Advertisement
Guest User

Untitled

a guest
Jun 19th, 2019
170
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.23 KB | None | 0 0
  1. 2 year study found obvious global loss of privacy..
  2. First observation of logs...
  3.  
  4. Hacks and privacy leaks found:
  5.  
  6. If you use windows search harddrive for:
  7. Under c:\windows and subdirs
  8. Panther
  9. Oobe
  10. *8wekyb3b8bbwe*
  11. AppX
  12.  
  13. Or run cmd and run command: net user
  14.  
  15. If you see:
  16. DefaultAccount
  17. WDAGUtilityAccount
  18. Guest
  19.  
  20. Disable those accounts, change all passwords, check your bank activity
  21.  
  22. More tips..
  23. If you use any Apple android or Microsoft OS (and unix/linux if you arent highly trained in security)
  24. Every security leak made public such as windows powershell oobe/root over take, has either taken months to be announced and is "fixed" then replaced with a new backdoor put in its place.
  25.  
  26. Programmers are paid to implant these over the past few years so personal computers and devices can be used to mine cryptocurrencies. This started happening when popups and ads were linked to malware/adware and eventually hackers needed a new way to gain income. So dont expect your computer to be slow or wait to see popups to find out if youve been hacked.
  27.  
  28. Apple and android apps that have ads or claim to give you money for using them are NOT FREE. Do not be stupid. The world hasnt suddenly become a place without greed.
  29.  
  30. WIFI AND BLUETOOTH ARE FAR FROM HAVING ANY SECURITY
  31.  
  32. Code and decompiled apps show that hackers still use old methods to break in to old operating systems and even still (and easily) listen in on everything dial up connections even.
  33.  
  34. Android Apple and Microsoft still advertise that adding login methods such as fingerprint or facial recognition are secure and would detour any breach of privacy. This is 100% false.
  35.  
  36. Why we believe these companies are to blame:
  37. Scripts(code) and tools to break into unreleased apps by these companies have already been found. LTE5 and other technologies already have ways to breach implemented and readty to be used by the same viruses/bugs we found.
  38. Ex-employees of all of these companies have been found working for suspicious groups and organizations.
  39. Years ago, apple hired a notorious hacker (that was creating jailbreaks for the public too use). Reasons to believe that information is streamed daily from criminals like him to "Sec" or "security" groups.
  40.  
  41. SSL certificates are easily created and used to make any website appear to be secure. The idea that your browser showing a closed 'lock' icon means that you are not in harms way is false.
  42.  
  43. Programs or scripts are run to gather data from phones to let hackers know if the device is being used or approached all the way down to temperature or humidity changes around it.
  44.  
  45. Bluetooth logs show that its possible to identify a vehicle and even the VIN from the vehicle and captured logs also show that newer vehicles are ar risk of being remotely controlled (doors, steering, break systems, audio, integrated communication etc).
  46.  
  47. *****IoT (internet of things) *****
  48.  
  49. IF YOU ARE ABLE TO REMOTELY UNLOCK YOUR HOME OR MONITOR YOUR HOME OR ANY DEVICES
  50. SO ARE HACKERS
  51.  
  52. THE TERM HACKER DOES NOT MEAN SOMEONE WITH YEARS OF EXPERIENCE ARE WATCHING OR CONTROLLING YOU/YOUR DEVICES OR PROPERTY
  53. HACKING IS EASILY DONE BY PEOPLE (KIDS ARE NOT EXEMPT) OF ALL AGES
  54. AN AMATEUR WILL SIMPLY DOWNLOAD AN OS LIKE KALI (AKA BACKTRACK) AND CAN DO A SIMPLE ONLINE SEARCH TO WALK THEM THROUGH HOW TO DO DO ANYTHINT THEY WANT TO DO.
  55. MEANING: THE MAJORITY OF HACKERS ARE DUMB ENOUGH TO NOT JUST "TOY AROUND" AND CAN/WILL USE ANY DESTRUCTIVE TOOLS THEY FIND!!! PAY ATTENTION!!!!! EQUIVALENT OF GIVING A LOADED GUN TO A TODDLER
  56.  
  57. Just because someone signs a contract and are "legally bound" to silence does not mean that they will.
  58.  
  59. We hope anyone that cares about anyone, will share this with others. None of this information was recently discovered. This has been the case for years. We (and anyone that reads this are responsible for making the future a safer place for our kids/family friends and really humanity (if you believe in it) as well as the next generation.
  60.  
  61. Hackers will be pissed that we released this and will surely try to retaliate because all they know and have dedicated their lives to is doing such. The world is not and never will be a paradise but it can remain functional.
  62.  
  63. Ps. You can easily cross reference most of this with a web search.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement