Author Topic: Agent Jones, Dave Jones  (Read 2392 times)

0 Members and 1 Guest are viewing this topic.

Offline McMonsterTopic starter

  • Frequent Contributor
  • **
  • Posts: 413
  • Country: pl
    • McMonster's blog
Agent Jones, Dave Jones
« on: January 13, 2013, 08:35:23 am »
http://www.news.com.au/technology/spy-agency-asio-wants-powers-to-hack-into-personal-computers/story-e6frfro0-1226552661701

Who knows, maybe recent problems with the website are the result of Dave being already employed in a spy agency, even if he doesn't know it? ;)
 

Offline EEVblog

  • Administrator
  • *****
  • Posts: 37740
  • Country: au
    • EEVblog
Re: Agent Jones, Dave Jones
« Reply #1 on: January 13, 2013, 08:57:51 am »
Good luck with them getting that one through.

Dave.
 

Offline SeanB

  • Super Contributor
  • ***
  • Posts: 16284
  • Country: za
Re: Agent Jones, Dave Jones
« Reply #2 on: January 13, 2013, 09:12:20 am »
The Germans did this and a whole lot of police were fired over it, the storm is still brewing over it there. You then will have a unbreakable defence against any thing on your computer:- that the ASIO must have placed it there, they will be unable to deny.
 

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Agent Jones, Dave Jones
« Reply #3 on: January 13, 2013, 11:30:32 am »
It so easy & simple to prevent this, just stop being uncle sam's puppy, then all this stupid things become unnecessary and pointless.

Offline Sionyn

  • Frequent Contributor
  • **
  • Posts: 848
  • Country: gb
Re: Agent Jones, Dave Jones
« Reply #4 on: January 13, 2013, 12:20:25 pm »
there afgter the plans for dave power supply and calculator :P
eecs guy
 

Offline G7PSK

  • Super Contributor
  • ***
  • Posts: 3861
  • Country: gb
  • It is hot until proved not.
Re: Agent Jones, Dave Jones
« Reply #5 on: January 13, 2013, 04:44:29 pm »
All very well, but it's more than likely that the ASIO will cover it's tracks until the last computer in the chain before the target one, the Terrorists will find the apparent computer that hacked theirs and go round and put a bomb under the poor bastard that owns it or shoot them.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf