Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
so you're fine with your own government monitoring emails, it's only bad when the chinese do it?
What the government does to its own citizens can at least be addressed via political discourse. What recourse do you have as a US business if the Chinese government breaks into your computers and steals your trade secrets that are worth billions of dollars and starts using it for their own gain without your permission?
Do I condone a country spying on its own citizens, absolutely not. But it is a completely different ball game when another country with different ideals does it to you.
What the government does to its own citizens can at least be addressed via political discourse. What recourse do you have as a US business if the Chinese government breaks into your computers and steals your trade secrets that are worth billions of dollars and starts using it for their own gain without your permission?
Do I condone a country spying on its own citizens, absolutely not. But it is a completely different ball game when another country with different ideals does it to you.
What foreign countries do can be answered by diplomacy or war.
What foreign countries do can be answered by diplomacy or war.
Exactly. That's why wide spread and persistent state sponsored computer crime shouldn't be a can of worms the Chinese OR the US should open unless it is absolutely necessary. It's a lose-lose situation for both Chinese citizens and US citizens if we start paralyzing the internet and research/innovation with state sponsored computer espionage and stealing then retaliate with embargoes/tariffs or even war.
But again, if you're a small company and your trade secret gets stolen by a foreign entity, it would be virtually impossible to gain compensation through diplomatic methods when you're just a small fish in a much larger pond.
Actually, it's pretty easy, it's called a dual network.
Two computers on every desk, 1 can get online, the other is on an internal network, that is offline and private.
Well the poster I was directing my post to advocated computers being offline.
If you are offline you have no access beyond your own computer.
Your example is of 2 networks..intranet and internet. not an offline scenario.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.