added logos + explicative videos for phones

This commit is contained in:
nihilist 2024-07-28 10:33:15 +02:00
parent 7b509c6c27
commit f30e09723f
3 changed files with 8 additions and 5 deletions

View File

@ -122,9 +122,11 @@ Law enforcement is the activity of some members of government who act in an orga
</pre></code> </pre></code>
<p>For the Law to be enforceable the authorities need to know 2 things: </p> <p>For the Law to be enforceable the authorities need to know 2 things: </p>
<ol> <ol>
<li>What happened? (lack of privacy)</li> <li><p><img src="../su2.png">What happened ? (lack of Privacy)</p></li>
<li>Who did it? (lack of anonymity)</li> <li><p><img src="../on2.png">Who did it ? (lack of Anonymity)</p></li>
</ol> </ol>
</br>
<img src="3.png" class="imgRz"> <img src="3.png" class="imgRz">
<p>Of course, the law must not be ignored by anyone, and to make sure that everyone is kept in line, they need to show everyone that the law is effectively enforced onto those that behaved badly, very often they brag about catching criminals to let everyone know that they are the good guys protecting everyone from the bad guys.</p> <p>Of course, the law must not be ignored by anyone, and to make sure that everyone is kept in line, they need to show everyone that the law is effectively enforced onto those that behaved badly, very often they brag about catching criminals to let everyone know that they are the good guys protecting everyone from the bad guys.</p>
<p>That is the basis of this whole Privacy and Anonymity talk. In short, For the law to be enforceable, they need to know both what happened, and who perpretated the act to be able to apply sanctions on the individual / group of individuals that commited the crime.</p> <p>That is the basis of this whole Privacy and Anonymity talk. In short, For the law to be enforceable, they need to know both what happened, and who perpretated the act to be able to apply sanctions on the individual / group of individuals that commited the crime.</p>

View File

@ -79,10 +79,11 @@
<p>Naturally, law enforcement agencies LOVE to keep their hands on this data. They use it all the time. For example, <b>all it takes for LE to figure out who has been in a public protest is to record the protesters up close, while keeping track of the current time.</b> Then, if any of the protesters did anything illegal out there, <b>they can know who did the act by simply looking at which simcards were at the exact same time, at the exact same place.</b></p> <p>Naturally, law enforcement agencies LOVE to keep their hands on this data. They use it all the time. For example, <b>all it takes for LE to figure out who has been in a public protest is to record the protesters up close, while keeping track of the current time.</b> Then, if any of the protesters did anything illegal out there, <b>they can know who did the act by simply looking at which simcards were at the exact same time, at the exact same place.</b></p>
<p>As we discussed <a href="../governments/index.html">previously</a> for the law to be respected, it needs to be enforced. And to be enforced, the authorities need to know:</p> <p>As we discussed <a href="../governments/index.html">previously</a> for the law to be respected, it needs to be enforced. And to be enforced, the authorities need to know:</p>
<ol> <ol>
<li><p>What happened ? (lack of Privacy)</p></li> <li><p><img src="../su2.png">What happened ? (lack of Privacy)</p></li>
<li><p>Who did it ? (lack of Anonymity)</p></li> <li><p><img src="../on2.png">Who did it ? (lack of Anonymity)</p></li>
</ol> </ol>
<p>That's why protesters make the conscious choice to not go out to protest with their phones in their pockets, as they can get deanonymized very easily while wearing them. </p> <p>That's why protesters make the conscious choice to not go out to protest with their phones in their pockets, as they can get deanonymized very easily while wearing them. </p>
<p>Because Simcards are actively used by Law Enforcement to know what is the location of a particular phone number is <a href="https://iv.datura.network/embed/wzSgLpNrr2E">using tools like StingRay II</a>, but not only them, <b>every cellular provider also knows the location (up until present moment) of every phone number, <a href="https://4n6.com/cell-phone-triangulation/">thanks to cellular triangulation</a>.</b></p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View File

@ -88,7 +88,7 @@
<div class="row"> <div class="row">
<div class="col-lg-8 col-lg-offset-2"> <div class="col-lg-8 col-lg-offset-2">
<h2><b>The Enemy of Privacy is Surveillance</b></h2> </br> </br> <h2><b>The Enemy of Privacy is Surveillance</b></h2> </br> </br>
<p>Make no mistake, as we discussed <a href="../govfear/index.html">previously</a>, governments NEED surveillance to be able to fulfill the first condition to be able to enforce their laws: <b>They need to know what happened.</b> To be able to know what happened, <b>they need surveillance to be implemented wherever they can</b>, and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. </p> <p>Make no mistake, as we discussed <a href="../govfear/index.html">previously</a>, governments NEED surveillance to be able to fulfill the first condition to be able to enforce their laws: <img src="../su2.png"><b>They need to know what happened.</b> To be able to know what happened, <b>they need surveillance to be implemented wherever they can</b>, and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. </p>
<p>Yes, ANY company can act on any government's behalf. Take for example Microsoft spying on everyone through their <a href="../closedsource/index.html">closed source</a> software Windows 10, or Apple spying on their users through their MacOS closed-source software, The US government is very open about it (see <a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">FISA 702</a>).</p> <p>Yes, ANY company can act on any government's behalf. Take for example Microsoft spying on everyone through their <a href="../closedsource/index.html">closed source</a> software Windows 10, or Apple spying on their users through their MacOS closed-source software, The US government is very open about it (see <a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">FISA 702</a>).</p>
<p>In this current world we live in, Surveillance is nearly omnipresent, where there is a business involved, and especially closed-source software, Surveillance is right there.</p> <p>In this current world we live in, Surveillance is nearly omnipresent, where there is a business involved, and especially closed-source software, Surveillance is right there.</p>
<img src="../opsec/4.png" class="imgRz"> <img src="../opsec/4.png" class="imgRz">