Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Americans are generally psychotic (Score 1) 542

by meridian (#36794966) Attached to: Mass Psychosis In the USA?
Here is my tinfoil hat statement: Al Jazeera has become quite different over the last 24 months. I believe this is an attempt to start a media campain by big brother media to negate the rise in people reporting remote neural monitoring and synthetic telepathy cases which are meant to mimic the symptoms of psychosis. They are using Al Jazeera as "people trust al jazeera" to not be a puppet of big media which I now suspect they are.
http://www.mindjustice.org/
http://geeldon.wordpress.com/
http://en.wikipedia.org/wiki/Jared_Lee_Loughner

Comment: Re:Yay we "won" (Score 1) 456

by meridian (#36148934) Attached to: The Cost of US Security
Fear of our privacy? Privacy is gone already, for some unlucky few completely. Tried posting this up at http://www.infowars.com/beware-lone-wolves-in-aftermath-of-bin-laden-killing-advisory-says/ where a few others were mentioning they are aware of remote neural monitoring. Unfortunately it is real and affect more and more people.
The best description of what it is like I have found here: http://www.mindjustice.org/2003_survey.htm
Start from “Reported mind control symptoms and descriptions include”
I will paste snips below for your enjoyment (ones that I personal identify with strongly):

Victims are subjected to various kinds of harassment and torture, twenty-four hours a day, seven days a week, for years on end.

Sometimes victims describe seeing the images of projected holograms. Thoughts can be read. Most victims describe a phenomenon they call “street theater.”

Note: for me street theatre only happened at the start to make me convinced everyone knew I was this person like that dumb movie where everyone watches your life. Took me some time to figure out the truth.

Implanted thoughts and visions are common.

Note: this is only happening to me recently, but I find these easy to identify and they only happen when I am in bed at home (in a place easy for them to control my surroundings)

Microwave hearing, known to be an unclassified military capability of creating voices in the head, is regularly reported.

Wrenching of house/building structures cause loud snapping or crackling noises, often heard at precisely the point where a victim is starting to doze off to sleep.

Note: used to stop you getting sleep or wake you up to limit your sleep and the main mode of torment they use on you once you realise what is going on and can somewhat defend your self mentally from the other attacks

Victims regularly report many types of bizarre and harassive remote manipulation of electrical equipment, phone, car, TV, and computers.

Note: I’ve found it takes them around 2 weeks to make a new modified version of any electronics I buy that assist me in trying to prove they are doing this unless I carry them on me 24 hours a day (such as mp3 player to play soft music while i sleep and a second to record any strange noises)

Hard to believe I know. Consider that the technology you see mostly is what is cheap enough to be consumerable... and that the secret state is somewhere from 10 to 25 years ahead of "known" science in these fields...

Comment: Voicebox Tapping (Score 1) 295

by meridian (#28686025) Attached to: Hackers' Next Target — Your Brain?
I think it is possible that one of the first "brain hacking" technologies will actually be to do with the voicebox as this will likely be simpler than working out different peoples brain structures.
Everyones voicebox works essentially the same and when thinking words signals are sent to the voicebox that are the same as but not as strong as the sigtnals used to cause speech.
Nasa already have this working for astronauts for speechless communication in space. See here
I think technologies to be able to monitor human thought to be quite scarey and quite useful at the same time. A device that could be placed inside someones throat and self powered somehow may be a deffinate big brother style thing, but it would be great to see this used for good purposes such as monitoring what politicians think when creating laws in parliment.
It just depends on the application.

Comment: Rebuke the M$ sales man with what they might buy (Score 1) 674

by meridian (#26811237) Attached to: How To Argue That Open Source Software Is Secure?
Considering they are coming from an uninformed "I will believe the big company when it speaks" paradigm, you could come back with "Well, you may want to consider that Cisco Intrusion Detection Systems have been based on Linux for years and they have even started using Linux for the OS for thier Firewalls and new switches, as well as the Opensource Antivirus ClamAV as part of the Desktop security solution 'Cisco Security Agent'".... While the statements itself say nothing regarding the security of these products it certainly is attacking the mindset of the purchasing goons for your company with something they will relate to. Disclaimer: Yes I do work for Cisco.

Comment: Blue Pill (Score 1) 105

by meridian (#26355533) Attached to: Researchers Hack Intel's VPro
I believe this is based on the Blue Pill attack (from the same person) which essentially is a hypervisor that mimics the underlying system to gain access to the encryption keys. The flaws in the attack are that it is complicated to fully mimic the underlying hardware in software, the main drawback being that the timings by the hardware would be out due to the software hypervisor layer and this may be detected by the underlying OS or software running underneath the hypervisor. However it may be possible to write a hypervisor that takes all things into account but this would be quite an extensive task. ie. it is quite complicated to do properly but fesible (from what I have read). Mimicing the underlying system and the software interface to this via a hypervisor would allow access to the encryption keys. The article says basically "this is first stage attack, will produce stage 2 when intel responds to this" so they obviously have not completed the extensive programming task to take all things into account. Intel have known about this issue for some time as I asked one of their lead engineers the question a few months back if Trusted Execution was known to be totally secure and he basically said that theoritically it could be broken and told me to google "blue pill".

Be sociable. Speak to the person next to you in the unemployment line tomorrow.

Working...