Jump to content

The CIA has been snooping around in your WiFi router

iamdarkyoshi
1 hour ago, Gravesnear said:

He didn't reveal anything we shouldn't have already known. Scientific American had published an article about a year or two before the Snowden release about the technology DARPA developed that the nsa eventually used. When the Snowden thing happened I was like "didn't we already know this?". Let's get this straight, instead of being a whistleblower and staying in the country to face the courts, he ran off to Russia. You think he stays there for free? He's been selling out Americans since he got there. Why do you think the Russians suddenly became so good at electronic infiltration? Why do you think after spending two decades on the DL Russia finally became emboldened in their foreign policy? Snowden sold us out. Zero doubt in my mind. Plenty of whistle blowers have released documents anonymously and safely. Snowden wanted to be famous.

Why do you think Russia "suddenly became so good at electronic infiltration"? To make an assessment of that, you'd have to be aware of previous and current hacking efforts, know that they were by Russia, and observe a notable improvement in methods. But we don't know of any hacking attacks that are proven or well-evidenced to have been by Russia.

 

The emails that the DNC have made a big fuss about weren't sourced by Russia, according to Craig Murray, the person who picked up the leaked emails from their source and delivered them to WikiLeaks (and also Ray McGovern, Julian Assange, and Kim Dotcom.. and also Bill Binney - the architect of the NSA's data-gathering systems). But if those DNC email servers were hacked, then it wouldn't have been a sophisticated hacking job if it appeared to have been done by Russia, since it is normal for professional hackers to leave traces to make their work appear as though it was done by other people, just as the CIA does - which Snowden would have informed Russia of if he told them anything (as if Russia would need to be told that). A hack job that appears to have been done by Russia was not done by Russia. And from what I've read, the DNC email server didn't require expertise to breach, as it was a vulnerable target.

You own the software that you purchase - Understanding software licenses and EULAs

 

"We’ll know our disinformation program is complete when everything the american public believes is false" - William Casey, CIA Director 1981-1987

Link to comment
Share on other sites

Link to post
Share on other sites

13 hours ago, Pachuca said:

I like that it's short. Sometimes it's annoying having to read long wordy articles. To each his own :)

Personally I like medium length articles. More information to be found but not as lengthy or wordy as longer articles. 

 

 

 

Off topic: 

Also your profile pic lol quite accurate. I think once you get or job and in particular one that handles money like my current job, you kinda get perspective. Before my current job, I worked at McDonald's for two months as a grill cook. I hated it. Saw an opportunity to work somewhere else in a better environment (fast food vs grocery store) and currently making more money and will get raises through wage progression (there is another grocery store that I might be able to make a fair bit more than I currently make. (I'm currently at $11/hr and in a few weeks will be at $11.25. The grocery store I'm talking about I could make from $14/hr to $18.50/hr))

 

But yeah, life isn't cheap. I mean I guess unless you wanted to be a welfare queen. Easy life, but not exactly something I would say should be a personal goal. Though I do joking say, I wish I could be a welfare queen.

a Moo Floof connoisseur and curator.

:x@handymanshandle x @pinksnowbirdie || Jake x Brendan :x
Youtube Audio Normalization
 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

18 minutes ago, Delicieuxz said:

Why do you think Russia "suddenly became so good at electronic infiltration"? To make an assessment of that, you'd have to be aware of previous and current hacking efforts, know that they were by Russia, and observe a notable improvement in methods. But we don't know of any hacking attacks that are proven or well-evidenced to have been by Russia.

 

The emails that the DNC have made a big fuss about weren't sourced by Russia, according to Craig Murray, the person who picked up the leaked emails from their source and delivered them to WikiLeaks (and also Ray McGovern, Julian Assange, and Kim Dotcom.. and also Bill Binney - the architect of the NSA's data-gathering systems). But if those DNC email servers were hacked, then it wouldn't have been a sophisticated hacking job if it appeared to have been done by Russia, since it is normal for professional hackers to leave traces to make their work appear as though it was done by other people, just as the CIA does - which Snowden would have informed Russia of if he told them anything (as if Russia would need to be told that). A hack job that appears to have been done by Russia was not done by Russia. And from what I've read, the DNC email server didn't require expertise to breach, as it was a vulnerable target.

I'm not talking about the DNC hacking issue. Russia has been implicated in electronic efforts before the election. If I can find the sources again I'll share them with you, it's been a few years but I used to follow this kind of news pretty closely. Let's also not forget that Snowden got involved with a Russian agent, though he denies sharing anything with her.

Link to comment
Share on other sites

Link to post
Share on other sites

lets hope that my router isn't on the list

 

 

hint hint, its an actual good router provided by my ISP holy shit

 

Ryzen 5 3600 stock | 2x16GB C13 3200MHz (AFR) | GTX 760 (Sold the VII)| ASUS Prime X570-P | 6TB WD Gold (128MB Cache, 2017)

Samsung 850 EVO 240 GB 

138 is a good number.

 

Link to comment
Share on other sites

Link to post
Share on other sites

I guess the answer is to replace everything with opensource software, including routers (pfsense anyone?).

 

Even then, vulnerabilities could exist that don't get discovered until they've been exploited, but at least you can check the code and know what it's doing, and you can be reasonably sure there isn't a conspiracy where the makers are being paid off to not fix known vulnerabilities. 

Solve your own audio issues  |  First Steps with RPi 3  |  Humidity & Condensation  |  Sleep & Hibernation  |  Overclocking RAM  |  Making Backups  |  Displays  |  4K / 8K / 16K / etc.  |  Do I need 80+ Platinum?

If you can read this you're using the wrong theme.  You can change it at the bottom.

Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, SC2Mitch said:

I honestly could give two flying fucks if the Government knew of my porn history. I use Tunnel Bear but nothing is 100%.

then your traffic is encrypted end to end there is nothing to see but encrypted packets and local traffic. 

 

point is why should they be allowed to spy on you when they have no reason to be doing it?

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

Y'all know those "CIA Surveillance Van" joke-posts on the internet? They weren't a joke.

TjshomeFunnyWifi-6624.png.a1abc2f63009531ee5626714f862999a.png

Remember kids, the only difference between screwing around and science is writing it down. - Adam Savage

 

PHOΞNIX Ryzen 5 1600 @ 3.75GHz | Corsair LPX 16Gb DDR4 @ 2933 | MSI B350 Tomahawk | Sapphire RX 480 Nitro+ 8Gb | Intel 535 120Gb | Western Digital WD5000AAKS x2 | Cooler Master HAF XB Evo | Corsair H80 + Corsair SP120 | Cooler Master 120mm AF | Corsair SP120 | Icy Box IB-172SK-B | OCZ CX500W | Acer GF246 24" + AOC <some model> 21.5" | Steelseries Apex 350 | Steelseries Diablo 3 | Steelseries Syberia RAW Prism | Corsair HS-1 | Akai AM-A1

D.VA coming soon™ xoxo

Sapphire Acer Aspire 1410 Celeron 743 | 3Gb DDR2-667 | 120Gb HDD | Windows 10 Home x32

Vault Tec Celeron 420 | 2Gb DDR2-667 | Storage pending | Open Media Vault

gh0st Asus K50IJ T3100 | 2Gb DDR2-667 | 40Gb HDD | Ubuntu 17.04

Diskord Apple MacBook A1181 Mid-2007 Core2Duo T7400 @2.16GHz | 4Gb DDR2-667 | 120Gb HDD | Windows 10 Pro x32

Firebird//Phoeniix FX-4320 | Gigabyte 990X-Gaming SLI | Asus GTS 450 | 16Gb DDR3-1600 | 2x Intel 535 250Gb | 4x 10Tb Western Digital Red | 600W Segotep custom refurb unit | Windows 10 Pro x64 // offisite backup and dad's PC

 

Saint Olms Apple iPhone 6 16Gb Gold

Archon Microsoft Lumia 640 LTE

Gulliver Nokia Lumia 1320

Werkfern Nokia Lumia 520

Hydromancer Acer Liquid Z220

Link to comment
Share on other sites

Link to post
Share on other sites

This article had so little context, it's not even funny. Did they mass hack all routers? Maybe specific ones belonging to specific people, groups , or entities? Give context or nothing at all.

 

And the amount of assumption and speculation without factual supporting documentation is crazy.

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Ryujin2003 said:

This article had so little context, it's not even funny. Did they mass hack all routers? Maybe specific ones belonging to specific people, groups , or entities? Give context or nothing at all.

 

And the amount of assumption and speculation without factual supporting documentation is crazy.

 

http://www.dailymail.co.uk/sciencetech/article-4617244/Leaked-documents-reveal-CIA-hacked-Wi-Fi-routers.html

 

Quote

'The Cherry Blossom (CB) system provides a means of monitoring the internet activity of and performing software exploits on targets of interest,' the document reads.


'In particular, CB is focused on compromising wireless networking devices, such as wireless (802.11) routers and access points (APs), to achieve these goals.'


The firmware is especially effective against some D-Link-made DIR-130 and Linksys-manufactured WRT300N models because they can be remotely infected even if they have a strong administrator password.

 

Here are the documents. It looks to me like they are an instruction manual, so they aren't a record of specific persons they've been used on.

You own the software that you purchase - Understanding software licenses and EULAs

 

"We’ll know our disinformation program is complete when everything the american public believes is false" - William Casey, CIA Director 1981-1987

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×