It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: BuzzyWigs
a reply to: StargateSG7
Sincere question: Are you just copying and pasting some website's content?
Seems pretty 'third-generation-xerox' type stuff.
Not even trying to write original thoughts?
Strange formatting for a human actually typing on a forum.
originally posted by: StargateSG7
originally posted by: BuzzyWigs
a reply to: StargateSG7
Sincere question: Are you just copying and pasting some website's content?
Seems pretty 'third-generation-xerox' type stuff.
Not even trying to write original thoughts?
Strange formatting for a human actually typing on a forum.
...uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.
My text formatting is DESIGNED to obfuscate certain
things but STILL INFORM YOU which is why I link to
patents and other websites or documents which,
IF YOU ACTUALLY TAKE THE TIME TO READ,
in a round-about manner tend to support
and/or confirm my assertions....!!!!
..uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.
Automated Electromechanical PIN Cracking: R2B2 and C3BO
originally posted by: TerryDon79
a reply to: StargateSG7
I got a question for you.
Let's say this thing is real. How exactly would anything being talked about in front of a touch screen monitor be transmitted?
Would it be through the computer the screen is connected to? If that's the case then how do they get around firewalls, antivirus software, the thing not being on the internet?
Same with a mobile phone. There would need to be software on there as hardware does nothing without coding. If you're going to go through all the trouble of putting extra chips in phones and having software decode the electrical energy into sound waves on the other end, would it not be easier just to put malware on the phone to set it to record from the microphone?
That's where the whole thing falls apart. The idea is over kill. Why have extra hardware, software (on both ends) and special decoding when all you would need is a small bit of malware to record and send through instant delete text or transmit to a secure phone number which records on the other end?
originally posted by: BuzzyWigs
a reply to: StargateSG7
..uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.
Okay - I'll take you at your word. So, why are you risking your own integrity by telling us, a bunch of anonymous conspiracy theory site frequenters? What do you think that will accomplish?
Why don't you publicly blow the whistle if you are so privy to such sensitive stuff? Be Assange! Be Snowden! GET YOUR DUE!!! Expose this stuff on live network tv - tell the world!!!!
You GO!!! DO IT!!!
Automated Electromechanical PIN Cracking: R2B2 and C3BO
"R2B2 and C3BO"? Really? Lame. Sorry, not buying it.
Automated Electromechanical PIN Cracking: R2B2 and C3BO
Password and PIN systems are often encountered on mobile devices. A software approach to cracking these systems is often the simplest, but in some cases a pen tester or forensic investigator may have no better option than to start pushing buttons.
Robotic Reconfigurable Button Basher (R2B2) is a robot designed to manually brute force PINs or other passwords via manual entry. R2B2 can operate on touch screens or physical buttons. R2B2 can also handle more esoteric lockscreen types such as pattern tracing. R2B2 can crack a stock Android 4 digit PIN exhaustively in 20 hours. Times for other devices vary depending on lockout policies and related defenses.
Capacitive Cartesian Coordinate Bruteforceing Overlay (C3BO) is a combination of electronics designed to electrically simulate touches on a capacitive touch screen device. C3BO has no moving parts and can work faster than R2B2 in some circumstances.
Both tools are built with open source software. Parts lists, detailed build instructions, and STL files for 3d printed parts will be available for download.
R2B2 and C3BO will be running against live devices at the kiosk!
originally posted by: TerryDon79
a reply to: StargateSG7
And you think this hardware runs by itself without and software?
Not gonna happen.
If I have a bunch of circuit boards sitting there, they're not doing anything until I code them.
To transmit the data it would need to be done through either a phone connection or internet connection. An airlocked system has neither so this would be redundant in that case.
Again, malware/virus would be the easiest approach. If you think otherwise, let me just point to stuxnet.
originally posted by: StargateSG7
As per your own screen name...my DUTY
on ATS is to absolutely get YOU HYPED and
with my media training that means bait-click
like HEADLINE WRITING !!!
originally posted by: Vasteel
originally posted by: StargateSG7
As per your own screen name...my DUTY
on ATS is to absolutely get YOU HYPED and
with my media training that means bait-click
like HEADLINE WRITING !!!
Are you doing a study on how media can be used to persuade people on an invalid argument by any chance?
Headline writing, emphasising certain words, linking to seemingly-relevant-but-not-really sources / patents, claiming to have a secret source / be an insider...etc
originally posted by: TerryDon79
a reply to: StargateSG7
So customer hacked software?
Why not just use "custom hacked software" to use the MICROPHONE?
originally posted by: StargateSG7
8) Custom HACKED software takes that UNFILTERED
electrical noise and digitally converts it to weak but
discernable impulses of numeric values that represent
amplitude and frequency too!
9) That series of numbers is compared to a secret onboard
database of human voice samples of COMMON phonemes
(male and female) ad pronunications of common vowels
and consonants.
10) the VOCODER then re-creates a mimicry of what
the voice PROBABLY sounded like in it's original form.
That VOCODER data is then converted to easily compressible
text which is then transferred to VARIOUS locations using
common network tarnsmission techniques (TCP/IP or USB)
OR stored secretly on the connected computing system
for LATER PHYSICAL retrieval!