The Naked Scientists
  • Login
  • Register
  • Podcasts
      • The Naked Scientists
      • eLife
      • Naked Genetics
      • Naked Astronomy
      • In short
      • Naked Neuroscience
      • Ask! The Naked Scientists
      • Question of the Week
      • Archive
      • Video
      • SUBSCRIBE to our Podcasts
  • Articles
      • Science News
      • Features
      • Interviews
      • Answers to Science Questions
  • Get Naked
      • Donate
      • Do an Experiment
      • Science Forum
      • Ask a Question
  • About
      • Meet the team
      • Our Sponsors
      • Site Map
      • Contact us

User menu

  • Login
  • Register
  • Home
  • Help
  • Search
  • Tags
  • Recent Topics
  • Login
  • Register
  1. Naked Science Forum
  2. Non Life Sciences
  3. Geek Speak
  4. Candestine viewing
« previous next »
  • Print
Pages: [1]   Go Down

Candestine viewing

  • 3 Replies
  • 5627 Views
  • 0 Tags

0 Members and 2 Guests are viewing this topic.

Offline syhprum (OP)

  • Naked Science Forum King!
  • ******
  • 5198
  • Activity:
    0%
  • Thanked: 74 times
Candestine viewing
« on: 07/03/2010 13:06:36 »
In the extremely unlikely event that I wanted to view pictures of children involved in sexual activities or instructions on how to make bombs that could kill Americans is there any way I could do this so that when the police smashed their way in at 3am and took my computer they could find no evidence of this.
Logged
 



Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Candestine viewing
« Reply #1 on: 07/03/2010 14:39:42 »
Apparently they use someone else's computer ...

Quote
Talk about horrifying: A growing trend in the computer malware world involves viruses and other exploits that turn your PC into an unwitting haven for child pornography.

For hackers, it makes perfect sense to hijack other people's computers to do their dirty work for them. Even a hint of underage pornography on a computer can lead to serious consequences for those caught with it, so why not just infect someone else's machine and store your illegal stash there
http://tech.yahoo.com

 [:0]

So more than your bank account is at stake if you don't keep your computer virus-free.

BTW the old bill need not break down your door, they just get need to get past your firewall ...

Quote
the need for ... law enforcement agencies to be able to conduct online searches of suspects' hard drives using Trojan Horse spyware,
http://gizmodo.com
« Last Edit: 07/03/2010 15:21:26 by RD »
Logged
 

Offline LeeE

  • Naked Science Forum King!
  • ******
  • 3382
  • Activity:
    0%
  • Thanked: 3 times
    • Spatial
Candestine viewing
« Reply #2 on: 08/03/2010 11:07:46 »
Quote from: syhprum on 07/03/2010 13:06:36
In the extremely unlikely event that I wanted to view pictures of children involved in sexual activities or instructions on how to make bombs that could kill Americans is there any way I could do this so that when the police smashed their way in at 3am and took my computer they could find no evidence of this.

It is impossible to answer questions like this without running the risk of being accused of encouraging people to commit crimes, or aiding & abetting them in doing so.
Logged
...And its claws are as big as cups, and for some reason it's got a tremendous fear of stamps! And Mrs Doyle was telling me it's got magnets on its tail, so if you're made out of metal it can attach itself to you! And instead of a mouth it's got four arses!
 

Offline syhprum (OP)

  • Naked Science Forum King!
  • ******
  • 5198
  • Activity:
    0%
  • Thanked: 74 times
Candestine viewing
« Reply #3 on: 08/03/2010 13:34:41 »
My interest is of course purely academic, but I appreciate the problem of trying to discuss these matters.
One could of course encrypt all the files but I am sure it would not take interrogators long to 'coax' the passwords from me.
I had similar problems when I tried to discuss the cost of weapons grade U235 on another forum.
The idea of using Trojans to store the files on other computers seems a good idea provided one is completely amoral but I wonder to what degree it is untraceable.
The main purpose of this post was to provoke discussion as to what degree of privacy and anonymity the use of cloud computing and similar techniques would provide, reading thru the posts on the subject it seems very little!.
I am reminded of our wartime efforts to keep the development of the cavity magnetron from the Germans despite the fitting of explosive charges into the radar sets supposedly to destroy them it was not long before Siemens were producing copies. 
« Last Edit: 08/03/2010 20:41:16 by syhprum »
Logged
 



  • Print
Pages: [1]   Go Up
« previous next »
Tags:
 
There was an error while thanking
Thanking...
  • SMF 2.0.15 | SMF © 2017, Simple Machines
    Privacy Policy
    SMFAds for Free Forums
  • Naked Science Forum ©

Page created in 1.698 seconds with 37 queries.

  • Podcasts
  • Articles
  • Get Naked
  • About
  • Contact us
  • Advertise
  • Privacy Policy
  • Subscribe to newsletter
  • We love feedback

Follow us

cambridge_logo_footer.png

©The Naked Scientists® 2000–2017 | The Naked Scientists® and Naked Science® are registered trademarks created by Dr Chris Smith. Information presented on this website is the opinion of the individual contributors and does not reflect the general views of the administrators, editors, moderators, sponsors, Cambridge University or the public at large.