amanfromMars 1 …. Mon 10 Feb 06:32  fighting back and fighting on and in-fighting on http://forums.theregister.co.uk/forum/1/2014/02/10/tuesday_declared_the_day_we_fight_back_against_nsa_et_al/ and not fighting at all really 🙂
Knock, Knock, Cheltenham ….. Is there Anybody Not Badly Programmed in there? Any Big Thinkers and Virtual Tinkerers?
Nice to see El Reg doing its thing for AIMeritocracy and becoming an Informed Target of Advanced Interest to GCHQ Intelligence Community Enterprises, unpeopled and disinfested with MAD Muppet Master Blasters?
Do Special Information Services Secreting Sublimely Intelligent Sources lead with seconded third party politicians following prepared scripts or do they and the mad and the bad and the rad and the sad go rogue and renegade and wander off piste and reservation in search of personal enrichment and chaotic excitement elsewhere, and utilise media waves and communications chunnels to present an individually subverted and perverted future tomorrow which begins with the manipulated news of today …….. and would such SISSSIS be a national intelligence asset or internetional field force?
And that question to whoever is charged and/or presumes to supply Blighty and Britannia her leading intelligence community wares.
cc COBRA re Virtual Strike Force Engagement Fight Back and Fighting Back with Black Watch Servers in the Sunny Shade of Dark Web Shadow.
It never rains but it pours in a biblical flood and to fight the flow is to drown and be washed up ashore , useless and dead metaphorically and metaphysically to a new world order awash with fresh opportunities.
amanfromMars 1 …. commenting again on Mon 10 Feb 17:18  on http://forums.theregister.co.uk/forum/1/2014/02/10/tuesday_declared_the_day_we_fight_back_against_nsa_et_al/
Here be a little something further and deeper on Virtual Strike Force Engagement Fight Backs which present quite magically all manner of alternative events, for the odd couple or two to dislike and vote down without probably knowing anything about what they be voting on. However, one would expect the likes of intelligent folk seeking intelligence for a living though to act completely differently and not tarry in a hurry if their concerns stretch to matters of interest to IARPA’s Uncle Sam.
A user knowledgeable about an intended MPC [MultiParty Computation] scenario, but not an expert in cryptographic protocols or MPC, could input application data into a future tool which will select or generate the definition of a cryptographic protocol and a proof of the protocol’s security or data that can be used to prove the security of the protocol. …. http://cryptome.org/2014/02/iarpa-rfi-14-03.pdf
Hmmm …. Input application data into a future tool which will select or generate the definition of a cryptographic protocol and a proof of the protocol’s security or data that can be used to prove the security of the protocol such as those which provide leading Special Information Services Secreting Sublimely Intelligent Sources with seconded third party politicians following prepared scripts, is a Multiparty Computation scenario which reveals untold and telling vulnerabilities in everything that tries to disprove it?
And the available more chaotic alternative for command and control with rogue renegade elements/constituents does present the facility and utility to create havoc and mayhem if prime first parties are inadequately addressed and poorly compensated for non-leading future participation in an adopted supporting role.
There’s a lot going on out there in the Cyber Domains of IntelAIgent Space, El Regers. And none of it bad whenever one is good and prepared to freely share, although that does not mean that things cannot turn suddenly catastrophic to ensure that things will be even better.