/tech/ - Technology

Technology & Computing


New Reply
Name
×
Sage
Subject
Message
Files Max 5 files32MB total
Tegaki
Password
[New Reply]


jefferson-santos-9SoCnyQmkzI-unsplash.jpg
[Hide] (17.2KB, 640x427)
There is a criminal organization in Brazil using NSO Group's Pegasus to infect devices for hack for hire, to incite terrorism, blackmail people, produce illegal pornography and assist in assassinations. They also have other advanced malware, like UEFI implants and even persistent implants for Kindle and Raspberry Pi. Plus face/voice recognition on every camera and microphone they can get into, in public or private places.

Brazil won't do anything to stop them. Only the FBI, CIA and NSA can stop them.

There is also the possibility that they were engaged on the hack of Bezos' smartphone.

If you know of any security researcher who wants to reverse engineer the exploits they are using, I am more than willing to help them.

If you want a story about how they operate, I am willing to work with you to expose them.
>>1357 (OP) 
Hue hue hue.
But otherwise no I live on the polar opposide of the planet.
There's a massive global conspiracy going on in my bedroom that will compromise all of your internets.
Source: my ass.
Replies: >>1366
>>1357 (OP) 
If the criminal organization can use those technologies, they are part of (((them))).
Everyone knows non-free hardware and software is filled to the brim with ring-3 backdoors. All "cloud" computing, mainstream services are used for and designed to manipulate population. This massive power or simply b0tn3t (bot avoidance), is controlled by (((them))). None of this is conspiracy, look up who are the CEOs of FAGMAN, "is Google listening all the time". And you claim a Brazil criminal organization stole such power from the power holders? Not buying it.
At most, they are just another throw away unit for (((their))) operations.
Replies: >>1430 >>2023
a3a7c9dd330aec06daa2c79800d6d4f7614ba383195d8748f7367970cd1bdbc8.png
[Hide] (185.6KB, 350x300)
>>1359
That sounds heckin scary, anon, you must stop this!
Replies: >>1367
>>1366
If he shat himself so much on his bed, that will compromise global Internet, he should really stop it.
I doubt he is in control though.
>>1365
The more you spazz out clown words the more you lose your credibility.
Replies: >>1431
>>1430
>credibility
>anonymous image board
Doesn't make it any less true.
Replies: >>1451
>>1431
<Anonymous
Yeah you're retarded. You're pseudonymous not Anonimoose.
Replies: >>1453 >>1540
>>1451
What is his pseudonym?
Replies: >>1499
>>1357 (OP) 
Take your meds, schizo.
>>1453
Ask the mod about her/his IP address.
Replies: >>1503 >>2038
>>1499
Ever heard of Tor or dynamic IP?
>>1451
google.com/search?q=There+is+no+anonymity+on+the+Internet.
google.com/search?q=W+internecie+nikt+nie+jest+anonimowy.
ogey.
Which article was it?
Replies: >>1543
>>1540
>using (((google)))
>searching about anonymity on it
>>1357 (OP) 
I want to know how to join them, please advise.
>>1357 (OP) 
based brazilians showing the burger hegemony who is boss
Only use a thinkpad with Tor behind starbucks. Not suspicious at all.
(PNG_Image,_260_×_362_pixels).png
[Hide] (28.7KB, 260x362)
>>1365
Not OP but there's already dead journalists in Turkey I heard and probably related to the same backdoor that got leaked (intentional or accidental).
>>1357 (OP) 
Pegasus from public sources is said to be known to work on mobile devices and it's likely that they target popular devices since the disparity makes it a headache for backdoor writers.
The thing to avoid is borders, where they can check your phone which they can then use the timing to image your phone and/or install a modified TWRP recovery partition to exfiltrate everything and/or have it install a backdoor next boot. The process should take less than 20 minutes.
This is in my theory but this checks out with the information out there and should be true (a hacker's theory).
And in theory, again, your phone should feel like it is booting up from factory reset like pic related which means it has been compromised. I would advice you to stop using that phone and reformat the partitions but assume they already have most of your files. Using personal FOSS cloud is better if you're a journalist, and avoid SSL_strip when accessing your own cloud/servers.
Replies: >>2039
>>1499
JSchan doesn't actually give IPs, just IP hashes.
>>2023
I would assume the harder it is for a phone to root, the harder it would be for them to do anything with it. I had a Galaxy S4 that was fairly easy to install TWRP on and root (it could've taken a much shorter time but it was my first time doing it), now I have an LG V20 that took two full days to root and required using both Windows-based community tools and a custom-made Linux distro to flash a different firmware version. I can't even remember the last time I saw someone else using an LG phone so I should be good anyways implying I'm ever going to leave the country or even the state anytime soon
Replies: >>2040 >>2048
>>2039
>implying they have hands on official rooter
Vendor's repair department have their "recovery"(ring 0/jtag access) tools. Some phone hacking services have already figured it out and are selling them.
>octopus box
>miracle box
https://forum.gsmhosting.com/vbb/f606/how-root-manual-biggest-collection-gsmhosting-1872718/#post10637865
Replies: >>2048
>>2039
Journalists should either use those secure HTCs or Sony.
>LG V20
There is an official TWRP image so it might be included, the hard part is usually only unlocking the provider lock but LG isn't that great.
>>2040
There's also a possibility of shortening unlock wait times by using hydratool server.
At that point, the best measure would be putting tamer resistant tape, and unironically destroying your microUSB port if you have removable batteries, or using a tampered charging-only microUSB board. Maybe a sound alarm when it detects data transmission might work too or a phone case with sound alarm, but there's no stopping them from just confiscating it.
10.jpg
[Hide] (22.5KB, 500x389)
Did you finally lose it anon?
It's ok, Anon.
These criminal organizations are in bed with local government, or rather, they ARE an unofficial branch of the local rule. Every backwater shithole like Brazil has its own arm of technological pseudo-intelligence engaging in similar behavior (it should also be noted a good deal of them are led by CIA plants, themselves Mossad plants, etc.)
"Misuse", though? Come on, really? lol
Replies: >>9220
>>9217
>>9217
 
Thats a little creepy when you think about how far of a reach certain countries have. Does the same think happen in European countries too? Mainly Northern, Western, Scandinavian, etc..? It never gets this far from what I have read, unless im missing something. Serious question anon
Replies: >>9260
>>9220
Organized crime is always conjoint with governments. It's ultimately about power. Wasn't there a scandal about human trafficking and pedo rings in Europe not too long ago? What do you think is the backbone of those operations? It sure is gets creepy to think about, but it's pretty much an open secret at this point.
[New Reply]
27 replies | 4 files
Connecting...
Show Post Actions

Actions:

Captcha:

Select the solid/filled icons
- news - rules - faq -
jschan 1.4.1