Welcome to our New Forums!

Our forums have been upgraded and expanded!

⚠ Mass surveillance is about to begin ⚠

Joined
Nov 22, 2024
Messages
179
Website
joyofsatan.netlify.app
surveillance.png
The feared reality seems to be getting closer and closer. I think you've heard about “ChatControl” lately. It's a horrible mass surveillance system, a hardware backdoor, a chip that could be pre-installed on devices in the European Union to obtain data before it is encrypted so that governments, secret services, etc. can spy on end-to-end encrypted messaging app chats. This news is truly horrific. People don't seem to understand the gravity of the situation. There is even talk of entire chips already pre-installed in the hardware of new phones, so it is impossible to escape. Similar to the Chinese communist model of mass espionage, People need to wake up. The enemy wants to implement its agenda now that it is collapsing, and it will not go away without a fight!

And guess what? There are many more EU members who support this crap than there are who oppose it, which means that it now seems only a matter of time before we find ourselves in a giant “George Orwell's 1984.”

We are talking about an official regulation aimed at preventing and combating online child sexual abuse. First launched in May 2022 by Commissioner Ylva Johansson, it aims to oblige platforms such as WhatsApp, Signal, and Telegram to automatically scan users' messages for CSAM material and suspicious grooming behavior. Many experts and leading privacy organizations are sounding the alarm: the technology is not foolproof and risks generating millions of false positives per day, i.e., innocent messages interpreted as suspicious. Some European governments even report error rates of up to 80% in certain investigations.

At this point, I wouldn't be surprised if they try to introduce backdoors into Linux systems in the future, as the NSA already has them in Windows and Mac.

monitoring.pnghttps://fightchatcontrol.eu/

 
Linux is open-source, so if any backdoors were put into it, they would be found and it would be known quickly that there is a backdoor in it, so people would stop using it or patch it or change to a different version. That's what open-source means - anyone, including you - can check the programming code and see what's in it and what it does. That's not to say hardware (the physical components of the phone or computer) can't contain backdoors, though, and the same with apps that others make, which can also contain backdoors. One would have to use Linux's own repositories and visit forums and websites which deal with programming, to keep up-to-date with knowledge and to keep safe. For hardware, that might be more difficult, so there'd have to be somthing like... a Linux Hardware division (or Linux Hardware Division, with a capital D, for an example name) who actually manufacture safe and open-source hardware.

There are some small projects doing open-source (as I'm calling it) hardware, such as (from ChatGPT) -
  • Purism (Librem laptops/phones) – open firmware, hardware kill switches for mic/cam, PureOS.
  • Pine64 (PinePhone, PineBook) – community-driven open hardware, though not all firmware is blob-free.
  • Framework Laptop – modular design, parts transparency, and repairability, though it’s not 100% open-source firmware yet.
The challenge is that completely open hardware is expensive to develop and harder to mass-produce than open-source software. It also runs into the problem of sourcing chips — most are made by a small number of fabs, and those fabs can be pressured to insert backdoors.

That’s why a “Linux Hardware Division” would have to not just design the boards, but also either control or tightly audit the chip fabrication process — otherwise the openness stops at the PCB level.


PCB is printed circuit board. So it's not entirely impossible, but can be difficult. Like I said recently, you own... not enough to be able to have enough power. Own more stuff, have more power. It's a materialistic World, but at least we have Spirituality to use, which will overtake if people don't be lazy - again as I said recently, laziness is expensive; we can raise Energies free! That doesn't cost!
 
Thanks OP and @FancyMancy to talk about this absolutely crucial topic.

In case this shit is voted, we eventually will have to encrypt our messages ourselves. Mental outlaw made a great tutorial on Kleopatra :
 
I mean, sexual assault and pedophilia are tragic but why wouldn't people find it suspicious for governments to implement very invasive control methods for solving the issue?
When I entered the Linux rabbithole, I was this annoying privacy guy. I was saying to my friends things like "google/the government know wich porn you are watching ! It doesn't scare you ?"

I quickly gave up. Normies doesn't give a shit about human rights, unless the media tell them to care (because we need a casus belli for a war, for example).
 
Thanks OP and @FancyMancy to talk about this absolutely crucial topic.

In case this shit is voted, we eventually will have to encrypt our messages ourselves. Mental outlaw made a great tutorial on Kleopatra :

They would probably be able to log what you write on your keyboard, analyzing these with AI you are just putting more suspicion on yourself by sending these pgp encrypted messages.
 
If you know all the ip adress they will use for this surveillance and if you block them using a DNS server I think that should work.
 
They would probably be able to log what you write on your keyboard, analyzing these with AI you are just putting more suspicion on yourself by sending these pgp encrypted messages.
Key-loggers do exist. They can record what keys are pressed and also mouse movements and clicks, and even see what's on the clipboard, capture screenshots, and see webcam input. There are hardware ones and software ones.
 
If you know all the ip adress they will use for this surveillance and if you block them using a DNS server I think that should work.
Things like PeerGuardian, which is defunct now, apparently could block IP addresses and ranges, but I read somewhere that they weren't as good as one might hope. I don't know for certain, but it seems probable that they could block advert servers, as well, which must be similar to what advert blockers do in web browsers.
 
Thanks OP and @FancyMancy to talk about this absolutely crucial topic.

In case this shit is voted, we eventually will have to encrypt our messages ourselves. Mental outlaw made a great tutorial on Kleopatra :
No problem. As AFODO said, you'd make yourself more interesting if you encrypt things. Since (((they))) are trying to get coders and companies to put backdoors into things, then encrypting messages with PGP or anything else would not work, since it would be recorded before it's encrypted, so there'd have to be another way around that, or to block that.
 
....why wouldn't people find it suspicious for governments to implement very invasive control methods....
This... I'm trying not to be a dick about it but I think it's at least partially inseparable from being straight forward. The average person is so fucking stupid and/or incapable of actual conscious thought it's sickening, and terrifying.
Things that to us are as instantly and effortlessly obvious as the glaring Sun, are beyond what many are capable of understanding. Others are blinded by indoctrination, fears, other things.
Wlim
 
This... I'm trying not to be a dick about it but I think it's at least partially inseparable from being straight forward. The average person is so fucking stupid and/or incapable of actual conscious thought it's sickening, and terrifying.
Things that to us are as instantly and effortlessly obvious as the glaring Sun, are beyond what many are capable of understanding. Others are blinded by indoctrination, fears, other things.
Wlim
(Sorry, my screen is cracked, triggered the post button accidently.)

I used to feel that things were hopeless due to this, the masses. If most people will go one way that's the way things will go.

But now it's clear that those steering things here - the enemy - will push for the way they want regardless of the masses. And this will only assist their undoing, as has already begun.
There's no need to worry, really, except to remember that we must help show those who can be awakened.

I've seen online, previously "hopeless" populations of seemingly braindead puppets are now vehemently spamming "anti-Semitic" remarks. IE THE TRUTH.

I know it can feel maddening, it can feel deeply, painfully infuriating and frustrating, to put it mildly, looking at the state of the world and Humanity. They look like lemmings enthusiastically charging the cliff's edge and a fall too far to ever recover from.

But all of this happening now, the extremes of degeneration and stupidity and all the absolute insanity taking place, will lead to positive change. People have fallen to the point where it's going to take some truly crazy and probably horrible shit to shake them awake and get Humanity rectifying itself.
The worse things get, the more blatant the situation will be until it cannot be ignored and will not be allowed to continue.

Help those who will hear, ignore the rest, and stay positive knowing the Gods are real and will have their way eventually.

I don't know if you needed any of this as much as I needed to write it, to be honest.
This has been a hard subject for me and some of this I've only very recently realised. Hopefully this will be helpful to others and more than just venting.
You beautiful people here are the only one who understand.

The Gods are SO far above us, nevermind the masses. Just do as They instruct, strive for Them, fight to become what you can. Those of us who can will help ensure the absolute fact - THE WILL OF THE GODS WILL BE DONE.
Their will be a new and everlasting Golden Age.
 


spyware.png



I had thought about creating a new post on Israeli spyware, but I think this is the perfect place:



https://www.nsogroup.com/ (Their website)
https://paragonsolutions.io/ (Their website)



The cybersecurity landscape has been profoundly affected by the emergence of sophisticated surveillance tools, including the spyware programs “Paragon” and “Pegasus.” Developed by Israeli companies, these software programs have raised global concerns about privacy and data security. Let's take an in-depth look at the technical characteristics of these spyware programs: the vulnerabilities they exploit, such as 0-click and 0-day exploits, and the ethical and legal implications of their use.

“Pe
pegasus.png
gasus,” developed by the NSO Group, is a highly sophisticated spyware designed to infiltrate mobile devices, particularly those running iOS and Android operating systems. Its ability to operate invisibly allows attackers to access a wide range of data, including messages, emails, audio and video recordings, and even control the device's camera and microphone. One of the most disturbing aspects of “Pegasus” is its ability to exploit 0-click vulnerabilities. These exploits allow the device to be infected without any interaction from the victim, making detection and defense extremely difficult. For example, a 0-click attack can occur through a simple SMS message or phone call, exploiting vulnerabilities in communication protocols or messaging applications.

A quick note: It seems that recently in my country, there has been much more talk about this, and the scandals that follow have finally come to light. I think FRTRs are really having a huge impact on the entire planet.

spyware (1).png
Well, now let's discuss “Paragon,” another spyware developed by an Israeli company, known for its advanced surveillance capabilities. Although less well-known than “Pegasus,” “Paragon” offers similar functionality, allowing remote access to users' sensitive data. Its architecture is designed to evade security systems and operate stealthily, making it difficult to detect. Unlike 0-click exploits, 0-day exploits are vulnerabilities unknown to developers. These exploits can be used to compromise systems before a corrective patch is released. Spyware has been shown to effectively exploit such vulnerabilities, allowing attackers to gain unauthorized access to users' devices and data. It seems that this software is more devious, trying to appear as if it is somewhat more legitimate software when in reality it is still the same crap.

___________________________________________________________________________________

exploit.png
Now, a zero-day exploit is a security vulnerability in software or an operating system that is unknown to the software vendor and, as a result, has not yet been fixed. The term “0-day” refers to the fact that developers have “zero days” to fix the problem before it is exploited by attackers. These exploits can be used to compromise the security of a system, allowing unauthorized access, data theft, or malware installation. In my opinion, these are the most powerful cyber weapons that exist, because they bypass everything; there are flaws everywhere, in antimalware, firewalls, etc. Just look at the Eternalblue exploit used by the Wannacry ransomware, which caused enormous damage around the globe, or Log4j (Log4Shell), the vulnerability discovered in December 2021 (CVE-2021-44228) that was extremely easy to exploit and allowed remote code execution (RCE) through the log functionality.
By exploiting a dynamic variable search mechanism, an attacker could send a string containing a specific syntax to Log4j, which would then attempt to resolve and load a malicious URL, executing arbitrary code. This would have allowed hackers to compromise vulnerable systems very easily. Log4j is an open-source library for logging in Java applications and is part of the Apache project, and guess what? Minecraft was also vulnerable. All you had to do was log on to a server, and a malicious actor could use this flaw to penetrate the computer systems of all users, causing devastating damage. I think the serious danger of 0day exploits is now clear.

How a 0-day exploit works:

- Vulnerability identification: Attackers or security researchers discover a vulnerability in the software. This vulnerability may result from programming errors, misconfigurations, or gaps in security controls.

- Exploit development: Once the vulnerability has been identified, attackers develop an exploit, which is a piece of code or a program designed to take advantage of the vulnerability. This exploit can take many forms, such as an executable file, a script, or a data packet.

-Exploit Distribution: Attackers distribute the exploit through various channels, such as phishing emails, compromised websites, or peer-to-peer networks. The goal is to trick victims into executing the exploit, often without them realizing it.

- System Compromise: When the victim executes the exploit, the malicious code is executed, allowing the attacker to gain access to the system. This can lead to a number of consequences, such as the theft of sensitive data, the installation of spyware or ransomware, or remote control of the device.

___________________________________________________________________________________


After discussing the Exploit section, I would like to discuss the last section on espionage, namely SimJacking:

sim.png
SimJacking, also known as SIM swapping, is a cyberattack technique that allows a malicious actor to gain control of a mobile phone number by manipulating the associated SIM card. This type of attack has gained notoriety in recent years, particularly for its use in identity theft and unauthorized access to bank accounts and online profiles. The growing dependence on mobile devices and SMS-based services has made SimJacking a significant threat to cybersecurity.

SimJacking relies on a series of strategic steps that allow the attacker to gain control of the victim's SIM card. Below are the typical steps involved in a SimJacking attack:

- Information Gathering: The attacker begins by gathering personal information about the victim, such as their name, address, phone number, date of birth, and account details. This information can be obtained through social engineering techniques, phishing, or data breaches.

- Contacting the Service Provider: Once the necessary information has been gathered, the attacker contacts the victim's phone service provider, pretending to be the victim. Using the information gathered, the attacker can convince the customer service representative to transfer the victim's phone number to a new SIM card, which the attacker controls.

- Activation of the New SIM: If the attacker is successful, the provider activates the new SIM card and deactivates the original one. At this point, all communications, including SMS messages and calls, are redirected to the attacker's device.

- Access to Accounts and Services: With control of the phone number, the attacker can now access various online services that use two-factor authentication (2FA) via SMS. This includes bank accounts, email, social media, and other sensitive platforms. The attacker can receive verification codes sent via SMS and access the victim's accounts.


The consequences of SimJacking can be devastating. Attackers can:

- Identity theft: By accessing sensitive information, attackers can impersonate the victim and commit fraudulent acts, such as opening bank accounts or applying for loans in the victim's name.
- Access to Financial Accounts: With control of the phone number, attackers can access online bank accounts, transfer funds, and compromise the victim's financial security.
- Privacy Violation: Access to social media profiles and emails can lead to the disclosure of personal and confidential information, with potential damage to the victim's reputation.

_________________________________________________________________________________________________________

Still on the subject of telephony and SIM attacks, one of the most dangerous is the “SS7 Attack.”

source-2524786021.gif
Signaling System No. 7 (SS7) is a communication protocol used by telephone networks to manage calls and messages. It is essential for managing communications between different network operators and for user authentication. However, the SS7 protocol has vulnerabilities that can be exploited by malicious attackers (and yes, the SIM has a small operating system separate from the main system, so anyone who manages to infect the SIM could access the device regardless of the operating system used).


How an SS7 attack works:

- Access to the SS7 Network: Attackers must first gain access to the SS7 network. This can be done through various means, such as purchasing access from telecommunications operators or using hacking tools.
- Interception of Communications: Once inside the SS7 network, the attacker can send requests to intercept the victim's communications. This includes the ability to receive SMS messages, calls, and even redirect communications to a device controlled by the attacker.
- Access to Services: With access to the victim's communications, the attacker can obtain verification codes sent via SMS for two-factor authentication, allowing access to bank accounts, email, and other sensitive services.


Differences between SS7 Attack and SimJacking:

- Method of Attack: While SimJacking requires the attacker to directly manipulate the service provider to gain control of the SIM card, the SS7 attack exploits vulnerabilities in the signaling protocol to intercept communications without the need to physically access the SIM.
- Objective: SimJacking aims to gain control of the SIM card to redirect communications, while SS7 attacks focus on intercepting existing communications.

_________________________________________________________________________________________________________
 
I also wanted to create another separate post for an even more subtle method of espionage used by intelligence agencies and even private entities. With the advancement of technology, espionage techniques have evolved in ways that were unthinkable just a few decades ago.

microphone.png

Microphones Hidden in Electrical Outlets:
One of the most common and least invasive methods of espionage is the use of hidden microphones. These devices can be inserted into electrical outlets, making them virtually invisible. Microphones hidden in electrical outlets work by picking up sound vibrations through the electrical cable and converting them into audio signals that can be transmitted to a remote receiver.

How It Works:
Installation: The microphone is inserted into the electrical outlet, often replacing an existing outlet with one that contains the spying device.
Sound Capture: The microphone captures sound vibrations through the electrical cable and converts them into electrical signals.
Transmission: The electrical signals are then transmitted to a remote receiver via radio waves or Bluetooth.
Reception: The receiver decodes the signals and converts them back into audio, allowing the operator to listen to conversations.

eeee.gif

Microphones Hidden in Telephone Cables:
Another common method is the use of microphones hidden in telephone cables. These devices can be inserted directly into the telephone cable, allowing telephone conversations to be intercepted.

How It Works:
Installation: The microphone is inserted into the telephone cable, often by cutting the cable and connecting the device in series.
Sound Capture: The microphone captures sound vibrations through the telephone cable and converts them into electrical signals.
Transmission: The electrical signals are then transmitted to a remote receiver via radio waves or Bluetooth.
Reception: The receiver decodes the signals and converts them back into audio, allowing the operator to listen to the conversations.

Tower_Animation_1.gif

3D Mapping Using Radio Waves:
One of the most advanced espionage technologies is 3D mapping using radio waves. This technique allows you to create a three-dimensional map of the interior of a structure without physically entering the building.

How It Works:
Radio Wave Emission: A device emits high-frequency radio waves toward the target building.
Wave Reflection: The radio waves bounce off the interior surfaces of the building and return to the device.
Signal Analysis: The device analyzes the reflected signals to determine the distance and position of the interior surfaces.
3D Map Creation: Using advanced algorithms, the device creates a three-dimensional map of the interior of the building.

x-ray.png

X-ray cameras:
X-ray cameras are one of the most advanced and invasive espionage technologies. These cameras can see through walls and create detailed images of the interior of a structure.

How it works:
X-ray emission: A device emits X-rays toward the target building.
X-ray Absorption: The X-rays are absorbed by the internal structures of the building in different ways depending on the material.
Image Capture: A sensor captures the images reflected by the X-rays.
Image Creation: Using advanced algorithms, the device creates detailed images of the interior of the building.
 

Attachments

  • audio-wave-5692234-4798534.gif
    audio-wave-5692234-4798534.gif
    1.5 MB · Views: 3
View attachment 8119The feared reality seems to be getting closer and closer. I think you've heard about “ChatControl” lately. It's a horrible mass surveillance system, a hardware backdoor, a chip that could be pre-installed on devices in the European Union to obtain data before it is encrypted so that governments, secret services, etc. can spy on end-to-end encrypted messaging app chats. This news is truly horrific. People don't seem to understand the gravity of the situation. There is even talk of entire chips already pre-installed in the hardware of new phones, so it is impossible to escape. Similar to the Chinese communist model of mass espionage, People need to wake up. The enemy wants to implement its agenda now that it is collapsing, and it will not go away without a fight!

And guess what? There are many more EU members who support this crap than there are who oppose it, which means that it now seems only a matter of time before we find ourselves in a giant “George Orwell's 1984.”

We are talking about an official regulation aimed at preventing and combating online child sexual abuse. First launched in May 2022 by Commissioner Ylva Johansson, it aims to oblige platforms such as WhatsApp, Signal, and Telegram to automatically scan users' messages for CSAM material and suspicious grooming behavior. Many experts and leading privacy organizations are sounding the alarm: the technology is not foolproof and risks generating millions of false positives per day, i.e., innocent messages interpreted as suspicious. Some European governments even report error rates of up to 80% in certain investigations.

At this point, I wouldn't be surprised if they try to introduce backdoors into Linux systems in the future, as the NSA already has them in Windows and Mac.

View attachment 8120https://fightchatcontrol.eu/

Well, this is a serious matter. Although, if it is used right AND they can destroy the csam sickos and groomers, I am all for it. I am tired of hearing news stories about a worthless pos molesting a child. It always disgusts and saddens me.

With that said, I do not like the idea of them knowing all of my likes, dislikes, religious affilliation, energy practices, tech I am building, or any thing else like that. So in the end I am torn, as I am sure many others are as to how we can handle this.

I think one law we could implement is public torture and execution for any child molester (15 and under) over the age of 20, caught in the act... but that is just me.
 
@չ∂αяквℓσω, can you format posts properly, instead of making it difficult to read? It's disruptive. This is not Piczo.
 
It is very easy to read-easier than your posts. So it is a subjective issue.
It's nice to be told when I'm doing badly and wasting my time, such as in the thread I made on exactly that topic. Thanks.
 
It's nice to be told when I'm doing badly and wasting my time, such as in the thread I made on exactly that topic. Thanks.
That is my opinion, and only about your particular style. Other opinions exist. Whatever you do, continue to do despite what I say.
 

Al Jilwah: Chapter IV

"It is my desire that all my followers unite in a bond of unity, lest those who are without prevail against them." - Shaitan

Back
Top