It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Visit the Wrong Website, and the FBI Could End Up in Your Computer

page: 2
5
<< 1   >>

log in

join
share:

posted on Aug, 6 2014 @ 04:49 PM
link   
a reply to: aLLeKs




The only way to be secure from hacking is being offline.


Air-gap PC [offline] are fair game and are not necessarily secure.



mashable.com...

Traditionally, common belief held that one of the most effective measures against Internet surveillance was to "air-gap" a computer containing sensitive information — or, in plain English, unplug the laptop or computer's Internet connection, isolating it from the outside world. But thanks to these tiny bugs, this protection method isn't foolproof anymore.


Not going to even mention other means that can monitor what you type and what you are doing remotely without physically hacking your PC offline or online. Ok maybe a few:
curiousmatic.com...

If they want to capture data on you they will capture data on you.


edit on 54831America/ChicagoWed, 06 Aug 2014 16:54:40 -0500000000p3142 by interupt42 because: (no reason given)



posted on Aug, 6 2014 @ 05:36 PM
link   
a reply to: interupt42

unbelievable .. so the only actual way is to just not have a computer I guess or just be .. dead .. or is there some type of hack for that also ? lol .. I'm guessing some time in the future they'll be able to read minds so no one will be safe



posted on Aug, 6 2014 @ 07:08 PM
link   
a reply to: Stuyvesant

So if you know just how deep surveillance is - I do as well. How can you reasonably say 'we are the ones putting our personal data out there?'

That is simply not true anymore. They can pull absolutely anything and everything from your computer, they can access your webcam, your private files, they can even access protected encrypted information stored on your device.

Many people would like to use their computers for record keeping and they would never ever put said data online - they simply store stuff on their hard drives for accessibility and because let's face it typing # is way easier.

Yet the government still steals this stuff...yes steals....They have gone way beyond crossing the line at this point.



posted on Aug, 6 2014 @ 07:17 PM
link   
a reply to: kranskik

Ok here is how to beat this lol when ever you use tor you use it on a virtual machine running a different operating system. Virus is down loaded to a sand box os.

That can be recovered and will not have admin privlages on your actual os. Best of luck to the new tor users you can also get it on your andriod or apple phone its called orbot and orweb. all this does is catch people new to tor dont forget to use proxy chains on your scanner or apps as they will give up your actual ip address.

The reason a virtual machine will work is because the virus will stay on the virtual machine and only be able to access the vms files. Few viruses can infect two diffrent operating systems. You can get vmware or virtual box then get the iso for linux or apple or windows and mount it to the vmware or virtual box
edit on 6-8-2014 by devious003 because: (no reason given)



posted on Aug, 7 2014 @ 08:22 AM
link   

originally posted by: dude77
a reply to: interupt42




I'm guessing some time in the future they'll be able to read minds so no one will be safe



They have been working on it for a while .

www.technologyreview.com...



Edward Chang, a neurosurgeon at the University of California, San Francisco, says he is working toward building a wireless brain-machine interface that could translate brain signals directly into audible speech using a voice synthesizer.



And because the Military cares about your mental health .




the Defense Advanced Research Projects Agency, or DARPA, awarded two large contracts to Massachusetts General Hospital and the University of California, San Francisco, to create electrical brain implants capable of treating seven psychiatric conditions, including addiction, depression, and borderline personality disorder.

the development of microlectronic systems that can fit in the body; and substantial evidence that thoughts and actions can be altered with well-placed electrical impulses to the brain.

www.technologyreview.com...




Death for the time being is the sure method or at least till 2030 if a Russian Billionaire gets his way. He hopes to achieve mortality by uploading his brain just before death to a virtual brain or network.



2045.com...



edit on 27831America/ChicagoThu, 07 Aug 2014 08:27:10 -0500000000p3142 by interupt42 because: (no reason given)



posted on Aug, 7 2014 @ 06:28 PM
link   
a reply to: Stuyvesant

I believe you hit the nail right on the head, good post! Look how easily these hackers get into even highly secure sites, and then think of the average person like you or me on a PC/cell phone/tablet. It's like taking candy from a baby.

Anyone who thinks they are secure online is just kidding themselves. No such thing as security.



posted on Aug, 7 2014 @ 07:28 PM
link   

originally posted by: lightedhype
a reply to: Stuyvesant

So if you know just how deep surveillance is - I do as well. How can you reasonably say 'we are the ones putting our personal data out there?'

That is simply not true anymore. They can pull absolutely anything and everything from your computer, they can access your webcam, your private files, they can even access protected encrypted information stored on your device.

Many people would like to use their computers for record keeping and they would never ever put said data online - they simply store stuff on their hard drives for accessibility and because let's face it typing # is way easier.

Yet the government still steals this stuff...yes steals....They have gone way beyond crossing the line at this point.


I don't disagree with anything you said.

When I said "we are the ones putting our personal data out there" I didn't mean just online, I meant on computers & electronic devices. Even a simple storage device, not hooked up to anything, can be accessed. (At least, I have to make that assumption, based on the tech I have seen.)

Plus, I think we are being conditioned to conduct all business transactions and correspondence through this medium. I believe personal privacy really is a chimera for most people in high-tech environments. Heck, it's probably nearly-nonexistent for people living in rural areas too.

Destroy the computer and go old-school. That's the safe(r) alternative and best option for privacy in these weird times, and every day I think about destroying my computer and actually doing it - but like a lot of people, I have grown used to the ease of it.



posted on Aug, 7 2014 @ 08:04 PM
link   

originally posted by: devious003
a reply to: kranskik

Ok here is how to beat this lol when ever you use tor you use it on a virtual machine running a different operating system. Virus is down loaded to a sand box os.

That can be recovered and will not have admin privlages on your actual os. Best of luck to the new tor users you can also get it on your andriod or apple phone its called orbot and orweb. all this does is catch people new to tor dont forget to use proxy chains on your scanner or apps as they will give up your actual ip address.

The reason a virtual machine will work is because the virus will stay on the virtual machine and only be able to access the vms files. Few viruses can infect two diffrent operating systems. You can get vmware or virtual box then get the iso for linux or apple or windows and mount it to the vmware or virtual box


If you think you are maintaining any kind of anonymity by using Tor, (even by taking the above-mentioned precautions) I think you are horribly mistaken. The authorities have focused attention on Tor and Tor users, so use extreme caution when you think you want to 'try' being anonymous on the web. It raises red flags. Just $0.02 from a paranoid conspiracy theorist who doesn't know anything about computers and surveillance.



posted on Aug, 9 2014 @ 07:45 PM
link   
a reply to: Stuyvesant

I have a degree in information security. I know alot about the subject matter it took me 4 years and countless hours researching the subject. Hiding an ip address is only part of it.



posted on Aug, 9 2014 @ 07:52 PM
link   
With all the trigger words, you can bet at least one conversation you've had on line has alerted a watch program.
I never say anything on line [ or on the phone ] that I wouldn't yell at the top of my lungs, while standing in the middle of the street.



new topics

top topics



 
5
<< 1   >>

log in

join