It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: ArMaP
a reply to: combatmaster
That would be a huge waste of resources, as there would be gathering information they will never look at.
But I'm sure they do that for certain countries, organisations and ISPs.
originally posted by: Vasa Croe
So I have wondered for a while if everything typed into a social media app you are on is actually captured.
Even when you backspace or clear what you just typed....basically capturing in real time.
So regardless of if you were hot-headed for a second and then deleted what you were about to post.....it would still capture your initial response or message.
Does that make sense?
I don’t think that could be implemented on a forum like ATS, but it could definitely be coded into an app and part of the T&A that nobody reads.
Think about it....keyloggers are one of the oldest tricks in the book.....
originally posted by: More1ThanAny1
a reply to: chr0naut
I'm calling BS on the "every keystroke" part. This is testable and is not true.
originally posted by: chr0naut
originally posted by: More1ThanAny1
a reply to: chr0naut
I'm calling BS on the "every keystroke" part. This is testable and is not true.
Well, they have to with browsers all using HTTPS now.
I believe that the NSA would use mostly kernel level metadata collection on compliant operating systems with key escrow held by the NSA.
The metadata about how the data is submitted is more valuable than the data itself.
originally posted by: More1ThanAny1
Regarding the "user is typing..." implementation. I was responsible for developing a similar feature and the most common way to do it is to not send every keystroke. Its more efficient to fire an event using a text box "onChange" trigger to tell the other user that the person is typing. That would then timeout after a few seconds if the user stopped typing. If they keep typing that timer is reset. So it's not tracking every keystroke.
originally posted by: More1ThanAny1
HTTPS requires both browsers and websites to handshake and utilize a public key to encrypt the data for transit.
originally posted by: SleeperHasAwakened
Nevertheless, you stumbled into a worthwhile point, which is that it pays to use open source software where every line of code is audited, vs. black box/walled garden OS that can do whatever they please with no recourse.
originally posted by: ArMaP
originally posted by: chr0naut
Well, they have to with browsers all using HTTPS now.
The sites, not the browsers.
originally posted by: More1ThanAny1
a reply to: chr0naut
I am an experienced kernel level driver developer for Windows. No matter what, that keystroke data would have to travel through the network stack and would be detectable. People would have found such a thing by now. I am only talking about on Windows of course.
However, I am not denying that if one were to be spied on by the government they couldn't flip a switch and do this. I am mostly saying its not on by default.
Also, keystroke data is useless if they can't identify the machine its coming from within a subnet. So the packets sent over the network would be larger and much more detectable than just sending single bytes per keystroke because it would require a unique identifier to go with it.
-
Regarding the "user is typing..." implementation. I was responsible for developing a similar feature and the most common way to do it is to not send every keystroke. Its more efficient to fire an event using a text box "onChange" trigger to tell the other user that the person is typing. That would then timeout after a few seconds if the user stopped typing. If they keep typing that timer is reset. So it's not tracking every keystroke.
originally posted by: SleeperHasAwakened
originally posted by: chr0naut
originally posted by: More1ThanAny1
a reply to: chr0naut
I'm calling BS on the "every keystroke" part. This is testable and is not true.
Well, they have to with browsers all using HTTPS now.
I believe that the NSA would use mostly kernel level metadata collection on compliant operating systems with key escrow held by the NSA.
The metadata about how the data is submitted is more valuable than the data itself.
This reads like a techno-babble.
"Kernel level metadata" in most *nix platforms won't have anything of personally incriminating/identifiable value. It's mostly concerned about things like what kernel modules are loaded, drivers in use, memory layout and servicing hooks from applications in userland.
Not to mention, e.g. Linux kernel, is among the most audited/scrutinized source code on the planet Earth.
I do remember Snowden mentioning the criticality of "metadata" for the spooks, but my understanding is that this is in relation to tracking things like phone records, from party A to party B, what time it occurred and where the participants were when the call happened.
Nevertheless, you stumbled into a worthwhile point, which is that it pays to use open source software where every line of code is audited, vs. black box/walled garden OS that can do whatever they please with no recourse.
originally posted by: More1ThanAny1
a reply to: ArMaP
HTTPS requires both browsers and websites to handshake and utilize a public key to encrypt the data for transit.
Why did you bail on Twitter? I was never a fan myself, though I remember reading some astronaut tweets from the ISS. But in general it seemed like a stunted form of communication.
originally posted by: MotherMayEye
a reply to: Vasa Croe
I followed you on Twitter, I don't now if you knew that or not. I am wondering if you bailed? I did on Wednesday afternoon.
I did a Tweet delete before I left. I am sure SM captures everything they can capture....including keylogging.
Thanks to Edward Snowden, we know how they get around the https encryption, on the slide with the famous smiley face, or should I say infamous?
originally posted by: chr0naut
Which is why, for ease of access to the unencrypted data, the three-letter agencies must get in either before, or after, or both before and after, encryption.
originally posted by: Arbitrageur
Why did you bail on Twitter? I was never a fan myself, though I remember reading some astronaut tweets from the ISS. But in general it seemed like a stunted form of communication.