It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks releases Vault 7!

page: 34
125
<< 31  32  33    35  36 >>

log in

join
share:

posted on Mar, 11 2017 @ 02:02 AM
link   
Here is a quote from Jacques Vallee in reference to the intelligence community that I think is highly relevant to this thread:

"Its job is to pretend that it knows everything. Yet I am beginning to suspect that the real secret in Washington, the secret that must be kept at all costs, is that the intelligence community knows nothing, ..."



posted on Mar, 11 2017 @ 02:09 AM
link   
a reply to: Cofactor

My thoughts too sometimes. Snowden's revelations were supposed to be a DISASTER. Had to be the quietest disaster in the history of mankind.

Terrorists hit San Bernardino, and the CIA/FBI beg Google and AT&T for the terrorists e-mails and call-logs. I thought they had all that stuff. Apparently not?



posted on Mar, 11 2017 @ 11:32 PM
link   
a reply to: carewemust


Terrorists hit San Bernardino, and the CIA/FBI beg Google and AT&T for the terrorists e-mails and call-logs. I thought they had all that stuff. Apparently not?

One very interesting clue can be found in vault7 release. It is the fact that one of the very few documents classified as TOP SECRET//NOFORN is 'Reflash Device Procedure' in iOS section (iPhone). Why such high classification level for this one when most other documentation on iOS is at a lower level, if classified at all!!!

The answer is that we learn in this procedure that the CIA is incapable to install the firmware in iPhone by itself and need to do the same thing as any poor mortal like us need to do; plug to the internet and let Apple install the firmware. The high level of classification is needed to hide embarrassing things! They have no control of Apple crypto, neither software or hardware.



posted on Mar, 11 2017 @ 11:39 PM
link   
a reply to: Cofactor

Thank-you for the response and revelation CoFactor! Top Secret=Hiding an Embarrassment. Makes sense. Thanks again.
-cwm



posted on Mar, 12 2017 @ 01:53 PM
link   
Big Picture, Thom talks to former CIA analyst and whistleblower John Kiriakou and journalist James Bamford about the recent Wikileaks dump, known as “Vault 7” and what it reveals about hacking and surveillance techniques used by the CIA.



Thought this was quite an interesting discussion.



posted on Mar, 12 2017 @ 02:08 PM
link   
This youtube is the first time I've actually seen people hacking tv's, short and interesting.



This is the first time I've actually seen people hacking tv's.



posted on Mar, 13 2017 @ 01:29 AM
link   
What is the benefit of this disclosure for the average citizen?



posted on Mar, 13 2017 @ 06:39 AM
link   

originally posted by: 0versus0
What is the benefit of this disclosure for the average citizen?


Non whatsoever...

No one thinks this apply to them...
No one has anything to hide so let em spy...
"So, if they wanna see me in naked, let them watch"



posted on Mar, 13 2017 @ 09:38 AM
link   
a reply to: 0versus0

The benefit is -to be forewarned is to be forearmed, personally its 'criminals' and perverts that I am worried about, and they exist from the top to the bottom in all walks of life and areas of society and more than likely every organisation to some degree.The biggest issue with all of this is that we could be targeted by criminals.

Would you want some pervert looking out your kids x-box or tv in their room as they are getting dressed? Hell-no! - its not necessary to remove the equipment but at least we now know to 'pull the damm plug out the wall!, that is a YUUUUUGE benefit in being able to protect the young!

What if your making out with your husband in front of tv, some criminal uses the hack, records it, sells it, and then hey presto your a porn star and you didn't even know it!

Frankly the risk in technology that has been brought to light, is shockingly horrific, I think most people are absolutely stunned to the point that most of us are still trying to take it all in so-to-speak.

Its incredible dangerous we are all at risk and we need to work to get patches and fix the security issues ASAP and as a matter of URGENCY.



posted on Mar, 13 2017 @ 10:29 AM
link   
For the 100th and million time I am going to explain computer science, slowly, so even moron's can grasp the basics! Have you ever used Open Source? Those of us that have have always been paranoid about and suspected back-door's, after all why would anyone just give a system - to everybody else for free?

Nothing in life is free... is Windows, Apple or Google Free?

That goes for advertising and telephone line's too...

The GNU is not Unix, X-Windows has been the bane of many a programmer, simply because of it's coding style rendering, making it non-Unicode compliant.

As far as the governments are concerned, attacking mathematics is stupid!

Programmers make no apology for good Math's!

There's good math's and then there's bad maths, just like there are good standards and then there are bad ones.


When it comes to bugs, well you really should read the "Unix Haters Handbook"

The original programmers abandoned "Multics" and time-sharing systems like Unix age's ago...

At the heart of Google is Ken Thompson known in hacker circles as Ken winning a Turing award for Computer Science.

The snow-den leaks where significant, because it highlighted where companies like Android and TrapX want to go with thing's like the your desktop. The Amazon echo thing- also trending on here is not news, echo is Android.

So bug's in Android Smart TV's and Killer Android Cars not news, Snowden told us this # already...

As to back-door's you mean in programming parlance; Trap Door - A computer trapdoor, also known as a back door, provides a secret -- or at least undocumented -- method of gaining access to an application, operating system or on-line service. Programmers write trapdoors into programs for a variety of reasons.

There are already Tap0 interface's written into OpenBSD, Linux (Android) MS-Windows and no I will not explain how they work, because if you don't know why those are there then you didn't read that Open Source license agreement carefully enough.

We trust you have received the usual lecture from the local System

Administrator. It usually boils down to these three things:


#1) Respect the privacy of others.

#2) Think before you type.

#3) With great power comes great responsibility.


The argument about cryptography is simple, our math, as it stands - is #!

If you want to edit encryption, there are easy ways to do it and the added benefit of having written it yourself, that's the difference. Programmers are not restricted by understanding that a i386 x86 chip can not perform the same encryption as a 64bit and encryption systems that have already been written can be re-written on the fly.

You do not have to wait for someone else to make a source revision, to edit Open Source!


www.gnu.org...

An least we forget, there are a lot of Encryption finalist's to choose from for Phase 1, 2, 3 & Finally 4.

So there's still a lot of work to be done on that front.

Algorithms like Scream & Dragon or Phelix & Ice.
edit on 13-3-2017 by phicoder because: tidy



posted on Mar, 13 2017 @ 11:19 AM
link   
a reply to: phicoder

So you're saying Ken Thompson is called Ken...mind blown.

Sorry couldn't help it.

On topic- I'm sure writing your own code is more than obvious to someone who can. Hate to say it but your post really doesn't explain much.



posted on Mar, 13 2017 @ 12:10 PM
link   
a reply to: daskakik

Yet your own post says so much, dude, if you can't program, don't buy a computer!

It's a society (the INTERNET) filled with nothing but coders & hackers!

Some of whom respect your privacy and some of whom do not!


OS: Kali "kali-rolling" kali-rolling • CPU: Intel(R) Atom(TM) CPU N270 @ 1.60GHz (800MHz) • Memory: Physical: 1.9 GiB Total (1.1 GiB Free) Swap: 3.9 GiB Total (3.8 GiB Free) • Storage: 57.0 GB / 239.8 GB (182.8 GB Free) • VGA: Intel Corporation Mobile 945GSE Express Integrated Graphics Controller @ Intel Corporation Mobile 945GSE Express Memory Controller Hub • Uptime: 4d 5h 16m 32s
edit on 13-3-2017 by phicoder because: (no reason given)



posted on Mar, 13 2017 @ 12:16 PM
link   
a reply to: phicoder

Actually it doesn't really say much other than point out the fact that your post doesn't explain much of anything.

Thinking that society is filled with nothing but coders and hackers is wrong as well.



posted on Mar, 13 2017 @ 12:18 PM
link   
a reply to: phicoder
I think first you should learn some computer science before you come in holier than thou attitude.

First, you don't have to know how to code anymore. There are programs that will code it for you.

Second, I would never use a manually built encryption, your mind isn't strong enough for my levels!!!!!

Third, nah, your attitude was enough of a turn off that I'm done with you.



posted on Mar, 13 2017 @ 12:25 PM
link   
Fine believe what you want to believe, take the blue pill.



posted on Mar, 13 2017 @ 12:28 PM
link   
a reply to: phicoder

So you are saying that there are not millions of computer users that can't program?



posted on Mar, 13 2017 @ 12:28 PM
link   
The bigger thing to think about here is, are these really exploits or just hidden features being built in?

With all the breaches and security issues we see in the media, it's really hard to believe that these " Connected " devices are not being thought about in terms of who can access. The engineers are not idiots, they know these things are there and most likely brought them up in a meeting sometime, only to be told, " oh that's already known and being looked into " which is sidestep for " We know you dumbass, the CIA and such and such paid us to put that there ".

This isn't a wake up call for anyone, we've watched as the " digital age " has turned into the " 1984 age ", if you think these things are just companies being careless, you're a little too naive for this site, there's a data war going on people, and you're the prime target.

Doesn't matter if you don't think you have anything to hid, wouldn't like to be paid when you do work or someone uses your stuff for profit? Well that's EXACTLY what is done with your data, it's collected, organized and sold to marketers and other companies that create profiles on you all just to sell crap to you that you don't need but based on your profile will most likely be interested in buying.

Couple this with the recent genetic testing issue from politicians and companies on employees and I don't think even Phillip K Dick and George Orwell thought it would get this bad.



posted on Mar, 13 2017 @ 12:31 PM
link   
CIA or NSA intercepts of Merkel comm's coming from Wikileaks shortly...

Twitter Wikileaks



posted on Mar, 13 2017 @ 12:37 PM
link   

originally posted by: SBMcG
CIA or NSA intercepts of Merkel comm's coming from Wikileaks shortly...

Twitter Wikileaks


THIS oughta be good!



posted on Mar, 13 2017 @ 12:43 PM
link   
a reply to: SBMcG
Yes please please please be true!!!



new topics

top topics



 
125
<< 31  32  33    35  36 >>

log in

join