source code

Rum, beer, movies, nice websites, gaming, etc., without interrupting the flow of martial threads.

Re: source code

Postby yeniseri on Thu Feb 19, 2015 11:23 pm

The Iran controller model and xx info. had the equivalent of "if controller xx (model number/makes/yr? is <found> <present> matching the equivalent of the where clause/statement, it was supposed to <malfunction> <not work> while shutting down process to do what it was supposed to do in the first place, and at <failure> send back xx (not sure of this specific action) info or report of action, or the proof of action would be the Iranian authorities public disgust at those who would destroy their nuclear ambitions!

A new revelation by Snowdon is that there are now hidden apps or equivalent in desktops/laptops that would allow for gubment spying (another layer of deceit) and attempts to control those who go against the powers who want to be. It is alleged that non-conformity is soon to become a mental illness! Who wudda thunk? ;D So much for freedom and democracy!
Last edited by yeniseri on Thu Feb 19, 2015 11:24 pm, edited 1 time in total.
When fascism comes to US America, It will be wrapped in the US flag and waving a cross. An astute patriot
yeniseri
Wuji
 
Posts: 3810
Joined: Sat Dec 12, 2009 1:49 pm
Location: USA

Re: source code

Postby windwalker on Thu Feb 19, 2015 11:32 pm

just curios for the techies here

do you feel that different OS's are more or less
secure then others.
Secure Boot Overview

https://technet.microsoft.com/en-us/lib ... 24987.aspx

kinda of amazing how much info, "snowdon" was able to walk away with.
" It’s all in the Form; but only if it is, ALL in the Form."

empty circle taiji
windwalker
Wuji
 
Posts: 10674
Joined: Sun Mar 25, 2012 4:08 am

Re: source code

Postby yeniseri on Fri Feb 20, 2015 8:48 am

WIndows OS, due to high ratio of users vis a vis Linux/Unix and Mac? would be more vulnerable but a targeted exploit, specifically engineered and adapted, can work under all applicable system.
Linus/Unix is only secure because of low user numbers but each person has to secure their system (as best as possible) to mitigate these circumstances.

Snowdon had the access because he was a contractor for a known friend of government! Just like if you are affiliated with ALEC and Heritage Foundation, people will make the assumption that your group American for America, Americans for BS, Americans for Corruption, etc (that's how they name their organizations so they can rip off the citizenry ;D ) so you are IN as far as they are concerned so no problem there, at least that is what they thought!
When fascism comes to US America, It will be wrapped in the US flag and waving a cross. An astute patriot
yeniseri
Wuji
 
Posts: 3810
Joined: Sat Dec 12, 2009 1:49 pm
Location: USA

Re: source code

Postby TrainingDummy on Sun Feb 22, 2015 12:43 am

Dmitri,

The HD hack has been around for awhile. There was a guy demonstrating dropping a tiny Linux partition onto the HD controller after obtaining root on the host box at Black Hat a few years ago.

Here's the POC.

http://spritesmods.com/?art=hddhack&page=1
Last edited by TrainingDummy on Sun Feb 22, 2015 12:43 am, edited 1 time in total.
User avatar
TrainingDummy
Great Old One
 
Posts: 603
Joined: Tue Mar 03, 2009 2:08 pm

Re: source code

Postby Dmitri on Sun Feb 22, 2015 6:09 am

Thanks Garth, interesting read!

I guess that answers my question re. possible delivery mechanisms. At least it appears that those companies didn't have to cooperate with NSA to a point of allowing them access to the hardware they manufacture, or their firmware upgrade process/servers... which is a bit of a relief actually.

Very cool hack though, wow. -bow-
User avatar
Dmitri
Great Old One
 
Posts: 9744
Joined: Fri May 02, 2008 1:04 pm
Location: Atlanta, GA (USA)

Re: source code

Postby windwalker on Wed Feb 25, 2015 8:30 am

Paris (AFP) - European SIM maker Gemalto said Wednesday it had suffered hacking attacks that were likely conducted by US and British intelligence agencies but denied any "massive theft" of encryption keys that could be used to spy on conversations.

https://www.yahoo.com/tech/s/sim-maker- ... 01731.html
" It’s all in the Form; but only if it is, ALL in the Form."

empty circle taiji
windwalker
Wuji
 
Posts: 10674
Joined: Sun Mar 25, 2012 4:08 am

Previous

Return to Off the Topic

Who is online

Users browsing this forum: No registered users and 30 guests