The Dink Network

Reply to Re: Millimeter talks about copyright

If you don't have an account, just leave the password field blank.
Username:
Password:
Subject:
Antispam: Enter Dink Smallwood's last name (surname) below.
Formatting: :) :( ;( :P ;) :D >( : :s :O evil cat blood
Bold font Italic font hyperlink Code tags
Message:
 
 
January 10th 2016, 01:42 PM
dinkdead.gif
millimeter
Peasant He/Him Canada
Millimeter is Wee-Lamm, Recording Artist. :-) 
Data:

The digital gyroscope present on mobile devices is a known point of intrusion. As a transmitter/receiver...
A gyroscope is a sensor that measures orientation.

The gyroscope beacons a signal which is returned from neighboring cellular antenna. Using 3 towers in a triangle arrangement, measuring the distance from each one the middle can be identified, which is the location of the "transmitter/Receiver" which is the Gyroscope. I am not suggesting it is a potential access point, I am saying it is a known circumvention point.


the average user is more likely to use "open source", simply to rebel against Corporate monopoly.
That is not my impression. Personally, I use it because I want to be in control of my computer.

You are not in the majority group, which is the average user. Most people don't care if they are in control of their computer or not. They may be offended if they believe somebody else is controlling or invading their system but as long as it does what they expect it to do, when they click, they don't care about anything else going on.

What percentage of open source distribution occurs over P2P networks
My guess is approximately 0%.


http://www.ubuntu.com/download -Alternate download includes Torrents, which are P2P.
https://www.debian.org/CD/torrent-cd/

2 to start. I won't say these are risky, but certainly they are P2P.
I think you may be confused about the terminology.
I played the Lord11 Door game at 14,400 Dial-up on several BBS. I'm sure I get get confused about some things, but I've been around awhile.

What are you trying to protect against?
I work in IT, Intrusion Detection is a small part of the scope of my current responsibilities. My younger brother is also CEO of Lyrical security.

No, I am not ranting on about the boogey man trying to hack into my computer. As I mentioned, they would first have to know I exist, believe I had something worth taking, then locate my system. Encryption is functional in slowing down the speed at which a file integrity can be circumvented. PGP seems to still be the leader in this front, even after 25+ years, and it was still freeware last time I checked and I believe it too is open source.