Artifact Content
Not logged in

Artifact fae9e6a52958ff1e2f340abfa37090407ee3688d:

Wiki page [Project Risks] by martin_vahi on 2016-07-04 21:27:21.
D 2016-07-04T21:27:21.482
L Project\sRisks
P 90d4af887182f877730f47686b06a3e58e000299
U martin_vahi
W 5566
<p></p>

<div>Encryption is not
<a href="http://archive.softf1.com/2015/2015_xx_xx_British_Prime_Minister_David_Cameron_Wants_to_ban_Proper_Cryptography.webm">outlawed</a>,
but P2P technology is outlawed and the encrypted P2P data streams are
blocked/banned or require licensing.&nbsp;<i>(The majority of the people just
accept whatever is coming to them. That fact alone guarantees that if the
P2P-ban is applied before the passive masses start to depend on it in their
daily lives, then any attempt to explain that the world could be different if
there were no P2P-ban, is a totally lost battle. The possibility to "license" a
P2P-protocol allows Skype to continue working, while allowing BitTorrent and
Tor to be banned. Games can reroute their updates through Skype and the
"license" of the Skype P2P protocol requires Skype to apply state censorship to
whatever is being routed through Skype.)</i></div>

<div><br>
</div>

<div><b>Countermeasures: create private physical networks that do not depend on
traditional Internet Service Providers (ISP-s). As those will also probably be
outlawed or bugged by law, just like the 2016 traditional ISP-s are bugged, the
private physical networks have to be made very mobile and dynamic, so that they
can quickly launch and disappear "without a trace" and the connectivity is
provided by a probabilistic connection. The more private networks there are,
the greater the uptime of the probabilistic connection. Steganography might
also work, until the steganography counter-measures reduce the service quality
of various channels like the copyright law has reduced the service quality of
many 2016 online applications.</b><br>
</div>

<div><br>
</div>

<div><br>
</div>

<div>

<div>Computers of developers are compromised, so that the project deliverables
contain malware or the project deliverables lack proper security measures.&nbsp;</div>

<div><br>
</div>

<div><b>Countermeasures: have backup copies at different machines, diff the
different backups and try to use the classical intrusion countermeasures.</b></div></div>

<div><b><br>
</b></div>

<div>

<div><br>
</div>

<div>Developers get killed or tortured by the CIA or other agencies of various
supermafias. <i>(It does not even matter, if they do it secretly or &nbsp;totally
publicly, because the mobs just could not care less.)</i></div>

<div><br>
</div>

<div><b>Countermeasures are missing.</b> Usually the super-mafiosi, the
professional politicians, do not care about civil liberties or human rights, as
long as their salary is good and job secure and their job will always be
secure, because in Democracy the one with the greatest campaign budget wins.
However, there is a limit that the number of people working in the various
supermafia security agencies is a minority, which sets a limit, how much other
people they are able to kidnap and torture. Slaughterhouses for successfully
killing hens, chickens, have been developed by private sector, but an automated
torturing line, where people are tortured by robots like cars are manufactured
in car factories assumes an IT project and it takes a bit of preparation to get
it done and tested, so may be there could be some cooperation with private
security firms, who would mount a sabotage attack on the torture line and plain
physically blow up the equipment at the torturing plant. Most likely
countermeasures that can be retroactively applied is to mount an assassination
attack against the torturers/kidnappers and the political chain of command
that, if not ordered, then at least allowed it to happen out of neglect. <i>(The
purpose of the assassination attack is not retaliation, but temporary
disruption of enemy operations, like with bacteria, where the infection causing
bacteria are never removed totally from the blood stream, but their amount is
kept at a managable level. Preparations include good overview of the potential
adversaries, id est intelligence gathering must be done in advance, during
piece time.)</i>&nbsp;<font color="#ff0000">If You think that this text here is
a stretch, then please, please do try to remember, what other cases from the 2.
World War and later history sounded like a stretch at first glance, but ended
up being perfectly true.</font></div>

<div><br>
</div>

<div><br>
</div>

<div>Developers of censorship free communication tools are hunted down like
weapons manufacturers and drug dealers. (Think of China, Soviet Union, etc.).
The Estonian super-mafia treats Silktorrent developers as illegal weapons
manufacturers, because Siltorrent is a base technology for censorship free
communication and according to the
<a href="http://www.riigikohus.ee/?id=11&amp;tekst=RK/3-2-1-43-09">Delfi
eelnõu</a> all public forums that are published by Estonians, who do not
belong to the top of the super-mafia, are prohibited.&nbsp;</div>

<div><br>
</div>

<div><b>Countermeasures: legislation is always slower than technology
development, so the infrastructure must be completed and distributed before its
distribution and development becomes illegal.</b> If possible, make the
super-mafiosi themselves depend on those developers so that if they want to
compete with other super-mafiosi, they have to give the brightest of the
censorship free communication tools developers the freedom to operate, id est
the academic freedom topic, where the only reason, why universities have any
freedom at all is to avoid being out-competed by other super-mafiosi.&nbsp;<br>
</div>

<div><br>
</div>

<div style="font-weight: bold;"><br>
</div></div>
<ul>
</ul>

<p></p>

Z 64f6db9fdcef61bd5187ebce8c997077