• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "https://www.jottacloud.com experiences"

Collapse

  • SpontaneousOrder
    replied
    Originally posted by minestrone View Post
    You need to take the tin foil hat off.
    If he ever has to do business with a chinese clientCo, then it might not be tin-foil-hat stuff.

    Leave a comment:


  • NickFitz
    replied
    Originally posted by MicrosoftBob View Post
    So if you were clever you would use steganography to hide something naughty in porn, then when you need to send it, send it as encrypted torrent
    Shave a permie's head, tattoo the message on it, wait for the hair to grow back, then tell him the perilous trip across enemy lines is a promotion.

    Leave a comment:


  • MicrosoftBob
    replied
    Originally posted by TheFaQQer View Post
    One of the reasons that MI5 / MI6 / the police weren't in favour of the Digital Economy Act was that they worried that it would encourage more people to use encrypted traffic. Beforehand, if someone was doing something really naughty, then they would be more likely to encrypt the data, so there was a much smaller pool to target. Now, many more people are using encrypted traffic, so the "security services" don't know whether you're doing something really naughty, or just torrenting porn.
    So if you were clever you would use steganography to hide something naughty in porn, then when you need to send it, send it as encrypted torrent

    Leave a comment:


  • VectraMan
    replied
    Originally posted by scooterscot View Post
    I don't believe in no win scenarios

    Hours will seem like days, Jim. Wink wink. It'll be ready in three days. Wink wink.

    I hope the encryption is more secure than Spock's best effort.

    Leave a comment:


  • scooterscot
    replied
    Originally posted by NickFitz View Post
    That's cheating
    I don't believe in no win scenarios

    Leave a comment:


  • stek
    replied
    Originally posted by scooterscot View Post
    Ah but I'm not in the UK :O)

    In any case communications are encrypted.
    But not the data itself?

    Leave a comment:


  • TheFaQQer
    replied
    Originally posted by NickFitz View Post
    I strongly suspect that to the NSA and GCHQ, that just acts as an indicator of what to look at more closely
    One of the reasons that MI5 / MI6 / the police weren't in favour of the Digital Economy Act was that they worried that it would encourage more people to use encrypted traffic. Beforehand, if someone was doing something really naughty, then they would be more likely to encrypt the data, so there was a much smaller pool to target. Now, many more people are using encrypted traffic, so the "security services" don't know whether you're doing something really naughty, or just torrenting porn.

    Leave a comment:


  • NickFitz
    replied
    Originally posted by scooterscot View Post
    Ah but I'm not in the UK :O)
    That's cheating

    Originally posted by scooterscot View Post
    In any case communications are encrypted.
    I strongly suspect that to the NSA and GCHQ, that just acts as an indicator of what to look at more closely

    Leave a comment:


  • scooterscot
    replied
    Originally posted by NickFitz View Post
    As GCHQ tap all the routes out of the UK and pass the data to the NSA, you'll need to move to Norway along with your data
    Ah but I'm not in the UK :O)

    In any case communications are encrypted.

    Leave a comment:


  • NickFitz
    replied
    As GCHQ tap all the routes out of the UK and pass the data to the NSA, you'll need to move to Norway along with your data

    Leave a comment:


  • MicrosoftBob
    replied
    Originally posted by scooterscot View Post
    As long as I can keep my Faraday underpants.
    C'mon the reality is more like this

    Leave a comment:


  • scooterscot
    replied
    Originally posted by minestrone View Post
    You need to take the tin foil hat off.
    As long as I can keep my Faraday underpants.

    Leave a comment:


  • minestrone
    replied
    You need to take the tin foil hat off.

    Leave a comment:


  • scooterscot
    replied
    Originally posted by MicrosoftBob View Post
    The only way to keep data secure is to never connect to a network of any kind and never connect any device to it

    Relying on anything else to be private is a fools game, especially if you think the US or anyone else will respect Norwegian Privacy laws
    Agreed. However the need exists. Also data held in Norway is unlikely to be so easily accessed as that kept in the US. Especially encrypted data.

    Leave a comment:


  • MicrosoftBob
    replied
    The only way to keep data secure is to never connect to a network of any kind and never connect any device to it

    Relying on anything else to be private is a fools game, especially if you think the US or anyone else will respect Norwegian Privacy laws

    Leave a comment:

Working...
X