Current Events > Twitter+Starlink Hypothesis

Topic List
Page List: 1
CobraGT
09/10/23 4:13:57 PM
#1:


I propose Musk is stealing ideas or selling surveillance.

When Twitter was active engineers would use the features to develop ideas in private. Starlink is used by corporations, universities and governments.

I propose that Musk is datamining them.

Disclaimer to the mods. I am not saying I know this.

I am only insisting that I am goddamn brilliant for pointing it out.

He is using those layers of nodes that they teach you about in data science courses. You know chatGPT, BARD, new BING? Calling it that Musk has data science graduates mining Twitter and Starlink for him.

---
GoldenSun/Crossbone Isle diagrams/ 18 teams known https://photobucket.com/u/SwordOfWheat/a/9990a2ee-25f3-4242-ae79-7d2d4b882be4
... Copied to Clipboard!
Trumble
09/10/23 4:43:24 PM
#2:


Twitter maybe, but it's very likely that he's not able to read a lot of what's transmitted via Starlink. Encryption is very common these days for internet traffic; almost universal, actually.

---
You can't spell Trumble without several letters of the English alphabet.
... Copied to Clipboard!
CobraGT
09/10/23 5:13:48 PM
#3:


@Trumble

I am thinking that this encryption key is delivered somehow. Do these organizations get all spy vs spy and use ninjas to deliver the keys? or do they use normal communications?

---
GoldenSun/Crossbone Isle diagrams/ 18 teams known https://photobucket.com/u/SwordOfWheat/a/9990a2ee-25f3-4242-ae79-7d2d4b882be4
... Copied to Clipboard!
Trumble
09/10/23 6:28:17 PM
#4:


CobraGT posted...
@Trumble

I am thinking that this encryption key is delivered somehow. Do these organizations get all spy vs spy and use ninjas to deliver the keys? or do they use normal communications?
They generally use what's called asymmetric cryptography, where the encryption key and decryption key are different and it's impossible (in practice at least) to figure one key out from the other.

Think of it like a door that needs one key to lock it, and a different key to unlock it. If you have the lock key and I have the unlock one, you can lock the door and be sure no one but me - not even yourself - can unlock it again. You could go further and give everyone a copy of the lock key so anyone can lock stuff behind the door for me, but I'm still the only one who can unlock it again. How this actually works for encryption gets into really complex maths that I don't fully understand either, but that's the basic concept. (This could work in reverse too, by having the lock key be secret and the unlock key public, in case you wanted anyone to be able to get things from the room while being sure that, if locked, only I could have been the one who locked them in there in the first place.)

---
You can't spell Trumble without several letters of the English alphabet.
... Copied to Clipboard!
CobraGT
09/10/23 7:43:40 PM
#5:


Yeah, back when video game companies and console developers set up the Wii and the PlayStation 3 to refuse game disks without the proper keys, we all learned this. We also learned how to bypass it. Yeah?

Even in cases where you do not have the key through snooping or through hiring an employee who has it you have a trained AI and large amounts of data.

Plus most times the key is sent over the Internet instead of delivered by ninjas.


---
GoldenSun/Crossbone Isle diagrams/ 18 teams known https://photobucket.com/u/SwordOfWheat/a/9990a2ee-25f3-4242-ae79-7d2d4b882be4
... Copied to Clipboard!
Pas5wordFAQ
09/12/23 4:50:11 PM
#6:


Aston Zhang has online texts on deep neural networks https://d2l.ai/ I cannot find the link but there is a copy to download provided by author

Neural Networks for a beginner (Part I: theory) | Steven Morse
https://stmorse.github.io/journal/Beginner-NN-Part-I.html

One man +eponymous graduate students broke the axis code. A deep neural should be able to if trained.

---
A Password FAQ for Golden Sun
... Copied to Clipboard!
Kloe_Rinz
09/12/23 4:53:29 PM
#7:


I doubt Starlink is any more likely to monitor your traffic than any other ISP
... Copied to Clipboard!
Questionmarktarius
09/12/23 4:54:35 PM
#8:


CobraGT posted...
I am thinking that this encryption key is delivered somehow. Do these organizations get all spy vs spy and use ninjas to deliver the keys? or do they use normal communications?
Simple https is enough to keep the ISP from seeing what your seeing.
DNS over https even keeps the ISP from knowing exactly where you're seeing it.
... Copied to Clipboard!
CobraGT
09/12/23 8:10:37 PM
#9:


Elon Musk can easily attract the engineering talent needed to steal info through Starlink. I seriously doubt that T-Mobile, Comcast or ATT could hire them without raising red flags.

The Ukraine incident could have been as simple as measuring traffic and determining from the volume that Ukraine is about to launch. This would still be a violation of privacy.

The biggest danger from Starlink imo is that all those satellites can jam communications.

Kloe_Rinz posted...
I doubt Starlink is any more likely to monitor your traffic than any other ISP


I doubt it even more than you do. They can read what I am up to on CE.

---
GoldenSun/Crossbone Isle diagrams/ 18 teams known https://photobucket.com/u/SwordOfWheat/a/9990a2ee-25f3-4242-ae79-7d2d4b882be4
... Copied to Clipboard!
Topic List
Page List: 1