Keylogger

Xen list at xenhideout.nl
Sun Dec 3 08:47:31 UTC 2017


Ralf Mardorf schreef op 03-12-2017 9:12:

>> And yes, you are creating Fear, Uncertainty and Doubt.
>> 
>> That's EXACTLY what you're doing!!!!
> 
> No, informing about pitfalls is not the same as spreading FUD.

It is if these pitfalls are unrealistic.

Or if you cite only the pitfalls but not the ways to get around it.

Or if you cite pitfalls that don't apply.

This is FUD Ralf. This is the definition of FUD.


> A shred kind of security is only granted if you shred the hardware.

You are trying to tell people "Don't bother, it won't work anyway".

You are paralyzing people Ralf. This is called FUD.

You are disempowering people.

The only concern is user space programs that create temporary copies on 
disk before overwriting.

This is a real concern, but it has nothing to do with:

a) hardware
b) online defragmentation

> TOR mentions that it is not that safe to use TOR
> with your own hardware, using your own ISP, as using stolen
> hardware:

Yes using stolen cell phones to make calls or access internet locations 
is safer than using Tor.

This has nothing to do with harddrive contents.

You are spreading Fear, Uncertainty, and Doubt.

Stop misinforming people.

Tor has nothing to do with physical hardrives, it is about being 
traceable on the internet which has nothing to do with this.

> It's not FUD, without C-4, elephant guns, throwing stolen hardware in
> a ditch, you need to be very, very, very careful.

This is nonsense.

Not everyone is a criminal dealing with the NSA.




More information about the ubuntu-users mailing list