From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 85F3113877A for ; Tue, 5 Aug 2014 23:20:44 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 5A6C0E09E6; Tue, 5 Aug 2014 23:20:42 +0000 (UTC) Received: from plane.gmane.org (plane.gmane.org [80.91.229.3]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 9A5B0E0965 for ; Tue, 5 Aug 2014 23:20:41 +0000 (UTC) Received: from list by plane.gmane.org with local (Exim 4.69) (envelope-from ) id 1XEo23-0006w6-8a for gentoo-amd64@lists.gentoo.org; Wed, 06 Aug 2014 01:20:39 +0200 Received: from ip68-231-22-224.ph.ph.cox.net ([68.231.22.224]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Wed, 06 Aug 2014 01:20:39 +0200 Received: from 1i5t5.duncan by ip68-231-22-224.ph.ph.cox.net with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Wed, 06 Aug 2014 01:20:39 +0200 X-Injected-Via-Gmane: http://gmane.org/ To: gentoo-amd64@lists.gentoo.org From: Duncan <1i5t5.duncan@cox.net> Subject: [gentoo-amd64] Re: "For What It's Worth" (or How do I know my Gentoo source code hasn't been messed with?) Date: Tue, 5 Aug 2014 23:20:26 +0000 (UTC) Message-ID: References: <46751df7496f4e4f97fb23e10fc9f5b4@mail10.futurewins.com> <20140805163657.634f799ba33ed03cb9a4e4b6@comcast.net> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-amd64@lists.gentoo.org Reply-to: gentoo-amd64@lists.gentoo.org Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Complaints-To: usenet@ger.gmane.org X-Gmane-NNTP-Posting-Host: ip68-231-22-224.ph.ph.cox.net User-Agent: Pan/0.140 (Chocolate Salty Balls; GIT d447f7c /m/p/portage/src/egit-src/pan2) X-Archives-Salt: 2e910f8d-05c5-4690-9d94-ca1800257dc3 X-Archives-Hash: 8910e3e135874a36f946aec1f647d70c Frank Peters posted on Tue, 05 Aug 2014 16:36:57 -0400 as excerpted: > It wouldn't have to scan your local drives. It would only have to scan > the very few directories named "MY DOCUMENTS" and "MY VIDEOS" and "MY > EMAIL" which have conveniently been established by the omnipotent and > omniscient desktop environment. Within these universal and standardized > storage areas can be found everything that snooping software would need > to find. Hmm... Some people (me) don't use those standardized locations. I have a dedicated media partition -- large, still on spinning rust when most of the system in terms of filenames (but not size) is on SSD, and where it's mounted isn't standard and is unlikely to /be/ standard, simply because I have my own rather nonconformist ideas of where I want stuff located and how it should be organized. OTOH, consider ~/.thumbnails/. Somebody already mentioned that google case and the hashes they apparently scan for. ~/.thumbnails will normally have thumbnails for anything in the system visited by normal graphics programs, including both still images and video, and I think pdf too unless that's always generated dynamically as is the case with txt files, via various video-thumbnail addons. Those thumbnails are all going to be standardized to one of a few standard sizes, and can either be used effectively as (large) hashes directly, or smaller hashes of them could be generated... Tho some images programs (gwenview) have an option to wipe the thumbnails dir when they're shutdown, but given the time creating those thumbnails on any reasonably large collection takes, most people aren't going to want to enable wiping... Meanwhile, one of the things that has come out is that the NSA effectively already considers anyone running a Linux desktop a radical, likely on their watch-list already, just as is anyone running TOR, or even simply visiting the TOR site or an article linking to them. I guess I must be on their list several times over, what with the sigs I use, etc, the security/privacy-related articles I read, the OS I run, and the various lists I participate on... -- Duncan - List replies preferred. No HTML msgs. "Every nonfree program has a lord, a master -- and if you use the program, he is your master." Richard Stallman