You are missing trading opportunities:
- Free trading apps
- Over 8,000 signals for copying
- Economic news for exploring financial markets
Registration
Log in
You agree to website policy and terms of use
If you do not have an account, please register
clause 2 is an opportunity given to the government by this law. How this opportunity will be used by the government we do not know. Starikov does not discuss this unknown future for him, unlike this thread.
...
Starikov has a well-tuned and coherent worldview. Always backs up his point of view with information. He does not twist or adjust to the "ideologically correct" result.
That's why I refer to him as a good source of information that I haven't double-checked for quite some time.
You really are so zombified by this Starikov, that you justify even his blatant lies, because he lies quite specifically, that the law allegedly says nothing about data storage, that the operators invented it all. The law says only about users' requests. Open your eyes. And as for "possibility" - what are you talking about? The law clearly says - must.
On previous pages, I quoted the wrong paragraph from the text of the law. It was referring to cellular communications, whereas we are now discussing the Internet. I stand corrected: here is the correct paragraph:
Статья 15
To amend Article 101 of Federal Law No. 149-FZ of 27 July 2006 "On Information, Information Technologies and Information Protection" (Collected Legislation of the Russian Federation, 2006, No. 31, Article 3448; 2014, No. 19, Article 2302) as follows:
1) paragraph 3 shall be amended to read as follows:
"3. The organiser of information dissemination in the Internet shall keep on the territory of the Russian Federation:
1) information on the facts of the reception, transmission, delivery and (or) processing of voice information, written text, images, sounds, video or other electronic messages of Internet users and information about these users for one year from the end of such actions;
2) text messages of Internet users, voice information, images, sounds, video, other electronic messages of Internet users up to six months from the end of their reception, transmission, delivery and (or) processing . The procedure, terms and volume of storage of information specified in this sub-paragraph shall be established by the Government of the Russian Federation.";
2) to supplement paragraph 31 with the following content:
"31. The organizer of distribution of information on the Internet shall be obliged to provide the information specified in clause 3 of this article to authorised state bodies engaged in investigative activities or in ensuring the security of the Russian Federation in cases established by federal laws.";
3) To supplement paragraph 41 with the following content:
"41. The organizer of information dissemination in the "Internet" shall, when using for receiving, transmitting, delivering and (or) processing electronic messages of users of the "Internet" additional coding of electronic messages and (or) when providing users of the "Internet" with the possibility of additional coding of electronic messages submit to the federal executive body in the field of security information necessary for the decoding of received, transmitted, delivered and (or) processed
PRIVACY TOOLS
you can also create a container on a flash drive, in the cloud, on a vps, anywhere
must have for business and private use
alternative - rar archives with passwords, faster and easier option and rar seems to be quite strong (according to what they write)
pros: no need for extra software, portability
downsides: decrypted files can be written in clear text and can theoretically be recovered later
reliable deletion requires a program to overwrite the free space on the disk with zeros
Sensitive information should generally not be kept on local drives.
Valuable information can be duplicated across multiple clouds.
to be truly private, use PGP messaging
Two Factor Authentication
gsm is not secure, 2 Factor Authentication is risky
Risk can be mitigated by using a separate sim card specifically for this purpose (do not call from it)
or rent a virtual sim that no one knows about except the owner
to bypass blocked surveillance, it is sufficient to use opera turbo or chrome "save traffic".
There are also proxies in the form of addons: hotspot shield, zenmate, proxy for chrome, hola and many others.
Similar phone apps + Opera MAX
Plugins such as flash on web pages can pass the real ip!
you can use SoftEther VPN for a good anonymization
very worthy japanese development, creates a virtual connection, all traffic is sent through itself, servers can be selected from an updated list
for the most radical cases - TOR (slow)
Man, how can you be so naive. Do you really think the law is really designed to combat terrorists? I mean. Instead of discreetly conducting surveillance like the CIA and identifying criminals, they are essentially warning the whole country: "Guys, from now on we will store all information from the Internet and phone conversations, and will also decrypt information encrypted by certified encryption methods. So be careful."
If before we could count on terrorists blundering through weakly protected channels that could be easily hacked by the FSB, now the terrorists will be extra vigilant. Now the terrorists will be extra vigilant, switching to strong encryption methods
I think the fifth column is afraid of encryption, so decryption will quickly expose them
Do you think it is in the interests of the individual citizen to destroy the country?
PRIVACY TOOLS
you can also create a container on a flash drive, in the cloud, on a vps, anywhere
must have for business and private use
alternative - rar archives with passwords, faster and easier option and rar seems to be quite strong (according to what they write)
pros: no need for extra software, portability
downsides: decrypted files can be written in clear text and can theoretically be recovered later
reliable deletion requires a program to overwrite the free space on the disk with zeros
Sensitive information should generally not be kept on local drives.
Valuable information can be duplicated across multiple clouds.
to be truly private, use PGP messaging
Two Factor Authentication
gsm is not secure, 2 Factor Authentication is risky
Risk can be mitigated by using a separate sim card specifically for this purpose (do not call from it)
or rent a virtual sim that no one knows about except the owner
to bypass blocked surveillance, it is sufficient to use opera turbo or chrome "save traffic".
There are also proxies in the form of addons: hotspot shield, zenmate, proxy for chrome, hola and many others.
Similar phone apps + Opera MAX
Plugins such as flash on web pages can pass the real ip!
you can use SoftEther VPN for a good anonymization
very worthy japanese development, creates a virtual connection, all traffic is sent through itself, servers can be selected from an updated list
for the most radical cases - TOR (slow)
Unfortunately, the destruction of the country is threatened not so much by terrorism as by the incompetence or egoistic desires of certain individuals at the top of power. And if terrorists are always fought with the use of all opportunities of the state, then there is no one to fight against those who got to power and thirst for more power, if the people are silent. This situation led to the collapse of the USSR, when Yeltsin, Kravchuk and Shushkevich, hungry for absolute power, conspired to bring about the country's collapse.
The fact that the USSR was bankrupt at the time and would have collapsed one way or another regardless of specific personalities is left out of consideration
PRIVACY TOOLS