Just occured to me that functionally that seems to be their role. Conspiratorially, super troubling. Viewed this way, it’s essentially the NSA without political oversight (what little the NSA had to begin with).

  • hypna@lemmy.world
    link
    fedilink
    arrow-up
    3
    arrow-down
    3
    ·
    12 hours ago

    I guess if you wanna go off at people like that, I have to go through your links and point out that

    1. Providing services to a cyber warfare organization does not make one a cyber warfare company. I bet they contract out their cafeteria services too. The article specifically states the contract is for data analysis.
    2. Doing data analysis for target selection also does not make one a cyber warfare company.
    3. Data analysis is not cryptography. Also, my personal computer is encrypted. Am I a cryptographer?
    4. Receiving data from your customers does not make you a data collection company, and the article points out that the data is being collected by Oura. Compare that with the NSA who for example have internet backbone splitters installed at the major telcos, or put cell spoofers in cities.

    Why is doing data analysis for unethical ends not enough?

    • sp3ctr4l@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      ·
      12 hours ago

      I just gave you what took me about 60 seconds to web search.

      You could maybe do your own actual research, you know be active, and find way way way more information, fairly easily, than what I linked here, to just illustrate the point that you aren’t paying attention.

      Also, to your points:

      1] It does, actually. If you provide your services to a cyber warfare outfit, you are now involved with and facilitating cyberwarfare.

      2] You apparently don’t know what a kill chain is, look it up. Palantir has directly been doing target identification, tracking, and assignment of lethal munitions toward Palestinians, and others. That’s not cyberwarfare, its just warfare, the comms network behind coordinating it. It has to be harderned against cyberwarfare, via encryption and other kinds of security measures.

      3] This is either a non-sequitir or you don’t anything about cryptography. Yes, yes indeed, massive data analysis capabilities are used in cryptography, to decrypt things. You look for patterns, in data, and then try to reverse engineer a semantic structure. This is a kind of data analysis… called cryptographic analysis.

      4] Right, I’m sure that Palantir doesn’t keep their own copy of the data they recieve, or the analytic results that the derive from it.

      … Have you worked in tech much? I’m guessing no. Look up ‘data broker’ as well.