Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/2/2006
05:16 PM
Bob Evans
Bob Evans
Commentary
50%
50%

The Surveillance Society: It's Closing In!

Sorry 4 typos but I know they're watching--always suspected it but just got confirmation from Reuters news story saying US and UK r as oppressive as China and Russia in terms of spying on citizens--I hear footsteps and know they're coming for me cause I'm speaking out!!

Sorry 4 typos but I know they're watching--always suspected it but just got confirmation from Reuters news story saying US and UK r as oppressive as China and Russia in terms of spying on citizens--I hear footsteps and know they're coming for me cause I'm speaking out!!Be4 they take me remember that their eyes and ears are everywhere: credit cards, computers, mobile phones, security cameras, cars, planes, airports, schools, refrigerators, stores, banks, grocery stores, police cars, polling places, lawn mowers, and garbage bags--everything is bugged!!

Courageous holy warriors at Privacy International spoke this noble truth to big-brother power and since their two leading sources of $$$ are The Soros Foundation and the ACLU (fourth section down under "Structure and Finances"), well, then we know it's true, right?? And we know we can trust Reuters cause they're the ones who said "One man's terrorist is another man's freedom fighter"--that's what we all believe, right? So if I escape capture, I am launching top-secret underground group called StoneTablet--no computers, no Internet, no databases and that means NO SURVEILLANCE!

Join me in creating this new future for the UK and US so we stop being as bad as China and Russia--will be back later with contact info (no website or phone; only cave address) cause I hear footsteps and know they're coming 4 me!!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
Google Adds More Security Features Via Chronicle Division
Robert Lemos, Contributing Writer,  2/25/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9431
PUBLISHED: 2020-02-27
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
CVE-2020-9432
PUBLISHED: 2020-02-27
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9433
PUBLISHED: 2020-02-27
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9434
PUBLISHED: 2020-02-27
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-6383
PUBLISHED: 2020-02-27
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.