Pages:
1
2
3
4 |
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
www.hackingteam.it/index.php/remote-control-system
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Bow down to your masters
Consider for a moment exactly what Google can do. It is able to scan through the billions of emails that flow across its network every day, and ,
based on hashes — mathematical formulas used in database searches and information encryption — it can pluck out an offending email that matches a
database of flagged content and then alerts law enforcement.
Google claims as part of a class-action lawsuit against the company regarding email scanning that " a person has no legitimate expectation of privacy
in information he voluntarily turns over to third parties." Got that , in an era of electronic communications , emails between you and your friends
or business partner , or between you and your brokerage firm , bank , accountant , lawyers , or even your doctor , spouse and child , are never to be
considered private.
What happens if an increasingly paranoid government grows suspicious about references to patriotism and deems patriotic speech and imagery worthy of
scrutiny ? What happens if government decides those who invest offshore are traitors who must be identified and persecuted ?
When Edward Snowden's revelations broke last year , it sent shock waves through CERN , a particle physics laboratory in Switzerland. A young MIT PhD
student working there expressed concern , and soon 40 of the smartest physicists and computer programmers on the planet were pooling their knowledge
to found ProtonMail , a Gmail-like email system which uses end-to-end encryption , making it impossible for outside parties to monitor messages sent
back and forth. ProtonMail's two-week " crowd funding " campaign had set a target of $100,000 , but collected more than $300,000 in just a few hours.
=> https://protonmail.ch
In June, PayPal — the same U.S. money-transfer company that blocked contributions to Julian Assange's WikiLeaks at the U.S. government's behest —
froze ProtonMail's funds and blocked all further contributions , without notice or explanation. Why would PayPal do such a thing ? Andy Chen, the MIT
PhD student who dreamed up ProtonMail , explained that , " When we pressed the PayPal representative on the phone for further details , he questioned
whether ProtonMail is legal and if we have government approval to encrypt emails." PayPal's officiousness verifies the fact that American tech
companies are increasingly an extension of the U.S. government , and so regrettably cannot ever be trusted with anyone's business.
Excerpts of articles from http://thesovereigninvestor.com
_______________________
Duh I'm with stupid up there
www.sovereignman.com/trends/heres-the-dumbest-thing-youll-he...
.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
http://www.csoonline.com/article/2360945/security/malicious-...
http://www.csoonline.com/article/2599437/data-protection/cry...
.
|
|
aga
Forum Drunkard
Posts: 7030
Registered: 25-3-2014
Member Is Offline
|
|
Everything you do on the internet is scanned, analysed, recorded.
It's easy to do, and is done all of the time.
The telephone/mobile networks went digital decades ago.
Likely that a 'Market' exists between Governments (including Mafias) to trade data on who said/did what.
The sheer Quality of Surveillance satellite optics means that what you Say can be derived from the vibrations of something near you.
In these mildly paranoid times, literally Everything you say or do is analysed.
What will be made of the data in Wartime will be interesting.
|
|
Texium
Administrator
Posts: 4580
Registered: 11-1-2014
Location: Salt Lake City
Member Is Offline
Mood: PhD candidate!
|
|
I think we need a new internet.
|
|
roXefeller
Hazard to Others
Posts: 463
Registered: 9-9-2013
Location: 13 Colonies
Member Is Offline
Mood: 220 221 whatever it takes
|
|
Someone call Al Gore.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Quote: Originally posted by aga |
The sheer Quality of Surveillance satellite optics means that what you Say
can be derived from the vibrations of something near you. |
Not so. The laser bug is over 40 years old. The limitations inherent cannot be overcome without very stringent control of the environmental setting.
Adaptive optics to which you allude cannot possibly compensate.
www.youtube.com/watch?v=1MrudVza6mo
www.williamson-labs.com/laser-mic.htm
.
|
|
aga
Forum Drunkard
Posts: 7030
Registered: 25-3-2014
Member Is Offline
|
|
High speed camera, isolate the movement of a small part of the image, such as the edge of a crisp packet, add some DSP, DAC it, and you have sound.
The key ingredients are camera resolution and frame capture speed.
Essentially the frame rate is what determines the max frequency you can resolve.
http://newsoffice.mit.edu/2014/algorithm-recovers-speech-fro...
OK. Al is Gore.
[Edited on 1-9-2014 by aga]
|
|
Fantasma4500
International Hazard
Posts: 1681
Registered: 12-12-2012
Location: Dysrope (aka europe)
Member Is Offline
Mood: dangerously practical
|
|
my classmate keeps yapping about some damn app trying to install itself on his smartphone, he says he read through what it does, it does so the
software can pretty much fully control his smarthphone in exchange of some lame game of some sort.. however killswitch technique has been used lately
to shut off loads of iphones (smartphones all in all?) not to mention stingray phone tracker
the arguments for installing killswitch technique on iphones when theyre manufactured is so that the all devious thieves cannot steal your phone and
use it..
http://en.wikipedia.org/wiki/Stingray_phone_tracker
http://www.examiner.com/article/in-the-wake-of-ferguson-crit...
we live in an age of technology where criminals are out in the open, and the criminals ofcourse wouldnt want to be on camera and later on the internet
i never wanted a smartphone, the more technologically advanced you get, the easier it will be to be limited by the same technology
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
The martians have landed ?
Great what's next.
http://money.msn.com/now/mysterious-fake-cellphone-towers-fo...
http://www.popsci.com/article/technology/mysterious-phony-ce...
My question is if someone takes one down and helps themself to the parts , will the police respond ? Who will be the complainant.
See this other related post above
http://www.sciencemadness.org/talk/viewthread.php?tid=7144&a...
Private sector hacking.
___________________________________________________________
Since when did I don't like what you're doing , stop that , become enforcible.
www.inquisitr.com/1474279/comcast-tells-customers-to-stop-us...
.
|
|
careysub
International Hazard
Posts: 1339
Registered: 4-8-2014
Location: Coastal Sage Scrub Biome
Member Is Offline
Mood: Lowest quantum state
|
|
That is an interesting article.
But it has nothing to do with satellite imaging - they cannot image the surface of a potato chip bag at 3000 frames a second.
Read the brand on the label, yes. Maybe some of the other larger text as well. That's about it.
|
|
IrC
International Hazard
Posts: 2710
Registered: 7-3-2005
Location: Eureka
Member Is Offline
Mood: Discovering
|
|
Does it matter when they will not stop until they have high tech cameras on every street light in the nation? Not only that, I have seen banks of
cameras on a power pole on a two lane rural highway between two towns 50 miles apart. One population ~5,000, the other ~1,500. If they are there you
can bet they are going up along every highway nationwide at a never ending pace. Your plates are on record and your travels are already cataloged.
While those highway setups may not be listening you know the ones on city poles are. If they can be panned and controlled what are the odds that in
addition to the microphones on the poles the technology aga describes will not be added. Pan the camera at whatever building or house they want to spy
on and little privacy remains. Add to that thermal imaging which can provide internal images and precise analysis of power use, water use. Next toilet
use. Orwell could not begin to understand the technical advances in 1984 that would exist by 2014 when governments are busy building the reality.
"Science is the belief in the ignorance of the experts" Richard Feynman
|
|
chemrox
International Hazard
Posts: 2961
Registered: 18-1-2007
Location: UTM
Member Is Offline
Mood: LaGrangian
|
|
Thanks franklyn. I reserved an invitation.
"When you let the dumbasses vote you end up with populism followed by autocracy and getting back is a bitch." Plato (sort of)
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
http://techcrunch.com/video/lavabit-founder-talks-snowden-an...
See ' The legal premise ' below
With this stuff in the wild everyone has a need for security in communication.
http://www.bloomberg.com/video/malware-used-for-surveillance...
http://finance.yahoo.com/news/unidentified-country-likely-be...
http://fortune.com/2014/11/23/regin-malware-surveillance/?xi...
http://techcrunch.com/2014/11/24/regin-spying/?ncid=txtlnkus...
The legal premise for secret indictments , particularly as applied to accused terrorists or combatants is that Grand Jury
proceedings are secret as enacted in constitutional law. In Gerstein v. Pugh, 420 U.S.103 (1975) , the Court held that a suspect can be
detained for a significant length of time after arrest when the legality of the confinement is reviewed by a neutral decision maker. Normally that
review is supplied by a magistrate in a post arrest hearing; but when a grand jury indictment precedes the arrest, the Court concluded that no
further review is needed. Substituting a grand jury's review of the evidence for a magistrate's review is permissible,
.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Homing Pigeons are still secure
No kidding, those are used in New York.
http://www.computerworld.com/article/2872292/nsa-secretly-us...
http://www.computerworld.com/article/2474275/cybercrime-hack...
.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
http://www.theverge.com/2015/5/21/8633815/snowden-nsa-google...
|
|
Zombie
Forum Hillbilly
Posts: 1700
Registered: 13-1-2015
Location: Florida PanHandle
Member Is Offline
Mood: I just don't know...
|
|
I've been saying it for years.
If you think you are free to do as you please... you're wrong. IF the government has an interest in you or a use for you, you are theirs.
All of this spyware/malware, ect, is only for one purpose. Analytic marketing.
What are people doing, and how can we steer them thru our cattle runs. Where are they, what are they doing, and how can we make money off of this
information?
That's all it is. Money!
They tried to have me "put to sleep" so I came back to return the favor.
Zom.
|
|
WGTR
National Hazard
Posts: 971
Registered: 29-9-2013
Location: Online
Member Is Offline
Mood: Outline
|
|
I have a question about general interest in a somewhat-related topic. I have been thinking of designing a hardware access control list for a network.
Basically an ACL operates on layer 3 of the OSI model, and it allows one to limit access to or from a network based solely on IP address. Packets
coming or going to IP addresses other than those which are allowed get dropped. Conceptually the design is simple, and can be done with stateless
hardware.
Tor can be configured to go through certain entry nodes. These nodes can be programmed into an access control list, essentially blocking all network
traffic except for that of the selected node. What this means, is that if malware or a browser extension attempts to access the internet outside of
the selected Tor node (or a VPN, etc.), those packets never even make it out to the modem. Most expensive (and some inexpensive) routers have an ACL
functionality built-in. However, what I am thinking of is a hardware solution that implements only the ACL. This would be an additional box that
would be installed between the router and the modem.
Instead of a web interface, the ACL could be programmed directly at the box itself. This eliminates problems with web server exploits. The modular
design, i.e., having the ACL physically separate from the hardware router, would greatly simplify both the design and the security auditing that would
follow. Of course, the design would be open source.
The overall goal is to offer an internet safety net to those who feel the need to have one, a first line of defence of sorts. The device would be a
brick upon arrival, unable to pass any network traffic until the ACL is programmed with selected IP addresses. The lack of a web interface, and the
very simple software function implemented, allow hard coding of the design into FPGA fabric. Parties outside (or inside) the network could not hack
into the ACL remotely and run code, because there would be no state machine to run it. The software should be simple enough for reasonably
experienced parties to audit it. The fact that no single point failure (ACL in series with a router) would allow rogue traffic to pass the network
would improve overall security. If someone wanted to access the 'net normally, all that would be needed would be to unplug the ACL box and bypass it
manually.
So, am I explaining this well enough? Does it sound interesting, or perhaps like I'm smoking my socks?
|
|
Zombie
Forum Hillbilly
Posts: 1700
Registered: 13-1-2015
Location: Florida PanHandle
Member Is Offline
Mood: I just don't know...
|
|
This exists in software... PeerBlock. http://www.peerblock.com/
As you said the trick is in blocking all the known threat IP addresses. In reality, you don't know which ones to block until they are discovered so
the bottom line is in blocking the entire "net", and only allowing known IPs to travel thru.
This creates new problems as many sites are "in bed" with the powers that be, and these sites will not function unless you allow the third party
access at the same time.
It's a time consuming process to "fix" the issues. I've been avoiding the majority of eavesdroppers for decades but you can't beat them all. I give it
up to "risk reduction" vs. risk proof.
Now if you came up with an automatic "Who Is" box oe software, that would help BUT again, these fellas aren't going under Super Sucker Inc. Washington
D.C.
They go under Candy Corn, and Unicorn Logic Software Inc. Lakeside N.J.
It's a tough fight. Keep throwing the idea around... you never know what may develop
They tried to have me "put to sleep" so I came back to return the favor.
Zom.
|
|
leau
Hazard to Others
Posts: 122
Registered: 3-12-2021
Member Is Offline
|
|
Not Your Average App: A Large-scale Privacy Analysis of Android Browsers
ABSTRACT The privacy-related behavior of mobile browsers has remained widely unexplored by the research community. In fact,
as opposed to regular Android apps, mobile browsers may present contradicting privacy behaviors. On the one hand, they can have access to (and can
expose) a unique combination of sensitive user data, from users’ browsing history to permission-protected personally identifiable information (PII)
such as unique identifiers and geolocation. On the other hand, they are in a unique position to protect users’ privacy by limiting data sharing with
other parties by implementing ad-blocking features. In this paper, we perform a comparative and empirical analysis on how hundreds of Android web
browsers protect or expose user data during browsing sessions. To this end, we collect the largest dataset of Android browsers to date, from the
Google Play Store and four Chinese app stores. Then, we develop a novel analysis pipeline that combines static and dynamic analysis methods to find a
wide range of privacy-enhancing (e.g., ad-blocking) and privacy-harming behaviors (e.g., sending browsing histories to third parties, not validating
TLS certificates, and exposing PII—including non-resettable identifiers—to third parties) across browsers. We find that various popular apps on
both Google Play and Chinese stores have these privacy-harming behaviors, including apps that claim to be privacy-enhancing in their descriptions.
Overall, our study not only provides new insights into important yet overlooked considerations for browsers’ adoption and transparency, but also
that automatic app analysis systems (e.g., sandboxes) need context-specific analysis to reveal such privacy behaviors.
https://petsymposium.org/popets/2023/popets-2023-0003.pdf
[Edited on 16-1-2023 by leau]
Attachment: popets-2023-0003.pdf (2.3MB) This file has been downloaded 301 times
|
|
leau
Hazard to Others
Posts: 122
Registered: 3-12-2021
Member Is Offline
|
|
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Consumer mobile spyware apps covertly monitor a user's activities (i.e., text messages, phone calls, e-mail, location, etc.)
and transmit that information over the Internet to support remote surveillance. Unlike conceptually similar apps used for state espionage, so-called
"stalkerware" apps are mass-marketed to consumers on a retail basis and expose a far broader range of victims to invasive monitoring. Today the market
for such apps is large enough to support dozens of competitors, with individual vendors reportedly monitoring hundreds of thousands of phones.
However, while the research community is well aware of the existence of such apps, our understanding of the mechanisms they use to operate remains ad
hoc. In this work, we perform an in-depth technical analysis of 14 distinct leading mobile spyware apps targeting Android phones. We document the
range of mechanisms used to monitor user activity of various kinds (e.g., photos, text messages, live microphone access) — primarily through the
creative abuse of Android APIs. We also discover previously undocumented methods these apps use to hide from detection and to achieve persistence.
Additionally, we document the measures taken by each app to protect the privacy of the sensitive data they collect, identifying a range of failings on
the part of spyware vendors (including privacy-sensitive data sent in the clear or stored in the cloud with little or no protection).
https://petsymposium.org/popets/2023/popets-2023-0013.pdf
Attachment: popets-2023-0013.pdf (1.4MB) This file has been downloaded 320 times
|
|
Fantasma4500
International Hazard
Posts: 1681
Registered: 12-12-2012
Location: Dysrope (aka europe)
Member Is Offline
Mood: dangerously practical
|
|
vague number from hm- 10 years ago, 1% of the population in my country is actively under surveillance
the rest just get all their data dumped into a hard drive, naturally- sorted through some word scanner, surely social media profile connections are
scanned
i always pay with money in stores, for years i ate just pasta and meatsauce 3 times a day, never looked up anything about pasta sauce- never.
never paid with card
never spoke about it.
one day i got adds about pasta sauce. how?
i have heard from people who got in trouble that within very short amount of time police was through all security parameters on their phones, asking
them questions about people on encrypted apps. 10 years ago it took them 10 minutes to get access to facebook account by contacting UK surveillance
demons
but now- they were interrogating these people on the spot, not like they striked them down- he was caught with something, supposedly stopped for
routine check and immediatedly they had access
dont be naïve, online you write with pen not pencil.
|
|
Pages:
1
2
3
4 |