[ / / / / / / / / / / / / / ] [ dir / random / abdl / cute / cuteboys / cyber / femdom / hnt / komica / x ]

/pnd/ - Politics, News, Debate

and shitslinging
Email
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
dicesidesmodifier

Allowed file types:jpg, jpeg, gif, png, webp, webm, mp4, mov, swf, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


Rules Log Spot Those Who Glow Protect Yourself
I can't believe Martha hates niggers

File: e146cf6d515eefe⋯.jpg (34.55 KB, 620x506, 310:253, CIA_Can_Hack_Track_Windows….jpg)

a1b189  No.351746

CIA Can Hack, Track Windows Devices Via WiFi

RELATED: >>>/realnews/2003 (https://archive.fo/hXjld)

New documents released on Wednesday as part of WikiLeaks' series of CIA hacking revelations detail a method the agency uses to geolocate computers and the people using them. The agency infects target devices with malware that can then check which public Wi-Fi networks a given computer can connect to at a given moment, as well as the signal strengths of those networks. From there, the malware compares the list of available Wi-Fi options to databases of public Wi-Fi networks to figure out roughly where the device is.

The leaked documents detailing the project, which is known as ELSA, date back to 2013, and specifically address laptops and PCs running Windows 7. But experts say that the technique is straightforward enough that the CIA could have a version of it for every Windows release.

"This technique has been done and known about for a long time," says Alex McGeorge, the head of threat intelligence at the security firm Immunity. “It’s like give me all the information from the radios on your [device] to try to get a better fix on your location.”

ELSA only works on Wi-Fi-enabled workstations, but that’s … pretty much everything at this point. The specific process involves installing malware on a target computer, using that to access the victim device’s Wi-Fi sensor to check for nearby public Wi-Fi points, logging each one’s MAC address and Extended Service Set Identifier (the fingerprints of a Wi-Fi network), and then checking those identifiers against publicly available Wi-Fi databases maintained by Google and Microsoft. By combining this location data with signal strength readings, the malware can calculate the device’s approximate longitude and latitude at a given time. It then encrypts this data and stores it until a CIA agent can work to exfiltrate it. ELSA also includes a removal process so the CIA can cover its tracks.

https://archive.fo/WCJuA

ELSA was initially created in 2012, according to a 2013 user manual obtained by WikiLeaks. The manual is marked as ‘secret, noforn’ - meaning it’s not to be shared with other countries.

When the target device is connected to the internet, ELSA attempts to use public geolocation databases from Google or Microsoft to track the device’s location, and stores the longitude, latitude and timestamp in encrypted form on the device for the CIA to extract at a later time.

ELSA was developed by the Engineer Development Group (EDG), the division that manufactures the CIA’s hacking tools. The EDG is part of the Center for Cyber Intelligence (CCI).

ELSA is designed to be injected into an existing process on a device’s system. “It’s delivered in the form of a DLL,” the manual reads. A Windows DLL (Dynamic Link Library) is a library of code and data that can be used by more than one program at the same time. It helps operating systems and programs run faster and use less space.

ELSA also uses a configuration tool (patcher) and post processor. It uses the command-line tool, Microsoft Windows RegSvr32, to perform the installation.

https://archive.fo/9Mgwo

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

22b8b2  No.351756

>>351746

>ELSA only works on Wi-Fi-enabled workstations, but that’s … pretty much everything at this point.

Glad I made my household ethernet-only. My family doesn't like it, well fuck those niggers

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

7589de  No.351761

>>351756

LOL @YOURHOUSEHOLD…

it's NOT yours….. It's your daughter's….

AND YOU'VE GOT NO RIGHT TO TELL HER OR HER HUSBAND WHAT THEY CAN OR CANNOT DO IN THEIR OWN HOUSE…

go try that at the Salvation Army

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

7589de  No.351762

File: 92096398250687c⋯.jpg (285.85 KB, 1257x1080, 419:360, Picsart_22_09_02_16_42_46_….jpg)

Basically, your daughter is now your mother…

and like a 6 year old, you want to rebel and pretend you're the boss

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

7589de  No.351763

File: 5ff5095fc823d8b⋯.jpg (263.48 KB, 1638x1080, 91:60, Picsart_22_09_02_16_53_01_….jpg)

after literally destroying your daughter's childhood with your Fake Jesus, Alcoholism and Paranoid Schizophrenia… you had the audacity to come begging her to let you mooch off her and her husband…

That effectively made HER THE PARENT

and you became an ungrateful child

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aa9482  No.351764

File: b366a947f90a647⋯.jpg (280.48 KB, 1080x1528, 135:191, Picsart_22_09_02_17_05_30_….jpg)

…. I'm certain your daughter has contemplated purchasing you the new badass ETHERNET LEAPFROG…..

But obviously that would be a waste of money, because she will have no need for a shitty LEAPFROG after October 24th…

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1e5a40  No.351805

>Windows users are suckers

t. Stallman

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]

[ / / / / / / / / / / / / / ] [ dir / random / abdl / cute / cuteboys / cyber / femdom / hnt / komica / x ]