and on storage media, including the implanting of a virus in the running in-memory operating system.

Last edited by Sit Heel Speak on Fri 05 Mar 2010, 00:52; edited 1 time in total
Back to top
View user's profile Send private message 
Flash
Official Dog Handler


Joined: 04 May 2005
Posts: 11068
Location: Arizona USA

PostPosted: Thu 04 Mar 2010, 23:17    Post subject:  

From here:
Quote:
You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.

If such an undetectable bug could make a car accelerate unintentionally, imagine the damage it could do to an automaker's competitor. Twisted Evil
Back to top
View user's profile Send private message 
out_fisherman

Joined: 06 Oct 2009
Posts: 17

PostPosted: Fri 05 Mar 2010, 04:50    Post subject: WHOA!  

Now, wait a minute S-H-S -

While I admit they might have great capabilities, I'm still
not buying into the 'tin-hat' stuff....yes, the "on-star"
stuff is real ( I remember hearing about '150+ cadillacs'
suddenly shutting down, back around 1994, in SE US....) .
However, what you are talking about, if it is true, means I
need to move up my timescale for my 'end-of-days shelter'.
and soon! .......
Back to top
View user's profile Send private message 
Display posts from previous:   Sort by:   
Page 2 of 3 [31 Posts]   Goto page: Previous 1, 2, 3 Next
Post new topic   Reply to topic View previous topic :: View next topic
 Forum index » Off-Topic Area » Security
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group
[ Time: 0.1396s ][ Queries: 13 (0.0348s) ][ GZIP on ]