It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In the video game "Watch Dogs," player-character Aiden Pearce hacks a city's streetlights, drawbridges, ATMs and more — just by tapping on his smartphone.
The near-future version of Chicago in which the game takes place is tied together by a citywide operating system called ctOS, which connects everything from traffic lights and ATMs to cars and cellphones — and also collects reams of personal data on each citizen into allegedly private profiles.
But Watch_Dogs also shows Pierce hacking cameras, traffic lights, and other infrastructure using his smartphone…Is that possible?
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network[1], Debian GNU/Linux[2] and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
To learn more about security and anonymity under Whonix, please continue to the About Whonix page. Whonix is free as in price and freedom, lets you run anonymous applications and servers. Whonix has been rated 5/5 stars by users of sourceforge.net on 2014-03-12
originally posted by: mockingmay
a reply to: projectvxn
Thats good. I was hoping that was your intent and that goes for everyone else who has read your thread.
The nation's energy grid is constantly under attack by hackers.
In fiscal year 2014, there were 79 hacking incidents at energy companies that were investigated by the Computer Emergency Readiness Team, a division of the Department of Homeland Security. There were 145 incidents the previous year.
A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).[1] Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[2] Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers.
Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
originally posted by: verschickter
This is no hate, I just think this thread is misleading and poorly researched. But I respect your effort.