[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

ITS HAPPENING, THIS TIME LEAKS FROM THE NSA And this time i

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 140
Thread images: 30

File: happening.gif (973KB, 312x213px) Image search: [Google]
happening.gif
973KB, 312x213px
ITS HAPPENING, THIS TIME LEAKS FROM THE NSA

And this time its the hacker group decided to express their disappointment towards Trump for his questionable decisions as of late

>leaked files
https://github.com/x0rz/EQGRP

>medium from the group
https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1

>source
https://twitter.com/Snowden/status/850766326943690752
>>
I am a security expert. There is nothing of interest in these leaks.
>>
>>59797849
I like it how you managed to scan all 5375 files in only 2 minutes. Looks like you are real pro.
>>
Security expert here, been analyzing documents for fifteen years and there's nothing of interest in these leaks.
>>
>>59797789
>linux/etc/oracle

wew lad, in the trash it goes

are 3 letter agencies so incompetent they use oracle?
>>
THIS IS NOW A NO SLEEP THREAD.

Also I accidentally ran 2 of the binaries. What do I do?
>>
>>59798288
Nothing. I'm a security expert and there's nothing of interest in these leaks.
>>
>they have porks installed
what the fuck are they using AOL IM for?
>>
don't read it. Russians try to influence you!!!
>>
>>59797789
Security expert here. I were scanning these files throughout the 15 years I have spent at DoD. There is nothing of interest in these files. Now, I am going to shoot myself two times in the back.
>>
>>59798630
Those sneaky russian jedi mindtricks!
>>
>>59798725
the fucking fsb niggers
>>
Expert in security here.I scanned through the files in 15 minutes but now there is a van i don't recognize outside.Now i am gonna explode.
>>
>>59798288
You've lost control of your machine. Install Linux.
>>
>tfw this is not a real 'leak' and instead its a fake leak to find out who is looking at leaks
>>
Have any security experts scanned the files yet?
>>
>>59799023
>tfw this is a fake like and fifth dimensional reptiles testing whether you go against their order
>>
>>59799046
Yes, there's nothing of interest in these leaks.
>>
can i get arrested for cloning that repo?
>>
>>59799105
u can just download it as a zip
>>
>Respectfully, what the fuck are you doing?

Is there ANY doubt that these guys are 4channers now?
>>
>>59799023
>tfw this isn't a 'fake leak' and instead is a fake 'fake leak' to find out who isn't looking at fake leaks

if you're trying too hard to stay inconspicuous, that's suspicious
>>
>>59797789
It's redacted, only garbage left. No rootkits, nothing
>>
>>59799495
this
>>
I've been an uninteresting file for 15 years and there is nothing expert about these securities.
>>
>>59799788
>>59798248
>>59797849
Nice reddits /b/ros, +1 to you for that epic Dr Who reference.
>>
>>59798256
Each branch of the military has a list of approved software.
For the navy, the only approved databases are MS SQL Server and Oracle.
I would imagine it's similar for other groups.
>>
>>59797849
Security expert don't need these, hackers/historians/citizen/people do.

We finally have proofs that some people from the US government are criminals, they use money from the world to accomplish very bad things. I hope Trump will finally put them in prison (not at their home) for more than a stupid year like Obama did before because he was a stupid junkie.

That's horrible to see these guys being free.
>>
>>59797849
former security expert supporter here, totally laughing at you guys for getting hacked so ironically. But for real, we can't let these hacker groups get the decryption codes
>>
>>59797789
I hope Microsoft will finally be destroyed by people, it's clear they have sold access to the US government. It's against the constitution.
Europeans should launch some rockets to the Microsoft data centers to stop this torture now.
>>
>>59797849
>>59798298
>>59799023
>>59799088
>>59799788
>>59800032
Not an argument
>>
# git clone https://github.com/x0rz/EQGRP.git
Cloning into 'EQGRP'...
remote: Counting objects: 4508, done.
remote: Total 4508 (delta 0), reused 0 (delta 0), pack-reused 4507
Receiving objects: 100% (4508/4508), 148.59 MiB | 2.46 MiB/s, done.
Resolving deltas: 100% (732/732), done.
Checking out files: 100% (7588/7588), done.

Hmmm. Looks like nothing of interest in these leaks.
>>
>>59800379
grep -iR 'pizza'
>>
>>59798694
How many levels of anonymouth are you on my dude?
>>
>>59799161
>tfw its 2008 4chan thjat rose through the ranks
>>
File: gaysnotwelcome.jpg (26KB, 329x399px) Image search: [Google]
gaysnotwelcome.jpg
26KB, 329x399px
>>59798298

>"listen guis, I'm a expert and this is nothing"

BTFO NSA FAGGOT
>>
>>59799161
Nah. They're obviously /pol/tards too.
>>
File: pup.jpg (68KB, 640x640px) Image search: [Google]
pup.jpg
68KB, 640x640px
ITT: the kind of hard-hitting, deeply technical and informative analysis of advanced cyberespionage weapons that one would expect from the best technolo/g/y forum on the World Wide Web
>>
>>59801540
LOLE...........
>>
fuck off back to pol with this nonsense
>>
>>59801540
It appears that the "Grasshopper" malware reinstalls itself on the target computer every 22 hours through the Windows Update. It doesn't matter whether if the Update is disabled or not. Most insterestingly though, Grasshopper has its own language. Maybe we can use that programming language to write micro software to run on RPi and such.
>>
>>59798694

donttrustanyonenotevenyourself.png
>>
>>59797789
>And this time its the hacker group decided to express their disappointment towards Trump for his questionable decisions as of late
AKA false flag by the deep state who are butthurt he spoiled their war trap.
>>
>>59801540
Not good at programming but I can tell you who wrote at least one of the scripts. His name is Henry Feldman and did it during his time in NYU. He previously worked for Microsoft.
>>
>>59799495
I have the original encrypted files from the auction. I'll diff the original and the github version and we'll get a real answer.
>>
>>59801943
upload and share faggot
>>
>>59801955
Share what? The originals can be found on /t/ if you didn't get them when they came out.
>>
remember to bump the thread with useful info

AND DONT FUCKING REPLY TO SHILLS
>>
File: 1476744239283.jpg (39KB, 508x524px) Image search: [Google]
1476744239283.jpg
39KB, 508x524px
>>59801837
>technology board
>NSA hacking tools released
>"fuck off to pol"
>>
File: speakings like this.jpg (54KB, 800x705px) Image search: [Google]
speakings like this.jpg
54KB, 800x705px
>>59797789
>How do you be thinking it will be feeling when those people turn on you?
>TheShadowBrokers doesn’t want this to be happening to you, Mr. Trump.
>theShadowBrokers is having suggestion. Maybe you be making YouTube video is in order, to be explaining to your voters, your supporters, you didn’t fuck them all over.
>Because from theshadowbrokers seat is looking really bad. If you made deal(s) be telling the peoples about them, peoples is appreciating transparency.
>>
>>59797789
Anyone else feel sleepy? I'm yawning really hard right now. Really comfy and warm feelings. Anyone else wanna go to sleep? So sleepy... I'm gonna go to sleep now.
>>
Today, April 7th 2017, WikiLeaks releases Vault 7 "Grasshopper" -- 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to "perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration". Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.
>>
So what got released exactly other then a veiled threat?
>>
Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like 'MS Security Essentials', 'Rising', 'Symantec Endpoint' or 'Kaspersky IS' on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is 'Stolen Goods' - whose "components were taken from malware known as Carberp, a suspected Russian organized crime rootkit." confirming the recycling of malware found on the Internet by the CIA. "The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.". While the CIA claims that "[most] of Carberp was not used in Stolen Goods" they do acknowledge that "[the] persistence method, and parts of the installer, were taken and modified to fit our needs", providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company "HackingTeam".
>>
The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise

https://wikileaks.org/vault7/#Grasshopper

THIS IS NOT FUCKING POL DO NOT TALK ABOUT TRUMP TALK ABOUT THE LEAKS YOU ILLICIT PIECES OF THIS. THERE IS A THREAD FOR THIS ON POL.
>>
1 Concept of OperationsAn operator uses Grasshopper to build a custom installation executable, execute that installation executable on a target computer, and (optionally) decode theresults of that execution.BuildAn operator uses the Grasshopper builder to construct a custom installation executable.The operator configures an installation executable to install one or more payloads using a variety of techniques. Each payload installer is built from individually configured components that implement part of the installation procedure.The operator may designate that installation is contingent on the evaluation of the target environment. Target conditions are described using a custom rule language.The operator may configure the tool to output a log file during execution for later exfiltration.ExecuteAn operator runs the installation executable on a target computer running a Microsoft Windows operating system. The installation executable should be loadedinto and executed solely within memory.The operator is responsible for selecting the appropriate method for gaining on-target execution for the configured Grasshopper tool.If the executable has output a log file, the operator collects it from the filesystem for later analysis.DecodeAn operator decodes the runtime-generated log file to evaluate detailed execution results.The execution log stores result codes from each installer component and facts evaluated as part of the target environment validation process.
>>
File: shadow1.jpg (184KB, 870x710px) Image search: [Google]
shadow1.jpg
184KB, 870x710px
>>59802133
This should be bigger news.

https://www.bleepingcomputer.com/news/security/shadow-brokers-publish-the-password-for-the-rest-the-stolen-nsa-hacking-tools/
>>
>>59802253
then make a another thread for it
>>
1 CompositionA Grasshopper executable contains one or more installers. An installer is a stack of one or more installer components. Grasshopper invokes each component of thestack in series to operate on a payload. The ultimate purpose of an installer is to persist a payload.Grasshopper will optionally evaluate rules to determine whether to execute an installation. Rules may be set on each installer and/or globally.ExecutablesGrasshopper executables contain and run one or more installers on a target system. An executable may have a global rule that will be evaluated before execution of any installers. If a global rule is provided and evaluates to false the executable aborts operation.Executables may be constructed for both x86 and x64 architectures and in the following formats: DLL Microsoft Dynamic-Link Library- Compliant with NOD Persistence Specification v1- Executes in a thread created in the DLL entry point (DllMain)- Memory-loadable (compliant with NOD Persistence v1)ICE DLLICEv3 Module- Compliant with In-memory Code Execution (ICE) Specification v3- Supports ‘Fire’ feature set If no rules need to be evaluated by the executable, Grasshopper uses an alternate executable, called a Cricket. A Cricket is equivalent to a Grasshopper, but has been stripped of the rule processing engine.
>>
Installers Installers encapsulate the process used to install a payload on a target system. Installers are constructed from one or more components that each contribute to theinstallation process.Installers run by passing a payload through each member of the component stack. An installer may invoke a component at run time or build time, depending on payload availability and the components’ execution time requirements. Installers are biased toward build-time execution of components to minimize on-targetactivity.An installer may have a rule that will be evaluated before execution. If an installer rule is provided and evaluates to false the associated installer is skipped.ComponentsComponents form the functional portion of installers. Components may be used to introduce payloads to the installer stack, modify a payload on the stack, install a payload on a target, etc.Grasshopper users configure components individually before using them to construct installers. Components may be used in multiple installers.
>>
>>59801943
well?
>>
>>59802253
stuff is from 2013
>>
File: 21451421124.png (215KB, 477x296px) Image search: [Google]
21451421124.png
215KB, 477x296px
Bump for something that could save us all
>>
File: Picture 3.png (466KB, 491x593px) Image search: [Google]
Picture 3.png
466KB, 491x593px
>>59802734
This is it (I think): https://github.com/x0rz/EQGRP

Here are original encrypted files:
https://github.com/Muhammd/EQGRP-AUCTION-Files
https://github.com/Muhammd/EQGRP-AUCTION-tools

The password for the EQGRP-Auction-Files is CrDj”(;Va.*NdlnzB9M?@K2)#>deB7mN
>>
How how many dumps has wikileaks given so far of Vault 7?
>>
File: 1360847252520.png (57KB, 800x1100px) Image search: [Google]
1360847252520.png
57KB, 800x1100px
>>59802759
Have you ever updated firmware on your ISPs router?

> We have reviewed all the content inside of TheShadowBrokers archives and we can assure you... There is nothing to see here.
>>
bamp
>>
bump.

have anyone downloaded the files? upload them PUBLICLY to anywhere you can. spread the word.
>>
When there is talk of world war fucking three hapoening posting "ITS HAPPENING" about this bullshit should be considered bannable
>>
>>59802854
This is a good example of a shill trying to divert the attention. Do not reply them, do not talk to them. They are powerless without our observation.

Also, what does the encrypted files contain?
>>
>>59802893
>Literal world war three might happen and will probably end in nukes
>I'm supposed to care about some security files
>>
File: proud-heavy-weighted-anonymous.jpg (47KB, 600x450px) Image search: [Google]
proud-heavy-weighted-anonymous.jpg
47KB, 600x450px
>>59797789
WE DID IT, ANONYMOUSE!!1
>>
These are clearly russian files made to make the poor NSA and trump look bad.

Fucking putin commies.
>>
>>59797849
Well if the security experts says it, it must be true.
>>
>>59802908
Don't worry, someone on /diy/ has already built a bunker for us anons.
>>
File: 1335951480682.jpg (269KB, 699x557px) Image search: [Google]
1335951480682.jpg
269KB, 699x557px
>>59802831
4
> Vault 7: CIA Hacking Tools Revealed
> Dark Matter
> Marble Framework
> Grasshopper


But this is not part of it. This are NSA tools from 2013.

http://heavy.com/tech/2016/11/shadow-brokers-nsa-leak-hack-auction-equation-group-latest-who-are-they-ransom-hackers-russia-us-election-cyberwar/

TheShadowBrokers came out soon after story Russians helped Trump began to appear in MSM.

> In August a group that called itself the “Shadow Brokers” published a set of software tools that looked like what the N.S.A. uses to break into foreign computer networks and install “implants,” malware that can be used for surveillance or attack. The code came from the Tailored Access Operations unit of the N.S.A., a secretive group that mastered the arts of surveillance and cyberwar.

> The assumption — still unproved — was that the code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

> The N.S.A. said nothing.
>>
Is GNU hurd still safe??
What about haiku?
>>
>>59799835
hopefully oracle has a backdoor in their shit
>>
>>59798288
>time to set the house up for your move mistah lawwwwman.jpg
>>
>>59802951
Haiku runs everything uid 0. It's about as safe as Windows 95.
>>
Anyone find anything interesting?
>>
File: Screenshot_2017-04-08-18-37-34.png (241KB, 1440x2880px) Image search: [Google]
Screenshot_2017-04-08-18-37-34.png
241KB, 1440x2880px
How did he post from the future? It's clearly April 8.
>>
File: VRoqRLI.gif (984KB, 400x222px) Image search: [Google]
VRoqRLI.gif
984KB, 400x222px
>>59803389
I am security expert. I just went through it and it appears to be nothing substantial sadly.
>>
>>59803542
for a second that says "NES"
>>
>>59803488
He has timezone set to Russia to pretend he is GRU/FSB

> "Actually it's probably a false flag to make Russia look bad." - throwaway71958, created 8 days ago

> 2017 in a nutshell right there.
>>
>>59802976
someone turn this into a haiku
>>
>>59797789
>ITS HAPPENING, THIS TIME LEAKS FROM THE NSA
Who gives a shit, Debian is better.
>>
File: pwnallthethings.jpg (23KB, 551x296px) Image search: [Google]
pwnallthethings.jpg
23KB, 551x296px
>>59803488
Note that TheShadowBrokers already slipped once when he "accidentally" posted full screenshots with dd/mm/yyyy file format

https://twitter.com/shadowbrokerss/status/819537298245218304


https://twitter.com/pwnallthethings/status/819545302986264576

(((pwnallthethings))) was great to notice this opsec slip
> Prior to founding Capital Alpha Security, Tait worked for Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.
>>
>>59803681
>Who gives a shit, Debian is better.
samefag here, why is everyone getting worked up over what the nsa does when in fact debian is better than the nsa, use debian
>>
>>59803681
>Who gives a shit, Debian is better.
>>59803708
>use debian

saemfag here, whY WOULD you even use the NSA for your OS, the NSA is a LAME OS!
>>
>>59803681
>>59803708
>>59803716
(samefag) NSA is a bad OS don't use NSA
>>
>>59803681
>>59803708
>>59803716
>>59803733
(samefag) does anyone else smell that
>>
>>59802070
They're intentionally typing like that so it can't be compared to their normal writing styles.
>>
File: C1-UrmVWIAIMUaS.jpg large.jpg (161KB, 772x1786px) Image search: [Google]
C1-UrmVWIAIMUaS.jpg large.jpg
161KB, 772x1786px
>>59803827

Interesting that on Jan 12 Theshadowbrokers said they are goodbye, yet they decided to come back.

https://twitter.com/shadowbrokerss/status/819537298245218304
https://onlyzero.net/theshadowbrokers.bit
>>
>>59804030
I was thinking the same. It has to be them though, they released the password to the encrypted files. Lot's of people have the files from the original dump, so this really can't be faked. Or are you thinking more along the lines of "A new political motivation has arisen"?
>>
I cloned the git repo which so where is the file thats encrypted that the passphrase is for?
>>
File: masks.jpg (21KB, 263x264px) Image search: [Google]
masks.jpg
21KB, 263x264px
>>59804102
Yeah I am thinking:
> "A new political motivation has arisen"

I am still on the fence about who guccifer2.0 was. There is plenty of evidence that he was not Russian GRU/FSB pretending that he is lone Romanian hacker:
http://g-2.space/falseflag.html
https://medium.com/@nyetnyetnyet/russia-and-wikileaks-the-case-of-the-gilded-guccifer-f2288521cdee#.tn2zn0wak

I have no fucking clue who DCLeaks.com is, Guccifer 2.0 had some password access to page before it was released, so he might be related, but this doesnt mean much.

I never believed that https://fancybear.net/ are Russians. They would never use US security community designation to name their webpage.


Until now I did believe that at least TheShadowBrakers might be APT28/GRU or APT 29/FSB. Since it was obvious that nobody will pay enough bitcoins and tools will never be released.
As NYTimes wrote:
> One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.


Now that shit is out... I am not sure that TheShadowBrokers are Russians either.
>>
File: Screenshot_72.jpg (28KB, 624x440px) Image search: [Google]
Screenshot_72.jpg
28KB, 624x440px
>>59804183

Encrypted repos backups:
github.com/Muhammd/EQGRP-AUCTION-Files
github.com/Muhammd/EQGRP-AUCTION-tools

Decrypted repo:
https://github.com/x0rz/EQGRP

Encyprted original:
yadi sk/d/QY6smCgTtoNz6
github.com/theshadowbrokers/EQGRP-AUCTION (down)

Here are all shadowbrokers accounts:
https://medium.com/@shadowbrokerss
https://twitter.com/shadowbrokerss reset your password? Email us************@t*******.***
https://onlyzero.net/theshadowbrokers.bit
https://theshadowbrokers.tumblr.com/ Backup: https://archive.is/WkT7o
>>
I binwalked these and wrote a little manifest file if you guys want to look at it, should be done in about 30 mins or so, there's a lot of files in here, ridiculous amount of ELF binaries

I see a few names popping up, "kensmith", "obrien" and "dfr"
>>
>>59804351
Maybe they're Chinamen pretending to be westerners that are pretending to be Russian.
>>
>>59804573
Bump for interest
>>
scrubhands
erases certain history from the history file and makes sure that the timestamps arent updated from modifying the files
>>
File: 8chan.jpg (105KB, 894x586px) Image search: [Google]
8chan.jpg
105KB, 894x586px
>>59804183
original links all seem to be dead for me, here is archive from happywhels

http:// www mediafire com/?rj8v4xj3d95cs

https:// mega nz/#F!vwJT2Y7Z!1J5JtyB0bVyzWwp7KPHs6g

Eyeballing_Snowden_Info_Folder_04/NSA's Equation Group - Cyber Weapons/EQGRP-Auction-Files.zip
>>
>>59804890
>>59804509
Thaks guys but I figured right after I posted that the git repo I cloned claims to be the deencrypted files already
>>
Look at all the NSA shills in the comments of the github repo.
>>
>>59797789
>no source code
>just binary files, shell scripts and libraries

I ain't touching that shit, probably all backdoor'd to track who uses it.
>>
>>59805112
>no source code

there's a bunch in there, most of the ELFs can be reversed too

quit being a little bitch and isolate it on a separate box
>>
>>59797789
this is yuge
>>
>>59798288
prepare your anus with plenty of vaseline?
>>
what's going on here?
EQGRP/Linux/bin/pyside/targets.py
>>
>>59803702

hm nice
>>
>>59805352
The netsec twitter nerds are theorizing that this came from some TAO guy's laptop that got stolen. Having a list of hosts like that corroborates it.
>>
>>59805391
and this?
EQGRP/Linux/bin/tn.spayed
>>
>>59805403
and in here?
EQGRP/Linux/bin/varkeys/pitchimpair/
>>
>>59805426
or .. up a dir EQGRP/Linux/bin/varkeys/
>>
>>59797789

holy shit this actaully works !

got it up and runing
>>
File: martin.jpg (153KB, 653x860px) Image search: [Google]
martin.jpg
153KB, 653x860px
>>59805391
Theory from 2016 is that leaker was Hal Martin
>>
File: 1484839915857.png (361KB, 407x415px) Image search: [Google]
1484839915857.png
361KB, 407x415px
>>59805508
>50TB of code

SENPAI
>>
>>59805508
How many Pajeets does it take to produce 50TB of code? Is it like Visual Studio's 50GB install where its not all code or is it really literally 50Tb of code?
>>
>>59805628
that's almost enough to make a windows
>>
i fancy a bit of a shag
>>
File: 9hfss.png (3MB, 5844x3464px) Image search: [Google]
9hfss.png
3MB, 5844x3464px
>>59805628
Thats nothing, lately one whistleblower stole 170TB on 47 hard drives.

http://www.thegatewaypundit.com/2017/03/massive-amount-data-47-hard-drives-whistle-blower-proves-obama-crew-spied-everyone/

Mar 23rd, 2017
Freedom Watch notifies congress of a “Deep State” intelligence community whistle blower, Dennis Montgomery, with hundreds of millions of documents showing CIA and FBI and Intelligence Committees were spying on, and conducting surveillance on, American citizens for political purposes.

Mr. Montgomery is trying to use a legal “whistle-blower” process and not follow the same approach as Edward Snowden.
The whistleblower Mr. Montgomery left the NSA and CIA with 47 hard drives and 600 million pages of information exposing the illegal surveillance on prominent Americans during the Obama years including Donald Trump.
>>
>>59805508

fifty

terabytes

of

nsa

code
>>
File: 1445393418645.jpg (14KB, 256x256px) Image search: [Google]
1445393418645.jpg
14KB, 256x256px
>>59805871
>170TB
>>
File: 1491671876683.jpg (17KB, 301x400px) Image search: [Google]
1491671876683.jpg
17KB, 301x400px
>>59805871
>He managed to smuggle 174TBs out on external HDDs
Holy fuck-
>>
File: Screenshot (6).jpg (3KB, 97x126px) Image search: [Google]
Screenshot (6).jpg
3KB, 97x126px
>>59797789

>github
>medium
>twitter

fake, because the CIA niggers can just change the content on all those services because they are US based websites.

But they haven't changed anything, which means the information released is fake
>>
>>59797789

>shadowbrokers release password for equation group leaks
>which was obtained during Obama as president


What kind of logic is this? Trump hasn't had shit to do with the equation group NSA hacking tools, it was Obama who did that

I'm guessing the DNC is the shadowbrokers
>>
>>59806390
this assumes the following:
1. the CIA cares enough to do so
2. the CIA is competent enough to do so
3. the CIA is nimble enough to do so in a timely fashion

assuming any one of these is a decent sized leap of faith, and assuming all of them is far-fetched
>>
>>59806390
>But they haven't changed anything, which means the information released is fake

I just binwalked a couple of files, it's all legitimate, see for yourself.
>>
it's real
>>
nice
>>
batten down the hatches lads this is a real happening
>>
File: IMG.jpg (2MB, 4160x3120px) Image search: [Google]
IMG.jpg
2MB, 4160x3120px
Russian hacker here. Some of you guys alright, just don't use windows xp tomorrow [spoiler], if you like your dota 2 hats))[/spoiler]
>>
File: cd272dc3a0ef148174831aff68db8b50.png (350KB, 1723x957px) Image search: [Google]
cd272dc3a0ef148174831aff68db8b50.png
350KB, 1723x957px
How do I use this stuff anon's?
>>
>>59806755
>5
its a virus bro
delete it
>>
>>59797849
I confirm. I do also not work for the government at all I promise you.
>>
>>59806755
>Not using a VM

You already fucked up
>>
>>59806755
Read the pdf instruction manuals, double clcick the ones that end in .exe, open all pictures.
>>
>>59806978
kek
>>
File: 1360229807606.gif (250KB, 200x164px) Image search: [Google]
1360229807606.gif
250KB, 200x164px
>>59806977
>not using a rasburry pi cluster
>not connecting to a Slovenian vps
>not using a vm within a vm
>not using a vpn ontop
>not using pfsence with firewall
>not having it all connected through a random mcdonalds free wifi
>not going to different Mcdonalds to randomize it
>not destroying every cluster after 1 use
>not re-buying a cluster from Chinese online agents
Think you might be fucking up
Thread posts: 140
Thread images: 30


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.