tag:blogger.com,1999:blog-3993498847203183398.post2694465164507135940..comments2024-03-28T09:19:27.451+00:00Comments on RevK<sup>®</sup>'s ramblings: Poisoning the wellRevKhttp://www.blogger.com/profile/12369263214193333422noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-3993498847203183398.post-21937599988122868922015-11-24T00:13:51.608+00:002015-11-24T00:13:51.608+00:00I like to to keep the snoopers busy with a list of...I like to to keep the snoopers busy with a list of words that were supposed to trigger NSA, GCHQ to look more closely, and hping3. hping3 -I p3p1 --rand-dest x.x.x.x -i u10000 --udp --data 100 -E words.txt Or add --rand-source assuming it will route??Anonymoushttps://www.blogger.com/profile/05878277697137248547noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-62066658852331844972015-11-23T16:00:23.459+00:002015-11-23T16:00:23.459+00:00Something you probably had in mind when you wrote ...Something you probably had in mind when you wrote the last sentence of your post - hijacking of ad networks is relatively common (there are usual several layers of re-selling within which all sorts of fun and games can occur).chris stileshttps://www.blogger.com/profile/16220270505988683271noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-45326650262017572752015-11-23T14:49:11.030+00:002015-11-23T14:49:11.030+00:00Well, I did not say I would be doing this - but pe...Well, I did not say I would be doing this - but people can, and probably will, for all sorts of reasons. The fact it can be done is something to consider in the uselessness and cost of the bill. People do not like being spied on - we have seen this with the backlash over Snowden. That has to be considered.RevKhttps://www.blogger.com/profile/12369263214193333422noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-46548052511018042562015-11-23T14:45:09.778+00:002015-11-23T14:45:09.778+00:00I'm no fan of mass surveillance either, and I ...I'm no fan of mass surveillance either, and I think that arguments against the proposed legislation based on its uselessness also have much validity.<br /><br />HOWEVER, it being useless and it being useless in the face of a campaign of wilfully obstructive behaviour are two completely different things (most law enforcement activity relies on the cooperation of the law-abiding, after all).<br /><br />By all means, do what you feel necessary to ensure your own privacy, but proposals to create a vast amount of noise look childish at best. Make sure you're not vulnerable to questions about whose side you're on.Will Deanhttps://www.blogger.com/profile/15515078919433985452noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-80404773189804143232015-11-23T14:01:12.150+00:002015-11-23T14:01:12.150+00:00Most web browsers recognise recursive redirects an...Most web browsers recognise recursive redirects and stop themAndrew Murphyhttps://www.blogger.com/profile/05559103554821540335noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-50935329218818146302015-11-23T13:55:55.567+00:002015-11-23T13:55:55.567+00:00There is an irony that the EU and UK have passed l...There is an irony that the EU and UK have passed laws over web site tracking cookies because we don't want companies collecting loads of "big data" on us, even though all they want to do is more accurately target adverts, but we are happy for ISPs to be forced to do this against our will.RevKhttps://www.blogger.com/profile/12369263214193333422noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-33385721708330450652015-11-23T13:55:07.187+00:002015-11-23T13:55:07.187+00:00Sorry, but for the same reason that if cameras wer...Sorry, but for the same reason that if cameras were installed in every room in my house by the government I may walk around with a balaclava on, or spray paint the cameras. It is a huge invasion of privacy to monitor what everyone is doing in their home. Not a hard concept.RevKhttps://www.blogger.com/profile/12369263214193333422noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-89998274459198781512015-11-23T13:35:44.082+00:002015-11-23T13:35:44.082+00:00If someone visits a website that hotlinks to one o...If someone visits a website that hotlinks to one of my photos, they are loading the image from my website. But not only that: because of a redirect triggered by the referer, they are redirected to something else, and that something else is not mentioned in the source code of the original website.<br /><br />Hmmm, just thought: could the redirect be made to recurse? Infinite connection records!Alan Cliffordhttps://www.blogger.com/profile/07203284236816302240noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-56486506234924019632015-11-23T13:32:35.748+00:002015-11-23T13:32:35.748+00:00Yes, you could do this, but why would you want to?...Yes, you could do this, but why would you want to? Do you want to deliberately try and make yourself look like a baddie and / or frustrate the authorities? We would all like the authorities to catch the baddies but at the same time, we'd like to deny them any access to communications data that they might find useful in doing so? Spying and intelligence gathering has been essential for defeating all kinds of enemies for years - Consider the breaking of Enigma at the end of WW2.<br /><br />Of course the data they would like to collect would be very raw and not perfect, but it might at least provide some clues and connections (after a lot of "big data" processing) that would be helpful. The fact that the data they want is so raw and imperfect and needs so much processing to glean much useful from it will mean that it has a lot less value as "personal data" for anyone else to steal / use inappropriately. I'm sure most of the criminals in the market for "personal data" would rather go after credit card details, email logins, names and addresses etc rather than the raw data from your browsing history!Ruperthttps://www.blogger.com/profile/04685206007070599216noreply@blogger.com