| Author | Thread | 
		
			| 
				
										
			 | 
			
01/01/2014 11:49:55 AM · #1			 | 
		
		We all remember the furor about NSA intercepting communications, right? That's just the tip of the iceberg, apparently:
 
 Check this out for an overview.
 
 How about intercepting laptops ordered online and installing spyware?
 
 Incredible! |  
  | 
		
			| 
				
										
			 | 
			
01/01/2014 12:14:13 PM · #2			 | 
		
		Incognito told us about that awhile ago:
 
 *You've gone incognito*. Pages you view in this window won't appear in your browser history or search history, and they won't leave other traces, like cookies, on your computer after you close *all* open incognito windows. Any files you download or bookmarks you create will be preserved, however.
 *Going incognito doesn't affect the behavior of other people, servers, or software. Be wary of:*
 
    * Websites that collect or share information about you
    * Internet service providers or employers that track the pages you visit
    * Malicious software that tracks your keystrokes in exchange for
      free smileys
    * Surveillance by secret agents
    * People standing behind you
  |  
  | 
		
			| 
				
										
			 | 
			
01/01/2014 12:31:04 PM · #3			 | 
		
		agency should be renamed to NPCA ( National Privacy Compromising Agency )...
 
  |  
  | 
		
			| 
				
										
			 | 
			
01/01/2014 12:31:21 PM · #4			 | 
		
		| Wendy, what's your point? We shouldn't be bothered that our government is intercepting mail-order hardware and installing malware and trackers and such on it before sending it on its way, for example? |  
  | 
		
			| 
				
										
			 | 
			
01/01/2014 12:35:34 PM · #5			 | 
		
		Originally posted by Bear_Music:   Wendy, what's your point? We shouldn't be bothered that our government is intercepting mail-order hardware and installing malware and trackers and such on it before sending it on its way, for example?  |   
 
 I was teasing.
 
 Incognito was teasing (hopefully).
 
 But prescient.
  |  
  | 
		
			| 
				
										
			 | 
			
01/01/2014 12:43:39 PM · #6			 | 
		
		from what i read,  they were intercepting hardware on its way to 'suspect' individuals.  but the definition of 'suspect' hasn't been clarified to my liking yet.
 
 //leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/ |  
  | 
			Home -
			
Challenges -
			
Community -
			
League -
			
Photos -
			
Cameras -
			
Lenses -
			
Learn -
			
			
Help -
			
Terms of Use -
			
Privacy -
			
Top ^
		DPChallenge, and website content and design, Copyright © 2001-2025 Challenging Technologies, LLC.
		
All digital photo copyrights belong to the photographers and may not be used without permission.
		
Current Server Time: 11/03/2025 08:23:51 PM EST.