Preacher: Can you read, my son?
Bubbles: Well that depends; can you go fuck yourself?
AssPennies
He's not our guy, buddy!
OSS’s Simple Sabotage Field Manual, 1944 (declassified)
Good memory, it was the precursor to the CIA.
OSS's Simple Sabotage Field Manual, 1944
There's a link at the top for the full pdf. And do note, OSS is Office of Special Services, the WWII precursor to the CIA - not Open Source Software lol.
Subterfuge at work, a fun subject to study.
Some of my favorites from a declassified WWII "simple productivity sabotage" manual:
-
Insist on doing everything through "channels." Never permit short-cuts to be taken in order to expedite decisions.
-
Make "speeches." Talk as frequently as possible and at great length. Illustrate your "points" by long anecdotes and accounts of personal experiences.
-
When possible, refer all matters to committees, for "further study and consideration." Attempt to make the committee as large as possible — never less than five.
-
Bring up irrelevant issues as frequently as possible.
-
Haggle over precise wordings of communications, minutes, resolutions.
-
Refer back to matters decided upon at the last meeting and attempt to re-open the question of the advisability of that decision.
-
Advocate "caution." Be "reasonable" and urge your fellow-conferees to be "reasonable"and avoid haste which might result in embarrassments or difficulties later on.
When I first saw these I was like goddamn, psyops got to my executive director!
I read about some smart tvs computing a hash of what's on screen to phone home about, in attempt with figuring out what content a user is watching when that content is 3rd party controlled.
We need some privacy laws up in this mother fucker.
No I hate MS. I won't ever forget the pain that was developing edge cases around Internet Explorer (fuck IE 6, that shit was the worst).
stupid clear background thing
In web design that's called a modal.
Fucking gyrenes, where'd all my crayons go?!
TempleOS has entered the chat.
They're things on the road that take you to your abode.
Depending on where you live, and where your service resides, this could be tricky.
In the US, for instance, if you've chosen a provider in Australia, then a FVEY agreement could be in place to share that data. This gets around the technicality that intel gathering is not occurring on US soil and is not being done by the gov.
And again with the US, if you've chosen a country that's not amiable to sharing user data, the US could very well be justifying that country as a target for pilfering data anyway.
So, that would leave choosing a service provider within the US, which should need to go through the FISA courts for any access to citizen data, but who knows after the Snowden revelations.
I guess that's the state of privacy if you've got a nation state that's targeted you for surveillance. Only way around it I can think of is data to be encrypted in transit and at rest, and only you control the keys. But that's not something that's going to happen with something like mainstream email anyway, too inconvenient for most folks (and you also don't know if your recipients are security conscious either).