• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 07:04
CET 12:04
KST 20:04
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy7ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book19Clem wins HomeStory Cup 289
Community News
Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool48Weekly Cups (March 9-15): herO, Clem, ByuN win42026 KungFu Cup Announcement6BGE Stara Zagora 2026 cancelled12
StarCraft 2
General
Potential Updates Coming to the SC2 CN Server What mix of new & old maps do you want in the next ladder pool? (SC2) Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool Weekly Cups (March 16-22): herO doubles, Cure surprises Weekly Cups (August 25-31): Clem's Last Straw?
Tourneys
WardiTV Mondays Sparkling Tuna Cup - Weekly Open Tournament World University TeamLeague (500$+) | Signups Open RSL Season 4 announced for March-April WardiTV Team League Season 10
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
The PondCast: SC2 News & Results Mutation # 518 Radiation Zone Mutation # 517 Distant Threat Mutation # 516 Specter of Death
Brood War
General
mca64Launcher - New Version with StarCraft: Remast How much money terran looses from gas steal? BGH Auto Balance -> http://bghmmr.eu/ Which mirror match you like most or least? Gypsy to Korea
Tourneys
[ASL21] Ro24 Group C [Megathread] Daily Proleagues [ASL21] Ro24 Group B 2026 Changsha Offline Cup
Strategy
What's the deal with APM & what's its true value Fighting Spirit mining rates Simple Questions, Simple Answers Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Nintendo Switch Thread General RTS Discussion Thread Stormgate/Frost Giant Megathread Path of Exile Dawn of War IV
Dota 2
Official 'what is Dota anymore' discussion The Story of Wings Gaming
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Five o'clock TL Mafia Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia
Community
General
US Politics Mega-thread Canadian Politics Mega-thread Russo-Ukrainian War Thread European Politico-economics QA Mega-thread Things Aren’t Peaceful in Palestine
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Req][Books] Good Fantasy/SciFi books Movie Discussion! [Manga] One Piece
Sports
Cricket [SPORT] 2024 - 2026 Football Thread Formula 1 Discussion Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
Laptop capable of using Photoshop Lightroom?
TL Community
The Automated Ban List
Blogs
Funny Nicknames
LUCKY_NOOB
Money Laundering In Video Ga…
TrAiDoS
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
Unintentional protectionism…
Uldridge
ASL S21 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 6923 users

US Politics Mega-thread - Page 2957

Forum Index > Closed
Post a Reply
Prev 1 2955 2956 2957 2958 2959 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
Gorsameth
Profile Joined April 2010
Netherlands22158 Posts
February 18 2016 17:35 GMT
#59121
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.
It ignores such insignificant forces as time, entropy, and death
Plansix
Profile Blog Joined April 2011
United States60190 Posts
Last Edited: 2016-02-18 17:42:38
February 18 2016 17:39 GMT
#59122
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.

On February 19 2016 02:35 Gorsameth wrote:
Show nested quote +
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.


All systems are exploitable, even Apple's current system. Unless they create perfect encryption that can never be broken until the end of time. If so, gratz? But is seems like a weak argument, since the system will be bypassed at some point. At least this way they get a better idea of how.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Gorsameth
Profile Joined April 2010
Netherlands22158 Posts
February 18 2016 17:42 GMT
#59123
On February 19 2016 02:39 Plansix wrote:
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.

Do you accept that if they open this one phone they will be repeatedly asked to do so?
It ignores such insignificant forces as time, entropy, and death
Deathstar
Profile Blog Joined May 2010
9150 Posts
Last Edited: 2016-02-18 17:42:47
February 18 2016 17:42 GMT
#59124
Intelligence organizations really cannot be trusted in this case. I see Diane Feinstein on tv demanding Apple comply with the court order. The same woman who had no problem throwing all Americans under the bus with respect to surveillance but when it was uncovered that the CIA did a little spying on Feinstein and her staff she went ballistic. Privacy for her but the rest are naked and vulnerable.
rip passion
KwarK
Profile Blog Joined July 2006
United States43748 Posts
February 18 2016 17:43 GMT
#59125
On February 19 2016 02:39 Plansix wrote:
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.

Did you completely miss my response where I said the entire area needs to be reviewed and a new set of rights and protocols created? The solution where you strip away more privacy and give more power to unaccountable extrajudicial shadow organisations is not ideal but nor is the status quo.
ModeratorThe angels have the phone box
Plansix
Profile Blog Joined April 2011
United States60190 Posts
February 18 2016 17:44 GMT
#59126
On February 19 2016 02:42 Gorsameth wrote:
Show nested quote +
On February 19 2016 02:39 Plansix wrote:
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.

Do you accept that if they open this one phone they will be repeatedly asked to do so?

Yes. As long as there is judicial oversight and it’s on public record that open for review after the case/investigation resolves, I have no problem with them doing it. I would rather this than mass data collection.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Mohdoo
Profile Joined August 2007
United States15742 Posts
February 18 2016 17:45 GMT
#59127
On February 19 2016 02:39 Plansix wrote:
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.


Right now, the hole to penetrate security is so non-existent than Apple needs a full force engineering thrust to make it possible. If The FBI gets its way, the hole would be there, just insanely hard to crack. But time and time again, we have seen that as long as the hole is there, it will be exploited. Why do you think Apple made their devices such that this whole process is taking place? This is what is necessary. It is a more binary situation than you are conveying. I think you have too little faith in security researchers. Apple's method of security is not in a vacuum, there is a lot of evidence/history showing you either take this route or you aren't actually totally secure.
RolleMcKnolle
Profile Blog Joined May 2010
Germany1054 Posts
February 18 2016 17:46 GMT
#59128
I don't even get why there is a reason the government should be able to access the phone. Some evidence is nice and all but I am completely fine with them not being able to access everything they want, even if some "bad guys" get away then.
Deathstar
Profile Blog Joined May 2010
9150 Posts
February 18 2016 17:49 GMT
#59129
On February 19 2016 02:46 RolleMcKnolle wrote:
I don't even get why there is a reason the government should be able to access the phone. Some evidence is nice and all but I am completely fine with them not being able to access everything they want, even if some "bad guys" get away then.


It's just scapegoating. "If only we had access to all data we can prevent terrorist attacks from happening!"
rip passion
farvacola
Profile Blog Joined January 2011
United States18856 Posts
Last Edited: 2016-02-18 17:54:26
February 18 2016 17:53 GMT
#59130
It is disingenuous to pretend that there aren't highly compelling motivations behind opening this single phone at issue, particularly given how unusual the San Bernardino shooting was. That is not to say that the arguments in favor of Apple do not hold a lot of weight (the "universality" of the crafted backdoor OS is definitely concerning), only that this is not nearly as easy a balancing test as many are suggesting.
"when the Dead Kennedys found out they had skinhead fans, they literally wrote a song titled 'Nazi Punks Fuck Off'"
Kickstart
Profile Blog Joined May 2008
United States1941 Posts
February 18 2016 17:56 GMT
#59131
Don't think anyone is arguing the contrary. The concern is that such a tool won't be limited to just this one phone and the chances that the tool would only be accessible to Apple and the FBI is almost zero.
KwarK
Profile Blog Joined July 2006
United States43748 Posts
February 18 2016 17:56 GMT
#59132
On February 19 2016 02:53 farvacola wrote:
It is disingenuous to pretend that there aren't highly compelling motivations behind opening this single phone at issue, particularly given how unusual the San Bernardino shooting was. That is not to say that the arguments in favor of Apple do not hold a lot of weight (the "universality" of the crafted backdoor OS is definitely concerning), only that this is not nearly as easy a balancing test as many are suggesting.

There is no such thing as opening this single phone. The phone cannot be opened without the creation of tools which do not currently exist which could be used to open other phones. The phone is secure or not secure. As long as the tools do not exist it is secure. Once they do it is not secure.

Arguing that this specific phone is all that is at stake is disingenuous.
ModeratorThe angels have the phone box
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 17:58 GMT
#59133
On February 19 2016 02:39 Plansix wrote:
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.

And my issue is that you are ignorant or poorly informed.

The entire point of encryption is to keep secure data secure, while still allowing it to be communicated. Different people will have different opinions on what kind of information they want secure, but the important thing is that there is no reality where "no encryption" can exist without destroying critical infrastructure.

But encryption, in reality, is not very secure. You can break old encryption really easily, solely because computers are faster and better. Networks can have security everywhere, but there only needs to be one failure point to access the entire system.

And a master key, or a single point of failure that is identical in every single system, is something that security experts explicitly avoid, and something that security audits will immediately flag you on, because it's exactly the kind of thing that hackers dream about. And not only is a company supposed to intentionally design a security flaw in their system, they are being asked to do it in a public forum so that everyone in the world knows that there is a hole in the system that will give them access to every iPhone (and likely every Apple product) in the world.
Average means I'm better than half of you.
Gorsameth
Profile Joined April 2010
Netherlands22158 Posts
February 18 2016 18:00 GMT
#59134
On February 19 2016 02:53 farvacola wrote:
It is disingenuous to pretend that there aren't highly compelling motivations behind opening this single phone at issue, particularly given how unusual the San Bernardino shooting was. That is not to say that the arguments in favor of Apple do not hold a lot of weight (the "universality" of the crafted backdoor OS is definitely concerning), only that this is not nearly as easy a balancing test as many are suggesting.

What highly compelling motivation are you talking about?
As far as I understand the San Bernardino shooting is an entirely self contained event. No indications anyone instructed the couple to commit the attack. What data could they even hope to find on the phone that would be useful after the fact?
It ignores such insignificant forces as time, entropy, and death
farvacola
Profile Blog Joined January 2011
United States18856 Posts
Last Edited: 2016-02-18 18:23:02
February 18 2016 18:13 GMT
#59135
On February 19 2016 02:56 KwarK wrote:
Show nested quote +
On February 19 2016 02:53 farvacola wrote:
It is disingenuous to pretend that there aren't highly compelling motivations behind opening this single phone at issue, particularly given how unusual the San Bernardino shooting was. That is not to say that the arguments in favor of Apple do not hold a lot of weight (the "universality" of the crafted backdoor OS is definitely concerning), only that this is not nearly as easy a balancing test as many are suggesting.

There is no such thing as opening this single phone. The phone cannot be opened without the creation of tools which do not currently exist which could be used to open other phones. The phone is secure or not secure. As long as the tools do not exist it is secure. Once they do it is not secure.

Arguing that this specific phone is all that is at stake is disingenuous.


Nahh, the specificity of the relief granted via court order and how said relief will affect other phones is hardly a settled matter; it is perfectly within the court's discretion to (attempt to*) create a remedy that will address the concerns you've raised as to the inevitability of the spread of the tools that would need to be crafted. Of course, this is where my tenuously trusting familiarity with the legal process and the general skepticism of those who have at least some understanding of the technology side necessarily come into conflict. Given the sort of scrutiny and attention this case will receive, it seems likely that a judge will find in favor of the FBI and then issue a court order that will appropriately narrow the scope of the relief granted, even if that means ordering Apple to do something like create tools and then destroy them. Naturally, there is a practically equal in chance possibility that a judge will agree with you and deny the FBI relief on the basis that whatever tools end up created pose simply too great a threat to the general security of iphones and other digital products. Nevertheless, if you think that the FBI won't be able to find incredibly well-vetted experts in encryption that will inevitably (and in good faith, I might add) argue that this door can be open and then shut, experts that will almost certainly match up pretty will Apple's, I've got an interest in Florida real estate to sell you.

On February 19 2016 03:00 Gorsameth wrote:
Show nested quote +
On February 19 2016 02:53 farvacola wrote:
It is disingenuous to pretend that there aren't highly compelling motivations behind opening this single phone at issue, particularly given how unusual the San Bernardino shooting was. That is not to say that the arguments in favor of Apple do not hold a lot of weight (the "universality" of the crafted backdoor OS is definitely concerning), only that this is not nearly as easy a balancing test as many are suggesting.

What highly compelling motivation are you talking about?
As far as I understand the San Bernardino shooting is an entirely self contained event. No indications anyone instructed the couple to commit the attack. What data could they even hope to find on the phone that would be useful after the fact?

The San Bernardino shooting stands out against pretty much every other major "terrorist" action in and around the continental United States; it's pretty unique in terms of the planning, embedness of the assailants (interesting mixture of home-grown and foreign origin), their competency (these weren't shoe bombers), etc. So yeah, as you said, this event does seem to be fairly self-contained, but the personal information of the assailants is still a gold mine for intelligence in terms of how they can better understand what goes into the mind of "terrorists" that end up pulling the trigger.
"when the Dead Kennedys found out they had skinhead fans, they literally wrote a song titled 'Nazi Punks Fuck Off'"
Plansix
Profile Blog Joined April 2011
United States60190 Posts
Last Edited: 2016-02-18 18:17:06
February 18 2016 18:15 GMT
#59136
On February 19 2016 02:58 WolfintheSheep wrote:
Show nested quote +
On February 19 2016 02:39 Plansix wrote:
It is one of my main problems with the argument about it. They claim there is no solution to the problem that doesn’t threaten everyone. And we people say they need to invent a solution to a complex problem, you are ignorant or poorly informed. It is the classic creation of a man made unsolvable problem, so the only solution is the status quo.

And my issue is that you are ignorant or poorly informed.

The entire point of encryption is to keep secure data secure, while still allowing it to be communicated. Different people will have different opinions on what kind of information they want secure, but the important thing is that there is no reality where "no encryption" can exist without destroying critical infrastructure.

But encryption, in reality, is not very secure. You can break old encryption really easily, solely because computers are faster and better. Networks can have security everywhere, but there only needs to be one failure point to access the entire system.

And a master key, or a single point of failure that is identical in every single system, is something that security experts explicitly avoid, and something that security audits will immediately flag you on, because it's exactly the kind of thing that hackers dream about. And not only is a company supposed to intentionally design a security flaw in their system, they are being asked to do it in a public forum so that everyone in the world knows that there is a hole in the system that will give them access to every iPhone (and likely every Apple product) in the world.

I understand that completely. I just don’t see the scantily and security of any encryption system as above the sovereignty of a nation and therefore immune to all demands for access. That the preservation of that security of that system, which you admit is finite, is above an order from the court. I believe Apple has the right to attempt measure to assure the security of their system for as long as possible, including hiding the process for breaking the encryption and any other means. But I do not believe ANY software system should be immune to the states request for access because a single point of failure has the potential compromise the whole system.

On February 19 2016 03:00 Gorsameth wrote:
Show nested quote +
On February 19 2016 02:53 farvacola wrote:
It is disingenuous to pretend that there aren't highly compelling motivations behind opening this single phone at issue, particularly given how unusual the San Bernardino shooting was. That is not to say that the arguments in favor of Apple do not hold a lot of weight (the "universality" of the crafted backdoor OS is definitely concerning), only that this is not nearly as easy a balancing test as many are suggesting.

What highly compelling motivation are you talking about?
As far as I understand the San Bernardino shooting is an entirely self contained event. No indications anyone instructed the couple to commit the attack. What data could they even hope to find on the phone that would be useful after the fact?


That is the root of the problem. We can't know the value of the data because no one can view it. How do you prove its value if it is unknown and cannot be known?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Acrofales
Profile Joined August 2010
Spain18246 Posts
Last Edited: 2016-02-18 18:36:31
February 18 2016 18:35 GMT
#59137
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.

Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/
Jayme
Profile Blog Joined February 2009
United States5866 Posts
Last Edited: 2016-02-18 18:45:39
February 18 2016 18:43 GMT
#59138
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.

Which kind of brings us to this phone. Nothing you technically have is safe with a proper court order. If law enforcement can indicate proper probable cause nothing you own is out of bounds. Which is why I think the FBI will win this case... As much as I may disagree with them doing so.

The only way I see it going the other way is if Apple plays on the international issue in that it would basically give the FBI to break encryption on iPhones the court has no jurisdiction over.
Python is garbage, number 1 advocate of getting rid of it.
Gorsameth
Profile Joined April 2010
Netherlands22158 Posts
February 18 2016 18:46 GMT
#59139
On February 19 2016 03:43 Jayme wrote:
Show nested quote +
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.

Which kind of brings us to this phone. Nothing you technically have is safe with a proper court order. If law enforcement can indicate proper probable cause nothing you own is out of bounds. Which is why I think the FBI will win this case... As much as I may disagree with them doing so.

Which is why Apple took this public, because either public opinion sways the FBI/Courts or they can point and say "we tried our best".
It ignores such insignificant forces as time, entropy, and death
Acrofales
Profile Joined August 2010
Spain18246 Posts
Last Edited: 2016-02-18 18:49:33
February 18 2016 18:48 GMT
#59140
On February 19 2016 03:43 Jayme wrote:
Show nested quote +
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.
Prev 1 2955 2956 2957 2958 2959 10093 Next
Please log in or register to reply.
Live Events Refresh
KCM Race Survival
10:00
Grand Final
Kim Chul Min (afreeca) 1494
LiquipediaDiscussion
The PondCast
10:00
Episode 87
CranKy Ducklings33
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
OGKoka 219
SortOf 138
ProTech136
StarCraft: Brood War
Sea 3039
Bisu 2302
Mini 366
BeSt 314
Light 190
Snow 183
Rush 156
EffOrt 148
Soulkey 119
Last 117
[ Show more ]
Backho 85
Soma 70
Hm[arnc] 60
Sharp 52
ToSsGirL 51
ZerO 46
Bale 31
Barracks 31
ggaemo 29
sSak 26
Nal_rA 26
sorry 23
Shinee 23
Shine 23
Free 22
NotJumperer 21
GoRush 13
SilentControl 11
soO 7
Sea.KH 5
[sc1f]eonzerg 2
Icarus 2
eros_byul 0
Dota 2
BananaSlamJamma303
XcaliburYe156
League of Legends
Reynor54
Counter-Strike
shoxiejesuss1448
olofmeister1061
kennyS689
edward89
Other Games
singsing1836
Liquid`RaSZi705
ceh9626
Happy221
crisheroes178
Fuzer 151
Livibee116
Sick113
Mew2King94
ZerO(Twitch)10
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 13 non-featured ]
StarCraft 2
• Berry_CruncH381
• CranKy Ducklings SOOP5
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• iopq 3
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Upcoming Events
WardiTV Team League
56m
BASILISK vs Team Liquid
OSC
56m
OSC
6h 56m
Replay Cast
12h 56m
WardiTV Team League
1d
Big Brain Bouts
1d 5h
Fjant vs SortOf
YoungYakov vs Krystianer
Reynor vs HeRoMaRinE
RSL Revival
1d 22h
Cure vs Zoun
herO vs Rogue
WardiTV Team League
2 days
Platinum Heroes Events
2 days
BSL
2 days
[ Show More ]
RSL Revival
2 days
ByuN vs Maru
MaxPax vs TriGGeR
WardiTV Team League
3 days
BSL
3 days
Replay Cast
3 days
Replay Cast
3 days
Afreeca Starleague
3 days
Light vs Calm
Royal vs Mind
Wardi Open
3 days
Monday Night Weeklies
4 days
OSC
4 days
Sparkling Tuna Cup
4 days
Afreeca Starleague
4 days
Rush vs PianO
Flash vs Speed
Replay Cast
5 days
Afreeca Starleague
5 days
BeSt vs Leta
Queen vs Jaedong
Replay Cast
6 days
The PondCast
6 days
Liquipedia Results

Completed

Proleague 2026-03-25
WardiTV Winter 2026
Underdog Cup #3

Ongoing

KCM Race Survival 2026 Season 1
BSL Season 22
CSL Elite League 2026
CSL Season 20: Qualifier 1
ASL Season 21
Acropolis #4 - TS6
RSL Revival: Season 4
Nations Cup 2026
NationLESS Cup
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual

Upcoming

2026 Changsha Offline CUP
CSL Season 20: Qualifier 2
CSL 2026 SPRING (S20)
Acropolis #4
IPSL Spring 2026
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.