/tech/ - Technology

Technology & Computing

New Reply
Files Max 5 files32MB total
[New Reply]

jefferson-santos-9SoCnyQmkzI-unsplash.jpg (u)
[Hide] (17.2KB, 640x427)
There is a criminal organization in Brazil using NSO Group's Pegasus to infect devices for hack for hire, to incite terrorism, blackmail people, produce illegal pornography and assist in assassinations. They also have other advanced malware, like UEFI implants and even persistent implants for Kindle and Raspberry Pi. Plus face/voice recognition on every camera and microphone they can get into, in public or private places.

Brazil won't do anything to stop them. Only the FBI, CIA and NSA can stop them.

There is also the possibility that they were engaged on the hack of Bezos' smartphone.

If you know of any security researcher who wants to reverse engineer the exploits they are using, I am more than willing to help them.

If you want a story about how they operate, I am willing to work with you to expose them.
>>1357 (OP) 
Hue hue hue.
But otherwise no I live on the polar opposide of the planet.
There's a massive global conspiracy going on in my bedroom that will compromise all of your internets.
Source: my ass.
Replies: >>1366
>>1357 (OP) 
If the criminal organization can use those technologies, they are part of (((them))).
Everyone knows non-free hardware and software is filled to the brim with ring-3 backdoors. All "cloud" computing, mainstream services are used for and designed to manipulate population. This massive power or simply b0tn3t (bot avoidance), is controlled by (((them))). None of this is conspiracy, look up who are the CEOs of FAGMAN, "is Google listening all the time". And you claim a Brazil criminal organization stole such power from the power holders? Not buying it.
At most, they are just another throw away unit for (((their))) operations.
Replies: >>1430 >>2023
a3a7c9dd330aec06daa2c79800d6d4f7614ba383195d8748f7367970cd1bdbc8.png (u)
[Hide] (185.6KB, 350x300)
That sounds heckin scary, anon, you must stop this!
Replies: >>1367
If he shat himself so much on his bed, that will compromise global Internet, he should really stop it.
I doubt he is in control though.
The more you spazz out clown words the more you lose your credibility.
Replies: >>1431
>anonymous image board
Doesn't make it any less true.
Replies: >>1451
Yeah you're retarded. You're pseudonymous not Anonimoose.
Replies: >>1453 >>1540
What is his pseudonym?
Replies: >>1499
>>1357 (OP) 
Take your meds, schizo.
Ask the mod about her/his IP address.
Replies: >>1503 >>2038
Ever heard of Tor or dynamic IP?
Which article was it?
Replies: >>1543
>using (((google)))
>searching about anonymity on it
>>1357 (OP) 
I want to know how to join them, please advise.
>>1357 (OP) 
based brazilians showing the burger hegemony who is boss
Only use a thinkpad with Tor behind starbucks. Not suspicious at all.
(PNG_Image,_260_×_362_pixels).png (u)
[Hide] (28.7KB, 260x362)
Not OP but there's already dead journalists in Turkey I heard and probably related to the same backdoor that got leaked (intentional or accidental).
>>1357 (OP) 
Pegasus from public sources is said to be known to work on mobile devices and it's likely that they target popular devices since the disparity makes it a headache for backdoor writers.
The thing to avoid is borders, where they can check your phone which they can then use the timing to image your phone and/or install a modified TWRP recovery partition to exfiltrate everything and/or have it install a backdoor next boot. The process should take less than 20 minutes.
This is in my theory but this checks out with the information out there and should be true (a hacker's theory).
And in theory, again, your phone should feel like it is booting up from factory reset like pic related which means it has been compromised. I would advice you to stop using that phone and reformat the partitions but assume they already have most of your files. Using personal FOSS cloud is better if you're a journalist, and avoid SSL_strip when accessing your own cloud/servers.
Replies: >>2039
JSchan doesn't actually give IPs, just IP hashes.
I would assume the harder it is for a phone to root, the harder it would be for them to do anything with it. I had a Galaxy S4 that was fairly easy to install TWRP on and root (it could've taken a much shorter time but it was my first time doing it), now I have an LG V20 that took two full days to root and required using both Windows-based community tools and a custom-made Linux distro to flash a different firmware version. I can't even remember the last time I saw someone else using an LG phone so I should be good anyways implying I'm ever going to leave the country or even the state anytime soon
Replies: >>2040 >>2048
>implying they have hands on official rooter
Vendor's repair department have their "recovery"(ring 0/jtag access) tools. Some phone hacking services have already figured it out and are selling them.
>octopus box
>miracle box
Replies: >>2048
Journalists should either use those secure HTCs or Sony.
>LG V20
There is an official TWRP image so it might be included, the hard part is usually only unlocking the provider lock but LG isn't that great.
There's also a possibility of shortening unlock wait times by using hydratool server.
At that point, the best measure would be putting tamer resistant tape, and unironically destroying your microUSB port if you have removable batteries, or using a tampered charging-only microUSB board. Maybe a sound alarm when it detects data transmission might work too or a phone case with sound alarm, but there's no stopping them from just confiscating it.

22 replies | 3 files
Show Post Actions



- news - rules - faq -
jschan 0.1.4