Jump to content

So I know we're not supposed to talk politics - Presidential Election - Poll


pakisho
 Share

Presidential Election  

166 members have voted

  1. 1. Who do you support?

    • Hillary Clinton
      29
    • Donald Trump
      129
    • Gary Johnson
      7
    • Jill Stein
      1


Recommended Posts

Pfft...

 

“Anyone who would reveal the existence of a wiretap would violate federal law,” he said. “It is against federal law to disclose the existence of a wiretap, whether that wiretap is for criminal purposes or intelligence purposes.”

Share this post


Link to post
Share on other sites

  • Replies 4.4k
  • Created
  • Last Reply

Top Posters In This Topic

No one works harder than trump

 

Actually, there probably is a lot of truth to that statement. That is one of the reasons he is so successful. People can knock his business acumen and all that all they want, but at the end of the day, he is the one flying around in giant private jets and helicopters, building huge resorts and staying at them, travelling all over the place, and living the grand life, and who didn't get brought down by the crisis of '08. During the campaign, he showed he is a tireless worker.

 

The problem is the particular things he likes to work on. We don't know though if his Twittering means he is not working on the things important for the country. He might do both at the same time. Also, be careful what you wish for. If you don't like his policies, him working hard may not be what you want.

Share this post


Link to post
Share on other sites

Oh jfc

 

If you are going to give opinions on things, do not be surprised when other people give responses.

Share this post


Link to post
Share on other sites

AND ITS BEN CARSON OFF THE TOP ROPE WITH THE QUOTE OF A GODDAMN LIFETIME!!!!

 

 

:lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2:

Share this post


Link to post
Share on other sites

AND ITS BEN CARSON OFF THE TOP ROPE WITH THE QUOTE OF A GODDAMN LIFETIME!!!!

 

 

:lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2::lol2:

I dont think Ive ever facepalmed any harder.

Share this post


Link to post
Share on other sites

Oh snap.

 

WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

https://www.nytimes.com/2017/03/07/world/eu...cking.html?_r=0

 

WASHINGTON — WikiLeaks on Tuesday released thousands of documents that it said described sophisticated software tools used by the Central Intelligence Agency to break into smartphones, computers and even Internet-connected televisions.

 

 

Part of me hopes they (CIA) have more tricks up their sleeve, the other part of me wonders how little privacy we actually have in this digital world. We are inching closer to that Orwellian state.

Share this post


Link to post
Share on other sites

Privacy died with the internet and mobile phones. And the camera in your ceiling. I see you looking at it. Stop. Stop, looking at it.

Share this post


Link to post
Share on other sites

That plus debit cards and credit cards, grocery store points cards.. they can monitor your spending habits, where you are what you eat.. Pretty crazy shit.. Also with a lot of the digital controls on cars.. onstar and such.

Share this post


Link to post
Share on other sites

Direct Link to info on Wikileaks site:

https://wikileaks.org/ciav7p1/cms/index.html

Here is what we know so far.

Obama told the American people that the government would no longer hide zero day exploits from manufacturers and claimed to have set up a Vulnerabilities Equities Process to review them. We now know that either the CIA misled Obama, or Obama misled the American people.

US tech companies lobbied extensively to prevent this, as it hurts their ability to sell their products.

The CIA has hundreds of zero day exploits and can hack any smart tv, android phone, iphone, or router, and possibly self driving cars as well.

The CIA has been using the State Department consulate in Frankfurt Germany as a headquarters for hackers in Europe, the Middle East, and Africa.

The CIA has been collecting a library of attack techniques from malware produced in other states, including Russia. The CIA has the ability to use this library to misdirect attribution of hacks by leaving behind the "fingerprints" of stolen malware.

Edit to add update:

Per Ed Snowden, this leak confirms the US government has been paying to make US software unsafe. They share these exploits with governments known to spy on journalists and human rights groups.

Share this post


Link to post
Share on other sites

"Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive"

Share this post


Link to post
Share on other sites

Project Umbrage allows the CIA to hack and leave behind the fingerprint of somebody else. How can we believe investigators that claim to know who is responsible for a cyber attack given project UMBRAGE? But but but remember it was the Russians doing the hacking...

"

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from."

Share this post


Link to post
Share on other sites

UMBRAGE The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Share this post


Link to post
Share on other sites

In summary is it safe to say when cranking one watching porn hub on your laptop you should put a piece of tape over your camera?

Share this post


Link to post
Share on other sites

In summary is it safe to say when cranking one watching porn hub on your laptop you should put a piece of tape over your camera?

Yes but they can still listen.. and The CIA analyst listening in May be into that :eek3dance:

Share this post


Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share


×
×
  • Create New...