Re: If this doesn't define what TOR really is, what does?

2017-03-07 Thread juan
On Wed, 8 Mar 2017 00:37:13 -0500
Steve Kinney  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> 
> 
> On 03/07/2017 06:27 PM, John Newman wrote:
> 
> >>> Not sure about those two. Another explanation could be this :
> >>> 
> >>> there wasn't any malware served, and the users of the site
> >>> were identified using plain old traffic analysis. That's
> >>> certainly something that both the government AND the tor mafia
> >>> would like to sweep under the rug.
> >>> 
> >>> 
> > 
> >> I think that might be very likely. How many times has the tor
> >> project publicly acknowledged attacks involving ephemeral setup
> >> of large number of tor nodes for purpose of attack?
> > 
> >> Would NSA even need to own any nodes considering how many
> >> different places they have taps into the internet? I don't think
> >> so.
> 
> Sounds reasonable if NSA was involved:  But this show was billed as an
> FBI production, and I don't think the NSA ventures into law
> enforcement territory.  

well, this isn't exactly news...


https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering

or was your remark sarcastic? =P


> The narrative presented by the FBI, including
> the use of an exploit against Firefox + Microsoft sounded plausible to
> me at the time.
> 
> :o)
> 
> 
> 
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2.0.22 (GNU/Linux)
> 
> iQEcBAEBAgAGBQJYv5iJAAoJEECU6c5Xzmuq1lcIALirvX7yZ10VI8sbQNyjrPLI
> hcXa4kiQF4yvzGZMLYaXGCVHU8VJ2J0qE0YBr/vG5K0Z1LjiwMuPxNUgg3worx9n
> NXRMWO5LaF/4F5b6nQPuqlt/fpizKMpr3WTuhLTz2FkR+rMonlCVFm3QdsQ9dvwJ
> haZ/UwetKzJNxJfFDQNCKobtknZyfs05hUvcdWMLefiZeOXD9duNmk8PUNBwJy4I
> +Y+467G9BKDrs5AUQVe4rKBWoG4xI8ewB7Ks1oHjWueAhZ9vGyaTWx7dvRl/iOqK
> RU7UplXG8H72BwFQDABbxPRpgli+zc4NKAH1WlOk00rKXWzfDKZ4gSCuJ7uC/Do=
> =B6WC
> -END PGP SIGNATURE-



Re: If this doesn't define what TOR really is, what does?

2017-03-07 Thread Steve Kinney
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



On 03/07/2017 06:27 PM, John Newman wrote:

>>> Not sure about those two. Another explanation could be this :
>>> 
>>> there wasn't any malware served, and the users of the site
>>> were identified using plain old traffic analysis. That's
>>> certainly something that both the government AND the tor mafia
>>> would like to sweep under the rug.
>>> 
>>> 
> 
>> I think that might be very likely. How many times has the tor
>> project publicly acknowledged attacks involving ephemeral setup
>> of large number of tor nodes for purpose of attack?
> 
>> Would NSA even need to own any nodes considering how many
>> different places they have taps into the internet? I don't think
>> so.

Sounds reasonable if NSA was involved:  But this show was billed as an
FBI production, and I don't think the NSA ventures into law
enforcement territory.  The narrative presented by the FBI, including
the use of an exploit against Firefox + Microsoft sounded plausible to
me at the time.

:o)



-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJYv5iJAAoJEECU6c5Xzmuq1lcIALirvX7yZ10VI8sbQNyjrPLI
hcXa4kiQF4yvzGZMLYaXGCVHU8VJ2J0qE0YBr/vG5K0Z1LjiwMuPxNUgg3worx9n
NXRMWO5LaF/4F5b6nQPuqlt/fpizKMpr3WTuhLTz2FkR+rMonlCVFm3QdsQ9dvwJ
haZ/UwetKzJNxJfFDQNCKobtknZyfs05hUvcdWMLefiZeOXD9duNmk8PUNBwJy4I
+Y+467G9BKDrs5AUQVe4rKBWoG4xI8ewB7Ks1oHjWueAhZ9vGyaTWx7dvRl/iOqK
RU7UplXG8H72BwFQDABbxPRpgli+zc4NKAH1WlOk00rKXWzfDKZ4gSCuJ7uC/Do=
=B6WC
-END PGP SIGNATURE-


Vault 7: Year Zero

2017-03-07 Thread booty
hi ceecee !

--

List of japanese faces cia uses

¢‿¢

©¿© o

ª{•_•}ª

¬_¬

¯\(º_o)/¯

¯\(º o)/¯

¯\_(⊙︿⊙)_/¯

¯\_(ツ)_/¯

°ω°

°Д°

°‿‿°

°ﺑ°

´ ▽ ` )ノ

¿ⓧ_ⓧﮌ

Ò,ó

ó‿ó

ô⌐ô

ôヮô

ŎםŎ

ŏﺡó

ʕ••ʔ

ʕ•ᴥ•ʔ

ʘ‿ʘ

˚•_•˚

˚⌇˚

˚▱˚

''\\=(•●)=//'

° ʖ °

Σ ◕ ◡ ◕

Σ (゚Д゚;) surprised

Σ(゚Д゚;≡;゚д゚) confusion

Σ(゚Д゚ )

Σ(||゚Д゚) scary

Φ,Φ

δﺡό

σ_σ

д_д

ф_ф

щ(゚Д゚щ) < "Dear god why‽ )

щ(ಠ益ಠщ)

щ(ಥДಥщ)

Ծ_Ծ

‿

_

˚௰˚づ

˚ᆺ˚ว

ᇂﮌᇂ)

๏๏

๏๏)

◔◔

(××)

(●•)

(๏๏)

(๏ ๏)

(ಥ_ಥ)

(••)

(●•)

(●●)

(。•‿•。)

(-•)

(–)

_

_

ↁﮌↁ

⌤_⌤

॓_॔

१✌◡✌५

१|˚–˚|५

ਉ_ਉ

ଘ_ଘ

இ_இ

ఠ_ఠ

రృర

ಠ¿ಠi

ಠ‿ಠ

ಠ⌣ಠ

ಠ╭╮ಠ

ಠ▃ಠ

ಠ◡ಠ

ಠ益ಠ

ಠ益ಠ

ಠ︵ಠ凸

ಠ , ಥ

ಠ.ಠ

ಠoಠ

ಠ_ృ

ಠ_ಠ

ಠ_๏

ಠ~ಠ

ಡ_ಡ

ತಎತ

ತ_ತ

ಥдಥ

ಥ‿ಥ

ಥ⌣ಥ

ಥ◡ಥ

ಥ﹏ಥ

ಥ_ಥ ⌐■-■

(  ゚,_ゝ゚)

( ・ิз・ิ)

( ゚д゚)、 vomits saliva

( ^▽^)σ)~O~)

゜д゜;

(*´д`*)

(*..Д`)

(*..д`*)

(*~▽~)

(-’๏_๏’-)

(-_- )ノ

(/◔ ◡ ◔)/

(///_ಥ)

(;´Д`)

(=ω=;)

(=゜ω゜)

(>'o')> ♥ <('o'<)

(n˘v˘•)¬

(o´ω`o)

(V)(°,,°)(V)

(\/) (°,,°) (\/) WOOPwoopwowopwoopwoopwoop!

(^▽^)

(`・ω・´) ← Pedobear?

(~ ̄▽ ̄)~

/╲/\╭ºoꍘoº╮/\╱\

<【☯】‿【☯】>

= (゚д゚)ウ

@_@

d(*⌒▽⌒*)b

o(≧∀≦)o

o(≧o≦)o

q(❂‿❂)p

y=ー( ゚д゚)・∵. shot my head

\˚ㄥ˚\

\ᇂ_ᇂ\

\(ಠ ὡ ಠ )/

\(◕ ◡ ◕\)

^^

^ㅂ^

_(๏๏)_

{´◕ ◡ ◕`}

{ಠ_ಠ}__,,|,

{◕ ◡ ◕}

Re: 2017 - the best year yet for Israel

2017-03-07 Thread Zenaan Harkness
Although looks like Australia will remain best ethnic-cleanser buddies
for life:


Australian Foreign Policy and Israel: an Enduring Disgrace
http://journal-neo.org/2017/03/04/australian-foreign-policy-and-israel-an-enduring-disgrace-2/


Rojava - Kurdistan - Assyrians - Neo-colonial use of "alien forefathers" conspiracies

2017-03-07 Thread Zenaan Harkness
Interesting article for those so inclined:




http://www.fort-russ.com/2017/03/ancient-aliens-neocolonialist-myth.html


Re: tails 2.11

2017-03-07 Thread juan
On Tue, 7 Mar 2017 19:58:49 -0500
John Newman  wrote:

> Tails 2.11 is out -
> 
> https://tails.boum.org/news/version_2.11/
> 
> Apparently this will be the last release to support i2p... they say 
> they lack a developer in the team to keep up with it.

so tails is another project of the pentgon funded tor mafia,
and they don't support i2p. They can't be more crass can they. 





tails 2.11

2017-03-07 Thread John Newman
Tails 2.11 is out -

https://tails.boum.org/news/version_2.11/

Apparently this will be the last release to support i2p... they say 
they lack a developer in the team to keep up with it.

[MONEY] Washington's Greatest Geopolitical Blunder Since 1776

2017-03-07 Thread Zenaan Harkness
Imperial chickens coming home to roost - one of the best editorial's
yet by Russia Insider (they're definitely picking up their game lately
and remolding themselves as a news creator, rather than merely a link
aggregator as they started out; props to them).



Washington Makes Biggest Geopolitical Blunder Since 1776

Many thought it could never be done, but Washington has actually managed
to unite the East against a faltering, aimless West
http://russia-insider.com/en/washington-makes-greatest-geopolitical-blunder-1776/ri19125



Re: If this doesn't define what TOR really is, what does?

2017-03-07 Thread John Newman


> On Mar 7, 2017, at 5:55 PM, juan  wrote:
> 
> On Tue, 7 Mar 2017 12:24:29 -0500
> Steve Kinney  wrote:
> 
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>> 
> 
> 
>> 
>> 1)  An as-yet undetected and unpatched vulnerability affecting Firefox
>> and/or the TOR router was used - and the defense team knows it.
> 
> 
>That seems a plausible explanation to me. Web 'standards' and
>web browsers are poorly designed pieces of bloatware and thus
>full of holes.
> 
>However, I think there's a more interesting issue at hand. 
> 
>One would expect the creators of the tor cyberweapon to do some
>sort of 'quality control' no? So if they were actually
>interested in providing security for their users, it would be 
>TRIVIAL for them to constantly monitor a site like the one that
>was allegedly hacked, and so get a copy of whatever malware was
>allegedly served. But it seems that they did not such thing.
> 
>The tor project should be monitoring and protecting 'high
>value' 'targets' like those that carry so called 'child
>pornography' but of course they do no such thing. Because they
>are on the pentagon's payroll.
> 
> 
>> 
>> 2)  The defendant may have traded some information or cooperation, or
>> may have an "insurance file" with enough evidence to convict someone
>> at FBI or DOJ of his same charges or worse.
>> 
>> 3)  The FBI decided to pick one suspect to kick loose with a bogus
>> story indicating an as-yet undetected and unpatched vulnerability, for
>> propaganda purposes.
> 
> 
>Not sure about those two. Another explanation could be this : 
> 
>there wasn't any malware served, and the users of the site were
>identified using plain old traffic analysis. That's certainly
>something that both the government AND the tor mafia would like
>to sweep under the rug. 
> 
> 

I think that might be very likely. How many times has the tor project publicly 
acknowledged attacks involving ephemeral setup of large number of tor nodes for 
purpose of attack? 

Would NSA even need to own any nodes considering how many different places they 
have taps into the internet? I don't think so.



>> 
>> The fog of physical war is hard enough to see through, but with
>> network warfare that fog is hiding... more fog.
> 
>Hehe, indeed.
> 
> 
>> 
>> :o/
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> -BEGIN PGP SIGNATURE-
>> Version: GnuPG v2.0.22 (GNU/Linux)
>> 
>> iQEcBAEBAgAGBQJYvuzMAAoJEECU6c5XzmuqqdYH+wQAyPNymKAPOaIkXF/Y3A7V
>> Ri1rA6XXvxNx6aISrc8yG3xKfqRocGRKmXprRUE7nLrXt92soLSZB5x2Zze3epCn
>> 4wrOFA+Cno3Ig+S1cgmlwf8c59TfYHXRU2S5iUnO7PyRKoG/6VQzMo2PZeglcmQ3
>> 8P31AMl9Za6Hct/rlc84pLBvEHwLQX4Zy2dyrpoLJMKM2jAV4Rwrr4pIXtNjobY/
>> KxsX3MLyau/BbDNPI/Ev8v5en3lgzYjhu2OUMrsH8cAwmyooZCxnSvyZETQmAm5F
>> CPcOHuRPUK/8TnEROMny6NDaUC+eRbPQJEWhpgJ41DsSy3S3Qf01lsJ0wM52zC4=
>> =2Nz6
>> -END PGP SIGNATURE-
> 



Re: If this doesn't define what TOR really is, what does?

2017-03-07 Thread juan
On Tue, 7 Mar 2017 12:24:29 -0500
Steve Kinney  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
 

> 
> 1)  An as-yet undetected and unpatched vulnerability affecting Firefox
> and/or the TOR router was used - and the defense team knows it.


That seems a plausible explanation to me. Web 'standards' and
web browsers are poorly designed pieces of bloatware and thus
full of holes.

However, I think there's a more interesting issue at hand. 

One would expect the creators of the tor cyberweapon to do some
sort of 'quality control' no? So if they were actually
interested in providing security for their users, it would be 
TRIVIAL for them to constantly monitor a site like the one that
was allegedly hacked, and so get a copy of whatever malware was
allegedly served. But it seems that they did not such thing.

The tor project should be monitoring and protecting 'high
value' 'targets' like those that carry so called 'child
pornography' but of course they do no such thing. Because they
are on the pentagon's payroll.


> 
> 2)  The defendant may have traded some information or cooperation, or
> may have an "insurance file" with enough evidence to convict someone
> at FBI or DOJ of his same charges or worse.
> 
> 3)  The FBI decided to pick one suspect to kick loose with a bogus
> story indicating an as-yet undetected and unpatched vulnerability, for
> propaganda purposes.


Not sure about those two. Another explanation could be this : 

there wasn't any malware served, and the users of the site were
identified using plain old traffic analysis. That's certainly
something that both the government AND the tor mafia would like
to sweep under the rug. 


> 
> The fog of physical war is hard enough to see through, but with
> network warfare that fog is hiding... more fog.

Hehe, indeed.


> 
> :o/
> 
> 
> 
> 
> 
> 
> 
> 
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2.0.22 (GNU/Linux)
> 
> iQEcBAEBAgAGBQJYvuzMAAoJEECU6c5XzmuqqdYH+wQAyPNymKAPOaIkXF/Y3A7V
> Ri1rA6XXvxNx6aISrc8yG3xKfqRocGRKmXprRUE7nLrXt92soLSZB5x2Zze3epCn
> 4wrOFA+Cno3Ig+S1cgmlwf8c59TfYHXRU2S5iUnO7PyRKoG/6VQzMo2PZeglcmQ3
> 8P31AMl9Za6Hct/rlc84pLBvEHwLQX4Zy2dyrpoLJMKM2jAV4Rwrr4pIXtNjobY/
> KxsX3MLyau/BbDNPI/Ev8v5en3lgzYjhu2OUMrsH8cAwmyooZCxnSvyZETQmAm5F
> CPcOHuRPUK/8TnEROMny6NDaUC+eRbPQJEWhpgJ41DsSy3S3Qf01lsJ0wM52zC4=
> =2Nz6
> -END PGP SIGNATURE-



[WAR] US and Russian troops jointly patrol and defend Syrian city of Manbij - Turkey smells the roses

2017-03-07 Thread Zenaan Harkness
Times are changing folks, times are changing:



** Shock for Erdogan as US and Russian troops jointly defend Kurdish
controlled Manbij
http://theduran.com/us-russian-troops-present-syrias-manbij/

Manbij Military Council forces, part of the US-backed Syrian Democratic
Forces (SDF), drive a humvee as they patrol the surrounding roads of in
the northern Syrian town of Manbij on March 3, 2017. The Turkey-backed
rebels launched their advance on Manbij on March 1, initially seizing
two villages but losing them to the SDF the following day. / AFP PHOTO /
DELIL SOULEIMAN

US and Russian troops patrol Kurdish controlled Manbij preventing an
attack by the Turkish army.





Not surprising then that:

** Erdogan backs down on Manbij
http://theduran.com/erdogan-backs-down-manbij/

Turkish President Tayyip Erdogan attends a bilateral meeting with U.S.
Vice President Joe Biden in Washington March 31, 2016. REUTERS/Joshua
Roberts - RTSD02Q

Following US and Russian troop deployments to Manbij Turkey backs off
plans to attack the town.





Hopefully the USA Deep State will soon stop with its terror regime:

** 7 Russian officials dead since Donald Trump elected President
http://theduran.com/7-russian-officials-dead-since-donald-trump-elected-president/

1466605260790.cached

A mystery in isolation is curious, a series of similar unexplained
events is a worrisome pattern.





Do not gloat!:

** Mika Brzezinski breaks down in tearful display of Trump fear, “This
is not funny” [Video]
http://theduran.com/mika-brzezinski-break-tearful-display-trump-fear/

Mika Brzezinski break down in tearful display of Trump fear, “This is
not funny” [Video]

Mika Brzezinski cries to her audience saying Donald Trump is mentally
unfit to be President.


Re: WikiLeaks says CIA hacking unit cracked smartphones and TVs worldwide

2017-03-07 Thread John Newman


> On Mar 7, 2017, at 1:12 PM, Razer  wrote:
> 
> “These techniques permit the CIA to bypass the encryption of WhatsApp, 
> Signal, Telegram, Weibo, Confide and Cloackman(sic) by hacking the 
> smartphones that they run on and collecting audio and message traffic before 
> encryption is applied,”
> 
> McClatchy:
> 
>> The CIA has built up a formidable hacking division that has amassed ways to 
>> control smartphones worldwide and turn on the microphones in Samsung smart 
>> televisions, WikiLeaks said Tuesday.
>> 
>> WikiLeaks released  what it said were 8,761 
>> documents taken from the CIA’s Center for Cyber Intelligence in Langley, 
>> Virginia, in what it described as “the largest intelligence publication in 
>> history.”
>> 
>> The documents indicate that the CIA has collected “more than a thousand 
>> hacking systems, trojans, viruses and other ‘weaponized’ malware” that allow 
>> the agency to overcome encryption and seize control of devices from the 
>> biggest tech firms worldwide, including Apple, Google, Microsoft and 
>> Samsung. It said the CIA had purposefully withheld information from the 
>> manufacturers about the vulnerabilities in their systems, undermining a 
>> promise offered by former President Barack Obama to the high-tech industry.
>> 
>> A CIA spokesman declined to say whether the purported leak was real.
>> 
>> “We do not comment on the authenticity or content of purported intelligence 
>> documents,” spokesman Jonathan Liu said.
>> 
>> The WikiLeaks documents, which it said span a period from 2013 to 2016, 
>> reveal an arsenal of malware and dozens of “zero day” exploits against a 
>> wide range of products, including Apple’s iPhone, Google’s Android, 
>> Microsoft’s Windows and even Samsung smart televisions, which are turned 
>> into covert microphones.
>> 
>> Some of the tools would allow the CIA to hack and control popular 
>> smartphones, including the iPhone, giving remote operators access to the 
>> phone’s location and its audio and text communications, and permitting 
>> covert activation of the camera and microphone.
>> 
>> While iPhones compose only 14.5 percent of the global smartphone market, 
>> WikiLeaks said the focus on Apple’s iOS operating system “may be explained 
>> by the popularity of the iPhone among social, political, diplomatic and 
>> business elites.”
>> 
>> The documents indicate that the CIA controlled 24 different vulnerabilities 
>> for Google’s Android operating system, which is used in 5 out of 6 
>> smartphones worldwide.
>> 
>> “These techniques permit the CIA to bypass the encryption of WhatsApp, 
>> Signal, Telegram, Weibo, Confide and Cloackman by hacking the smartphones 
>> that they run on and collecting audio and message traffic before encryption 
>> is applied,” WikiLeaks said.
>> 
>> The anti-secrecy organization said it had obtained the documents from 
>> someone associated with the 5,000 hackers in the Center for Cyber 
>> Intelligence who objected to its lack of accountability and duplication of 
>> efforts with the National Security Agency, a rival intelligence arm.
>> 
>> “The source wishes to initiate a public debate about the security, creation, 
>> use, proliferation and democratic control of cyber weapons,” WikiLeaks said.
> 
> 
> http://www.mcclatchydc.com/news/nation-world/national/article136906453.html
> 

Just started browsing through the wikileaks files - some interesting stuff, 
guides on EFI hacking, microtik routers, all sorts of shit under the EDB 
section... 

I wonder if there is some source code coming, that would be nice for a lot of 
these nefarious sounding projects with howto guides that include links to 
internal 10.x git repos..


Dirty fucking CIA :P. 

I wonder how much crossover there was/is in tools dev between them and the NSA?




WikiLeaks Dumps Massive CIA Hacking Program (Vault 7 Part 1)

2017-03-07 Thread grarpamp
https://wikileaks.org/ciav7p1
https://twitter.com/wikileaks
https://file.wikileaks.org/

https://news.ycombinator.com/item?id=13811914
https://news.ycombinator.com/item?id=13810015
https://www.reddit.com/r/WikiLeaks
https://www.reddit.com/r/Android/comments/5y0mol
https://www.reddit.com/r/Bitcoin/comments/5y0e33
https://www.reddit.com/r/news/comments/5y0cr8
https://www.reddit.com/r/technology/comments/5y0akr

"Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android
"zero days" which it has developed itself and obtained from GCHQ, NSA
and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp,
Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart"
phones that they run on and collecting audio and message traffic
before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control
Microsoft Windows users with its malware. This includes multiple local
and remote weaponized "zero days", air gap jumping viruses such as
"Hammer Drill" which infects software distributed on CD/DVDs,
infectors for removable media such as USBs, systems to hide data in
images or in covert disk areas ( "Brutal Kangaroo") and to keep its
malware infestations going.

Hold on to your kernels mates, we goin for a ride :)


WikiLeaks says CIA hacking unit cracked smartphones and TVs worldwide

2017-03-07 Thread Razer
“These techniques permit the CIA to bypass the encryption of WhatsApp, 
Signal, Telegram, Weibo, Confide and Cloackman(sic) by hacking the 
smartphones that they run on and collecting audio and message traffic 
before encryption is applied,”


McClatchy:

The CIA has built up a formidable hacking division that has amassed 
ways to control smartphones worldwide and turn on the microphones in 
Samsung smart televisions, WikiLeaks said Tuesday.


WikiLeaks released  what it said were 
8,761 documents taken from the CIA’s Center for Cyber Intelligence in 
Langley, Virginia, in what it described as “the largest intelligence 
publication in history.”


The documents indicate that the CIA has collected “more than a 
thousand hacking systems, trojans, viruses and other ‘weaponized’ 
malware” that allow the agency to overcome encryption and seize 
control of devices from the biggest tech firms worldwide, including 
Apple, Google, Microsoft and Samsung. It said the CIA had purposefully 
withheld information from the manufacturers about the vulnerabilities 
in their systems, undermining a promise offered by former President 
Barack Obama to the high-tech industry.


A CIA spokesman declined to say whether the purported leak was real.

“We do not comment on the authenticity or content of purported 
intelligence documents,” spokesman Jonathan Liu said.


The WikiLeaks documents, which it said span a period from 2013 to 
2016, reveal an arsenal of malware and dozens of “zero day” exploits 
against a wide range of products, including Apple’s iPhone, Google’s 
Android, Microsoft’s Windows and even Samsung smart televisions, which 
are turned into covert microphones.


Some of the tools would allow the CIA to hack and control popular 
smartphones, including the iPhone, giving remote operators access to 
the phone’s location and its audio and text communications, and 
permitting covert activation of the camera and microphone.


While iPhones compose only 14.5 percent of the global smartphone 
market, WikiLeaks said the focus on Apple’s iOS operating system “may 
be explained by the popularity of the iPhone among social, political, 
diplomatic and business elites.”


The documents indicate that the CIA controlled 24 different 
vulnerabilities for Google’s Android operating system, which is used 
in 5 out of 6 smartphones worldwide.


“These techniques permit the CIA to bypass the encryption of WhatsApp, 
Signal, Telegram, Weibo, Confide and Cloackman by hacking the 
smartphones that they run on and collecting audio and message traffic 
before encryption is applied,” WikiLeaks said.


The anti-secrecy organization said it had obtained the documents from 
someone associated with the 5,000 hackers in the Center for Cyber 
Intelligence who objected to its lack of accountability and 
duplication of efforts with the National Security Agency, a rival 
intelligence arm.


“The source wishes to initiate a public debate about the security, 
creation, use, proliferation and democratic control of cyber weapons,” 
WikiLeaks said.



http://www.mcclatchydc.com/news/nation-world/national/article136906453.html



Re: If this doesn't define what TOR really is, what does?

2017-03-07 Thread Steve Kinney
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



On 03/06/2017 08:40 PM, juan wrote:
> On Mon, 6 Mar 2017 20:20:12 -0500 bbrewer
>  wrote:
> 
> 
>> Re: If this doesn't define what TOR really is, what does?
> 
> 
> What do you mean?
> 
> At any rate, it's hard to believe that no one has a copy of the 
> alleged malware...

So whatever they are hiding is probably not this:

http://resources.infosecinstitute.com/fbi-tor-exploit/

"The FBI used a vulnerability in Firefox 17, on which the Tor browser
is based, to turn Freedom Hosting sites into malware spreading tracker
tools. It all works on the Firefox 17 JavaScript Zero Day Exploit;
this malicious script is a tiny Windows executable hidden variable
named “Magneto” which looks for victim’s MAC address and its hostname
and sends it back as a HTTP web request to the Virginia server to
expose the user’s real IP address. The FBI successfully gained access
to the Freedom Hosting server and injected malicious HTML code, which
checks whether the user’s browser is Firefox 17 or not."

Which raises the question, what ARE they hiding?  Some options, in no
particular order...

1)  An as-yet undetected and unpatched vulnerability affecting Firefox
and/or the TOR router was used - and the defense team knows it.

2)  The defendant may have traded some information or cooperation, or
may have an "insurance file" with enough evidence to convict someone
at FBI or DOJ of his same charges or worse.

3)  The FBI decided to pick one suspect to kick loose with a bogus
story indicating an as-yet undetected and unpatched vulnerability, for
propaganda purposes.

The fog of physical war is hard enough to see through, but with
network warfare that fog is hiding... more fog.

:o/








-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJYvuzMAAoJEECU6c5XzmuqqdYH+wQAyPNymKAPOaIkXF/Y3A7V
Ri1rA6XXvxNx6aISrc8yG3xKfqRocGRKmXprRUE7nLrXt92soLSZB5x2Zze3epCn
4wrOFA+Cno3Ig+S1cgmlwf8c59TfYHXRU2S5iUnO7PyRKoG/6VQzMo2PZeglcmQ3
8P31AMl9Za6Hct/rlc84pLBvEHwLQX4Zy2dyrpoLJMKM2jAV4Rwrr4pIXtNjobY/
KxsX3MLyau/BbDNPI/Ev8v5en3lgzYjhu2OUMrsH8cAwmyooZCxnSvyZETQmAm5F
CPcOHuRPUK/8TnEROMny6NDaUC+eRbPQJEWhpgJ41DsSy3S3Qf01lsJ0wM52zC4=
=2Nz6
-END PGP SIGNATURE-


2017 - the best year yet for Israel

2017-03-07 Thread Zenaan Harkness
First they legislate a travel ban:

- https://www.rt.com/news/379709-israel-bars-boycott-supporters/
"
A spokesperson for Smotrich earlier compared the bill to US President
Donald Trump’s travel ban, saying “without going into the policies of
the [US] president, every sovereign nation must set its policies in
accordance with what is good for it,” The Times of Israel reported.
"



Next they're "warned" by Washington that annexing more land of their
neighbours risks a "crisis" with America:

- https://www.rt.com/news/379676-us-israel-west-bank-annexation/
“We received a message directly — not indirectly, not a hint — from the
US, that Israeli sovereignty over the West Bank means an immediate
crisis with the new administration,”


Add in the Israeli protesters against their own country's ethnic
cleansing program, a rapid global holohoax awareness,
- 
http://www.renegadetribune.com/international-red-cross-report-confirms-holocaust-six-million-jews-hoax/
- https://www.radioislam.org/islam/english/revision/six_million_myth.htm
- http://israelect.com/reference/WillieMartin/HOLOHOAX.htm
- https://en.wikipedia.org/wiki/Holocaust_denial

, similar rising awareness of who controls most of the world's
fiat money supply:
- http://www.rense.com/general85/feddrec.htm

- The Jewish Story Behind the U.S. Federal Reserve Bank
  http://forward.com/culture/325447/the-man-behind-the-fed/

- 
https://europeanmediacentre.wordpress.com/2013/09/02/list-of-banks-owned-by-the-jewish-rothschild-family/
- http://www.realjewnews.com/?p=640
- 
https://archive.org/stream/HowHitlerDefiedTheInternationalBankers/HowHitlerDefiedTheBankers_djvu.txt


and 2017 looks like a perfect storm for some ethnic awarenes to
grip many of the world's people.

Good luck fellow pepes :)


Bitcoin: Early Action and Signaling Towards BU Fork

2017-03-07 Thread grarpamp
https://www.reddit.com/r/Bitcoin+btc/

https://medium.com/@johnblocke/there-will-be-no-bitcoin-split-564f1d60a657
https://medium.com/@johnblocke/there-will-be-no-bitcoin-split-part-2-7dc406cf4469
https://medium.com/@ViaBTC/miner-guide-how-to-safely-hard-fork-to-bitcoin-unlimited-8ac1570dc1a8