Puppy hidden backdoors in kernel?

For discussions about security.
Message
Author
catpuppy
Posts: 8
Joined: Thu 05 Jan 2012, 16:41

#16 Post by catpuppy »

nooby wrote:catpuppy, how do you know what you claim?
Well I'm not the only one there many people who are aware about this but also many not.

See my post I posted links with proof.
computer programmers, hackers have analyzed this stuff with tools like traffic analyzing and applications debugin, source code analyzing etc....
This backdoors are in many software and people are not aware of this.

So that the govenment always has control for there New world order plans.

tlchost
Posts: 2057
Joined: Sun 05 Aug 2007, 23:26
Location: Baltimore, Maryland USA
Contact:

#17 Post by tlchost »


nooby
Posts: 10369
Joined: Sun 29 Jun 2008, 19:05
Location: SwedenEurope

#18 Post by nooby »

tlchost to just get a link to a jpg file is not polite.
what is it about?
I use Google Search on Puppy Forum
not an ideal solution though

nooby
Posts: 10369
Joined: Sun 29 Jun 2008, 19:05
Location: SwedenEurope

#19 Post by nooby »

catpuppy thanks for that explanation.
Wish I knew somebody clever enough to understand such texts.

I have tried to read them for years and usually end up
looking like a big question mark not sure whom to trust.

I do find it likely that if they can they sure would try to
get as much control as possible within laws or even in a gray
zone if them trust they get away with it.

Here in Sweden we had military spies and none knew about it.

Great scandal when it got known. It needed a whistle blower
from inside that organization to tell it to journalists.

So why would they not do as you have found out?
The reason I am skeptical is that so many people see such
as conspiracy ideas or political propaganda.

Anyway thanks for your links and text. I keep it
on my mind in the hope that sooner or later I'll find
somebody that can help me read it and explain.
I use Google Search on Puppy Forum
not an ideal solution though

tlchost
Posts: 2057
Joined: Sun 05 Aug 2007, 23:26
Location: Baltimore, Maryland USA
Contact:

#20 Post by tlchost »

nooby wrote:tlchost to just get a link to a jpg file is not polite.
what is it about?
Polite? SO now you are the definer of polite? Please think of it as a graphic statement.

nooby
Posts: 10369
Joined: Sun 29 Jun 2008, 19:05
Location: SwedenEurope

#21 Post by nooby »

So what did that say then? I am all ears!
I use Google Search on Puppy Forum
not an ideal solution though

postfs1

#22 Post by postfs1 »

It inspires me to give a names to the unknown backdoors:

1)The "no o by no o " backdoor

2)The "ny boo" backdoor = "no yes boo"

Kind of like there may be something, but may not be. It's kind of cool.
Last edited by postfs1 on Sun 08 Jan 2012, 22:13, edited 4 times in total.

disciple
Posts: 6984
Joined: Sun 21 May 2006, 01:46
Location: Auckland, New Zealand

#23 Post by disciple »

catpuppy wrote:...
See here:

http://cryptome.org/0004/tor-is-tor.htm
...
disciple wrote:?!
Oh, sorry, I didn't see the link you added about Tor.
I don't see why it is a big deal to point out that a few dozen commits to Tor have come from US Navy addresses. It was originally sponsored by the Navy. And given how much they claim some people in military and law enforcement rely on Tor, we should expect them to maintain an interest in its security.
Nothing is ever invulnerable. If anyone is interested in how Tor is vulnerable, check out the "weaknesses" section on its Wikipedia page, and also http://pacsec.jp/psj11/PacSec2011_Dynam ... ors_en.pdf. As you can see, people put a lot of effort into finding vulnerabilities in Tor so that they can improve it.
Tor is open source, and the people who use it are rather interested in privacy, so if there are or have been back doors in it, people would be finding them.
sickgut wrote:See my post I posted links with proof.
?
I'm still missing the evidence for this:
sickgut wrote:
disciple wrote: Please provide references.
about TOR?
goto their site, read the info. They actually tell you they must cooperate with law enforcement and also says that they are not allowed to tell users or post on their site by what means the network is being monitored and if and when monitoring is happening.
Do you know a good gtkdialog program? Please post a link here

Classic Puppy quotes

ROOT FOREVER
GTK2 FOREVER

User avatar
RetroTechGuy
Posts: 2947
Joined: Tue 15 Dec 2009, 17:20
Location: USA

#24 Post by RetroTechGuy »

catpuppy wrote:If someone is using truecrypt don't use it! it contains backdoors like many other software, use only open source applications.
Here:

http://sd4l.sourceforge.net/
[url=http://murga-linux.com/puppy/viewtopic.php?t=58615]Add swapfile[/url]
[url=http://wellminded.net63.net/]WellMinded Search[/url]
[url=http://puppylinux.us/psearch.html]PuppyLinux.US Search[/url]

Bruce B

#25 Post by Bruce B »

I thought to mention that Linux is not a US company or product, rather a world wide programming effort where military and political enemies work on the same kernel.

Can we trust that China will keep an eye out for NSA backdoors?

Seriously!?

~

Post Reply