Hacker Newsnew | comments | show | ask | jobs | submit login

So after reading that article, if I were a protestor or insurgent; I would be thinking about how to feed false information to these surveillance systems. For instance creating ghost marches; or faking mandatory response incidents in ways that are likely to get innocent bystanders beaten up or shot by the security services.

Anytime you have a fast feedback loop like this, you're going to be getting a lot of noise and a fair amount of disinformation.

Imagine a scenario in which Anonymous is sending out several hundred messages in multiple formats describing an incident in which "Just saw a guy in a suit shoot a cop at Xth and XXX" features prominently. Especially if police communications were being selectively disrupted at the same time...




I've been wondering about this for a while but here it goes:

- what if every medium sized website (in terms of traffic: 1k pageviews per day), injected background ajax calls for google queries about any number of sensitive issues topics?

- what if those same websites used this link[0] or similar for other major services in ajax calls/or iframe with click jacking to send emails on behalf of people which included sensitive information?

I wonder what that topology would look likeā€¦

[0]: https://mail.google.com/mail/?ui=2&view=cm&fs=1&tf=1&shva=1

-----


There's a roughly similar browser extension called "Track Me Not". I have no idea if it's any use. I've been told that it's trivially easy to filter this kind of noise.

http://trackmenot.org/

https://cs.nyu.edu/trackmenot/

-----


If one would consider all the traffic noise, then I can see it being trivially easy (since the traffic would look so much different from everything else), but what if it contained some that weren't really noise? Like if someone piped the output to a database anyone could access?

What about for the emails?

-----




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: