Jump to content

qwertyaccount

Elite Member
  • Content Count

    1922
  • Joined

  • Last visited

Everything posted by qwertyaccount

  1. Great story, thank you for posting it! No, men don't have the same rights as women. For instance, if a woman pulls your used condom out of the trash and inseminates herself with the man juice contained therein, you'd still be on the hook for child support because that would be in the best interests of the child. Ladies - please don't beat me up too badly!!!
  2. I can see it now, porn produced in Canada by the fine writers of the CBC. For those that don't know the CBC even exists, the CBC is a taxpayer funded entity that produces mostly 3rd rate programs that no one watches. If porn producers come to Canada they'll be eligible for special tax treatment, grants and subsidies from both the provincial and federal governments. An the porn channels would be obligated to carry this Canadian programming, no matter how bad it was, even if no one ever watches it. Come to think of it, I might just get into the porn producing business and collect some of that free money courtesy of the taxpayer!!!
  3. If only Microsoft notified everyone in 2002 about the support life cycle instead of in 2004, everyone would have been ready by now instead of scrambling at the last minute :)
  4. You make some great points! This is something that could be used in addition to condoms for extra protection rather than in place of them.
  5. This question is much like "How many licks to get to the center of of a tootsie pop?". It depends on the licker! A newbie will likely have many more questions than someone that knows the ropes, and calling can be a bit intimidating for some. Suite Escapes has the right idea, after a few back & forth messages say something like "You've asked a lot of great questions and I'm sure you have a few more, it would be much faster if you could give me a call, plus you'll get to hear my sexy voice".
  6. The article below is just another reminder that anything you do using an electronic device that is connected to the outside world should not be considered private. An under-the-radar example that almost no one knows about is that your Rogers cable box records and transmit back what shows you watch and when - information that Rogers stores, sells (Neilson ratings) and will one day use to target you with advertising based on the profile they've created about you. Now, on to the article I found: [FONT=Arial][SIZE=4][COLOR=black][B]Spy game: Local police tap cell phones[/B][/COLOR][/SIZE][/FONT] [URL="http://watchdog.org/131254/local-police-spy/"][FONT=Arial]http://watchdog.org/131254/local-police-spy/[/FONT][/URL] [FONT=Arial][SIZE=1]By [/SIZE][/FONT][URL="http://watchdog.org/author/willpatrick/"][FONT=Arial][SIZE=1][COLOR=#0066cc]William Patrick[/COLOR][/SIZE][/FONT][/URL][FONT=Arial][SIZE=1] / March 6, 2014[/SIZE][/FONT] [FONT=Arial][/FONT] [FONT=Arial]TALLAHASSEE, Fla. â?? The National Security Agency apparently isnâ??t the only government agency engaged in domestic spying.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]Local law enforcement is playing the role of Big Brother, too, but to what extent is still unknown.[/FONT] [FONT=Arial][/FONT] [B][FONT=Arial]Recent court documents reveal a troubling cell phone surveillance program conducted by a Florida police department against unsuspecting cell phone users.[/FONT][/B] [FONT=Arial][/FONT] [FONT=Arial][B]Attempts to keep the practice secret, even from judges, is raising questions as to just how prevalent police spying is[/B] within the Sunshine State.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]The controversy stems from the arrest of James L. Thomas, a criminal suspect believed to be in possession of a stolen phone. Tallahassee police located and arrested Thomas by tracking a cell phone signal, then promptly searched his home.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]It later became known that [B]police didnâ??t seek a warrant [/B]or admit to using a little-known surveillance device called a â??[/FONT][URL="http://en.wikipedia.org/wiki/Stingray_phone_tracker"][FONT=Arial][COLOR=#0066cc]Stingray[/COLOR][/FONT][/URL][FONT=Arial].â?[/FONT] [FONT=Arial][/FONT] [FONT=Arial]Stingrays are small mobile devices that trick cell phones into connecting to them as if they were cell phone towers. [B]The technology gives police the ability to track phone movements and intercept both phone calls and text messages of any cell phone within range.[/B][/FONT] [FONT=Arial][/FONT] [FONT=Arial]In the court case, Thomasâ?? attorney asked police how they determined the defendant had the cell phone in question. The police declined to answer. A judge ordered a response, but only after clearing the courtroom and sealing the official record.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]Now on appeal, courtroom deliberations revealed last week that the Tallahassee Police Department used a Stingray 200 times since 2010 without seeking a warrant.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]â??This record makes it very clear that (Tallahassee Police Department) were not going to get a search warrant because they had never gotten a search warrant for this technology,â? an appeals court judge said.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]Beyond the prospect of unconstitutional warrantless police searches, government watchdogs have long warned against surveillance tactics that broadly expose the personal information of countless innocent people in attempts by law enforcement to identify individuals suspected of crimes.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]â??When police use invasive surveillance equipment to surreptitiously sweep up information about the locations and communications of large numbers of people, court oversight and public debate are essential,â? states the American Civil Liberties Union.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]The ACLU is now leading the effort to determine just how widespread cell phone tracking is in Florida. The group announced a [/FONT][URL="https://www.aclu.org/files/assets/140227%20Tallahassee%20PD%20Records%20Request.pdf"][FONT=Arial][COLOR=#0066cc]public records submission [/COLOR][/FONT][/URL][FONT=Arial]Monday to nearly 30 police and sheriffsâ?? departments across the state.[/FONT] [FONT=Arial][/FONT] [URL="https://www.aclu.org/files/assets/140226%20ACLU's%20Motion%20for%20Public%20Access%20(ECF)%20FILED.pdf"][FONT=Arial][COLOR=#0066cc]Court documents show[/COLOR][/FONT][/URL][FONT=Arial] the Tallahassee Police Department didnâ??t seek a search warrant in the Thomas case because it â??did not want to reveal information about the technology they used to track the cell phone signal.â?[/FONT] [FONT=Arial][/FONT] [FONT=Arial]TPD also said the Stingray was loaned to the department from a private manufacturer who in turn required a nondisclosure agreement.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]â??A nondisclosure agreement is typically a civil agreement between two or more parties over a commercial contract,â? Christopher Torres, a Tallahassee defense lawyer, told Watchdog.org.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]â??Theyâ??re saying because itâ??s a cell phone they donâ??t have to get a warrant, but itâ??s basically a wiretap,â? Torres said. â??You cannot say something is protected by a trade agreement and that somehow trumps the U.S. Constitution.â?[/FONT] [FONT=Arial][/FONT] [URL="http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/"][FONT=Arial][COLOR=#0066cc]According to ARS Technica[/COLOR][/FONT][/URL][FONT=Arial], Stingrays are exclusively manufactured by the Harris Corp., a Melbourne-based telecommunications company. Earning $5 billion in annual revenue, Harris Corp. supplies electronic equipment to government, defense and commercial sectors.[/FONT] [FONT=Arial][/FONT] [FONT=Arial]â??Since 2004, Harris has earned more than $40 million from spy technology contracts with city, state, and federal authorities in the US, according to procurement records,â? reports ARS Technica, an online information technology periodical.[/FONT]
  7. How can I store some of the extra daylight being saved so I can use it in the Winter?
  8. That's really ballsy! The drivers and observers, and of course the engineers that designed the steering control system being demonstrated, deserve most of the credit. Most any ballet dancer or gymnast could have done the splits, but of course they would need some big brass balls to go though with it. My groin hurts just thinking about it!
  9. [SIZE=4][B]continued...[/B][/SIZE] [COLOR=navy][FONT="Arial"]If you pay attention when you're installing, you can usually avoid getting anything extra. Skim any user agreements you see on the screen. Responsible sites make it clearer before they try to add things you didn't ask for. You can usually click the â??declineâ? button and still get the app you're after, or uncheck a box to skip the toolbar or, say, the hijacking of your search provider. Also, resist clicking the Express Install option, which often defaults to giving you whatever the given site is pushing. Clicking Custom Install often reveals hidden options that let you ditch the junk before it makes it onto your PC.[/FONT][/COLOR] [COLOR=navy][FONT="Arial"][/FONT][/COLOR] [COLOR=navy][FONT="Arial"][B][SIZE=3]Learn to love your uninstall screen[/SIZE][/B][/FONT][/COLOR] [COLOR=navy][FONT="Arial"][/FONT][/COLOR] [COLOR=navy][FONT="Arial"]Finally, accept that you probably won't catch every unwanted toolbar before it gets installed on your system. It happens to all of usâ??these days more often than ever, it seems. That's why you should peruse your installed programs list (the Programs and Features control panel in Windows) regularly, at least every couple months.[/FONT][/COLOR] [COLOR=navy][FONT="Arial"] Scroll through the list and look for applications you don't recognize or remember actively downloading or installing. If you're unsure of what a program is, you probably don't need it. But if you're unsure, check it out via a Web search or try launching it. If that doesn't jog your memory, you can probably safely kick it off your hard drive. Unless it's a program you had paid for, if you change your mind later, you can probably download it again for free.[/FONT][/COLOR]
  10. I have an electric one of those too, just to cover the remote possibility that mine gets tired :)
  11. [URL="http://www.consumerreports.org/cro/2014/02/how-to-avoid-installing-software-you-don-t-want/index.htm?EXTKEY=AFOXDIG01"][COLOR=#0066cc]http://www.consumerreports.org/cro/2014/02/how-to-avoid-installing-software-you-don-t-want/index.htm?EXTKEY=AFOXDIG01[/COLOR][/URL] [FONT=Arial][COLOR=navy]Consumer Reports - February 2014 One of the easiest ways to turn a brand-new computer into one cluttered with unwanted programs and crawling with various forms of malware is to start grabbing your favorite free software from the wrong sites. The problem is, Google and Bing searches can easily lead you exactly where you don't want to go. [IMG]http://static2.consumerreportscdn.org/content/dam/cro/news_articles/Electronics/CRO_electronics_CrapwareEvidenceSponsoredAds_02-14.jpg[/IMG] When searching for popular software such as iTunes or Adobe Flash Player, sponsored search results (in other words, ads) often appear at the top of popular searches, above links from the actual source sites such as Apple and Adobe. And those ad links often try their hardest to stealthily install software on your computer that you probably don't want. Just how bad is it? To find out, we set up a fresh install of Windows 7 on a virtual machine, installed all available Windows updates, grabbed the free version of Avast! antivirus software (which can be tricky itself), fired up Internet Explorer 11, and started searching Google and Bing for popular free programs. We searched for nine programs, many of them among the first programs that get installed on a PC: iTunes, Adobe Flash, Java, Adobe Acrobat, VLC, WinRAR, WinZip, Google Chrome, and Any Video Converter. Then, we clicked on ad results, which appear above the standard search results highlighted in a pale yellow to differentiate them (slightly) from the nonpaid links below. To be fair, the ads didn't appear after every search, and the ones that appeared varied from search to search and from one browser to another. Sometimes, particularly with iTunes, the first ad link actually took us to the software's source site ([/COLOR][/FONT][URL="http://www.apple.com/itunes"][FONT=Arial][COLOR=navy]apple.com/itunes[/COLOR][/FONT][/URL][FONT=Arial][COLOR=navy] in this example). But for every one of the above programs, we were able to bring up more questionable sponsored search results within a few minutes of repeated searching. And these kinds of results showed up in Google Chrome, Firefox, and Internet Explorer. [B]Installing (and then stuttering)[/B] [IMG]http://static2.consumerreportscdn.org/content/dam/cro/news_articles/Electronics/CRO_electronics_ThisOnStartup_02-14.jpg[/IMG] For each ad link, we clicked through and installed the respective programs via the link or button provided. Instead of delivering just the application we were looking for, all of the links tacked on additional software. In some cases, we found, if you're careful to read all the fine print and uncheck a handful of boxes, you can get the files you're looking for without a bunch of extra "added value" software. But for the sake of this report, we acted as a novice Web surfer (or a more experienced user who's just not paying close attention), and "yessed" our way through dialogue boxes designed to look like the standard user license agreements we're used to clicking through when installing software. After installing just a few programs this way, we started racking up browser toolbars (AVG, Yahoo, and Google), and noticed our search engine and home page had been hijacked to something unfamiliar. As we progressed through the nine programs, Windows started slowing downâ??a lot, as if it had been accumulating Web gunk for months (or years) rather than minutes. [B]We never had to actively search for and install Google Chrome, as that browser got installed at some point[/B], along with several more questionable programs, such as registry scanners, performance "optimizers," and a service we'd never heard of that helpfully offered/nagged us to back up our computer to "the cloud" for free. After installing all of the programs on our list, we opened Windows 7's uninstall utility and counted 32 programs that had been installed in addition to the original nine we set out to get. Upon rebooting, seven new programs launched popup windows at startup, including two that started running virus/registry scans as soon as they launched, and a few that flashed warnings and promised fixes if we registered and/or upgraded to the full version (for a price, of course). To a seasoned computer user, these are obvious attempts to grab money and personal data. But others, particularly those inclined to click on ad links rather than legitimate search results, won't know they're potentially being scammed. This is exactly why these companies pay Bing and Google for prominent ad placement: The ad links pull in the least-savvy computer users. [B]What about that antivirus software?[/B] [IMG]http://static4.consumerreportscdn.org/content/dam/cro/news_articles/Electronics/CRO_electronics_MalwareBytes_02-14.jpg[/IMG] [B][SIZE=3]But what about our Avast antivirus? Didn't it pick up on any of the stuff clogging up our system? [/SIZE][/B] Avast's Web Shield did block a second tab that started opening up every time we launched Internet Explorer, and gave us an audible warning that the page contained some sort of malware. [B]We also instructed Avast to run a full virus scan once we had finished installing software. Somewhat surprisingly, the program turned up no infected files. That could mean that any viruses that were there had somehow circumvented Avast's scan, or were just so new that the antivirus software wasn't aware of them yet.[/B] There's also a very good chance that there were no actual viruses on the system after allâ??just a bunch of other types of unexpected software that could (and probably would) push the average user to a more serious infection in the near future. For instance, with all this extra software installed, a Google search produced a whole other set of ads above the Google ads we saw before. That meant that more than half of Google's search results on the browser page were now ads leading to questionable sites; we had to do a bit of scrolling even to see the unsponsored search results. [/COLOR][/FONT][FONT=Arial][COLOR=navy][B]Although we didn't detect any actual viruses on our test system, the popular malware scanner Malwarebytes Anti-Malware certainly found a lot not to like. After running a full scan, the program found what is said were 1868 infected objectsâ??a substantial number for a system that had been running for just a few hours.[/B] [B][SIZE=3]What have we learned?[/SIZE][/B] If your PC is already in a sad state similar to the one we experienced, you may want to consider a full system restore. You may also be able to get your system back to some semblance of sanity with our list of tips to keep your computer from slowing down. But if your computer is still purring along like new, how do you keep it from winding up like our test system? By using some basic Web savvy, common sense, and having the patience to read a bit before you click. [B][SIZE=3]Avoid clicking on sponsored links[/SIZE][/B] Pay attention to your search results and try not to click links bordered by that yellowish rectangle, or otherwise connoted as ads. Someone's paying for their prime placement. And for the most part, they aren't doing so for your benefit. (Note that this applies only to downloading software, not necessarily to sponsored links for a lot of other things.) If this seems obvious to you, maybe your friends and family members could use the advice. If you see them installing something this way, let them know the smarter way to surf. [B][SIZE=3]Get your software from the source whenever possible[/SIZE][/B] To install Flash or Acrobat, head to Adobe.com and search for it there, or use your favorite search engine and pay attention to the source of your links. In other words, read the URL before clicking, and try to get your programs directly from the developer. Download iTunes only from Apple. Java should come from java.com or Java's owner, Oracle. It may not always be obvious who the developer of a given program is, so read the URL you're about to click on. If it isn't familiar, check out the site name itself using a search engine. Doing so will quickly let you know, for example, that videolan.com is the developer of the VLC video player. Trust us, it's worth taking an extra few seconds versus the hours you may spend later dealing with unwanted softwareâ??or worse. [B][SIZE=3]Familiarize yourself with a few trusted file download sites[/SIZE][/B] You can't always get programs directly from their developers. But you can find many popular programs at Cnet's Download.com, SourceForge.net, Tucows, or FileHippo.com. All of these sites have been around for many years and have some of the biggest repositories of free or trial software. If you can't the program you're after on one of these sites or on the page of its developer, you should seriously question what you're downloading. If a search turns up what you're looking for on an unfamiliar site, check out that site with a search using Google, Bing, or Yahoo. [B][SIZE=3]You still may wind up with unwanted software[/SIZE][/B] Even if you get your program directly from the developer or one of the above sites, there's a good chance that a toolbar or some other unwanted program will attempt to tag along. Just about every free software site these days pushes something extra with the install file, such as adding toolbars and/or attempting to change your default browser or search. This is frustrating, but still less nefarious than what we experienced from unfamiliar sponsored sites.[/COLOR][/FONT] [SIZE=3]out of space, to be continued...[/SIZE]
  12. [FONT=Arial][COLOR=navy]By Matt Safford Published February 27, 2014 Consumer Reports[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]Having your browser's default search engine unintentionally changed (or "hijacked") is becoming an increasingly common frustration. Once primarily the practice of shady software peddlers looking to install malware, it has become common for reputable software developers and distributors such as Adobe, CNET, and Oracle [/COLOR][especially Yahoo & Google] [COLOR=navy]to try to attach toolbars and other software to popular downloads, as well as try to change your browserâ??s search engine to one of their (sponsor's) choosing.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]If you're careful, you can avoid those pitfalls. For example, when downloading software, [B]avoid the Express Install option,[/B] which will usually gives the installer carte blanche to make changes without explicitly asking you. Clicking Custom Install often reveals hidden options with check boxes that let you keep the search engine you're currently using and ditch any additional software before it clutters up your hard drive.[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy]But as much as we'd like believe we can always be extra careful about reading before clicking, the occasional search engine hijack can (and does) happen to even the most experienced users. In Firefox and Safari, it's surprisingly easy to change the search engine by accident yourself by making a couple of quick clicks in the Search field, directly to the right of the address bar.[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy]Regardless of how your search engine was changed, itâ??s usually fairly easy to switch back to Google, Bing, or the one you prefer. The process does vary between browsers and browser versions, however. So first make sure your browser is up to date: You can usually do that by going to the browser's About page, under the Settings or Help menu. Then follow these instructions:[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy][B]Google Chrome [/B]Click the three-line icon in the upper-right corner (or the wrench in older versions of the browser) and choose Settings from the drop-down menu. A separate tab will open.[/COLOR][/FONT] [FONT=Arial][COLOR=navy]A little over halfway down the page, you 'll find a Search section (below Appearance and above Users). The left button here will reveal a drop-down menu of search providers. Choose the option you want, and close the tab.[/COLOR][/FONT] [FONT=Arial][COLOR=navy]If the search provider you want doesn't appear in the list, click "Manage search engines." A pop-up window will let you add other providers from an alphabetical list.[/COLOR][/FONT] [FONT=Arial][COLOR=navy]Choose the provider you want and click the blue "Make default" button on the right. If providers you don't wish to use show up in the top Default search settings window, you can click on them, and delete them by hitting the black "x" on the right side. You can also add a search engine, if you don't see one that you want on the list.[/COLOR][/FONT] [B][FONT=Arial][COLOR=navy][/COLOR][/FONT][/B] [FONT=Arial][COLOR=navy][B][SIZE=3]Internet Explorer [/SIZE] [/B][/COLOR][/FONT] [FONT=Arial][COLOR=navy]Click the gear icon in the upper-right corner and select Manage Add-ons from the drop-down menu.[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy]In the resulting window, click Search Providers in the left page. You should see a list of search providers on the right. If your search engine of choice is in this list, select it, then click "Move up" until it's at the top of the list. You can also delete any search providers you don't want to use.[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy]If the search provider you want isn't here, click the "Find more search provider" link in the lower-left corner, and a new window will open, letting you add many common and less common search engines. Once your preferred search sits at the top spot on the list, you can click "Close." But it's also a good idea to check the box on the lower left that says "Prevent programs from suggesting changes to my default search provider." That will make search hijacking less likely in the future.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy][B]Mozilla Firefox [/B]Look for the Search box, directly to the right of the address bar, and click on the search provider icon in the left of the box. (The icon you see will vary depending on what your current default search provider is.)[/COLOR][/FONT] [FONT=Arial][COLOR=navy]A drop-down menu appears, letting you easily click the provider you wish to use. Once you do this, your default search provider is changed.[/COLOR][/FONT] [FONT=Arial][COLOR=navy]If the provider you're looking for isn't on this list, click "Manage Search Engine" at the bottom of the drop-down. This opens a window of common search providers, as well as a link called "Get more search engines" [/COLOR][/FONT] [FONT=Arial][COLOR=navy]Once you find your chosen search provider, click to add it to the list, then click the "Move Up" button until it's at the top of the list. You can also select providers you don't want, and click "Remove" to banish them from the list.[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy][B]Safari [/B]Much like Firefox, Safari has a Search box to the right of the address bar. Click the magnifying glass icon, and a drop-down menu will let you choose from Google, Bing, and Yahoo.[/COLOR][/FONT] [FONT=Arial][COLOR=navy]You can also click the gear icon in the upper-right and select Preferences from the drop-down menu. This launches a pop-up window of settings, which should default to the "General" tab. That's where you want to be. The second item, below "Default web browser," is "Default search engine." Click it, and you'll get the same short list of search providers. Click the one you want, and close the window.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][SIZE=3][COLOR=navy][B]Is your search bar still hijacked? [/B][/COLOR][/SIZE][/FONT] [FONT=Arial][COLOR=navy]If you are using one of the above four browsers, followed the instructions, and are still getting search results from a provider you didn't chooseâ??or your search engine changes back after a system rebootâ??you probably have some form of malware on your computer.[/COLOR][/FONT] [FONT=Arial][COLOR=#000080][/COLOR][/FONT] [FONT=Arial][COLOR=navy]Nefarious software can be difficult to get rid of without a complete system reinstall. But if you suspect malware is responsible for your search engine woes, a good first step is to grab the free version of Malwarebytes (available for PC and Mac) and run a full scan of your system. Once that's done, delete whatever it flags as suspicious. Then make sure your antivirus program has the most recent updates. Run a full scan there, and follow the instructions about deleting or quarantining anything it finds.[/COLOR][/FONT] [FONT=Arial][/FONT]
  13. The banks are quite upfront about how they plan to fleece you thus allowing you to minimize your expenses by just reading all the fine print they send you, on the other hand the big telecoms seem to use deception and trickery.
  14. Commando - I didn't do laundry yet and I'm out of bathing suits.
  15. Gotta love that toe cleavage! Ladies, I have an electric blanket.
  16. [URL]http://www.foxnews.com/tech/2014/02/27/uk-us-spies-hacked-webcams-millions-yahoo-users/[/URL] [FONT=Arial][COLOR=navy]U.S. and British spy agencies intercepted and stored images from the webcams of millions of likely innocent Yahoo users, including â??large quantitiesâ? of sexually explicit images, [/COLOR][/FONT][URL="http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo"][FONT=Arial][COLOR=navy]the Guardian reported Thursday[/COLOR][/FONT][/URL][FONT=Arial][COLOR=navy][IMG]http://global.fncstatic.com/static/v/all/img/external-link.png[/IMG] -- a revelation the web giant described as â??a whole new level of violation.â?[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]A secret program called Optic Nerve appears intended to collate a digital mugbook of sorts, snapping screenshots every 5 minutes or so from user feeds. But the program targeted indiscriminately, regardless of whether the webcam owner was an intelligence target or not.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]More than 1.8 million user accounts from around the world were accessed in one six-month period alone.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]Image data from the Yahoo accounts was hoovered up between 2008 and 2012 under the program, which was run by U.K. surveillance agency GCHQ with assistance from the National Security Agency (NSA). The report is based on secret documents taken by former NSA contractor Edward Snowden, which have led to international outrage over the stunning extent of oversight of Internet activities.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]The secret documents show that sexually explicit material was an issue the spy agencies wrangled with; they estimate that between 3 percent and 11 percent of Yahoo webcam images contained â??undesirable nudity.â?[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]"Unfortunately â?¦ it would appear that a surprising number of people use webcam conversations to show intimate parts of their body to the other person,â? one document states, [/COLOR][/FONT][URL="http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo"][FONT=Arial][COLOR=navy]according to the Guardian[/COLOR][/FONT][/URL][FONT=Arial][COLOR=navy][IMG]http://global.fncstatic.com/static/v/all/img/external-link.png[/IMG]. â??Also, the fact that the Yahoo software allows more than one person to view a webcam stream without necessarily sending a reciprocal stream means that it appears sometimes to be used for broadcasting pornography."[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]Yahoo responded â??furiouslyâ? when informed of the Optic Nerve program, the Guardian reported, denying knowledge of the program and calling it "a whole new level of violation of our users' privacy that is completely unacceptable."[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]â??We strongly call on the world's governments to reform surveillance law consistent with the principles we outlined in December,â? a spokeswoman said.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]The GCHQ said it would not comment on intelligence matters, according to company policy. But a spokesman did say that â??all of GCHQâ??s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate.â?[/COLOR][/FONT] [FONT=Arial][COLOR=navy]NSA spokeswoman Vanee Vines said the agency did not ask foreign partners to collect data it could not legally collect itself.[/COLOR][/FONT] [FONT=Arial][COLOR=navy][/COLOR][/FONT] [FONT=Arial][COLOR=navy]"As we've said before, the National Security Agency does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself," she told the Guardian.[/COLOR][/FONT] Full story at: [URL="http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo"][COLOR=#0066cc]http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo[/COLOR][/URL]
  17. What make and model laptop is it? Do you have any pictures of the bras or was it just a scouting trip?
  18. I'm wearing a green bathing suit. That means it's time to do some laundry :(
  19. I've heard a lot about weird or inappropriate text messages and guys sending dick pictures - what are some of the funniest or strangest text messages you've received?
  20. Boobies are gods gifts to men and women and should be cherished. Like NJ, just looking at them brings a smile to my face no matter what shape or size, or how much or little I'm allowed to see. Q. How do you make 5 pounds of fat on a woman beautiful? A. Put a nipple on it. My biggest problem is remembering that there are 2 and to give them equal attention.
  21. She sounds like an amazing young lady! You can still come and "play" with all of us on CERB without participating in the lifestyle - I for one would like to hear every so often what you've learned about your successes and mistakes in the relationship so that I can try and replicate or avoid them. CERB is also a great place for you to learn from the mistakes of others and ask candid questions of the ladies to try and avoid mistakes yourself. Thank you for all your contributions and I wish you all the best!
×
×
  • Create New...