TED Conversations

Kareem Fahim


This conversation is closed.

Are you comfortable with NSA collecting your personal data?

'Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple'

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.


Well, all of us already knew so I don't think it has surprised anyone... but I'd like to know opinions of TED community, are you comfortable with fact that USA Gov. is continuously collecting your personal data?

@People who say 'nothing to hide, nothing to fear' http://www.youtube.com/watch?v=_oAKtBpdZSw


Closing Statement from Kareem Fahim

Majority of people are annoyed by this 'data collection'. Western Govs., defenders of 'freedom' 'democracy' and 'input_word' are mere bunch of hypocrites. Although it is shocking how some people are defending NSA and these faceless entities... (maybe they are 'trolls' or NSA paid users...).

Showing single comment thread. View the full conversation.

  • thumb
    Jul 5 2013: NSA computers process "Zettabites" of binary code, unimaginably fast. That's capability to harness any information they choose to exploit encrypted, or not. If you're in total control of the flow of binary information, absorbing all communications in a centralized system, you can decode that information. Given enough processing speed,and the right algorithms you can bust, any encryption fairly quickly. The "potential" danger of this system, is the very reason we have a 1st, and 4th amendment to the constitution. I'm not worried so much about the vast majority of individuals in our intelligence services. I know for a fact that 99.99999% of the people who cover our asses every day are decent honest people. They do the right thing, not because they are watched, but because they are decent honest people. The danger comes from the kind of vile criminal conspiracy that we all saw play out in broad daylight in the abomination of the Bush administration, Iraq war, near complete collapse of our economy, and grand theft of our treasury by Wall Street Banksters who are still not in jail. The danger is the insidious creeping control of all our government services by (private contractors) How many Americans understand the incestuous relationship between Bill Clinton for instance, and Booze Allen Hamilton? They apparently are part of the (Carlyle Group Cartel) Does that name ring a bell for anyone? It should They have had their filthy little hands on many of the abominations in recent years. What in the name of the great Jehova is a company owned by Michael Chertoff former Bush administration head of "homeland security" doing with the exclusive contract to provide the airport screening devices with a guaranteed contract worth billions of dollars?????? The corruption, bribery, patronage, malfeasance, fraud, and corporate debauchery is out of control. That is a very dangerous situation my fiends. I don't trust them AT ALL! Neither should you. "OVERTURN CITIZENS UNITED!
    • Jul 5 2013: What does Citizens United have to do with the NSA story?
    • thumb
      Jul 7 2013: Hi Peter, I wanted to respond to what seems like an incorrect statement of fact you made, when you said:

      "Given enough processing speed,and the right algorithms you can bust, any encryption fairly quickly."

      I think this is a critically important point to correct, because the reality here also contains the seeds of a way to ameliorate the situation. The reality is that you can build truly secure, encrypted systems that the NSA could never hack into (not until we build the next stage of quantum computers, that is). However you have to know what you're doing, and you must take care with whom you share your data.

      If enough people cared about this and deployed appropriate counter measures, the NSA would take notice. They could outlaw strong encryption again, just like they did up through the 1990s, but once the "cat is out of the bag" in terms of encryption techniques, it's very hard to bottle back up again (to mix metaphors!).

      If I am wrong about this, I humbly ask you to point to evidence that backs up that quote.

Showing single comment thread. View the full conversation.