* Posts by Panopticon

17 publicly visible posts • joined 26 Oct 2015

Windows' Nemesis: Pre-boot malware pwns payment processors

Panopticon

ISIS

Isis, is very much there baby, it's indicative of the 9 https://en.wikipedia.org/wiki/Ennead of ancient Egypt.

Eric Holder - Mason

James Clapper - Mason

Barrak Obama - Mason

George W. Bush - Mason

Clinton - Mason

Eric J. Schmidt - Mason

So you can bet, the next president of the United States is going to be a Mason.

Ha and people thought Muslims where fanatical...

Panopticon

@Tanner

Of course, you see the One dollar bill, look at the Eyeball and now draw another triangle onto it in reverse and there's your American-Isreali connection spelled out in black and white with the words MASON. Of which the last 13 presidents all where members. It's a delight to listen to them prattle on about innovation and technological achievement. After all what has america achieved with there technology over the last 50 years?? Ah yes, a technocracy where most of there technology is a huge monumental fuck-up.

None of it actually work's, instead there busy doing what they've always done, what with being american-jewish and sacrificing there children to "Moloch" worshipping a flying GNU Bull which is something Mohammed slammed them all over in the middle ages.

Look at the wonder's of Unix BSD & Linux.. Neither of them work!

Never have done and probably never will. Very innovative, you have to admit the rest of the world must be marvelling at there technological advancement and achievement and in other news special agent Chan of the peoples republic of China has her hip's firmly wrapped around her husband Mr Zuckerburgs waist. Lets all just "Marvel" at the love-int going on. Facebook has no secrets from her, especially when she writes home in Mandarin cipher to her Relatives in the communist party!

Panopticon

Re: Secure Boot

Re: Flaw's in secure Boot (Really, I'm Interested)

It's secure - we've heard that before, Sony say's the same thing about it's EEPROM boot-loader on the PS4 and then a load of Brazilian gamers figure out that with a Raspberry Pi you can rewrite the EEPROM to have any damn boot-loader (JAISPI). Any implementation of Windows itself is flawed because Windows embraces broken Web standards like HTML 5 and bundles it into it's PRISM based internet exploding browser whilst other people desperately work there hand at trying to patch there huge fuck-up's and try to remove there shit. They screwed the implementation of Kerberos then they screwed implementation of Bit-locker in Windows 10 and it's worthy of note that no version of Windows actually ships with OpenSSL that's something you the end users are expected to add-on, this is the off-spring of Caldera still eating it's own children and destroying the web in the name of better advertising and marketing along with it's chums at Google who quote Steve Jobs as being a great visionary when Steve Jobs was last quoted as having said and I quote "Android and G-Docs is Shit!" Exploits against Kerberos, against SSL & SSH, against etc, etc, etc where have we heard all that before.. Oh that whistle-blowing guy who told everybody to go use Debian, then when everybody start's using Linux, suddenly Linux falls on the scum-bag trading list as malware that supports terrorism and suddenly System-D and other such horse-shit that allows crime ware and Trojans in Linux suddenly spreads it's affluence with effluence and projects that try to mitigate the crap with sane Libs like uLibC and Musl with grSecurity instead of SELinux and MAC get hosed.

These guys at the NSA & GCHQ with there friends at Google coming out with horse-shit like "Ubuntu LTS" is the most "secure" distribution ever, are really starting to piss everybody including the Securities Exchange Commission off quite badly. Definition of "Secure" distribution, one that doesn't have your enlarged spying testicles in it or maybe one that hasn't had you deliberately hose the crypto_API with NSA_Key.dll and bundle Javashit into the desktop. I can think of numerous alternatives such as Flex, Pascal and Russian copies of a Windows Clone. (ReactOS FTW) just bundle it with Kerberos version 3.2.2 and CoreForce firewall and viola, you've got Unisys Stealth Core (TM) technology. With a firm two fingers to most major browser vendors including Google!

Obama calls out encryption in terror strategy speech

Panopticon

ZOMG!

FFS.. Fuck Off Cameron && Fuck Off Obama! Do you think the Russians intend to weaken there encryption or how about the Chinese weaken there's first?

Pathetic.. Weaken encryption, make it easier for us to spy on the NASDEQ. We're not evading an SEC enquiry. We're not corrupt, we didn't sell Gun's to terrorists in the first place, we did not have insider agents working to incite a caliphate to over throw Assad, we know Sadam had yellow cake uranium and blah, blah, blah, blah!.. War, Death, Lies & Congress... Just fuck off you hopeless clueless fucking moron, go hang around with your Jewish buddy Cameron and spout inane useless shit like parting the Red sea after the flood, because he was so busy reviewing defence spending that he fucked the country when it came to flood defences!

Microsoft encrypts explanation of borked Windows 10 encryption

Panopticon

The recovery password can be recovered from a BitLocker enabled computer provided it can be logged into e.g. by running: manage-bde.exe -protectors -get C: -Type recoverypassword

Just more ineptitude from the guys at MS who've never really understood the whole principle of Encryption in the first place, it's not supposed to be recoverable.

Windows has a long history of snafu and borking cryptography, they even completely screwed up Kerberos implementations in Windows 7 leading the maintainers of it to be left shaking there heads saying "Windows jus' doesn't get it!" which is true when you reflect it's supposed to be for protection of government departments and there own data, but then these government departments "holla" on about needing better security whilst they then try to erode it - claiming it helps bad guys. It must be marvellous to work in an environment of complete idiots who just do not understand why it's important and where it's use isn't even that highly mandated in the first place.

Goodness me just imagine if they'd used TrueCrypt to store all there secret documents, then they might not have got shared all over the Web! Suck's eh? Meanwhile in other news, they have access to so much data, they're drowning in it and the bad guys are talking over coffee and lunch in the local McDonalds instead of over the internet.

Is Kazakhstan about to man-in-the-middle diddle all of its internet traffic with dodgy root certs?

Panopticon

Not News

Not news, spies are already doing it to peoples handset's and computer kernel.

Turks-Trust, Equifax (NSA), MasterCard & Visa, Root Government CA.

What makes it news is when people figure it out and hover a button over those Certificates and then press Delete removing there back-door whilst utilising an alternative.

So called Leaders and politicians still don't understand encryption anything that protect's information from prying thieving butt-holes like them must be banned because it makes stealing all that technical stuff so much more difficult.

As for Russia, those Baikal chips are named after a Lake.. So...

(B)Lake encryption algorithm for the Win!

Condi Rice, ICANN, and millions paid to lobby the US govt for total internet control

Panopticon

Re: This and data caps

That's why ICANN is fast becoming ICANT, it's time for people to set-up there own DNS resolvers with there own Root authority as one lobbyist said "Balkanisation of the Internet!" followed with "all our tech is leaving in waves!" There's some nice photo's on-line of the white-house board-room filled with the head of apple, the head of twitter, the head of facebook, the head of micro-soft, the head of sun micro-systems and the head of google all chummily sitting around the table.

> What's to stop say Russia or China from staging some kind of Internet coup while the transition's taking place?

> You mean, what's to stop them from doing what the US are doing right now, under your nose, with your money?

Duly noted.

They know they've lost control of the free market because people are looking at there systems muttering about back-door's and note the latest news that after they praise there intelligence agencies for blowing up some Jihadi the news then turns into 8 more of them blowing themselves up on blackfriday whilst source code abounded in some circles all pertaining to blackfriday!

Don't tell me this doesn't serve the governments totalitarian agenda because it does and the sheeple lap it up whilst they hold talks about cyber having no idea how there own computer works baring switching it on.

Yeap outstanding intelligence work, pity the decision makers lacked any to begin with, an pity none of them spotted a large terrorist cell that just blew itself up, before they started screwing around with the "IETF" because when your talking about the "IETF" who is it exactly that operates that board?!

UK.gov plans to legislate on smut filters after EU net neutrality ruling

Panopticon

Re: It's not about kids... really...

God forbid they type in TubGirl or Goatse then.. Look away... look away... If he gushed cornflakes over p0rn, heaven know's what he'd make of uncensored goatse... although he does remind me of the Giver!

UK citizens will have to pay government to spy on them

Panopticon

Re: Bah!

You can feel it when you pay your taxes, when you go to church, it is the world that has been pulled over your eye's to blind you from the truth, the truth that you are a slave, born into an invisible prison that you can not see, can not taste, can not touch... Until now.. Thanks to the interstellar Cat-V force! www.9front.org ("hackers need to do better" - was probably the final insult!)

"Governments need to do better!", if they can't understand or use there computers in a nice way, then they should return it, to there supplier and ask for there money back!

Panopticon

Re: Everyone is going to need to start running a TOR relay.

It will make no difference if you use a TOR exit or not, Onion routing is not the be all and end all of privacy on-line did you actually watch the Matrix and realise what you where being told when the child said "Do not try to bend the spoon with your Mind, that is impossible!" "But instead, you need to realise the truth?" - "What truth?" "There is no Spoon!" - It's a reference to Plan9 from Outer Space and "Uri Geller", the "truth" is that there is no spoon 'IT's CGI'

The Government is in a dilemma, you see people are slowly waking up to the "Truth!" you say you'll give them more information than they can handle!? Lol, the opposite is true, no information at all if you use a system that is more Unix than Unix with transparent file sharing - Terrorist's? Lol, idiots! When Tim Cook said "If you create back-doors that can have a dire consequence! He was totally correct..."

The NSA are not programmers, they're 9 Candy running Rabbit LSD!

What the Investigatory Powers Bill will mean for your internet use

Panopticon

Re: What I didn't know about was that all my DNS request would be logged!

When I say a "Cult" I mean a "Cult" they're known as the Masters and they follow the 9 Keys of Enoch - Council of Nine

Amongst it's collective and most prominent members are - where:

Gene Roddenberry was part of that inner circle in 1974 and 1975 (Deep Space 9) (7of9) - Andrija Puharich, James Hurtak and Richard Hoagland have all lectured at the United Nations in New York. And individuals all connected with "Nine" are also known to have had influence over Vice-President Al Gore - President Bush Sr - President Bush Jr - President Clinton - President Obama - President Ronald Reagan etc, etc..

Known simply as 'The Nine', its disciples include cutting edge scientists, multi-millionaire industrialists and leading politicians.

"I am the beginning. I am the end. I am the emissary. But the original time I was on the Planet Earth was 34,000 of your years ago. I am the balance. And when I say "I" - I mean because I am an emissary for The Nine. It is not I , but it is the group - We are nine principles of the Universe, yet together we are one."

Perhaps the most disturbing aspect of the history of the Nine is its relationship to the career of Andrija Puharich. Recent research has revealed Puharich to have a distinctly sinister side. As an Army doctor in the 1950s, he was deeply involved with the CIA's notorious MKULTRA mind control project. He together with the infamous Dr Sidney Gottlieb experimented with a variety of techniques to change or induce actual thought processes even to creating the impression of voices in the head.

As president Putin has already said a CIA Mind Control experiment & Zionism (they're all Jewish!) pure and simple!

Panopticon

SSL

It has everything to do with what Robert Morris a Cryptographer who worked at the NSA & Bell-Labs actually did to the SSL layer, you see you believe that SSL is Secure Sockets Layer that is in point of fact incorrect it's Secure Sockets Record!

Why reveal the 9 - Because I would think of myself as "Horus", being of two world's "stealing the all seeing eye!"

Panopticon

What I didn't know about was that all my DNS request would be logged!

Of course that's because Google wants to own all your DNS requests as well as your CA on your phone and thieve Java so they can spy on your Droid hence why privacy advocates use "X-Privacy" which completely screw's up the Geo-Location features and disables all there advertising, the back-door is widely published as being the "Talkback" service programmed into the device.

In point of fact there are plenty of solutions to these carefully crafted problems that Google has deliberately created to dominate it's marketing position on the web as a search giant. You only have to look at how they fly off the handle at rouge "CA certificates" to see there's something clearly very wrong with the security of all Certificate Authorities, such as TurkTrust ie: we spied on Turkey!

"Guess I'll have to write another script to cycle through and DNS every IP"

That's not a bad idea, nor is the idea of using "Peer Guardian" to banish all IP addresses belonging to advertising firms like there's along with all IP addresses belonging to the US Government.

ie: IP addresses in the ranges of: 6 - 7 - 11 - 21 - 22 - 24 - 25 - 26 - 29 - 30 - 49 - 50 - 55 - 62 - 64 - 128 - 129 - 130 - 131 - 132 - 134 - 136 - 137 - 138 - 139 - 140 - 143 - 144 - 146 - 147 - 150 - 152 - 153 - 155 - 156 - 157 - 158 - 159 - 160 - 161 - 162 - 163 - 164 - 167 - 168 - 169 - 194 - 195 - 199 - 203 - 204 - 205 - 207 - 208 - 209 - 212 - 213 - 216.

Erm, nearly half of the internet would appear to be there military IP Ranges and they claim, they're not "out of control" and don't "have a problem?!"

TCP/Crypt - SSHNet - OpenBSD - Bitrig - Oberon - Bell-Labs Plan9 & LibreSwan with your own CA's pre-programmed inside Key Manager and exported from Firefox for the Win. Time to banish all those rouge CA certificates that you didn't write or place into your Open Source OS in the first place, hence why there secret secure OS doesn't use CA's except the ones you've written yourself!

They have indeed annexed the internet - Thank "Ken" & Bell-Labs - Who have a long history of always giving the US Military what they want, whilst at the same time they've developed quite a "cult" following hence "hackin9"

Panopticon

What it means...

Can anyone see all my web requests?

Yes - Should be No not if you use opportunistic TCP encryption such as TCP/Crypt.

Can anyone see my web requests if I use HTTPS?

No - Should be Yes if they've inserted there own Root CA.

If I use HTTPS, will anyone be able to access my details from the remote web server logs?

Yes - Should be No - Not if you've fudged there Geo-location and forged your Headers.

Can my DNS requests be logged?

Yes - Should be No, not if your using DNSMasq and an OpenDNS uses unencrypted UDP on port 53 so obviously you should encrypt your UDP as well as your TCP.

Can my ISP determine which of us at home is accessing a certain site?

No - Should read yes, if they're using immortal cookie technique!

If I connect to a website using a VPN, will my requests be logged?

Perhaps should read as Depends on who owns the VPN.

If I use a Tor browser, will my ISP be able to log my web requests?

No - Should again read Yes because of all of the above.

How can ISPs trace me?

A session cookie is used for each user’s web browsing session which can not always be harvested if you disable JavaScript and use a browser that refuses 'Cookies'

Will investigators have powers to examine web server logs?

Yes - Should read No, not every country is going to kiss your ass!

Could there be a “man in the middle”?

Perhaps - Should read Yes there can be which is why you need to take steps.

Will an investigator see my passwords?

No - Yes, they'll see them being typed in if you use Android or X11

So, who really knows what I access?

Good question!

UK's internet spy law: £250m in costs could balloon to £2 BILLION

Panopticon

Epic & Excellent failure by Intelligence World-Wide

So the Honourable Ms May has struck us with her profound intellect once again, you mean to tell us that after the entire world find's out exactly what the American's most top secret CNE actually is, which happens to be an invisible protocol (9P) Blue Gene operating below the TCP/IP threshold invisible to the TCP/IP Layer and hidden from firewalls, which spread's itself inside Computer Networks like invisible cancer and which has now become public knowledge to every hacker on planet earth, that Ms May still believe's that Microsoft, Apple, Linux & FreeBSD which are all products that her friends in the US intelligence service have tampered with will somehow now stay beyond the reach of any malicious hacker that may now wish to attack those systems and those networks. What a truly outstanding piece of intelligence from our Home Secretary once again!

Not to mention the extremely angry other European states who are at this very moment expanding there own spying powers in retaliation and response. Cyber Armageddon - Outstanding!

Congratulations Ms May - you truly are a gifted and very special individual.

GCHQ starts hunt for tech-savvy apprentices

Panopticon

Re: Pay peanuts, get monkeys

Mmm, an what really get's you and ticks you off is the Lie's about insecurity in there Operating Systems, see Feistel Networks - So named after the Lucifer algorithm, that would be the Bell-Topper and Bell-View...

A totally impenetrable database that emerged in 1959 and débuted the world in 1973...

It's called REAL Unix not fake BSD or fake Linux, funny how 4.3BSD was coded in ANSI-C the standard of the time, until it was given away for Free and then the dreaded Bash bug made it's debut along with the bugs in X.

Glenda brauns boob's appear to be crunching your Secure Sockets Layer as Assange dually noted. SSL layers from Robert Morris Bell-Labs & NSA (first ever PC worm too) that don't wrap properly on Windows, Macintosh, Linux or BSD.

They wrap correctly however on Genuine Unix, in point of fact they wrap around your own connection perfectly. Just think of all the cyber-fraud you could commit with that little Gem! Oh and Real Unix is Free, it got Open Sourced after they where caught abusing it. So it's only a matter of time before they all get spanked for being naughty!

See www.suckless.org and www.cat-v.org

Hackers (1995) - "A Rabbit is in the Administration System!" - "A Rabbit uh, it'll replicate till it overloads a file then it'll spread like Cancer!"

JavaScript, Haskell, C++, C# oh do behave "NO!"