Results 1 to 5 of 5

Thread: Invasion of privacy or fighting terror?

  1. #1
    Taz
    Taz is offline
    Senior Member Taz's Avatar
    Join Date
    Jan 2005
    Location
    London
    Posts
    2,152
    Thanks
    57
    Thanked
    29 times in 27 posts
    • Taz's system
      • Motherboard:
      • Gigabyte Z270 HD3P
      • CPU:
      • Intel Core i5 7600K
      • Memory:
      • Corsair CMK16GX4M2B3200C16R Vengeance LPX 16 GB
      • Storage:
      • Samsung 960 EVO M.2-2280 500GB (PCIe) + 1TB Sandisk Ultra II SSD (SATA)
      • Graphics card(s):
      • Asus NVIDIA GeForce GTX 1070 OC
      • PSU:
      • Corsair CS550M 550W Hybrid
      • Case:
      • NZXT Source 340
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • 34" Asus Designo Curve MX34VQ UWQHD Monitor
      • Internet:
      • Virgin Media M350

    Invasion of privacy or fighting terror?

    Internet use and phone records will be kept for up to two years across the EU under new EU legislation.

    Full story here: http://news.bbc.co.uk/1/hi/world/europe/4490936.stm

    "Police would have access to information about calls, text messages and internet data, but not exact call content."

    So, will this curtail terrorism or infringe our privacy?

  2. #2
    Senior Member UltraMagnus's Avatar
    Join Date
    Aug 2005
    Posts
    1,025
    Thanks
    24
    Thanked
    7 times in 7 posts
    terrorists arnt stupid, they will just encrypt their damny internet and phone comms, all it will do is invade privacy

  3. #3
    I shall never tire... BEANFro Elite's Avatar
    Join Date
    Jan 2004
    Location
    Surrey
    Posts
    1,596
    Thanks
    122
    Thanked
    30 times in 18 posts
    • BEANFro Elite's system
      • Motherboard:
      • Asus MAXIMUS IV EXTREME Rev.3.0
      • CPU:
      • Intel Core i7 2600K Sandy Bridge
      • Memory:
      • Corsair Memory Vengeance 8GB DDR3
      • Storage:
      • 240Gb RevoDrive 3 X2, 1x 1TB Maxter DiamondMax 11
      • Graphics card(s):
      • Sapphire ATi HD5970 3GB
      • PSU:
      • Coolermaster Silent Pro Gold 1000W Modular
      • Case:
      • Coolermater Cosmos Pure Black
      • Operating System:
      • Windows 7 Ultimate 64-bit
      • Monitor(s):
      • Dell 2209WA
      • Internet:
      • TalkTalk
    Quote Originally Posted by UltraMagnus
    terrorists arnt stupid, they will just encrypt their damny internet and phone comms, all it will do is invade privacy
    Ironically, encrypting emails etc. will only draw attention to oneself as Bush would probably say... "good people have nothing to hide"

  4. #4
    Senior Member specofdust's Avatar
    Join Date
    Jul 2005
    Posts
    794
    Thanks
    0
    Thanked
    0 times in 0 posts
    Yes but good enough encryption cannot be broken, so it makes no difference if you're a T and you encrypt, even if every supercomputer in the world was trying to break your encryption, from what I understand of it, there are some forms of encrpytion taht cannot be broken, at least not in any sane period of time(tens/hundreds of years).

    I've just started ignoring this stuff, its too horrible to think about all the time, and I know the way government is set up these days there isn't jack poop I can do about it.

  5. #5
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts
    encyrption methods are often more sumblime than to be easily noticed.

    Say to encrypt a text message. You could use a picture and a polynomial, to work out the values of the pixel, if you use a relative method (based on 2 pictures been sent) the casual observer won't notice any difference.

    Thats impratical for large data, and isn't that strong, but it won't be noticed by most.

    The thing is encrypted or not, people leave a pattern, just looking at my phone bill will tell you who my best friend is, the overlay the pattern of which cell sites are in use, you can pretty much determine when we've had a strop, when we've been planning something. Even if the calls were completely encypted.

    Think about it, i knew when my house mate's ex was giving him a hard time ending it. Based purely on the increased number of short communications. You'd be amazed what you can learn using some relativly shot (computaintional time wise) analysis.
    throw new ArgumentException (String, String, Exception)

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Google a threat to privacy?
    By Steve in forum HEXUS News
    Replies: 7
    Last Post: 31-07-2005, 04:48 PM
  2. Rome: Total War: Barbarian Invasion Expansion
    By Nick in forum HEXUS News
    Replies: 3
    Last Post: 06-07-2005, 02:02 PM
  3. Automated scanning of GMail - invasion of privacy?
    By Paul Adams in forum Question Time
    Replies: 9
    Last Post: 17-07-2004, 10:21 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •