Khmer government "Cyber War" Team

This is where our community discusses almost anything! While we're mainly a Cambodia expat discussion forum and talk about expat life here, we debate about almost everything. Even if you're a tourist passing through Southeast Asia and want to connect with expatriates living and working in Cambodia, this is the first section of our site that you should check out. Our members start their own discussions or post links to other blogs and/or news articles they find interesting and want to chat about. So join in the fun and start new topics, or feel free to comment on anything our community members have already started! We also have some Khmer members here as well, but English is the main language used on CEO. You're welcome to have a look around, and if you decide you want to participate, you can become a part our international expat community by signing up for a free account.
User avatar
frank lee bent
Expatriate
Posts: 11330
Joined: Sat May 17, 2014 4:10 am
Reputation: 2094
United States of America

Khmer government "Cyber War" Team

Post by frank lee bent »

Hmmm,
perhaps they have been testing offensive capabilities?

http://www.cambodiadaily.com/news/cyber ... web-72677/
Jacket
Expatriate
Posts: 217
Joined: Mon Nov 10, 2014 8:10 am
Reputation: 4
Location: Kampong Cham
Austria

Re: Khmer government "Cyber War" Team

Post by Jacket »

Of course this just helps everybody. The Cambodian government would never do anything that is totalitarian and totally fucked up. We should all trust, that the people who run this will not abuse their power to suppress freedom of speech and to go after critics. After all, only evil people would do something like that and as we all know, there are no evil people working for or at these Cambodian government offices. That's just common knowledge. *whipes sweat off forehead*
Bei der Weiterbildung; in der Todeszone.
User avatar
frank lee bent
Expatriate
Posts: 11330
Joined: Sat May 17, 2014 4:10 am
Reputation: 2094
United States of America

Re: Khmer government "Cyber War" Team

Post by frank lee bent »

hehe- clever
Jaap N.
Expatriate
Posts: 904
Joined: Sat May 17, 2014 1:42 pm
Reputation: 10
Netherlands

Re: Khmer government "Cyber War" Team

Post by Jaap N. »

I agree, nice one!
BOFH
Expatriate
Posts: 957
Joined: Wed Nov 19, 2014 10:27 am
Reputation: 3

Re: Khmer government "Cyber War" Team

Post by BOFH »

Good luck, China employs 2 million fulltime workers for social media alone: http://edition.cnn.com/2013/10/07/world ... -monitors/

They are dreaming, this will never happen. And even if it does it wouldn't take so much effort to generate bogus social media noise to keep them occuppied with nonsense.

Welcome to the Internet, government, you're waking up a little too late.

Hiring government workers to read Facebook and other social media, what could possibly go wrong?

But seriously. Why the hell are they calling this Cyber War? What exactly are they going to war against? WORDS? Have fun with that.
User avatar
General Mackevili
The General
Posts: 18415
Joined: Tue May 06, 2014 5:24 pm
Reputation: 3407
Location: The Kingdom
Contact:
United States of America

Re: Khmer government "Cyber War" Team

Post by General Mackevili »

BOFH wrote:
Hiring government workers to read Facebook and other social media, what could possibly go wrong?
My dream job right there
"Life is too important to take seriously."

"Life does not cease to be funny when people die any more than it ceases to be serious when people laugh."

Have a story or an anonymous news tip for CEO? Need advertising? CONTACT ME

Cambodia Expats Online is the most popular community in the country. JOIN TODAY

Follow CEO on social media:

Facebook
Twitter
YouTube
Google+
Instagram
User avatar
frank lee bent
Expatriate
Posts: 11330
Joined: Sat May 17, 2014 4:10 am
Reputation: 2094
United States of America

Re: Khmer government "Cyber War" Team

Post by frank lee bent »

ddos perps maybe?

vpn kind of defeats location of IP address.

but embassies from any country could easily provide an access point from any number of countries.

can't prosecute them.
User avatar
phuketrichard
Expatriate
Posts: 16845
Joined: Wed May 14, 2014 5:17 pm
Reputation: 5764
Location: Atlantis
Aruba

Re: Khmer government "Cyber War" Team

Post by phuketrichard »

One section that was not copied, however, and which has drawn much criticism, is Article 28, which allows for the punishment of individuals who publish content online that slanders or undermines the integrity of the government or government agencies at any level.
just following their neighbor,

got nothing nice/positive to say, shut up or we will come get ya :plus1:

thought u were safe using tor or signing into accounts anonymously?
A new report claims that more than 81 percent of Tor users are identifiable using a method that threatens Internet anonymity.
It requires the ability to monitor large amounts of data coming in and out of Tor nodes to determine the IP address of the individual being tracked. According to the report, the technique has been largely successful.

"In experiments that involved data from public Tor relays, using both open source Netflow emulation packages and our institutional Cisco router that monitored traffic using Netflow framework, we were able to correctly identify the source of anonymous traffic in about 81.4 percent of our experiments, with about 6.4 percent false positives".

The Tor Project has responded to the claims via a blog post in which it explains that the network has never been designed to combat a technique such as traffic confirmation.

"The Tor design doesn’t try to protect against an attacker who can see or measure traffic going into the Tor network and also traffic coming out of the Tor network. That’s because if you can see both flows, some simple statistics let you decide whether they match up".

Tor also sought to reassure users that whether they can be identified or not is dependent on "how much of the Internet the adversary is able to measure or control".

The blog post goes on to praise the fact that additional research is being carried out regarding traffic confirmation attacks, but says users are still able to trust the network, adding that there is no need to "freak out".


hahahhaha famous last words

http://betanews.com/2014/11/19/new-repo ... dentified/
In a nation run by swine, all pigs are upward-mobile and the rest of us are fucked until we can put our acts together: not necessarily to win, but mainly to keep from losing completely. HST
User avatar
frank lee bent
Expatriate
Posts: 11330
Joined: Sat May 17, 2014 4:10 am
Reputation: 2094
United States of America

Re: Khmer government "Cyber War" Team

Post by frank lee bent »

they must just be paranoid those tor users.
i heard it is just an agency honeypot anyway.
BOFH
Expatriate
Posts: 957
Joined: Wed Nov 19, 2014 10:27 am
Reputation: 3

Re: Khmer government "Cyber War" Team

Post by BOFH »

phuketrichard wrote:thought u were safe using tor or signing into accounts anonymously?
Researchers: Lawyers blocked our Black hat demo on de-anonymising Tor: http://www.theguardian.com/technology/2 ... -cancelled
On the recent Black Hat 2014 Talk Cancellation: https://blog.torproject.org/blog/recent ... ncellation
We encourage research on the Tor network along with responsible disclosure of all new and interesting attacks. Researchers who have told us about bugs in the past have found us pretty helpful in fixing issues, and generally positive to work with.
Having security software audited is part of the game. It's more important to patch vulnerabilities than it is to prevent disclosure. Security products need audits, anything else would be snake-oil: https://en.wikipedia.org/wiki/Snake_oil ... ography%29

This standard doesn't only apply to Tor but any cryptographic implementation. Algorithms get broken all the time, it's part of the game. Otherwise we wouldn't have the need for Advanced Encryption Standard contests held by NIST: https://en.wikipedia.org/wiki/Advanced_ ... n_Standard

The idea of cryptography is not to make data uncrackable for all time being. We have Moore's law and many other parameters that come into play. Most modern crypto tools rely on the discrete logarithm problem in one way or another. Inevitably most modern crypto is based on the fact that prime numbers are hard to calculate, this will most likely end with quantum computers.

This is all natural things. The point of cryptography is to make data secret for as long as it is valuable, not for all time ever. This is the same reason why we replaced DES with 3DES, MD4 with MD5 and threw out RC4 out of the window completely in modern times.

Forever lasting cryptography is not only impossible but an unrealistic expectation. Even more importantly, it is more common that implementations are faulty than the algorithms they implement. Software errors occur all the time, and C is not a memory safe language. Times change and not only is it expected, it is something positive.

Tor does not make you secure, it makes you anonymous. If you leave data trails that make it possible to identify you then it is your fault and not Tor's, because it's something beyond Tor's responsibility. If you want to be untraceable then make sure to not connect from locations that can be tied to you and likewise avoid generating data that can identify you, because leaks occur and they should be expected.

Apologies if this is considered off-topic.
Post Reply Previous topicNext topic
  • Similar Topics
    Replies
    Views
    Last post

Who is online

Users browsing this forum: Ahrefs [Bot], Arget, Baidu [Spider], Clutch Cargo, JUDGEDREDD, La Quenta, Old8404, Semrush [Bot], Username Taken, Yerg and 349 guests