General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsNSA likes Cookies as much as Cookie Monster -
If you run a computer that is hooked into the internet, then the NSA may be interested in you, especially if any cookies of your Tweets, FB posts etc have triggered such interest on their part:
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
From the article:
Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale seems very disturbing. Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.
The thing that raises a red flag for me is the reference to network choke points, he says. Thats the last place that we should be allowing intelligence agencies to compromise the infrastructure because that is by definition a mass surveillance technique.
To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.
The agencys hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.
hootinholler
(26,449 posts)Is meaningless. There are no such things. Cookies track state of a session with a web server, primarily your credentials. If you have the right cookie, you can do stuff. The man in the middle attack can then leverage that with the server, or feed you other cookies which may open up vulnerabilities on your machine because you trusted the server you think you are interacting with.
If you give a spook a cookie, he's gonna want your packets.
truedelphi
(32,324 posts)The statements I am reading in connection with the article I posted had to do with how if you are on a computer/internet session, and you (for instance) Retweet Roseanne Barr's tweet about legalizing hemp, then the word hemp in her tweet could be hooked into the code tracking the NSA is employing.
Is tracking in that manner a possibility or not? And if not, why not?
hootinholler
(26,449 posts)Depending on the investment made in the sophistication of the 'middle man' software. In theory it could block your re-tweet and make it appear to you that it went out just fine, or edit your re-tweet to make you look foolish.
So tracking via these methods is a closer scrutiny than simply monitoring all traffic going across a network node.
It's not cookie manipulation doing that, was my point.
truedelphi
(32,324 posts)I think I knew it was more than mere cookie manipulation, but I no longer have access to some of the finer minds in computers. (Cancer having taken two such friends.) Good to know such people like yourself are on DU.
hootinholler
(26,449 posts)I've just been around a long time in computer years, like 3000 or so, assuming our year is 100 computer years.
Actually, having skimmed the article, I don't think cookies are involved in these techniques at all.
Pholus
(4,062 posts)Total hoovering of our online lives is just a way for the BFEE to make mo money.
truedelphi
(32,324 posts)Backs in other areas of our lives, she said sardonically.
NuclearDem
(16,184 posts)But I got a BRILLIANT name for a registry cleaner/optimizer.
truedelphi
(32,324 posts)Would be a clever name for such a product.
WillyT
(72,631 posts)idendoit
(505 posts)Warren DeMontague
(80,708 posts)Potheads like cookies, so cookies would be a logical thing to help the DEA figure out where to send the SWAT team, to arrest the cookie-eating pot smoker.
truedelphi
(32,324 posts)Before they serve as evidence against me!
Warren DeMontague
(80,708 posts)The important thing to remember is that these extra constitutional powers are ONLY being used in extreme circumstances, so for instance when the DEA falsifies the evidence trail in the case of one of the many extremely dangerous cancer grannies being dragged to prison for eating a pot brownie, they are doing so to to keep you safe!