Free Republic
Browse · Search
News/Activism
Topics · Post Article

outsiders can easily infiltrate a user’s machine to monitor Internet activity, steal personal data or plant destructive viruses, experts who have studied the program say.

The outsiders in this case are Big Brothers, Chinese State Security. So this is not much of the problem to Chinese regime. They do want to "monitor Internet activity, steal personal data or plant destructive viruses."

1 posted on 06/13/2009 7:35:20 AM PDT by TigerLikesRooster
[ Post Reply | Private Reply | View Replies ]


To: TigerLikesRooster; maui_hawaii; Jeff Head; Tainan; hedgetrimmer; Unam Sanctam; taxesareforever; ...

Ping!


2 posted on 06/13/2009 7:35:55 AM PDT by TigerLikesRooster (LUV DIC -- L,U,V-shaped recession, Depression, Inflation, Collapse)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster
The outsiders in this case are Big Brothers, Chinese State Security. So this is not much of the problem to Chinese regime. They do want to "monitor Internet activity, steal personal data or plant destructive viruses."

This filtering will soon to be mandated by Obama's own Cyber-Czar!

3 posted on 06/13/2009 7:38:10 AM PDT by Erik Latranyi (Too many conservatives urge retreat when the war of politics doesn't go their way.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Exactly.


4 posted on 06/13/2009 7:39:04 AM PDT by BenLurkin
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster; ShadowAce; Swordmaker; Ernest_at_the_Beach; Las Vegas Dave
Filtering software that the government has mandated for all new computers in China is so technically flawed that outsiders can easily infiltrate a user's machine to monitor Internet activity, steal personal data or plant destructive viruses, experts who have studied the program say.
Thanks TigerLikesRooster.
14 posted on 06/15/2009 7:19:07 AM PDT by SunkenCiv (https://secure.freerepublic.com/donate/__Since Jan 3, 2004__Profile updated Monday, January 12, 2009)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster; rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; ...

15 posted on 06/15/2009 7:25:41 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

The Chinese government/military can use this to conscript every personal computer in the country into a botnet that can be used for cyberwarfare.


16 posted on 06/15/2009 7:30:46 AM PDT by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster; ShadowAce

Our neighborhood had a series of strange off-again, on-again power outages at about this time last year. Had to wonder if some grid hackery wasn’t going on.


17 posted on 06/15/2009 7:37:06 AM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

bump to the top


19 posted on 06/15/2009 8:11:04 AM PDT by GOPJ (Main Stream Media (MSM) Renamed: Ministry of Truth (MOT) - -"Freedom is Slavery")
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson