[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

WIKI LEAKS LEAKING

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 527
Thread images: 99

File: va.jpg (26KB, 629x412px) Image search: [Google]
va.jpg
26KB, 629x412px
what do they mean by '7z' to decrypt

also check this out

https://twitter.com/wikileaks/status/838910359994056704
>>
>>59279153

its just a password protected archive and they recommend that people use 7z to "decrypt" aka enter the password and ***unzip*** it
>>
>>59279153
what's in vault 7?
>>
>>59279162
when i download it just wants to open in utorrent

im new at this
>>
>>59279199
Retard
>>
>>59279153
It's not even a wiki.
>>
File: Screenshot_6.jpg (134KB, 1046x671px) Image search: [Google]
Screenshot_6.jpg
134KB, 1046x671px
>>59279188
Its new CIA documents.
>>
File: 1488880760603.png (48KB, 635x455px) Image search: [Google]
1488880760603.png
48KB, 635x455px
>>59279153
@wikileaks is tweeting that new archive contains something interesting for tech journalists
>>
File: 1488882000272.png (180KB, 587x707px) Image search: [Google]
1488882000272.png
180KB, 587x707px
>>59282288
some are speculating it might be some news about suspected intel backdoor

it could also be some new revelation about flaws in cryptography

or new information about technical surveillance capabilities of CIA
>>
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

The password has been released. Jesus Christ, its big.
>>
Reminder that Wikileaks is a Russian GRU operation
>>
File: JUST.png (957KB, 1400x700px) Image search: [Google]
JUST.png
957KB, 1400x700px
>>59282429
>MUH RUSSIA
>>
>>59279199
the file is downloaded with bitorrent, it's 513meg

when it's done it will want a password to open the zip

use what wikileaks give you
>>
>>59282453
Just about every NSC expert says that.
Only memelords on 4chan deny it.

I guess all the intelligence agencies are just wrong and Putin is right!
>>
>>59279153
theyve just released it its all cia/nsa exploits and 0days for numerous platforms lol
>>
>>59279153
dunno why people here are not discussing it when its all pretty sick info
>>
>>59282484
Yeah, because intelligence agencies have never lied to the public, right.
>>
File: C6UVllSWUAEsNla.png (236KB, 400x400px) Image search: [Google]
C6UVllSWUAEsNla.png
236KB, 400x400px
RELEASE: Vault 7 Part 1 "Year Zero": Inside the CIA's global hacking force https://wikileaks.org/ciav7p1
>>
File: 1488892421142.png (114KB, 700x793px) Image search: [Google]
1488892421142.png
114KB, 700x793px
LINUX BTFO WOW
>>
>>59282484
>[Citation needed]
>>
>>59282525
linux fags on suicide watch
>>
>>59282517
If past lies are a good predictor of current statements you'd have 0.0% credibility in Trump.
>>
File: C6UYSTZXQAA0AEi.jpg (183KB, 1365x2048px) Image search: [Google]
C6UYSTZXQAA0AEi.jpg
183KB, 1365x2048px
>>
File: hack the world.png (44KB, 440x818px) Image search: [Google]
hack the world.png
44KB, 440x818px
>The City of /g/
>>
>>59282516
Im [spoiler]phoneposting[/iknowthisdoesntworkong] so cant check it atm
>>
File: Screenshot_2017-03-07_14-25-10.png (167KB, 1366x768px) Image search: [Google]
Screenshot_2017-03-07_14-25-10.png
167KB, 1366x768px
LOOK AT ALL THIS SHILLING THEY'RE DOING ON /POL/ LMAO
>>
>>59282516
Most people here are dumb ass kids who will wait for their favourite YouTuber / Twitter account to tell them how to feel and what to think
>>
>>59282548
Where did you get the notion that I support Trump? If I was American I'd probably voted libertarian.
>>
>>59282539
https://www.dni.gov/files/documents/ICA_2017_01.pdf

Lets start with this then.
>>
>>59282525
>>59282542
>Multi platform development
Well, at least this makes clear they're not idiots and they used proper toolkits unlike a lot of developers out there. Multi platform development should be the norm always, not something /g/ should be surprised about.
>>
>This means that the CIA could effectively make it look, even to security professionals in other intelligence agencies, that someone else is behind a hack.


But no, its totally Russia.
>>
File: Brutal.jpg (96KB, 736x1021px) Image search: [Google]
Brutal.jpg
96KB, 736x1021px
>>59282525
'Brutal Kangaroo'
>>
>>59282591
No vote for Hillary is effectively support for Trump in this election. Winner takes all shit in the presidential system is bad, but it is what it is.

And don't fucking say there would be no difference between the two.
>>
>>59282525
>windows has hundreds of vulnerabilities exploited by the CIA
>linux has a few
>LINUX BTFO
>>
File: centre_maze.jpg (157KB, 1392x3328px) Image search: [Google]
centre_maze.jpg
157KB, 1392x3328px
>>59282587
>doesn't look like anything substantial to me
>>
>>59282620
Shut the fuck up he's not even American
>>
File: VAULT7.jpg (3MB, 1636x10000px) Image search: [Google]
VAULT7.jpg
3MB, 1636x10000px
The Vault is open.
Now to deal with the fallout.
>>
>>59282620
>don't fucking say there would be no difference between the two
I'm not saying that, but I'm hopeful that after a choice between 2 shitty candidates Americans will figure out that the two-party system should be done away with.
>>
File: linux.png (318KB, 1856x1582px) Image search: [Google]
linux.png
318KB, 1856x1582px
What does this mean?
>>
>>59282620
>And don't fucking say there would be no difference between the two.
you're right, Hillary was the worse candidate
>>
SAVE US, STALLMAN!
>>
>>59282593
>DNI

lol you're so shortsighted
>>
can /pol/ stay in /pol/, we're trying to discuss the leaks

also
>ubuntu is compromised
it's fucking nothing (for gnu/linux)
>>
VLC KIKES BTFO
Rain Maker v1.0
CHECK IT
>>
ubuntu btfo. If I'm not mistaken there's a simple login workaround according to this
>>
>As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.


Enjoy the "self driving" future, goys.
>>
>expecting anything from Ubuntu
I'd be more surprised if Ubuntu wasn't compromised.
>>
>>59282525
>ROUTERS BTFO
>>
>>59279199
>opening CIA documents on your main machine
RIP
>>
File: 1488893281076.png (171KB, 1532x874px) Image search: [Google]
1488893281076.png
171KB, 1532x874px
>even the CIA pirates windows
lmao, thanks CIA.
>>
>>59282651
It basically says "Hive is a framework made by the NSA to help them make spyware for multiple operating system versions more easily."
>>
File: .png (55KB, 440x818px) Image search: [Google]
.png
55KB, 440x818px
>>
>>59282651
Hive is a spyware working on ring 2 (drivers)
>>
>>59282713
fuck me I use libreoffice and notepad++
>>
File: Screenshot_7.jpg (174KB, 1195x833px) Image search: [Google]
Screenshot_7.jpg
174KB, 1195x833px
>>59282593
Recently it was more or less proven that all evidence they have on Guccifer 2.0 are false baits. Careful examination of metadata even point to some DNC related names.

http://g-2.space/index.html
>>
>>59282713
skype went down the sametime this was released
interesting
>>
>>59282713
NOT EVEN CLOSE, BABY
NICE TRY CIA NIGGERS
>>
>STOP USING VLC
STOP USING VLC
>STOP USING VLC
STOP USING VLC
>STOP USING VLC
STOP USING VLC
>STOP USING VLC
STOP USING VLC
>STOP USING VLC
STOP USING VLC
>STOP USING VLC
STOP USING VLC
>STOP USING VLC
STOP USING VLC

https://wikileaks.org/ciav7p1/cms/page_15729066.html
>>
File: 1488893740006.png (23KB, 646x876px) Image search: [Google]
1488893740006.png
23KB, 646x876px
what a bunch of weebs
>>
>>59282743
Who the fuck uses VLC?
>>
B A S E D
C I A
>>
>>59282745
>complaining about anime
it's anime agency, normie
>>
File: 1488893783656.png (904KB, 1481x887px) Image search: [Google]
1488893783656.png
904KB, 1481x887px
Found the cias meme folder. DEFENDERS OF THE USA
>>
>>59282688
Just let them drive you everywhere for your safety, if you did nothing wrong there's nothing to fear.
>>
>>59282745
/a/ controls the cia.
>>
File: TP.png (2MB, 1280x1024px) Image search: [Google]
TP.png
2MB, 1280x1024px
https://wikileaks.org/ciav7p1/cms/page_524341.html

This reads so much like an archive file from Talos Principle it's creepy.
>>
Is anyone else having trouble accessing the Wikileaks site?
>>
>>59282776
>abstergo
>>
Wikileaks delivers yet again
>>
>>59282580
kek
>>
File: 1488893948873.jpg (83KB, 1159x431px) Image search: [Google]
1488893948873.jpg
83KB, 1159x431px
csi hacked your vlc player
>>
File: workedin.jpg (100KB, 400x299px) Image search: [Google]
workedin.jpg
100KB, 400x299px
I never knew CIA were memesters

(yes this image is in the vault 7 release)
>>
File: 1488893909059.png (111KB, 1218x805px) Image search: [Google]
1488893909059.png
111KB, 1218x805px
>>59282802
Thats what happens when you use reddit to make epic CIA memes.
>>
File: its-happening.jpg (97KB, 1280x720px) Image search: [Google]
its-happening.jpg
97KB, 1280x720px
>>59279153
>>
>>59279199
go back to /pol/ you conspiracy spouting spaz
>>
File: latest.jpg (13KB, 425x329px) Image search: [Google]
latest.jpg
13KB, 425x329px
>>59282776
>>
>>59282614
RUSSIAN HACKERS
>>
>>59282614
sauce on that quote?
>>
File: prof.jpg (13KB, 220x309px) Image search: [Google]
prof.jpg
13KB, 220x309px
Thanks for the info again based Assange. Seriously imagine how little we would really know without this man.
>>
File: C6Uc1D0UsAAVp0p.jpg:large.jpg (209KB, 1269x874px) Image search: [Google]
C6Uc1D0UsAAVp0p.jpg:large.jpg
209KB, 1269x874px
This is fucking insane

>tfw /x/ was right all along
>>
>>59282620
If you didn't vote for Trump you're a dumbass
>>
Did they release source codes?
>>
File: talledega-003.jpg (292KB, 1280x1024px) Image search: [Google]
talledega-003.jpg
292KB, 1280x1024px
>>59282776
>>
>>59282853
I'd prefer to know less. This is a direct threat to US security, it's illegal to even look at this.
>>
File: concern.jpg (33KB, 480x454px) Image search: [Google]
concern.jpg
33KB, 480x454px
>>59282864
>>
>>59279153
>weeping angels project
>samsung tvs are compromised
>fake-off
>targetting smart-tvs

where are the free firmwares for tvs? what are some recommended dumb-tvs in 2017?
>>
>>59282885
cuck
>>
>>59282853
Host our leaks on literally any other website put together in a country that doesn't answer extradition requests. You should be thanking the hackers, not this attention whore.
>>
>>59282885
>I'd prefer to know less.
Wow, the propaganda really worked on you. F.
>>
>>59282885
>>>/pol/
>>
>Android security
HAHAHAHAHAHA
>>
>>59282885
Maybe we should ask CNN if we can look at it?
>>
Go say Hi to CIA guys,

Internet Relay Chat
IRC now available at irc.devlan.net
NON-SSL: 6667
SSL: 6697
CLIENTS
Windows: X-chat, ChatZilla (Firefox plug-in), Pidgin, Trillian, ...
Linux: Check your repositores. X-chat, irssi, Pidgin, Trillian, ...
Mac: Upgrade to Linux ^^ (don't you mean downgrade
) Colloquy
Install Guide
Follow the instructions for your given client.

X-Chat: Xchat->Network List.
Click Add, name network "DEVLAN".
Click Edit, Change servers to "irc.devlan.net/6667" or "irc.devlan.net/6697" for SSL
Click Close, Then Connect.

IRC GUIDE
Once you've connected to irc.devlan.net, you should:

Register your nick. You can register any number of nicks, but you should first register your DEVLAN username. IE) "User #72251". This will make it easier once JIRA and Bamboo are integrated into IRC so that you can receive notifications.

(If not already your devlan username) "/nick DEVLAN_USERNAME"


Why IRC?

For colloboration! We can easily chat with each other now!
IRC is 1337!
>>
File: 1488894477371.jpg (234KB, 1030x1010px) Image search: [Google]
1488894477371.jpg
234KB, 1030x1010px
DELET THIS
>>
>muh loonix

BTFO
>>
>>59282885
Don't worry CNN will read it for you. Be a good goy and stay away
>>
>>59282580
I've been looking through that, it's sick how much stuff there's in here.
>>
File: cia_niggers.png (97KB, 480x360px) Image search: [Google]
cia_niggers.png
97KB, 480x360px
YOU
WERE
WARNED
>>
File: 2free4u.jpg (1MB, 2880x1920px) Image search: [Google]
2free4u.jpg
1MB, 2880x1920px
>>59282901
This attention whore gave those hackers a platform to publish their findings. Thanks to this attention whore those hackers' leaks are being taken seriously. So yeah, we should absolutely thank this attention whore, for actually bringing attention to injustice rather than complain about it through memes on an internet forum.
>>
IS GNU HURD READY YET
>>
So whats a safe OS? Haiku?
>>
WHY WONT DEVELOPERS MAKE GAMES FOR LINUX SO I CAN DUMP THIS BOTNET OF AN OS
WHY WONT DEVELOPERS MAKE GAMES FOR LINUX SO I CAN DUMP THIS BOTNET OF AN OS
WHY WONT DEVELOPERS MAKE GAMES FOR LINUX SO I CAN DUMP THIS BOTNET OF AN OS
>>
>Firefox completely safe
L O L
>>
>>59282917
anyone gonna try this?
>>
>>59282952
OpenBSD and hurd.
>>
>>59282956
>Why won't devs cater to an incredibly slamming subset of paranoid schizophrenic

It's fucking nothing. Just go back to your porn and if you're not doing or planning anything illegal you'll be fine.
>>
>>59282917

source
>>
>>59282893
if the tv has a mic open the case and rip it out or desolder it and the tv is safe again
>>
>>59282956
Linux is comprimised too you fucking illiterate
>>
>>59282917
tard you forgot to post channel name
>>
>>59282580
Fuck.
>>
>>59283002
It's fucking nothing compared to Windows "you fucking illiterate".

>wikileaks mentioned linux a few times so that means all distros are bad
You're a fucking retard.
>>
>>59282952
TempleOS.
>>
>>59282593
>believing US """"intelligence""""
rofl
>>
>>59282791
But I did pretty much everything wrong in my life ;_;
>>
>>59282580
It's impressive how on the money /g/ is when recommending what software to use to avoid being fucked in the ass by even the CIA.
>>
>>59282930
terry was right
we didn't listen
>>
>>59282893
Get a monitor
>>
>>59283007
just list the channels you ape
>>
>>59282745
IT'S HAPPENING
CIA MAKES ANIME REAL
>>
>File:Why-Most-Unit-Testing-is-Waste.pdf
This is no leak it's propaganda.
>>
>>59282614
ANYONE SAUCE ON THIS?
>>
>>59283015
Hahaha, the lincuck is in despair.
>>
>>59282999
>>if the tv has a mic open the case and rip it out or desolder it and the tv is safe again

What about network monitoring? There must be some kind of open source multiplat(?) Smart TV firmware instead. I'm too (irrationally) scared to open my TV (it doesn't have a mic to my knowledge) after a friend had an accident with a CRT-tv
>>
File: Selection_20170307_14:58:29.png (9KB, 430x91px) Image search: [Google]
Selection_20170307_14:58:29.png
9KB, 430x91px
>>59283002
>>
>Weeping Angel
>sontaran
CIA confirmed whovians.
>>
>>59282910
Are you even reading any of this? Everything is compromised.
>>
>>59282885
You're a fucking pathetic human.
>>
File: botnet.png (91KB, 968x1098px) Image search: [Google]
botnet.png
91KB, 968x1098px
Mozilla cucks BTFO
>>
>>59283064
>I can't come up with an actual response
>>
>>59283064
Not that guy, but you come across as really really dumb. Just saying.
>>
>>59282580
>Notepad ++
>LibreOffice
FUCK
What do I use as an Alternative?
>>
>>59282587
It's trolls, not everything is a shill
>>
>>59283049
Can't really deny the share of TVs in households, and I don't have to explain what the advantages of a TV is compared to a monitor because you already know this..
>>
>>59283078
>Portable Firefox
Who the fuck uses this
Meanwhile all of Chrome is compromised lmfao
>>
File: btfo.jpg (29KB, 773x103px) Image search: [Google]
btfo.jpg
29KB, 773x103px
Signal BTFO
>>
>>59283083
Emacs!
>>
>>59283083
VSCode, Sublime, Atom
OpenOffice
>>
>>59283083
nano ofcourse
>>
>>59283075
>24 zerodays
>>
>>59282885
you can go back to /pol/ trumptard
>>
>owning a TV
does anyone do this unironically?
>>
>>59283083
Take this moment of oppurtunity to learn Vim or Emacs
>>
>>59283092
That's a trojan, you could bypass any software with that.
More like 'smart'phones BTFO
>>
File: MEME WARFARE CENTER.png (40KB, 1169x658px) Image search: [Google]
MEME WARFARE CENTER.png
40KB, 1169x658px
BEST TIMELINE
>>
>>59283079
hahahahaha
>>
>>59283092
It's not.
>>
>>59282999
Speakers can be used as microphones
>>
>>59283082
Wow you showed him
>>
>>59282995
https://wikileaks.org/ciav7p1/cms/page_4849704.html
>>
>>59283092
>Signal BTFO
Read it again retard. It's not signal they BTFO, it's android/iOS itself.
>>
>>59283120
This

It's just a keylogger, you can get around any encryption that way
>>
https://wikileaks.org/ciav7p1/cms/page_15728810.html
>>
jesus christ this is terrifying
>>
>>59283124
encrypted input when?
>>
>>59279153

Does this have anything to do with Microsoft Outlook, Skype, and Onedrive being down?

http://downdetector.com/status/outlook
>>
>>59283107
Shit nigga. I've been saying this since 2009 and everyone called me an edgelord tinfoil hatter.
>>
>>59283131
>tfw not even extremely crippling levels of paranoid schizophrenia will help to defend you against CIA zero day exploits
>>
>>59283099
Yeah people like TVs

Some common reasons:
- Inexpensive way to project or display content on a large surface
- Comfortable due to its size to watch both alone or with other people such as family members, partner or friends
- Conncetivity to other sources and now also integrated / embedded solutions for media
- Intergrated audio is a nice solution for some people
- Viewing distance is usually farther away from a computer monitor, for example when placed in a living room, making pixel density and resolution less relevant
>>
>>59282688
Weren't there several guys who were in wrecks while in self driving cars who had ties to intelligence agencies?
>>
>COG provided the following prioritization of applications for trojaning: VLC Player, Win-Rar, TrueCrypt, ConnectifyMe, Shamela Reader, Microsoft Office Standalone Installer, Adobe Reader Installer. EDG was able to supply the following trojans in the operational timeline: VLC Player, Win-Rar, TrueCrypt, Shamela. The six thumbdrives sent to the field for operational use had 4 self-extracting Win-Rars (Wraith), 2 VLC players, 2 TrueCrypt applications, 2 Shamela applications. Cover documents included TrueCrypt containers with keys, videos, documents, and images.

https://wikileaks.org/ciav7p1/cms/page_16385046.html
>>
>>59282885
I'm not even from the US :^)
>>
>>59283131
Hey buddy, calm down, you can trust us, just see us as your Big Brother. We're just protecting you from all the evil terrorists and pedos.
>>
>The answer came from a single StackOverflow post that mentioned a side-effect of opening a volume handle in a peculiar way. Although the author of the post cautioned the technique may not be reliable, we found in our testing that it was 100% effective on our target platform (Windows XP x64).

StackOverflow must be the fucking holy grail of state sponsored hackers, holy shit.
>>
>CIA created an anti sandboxing tool that waits for your mouse click and interrupts the safe execution of the program inside the sandbox so its totally broken

There is pretty much no way to ever be sure a system is safe. You can't ever load anything on to it. You can't have a disconnected system to auditing files because the malware can bypass any sandbox you try to run it in now.
At pretty much every level cyber security has been rendered moot.
>>
>>59283138
Nothing can protect the data if the OS is compromised
>>
>>59283068
1. don't let the tv on your network by cable or wireless
2. take it apart and remove the mic if one exists
3. or just never discuss anything in the same room as your tv or phone or computer etc.
>>
File: 1488613305773.jpg (10KB, 351x293px) Image search: [Google]
1488613305773.jpg
10KB, 351x293px
No! This can't be happening! I'm the one in charge here!
>>
>>59283073
that was MI5 and it explains the dr who references
>>
>>59283181
What's a virtual machine?
>>
>>59283161
Yup

This guy comes to mind

https://en.wikipedia.org/wiki/Michael_Hastings_(journalist)

Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard A. Clarke said that what is known about the crash is "consistent with a car cyber attack". He was quoted as saying "There is reason to believe that intelligence agencies for major powers — including the United States — know how to remotely seize control of a car. So if there were a cyber attack on [Hastings'] car — and I'm not saying there was, I think whoever did it would probably get away with it."[68] Earlier the previous day, Hastings indicated that he believed he was being investigated by the Federal Bureau of Investigation. In an email to colleagues, which was copied to and released by Hastings' friend, Army Staff Sergeant Joe Biggs,[69] Hastings said that he was "onto a big story", that he needed to "go off the radar", and that the FBI might interview them.[70][71] WikiLeaks announced that Hastings had also contacted Jennifer Robinson, one of its lawyers, a few hours prior to the crash,[72] and the LA Weekly reported that he was preparing new reports on the CIA at the time of his death.[73] His widow Elise Jordan said his final story was a profile of CIA Director John O. Brennan.[74] The FBI released a statement denying that Hastings was being investigated.[61]
>>
File: 1488894762636.png (167KB, 1250x480px) Image search: [Google]
1488894762636.png
167KB, 1250x480px
>>
SHUT
IT
DOWN
>>
>>59283107
This is some MGS2 shit.
>>
They didn't hack VLC it's a clone of VLC that deploys and runs malware to infiltrate a network while disguised as another program.
>>
File: 1384743264887.jpg (22KB, 332x492px) Image search: [Google]
1384743264887.jpg
22KB, 332x492px
>>59283181
>>
year0/vault7/cms/files/Rain Maker v1.0 User Guide.doc.pdf
>SECRET//20350629
>S) Rain Maker v1.0 is a collection tool intended to be run from removable media.
Version 1.0 specifically is designed for use with portable VLC Player (2.1.5). To trigger
collection, the user must open up VLC player on the target machine from the removable
media. The removable media can appear as either a fixed or removable drive but must be
formatted NTFS. Upon opening VLC player, Rain Maker collects a standard survey of
the machine (RoadRunner Survey) and a prioritized file collection

year0/vault7/cms/files/Triclops 2015 - ECHOMOON.pdf
>Classification: TOP SECRET
>Remote exploit for iOS9 capable of running arbitrary payloads on 32- and 64-bit devices via Safari and Chrome.

seems interesting desu
>>
>>59283203
I FUCKING TOLD YOU FUCKERS

I TOLD YOU FUCKERS THAT ALL SPEECH PROGRAMS WERE HAVING THEIR AUDIOS SPEECH-TO-TEXT'D AND RECORDED FOREVER

FUCK YOU I WAS RIGHT

AS USUAL
>>
>>59283111
that is true

other anon above who suggested a computer monitor might be best case now, but really just watch what you say near your tv. it's like in 1984 you just hang a picture in front of the camera and watch what you say
>>
File: Screenshot_2017-03-07_14-12-24.png (33KB, 714x182px) Image search: [Google]
Screenshot_2017-03-07_14-12-24.png
33KB, 714x182px
Reminder: EVERY SINGLE EXPLOIT LISTED IN THE LEAK HAS ALREADY BEEN OUT IN THE WILD FOR MONTHS
>>
>>59282885
Hello Shariablue
>>
File: 1488895602247.png (67KB, 1642x550px) Image search: [Google]
1488895602247.png
67KB, 1642x550px
>>
>>59282939
t. CIA intern
>>
>pdf exploits up the ass

Someone do this in an isolated VM
>>
>>59282620
>shilling this idiotically even on /g/
holy fuck, kill yourself you dumb faggot
>>
>yfw this is a controlled psyop leak as a deterrent to further decrease the risk of questionable activity on devices
>yfw they could quietly shut it down tomorrow and never tell us and we would remain intensely paranoid
>yfw they won
>>
>If using a custom crypto algorithm limit its use to a specific tool set
>Use publicly available crypto (Microsoft's Encryption Libraries, OpenSSL, PolarSSL)

>the CIA is literally telling it's coders to use OpenSSL
>>
>>59283254
You're not even making sense anymore lad.
>>
>>59283260
VM escapes are found regularly. What makes you think that they haven't found more?
>>
>This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA

We CIA now?
>>
>>59283279
I really hate you controlled release faggots.

Seriously. You lose touch with reality and that's what happens to you, you start believing that the biggest computer security leak of all time is 'limited hangout'.
>>
File: 1453413064460.jpg (80KB, 396x382px) Image search: [Google]
1453413064460.jpg
80KB, 396x382px
>>59282620
Trump is great, kys and go back to your containment board on reddit
>>
someone make a list of everything thats fucked and alternatives to them. Would be a good opportunity to kick some stubborn idiots in the ass about seeing the endless botnet
>>
>>59283245
We've all been pwned

Nothing is safe

Ready your microwaves
>>
>>59283107
there is no tinfoil hat powerful enough anymore

game over man game over

they will collect a thousand more zero days, this cycle will never end
>>
File: cia.jpg (36KB, 563x252px) Image search: [Google]
cia.jpg
36KB, 563x252px
>>59282429
oh hi cia, next time don't lose your 0 days to retards, mkay?

Also wikileaks has a perfect record, get over your HRC butthurt.
>>
>>59283298
>a list of everything thats fucked

Everything
>>
>>59282620
literally anyone who's not a total fucking retard would rather have trump over hillary

fuck off to your /r/esist and other autistlands
>>
>>59283279
Except they're saying they lost all their shit. Also, afaik wikileaks is the only news source with a perfect record. So yeah, kys CIA, you got pwned again. Deal with it.
>>
File: 1337065134376.png (51KB, 339x298px) Image search: [Google]
1337065134376.png
51KB, 339x298px
>>59283297
>kys
>>
Boy am I glad I'm not some weirdo with a hard drive full of pizza and bombing manuals I bet the autists are microwaving as we speak.
>>
>>59283107
Sauce?
>>
this is bad

thread theme https://www.youtube.com/watch?v=2Z7SafOiCXM
>>
>>59283327
if they haven't already got to you then odds are you're not very high on their to do list
>>
>>59283317
nice screenshot
>>
>>59282298
Oh boy, oh boy!

/g/ was right!
>>
>>59282580
>LibreOffice

This just inspired me to write documents in markdown and concert to PDF.. thanks CIA
>>
>>59283326
Fuck off cuck
>>
>>59283327
What you fail to understand is this is actually a leak about a leak.

This leak is revealing what cyber weapons the CIA has lost control of.
>>
Running DBAN again, TempleOS is still safe yes?
>>
>>59283209
Metal Gear AI is real using Quantum computing and it has access to every exploit known to the CIA, we are basically playing MGS6 IRL
>>
>>59283333
Excellent digits.

Ive just been listetning to eurobeat for 3 hours straight and im not stopping.
>>
>>59283327
I don't have much of a life so I've always been safe, not online or off. I don't like collecting shit and have very few interests.

my CIA profile probably goes like:
NEET loser
plays videogames too often
flirts with women online but never does anything with it
>>
>>59283078
>>59283083
>>59283091
reminder that these portable applications are just a cover for the real malware that's running in parallel and stealing info from the target system. You can't say "Firefox portable is compromised", as this is a CIA-made version that nobody else uses.
>>
>>59283339
>implying AMD isn't riddle with backdoors
>>
>not releasing the actual tools
cowards! don't they want to watch the world burn?
>>
>>59283335
I doubt the CIA gives a shit about me downloading Little Witch Academia.
>>
what are the chances that the leak about them losing control of their tools was made possible because their tools got leaked in the first place?
>>
>>59283366

100%
>>
>>59283366
100% because that's how wikileaks said they got this.
>>
File: rings.png (64KB, 633x456px) Image search: [Google]
rings.png
64KB, 633x456px
>>59282651
ring 2 refers to privilege level. Ie, it's a malware that runs with elavated privileges.
>>
>>59283365
>I doubt [dataminer] cares about [whatever you do]
Every time.
>>
File: whoa.gif (2MB, 340x205px) Image search: [Google]
whoa.gif
2MB, 340x205px
>>59283366
>>
>>59283286
Isolated, no network access, don't hokup to virtual interfaces.. your VM directory should be Ina separate chrooted dir.
>>
>>59283366
100% obviously, is this bait?
>>
>>59283365
A staff member of Trigger lives on /a/ and he doesn't even give a shit about people pirating LWA.
>>
>>59283361
A single tool had the whole power of the CIA, imagine if everyone had access to it. The world would become mad max in 2 days tops.
>>
>>59283366
this is how wl got the info
>>
>>59283342
Use LaTeX instead, its super powerful, look up document compilation in latex! Its also concidered free software.

PDF was proprietary by Adobe until 2008 and is still under heavy control, even though released to public, adobe decides alot of the standards and technology.
>>
File: Cugk5I1VYAAR7CM.png (882KB, 1000x1000px) Image search: [Google]
Cugk5I1VYAAR7CM.png
882KB, 1000x1000px
>>59283385
yes i just wanted yous :3
>>
>>59283391
Well so the Japan gonna win the cultural war.
>>
This is the real danger this new leak presents.
>>
>>59282917
>Mac: Upgrade to Linux ^^
lmao
>>
>>59283344
What the heck would they even use this for? Blackmail?
>>
>>59283306
Surely this is pretty big fucking news right? If almost the entire toolkit for hacking/manipulation that the CIA owns is now out in the public domain and held by even just a few powerful groups, then that would imply a major fuckup and potential catastrophes in the near future.

What I want to know is how long ago they lost all this shit, and who potentially now has access to these tools.
>>
>>59283107
wtf is this real
>>
>>59283329
it's real, just jewgle the title

http://www.dtic.mil/dtic/tr/fulltext/u2/a507172.pdf

I really fucking like this line right here
>CONCLUSION: Cognitive scientists, cultural anthropologists, behavior scientists, and game theory experts must be included as professional meme-wielding-gunfighters on future battlefields. The US must recognize the growing need for emerging disciplines in ideological warfare by ‘weaponeering’ memes. The Meme Warfare Center offers sophisticated and intellectually rich capability absent in current IO, PsyOps and SC formations and is specifically designed to conduct combat inside the mind of the enemy. Memes are key emerging tools to win the ideological metaphysical fight .
>Cognitive scientists, cultural anthropologists, behavior scientists, and game theory experts must be included as professional meme-wielding-gunfighters on future battlefields.

Why pay a bunch of those idiots when they can't possibly beat weaponized autism? Holy shit, truly the greatest timeline, that one meme became reality

>Born too late to explore the planet
>Born too soon to explore the universe
>Born just in time to have military papers written about your dank memes and their impact on modern warfare as you fight an anonymous meme war against powers greater than your comprehension
>>
>>59283411
How about the usual- money.
>>
File: C6UksMDWQAAc01y.jpg:large.jpg (137KB, 1183x784px) Image search: [Google]
C6UksMDWQAAc01y.jpg:large.jpg
137KB, 1183x784px
Nice going Frankfurt, your literally housing enemies of freedom.
>>
So do we know how the tools leaked in the first place?
>>
>>59283361
if I'm reading this right wikileaks was only provided a portion of the material, of which this first part is a smaller portion
whoever gave it to wikileaks probably did not include much actual exploit code
>>
>>59283107
>Tfw memetic warfare is real

War never changes
>>
>some gopnik slav somewhere in Siberia has the CIA tools
>he's reading your texts and playing dota 2 on your steam account at this very second
>>
File: pepered.jpg (30KB, 597x519px) Image search: [Google]
pepered.jpg
30KB, 597x519px
This reminds me of that hot-pockets commercial with V-R
,that someone screams:
"IT'S BEEN COMPROMISED!!!"
>>
File: 456654643.png (16KB, 801x193px) Image search: [Google]
456654643.png
16KB, 801x193px
Fucking slackers.

https://wikileaks.org/ciav7p1/cms/page_2621788.html
>>
>>59283398
problem is people are going to be smart enough to figure out a lot of it from the hints anyway
>The syslog on iOS 9 is more restricted than in the past. We can get better access to this by running a syslog forwarder. This attaches to the same socket syslog relay does and allows us to send commands to the asl deamon. To use this: On Device: > /var/mobile/Media/syslog_forwarder_64 2001 &
>On Mac: > telnet 2001 watch This causes the telnet session to display more output than the syslog currently does. However, I've noticed that the syslog sometimes has entries that the telnet session doesn't. I don't fully understand the syslog system but its a start.
>>
>>59283427
Actual exploit code would be pretty devasating. The only responsible way to release it is to release it directly to the developers of the affected software in secret.
Then never release it anyway- get it patched, then keep it silent for the majority of users who don't update their software.
>>
>>59282713
>>59283078
Why can't you retards read the documents properly?

These are the "fake" programs they can run while they're actually gathering all of your shit. It has nothing to do with the actual programs. They just look like them because they're popular.
>>
>>59283412
Not really, 0-days are found on a daily basis in various software and then sold to third parties or reported to the developers. For instance Project Zero from Google has a dedicated team to finding exploits and reporting them to vendors and they find questionable shit all the time, and it's just a small team of people, think how many things dedicated black hats can find.
>>
File: 1488896549801.png (35KB, 939x305px) Image search: [Google]
1488896549801.png
35KB, 939x305px
what did they mean by this?
>>
Newbie here, what does this leak mean in the end? It's something big, mediocre or nothing? thanks guys.
>>
>>59283417
You're even speaking completely in memes. Most people are. Which means they're incredibly unacceptable to programming right?
>>
>>59283458
It's a shame there's no well-funded non-profit organization that employs security researchers.
>>
File: 1488896614626.png (133KB, 819x630px) Image search: [Google]
1488896614626.png
133KB, 819x630px
>>59283460
>>
File: 1476576621689.png (102KB, 241x228px) Image search: [Google]
1476576621689.png
102KB, 241x228px
This shit never gets any better.
We truly are done for...
>>
>>59283452
that's what I would hope wikileaks would do -- provided they were given any code in the first place
>>
>>59283447
If the tech companies are smart they'd start patching the backdoors right now.
>>
>>59283468
CIA is spying on us through our TVs
>>
>>59283447
> By taking launchctl off the update ramdisk for target iOS version (see extract_ramdisk_from_update_ramdisk.py on details of unpacking the ramdisk), we have a signed binary that is trusted by the kernel. This can be used to launch multiple binaries by creating a launch.plist for each one and setting the payload to be started on load (I used KeepAlive set to True to do this) and setting /usr/bin/perl to be a copy of launchctl and using "#!/usr/bin/perl load payload1.plist payload2.plist ...". I have labelled the plists to be debug.plist (starts /var/mobile/Media/debugserver *:80 --waitfor _neagent
>>
The vault most likely contains actual toolchains. They said its the largest cache in history, meaning larger than Chelsea's, which contained video and audio.
>>
>>59283460
Try xxd'ing the file and look for some meta?
>>
File: 1479818413626.jpg (17KB, 720x405px) Image search: [Google]
1479818413626.jpg
17KB, 720x405px
Who /who/ here?
>>
>>59283297
>>59283323

>>>/r/the_donald
>>
File: 1488894732972.png (90KB, 1165x849px) Image search: [Google]
1488894732972.png
90KB, 1165x849px
"common sense", eh?
>>
>>59283433
XAXAXA ))))))))))))))))
>>
>>59283468
It proves yet again how the american govt is cucking their citizens. And no, nothing will happen because the only thing you have to do to convince ameritards of literally anything is wave the flag, play national anthem and have a big crows yelling USA! USA! USA!
>>
>>59283500
>>>/lgbt/
>>
File: 1485903909744.png (290KB, 650x353px) Image search: [Google]
1485903909744.png
290KB, 650x353px
>>59283500
>>
>WikiLeaks #Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryption

So, is IRC through SSL our only safe communication option?
>>
Anyone else having trouble accessing some parts of wikileaks site? a lot of bad requests and other errors

too much traffic?
>>
>>59283516
Retard, it's a keylogger, it can bypass fucking anything.
>>
>>59283516
not if you don't trust the irc server
>>
File: 1481234223219m.jpg (126KB, 576x1024px) Image search: [Google]
1481234223219m.jpg
126KB, 576x1024px
>>59282702
This is amazing, what a bunch of lads
>>
>>59282688
Not your car, jackass. A highway cruise missile.
>>
>>59283409
Honestly, in my opinion, the most dangerous thing here is not what tools can do which thing to what technology. It is the irresponsible handling of such powerful tools and its utilization against peaceful people. In the end, anyone could create these tools themselves, all it does is exploit certain technologies.

What's good about this, though, is that it sheds a light on what goes on behind the walls of confidentiality. It creates a pretty interesting dilemma: Keep it 110% confidential, or publicly available. The former, is never going to be possible, and the latter will never reach its potential for exploitation of users.
>>
>>59283452
>Actual exploit code would be pretty devasating

So there is no actual code? All we have then is a document which could amount to either a crazy larp or a CIA psyop. Everyone knows 0-day exploits exists and the government uses them.

How again is this devastating?
>>
>>59283517
Probably, just download the torrent and browse locally. Just don't open the PDF and EXE files.
>>
>>59282885

https://www.youtube.com/watch?v=trLbb0Ucyy4
>>
>>59283484
>>59283506
thx well nothing new....I'll hope we can end this shit now
>>
File: freebsd.jpg (21KB, 500x336px) Image search: [Google]
freebsd.jpg
21KB, 500x336px
Guys, don't you think this is a good moment to switch to FreeBSD?
>>
Barring physical destruction of big US servers is there any other way to fight back against this shit?
>>
>>59283517
CIA is probably DDOSing them hard
>>
>>59282864

CIA worse than Putin's Russia.
>>
I see nothing about Tor. Does that mean it's safe?
>>
>>59283516
>internet
>safe communication
No.
>>
>>59283538
There are msus and other things
>>
>>59283473
I just like to imagine a bunch of
>"Cognitive scientists, cultural anthropologists, behavior scientists, and game theory experts"
working for Shareblue/CTR/CIA/etc. and having to do reports about Spurdo, Pepe, and Awoo, ultimately either going insane or getting redpilled
>>
>>59282429
>Reminder that Wikileaks is a Russian GRU operation
https://www.youtube.com/watch?v=0_blUzsgnXc When played on loop mode it is possible to recreate the sound of people working in DNC office.
>>
>>59283366
>someone leaks single tool
>s-should be no problem r-right
>everything on your agency computers is ripped apart within a few hours by 8000 chinese computers
>getting faster and faster as they get more and more of your toolkit
You think they're gonna throw themselves off buildings over this?
>>
File: IDEOLOGICAL WARFARE, MEMETICS.png (321KB, 1080x1920px) Image search: [Google]
IDEOLOGICAL WARFARE, MEMETICS.png
321KB, 1080x1920px
>>
This is coming to light now but the leak happened months ago, if shit was gonna go down it would have already.
>>
>The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

>With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.


CIA HACKED THE ELECTION
>>
File: openbsd.gif (43KB, 500x431px) Image search: [Google]
openbsd.gif
43KB, 500x431px
>>59283544
wrong bsd, kiddo
>>
>>59283501
I user avast on windows 10, how fucked am I?
>>
File: 2017-03-07_22-34-50.png (6KB, 411x101px) Image search: [Google]
2017-03-07_22-34-50.png
6KB, 411x101px
>>59283516
well if it's good enough for the CIA then surely
>>
So pretty much nothing is safe?
>>
>>59283552
tor is literally CIA, they dont need zero days
>>
>>59283538
Well it directly states that the CIA has the ability to forge 'hacker fingerprints' and has collected fingerprints from around the world, including russia.

To translate: the CIA has the ability to pretend to be Russia when hacking into places.

You could also assume that Russia has a similar collection of fingerprints, making it doubly unlikely that Russia actually hacked any DNC shit at all.
>>
>>59283576
yes
>>
>>59283568
But that doesn't make sense anon, the CIA are on the Clinton's side.
>>
>>59283576
you should be working on that assumption anyway
>>
>>59282525
Fug I'm switching to BSD now
>>
>>59283576
TempleOS is safe
>>
File: netbsd2.png (25KB, 400x300px) Image search: [Google]
netbsd2.png
25KB, 400x300px
>>59283569
What about
>>
>>59282484
if you truly believe that the russians hacked the stand alone voting machines or the ink on the paper ballots you should be castrated
>>
>>59283516
at this point it is meeting in random real world face to face locations with a white noise device and multiple escape routes planned
>or like carrier pigeons
>>
File: IMG_0453.jpg (293KB, 616x693px) Image search: [Google]
IMG_0453.jpg
293KB, 616x693px
They have a tool that can leave foreign footprints after hacking.

>all that russia hacking everything bullshit was actually the cia

>mfw
>>
>>59283460
>what did they mean by this?
I think it could be a compressed archive
>>
>>59283593
>>59283583
Plenty of people buy illegal drugs online I'm pretty sure the CIA is running it though if they really cared couldn't they just crack down on everyonr
>>
The list of iOS exploits they've hoarded:
https://wikileaks.org/ciav7p1/cms/page_13205587.html

Most of them even mention how they were later publicly discovered by China, CIA could have easily told Apple and got them fixed, but 'muh terrorists' is obviously more important than American safety
>>
File: mems.jpg (130KB, 423x359px) Image search: [Google]
mems.jpg
130KB, 423x359px
>>59283111
Also MEMS micophones are <1mm^2 and are likely already in some SoCs (system on a chip). And it's not like you couldn't just cap it to look like an innocuous looking resistor...
>>
>>59283573
You are fuck like your mom know that kind porn you like.
>>
>>59283584
There was no real hacking that effected the election unless you count getting access to podestas gmail account that had the password passw0rd as hacking. The DNC emails were most likely leaked by Seth Richards.

Don't forget they were called the DNC LEAKS before the media changed their sotry to russian hacking
>>
>>59283584
emails were leaked by DNC insiders, the CIA then false flagged a Russian attack to deflect public attention away from the contents of the emails & to push the Trump-Russia conspiracy
>>
>>59283613
I am sure the CIA is profiting from the sale of those drugs. They don't want it to stop
>>
>>59282484
The whole russian thing is obvious bullshit, you gotta be an idiot to believe that crap
>>
File: vlcsnap-2016-12-28-14h14m08s170.jpg (153KB, 1920x1080px) Image search: [Google]
vlcsnap-2016-12-28-14h14m08s170.jpg
153KB, 1920x1080px
>>59283605
Not only did the partial recount show no evidence of hacking, it increased the amount of votes trump got.

Hilary rigged the election, and still lost.
>>
>>59283611
Cia is behind Trump election.
>>
Can someone pinpoint what we know for sure as of now ?
>>
>>59283638
nah man, fbi was on trumps side, cia wanted clinton.
>>
>>59283627
Fuck I don't even know what to believe anymore this is 28d chess type of stuff
>>
>>59283627
The CIA are selling them.
The reason they wanted to get rid of dread pirate roberts was because they wanted to run their own marketplace and make tons of money

>>59283644
Everything is fucked.
Russia now cannot be proven to have hacked any elections
>>
year0/vault7/cms/page_14587685.html
>The UMBRAGE team maintains a library of application development techniques borrowed from in-the-wild malware. The goal of this repository is to provide functional code snippets that can be rapidly combined into custom solutions. Rather than building feature-rich tools, which are often costly and can have significant CI value, this effort focuses on developing smaller and more targeted solutions built to operational specifications.
>DirectInput Keylogger
>Internet Explorer Password Collection
>SetWindowsHookEx WH_KEYBOARD and WH_KEYBOARD_LL Key Logger
>Webcam Capture
>Windows API Keyloggers
>Wiped Locked Files
>Image File Execution Options
>OCI.DLL Service Persistence
>Shell Extension Persistence
>Windows FAX DLL Injection
>TLS Library Injection
>Elevated COM Object UAC Bypass (WIN 7)
>Sticky Keys Process Launch
>Sysprep UAC Bypass using Process Injection
>Windows File Protection Bypass using SFC
>Anti-Sandboxing: Wait for Mouse Click emote DLL Injection via Mapping
>Remote DLL Injection via Reflection
etc
>>
>>59283584
so when clinton loses the CIA tries to force impeachment via 'russian hacking'
>>
>>59283549
Fight back? No, you cannot fight back.

LIke anything in tech, all problems can be boiled down to the saying "There is no spoon".

Tech is a big liability. Without it, you lessen your attack surface in real life.

If you wanna live a nice "tech" life, I imagine you have to write your own obscure architecture, your own obscure distro, and avoid connecting to networks you do not trust.

This also means youll be living like a tech vagabond. You open nothing. Your files are all audit byte by byte and you only open files that hve been throrough audited. In practice, you could not do this. But it is possible.

Or you could just, you know, buy a used thinkpad and install hardened gentoo, never connect to any network, and live like Stallman. Stallman made compromises, take note and see how he lives his life to avoid surveillance.
>>
CIcadA
>>
>>59283644
everything is compromised and these goddamn miracle tools are now out in the wild.
>>
>all the fags crying about muh windows 10 botnet when the botnet has been in place since windows 2000

rofl fucking placebo fags. fact is, you need a separate system with openbsd if you want to do anything in private. otherwise youre kidding yourself.
>>
>>59282917
It's dead already
>>
>>59283509
>>59283512

It's okay, if you go back there you can downvote posts you don't like.
>>
>>59283653
The link between CIA and drug selling is actually pretty hardcoated, like the link between the CIA and feeding radioactive waste to the disabled, or the CIA feeding LSD to children without the children's or parent's knowledge.
CIA drug trafficking is a major source of income for the CIA. The basics behind it is that drugs come from commie cuba, so they work with the drug cartels against the commies.
And make money to sell weapons to groups like Al Qaeda (in the 80s when they were the good guys against the USSR) and ISIS, who are fighting against russia again.

The CIA has a fucking hateboner for russia
>>
>>59283620
I know, but I own a gaming PC right now, got to buy a throwaway computer for browsing or something

What about maxthon cloud broswer? Is it a meme browser?
>>
>>59283611
thats the funny bit. "top officials" have "high confidence" russia has some involvement in something.... but they wont release the NSA's data which would prove if some american system was compromised. And if Russia did hack us, why would they be dumb enough to use a proxy in their own country.
>>
>>59283604
Be more concerned with applications and protocols being insecure.
>>
>>59283666
So we all hacker now?
>>
>>59283681
Yep, the server the domains point to is off, wonder why'd they host it in France though?
>>
>>59283659
>>>Sticky Keys Process Launch
I FUCKING KNEW IT
>>
>>59283544
most hacks in vault7 target bsd or windows
>>
File: 1484832857570.png (27KB, 226x222px) Image search: [Google]
1484832857570.png
27KB, 226x222px
>>59283610
>trusting pigeons
>>
>>59283681
>>59283711
it's a fucking internal CIA developer network you idiots
>>
>>59283625
this
>>
>>59283716
Press shift 5 times to get v&
>>
>>59283695
>>>/lgbt/
>>
>>59283552
>tor ... safe

https://arstechnica.co.uk/tech-policy/2017/01/feds-may-let-playpen-child-porn-suspect-go-to-keep-concealing-their-source-code/
>>
New ios jailbreak when.
>>
>>59283697
Wtf /v/. Just use the CIA botnet instead of chinese botnet.
>>
>>59283638
>CIA was behind Trump

Do you even pay attention? Obama and the Dems greatly increase the CIA powers, they wished for that to continue. They were certainly pro-Clinton.
>>
>>59283761
Jokes on you, the CIA leave holes in software even if the chinese find them too

Hey, it's almost as if this policy of computer insecurity is a big fucking mistake
>>
File: file.png (668KB, 1676x1236px) Image search: [Google]
file.png
668KB, 1676x1236px
lol
>>
File: 1488630202645.jpg (8KB, 432x247px) Image search: [Google]
1488630202645.jpg
8KB, 432x247px
Is it safe to assume non-US countries have no privacy either?
>>
>>59283584
Leave russian-looking evidence behind
>>
>>59283729
LOL
>>
>>59283774
well, considering CIA tools leaked and are (almost certainly) in posession of multiple other gov's, then yeah
>>
>>59283774
anyone outside of the US has less than none
>>
Is TAILS safe ?
>>
>>59283774
What?
Non-US countries are the MAIN TARGET
You're the LEAST private to the CIA.
>>
>>59283773
These cool names inspire to make my own malware

ButtInvader
PoopExcavator
PissCollector
>>
>>59283064
hahha show one exploit for qubes, gentoo or tails
>>
>>59283774
If the cia found these vulnerabilities it's safe to assume others did too. It even says they get some of their tools from "the wild"
>>
>>59283802
with those tools nothing is safe
>>
Remember the outrage back in 1999?

He knew something we didn't back then. I'm sure of it.
>>
>>59283802
Yes, surprisingly enough.
>>
i've seen the screen shots you guys have discuss so far. they just look like windows applications with backdoors. where does it say the other operating systems are comromised?
>>
Thread theme

https://www.youtube.com/watch?v=ZFOgvGSMcfE
>>
>>59283821
what tools ?
>>
By far the confirmation that they can remotely hack your car and just straight up kill you scares me the most.
>>
>>59283751
Yes, tor is still safe. Read on how they actually caught the few people on tor, and you'll see they didn't exactly exploit tor itself. They can only exploit tor under certain special circumstances, and never completely. They laothe tor with a passion and 99% of the tor btfo nonsense you read here is probably from LEA spreading counter intelligence.
>>
Its all Pozzed, all of it. Hardware, Software, Internet. 100% POZZED BOIPUSSI

Fuck this I'm gonna destroy all my tech and be a farmer. Thanks a lot for making me read SICP.

>tfw I'll just take it like everyone else
>>
>>59283138
dasher is pretty good at it (comes with tailsOS)
>>
>>59283774
Dude, the internet isn't just American, and American alphabet soups aren't the only ones dwelling in that. And the CIA especially spies on foreign countries.
>>
>>59283835
>1950s cars make a comeback
>>
>>59283768
Dear god /pol/, you are so faggot can get a joke?
>>
>>59283835
That's not true unless you own something like a tesla that's deeply connected to the internet and has self driving ability
>>
>oh thank you, you amazing human being.

>i would like to put in a request for the reddit "implied perverse interpretation" face.

>the 'undisapproval' face as shown here would be a nice addition as well.

https://wikileaks.org/ciav7p1/cms/page_17072568.html

>redditors in the CIA
>>
>>59282776
>TFW no rare CIA pepes
>>
>>59283828
dude read the wikileaks press release
https://wikileaks.org/ciav7p1/#PRESS
>>
>>59283835
Reminder: The policy for these agencies is If it can be done, they are doing it.
>>
>>59283802
Nothing is truly safe. If you want to be 100% safe, there's only one way to go: disposable electronics paid cash and free wifi.
>>
Something about alpine linux?
>>
>>59282776
how did you open the archive ? What's the password
>>
>>59283860
wtf are the trigun pics doing there though trigun was trash
>>
>>59283858
>even in the CIA you have to hide your powerlevel
is there no reprieve

also
>lenny face in japanese section
>>
File: 1486156129564.jpg (6KB, 148x149px) Image search: [Google]
1486156129564.jpg
6KB, 148x149px
>>59283618
shit i didnt know about this
>>
>>59283838
Be a tech vagabond and write your own arch and distro
>>
>>59283860
They are encrypted.
>>
File: 1488892109702.png (56KB, 755x562px) Image search: [Google]
1488892109702.png
56KB, 755x562px
>>59283876
hmmm....
>>
>>59283876
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
>>
>>59283761
>>59283771
What are some safe browsers that aren't botnets, then?
>>
>>59283857
in twenty years that will be the norm and they have the backdoors already.
>>
>>59283327
schizophrenic here thanks to this leak after today I'll be going offline for a few weeks, destroying and rebuying all hardware and starting from scratch just so I can feel relatively safe not every paranoid person has a reason to be paranoid
>>
File: mac_it_just_works.png (1MB, 1284x1062px) Image search: [Google]
mac_it_just_works.png
1MB, 1284x1062px
year0/vault7/cms/page_13762783.html
>System Monitoring and Manipulation
>SECRET//NOFORN
>The System Monitoring and Manipulation Library will be a set of classes designed to be used in two main scenarios:
>As an example, an implementation of the library would provide both on-demand process detection (is procmon.exe running now) and event driven call-back notification (alert me when procmon.exe starts or stops). This is not primarily intended for collection purposes, but rather to alter program behavior based on current system state or future events.

year0/vault7/cms/page_13762750.html
>IRC now available at irc.devlan.net

anybody wanna say hi to them?
>>
>>59283516
no, sending a pigeon with a letter is the only safe way of communication now
>>
>>59283906
W3m, firefox ESR, IceCat.
>>
>>59283921
>trusting those flying rats
>>
>>59283921
bruh, drones will intercept the pigeons, there is no escape
>>
>>59283871
Actually many big hackers / controversial web OPs, etc. has been caught on free wifis, even on TOR, when already profiled, agencies have timed network logon time to time on physical location.
>>
>>59283921
>he doesn't know about the pidgeons
>>
File: C6UWUcXUsAUdR_V.jpg large.jpg (31KB, 767x431px) Image search: [Google]
C6UWUcXUsAUdR_V.jpg large.jpg
31KB, 767x431px
>>59283876
>>59283900
>>59283905
>>
>>59283876
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
>>
>>59283921
>implying the spy satellites don't x-ray the mail mid-flight to see what's inside it and with a resolution high enough to read the text

Nice try CIA, not going to let you read my mail that easily.
>>
>>59283938
put a drone jammer on a really strong pigeon
>>
>>59283938
pigeons are drones
>>
>>59282751
everyone?
>>
>>59283915
see >>59282917
>>
>>59283921
Like the CIA doesn't have an entire division of falconers on hand just in case.
>>
>>59283506
>the Americans
>what are the Five Eyes
>>
>>59283951
>x-ray mail

Actually they use terahertz radar.

MIT project to read text from a closed book:

http://news.mit.edu/2016/computational-imaging-method-reads-closed-books-0909
https://www.youtube.com/watch?v=pUzSRwXMqOc
>>
>>59283972
brb buying shares in australian wedge tailed eagles
>>
>>59283915

Man they would probably put you on a watchlist and train new interns by fucking with you for the rest of your life
>>
>Download VSphere client – the latest version is 5.1.0 which is available on \\fs-01\share\EIB\VMware-viclient-all-5.1.0-786111.exe
>login information for VSphere:
>IP-Addr: 10.9.0.10
>user: Tester
>pass: 123ABCdef.
>>59284003
somehow it feels worth it
>>
File: 1485241544979.jpg (65KB, 411x412px) Image search: [Google]
1485241544979.jpg
65KB, 411x412px
The only secure method of communication in 2017 is whispering
>>
>>59283981
Except for Britain the five eyes are basically america's cucks anyway. And Britain is possibly even worse than america.
>>
File: IDA Pro.png (66KB, 256x134px) Image search: [Google]
IDA Pro.png
66KB, 256x134px
THIS COPY OF IDA PRO IS LICENSED TO

Central Intelligence Agency
>>
>>>no code
// we have a global volume handle for use by our direct write calls
HANDLE hVolHandle = INVALID_HANDLE_VALUE;

BOOL FlushCache()
{
// close th volume handle if it is currently open so we can reopen it with MAGIC!
if (hVolHandle != INVALID_HANDLE_VALUE)
{
CloseHandle(hVolHandle);
hVolHandle = INVALID_HANDLE_VALUE;
}

// Notice the FILE_SHARE_READ without FILE_SHARE_WRITE... you can't open a volume handle for exclusive write...
HANDLE hFile = CreateFile(m_szVolumeName, FILE_READ_DATA, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL); // this is really all we need, allegedly
if (hFile != INVALID_HANDLE_VALUE)
{
//we should never be able to open a volume this way, but if we somehow did, we need to close that funky handle
CloseHandle(hFile);
}
else
{
DWORD le = GetLastError();
// if we failed for any reason other than a sharing violation or access denied, then it didn't work
if (le != ERROR_SHARING_VIOLATION && le != ERROR_ACCESS_DENIED)
{
return FALSE;
}
}
if (hVolHandle == INVALID_HANDLE_VALUE)
{
// reopen the handle with normal permissions
if( (hVolHandle = CreateFileW(m_szVolumeName, GENERIC_READ|GENERIC_WRITE, FILE_SHARE_READ|FILE_SHARE_WRITE, NULL, OPEN_EXISTING, FILE_FLAG_WRITE_THROUGH | FILE_FLAG_NO_BUFFERING, NULL)) == INVALID_HANDLE_VALUE )
{
return FALSE;
}
}

return TRUE;
}
>>
>>59284050
whispering hasn't been secure for about 60 years
>>
>>59284001
Australia is part of the 5 eyes, these eagles are CIA
>>
>>59284051
our intelligence agencies straight up tell us they're raping our privacy, then the government laughs at anyone who disagrees. Not sure if it's better or worse than them pretending they aren't doing this shit.

Hi Theresa May.
>>
The only secure method of communication in 2017 is I2P-Bote.
>>
https://wikileaks.org/ciav7p1/cms/page_9535650.html

Sublime Text license
thanks, CIA.
>>
>>59283944
That's true, but then you have basic opsec:
>use various free wifi, don't stick to same place always at the exact same times, don't go to those places for the wifi only and find other reasons to be there
>use an "acceptable" browsing device, pulling out a Rpi with a mounted touch screen is a big no-no, so is a thinkpad, but any smartphone and Apple laptop will do the trick
>don't be the only retard there, if there isn't enough of a crowd, leave
>don't sit into the Starbucks either, the average free wifi reaches up to 50 meters at the very least, with high power and a good antenna you can tap it from even further
>a dual band battery powered wifi router you drop into the area and use as a relay to use the free wifi is even better
>don't just connect when you arrive and disconnect when you leave, wait a bit after you arrive, disconnect long before you leave and still pretend to be browsing the webs
>don't look like you're on the internet, look like you're reading the journal, chatting with a friend or anything else
>don't make it blatant on your screen you're doing something fishy, at the very least use screenshots of facebook pages as a cycling wallpaper, and put your terminal above it

All I do from free wifi is browsing the chins, and even then I'm that careful. I'm currently doing so from approximately 150 meters.
>>
╯‵Д′)╯彡┻━┻
>>
>>59284078
I don't doubt it. There was an installation near the small town I once lived in known as "the spy base" All we knew was it's american, it has 5 or 6 big golf-ball antennae and they'd recently installed 180 million dollars work of rack computers. that was the early 2000's though
>>
>>59283345
>TempleOS is still safe yes?
Nope. Terry is in a CIA prison, so you can be damned sure he's work for them (against his will).
>>
>>59284081
>Not sure if it's better or worse
Probably better, it makes it easier to at least debate the issue. Still sad that the Brits let their govt walk all over them like that though. I would've expected more from you lot.
>>
>>59284142
Ah fuck, I guess I have to write my own OS then. Ok guys, it has been a pleasure shitposting with you. See you in a couple years.
>>
!цcт цce cyяя!л!c yoц дцмвaccec!
>>
>>59284189
a nu chiiki briiki
>>
>>59283314
^^^ for real
>>
>>59284123
The point was that even on complete random visiting times, you can time user activity to on-site activity or surveilance. Can't beat physical spies. But then again if a network is already infiltrated the game is lost regardless of location, only a matter of time..

The obstacle is next-to impossible; to be both efficient and get things done if you need to change physical location and network from day to day.

But yea, the Harvard bomb threat was done on TOR with encryption, but it was the only session with encryption on the school network. That's how they found out. Lession: don't be an idiot
>>
>>59284199
шнaт д!д yoц !цcт cay тo мe? yoцяe фцкк!иг дeaд к!ддo!
>>
>>59283478
>>59283452

> Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

from: https://wikileaks.org/ciav7p1/index.html
>>
>>59283774
You don't need to assume it, it's given. They already don't care about the 4th, but they dont even need to worry about it outside the US.
>>
>>59284123
>being this paranoid to shitpost on a Laotian basket weaving internet club
>not browsing 4chan at the office and being paid for it
>>
File: Untitled.jpg (101KB, 1071x526px) Image search: [Google]
Untitled.jpg
101KB, 1071x526px
>Aperture Labs
>Black Mesa
>ISIS
>>
>>59284181
That wont matter unless you make all your own hardware from scratch as well
>>
>>59283345
Well, the software is pretty trustworthy desu. What I'm more worried about is the hardware. It's full of holes already.

To be safe, what we need above all is a pretty basic, barebones FPGA whose entire production is overseen by trusty people and audited at every step, along with open source, thoroughly tested and audited hardware descriptions, an equally open source and audited hardware compiler, and then maybe we can start worrying about the OS.
>>
File: image.jpg (60KB, 600x338px) Image search: [Google]
image.jpg
60KB, 600x338px
>>59283858
wtf I love the cia now
>>
>>59284271
>umbrella corp
lol
>>
>>59283838
Before you go, read "Industrial Society and its Future"
>>
>>59284271
Those are internal IP addresses
>>
>>59284271
what's that
>>
>>59283858
No wonder their shit was leaked
>>
>>59284271
>Sarif
>Umbrella
>>
>>59284266
There are countries where racism, antisemitism, call to boycott, hate speceh, spreading of terrorism related material, and other fun things commonly found around here are illegal. I'm talking about modern, civilized countries like... France?

Browsing 4chan can already get me in big trouble, won't be long before it can land me in jail. Gotta be careful.
>>
>>59284271
>no gensokyo
Plebs
>>
>>59284271
>CIA confirmed to be /v/tards
>>
>>59284299
you don't say
isis.com resolves okay though, apparently registered using the same registry as devlan.net hmmm :^)
>>
>>59284326
Some of their memes are pretty dank though.
>>
>>59284336
isis is a cia operation, pol was right
>>
>>59284272
God fucking dammit. Why do governments always have to ruin everything?
>>
File: WYLTKM.jpg (39KB, 640x512px) Image search: [Google]
WYLTKM.jpg
39KB, 640x512px
SO is this going to trigger the development of a new type of OS or is there no point?
>>
File: Swifty no happy.png (23KB, 582x125px) Image search: [Google]
Swifty no happy.png
23KB, 582x125px
Amusing to see infosec CIA apologists on twitter go into full defence mode.

"we needed this for counterterrorism" etc
>>
File: 0e9.jpg (27KB, 600x600px) Image search: [Google]
0e9.jpg
27KB, 600x600px
Don't want to be followed by your friendly CIA algorithm?

Just stop using the internet
>>
>>59284388
Yes it's called GNU/Linux

Turns out that Stallman was right, again.
>>
>>59284388
https://www.redox-os.org/
http://www.templeos.org/

got u senpai
>>
>>59284406
The joke is that the leak is actually about a leak, and doesn't contain the attacks themselves, and is merely telling the public what 'cyberweapons' the CIA lost control of.
>>
>>59284411
>gnu/linux
We need the gnu/hurd.
>>
>>59284321
Point taken.
>>
>>59284411
there's a lot of linux material in this release it might be a day or two before we know what the deal is

>>59284418
the temple guy is in custody?
>>
>>59284438
It'll be patched in a few days.
>>
File: Lennart_poettering[1].jpg (123KB, 1024x678px) Image search: [Google]
Lennart_poettering[1].jpg
123KB, 1024x678px
>>59284411
Thats a nice OS you have there.
Would be a shame if something happened to it.
>>
>>59284429
>At the beginning of July 2015, it was publicly disclosed that the Italian firm named Hacking Team had, in fact, been hacked.
>Approximately 400GB of data from Hacking Team's infrastructure was publicly released as a torrent.
>In August of 2015, we performed an initial review of a few selected repositories that were obtained from GitHub. These specific repositories contained source code which was focused on the implementation of implants for the Windows platform. This source code demonstrated a variety of capabilities (e.g., audio capture). "Capability" maps were created which mapped a certain capability (e.g., browser credential stealing) to individual source files found in the repositories. The maps created in August of 2015 are located on DevLan
metaleaks
>>
>>59283857
Not necessarily, they don't need full control, even being able to control a specific part can cause havoc. For example, a lot of cars have computer aided steering, computer managed throttles, etc.
>>
>>59284474
If we don't stop systemd now, we'll see systemd all over on the next release.
>>
>>59284493
How many of those are linked to the internet though? That's still a rare feature in a car.
>>
>>59284507
Well your phone has internet links, and people plug their phones into their cars.
>>
>>59284525
The entertainment system and gps in the car generally isn't linked to the rest of the computers in the vehicle but sure it's not impossible
>>
>>59284050
>not knowing technology exists to hear what people are saying via micro vibrations in window panes
>>
>>59284556
Cars aren't really designed with security in mind, oddly enough.
Or rather, the solutions are usually extremely custom and full of security holes and weird decisions like "let's link all the electronics together so we can patch in new functionality"
>>
>>59284579
I won't be surprised if we see a lot of recalls then. it's going to be a very busy few months for manufacturers if this story gets out
>>
think now we can have that public conversation snowden risked everything for us to be able to have with eachother and decide if this is something we want or not?

i doubt it because some stupid celebrity bullshit and political crap gets our goldfish attention away from shit that actually matters every single fucking time
>>
>>59284621
Implying they're not in on it
>>
>>59283857
You wouldn't believe how many cars already have tracking chips, whether for navigation data on traffic, or plain tracking of people. Yes, that usually means a SIM card somewhere with a data plan. Your car is already connected to the internet.

If I may add something to that, I know people working for car and automative parts manufacturers, who many times got to audit a crashed car to figure out if the electronics played a role in the accident. A couple times, they found TCP frames in memory, which would have no reason to be there on a car's system, running on a CAN network. This may just be the proof that some cars in the past have been tampered with.
>>
File: Untitled2.jpg (94KB, 780x488px) Image search: [Google]
Untitled2.jpg
94KB, 780x488px
>>
>>59284507
Granted, but modern cars now widely have a central unit with connectivity, and control of things such as suspension, engine power etc.

On (slightly) older cars you have diagnostic computers that can be plugged in to laptops.
Look up remapping, which can adjust fuelling etc to the engine in order to increase performance - done by computer.
By the same method, could you introduce a runaway acceleration?
>>
>>59284630
what difference does it make? If the public get wind that their car is vulnerable to you know, killing them suddenly the shit will hit the fan
>>
>>59284649
jesus christ
>>
>>59282429
>daily reminder that if there somehow could exist a 'western' counterpart of wikileaks we'd have ten times as much shit released on Russia.
>>
>>59284653
>Look up remapping, which can adjust fuelling etc to the engine in order to increase performance - done by computer.

That's an ECU feature the ecu is never responsible for any other car functions it's a slave system sometimes though, reducing power on gear shifts and clutch depression
>>
>>59284507
You could still have someone tamper with the car physically to upload malicious software. There's been that one article about a car that basically had an ethernet port somewhere and people were able to connect to it and basically access all of the electronics.
>>
File: Courage is contagious.png (11KB, 1023x136px) Image search: [Google]
Courage is contagious.png
11KB, 1023x136px
Wikileaks have balls you have to give them that
>>
>>59282864
I wonder what Apple's response to this would be (considering last time with the FBI). I really hope they dump shitloads of cash into a massive security overhaul, just as a Fuck You to the CIA.

At least find and plug these 0days. They know about them now and so does the public.
>>
>>59284755
They have the insurance files
>>
>>59284756
Don't you get it, they're in on it
>>
>>59284756
they probably worked with the software manufactures of all these companies to write most of this shit

not like they would really have a choice
>>
File: grasshopper.jpg (81KB, 863x418px) Image search: [Google]
grasshopper.jpg
81KB, 863x418px
>>59284685
I found this one from a month after that. guess they're perfectionists.
>Grasshopper Persistence Techniques
>Delivered Techniques:
Service DLL 6 Service DLL Registers a Service DLL to be >launched on reboot
>Service Proxy 3 Service Proxy Sits in the spot of a normal >service, gets called instead, will then call that normal service
>Scheduled Task 3 Scheduled Task Creates a scheduled task to execute on reboot
>Run Key 1 Run Key Creates a Run Key to run at reboot
>>
>>59284773
this yes

always have been

because it was the patriotic thing to do after 9/11. ya know not questioning the government and shit.

the funny thing is going to be watching people tweet this shit on twitter about how terrible this all is from their iphones and androids that sold them out a long time ago

this is a great and sad time to live lads
>>
>>59284823
what did they mean by this
>>
>>59284689
That's great but I don't live in Russia.
>>
>>59282288
Tor shit?
>>
File: wasgettingcaughtpartofyourplan.jpg (12KB, 400x300px) Image search: [Google]
wasgettingcaughtpartofyourplan.jpg
12KB, 400x300px
>>59283921
>>59283610
(((pigeons)))
>>
>>59284689
>daily reminder that this belief (because it is nothing more than that) is completely meaningless when it comes to western societies.

When you start resorting to comparing your own civilization to objectively worse ones to defend your own, you know you're doing something wrong.
>>
File: radioham.jpg (1MB, 1600x1200px) Image search: [Google]
radioham.jpg
1MB, 1600x1200px
Is radio ham the final frontier?

I've tried everything. I just cannot trust 99% of electronics anymore. In case you're wondering, my skills go from transistor-level electronics to OS architecture. I've done it all. There are glaring holes at every step, and nothing is safe.

But I can trust an oscilloscope and a microphone. I can trust a radio station, hidden in a faraday cage. I can trust having just two cables going out of it and to an antenna. Plus radioham is A E S T H E T I C, way beyond the dankest distro with a tiled WM.

Should we just give up on the internet and just get a QRZ so we can shitspeak over the air?
>>
>>59284755
Yeah, but they also have the insurance files.
If CIA decides to shut it down then everyone is fucked.
>>
File: flashbang.jpg (138KB, 780x422px) Image search: [Google]
flashbang.jpg
138KB, 780x422px
>>
>>59284910
But if you can shitspeak over the air, so can the CIA.
And wouldn't it just take a "stronger" transmitter to "override" your signal? Which they could afford, and you probably not.
>>
>>59284930
fuck everything i'm going innawoods
>>
File: ted-kaczynski.jpg (49KB, 485x480px) Image search: [Google]
ted-kaczynski.jpg
49KB, 485x480px
Apologize
>>
>>59283203

>the CIA recorded the 13 year old me playing BF3 with my retarded friends for 8 hours straight

tax dollars well spent
>>
>>59284910
>implying the CIA doesn't already have a way to listen in on that.
Only real safe form of communication is deep innawoods drop-offs of paper for another person to pick up at a later date. And even then drones and such can make that a hassle.
>>
>you will never work for the EDG

must be comfy af
>>
>>59284910
looks comfy
>>
>>59284969
>there are potentially hundreds of hours of me cybering with milfs
>logs of skype conversations full of false promises
>telling numerous 7/10s that they were hot
>all of this data filed away somewhere
>it might even occupy its own drive
>a hard drive that tax dollars paid for
>a drive that someone has to ensure is in good integrity
>maybe one day it'll even be audited by a person for certain keywords coming up frequently

It just so happens that telling women I want to bust their walls like an improvised explosive in the hoover dam is my fetish.
>>
>>59285038

would you buy the transcriptions once the CIA gets defunded as has to sell your cell?
>>
>>59284940
Well it's more complicated than that, but then there's worse: you can easily be found. It's easy to triangulate a radio signal with mere meters of precision, and because every country out there has antennas all over the planet, they can locate you in a heartbeat. And if you're a proper radio amateur, you use a unique callsign, so you're even easier to identify. And if you're an undeclared radio amateur without a callsign, which is illegal in 99% of countries in the world, radio operators will actively try to get you fined for it.

Now if the CIA was to jam signals, it'd bother the entire planet too. You can't really jam a signal without breaking a dozen international laws. So no one does that, people are just found. And if you're shitposting on the waves, clearly you'll be in trouble quickly unless you can move quickly.

But there's something extraordinary about radio ham: listening is entirely passive and no one can find you. Only the sender is at risk, but the receiver is entirely invisible. This is unlike anything on the internet.
>>
File: IMG_0499.jpg (43KB, 359x480px) Image search: [Google]
IMG_0499.jpg
43KB, 359x480px
>>59285038
>improvised explosive in the hoover dam

Enjoy the #WatchlistLife lad
>>
http://editions-hache.com/essais/pdf/kaczynski2.pdf
>>
>>59284989
And that is slow as fuck, and there's no broadcast option, it's just peer-to-peer communication.

It IS safe, but it's not replacing any of the modern communication mediums we have today. Couldn't even be on par with a textboard.
>>
File: timestomper.jpg (49KB, 642x279px) Image search: [Google]
timestomper.jpg
49KB, 642x279px
>>59284930
>>
>>59285092

>opening a pdf in 2016 + 1
>>
>>59285104

>prepping files
>>
>>59285060
I could probably turn the contents into several successful romance novels. It'd be a worthwhile investment.

>>59285070
I'm already under a high level of scrutiny than the average person because of what I do for a living.
>>
Official CIA response:
https://www.cia.gov/library/readingroom/docs/DOC_0006122439.pdf
best viewed with Adobe Reader
>>
>>59285170
>I'm already under a high level of scrutiny than the average person because of what I do for a living.
What do you do? Defense stuff? Are you too held for an hour every time you cross a border and questionned under suspicion of espionnage even though you're just a computer guy?
>>
>>59285226
I used to work in a gunshop, and I'm still an SOT. I'm on a short list of people who the ATF would love to buttfuck for any given reason.
>>
File: 1488519776500.jpg (11KB, 400x365px) Image search: [Google]
1488519776500.jpg
11KB, 400x365px
>>59285224
>>
>>59285224

fuck off CIA
>>
File: finedining.jpg (253KB, 1088x742px) Image search: [Google]
finedining.jpg
253KB, 1088x742px
>Removable Media Link File Execution (EZCHEESE - OSB Module)
>PSP/OS Issues: Iranian PSP Padvish (TAO says it gets caught 7/14)

Hey, Abdul! Wanna watch a movie?
>>
>>59285286
sandisk vault


this is so sick fuck them
>>
>>59285224
Now you know where I live and the number of my bank account, please bring me a pizza and I'll tell you who downed your last heli. Protip: it wasn't just a technical failure.

I also know about Putin's deals in the Maghreb, they're still on the table, and you fucked up big time.

Also bring NSA with you I have a word to tell them about their security.
>>
>>59285224
contains malware do not open
>>
File: notepad.jpg (90KB, 664x502px) Image search: [Google]
notepad.jpg
90KB, 664x502px
>>59285307
they've gone too far
>>
>>59284906
Obviously, but there's a lot of implied /pol/-infected glorification of Russia here.

Some people have this weird drive to pursue heavy apologetics for the other side when you find that your own is flawed.
>>
File: 1477444273642.jpg (28KB, 580x346px) Image search: [Google]
1477444273642.jpg
28KB, 580x346px
>>59284098
>mfw no "pls register" popup anyore
>>
How do all these circumvent firewalls?
And more importantly, do business IT administrators not check what kind of data gets sent out and get suspicious?
>>
>>59286071
the pajeet admins would not understand what is happening
>>
>>59284689
Reddit AMA
>WikiLeaks has published more than 800,000 documents that relate to Russia or Vladimir Putin. Most of those are critical. More than 2 million are from Syria. We have material from China, we’ve been banned in China, etc. Each country’s establishment tends to perceive WikiLeaks as something that is difficult for them and that erodes the authority of state institutions and that’s true in the United States.

www.dailymail.co.uk
> In its response, Wikileaks has refuted much of the New York Times piece, saying it has published 650,000 documents on Russia, most of which is critical.

wikileaks.org search
>Putin : 82,928 results
>Kremlin: 59,589 results
Thread posts: 527
Thread images: 99


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.