Experts: Breach at IT Outsourcing Giant Wipro by BackwardsCompatible in TechSec

[–]adolfdelbert 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

IT outsourcing is the commercial enterprise practice of the use of outside companies to address information technology functions, i.E. Software development, infrastructure answers, software program help. Popular motives to outsource being access to higher talents, fee to great ratio, ease of upscaling. Companies also often outsource facts storage because it's miles inexpensive to agreement a third birthday party than to buy and keep their very own information garage devices and centers.

PrivacyTools - Encryption Against Global Mass Surveillance by cottoneyejoe in TechSec

[–]Fisuxcel 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

governments love encryption... as long as only they are using it

PrivacyTools - Encryption Against Global Mass Surveillance by cottoneyejoe in TechSec

[–]IkeConn 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

The government doesn't like encryption. That should tell you something.

ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54 by lastwords in TechSec

[–]andrewblanchard 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

With my web server that I am designing exclusively to serve up darkweb pages, I could easily create a darkweb based email service.

I wouldn't trust any email service to not share your info with others

ProtonMail Logged IP Addresses For The Government! Can You Still Trust Them? -Surveillance Report 54 by lastwords in TechSec

[–]lastwords[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

I wonder if Cock.li would do what ProtonMail did in this situation 🤔

YubiKey 4C vs. Nitrokey Pro: Stalemate by LarrySwinger2 in TechSec

[–]LarrySwinger2[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

This article went offline, so I'm documenting the archive.

What to do with these cards? by soap39524 in TechSec

[–]Node 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Stop being a petty criminal.

What to do with these cards? by soap39524 in TechSec

[–]Zapped 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

CANDYASSES? nuclearbomb? DrCock? I've already forgotten some of the other alts.

What to do with these cards? by soap39524 in TechSec

[–]d3rr 3 insightful - 3 fun3 insightful - 2 fun4 insightful - 3 fun -  (0 children)

you got this far and can't think of a zip code or two to try? you're full of it.

What to do with these cards? by soap39524 in TechSec

[–]Drewski 4 insightful - 2 fun4 insightful - 1 fun5 insightful - 2 fun -  (0 children)

Delete them and stop messing with other people's stuff. Even if you don't get caught, it's wrong and you'll have that on your conscience for no good reason.

Shove a gerbil in your ass through a tube by diogenesjunior3 in TechSec

[–]RightousBob 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

If you haven't heard.......the Iron Left are a bunch of shit eating faggots

magnora7...? by diogenesjunior3 in TechSec

[–]RightousBob 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

If you haven't heard.......the Iron Left are a bunch of shit eating faggots

FUCK MAGNORA7 by diogenesjunior3 in TechSec

[–]RightousBob 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

If you haven't heard.......the Iron Left are a bunch of shit eating faggots

IN CASE YOU HAVEN'T HEARD: by diogenesjunior3 in TechSec

[–]RightousBob 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

If you haven't heard.......the Iron Left are a bunch of shit eating faggots

Hacker Controlled Up to 27% of Tor Network to Steal Cryptocurrency by Hrusk in TechSec

[–]adultmanhwa 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

is this just an ads for utopia? won't tor network cleaning their own community frequently?

Hacker Controlled Up to 27% of Tor Network to Steal Cryptocurrency by Hrusk in TechSec

[–]blowininthewind 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

remember how DES was broken? i 'member

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch by asterias in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

I hope Biden actually goes through with it.

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch by asterias in TechSec

[–]Brewdabier 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Quick search and TikTok is in partnership with Oracle and Walmart, if you don't like TikTok selling your information then quit buying from Oracle and Walmart and don't use TikTok. I bet within a month you will force change.

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch by asterias in TechSec

[–]socks 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Yep - this is their way of saying that the data they've already collected and will continue to collect is now part of their policy.

And - not that anyone here wants to read it - but, starting 2 August, Biden Admin will block 59 Chinese companies including Huawei in amended Trump order

TikTok just gave itself permission to collect biometric data on US users, including ‘faceprints and voiceprints’ – TechCrunch by asterias in TechSec

[–][deleted] 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

It was a mistake for Trump to let this disease live; ban TikTok now!

Yahoo Mail Customer Service Helpline Number in the UK by mailhelpline01 in TechSec

[–]Tarrock 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Yahoo

Surprised this relic of the 90's still exists and someone would be shilling for them.

Best Programming Languages to Learn in 2021 by jamessidis in TechSec

[–]sproketboy 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

They're all gay except Java.

Best Programming Languages to Learn in 2021 by jamessidis in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

I learned Kotlin just to make a coin flip app for my phone. All the ones I found on the PlayStore were absolute garbage and had ads plastered all over them.

Is AdGuard Safe to Use? by Oppossum in TechSec

[–]xkingxkaosx 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

until Adgaurd is bought off or merge into an organization that actually is unsafe, Adgaurd is very safe.

I use it in almost all my browsers and operating system. It has a great DNS as well. I use this as a second layer security and never failed me once.

Driving growth with cutting-edge identity platform - CRN - India by jackforbes in TechSec

[–]GlobalTrustopedia 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

The Danger of Social Engineering to Watch Out For by Oppossum in TechSec

[–]iDontShift 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

here I thought we'd learn about the social engineering currently being conducted on the world and the fallout that is likely to come from it.

Does the corona virus attach to glasses, watches and handsfree? by webloog in TechSec

[–]Anykey 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Could you provide a translated version please? The title is intriguing but the content is not in English or any other language I can read...

One in ten shopping ads promoted on Google potentially lead to phishing sites by BeatFour444 in TechSec

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

I've seen some stuff like that too, but it's in the movies section that pops up now and then instead of videos. Brave does a good job at blocking the ads, so I wouldn't know what there is and ain't. I do remember that Trump bought the YouTube banner ad a while back, and I turned my adblock off for a few seconds just to see if it was true — and it was.

One in ten shopping ads promoted on Google potentially lead to phishing sites by BeatFour444 in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Maybe they have to say that to avoid being sued for slander? I always throw in "alleged" with this kind of stuff for that reason.

One in ten shopping ads promoted on Google potentially lead to phishing sites by BeatFour444 in TechSec

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

It gets way worse on YouTube. They've been called out for pedophile ads and virus downloads countless times.

One in ten shopping ads promoted on Google potentially lead to phishing sites by BeatFour444 in TechSec

[–]C3P0 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Maybe, perhaps, possibly, probably, potentially make any claim basically null.

One in one shopping ads promoted on Google potentially lead to phishing sites. That is always true. You've claimed nothing at all.

The Issue of Cyber Resilience by Oppossum in TechSec

[–]adultmanhwa 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

is cyber resilience is the issue of nation stake or just an individual issue?

List of Hacked Organizations Tops 200 in SolarWinds Case by FootballViking in TechSec

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

It puts you through this shady ads page, and I don't see a list, it's just an article talking about the hack.

Dozens of Al Jazeera journalists targeted in apparent iOS spyware attack by HearSmarter in TechSec

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

iOS is spyware.

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Jesus 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

Twitter still has good researchers who are shadowbanned though.

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Jesus 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

I did thrice.

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Popper 4 insightful - 2 fun4 insightful - 1 fun5 insightful - 2 fun -  (0 children)

yeah, now so does twitter, they were supposed to be the replacement for that, people on twitter didn't mind giving out their phone number, just didn't like that they would get censored.

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]magnora7 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (0 children)

Seems that way. Don't they require your phone number to create an account? That's insane to me

The fact it got big, while still having that ridiculous requirement, shows me how it's very likely a honeypot

Which add blockers works best with twitch new add system? by Akali in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Just don't use Twitch. It's only for far-left, SJW activists anyways — they even banned Trump for his stance on immigration, which should be considered an illegal campaign contribution to Joe Biden.

But if you insist on getting your daily dose of Communism, then try Brave: it's built-in ad-block gets just about everything, as well as trackers.

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Popper 6 insightful - 2 fun6 insightful - 1 fun7 insightful - 2 fun -  (0 children)

parler run by mercer family to gather info on people

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]sproketboy 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

LOL just now I'm getting a 500 from yt. Are the missiles in the air?

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]LarrySwinger2[S] 4 insightful - 3 fun4 insightful - 2 fun5 insightful - 3 fun -  (0 children)

There's Orbot for Android, which has a VPN mode. But it doesn't get around the throttling, and it appears to be even heavier for Orbot. The most practical thing for phone is a regular VPN.

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Airbus320 3 insightful - 4 fun3 insightful - 3 fun4 insightful - 4 fun -  (0 children)

Yandex good?

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Airbus320 2 insightful - 3 fun2 insightful - 2 fun3 insightful - 3 fun -  (0 children)

You are a big tech timmy

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Airbus320 3 insightful - 3 fun3 insightful - 2 fun4 insightful - 3 fun -  (0 children)

Twitter is for cucks, use parler instead 🤡

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Tom_Bombadil 3 insightful - 4 fun3 insightful - 3 fun4 insightful - 4 fun -  (0 children)

Nitter?

IDK cause I don't tweet, so...

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]RightousBob 4 insightful - 3 fun4 insightful - 2 fun5 insightful - 3 fun -  (0 children)

Better yet boycott YT and ALL Google products!

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–][deleted] 4 insightful - 3 fun4 insightful - 2 fun5 insightful - 3 fun -  (0 children)

Big Bro needs to know all, in order to deliver the "best" advertising experience. ᶠʳᵉᵉᵈᵒᵐ ᶦˢ ᵇˡᵒᶜᵏᵉᵈ ᵇʸ ᴮᶦᵍ ᵀᵉᶜʰ

Youtube's blocking of Tor and how to work around it by LarrySwinger2 in TechSec

[–]Airbus320 3 insightful - 4 fun3 insightful - 3 fun4 insightful - 4 fun -  (0 children)

Imagine newpipe with tor integrated, that would be awesome

Critical Flaws in Millions of IoT Devices May Never Get Fixed by HearSmarter in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Exactly. I'm considered the "techie" in my family, but even I draw the line somewhere.

Critical Flaws in Millions of IoT Devices May Never Get Fixed by HearSmarter in TechSec

[–]Trajan 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Personally, no. I’m perfectly happy with dumb appliances that do the job when I press the button or set a timer. I don’t need an Internet connection to keep milk and sausages chilled.

Critical Flaws in Millions of IoT Devices May Never Get Fixed by HearSmarter in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Do you really need a smart fridge, though? Technology is always going to be vulnerable, so the best solution is to just buy a normal fridge. Even if we assumed it was perfectly secure, it's probably spying on you for Facebook and Google.

Critical Flaws in Millions of IoT Devices May Never Get Fixed by HearSmarter in TechSec

[–]Trajan 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

It’s going to be a growing issue, and most owners won’t even realise that their fancy TV or fridge needs security patches. Maybe this should be similar to consumer law? Require manufacturers/resellers to guarantee security updates for x number of years?

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

i did too, and they seem sketchy,

what bothered me the most in some of them was you can't change the admin password, so ya they can most likey login

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–]whistlepig 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Some have been reverse engineered to a degree and have open source firmware made for them. I bought a cheap chinese wifi surveillance cam a few months ago with the intent of seeing what I could do with it.. but its still in the box. haven't devoted the time to see what firmware I can find yet

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–]ah2020 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Probably...

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–]ah2020 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Sadly my assumption too.

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–]ah2020 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Ugh

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–]Intuit 6 insightful - 1 fun6 insightful - 0 fun7 insightful - 1 fun -  (0 children)

I'd assume that every device, chipset, and processor does unless there's strong evidence otherwise.

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices by HearSmarter in TechSec

[–]HiddenFox 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (0 children)

Ugh, I bought Chinese made Wifi surveillance cams... I often wondered if they somehow could provide a back door to my network....

Multiple Tor security issues disclosed, more to come by quipu in TechSec

[–]ABlueSkilttle 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Sadly, as the opsec people tend to say, if mossad is after you mossad gonna get you. Flash drives are hardly secure either, and given how many resources the government has poured into penetrating Tor nodes I've no doubt it's severely compromised. Inevitably, end-to-end encryption like offered by I2P will also fail due to the future of optical computing. While I sincerely doubt optical in its potential ability to replace general computing, I am greatly concerned about a niche use in raw brute forcing for cryptography.

If the governments of the world ever truly become able to penetrate high level encryption, aside from just mossading you and taking all your shit with the infinite resources of government to dredge bits of leftover data from physical drives, we're all doomed.

Multiple Tor security issues disclosed, more to come by quipu in TechSec

[–]Turn0ffy0urmind 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

This. Tor is the best anonymity system we have. If you're concerned with being totally anonymous on the net boot Tails from a USB drive and educate yourself on how it works as well as encryption and cryptocurrency. Never send or receive sensitive information from windows, mac, (most flavors of) linux, android or ios.

Multiple Tor security issues disclosed, more to come by quipu in TechSec

[–]ABlueSkilttle 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

This kind of thing has always been a problem. The real Tor users, same with the I2P and other security network users, know to disable javascript and other likely exploits. They know to use custom linux distros. People who are using things like browsers on insecure dirty operating systems like Windows, that leave traces in triplicate of everything, aren't interested in security and are asking for trouble.

Multiple Tor security issues disclosed, more to come by quipu in TechSec

[–][deleted] 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Multiple Tor security issues disclosed, more to come by quipu in TechSec

[–]quipu[S] 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (0 children)

For the record, I read his original disclosures and I think he is inflating the importance of them (FWIW one of them is in Tor Browser, not Tor). In a way this reads like FUD against Tor, which is still one of the best anonymity tools out there. The issues he is describing should be addressed, though, and it does seem like they have some problems in their bug management processes.

New ‘Meow’ attack has deleted almost 4,000 unsecured databases by magnora7 in TechSec

[–]C3P0 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Thanks.

New ‘Meow’ attack has deleted almost 4,000 unsecured databases by magnora7 in TechSec

[–]magnora7[S] 5 insightful - 2 fun5 insightful - 1 fun6 insightful - 2 fun -  (0 children)

New ‘Meow’ attack has deleted almost 4,000 unsecured databases by magnora7 in TechSec

[–]magnora7[S] 5 insightful - 2 fun5 insightful - 1 fun6 insightful - 2 fun -  (0 children)

I found a better article: https://www.welivesecurity.com/2020/07/27/almost-4000-databases-wiped-meow-attacks/

The onslaughts owe their moniker to the fact that the data is overwritten with random characters that include the word ‘meow’.

New ‘Meow’ attack has deleted almost 4,000 unsecured databases by magnora7 in TechSec

[–]wuzizname 4 insightful - 2 fun4 insightful - 1 fun5 insightful - 2 fun -  (0 children)

Why is it called meow attack?

New ‘Meow’ attack has deleted almost 4,000 unsecured databases by magnora7 in TechSec

[–]C3P0 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (0 children)

Don't even bother writing an article unless you are going to detail how to prevent it or what it even is.

New ‘Meow’ attack has deleted almost 4,000 unsecured databases by magnora7 in TechSec

[–]m68k 3 insightful - 4 fun3 insightful - 3 fun4 insightful - 4 fun -  (0 children)

Does my post count as a meow attack?

:3 :3 :3 :3 :3

Two Chinese Hackers Indicted for Stealing Terabytes of Data Over Eleven Years by hennaojichan in TechSec

[–][deleted] 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

"Former classmates in electrical engineering" ... so cool: I'm starting in electrical engineering right now. :)

That is why: "A man needs a code". (from "Omar the Terror" from https://en.wikipedia.org/wiki/The_Wire)

In my cases there are even codices. Blackhat hacking is almost always like using a rocket while being https://looneytunes.fandom.com/wiki/Wile_E._Coyote . Defense is just soooo much easier and includes NO risk: Even the opposite to offensive is true: You can get payed very well for it in a legal way, if it actually is your cup of tea.

3 interesting features of MySQL I bet you didn't know about by D0z in TechSec

[–]C3P0 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Unreadable. The author, who is supposedly a web designer, uses the <p> tag to display MySQL code instead of the <pre> tag. Also, code should be monospaced.

New LVI Intel CPU Data Theft Vulnerability Requires Hardware Fix | BleepingComputer by [deleted] in TechSec

[–]Southbound06 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

I have a very easy solution. AMD. Tell me one known vulnerability discovery that affects 3rd gen.

Is WhatsApp Safe and Secure? | Utopia.Fans by Hrusk in TechSec

[–]Southbound06 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Secure? Not anymore. With EARN-IT being passed recently and with companies being legally required to lie about snooping your data, which has been the case for a much longer time, There's no sure way to know who has your data anymore.

Kids Need Encryption in Today's Internet | Tutanota Blog by [deleted] in TechSec

[–]nolocus 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Everyone needs encryption. My favorite email program for many years.

Kids Need Encryption in Today's Internet | Tutanota Blog by [deleted] in TechSec

[–]hennaojichan 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

His name was GEORGE SOROS

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show by JasonCarswell in TechSec

[–]jmichaelhudsondotnet 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Establishing yourself as a journalist, you do have to provide credentials and not just appear out of nowhere, which is what all of these people are.

And once I know one of them isnt real, and the conscious resistance is not real, anyone else who promotes them are suspect. That includes in this case the corbett report, who plugs the conscious resistance. They operate in networks to give the illusion of popular support. It is a major cop tactic that cops help the reps of other cops and team up against those that are not in on their game.

It became legal around 2012 for the us military to create propaganda for the us population, and if you are unable to detect any of this, well, then they have you hook line and sinker. Once no one trusts them, they disappear like debbie lusignon. Whitney webb gets upvoted at r/conspiracy, which is impossible for any truly independent journalist at this point, which should be enough evidence for any discerning person.

You also "jason carswell" fit the entire checklist of paid shill as well, and I have not encountered any real accounts here at saidit yet, fwiw.

The primary trait being the complete and utter ability to rationally discuss police state infiltration of civilian society, throwing 10 whataboutsisms and playing completely dumb to the existence of cointelpro, and other things discussed above.

I had hoped there would be less of this at saidit but here we are.

By comparison I have written and self published nearly 500 pages, plus posts at numerous sites, attempting to out the tactics they are using, and report constant harassment, censorship, sabotage, threats, infiltration. And by comparison any of the people you list, and yourself, if you were actually writing the things powerful people did not want you to write, would not have such an easy ride while you throw around cliches about rising up.

So no, I do not need proof, I just need a bullshit detector and it is going off full red alert on you and everyone you reference. And any proof I would provide you would just move the goalposts until I was breaking into someone's apartment looking for their secret code sheets, at which point in time I would be accused of insanity, trying to prove something to the esteemed "jason carswell."

That I even have to explain this....

How The Android Malware That Survives Factory Reset Works by LarrySwinger2 in TechSec

[–]LarrySwinger2[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Not a representative tl;dr. It is indeed curious that it comes back on cheap Chinese phones even after reflashing the default ROM. But the article doesn't say it primarily relies on manufacturers installing backdoors. It also affects phones that are not backdoored, and on those, reflashing will remove it. And anyway, the article is so short that it doesn't need a tl;dr.

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show by JasonCarswell in TechSec

[–]JasonCarswell[S] 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

Evidence?

Extraordinary claims require extraordinary evidence, not just flinging opinion to the wall to see what sticks.

Whitney Webb seems real enough to me. Knows her shit inside and out and deserves all the accolades she gets. Among the sea of truth-seekers, she has managed to stand out. I say bravo to her being the female James Corbett, on who's shoulders she in part stands. It took him a dozen years to achieve what she has in the couple that I've been aware of her, though I suspect more I didn't know about.

Debbie, the Sane Progressive, also knows her shit. Before Vegas I was following her keenly and I was concerned for her with her epic rants, and finally she blew a gasket and stepped back. Not so sane. Not crazy, but emotionally fragile.

I have yet to see ANY problem with TLAV or Broze or Johnstone. I'm not familiar with Free Thought or Mint Press enough, and wonder what motivated Whitney to change. I don't know those others but they're in good company, so thanks for the references to dig into.

What about James Corbett, Know More News, Ryan Dawson, Truthstream Media, reallygraceful, etc? And how are the messages different between those you claim are controlled or limited hangouts and those who aren't yet seek and speak truth?

We all appeared on the Internet one day. Interesting theory about Steemit, though I'm not sure those folks are whales. If you can write up an article with citations and an abundance of evidence then I'd be very keen to see it, and even promote it if it looks correct.

These people have limited time, so no answer is not uncommon, and evasive answers might be your interpretation of an answer that simply didn't meet your needs for details. They can only indulge with answers so much.

On Steemit you either need to crawl up through their rigged system and earn your position - or you have to come ready to Steemit with a fanbase - which many of them have built via other social network platforms. Also, people of note tend have a natural viscosity to the public, simply because that's how people view "celebrity". One famous person talking to another famous person is memorable. One famous person talking to a person who is never seen again is forgettable. They talk to more non-famous people all the time, yet we remember it like it's a small club. This is obvious.

Are you kidding? Whitney just released Part 1 of a recording that introduces a LOT of new information. And so much more beyond. Yes, she's digging up old information, but so much of it did not have dot-connecting context to it, or was lost in the memory hole. For those of us who are new to truth-seeking and haven't been following along intensely since the 90s and before, this is VERY important work.

You have my attention now. But when I finish my epic story, eventually, I might be fortunate enough to achieve some success with it. At that point I'm pretty sure I won't have time for these discussions. That won't make me a shill. It makes me occupied with other priorities in my life.

I agree there's a war on journalists and there's a lot of misinformation out there. But it's also important NOT to call our friends enemies.

You need to bring the proof in a big way. I'm open to it.

How The Android Malware That Survives Factory Reset Works by LarrySwinger2 in TechSec

[–]jmichaelhudsondotnet 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

tl:dr It works by the company who built the hardware designing the phones primarily for surveillance and secondarily for everything else, knowing full well you are going to try to not be tracked, and intending from the very beginning to thwart your attempts not to be tracked

"how does it gain root access that easily"

answer: you get a big advantage if you designed and constructed the device, and a bigger disadvantage if you did not yet are too unintelligent not to realize your disadvantage or the true nature of your adversary due to their ubiquitous advertising campaign

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show by JasonCarswell in TechSec

[–]jmichaelhudsondotnet 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

Whitney Webb is controlled opposition, she is not a real person.

Debbie LuSignon was the same thing in regards to the Las Vegas shooting, Whitney Webb is the epstein version.

The Last American Vagabond, Caitlin Johnstone, The Conscious Resistance, Mint Press News, The Free Thought Project, Disobedient Media, Elizabeth Lea Vos, Adam Carter

These are all disinformation agents and if you look into the backgrounds of all of these people, you will not find them, they simply appeared one day on the internet and gave each other credibility. Steemit is one of the keys to it, you can see them all upvoting each other and associating with the account V4vapid.

I spent some time under an alias trying to figure out what all of these people were up to, and they did not answer any direct questions, were evasive, yet are very chatty with each other. And get $ from upvotes on steemit without effort. (you try that sometimes)

Sadly, this means anyone who promotes them heavily is also probably in on it.....or very gullible. Whitney Webb is essentially Epstein investigating himself, which is also why nothing she says ever results in anything changing, and why she never herself, or any of these outlets, finds any new facts. They only re-report what is known.

"The Pentagon is going to war on journalists" - Michael Hastings, shortly before he was murdered

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show by JasonCarswell in TechSec

[–]JasonCarswell[S] 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

A+++ = my #PayFuckingAttentionToThis

I've been too lazy to bother with the A, A+, and A++, and my personal vast archive has sadly lost my ranking additions, largely since joining SaidIt.

Ultimately, it's a matter of managing my time/energy/focus while multitasking. I am a terrible creature of habit and surfing/SaidIting is my default. I now finally understand how Reddit became popular. Though other forums may technically or even topically be superior in some ways, it's the MSM media's default references to it that made it a familiar brand name.

After my cat died I slipped into depression again, perhaps in part due to that, but likely also from my natural erratic cycles. When I finally felt better I had a jaw infection that kept me from my A game. Turns out a bump on my jaw bone, well below my gums and behind my teeth on the inside, was cut, infected, and the bone spur emerged. I have a similar bump on the otherside too, but it remains covered by gums/flesh. Bizarre. Anyway, I slipped into my default habits again.

Now that I'm feeling better I'm determined to fix my CSS, with your help (I tried to fix the banners but don't know why they don't work now), promote WikiSpooks' 10th anniversary, and finish my damn story.

How The Android Malware That Survives Factory Reset Works by LarrySwinger2 in TechSec

[–]AntiLowEffortHuman 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Yeah I guess. Had a shitty older Chinese Mediatek phone. Was 16-17 at the time with no mobile internet and wanted to hack wifi networks, so used the easiest method to root. an app named Kingroot did it within seconds. The things the phone and i went through... Sigh. good times.

I wonder if it is this easy on desktop distros of linux? It requires a password, yes, but i hope there are no vulnerabilities.

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show by JasonCarswell in TechSec

[–]d3rr 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

Oh, the illusive triple plus. Saved and updooted.

Security State Using Coronavirus To Implement Orwellian Nightmare [with Whitney Webb] (30:03) ~ The Jimmy Dore Show by JasonCarswell in TechSec

[–]JasonCarswell[S] 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

EPIC INTERVIEW! A+++

This was from the live show the other day. It's terrific to see Whitney Webb bust through the defensed of Jimmy Dore's limited hangout. Also of note, his chat is bombarded with people asking them to interview The Last American Vagabond, Ryan Dawson, Jason Bermas, The Conscious Resistance, and of course James Corbett. They keep pretending they don't know them, but they can't much longer, especially with so much repetition. Jimmy Dore is the door to a more mainstream audience.

How The Android Malware That Survives Factory Reset Works by LarrySwinger2 in TechSec

[–]LarrySwinger2[S] 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

I suppose it depends on what model phone you have. I don't think it can root my BlackBerry Priv either. But from what I understand, you can root other phones simply by installing and running an app. If the virus gets installed, it should be able to do the same.

How The Android Malware That Survives Factory Reset Works by LarrySwinger2 in TechSec

[–]AntiLowEffortHuman 2 insightful - 3 fun2 insightful - 2 fun3 insightful - 3 fun -  (0 children)

Holy shit! How does it gain root access that easily? I was not able to root my Huawei no matter what I did. Finally I fucked up and dropped it while riding a scooter. So it's screen cracked before its root protection. I'd love to see if this malware is able to root that thing.

UN, WHO & Mila Map the AI vs COVID-19 Battlefield by Maruko in TechSec

[–]x0x7 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

If we use AI as a central intelligence to craft policy to minimize the spread of coronavirus, it will have to form policies that harm humans in some dimension. What if it then figured out that if there are no humans there will be no coronavirus, or at least if there were fewer. Then it directed policies designed to kill humans that we believed were reasonable, like lock-in orders, that would starve us economically and lead to the deaths needed to stop corona virus spread.

Don't lose your privacy with Utopia p2p by Hrusk in TechSec

[–]pastnowtomorrow 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

definitely agree. everyone needs advanced protection for their info

CIA is not omnipotent anymore :) by Hrusk in TechSec

[–]Oppossum 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

If such app really exists,it will be interesting to use. As I've never met anything REALLY secured.

Samsung: Anyone's thumbprint can unlock S10 phone by Mnemonic in TechSec

[–]Mnemonic[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Exactly, the thumbprint is easier to 'hack'/'crack' than any sufficient password.

Samsung: Anyone's thumbprint can unlock S10 phone by Mnemonic in TechSec

[–]felisc 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Anyone using a thumbprint to unlock their phone doesn't actually care about security anyway

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts by Mnemonic in TechSec

[–]Ian 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (0 children)

Soon I'd rather walk and swim than fly...

You Might Want to Uninstall VLC. Immediately. by Mnemonic in TechSec

[–]OmegaUser296 7 insightful - 2 fun7 insightful - 1 fun8 insightful - 2 fun -  (0 children)

[Update 8:35 AM] Based on a tweet by VideoLAN, VLC may not be as vulnerable as it initially appeared. VideoLAN says the “security issue” in VLC was caused by a third-party library called Libebml that was fixed 16 months ago, and that Mitre’s claim was based on a previous (and outdated) version of VLC.

[Update 10:30 AM] The VLC CVE on the National Vulnerability Database has now been updated, downgrading the severity of the issue from a Base Score of 9.8 (critical) to 5.5 (medium), with the change log also specifying that the “Victim must voluntarily interact with attack mechanism.”

You Might Want to Uninstall VLC. Immediately. by Mnemonic in TechSec

[–]fred_red_beans 7 insightful - 2 fun7 insightful - 1 fun8 insightful - 2 fun -  (0 children)

Sadly, that means while people are waiting for a fix, your only recourse to protect yourself from the flaw is to uninstall VLC

or just not run it, there's no background process

You Might Want to Uninstall VLC. Immediately. by Mnemonic in TechSec

[–]solder0 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

D: Wut!

British Airways Faces Record-breaking GDPR Fine [£183 Million] after Data Breach by BackwardsCompatible in TechSec

[–]magnora7 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Oof. Yet another reason for desiring Brexit for them, I imagine.

Mozilla Patches Firefox Zero-day Abused in the Wild by BackwardsCompatible in TechSec

[–]BackwardsCompatible[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

That was an accident, sorry. Thank you for pointing it out.