Attention then shifted from Russians after some speculated that the agency itself may be housing another "mole" insider. At the time, a former NSA source told Motherboard, that “it’s plausible” that the leakers are actually a disgruntled insider, claiming that it’s easier to walk out of the NSA with a USB drive or a CD than hack its servers." As famed NSA whistleblower William Binney - who exposed the NSA's pervasive surveillance of Americans long before Snowden confirmed it - said, “My colleagues and I are fairly certain that this was no hack, or group for that matter, This ‘Shadow Brokers’ character is one guy, an insider employee."
In a subsequent Reuters op-ed by cybersecurity expert James Bamford, author of The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America, and columnist for Foreign Policy magazine, he said that seemed as the most probable explanation, and that Russia had nothing to do with this latest - and most provocative yet - hack.
Since then, the Shadow Broker group, whose origin and identity still remains a mystery, disappeared from the radar only to emerge today, when in an article posted on Medium, the group wrote an op-ed, much of it in broken English, in which it slammed Donald Trump's betrayal of his core "base", and the recent attack on Syria, urging Trump to revert to his original promises and not be swept away by globalist and MIC interests, but far more imporantly, released the password which grants access to what Edward Snowden moments ago called the NSA's "Top Secret arsenal of digital weapons."
The article begins with the group explaining why it is displeased with Trump.
Don’t Forget Your Base
Respectfully, what the fuck are you doing? TheShadowBrokers voted for you. TheShadowBrokers supports you. TheShadowBrokers is losing faith in you. Mr. Trump helping theshadowbrokers, helping you. Is appearing you are abandoning “your base”, “the movement”, and the peoples who getting you elected.
Good Evidence:
#1—Goldman Sach (TheGlobalists) and Military Industrial Intelligence Complex (MIIC) cabinet #2—Backtracked on Obamacare #3—Attacked the Freedom Causcus (TheMovement) #4—Removed Bannon from the NSC #5—Increased U.S. involvement in a foreign war (Syria Strike)
The peoples whose voted for you, voted against the Republican Party, the party that tried to destroying your character in the primaries. The peoples who voted for you, voted against the Democrat Party, the party that hates, mocks, and laughs at you. Without the support of the peoples who voted for you, what do you think will be happening to your Presidency? Without the support of the people who voted for you, do you think you’ll be still making America great again? Do you be remembering when you were sitting there at the Obama Press Party and they were all laughing at you? Do you be remembering when you touring the country and all those peoples believed in you and supported you? You were those peoples hope. How do you be thinking it will be feeling when those people turn on you? Will they be laughing at you, hating you, and mocking you too?
TheShadowBrokers doesn’t want this to be happening to you, Mr. Trump. TheShadowBrokers is wanting to see you succeed.
Caleb Sanders
If you made deal(s) be telling the peoples about them, peoples is appreciating transparency. But what kind of deal can be resulting in chemical weapons used in Syria, Mr. Bannon’s removal from the NSC, US military strike on Syria, and successful vote for SCOTUS without change rules? Mr. Trump whose war are you fighting? Israeli Nationalists’ (Zionist) and Goldman Sachs’ war? Chinese Globalists’ and Goldman Sachs war? Is not looking like you fighting the domestic wars, the movement elected you to be fighting. You not being in office three months and already you looking like the MIIC’s bitch with John McCain and Chuck Schumer double dutch ruddering each other in the corner over dead corpses. The post continues by exposing what the ShadowBrokers believe is the general mindset of Trump's support base:
Your Supporters: Don’t care what is written in the NYT, Washington Post, or any newspaper, so just ignore it. Don’t care if you swapped wives with Mr Putin, double down on it, “Putin is not just my firend he is my BFF”. Don’t care if the election was hacked or rigged, celebrate it “so what if I did, what are you going to do about it”. Don’t care if your popular or nice, get er done, Obama’s fail, thinking he could create compromise. No compromise. Don’t want foreign wars, Do want domestic wars, “drain the swamp”, “destroy the nanny state” Don’t care about your faith, you sound like a smuck when you try to say god things DO support the ideologies and policies of Steve Bannon, Anti-Globalism, Anti-Socialism, Nationalism, Isolationism In the article, the ShadowBrokers also touch upon what until recently was the primary topic of the daily news cycle, namely the whether Russia is behind this (and any other black hat intel hacking operation):
Jordan Wright
For peoples still being confused about TheShadowBrokers and Russia. If theshadowbrokers being Russian don’t you think we’d be in all those U.S. government reports on Russian hacking? TheShadowBrokers isn’t not fans of Russia or Putin but “The enemy of my enemy is my friend.” We recognize Americans’ having more in common with Russians than Chinese or Globalist or Socialist. Russia and Putin are nationalist and enemies of the Globalist, examples: NATO encroachment and Ukraine conflict. Therefore Russia and Putin are being best allies until the common enemies are defeated and America is great again. The report than goes on to suggest that the hacking group is in fact comprised mostly of former US spies: "President Trump, theshadowbrokers is offering our services to you and your administration. Did you know most of theshadowbrokers’ members have taken the oath “…to protect and defend the constitution of the United States against all enemies foreign and domestic…”. Yes sir! Most of us used to be TheDeepState everyone is talking about."
Then something changed, and the collective notes that "TheDeepState is being the enemy of the constitution, individualism, life, liberty, and the pursuit of happiness. With the right funding we can recruit some of the best hacker intel peoples in United States and world. “Unmasking” is being new buzz word, so we use. TheShadowBrokers is being happy to unmask anyone we considering to be an enemy of the Constitution of the United States."
Enemies like John McCain. Something doesn’t rub theshadowbrokers rite about Vietnam War POW who at every opportunity seeks to do violence to others via the proxy of young service men and women. If anyone should be being pacifist, slow to pick fight it should be being former POW. TheShadowBrokers is sure if we “unmasking”, Senator McCain, Magog itself might come out, many defense contractors, Saudi Princes, and possibly little Vietnamese boy he shares with Senator Lindsey Graham, not cool! Mr. Trump we know you are having DOJ and FBI, so why you be needing theShadowBrokers? You don’t, but theshadowbrokers is confused. Why haven’t you served search warrant to NYT, Washington Post, Goldman Sacks, Jeff Bezos, and all other Globalist for investigation and prosecution of treason, sedition, and un-American activities during a time of war? The It was the conclusion to the post, however, that was most interesting - in it the Shadow Brokers urges Trump to be the "real deal" and has released the password to the NSA hacking tool binaries that made so much news last summer:
Mr. President Trump theshadowbrokers sincerely is hoping you are being the real deal and that you received this as constructive criticism toward #MAGA. Some American’s consider or maybe considering TheShadowBrokers traitors. We disagreeing. We view this as keeping our oath to protect and defend against enemies foreign and domestic. TheShadowBrokers wishes we could be doing more, but revolutions/civil wars taking money, time, and people. TheShadowBrokers has is having little of each as our auction was an apparent failure. Be considering this our form of protest. The password for the EQGRP-Auction-Files is CrDj”(;[email protected]/* */)#>deB7mN
Liam Jenkins
Where do I dowload these files at fam?
Dominic Gray
What is this python 'magicjack' script guys?
Camden Richardson
Is it happening?
Julian Collins
Beautiful. Build wall, cancel slave trade agreements, fuck Israel. That's all that needed to be done.
Leo Stewart
(Checked)
Yes
Anyone who was on baph that day and downloaded those files now has the password. Now, it's like Shadowrun. Nearly anyone can use the NSA/CIAnigger tools to be an operator.
We Sixth World Now. Elected a Shitposting Dragon even.
QUADS CONFIRM Here's the exploited shit I have found so far: Apache, Linux-priv-esc, OracleDB, Windows, SSL, SSLv1, SSLv2, SSLv3, xmlprc server (e.g. Drupal, TikiWiki, b2evolution) more to come I'm sure.
James Taylor
Does this mean pedos will hang soon?
Jason Richardson
Enjoy. github.com/x0rz/EQGRP
Aiden Myers
WTF IS GOING ON IN THIS TIMELINE
Isaac Johnson
YES!
Blake Foster
Yes.
Looking through this, everything is fucked. Most of these exploits appear to be used against people running webservers, probably because the NSA wants to log everything and some websites don't want to help out.
You could theoretically launch an attack on a personal website and use that to gain a foothold into someone's personal computer; say for a politician. At bare minimum you'd get their IP address which could then be paired up with the CIA malware released by Snowden.
I don't think this was by accident either.
Kayden Diaz
MagicJack is a voip device used mostly by shitskins.
Joseph Gray
Why'd you link that shitty thread?
Hudson Lewis
oh shit
Kevin Davis
Shit in fear, CREW.
AND THUS FOR EVERY JEW!
Christian Cook
I just wasn't sure if it was for the actual magicjack device, or if they're just calling that for shitsngiggles.
If it's the actual device; here's their keys if you want to wiretap tat VoIP solution: #RSA key modulus rsa_n = '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' # RSA private exponent rsa_d = '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' # RSA public exponent rsa_e = '10001'
Ayden Foster
Wow today is the day the world changed forever. /baph/ I hope you faggots are ready to roll.
Isaiah Long
(checked) I swear someone tore a dimensional hole overnight
Jordan Bailey
Ha, its a Rand supporter.
Andrew Bailey
So these tools being out in the open, is this a big deal then?
Tyler Morgan
Yes. It gives pretty much anyone with the basic script kiddie knowledge the ability to hack like the NSA.
We open for business nao, Chummer.
Brody Garcia
Well have a bump then, I hope more of our guys can use this stuff then to fuck with the kikes (and also hopefully who fucked with this site on april first)
Srsly, can I also ask for requests? Fug I dont know. Maybe something soros? Kill some jews or something?
Connor Williams
wtf I hate liberty now
Lucas Diaz
You think Rand would have bombed that airfield to soften it up for an ISIS assault?
James Price
Bump as well. I'm a tech retard, basically. Are any smarter anons able to breakdown the practical implications of this leak?
Colton Sanchez
well whowever of us can is probably already using it the way they want to, not much use to ask them, kek.
Money, loads of money, lets steal it all from the jews? Is it even possible? Steal all of the rothschild money, and also of soros?
Jace Watson
I'm not a tech, I'm an operations planner. And I'm tied up in other things right now. But, I'm sure someone could do something like infecting ShariaBlue, the new DNC servers, WaPo offices and cellphones and the Amazon credit card transaction databases. That would be terrible, and if it happened, a lot of sensitive data that would make Podesta and company look guilty as hell over. That Thorn thing that Ashton Faggot Kutcher did looks neat as well.
Gabriel Clark
yeeeeeeeeeees, something bad to the jews. Whatever they are doing, but also their money? cant you guys just steal ALL of their money and buy buttcoins for it for yourselves? Lol
Easton Foster
Are you thinking what I'm thinking?
Aaron Butler
You're pushing that too hard. Ban this shill.
There's no possible way to move that much money that quickly without everyone going down and nobody thinking we're good guys.
We steal their paydata. We need the Weiner laptop files.
Hey, chummer. Want some nuyen?
Andrew Hall
Yes.
Execute Ordos Hereticus 66
Shadilay
Noah Foster
I just identified which executable is being used to run privilege escalation on linux boxes. Need to readelf it and look into how it's working.
Jeremiah Sanders
jesus man I am just exited. Not everything is a shill. But what better way to harm the jew than to steal his shekels? Well whatever. Do what you want lol. Its your tools now. Il just bump the thread or something.
Cooper Roberts
HACK INTO THINGS AND FRAME THE JEWS
Carter Walker
YES!
Marblecake.
Leo Walker
Just leave traces of Hebrew and Israeli shit everywhere. Steal shit and send it back to known jew addresses. Get them all arrested and imprisoned.
Isaiah Cox
I read something about the Shadow Brokers today and I had no idea who they were, but I remember this happening, I just never paid attention to the name of the group. Interesting, I'm a normie on windows, I hope /baph/ can have fun with this.
William Hernandez
You are almost literally asking a bunch of near mongoloids what to do with something like nukes. What do you think that would happen?
yes I am serious about the whole natsoc thing but our innate retardation is not an easy thing to let go off. We came from that retardation so ugh. Can you draw dicks on their websites too? Deface their kike newspapers and state websites?
Austin Allen
Is /baph/ even back online yet? I'm not able to load page 2 of the board lists for some reason.
This please. Some hero do it.
Robert James
I'm not asking anything. I've made a few suggestions for monkeywrenching.
You don't know what I've come up with for serious operations.
Adam Rodriguez
You have to use Hebrew, and then make it look like you covered the Hebrew up.
Xavier Martinez
This is the end of the power structure in the USA, very nice revenge for the dumb attack on Assad, looking forward to all the pedo outings of the fucking kikes in the government. The damage this will cause is infinitely bigger than what the tomahawk strike could ever cause.
Dylan Parker
well if I had access to some of these tools I would go to the israel websites. And then add a loop of some really jewish music. Maybe a subtle gif of the hands rubbing merchant from time to time. But it wouldnt be subterfuge, it would be something dumb like defacing their websites.
Xavier Green
The whornalists in the Merdia deserve to have their asses examined, now that the good guys have the right tools.
Zachary Wilson
I just like coding and learning new things tbh. My goal is to be the first guy to release a patch for the linux priv-esc exploit.
Asher Wright
I have no idea what this means but I'm excited anyways because everyone else is.
Hunter Miller
I think they have bunkers and do things with onions. I don't know what onion means.
Anthony Garcia
etc etc. Rockwells famous communism vs nazism speech goes into great detail breaking down the viewpoints on every issue, and how democracy basically achieves the same thing as communism, it just goes about it differently. It uses different pretexts. He has a quote along those lines somewhere in the speech. Were National Socialists. Democracy is a failed concept where Jews manipulate the voters into voting for their agenda. We are authoritarians and National Socialists, dont like it, go back to cuckchan.
Justin Wilson
also, if the tools are made public, doesnt it mean there is a huge race right now to patch all of them? Meaning that time is more or less of the essence for you guys. So I dont wish to fill your thread up with dumb ideas. But not really that much we can do to help you guys either.
The more you use these tools, the more likely they will be patched as well. So hurry up fagets. Do what you think is right lol.
Levi Brown
Nice dubs FBI.
Ryder Perez
I've already identified the exploit.
Austin Wright
FTFM
So yes, the race to patch them is on.
Funnily enough the binary itself will tell you if you run it whether you're vulnerable or not kek.
Jack Lee
I wonder how much monetary damage this leak was to the US gov, all that talent and man hours. Oh god they must be fuming right now.
Michael Baker
If Jews can manipulate a democracy, what do you think they can do to an all powerful dictatorship? You're making a pretty big fucking leap to go from "Jews can manipulate democracy therefor an authoritarian nanny state is the only solution" That's like buying a horse because your car got a flat tire.
there is no fucking "we", faggot. Holla Forums is not one person. I know you're new and this may be hard to comprehend, but before the fucking travesty of the presidential election there was actual discussion and debate on Holla Forums. Reichiboos are de facto cucks
Jack Barnes
FOR REAL? Can anyone confirm the password is working and they now have access to the super hacker tools of the NSA? Someone should do a demonstration in the 'desert' so to speak to prove that the tools are indeed working.
Justin Peterson
...
Ayden Brown
Yeah, no shit. This ride is getting really weird.
Josiah Roberts
When they control the media and the people believe the media. Nowadays the media is trusted by only a minority of americans and it decreases every year.
No nigger you're full of shit. And you cling on to a fantasy that's not applicable in the US. Try to be useful instead of masturbating yourself
Easton Harris
What can you do with these tools? How about a demonstration?
Jace Sullivan
I wonder though, are these also any hacks for control of military hardware and/or to override controls of vehicles?
Alexander White
Download them yourself and RTFM tbh fam. github.com/x0rz/EQGRP
Carson Clark
Sounds like CIA area of expertise rather than NSA
Nathaniel Sanchez
to add to that: Like any traces of something like stuxnet Or something else still that may implicate that they have been killing people in self driving cars?
Jason Long
Auspicious digits.
Austin Kelly
anything related to the listening into android phones? In those amazon listening devices as well? Anything linking it to an API some machine learning thing?
Ryder Mitchell
Obligatory. How bad is this by the way? Will the modem condom really keep me safe?
Lucas Nelson
No idea, I'm not clicking that shit. Pretty sure handling stolen top secret war materiel is grounds for getting v&.
Lincoln Baker
It could also be a psyops of some sort still. May be infected? I dont know. But some foreign agencies probably already have a hold on that and can you really trust them to tell the truth?
Noah Thomas
But user.
We are the partyvan now.
Nathan Sanchez
Probably not a psyop, probably not infected not going to find out personally, this is the deep state war going out into the open. we really are closer to Civil War or a coup d'etat than I thought
Jonathan Adams
Not if it's released publicly AFAIK.
Logan Wright
Can't find the manual tho. Somebody help a poor script kiddie who wants to hack some kikebook accounts of hot chickas
Landon Jenkins
You could cut your dick off and still get a level of aids that would make Freddie Mercury blush
Isaiah Perez
THREAD THEME!
Anthony Hill
well then to /baph/ I think you guys wont be getting any sleep for the next couple of days lol.
Good luck on your cyber adventures. Perhaps you should keep to this thread and tell of your conquests (if they are funny and if they dont hurt any of us in legality obviously, or give too much awareness to the kikes)
Also, would be very interesting to find out which hacks you guys are aware off, that happened recently and (in the last few years?) that could implicate the NSA niggers.
If you guys find lots of evidence, that would hurt the NSA (and the deep state) pretty bad. These exploits are more or less specialized or them and by them. You could potentially build a legal case based around them? Which could also mean that the NSA niggers are working overtime shredding their harddrives right now?
Joseph Gonzalez
I presume the files are still on wikileaks? Reading through the files might allow one who is a script kiddie to gain some insight as to how to do things legit.
Oliver Davis
so, what could their priority be of the NSA with this revealed then? First they probably already have somekind of kill switch to destroy their hard drives and all data, dont they? Did they hire somekind of data destroying outsider company, is it in house? Are there giant trucks driving into those places?
The victims of their worst hacks, are they getting threats, subpenas, gag orders, who may have detailed logs of these events?
If the hacking tools and the specific footprint that they leave, can be tracked back to the companies and things that they have effected. Holy kek then it could turn into a pretty big deal.
am I just overthinking it now?
Samuel Powell
My desklamp burns midnight oil.
Joseph Hall
NSA Operations Servers: if site == 'North': fg_srv = '10.0.129.254' elif site == 'South': fg_srv = '10.11.129.253' elif site == 'East': fg_srv = '10.21.129.254' elif site == 'West': fg_srv = '10.31.129.254' else: fg_srv = '10.0.129.254'
Xavier Thompson
I don't want to derail this thread, but speaking of timelines. was bobcat goldthwait always his name, or was it bobcat goldberg.?
Jackson Anderson
op_prep.py allows you to download Operations Manifest Files directly from the NSA through these IP addresses.
tldr; DON'T RUN THAT FUCKING PYTHON SCRIPT. It will connect you DIRECTLY to the NSA and they will log your shit and v& you.
Austin Bennett
Disregard I suck cocks. Forgot, 10.0 is private address space. Fuck off I'm tired.
Lucas Collins
Hey, at least you're being cautious, user.
Sah-gay because I'm just lurking for lulz.
Zachary Adams
So can /baph/ FINALLY fucking dox the Halfchan mods?
Can't we hack the planet now?
Nathan Smith
Please Haxor Halfchan and dox the mods.
Robert Gomez
So basically now this is the hackpocolypse and the Elite is now just as vulnerable as the plebs?
Dylan Price
Do I understand this correctly. Those two should make it possible to upload millions of dick pics on to Dick Cheneys Laptop?
Austin Sanders
Why not upload millions of dick picks to every politicians laptop?
Samuel Edwards
Why not upload enough pepes to crash their hard drives.
Joseph Powell
Go back to >>>/freedom/ if swastikas trigger you. This is a National Socialist board. You want unlimited ANCAP child cummies you won't find any buddies here.
Isaiah Thompson
William binney suggests it's probably an inside leaker
why is this FUCKING NOTHING tl;dr a stickey?
worthless thread
Kayden Miller
Is there any way you can protect yourself from this shit?
One Exception Class ONE EXCEPTION CLASS These bastards should be gassed, old C programmers detected.
Gavin White
Sticky please, this is huge.
Sebastian Hughes
It is stickied. Also do those requests via reports.
Ethan Foster
FFS you already got good port directors in linux. But that other one looked interesting.
Carter Powell
Nobody can run or hide online unless you're using old hardware.
Thomas Thomas
I'd say in the next twenty years you'll see huge improvements in internet security. Right now we're in a kind of "Wild West" age of the internet, it's so new and unsecured that shit like this is allowed to happen. Everything is unsecured, everything is vulnerable.
Kayden Jackson
Old hardware, airgap machines, using other people wifi, pcs, using internet cafes, getgud on tech stuff, spending decent amount of money on custom hardware and software.
99% of people are fucked, me included. I must have 12 red flags om some database.
Asher Taylor
No. The first one just helps to get around some firewall/routing setting from the inside of a compromise machine/network. The second one is just a simple file transfer tool to transmit files over a text only connection.
Dylan Rogers
Hopefully user endures eternal.
Hell we're the only real powerful remnant of the old internet.
Henry Stewart
I need to know now, is there a way to get this and or use it without getting V&? Also if one downloads this will it still be useful later or is there a time limit?
Things are really picking up speed here in the past week… Christ.
Ayden Campbell
Yes there is, enjoy your ban, this is a national socialist board and we dont accept D&C. This is not cuckchan. You must be new, and yet, you must already leave.
Charles Anderson
We ban for a month if you havent read Mein Kampf, you can come back when youve read it. Youre not welcome.
Daniel Price
I'm not a tech savvy person but if I understand this right then holy shit. Bump.
Easton Roberts
Sooo… fucking hack the banks and let's all get rich? Gut the jews main industry
Lucas Russell
It's very easy to trace money you dingus.
Isaac Price
Well. Downloaded the github link. Pray for me not to get V&
Caleb Hall
I can't download it, it now gives me this error
I want to save it also
William Roberts
I think it's a ruse, I think they contain advanced wrongware anyone using these will end up getting backhacked by the cyberpolice they have nodes in their nodes
Gabriel Nguyen
we're all gonna get back traced by the cyberpolice and the state police.
Easton Harris
It will be of no use to you, if you have to ask if it would be of use to you.
Connor Myers
Anyway one of you could reupload it somewhere? i want to download it but github won't let me
Carter Foster
Man I've always wanted to have a router in Pakistan! Unsuspecting goat fuckers!
Alexander Torres
I feel like I'd be on such a list if I downloaded this shit. I already get "randomly" picked for the naked screening machine all the time.
Ryan Rodriguez
The real ending to ME3
Jonathan Moore
I'm probably already on 17 lists as another user here mentioned. It is trivial as anyone watching me is wasting their time. I'd wager thousands of people have already downloaded that github file.
Wonder what the fuck this certificate is.
Aiden Cooper
How the fuck did you manage to even download it? i cannot
I can also confirm kikes use this all the time to maintain anonymity
t. shafted Verizon employee
Jason Hall
so guys is it safe to download? will i get v& if i donwload it on windows without vpn?
Camden Kelly
But the link is on github, probably a million people have cloned it already, so it isn't a big deal to clone it yourself.
Nathaniel Thomas
I'm in an uninteresting area, with little to no power, money or prestige. I'm not a threat to anyone and don't espouse violence. I hang out on a malaysian basket weaving forum.
Oliver Thomas
Oh shit, the hackers are on NSA brand steroids now.
Colton Ross
it should be evident by now there are people all over the US, and the world, working together in an dis-connected fashion do undo the global scale fuckery we have been putting up with. We all synced up somehow on a subconscious level. We got Trump in. Betrayal would be the dumbest thing any one person could ever do.
There are FBI agents as well as other government personal that literally risked their lives during the election. They now have nothing to lose.
Chase Rivera
Can we hack LARPing faggots ?
Oliver Allen
wew I hit submit too early –
Adam Hall
...
Liam Sullivan
not even, I would say and outsourced contractor who's better at covering their tracks than some Obama-era drone
Eli Ross
an*
Mason Miller
Well if they use old tux kernels then yes. But its so funny the tool they used to hack Pakistani routers is called PORK hahahahaha
Jeremiah Nelson
Bannon was not removed from the NSC. He no longer has a chair on the NSC's principles committee.
Tyler Russell
I was thinking there was another reason for wanting the money in exchange for the password on those tools; the files might have fingerprints that identified the leaker & money would be needed to escape to a non-extradition country. But now they're either out of the country or they're so pissed they don't care anymore.
Matthew Gray
The names are funny. ratloader sounds weird…
Found one called ENDLESSDONUT lol
Aaron James
wondering why wikileaks didnt go through with this. maybe too hot for them, or Julian is hoping on a deal with Trump?
Lucas Roberts
Works fine
Isaiah Lewis
they wanted to know who the tools were going to, my guess to avoid NGOs looking to push the usual shit we have been dealing with. If my outlook was that everyone is the enemy now, I would do the same exact thing.
Anyone smart enough to get to this kind of stuff would be smart enough to know money can be tracked, even buttcoin to a degree. I would assume it was a method to filter clients, and they wouldn't touch the funds with a 10 foot pole.
Brandon Reyes
The juiciest thing in this archive are the admitted hacks on some european countries, as well as China, Russia and others. Also, them admitting using obfuscation techniques which make their hacks look like they are performed from another countrie i.e. Russia.
Being a proud Holla Forums I will take these tools and hack… my hot 22 y old neighbor and use the pictures to coerce her into a dom slave relationship
FUCK YEAAHH
Nolan Smith
HACK NGOS BRINGING RAPEFUGEES INTO EUROPE.
Adrian Morgan
hmm sleepy and bed time and perl guru(that shit should be gassed) tunnel.pl
Sneakers use multiple tunnels too if I get this script
Eli Turner
looks like I'm gonna be learning a lot more about computers and shit this month.
Gavin Wright
Holy fuck yes it's happening with 4 on the floor cunting digits. BEND OVER OBAMA
Alexander Powell
start with pfsense, protect your shit and lock down your home network. most ISP supplied equipment is compromised. Ask Lizardsquad.
Chase Flores
I M P O S S I B L E M P O S S I B L E
2 P A T C H P A T C H
THANK YOU N S A
Isaiah Phillips
technically no, but for anything outside of kikebook and vidya gayming literally everything you do involving a computers should use linux or bsd has a host system.
Ethan Cooper
All LS ever did was DDoS, they were fucking idiots as well. Remember when they stored all their clients information on their website in plain text?
Xavier Wilson
Alright it finally worked for me, was a problem with my AV
So anyway back on topic what exactly are these tools? if anyone is interested in or needs the "key" for them the key is
If you downloaded these files without being behind at least 10 proxies you're fucking retarded.
Isaac Ross
I'm not sure what the password is for. Assuming one would use Python to run the scripts?
Xavier Powell
you don't have to be smart to find router exploits, which is all they did to build their botnet. It's what was used against Holla Forums. Shit even the older DSL modems from Verizon had a method of calculating passwords just with the fucking serial number.
Jack Peterson
Dude fuck off I'm done being paranoid. probably thousands of people have these files and virtually no one knows what the hell to do with them.
I followed a web link that was a dead address, domain name for sale by godaddy lmao
Aiden Russell
Yeah and every IP that downloaded those files is logged.
Samuel Bell
ofc it was your AV thinking these are VMONs, a lot of them are from 2006
They aren't just tools, more importantly they are routines on how to hack installations using these tools. I've tried some of the servers and they are still operational, I havn't ran any of the tools but I'll probably decompile them to see what exploits they be using.
Gavin Collins
...
Colton Jones
I'm talking about idiots that didn't use proxies you fucking retard.
Caleb Torres
It means jack shit now either contribute or fuck off with the scare tactics I'm done being afraid.
Jack Baker
I used my Jewish neighbors router to dl them, fucking jews still using WEP in current year.
Isaiah Kelly
I'm talking about how every IP is logged and reinforcing your idea, you fucking retard.
Aiden Reed
Geez even when people fall for concern troll tricks it works in our favor. Best false-flag/10. Would bomb a previously bombed and almost completely deserted airbase again.
Carter Edwards
...
Colton James
u serious? When I opened the archive and inspected a few script I got an autism boner. I wasn't this hard since a girl accidently touched me 2 years ago lol.
With these tools I'll finally blackmail my dream waifu into submision.
Aaron Phillips
lol set-up a pfsense box and cantenna that shit. that way you can use a nice secured system. ISP routers are pozzed as fuck and log MACs btw. smash that wifi card if you do anything risky
Nathaniel Jenkins
I'm surprised we haven't been hit heavy with the ITS NOTHING shills yet.
Blake Ramirez
You're a fucking imbecile.
Zachary Myers
What does this script does exactly?
Logan Perry
Looks like authentication keys or something to "listen in" on anyone using a MagicJack, if I had to guess.
Luis Smith
I'm a stupid asshole, can someone explain the shadow broker shit to me?
Xavier Ramirez
Quick question: can you fuck over the Rothschilds with this or are they too well protected to be hacked?
Jackson Diaz
well it IS something. But the analysis of all the tools within the archive will take at least a week by all the autists out there. There should be tons of zerodays included so everyone is motivated anyway.
It's not a single script. It's a collection of scrips, manuals, docs and libraries. Basically 'digital weapons' if you will. They seem to be genuine and hot shits judging by the twitter of some famous hacker autists.
ALL I want is an efficient and low cost way to get into iOS of my qt neighbor grill and leech her nudes to blackmail her. I've built a small usb device to leech shit from iPhones but I couldn't facilitate a situation where I come close to her phone. I once tried to go up and ask her to use her phone using a bullshit story but I chickened out.
Daniel Bennett
can someone reupload it elsewhere so github doesnt have all the ips ?
Chase Lewis
Most of the tools and exploits from the latest leak are from the 90's and early 2000's. Don't need to worry about the exploits in the leak unless you are running SunOS or OS/2.
Sebastian Rogers
Fuck is this board basically the Knights?
Nicholas Gonzalez
All this because he shot up an airfield full of nothing really? Seems staged
Yeah, I haven't seen "cgi-bin" in a URL in ages. Just how old is this stuff?
Jaxon Edwards
github.com/x0rz/EQGRP/blob/master/Linux/doc/user.tool.extremeparr.COMMON 2011, I guess. Sage for doublepost.
Alexander Jenkins
I'm sure they kept all the actually good hacks to themselves.
Connor Wilson
One man who stood against the Jews for Syria is dead, and his brethren are scarred.
Carson Cruz
yea I mean ISIS advancing isn't too bad amiright? kill yourself
Mason Lewis
or to pressure that alphabet faggots who are sweating like a faggot in a chapel.
Jayden Ortiz
Same hit me, dialup modem shit etc
Nathan Sanders
Could someone who downloaded the files mirror them somewhere?
Cooper James
Read the thread dipshit, someone already uploaded them github, check them out and go wild.
github.com/x0rz/EQGRP
Parker Rivera
Is anybody doing anything cool with this shit yet?
I'm not into tech shit, I have no idea what is going on. Sounds like you guys all just became NSA cowboys. Anything entertaining come of this yet? No shitty screenshots of script, I can't comprehend your cracker runes.
Also, pls no hack.
Nathan Moore
One question: This means that hypotetically rand paul win at 2024 and shut down nsa, this means nothing?
Brody Hill
dumping screencaps of their letter their memeing is weapons-grade, imo
Gabriel Hill
and the end bit of it
Daniel Jenkins
hypothetically saying, it wouldn't be posted here tbh unless its something secure enough from infiltration.
in the mean time, meme Ivanka's/Kushner's lawyer into the spotlight. She just got connected to the Clinton foundation.
Dylan Carter
The Shadow Brokers revealed that John McCain and Lindsay Graham share a Vietnamese boy.
Dylan Ross
TIME TO CONNECT ON NSA SERVERS WISH ME LUCK FAGGOTS ==WATCH THE NEWS TOMORROW=
Luke Collins
As someone who's studied Russian, I can all but guarantee that syntax is at the very least Slavshit. It seems they figured out the words but not the formatting. Not trying to discredit them at all but it's important to be aware that the writing is weird for a reason. Speaking of which, anyone know how to identify the syntax of a certain other (((language)))?
Caleb James
i just ran the python script like you said but all it did was pop up a message saying that I should stay near my computer for a suprise informations.
Logan Cox
I know right.
Why is it the most obvious things will are often the most surprising.
McCain is a hands down traitor- trump knew this during the election.
Joseph Hill
Confirming this, SLAV BLOOD RUNS THROUGH MY VEINS
Liam Russell
This is reaching critical levels of stupidity, almost as bad as the terrorist government in Deus Ex creating an anti-terror AI, being shocked when it betrays them, and they create another one. How detached the people running this show have gotten? They don't even know of the 'heroic rebel bringing down the corrupt system' is an actual thing people believe in and dream about. Americans do not deal with this shit well. There is going to be more and more random wildcat sabotage and the people doing it are going to be some of the more competent ones who know to hide.
This fucking code is going to cause a fucking death spiral as shit gets released and more people defect because of it and so on. And the person who released it is banking on this.
Thomas Cox
Good. It's inevitable anyway. The system is too corrupt. Let it crash and burn.
Jace Long
Hope you anons are using proper OPSEC.
Review proper OPSEC tips before you go doing some crazy shit >>>/opsec/
And if you do something illegal, you better destroy all evidence of it afterwords (which will cost you $$$ and time to recoup after laying low).
Dylan Ross
Not really. The real elite businesses usually have great opsec. Apache exploits hit small servers, not big ones.
Leo Hill
I've known this for many years now, but want to let other anons know, this is how they can track browser activity even when you "block cookies" and set your browser in "private mode."
You have to exit your browser, go into your browser's directory and scub these files manually. New cache files will re-appear after you re-open your browser
DO NOT delete prefs.js , this is where your browser settings are stored. If you erase that, all your settings will be back to default mode. Yes, I've fucked with it myself once.
Most of the other files are not nessassary at all and are there to log everything you do in the background (in "private mode" or not).
I run CCleaner and Bitdefender system optimizer every time I close my browser and then multiple times throughout the day, and before I turn it off for the night. I also have CCleaner set to wipe practically everything except white space.
Have fun. Everything from tax records to Peter Hayman's pizza orders are here.
Liam Torres
Hack the hedge funds and simply delete all their files including backtracking their backups and deleting those to. They show up to work monday and there is simply nothing. No transfers to track or recover, no record of having a single dime in stock, no nothing.
Some of those hedgefunds are multi trillion dollar entities. Fucks the boomers retirement up the ass too. Cause every other hedgefund and trader in the world will decouple from the net and refuse to do electronic anything for fear of one day….. NOTHING. A crash is recoverable in some way and can be covered by governments. A great big pile of nothing and memories is simply that. Nobody can recoup something nobody has any record of, nobody can have an recovery of stock price when the stock may as well never have existed. It's all ones and zeros. And like that southpark episode, just the other way around, its the computer telling the banks "AAAANND its gone."
And best of all. Nobody stole a dime. It just never existed in the first place. Don't like it…. prove it. Oh wait!
Jonathan Perez
based idea.
Carter Myers
I just used the Windows backdoor ransomware my college administration's office computers, kek.
Henry Sullivan
SO, basically, do what they did in flight club but with the Internet, in a similar vein anyway.
Blake Miller
...
Kayden Martin
let us know if your door get kicked in, thanks
Grayson Green
99% chance it's an English to Russian to English machine translation job to obfuscate stylometry
Zachary Flores
We Mr. Robot now
Carter Cox
**I like it (I probably fucked up spoiler though)
Colton Ramirez
Thought so
Jayden Diaz
If you have to even read some opsec posts you REALLY shouldn't touch these files. But have fun if you do.
Lincoln Sanders
There had best be a thread on this by morning.
Joshua Torres
You want another poll or something, you disgusting minority shitskin?
Matthew Cruz
you know what? there's a hyuuge database of the nsa that contains a copy of all the web + communications from these last few years, complete with all the deleted emails ever sent, all the pizzagate kiddie sacrifices videos ever used as inter-elite mutual blackmail insurance, all the surveillance orders on deep-state competitors and all the attempts to hide or delete elite corruption behind obfuscating bureaucracy
and it's protected by computers
Jaxson Carter
Any database hosting those would NOT be connected to the primary internet, you would need physical access to a machine that was connected to their separate network
Hudson Howard
Yeah, this NSA stuff at the end of the day is script kiddie shit.
That said, John Podesta did fall for babby's first phishing scam. Maybe his pizzagate servers are vulnerable to these scripts.
i had a dream when ww3 starts but all is so hacked and info sold that most of nukes not work or even take off. Some bombs will hit targets and we will realize we save our asses and stop that crazy shit. But conventional revenge wars will sprade.
Jonathan Rogers
or they wanted to distribute these tools as widely as possible from the start, and asking for a ridiculous amount of money in a widely publicized "auction" meant the encrypted file was sure to be downloaded by every amateur computorist worldwide, before the release of the password enabling a simultaneous release of all the tools with nobody gaining an overwhelming advantage by being the first to get them and using them to suppress the source before anyone else had a copy
Charles Scott
You don't say. Sometimes I think China is trying to split Russia, America, the EU and even the Israelis.
Ever feel like you're just a puppy being thrown a ball? Makes ya think.
Grayson Roberts
Yes.
Nolan Johnson
No this is a trap.
Austin Adams
This.
But it's not a trap or anything.
Gabriel Nelson
multiple news agencies and security companies and experts dl this
can't arrest everyone.
Mason Reyes
...
Connor Roberts
You won't get arrested, but that doesn't mean you won't be on a list.
Matthew Sanchez
No one remembers that Emperor Justinian once massacred a crowd of 30,000 dissenters at a stadium.
Matthew Wood
The files themselves are probably not safe though.
Jason Kelly
Can I change my grades for my degree with this? I could use a good gpa and HDs everywhere :^)
Lincoln Wood
F.
Connor Anderson
I downloaded the zip, put it in quarantine, unzipped it, and scanned that folder with Norton, Anti-Malwarebytes, Avast, and I even unpaused Window Defender to scan it too. So I doubt it's infected, if that's what you were implying.
Lucas Phillips
This.
I think this is a trap and plausible subversion.
Joshua Price
nooo, there's no way an employee with the NSA could somehow find anything that they do to be in some way unethical or against the basic principles this country was founded upon.
well this is a good idea yea, getting some evidence would allow you to destroy the NSA, legally wise, all completely moral and above the water.
The added bonus is that if you could find some of this proof, the companies themselves will do the legal work.
The problem is of course as discussed
so speculation, when you guys may have better hard targets may not be wise still. But who am I to direct you guys. Just saying. Killing of the NSA could be a big deal to help remove the deep state.
Jaxon Gomez
Seriously if I wake up tomorrow and either: or I will laugh.
How did they hack the emergency sirens? Why are they controlled by computers?
I will grovel at /baph/s feet if they seriously did pull that off. But for some "odd reason" I feel skeptical about all of this.
Evan Lopez
What isn't?
Joshua Barnes
Is that in addition to the real half life 3 from the LHC?
Samuel Morales
Sirens tend to not be, but then again these are emergency sirens.
Tyler Lopez
oh, if only you knew what I did
Zachary Sanchez
A lolberg nerd larping, but actually dropping cool shit while doing so.
Jaxon Sanders
Meant for
Nolan Morgan
Can't remember specifically but there were warnings late last year that some time during 2017 the internet would be rendered unusable.
I get the feeling this is that moment.
Juan Barnes
I'm undoubtedly already on a list somewhere. I've been followed before like to the point that I've pulled off the freeway into a parking lot to answer the phone and had an impala park on the other side of the parking lot facing me with headlights on and sit there for an hour until I went to leave.
I'm on a list, they want me to know it, I don't care. I just want to leverage it into teaching their people how to drive better cause they suck.
did it happen about 4-5 months ago at about 1-4 am central time? if so, impressive.
Ian Ortiz
...
Aiden Bell
Normalfags are getting skittish about the possibility of getting killed over Syria. Good, this will start them turning anti-war and robbing the neocons of their political capital.
Jordan Lopez
user pls.
Blake Ward
My biggest concern is why do they need this oil pipeline so badly? Are western countries that short on oil?
Ayden Lee
Is vid related basically a possibility, now?
Juan Rogers
:^)
Adrian Johnson
DO EEET
Lincoln Gonzalez
Clearly, the only practical usage of this information would be to get more celebrity nudes.
Logan James
They have folders on many international universities.
Jeremiah Young
Has anybody done anything of note with these files so far?
Brayden Flores
would make sense since any seasoned operative would start to work against them, since they are crooks and shitbags
Zachary Roberts
Can I be a l33t hacker without getting hacked myself?
Xavier Hill
or are they spying on them? or recruiting tho.
Eli Walker
Poastin in an ebin bread. INFINITE HAPPENINGS IN THE YEAR OF THE FIRE COCK
Nathan Bell
Fappening 2.0
Oh yeah and other good stuff
Ayden Green
"YOU STUPID GOYS YOUR COMPUTERS AREN'T SAFE UPGRADE NOW!"
Dominic Murphy
HAHA HOLY FUCK I POSTED TOO SOON
Gavin Nguyen
Installing spyware on students' laptops etc.
Brandon Long
The folder names remind me of website crawlers. I think they were getting into account credentials.
Jeremiah Lewis
AVG said something about an exploit or something. Cancelled the download Am I going to get v& guys?
Ryan Gutierrez
I don't buy it. This is just someone trying to hide their writing style.
Brandon Green
github.com/x0rz/EQGRP
Is this is all that was released?
A. Doesnt ask for any password when unzipped B. Ppls be saying this is the second set and old shit. Where da first set at Holla Forumsros? (aka da good set)
Bentley Gonzalez
lol might be a former member of TOTSE
Eli Wilson
The MAC is stripped at the router and replaced with the router's mac address.
Jack Collins
This better be bait
David Foster
Cite the law that is being broken by investigating these tools. If me probing their ELF binaries is illegal, so is browsing wikileaks.
Jason Bennett
Well just found a list of the locations of a shit ton of their rootkits; will be making a .sh to test for them.
Alexander Reyes
I can get behind this
Julian Long
The ring is most likely so large that someone involved is vulnerable.
Nathan Walker
WEW E W
Colton Murphy
Transfer it into the US treasury, it's the only way the original debts get paid off to where we own our mineral rights again.
Robert Mitchell
You know what makes this fucking hilarious? Any data that is unearthed as a result of this is going to directly harm the deep state fags the most, since it was them who claimed all the untruths about the NSA.
Glorious.
Luke Butler
I thought that most of old anonymous was either recruited or suicided?
Lincoln Hall
yeah well i got locked up in HS, got out and it was in the throes of death. Missed out on a lot man. A lot in life.
Recruited to what?
Daniel Cruz
Any system administrator worth their salt has at least one offline backup and if their smart multiple offline and offsite backups.
Carter Sanchez
We went from social rejects to Memetic Wizards vampire hunters to Memetic Wizard nazi vampare hunter shadow brokers
I love this fucking timeline.
Brayden Wilson
That would be terrible!
Hudson King
I'm seeing with new fucking eyes today. I've always been careful about OPSEC but now I'm ready to go to next level, as I feel like ZOG is watching every move. I haven't kept up as well as I should, other than the basics (a VPN, the recommended FF extensions/Pal Moon) etc..
Anyone have a list of pdfs that one should read that will get me up to date if I haven't been paying close enough attention for past 3-4 years? I thought we'd be safe with Trump, boy was I fucking wrong. Right now, main gial is to find a way to order ritalin/adderall so I can go on my 36 hour studying binges as I did in grad school. Fucking DEA won't care, too focused on opiates right now.
I have a shitload of work to do. Think I begin with "Tor With Tails." Look what they've done to those poor pricks in the UK the gubment has up for "hate speech?" They're trying to set a precedent with jew-goldstein. How long before we are being V&ed here in the ZOG?
I need to do a lot of reading and then a lot of fucking work…
Julian Young
Zog may have eyes and ears everywhere but the flow of info is too great to be managed effectively. Right niw they are using word filter bots to catch "conversation of interest". If they were using human eyes to sift through all the junk from the net and the deep web we would've heard something about and would have guys on the inside. I don't think they are even focusing on fringe shit. They are far too busy eavesdropping on ragheads using PSN to coordinate truck attacks.
don't even need that. network tech hasn't changed much in the last 10 years. The backbone is still run by cisco, even the military grade shit. Other than that IPv6 is being establish more as a thing now.
Most opsec savvy anons live in places where vans can't enter. Time for the OPSEC wars to begin. Umman Manda Shadow Brokers vs ZOG
Noah Lopez
For Newfag Cucks
Always keep in mind, the nature of being anonymous means we have all sorts of vermin from /leftpol/, Israel, you name it happy to fuck up your shit if you don't know what you're doing. If you don't understadn what you are opening, DON'T OPEN IT.
Obviously I'm not addressing old fags who know their way around, but how long before he get some fucking idiot who just came here from (insert shithole here) panicking and screeching "I got ransomware on my parents' computer, help me!"
IF you haven't but in the hours to where you understand what you're doing, don't open anything in these sorts of threads since a decent amount of time it's a Jew on other end rubbing hands gleefully waiting for some newfag to open something.
Easton Perry
This is infinitely more likely than v&s
Evan Campbell
Yeah, fuck me then, I don't have money for that shit
Kayden Nguyen
Sure but consider that these are big financial institutions with standardised procedures. That system can be studied and learned. And since it's probably automated and outsourced to a security IT firm, no admin has a personal work ethic to be extra careful. The faceless corporation brings faceless responsibility, and in the end, no one is responsible.
Kayden Morgan
How about putting them on The Pirate Bay?
Parker Sanchez
And then what? Store that information on a list of potential terrorist subjects that dont get acted upon until an actual attack takes place?
Daniel Hill
I survived yet another night, gonna poke abit more today, tho I'm thinking of switching places while trying it out, as of travel across the state
Andrew Thomas
So, how about that Clinton Foundation? I'm sure there's some juicy details to be found in that.
William Walker
Tech retard here. What about ordinary people's bank accounts? Will those be affected? Can they be emptied, for example?
Nolan King
Layman here. I don't know. It doesn't sound like the ordinary typical Russian grammar mistakes to me. Those tend to always be very distinct and always sound very Russian. I get the impression this is a deliberate attempt to sound worse at English than necessary probably in order to cover their tracks. They use quite advanced words but is yet fucking up more grammar than is necessary.
Eli Ortiz
You're downloading a load of hacking tools, what do you think your AV software is going to make of it?
Carter Stewart
How can we use this to destroy Kushner?
Jackson Cruz
Made frontpage on RT: www . rt.com/usa/384082-shadow-brokers-nsa-password-trump/ Archive: archive.fo/pZGTx
They kept the most important part of the message from The Shadow Brokers, I'm impressed:
Juan Stewart
This! Don't be stupid lads, take back the money.
Luis Parker
take down Media Matters et al. Soros NGOs WaPo NYT Univision Amazon Starbucks ANTIFA/SWP/BLM/marxists sites you know the drill
Username databases/passwords should be mined whenever possible.
Jack Wood
Why would you even bother with going after governments when you can go after colluding tech companies and media producers and talking heads?
Wouldn't it be neat for some Holla Forumslack or /baph/renologist to get their own written news segment on CNN acted out by Don Lemon and Anderson Cooper?
Tyler Williams
its more about diverting European customers from Russian hydrocarbon exports - thus strangling the Russian economy
Connor Mitchell
Lads… I hope you understand that not only do we now have the memes of production, we have the memes of destroying globalists and anally ravage kikes. This is a fucking treasure. Not because these tools work, because they won't work for long, I assume… This is a treasure because we, techies, can see the approach taken to exploit systems and we can improve it. I don't think you faggots understand, but this might just be the deathblow to kikes.
Hunter Campbell
sure kid…
Hunter Taylor
Yep, government work is still government work. These tools and methods will be the absolute minimum to fulfill the terms of the contract, and nothing more. Government produces nothing innovative by design.
Adrian Wilson
Honestly this looks like a specialized wireshark for linux for compromising mainstream apps and TV devices. These were meant for eavesdropping purposes. You want penetration get Backtrack.
Oliver Sanchez
Just… just so non-techies understand, I worked for a while as a network engineer for an ISP. Do you know what percentage of your calls go through the internet? Yep, it's 100% Do you understand that the internet is vital for things like Air Traffic Control and military communications? I don't know what your name is, "Shadow Brokers" and quite frankly, I don't care. I just want to thank you from the bottom of my heart, just in case you're lurking around here.
Think of what you can do when you have extinction as your only option to destroying the kikes… I mean, forget about free enterprise and monetary motivation… having a loaded gun to your temple is more of a motivator than any sum of money.
Backtrack fails miserably when it comes to high capacity data transfer, which might be needed if you want to copy a database in the middle of night.
Caleb Brown
The fuck are planing on downloading? Video/audio surveillance files? If you're after DNA sequence data or bank transactions that's just a txt file. And these exploits aren't made for banks to begin with.
Kevin Rogers
Think of the Ashley Madison database. What was it? Like 13-15 GB? Things of that magnitude are what I'm talking about downloading.
Blake Jones
Don't you kids remember when they exposed the names of the operations and sects of the NSA?
Can't you remember they used vidya names for their stuff? Because they're on the top of the reddit food chain 'n shit.
Call this a false flag.
After all, we can't actually use the tools.
Juan Johnson
Blackmail and insurance files, too. How big was Weiner's Life Insurance directory? That is the kind of thing that needs to be published.
Jonathan Miller
if you use these with windows you deserve everything you get.
Get a second hand disposable laptop. Powerful enough and portable enough. Remove Shitdows, fully wipe the drive. Install any unix OS you want. Learn to wiretap Find backbone nodes in your country (most of them should be in tunnels with fuck all surveillance) Establish a Shadow Broker Listening hub(like the ones the CIA and FBI have but better) Start penetration. Most of them will be expecting a routed IP address from Chinese ISP, not a direct Tier 1 or 2 backbone connection.
We Shadow Brokers now.
Ryan Nelson
I'm not sure about this but axaxaxaxa penis is a dick
linux works fine dude. Probably your machine's built in spyware (windows)
Joshua Lewis
OPSEC is all fine and dandy, but as long as hardware-level exploits remain, nothing is safe. NOTHING. Intel processors are notorious for this. People are pressuring AMD to make their stuff open to the public, which is a step in the right direction. I don't have a good understanding of it, but basically your CPU has some base functions that it runs even before the operating system that do some shady shit.
Joseph Bell
you mean bios booting level shady shit?
Connor Bailey
ALL cpus are compromised. ALL of them, there are pretty much no exceptions. The reason why stallman uses somekind of weird chink laptop and why that exact shitty chink laptop is so extremely sought after right now is because its one of the few that isnt backdoored.
But the CIA or NSA now? Has an office in the taiwan manufacturing plants.
So if you got information that is EXTREMELY critical and of life and death for a nation type of thing. You probably shouldnt have it on any kind of commercially available system connected to the internet.
Though honorable mentions should be given to things like the blackphone. Also the mobile processors are somewhat open, trade secreted still but open to licensing and thus other companies.
Other than that. Nope, probably not much you can do as intel has somekind of management engine or something faggy that they call BEFORE the processor. Meaning it can directly receive instructions from the internets, doesnt matter what you run on it.
Landon Myers
The chipset you're looking for is called Loongson, and yes, it is very hard to find any kind of hardware that uses it. And if by some miracle you do happen to find one for sale, be ready to shell out a few thousand bucks for XP-era power.
Isaiah Brooks
I wonder why china just doesnt make more of them. If there is such a huge demand for them. They dont even need to have good performance. Just basic security stuff.
Kayden Smith
The moment they do, they're going to get a lot more knocks on their door from the government. Some team members may suddenly jump out of windows, or become targeted by muggers and the like.
Xavier Ross
I am pretty sure that china is a big nation and can play the game of subterfuge as well. For you…
but yea, I dont think that the US has enough agents and assets, or money to prevent that from happening.
They could literally corner the world market if they did something like that though. Just create an open source computer china. Get loads of big bucks.
Lincoln Hill
Maybe they think if it proliferates enough it'll make itself more of a target for US reverse-engineering? Or maybe US Customs makes their life hell when trying to export here? Or they're just lazy chinks.
Brody Evans
That's good, but you should check your browser directory from time to time (directory path all depends on what OS you use)…
Make sure you manually add that to CCleaner settings to routinely wipe those out, I hear Bleachbit will erase some of these files too (they caught on early as well).
These files will stay in the directory no matter what browser settings you have, and store info. The only way to get rid of them is to have them set up to be purged routinely (they will always come back and start collecting info again).
Connor Martinez
The 'muh russia' narrative just keeps falling apart more and more. I hope the NSA is enjoying their star trek movie set courtesy of US taxpayers though.
Carson Hughes
Checking the dubs of an user of excellent tastes. This is an excellent point and precisely why they don't have the right to rule. That, and the fact that hierarchical monopolies are inherently degenerative and unstable.
WTF is really going on
The (((international corporatist state))) is looking to put nails in the coffins of the Cold War intel states by presenting itself as the only form of government that can prevent nuclear war. That's how national boundaries are eliminated. Globalist thesis fights nationalist antithesis. Nationalist antithesis nearly blows everyone to pieces. It's written in the sky. However, there's another nascent option. And when the time is right, it will come to power.
I don't want to present this entire thesis yet, since I'm still working on it and the stars haven't properly aligned. I do feel comfortable laying the foundations for discourse in light of current events. Hope is needed.
During the Enlightenment, political philosophers turned to the past for ideas on the structure of future governments. That same ritual is being reenacted now, although with the late-industrial era structures of Fascism and Communism. Ultimately, the Republican government that arose from the Enlightenment had far more to do with the technological advancements of the era than the Greek and Roman systems. The mail service, which distributed news and pamphlets, was so critical that Napoleon commented on it. While the power of the fourth estate was later corrupted, at the time it was so important that it was protected by the Constitution.
Knowledge is power.
I've said it before and I'll say it again: the internet itself is the future king. It's time for a serious discussion to begin on how to construct an Open Source government. And what that might really look like in practice.
People must be able to present a system that could function as an alternative to corporate globalization when the time comes. And make no mistake, that time is coming fast.
Jack Mitchell
Their sectors are so extremely bad and unregulated. Most steel and other goods have a reason why they are called "chink shit", its because people backstab, cheat and lie all the time over there to fuck over people.
You really think that it would be so hard to assemble a team of what? A couple of hundred engineers with some knowledge of cpus to make something like that?
There are people building cpus inside of FUXCKING MINECRAFT
There are also people who are building extremely crude cpu's from off the shelf materials in DYI places.
I cant imagine it being that hard for a nation that has a lot of patents to steal from and who also has some sense of mobile performance to make something specifically target to the paranoid.
Evan Clark
Just one issued by an Avaya SCN. It would indicate that they use IP phones. Lots of companies have them.
Julian Bailey
and open DNA profiles to eliminate all jews traces.
And also one very heavy and angry secret police that watches for (crypto) jews. In general.
Hunter Kelly
Are you implying this could lead to fucking with Globalist private jets?
ya'll niggers need to learn the art of subterfuge. Cleaning browser data everytime means it's gonna download cookies and other shit over and over again. Which is picked up automaticaly when x number of times it has been downloaded. You need to fool the bot into thinking you're just another furrshit socialist jacking off to cuckold porn or something.
Remember kids MAC addresses (physical) are unique to NICs so are IPv6. The only way to evade the system is to make a new physical network.
Kevin Barnes
At some point the 'undernet' (for lack of a better term) will spontaneously come into existence. Maybe MESH, maybe basic FM/RF, maybe piggy-backed on electrical lines, who knows. But the migration from the globalist-controlled internet is inevitable.
Jason Young
>>>Holla Forums taking it well?
Nathaniel Lewis
Which is exactly why I made clear that you need to purge these cahced files routinely , which one can do if they properly configure Ccleaner or Bleachbit. Of-course they come back, that is to be expected. Once you configure your 'bleacher' to purge these cache files, all it takes is a quick click to wipe them out. Do it routinely and you have nothing to worry about (as far as browser activity logging).
Combine this with other basic COMSEC like a decent cheap VPN service, forward secrecy, security addons for your browser (Noscript, any kind of Browser Agent spoofer, HTTPS everywhere, Tinfoil, etc.) then you are pretty secure.
Also, never leave your internet connected when not in use. That helps with OS security a lot.
Samuel Russell
You most likely will be secure from automated systems, and making you a lot more expensive to hack. But the only thing you are doing is raising the dollar value. If they really wanted to they could just use the intel/amd backdoors. Though obviously they dont use those lightly as it could give away their advantage.
James Morales
hmmm, my copy of the Gentoomen library is 3 years old does anyone know of a more up-to-date compilation somewhere?
Adam Williams
Let me say from experience, Chinkshit aside, China is SERIOUS about expanding its industries. It makes absolutely no sense why China isn't expanding into the CPU/hardware market. I know certain researchers in the US who were given VERY lucrative deals to return to China and commercialize their research there. The Chinese ought to be throwing money at anyone who wants to make a computer hardware plant in China. I know they have some CPUs that are made in China for their own military, but I don't know about any for the civilian market.
Ryan Sanders
they must hold a tremendous amount of pressure on china then. A fuckton, to not let them do their usual chinky shit that they love doing so much. Jesus what a mess we live in.
Aaron Hill
This is to be the working of a Sikh leaf posing as a worst korean.
Anthony Foster
Don't forget before using Noscript to wipe out the whitelist and re-configure the whitelist to suit your own browsing habits. Also make sure you block all global scripts. Have something that obfuscates GET requests as well (Random Agent Spoofer works pretty well, you can even disable webgl among other things with it too for extra security).
Kevin Mitchell
BAKA. That's exactly what I meant. Anyone looking at it server-side will see a single IP/MAC downloading the same authentication/handshake sequences. Nevermind that it's useless busywork since all that is in a server log anyway.
Josiah Wright
Very true user.
That's why I use multiple computers, each designated for a specific activity. (Example: one for work/legit legal purposes; another one just for shitposting on chans, pirating media or fapping off to porn; another one completely air-gapped [no bluetooth/no wifi] mostly for storage purposes / ripping media / copying DVDs and CDs, etc.)
Don't put all your eggs in one basket, and for God's sake never do anything illegal on a PC that has ANY personal info stored on it.
Ryan Robinson
user please
Camden Torres
they also have an air gap thing that they love so much.
I think they can also extract some data from the HDD/SSD signal/lamp. So a lazer to your window to listen to the sounds inside. Then they could extrapolate some sense of small data packets.
Then there is also the EM radiation. All currents on a copper wire give off a signal (thats how radio broadcasting actually works lol)
so computers, but also all other tech emit some form of that.
The lack of standards around shielding from chinese laptops is the worst offender. But I think that most other hardware these days is a bit less sensitive because they made it more lightning proof. Resistant to outside EM interference (it has better shielding)
But yea. Its a very paranoid game and if you actually want to have a fully secure thing. You would need to put anti laser listening things on all of your windows. Then you would have to shield your PC a bit more. Then you obviously would also need to get those wallpapers that block ALL things, WIFI (which can even be used to detect objects), but your cellphone, they are listening to that as well.
Man I am 28 but it feels like I am becoming older for some weird reason, since a lot of people dont know this.
Nicholas Campbell
Can we please ban all cuckchan niggers who think using "wtf" is acceptable here?
Elijah Rivera
Yes! Virtually all communications go through the interweb, you only need to intercept and change parameters. For example tell the pilot all is well, while he's flying into a hurricane.
Gavin Butler
There's bound to be more leakers and there always will be. You can't expect everyone to agree with you and especially not when regime change is involved i.e. the presidency.
Landon Morris
can't wait for all this to be patched
Jordan Jenkins
There's still the hardware backdoors and the NSA's motherlode of zero-days to contend with.
Joseph Walker
Yah, there is not too much the average person can do about this shit, however the NSA/CIA don't target the average Sally or Joe with this type of expensive and time-consuming surveillance. You really have to put up a red flag for them to target you this way. Fapping to porn or pirating media for your own entertainment? They could give a rats ass about that petty shit!
The more people that use basic COMSEC (as mentioned in several comments above), the harder it is for the spies to find out who is who, at least that's the way I think about it.
Sebastian Roberts
well I am going off from the fact that I live in a very, very big surveillance state, the netherlands, and I was already on a red list for a long time. I slipped up many times and still I am not arrested, so whatever I got around me right now, still isnt enough to upset the worst of them lol. Probably being monitored but lol I also had a VPN for a longass time but…yea. If you arent flagged then this might be good for you guys.
(I did some dumb shit when I was younger and was put on a red list for the cops, the same list where gun owners are on lol)
Isaac Evans
I live in the US, and in my neighborhood every other individual living in my community owns a gun, so I doubt the "deep state" cares to even attempt spying on 100,000,000+ gun owners around the US. Possibly in your country if gun ownership is very uncommon then the police may flag you for ownership.
To be on a list in the US you have to be doing some pretty shady shit to get yourself flagged. The problem is with the dragnet surveillance itself, where they can pull up your internet history at any time. That is where OPSEC/COMSEC comes in handy.
Jeremiah Adams
It would be very useful if you could get somekind of somewhat secure, but also dumb proof thing for EVERYONE, at a fair price, some VPN providers do provide that. Some ad removal, some tracking things removal in your browser.
Ghost VPN is what I used before but now, not sure. It still costs shekels.
Anthony Reyes
I guess ==OPERATION FUCK BITCHES AND GET MONEY is a go== then?
Adrian Barnes
Correct. It's only illegal for people holding a security clearance. GovernmentAnons here know to steer clear of this dump or anything released by Wikileaks.
Jose Lopez
ask someone to upload it to mixtape.moe
Lucas Morris
Yeah, basically it says you 4 chan faggots need to go back
Colton Evans
1 Make sure it's not being watched over by anyone. 2. Go in. 3 see if there are any cables there. Most likely they should be fiber optics but I dought they have gone through the effort of getting the infrastructure up to date. If it's a normal cable they deserve to get tapped. 4 Go full russian in there
Do note that if you fuck up and damage anything the police is the last thing you need to worry about. Other channers will skin you then hang you with your own skin,
James Cook
Reminds me of the screencap "urban warfare: just fuck my infrastructure up" noting that you can easily break an optical cable and they'll spend hours just trying to find out where it happened. Doesn't make sense to do it as a lone wolf or in a central ofc.
Cooper Robinson
Good idea.
Lucas Rivera
Don't you like living on the edge? Don't you like feeling alive, user? So many people are clicking that shit, that your click will (probably and hopefully) be drowned out by all the other people clicking that shit. Not a lawyer, and it might be in some countries/jurisdictions but when was the last time you heard of a random nobody, without security clearance v& for looking at public leaks. The closest thing I could think of was 1. The Washington Times: Military ordered to stay off WikiLeaks | 2010 August 6 | archive.is/TC70Jwashingtontimes.com/news/2010/aug/6/pentagon-bars-staff-from-visiting-wikileaks-site/ Pentagon b& military personell from reading WikiLeaks. If you are not attached to the (((Pentagon or the US Military))) this does not apply to you. 2. World News Daily: Army bans soldiers from reading about NSA | 2013 August 1 | archive.is/C41Dgwnd.com/2013/08/army-bans-soldiers-from-reading-about-nsa/ US Army b& military personell from reading The Guardian's report on the Snowden revelations. If you are not a member of the US Army, this does not apply to you.
This! And besides, even if it was (((illegal))) to read these documents, I'd argue that the insight gain from looking at them outweighs the risk associated with reading them.
Cypherpunks have been saying for decades that it's impossible for the government to keep its exploits secret. Will people now wake up and realize NSA, CIA, FBI, etc. are completely useless at protecting us. Even with mass surveillance, terror attacks still happen. Either MA doesn't detect attacks in wich case it's a waste of money and resources or they (((let them happen))) and we are ruled by people who couldn't care less about us.
Hudson Flores
What the hell. This is about getting connected invisibly, not wrecking the fiber cable.
Carter Richardson
This is why I said go full russian. Don't you remember when russian hackers hacked those trucks of peace without getting caught?
Mason Wilson
yeah but… if people really need that cable fixed they just quickly and cheaply replace as much possible with cheapest replacement crap cable and then fix the large optical one in a worksop while the emeregency replacement is functions at less than tenth of the old expensive wires capacity, it still works just slightly slower.
Jason Sanchez
I agree with this user. Probably won't get v& for downloading this. Using it is likely to result in consequences, but so is hacking anyway right?
I'm actually really excited to go poking through these files. NSA code is always talked about and held up as some sort of enlightened mystery school shit written by alpha-autists and shrouded in secrecy. I wanna see if the reality lives up to the hype. And I also need to know what to expect from the next wave of script kiddies trying to fuck my employer's servers up.
But yeah, I downloaded these impulsively in Chrome on my cell phone because all my other shit is above-board and squeaky clean AND I have valid professional reasons for viewing this code. The only reason I'd bother to use heavy protection or avoid these files altogether would be if you have other illegal stuff or otherwise have reason to fear a visit from LE.
As an aside, I'm looking forward to entering the new Shadowrun world with all you faggots.
Jason Price
these guys are going full "Hack the Planet" never go full "Hack The Planet"
Chase Cruz
I agree with this slavglish observation
Asher Brown
what if I just want to hack something that means I can put some money in my bank account? cause I gotta make a couple grand by the end of the month or I'm out on the street. lost my job, business failed, massive debt from trying to keep business afloat.
can I steal jew shekels with this?
Colton Watson
I'm so fucked
Jack Brooks
pfft, whoevers using SunOS or OS/2. is living more cash strapped than you
Jackson Garcia
I almost wonder why it hasn't already happened. You'd think the megacorps would get sick of being hacked all the time. Sheer inertia? Alternatively, maybe it's stupidity. Last I heard, TPTB still believed in a magical "golden key" for backdoors that could never be stolen and used against them by foreign governments. You'd think the whole Snowden thing would've made them less idealistic.
so what you're saying is no, I can't steal shekels from the kikes that are trying to ruin my life.
Jose Hall
not in the way you think this dumb "leak" is nothing in this release is of much use
youre better off shorting a stock then hacking a twitter account and declaring a CEO dead
Nicholas Johnson
(checked) Truth is, the true redpill is that Trump leaked this information to us, for us. We have to help him and help us, eliminate threats, gas the kikes through this tools and fight for the God Emperor and the white race.
Zachary Taylor
This. If there's ever a shooting war it will be exciting to see what kinds of exploits are laid down to bare metal.
Aiden Jackson
TODAY IS THE DAY since I dont have much to live for, I give myself as a sacrifice for Holla Forums to know the truth, Imma try this scripts, but what should I do with them? Tell me faggots
Jaxson Sanders
looks like someone else is losing control of their toys archive.is/10UoU
William Evans
I can't join, don't know shit about programming.
Mason Sanders
Weird timing to release this, i take it shadow brokers are intelligence
Kevin Ross
same, I feel like they had the most invested in Trump their lives
Jackson Parker
Rootkit checker for linux is ready. I don't care, i just want to die tbh, github.com/NoahGWood/EQGRP It's in the folder "NSA-Check" Requires python2.7+ cd into the folder and run it with: $ python NSA_Check.py if you need to you can cat the output to a text file: $ python NSA_Check.py | cat > output.txt
Jackson Ward
are these the files talked about in the Vault 7 leaks?
if so, does this mean privacy destroying NSA programs are in the hands of trolls and hackers with no morals?
Dylan Wood
wow you must not be from around here. we are a board of peace and safety and support traditional values.
also I'm being told these exploits are about useless.
Kevin Foster
Stallman uses a librebooted x200 last I saw. As for phones, you might as well use a burner. Anything with a sim card is compromised anyways.
We're all fucked. Most operating systems don't come with essential security features built in. For example, Tails and most linux distros don't even have grsec/pax patches applied so they are useless. Anything not open source is just laughable. Even if you do run a decent OS you'd experience the constant paranoia of running shitty software that could potentially compromise your hole system.
Your best bet is to check out OpenBSD or configure your own grsec&pax&rbac linux setup (gentoo, alpine, arch). The main problem is that grsecurity is not available for stable kernels, and you'd be insane to run testing code while doing anything remotely critical. On the other hand, OpenBSD seems to be lacking in the area of software and requires a lot of homework to get right.
Can't you just disable browser caching?
I heard that hanging a bunch of blankets on your windows can mitigate laser microphones and other forms of eavesdropping, but even then I'm sure they'd have other ways to bug you.
Joshua Ross
How much does Holla Forums want to bet that the the CIA is running the biggest ransomware rings, and is behind these "Chinese scammers". Money for projects too secret for even black budget has to come from somewhere.
Carter Sanders
disregard unintended pun
HardenedBSD, LionBSD, and Subgraph OS also seem to be promising projects which I'm currently keeping my eyes on.
Henry Kelly
I think you have misspoke, there is no need to frame the Jews, all we have to do is expose the crimes they have already committed. Hoaxes are the tools of the Jew, not us.
Noah King
tbqhfam this.
Isaiah Garcia
fuck off kike
white people don't "frame" anyone
Austin Russell
You know Teddy talked to Acquino every single day?
Charles Reyes
Yeah. Let's just get rid of voting and give the power over to corporations.
Parker Morris
Can I hack to some bitches facebook or nudes? Very important.
Henry Wilson
...
Lucas Lopez
elite families stick with medieval means of communication for the most secret infoexchanges, mail and meetings. If the entire internet is compromised and everyone/thing online is fucked including rsa encryption then guarded and brainwashed mailmen seem great. Hunt them postguys
Christian Russell
hi cointelpro
Luke Wilson
The entire internet is recorded and can be paused, rewinded, fast forwarded, while specific data streams are isolated and followed around. An AI does a lot of this processing, with help from Google, who are longtime partners of NSA
Noah Morales
If that were true then why are we allowed to do what we do?
Lucas Nguyen
Why are we not focusing on the important stuff here?
it'd be the fappening 3.0
Hunter Stewart
source?
Grayson Moore
And what exactly it is you do that is oh so damagin to the real rules of this planet. That is ~1000 elite families in the shadows, lobbying and controlling the money flow(possible fucking aliens included). Unless you wipe out international markets, facekike, and massively redpill normies theyre basically slaves with revers-tithe still in use(only under different name), you aint doing shit. Global politics are a facade and a distraction, NWO is 95% done, and Bilderberg meetup is possibly the best honey pot ever invented FUCK This leak is only babytier first step to doing something actually important, there wasn't any time to react on their part so don't sweat around thanks god those 1000 families have tremendous infighting among themselves that slows down the globalisation process, when you're a peashooter they don't care about you - the slave
Grayson Hill
I swear I'm gonna kill them all.
David Wilson
It is and I'm glad someone finally realized how grim things actually are. The only sensible solution to this problem is to wipe out the non-whites with a viral based weapon. This isn't defeatists it's realism.
Furthermore their elimination of borders will do precisely dick to stop wars. Who the fuck will want to have offspring with inbred kebab or AIDS infected niggers? Most kebab die at age 30-40 from inbreeding related genetic illnesses. Military age ends at about 28 for them after that they start getting real problems. Why do you think they use so many kids for child soldiers or blow themselves up?
Jose Ramirez
It is defeatism, you nigger. What, the NWO wouldn't create some decoys and red herrings? Their whole deal is being the invisible circlejerk that stands above all other circlejerks.
James Adams
My chief concern about something along those lines is that an airborne strain would be too effective, and an STD likely wouldn't be effective enough because if the subject is ill enough to perish they certainly wouldn't be fucking.
What about sexually-transmitted sterilization?
Isaiah Long
...
Grayson White
...
Zachary Johnson
What I'm thinking is short range transmission air borne virus. The kebab live tightly packed in closed off communes. An air based Ebola variant with melanin targeting. Something that kills the target fast enough so that an immune response can't make antibodies and doesn't mutate so it doesn't get out of hand.
Can't risk a kebab grooming gang or a rape sterilize white children.
Ryan Anderson
you can't get the shitskins already in europe like that. no, you need a genetics triggered virus. find genes only ethnic jews and mudslimes have, crispr up a virus that can only replicate using cells with those genetics once they hijack the cells for reproduction, and release. make it fatal but have enough time for hosts to infect more people or release at multiple locations.
William Fisher
you would have to be extremely careful that the virus can't mutate, and that you successfully isolate certain genes that only your targets have. fuck up even a little and you've got a world ender on your hands.
Cameron Price
See, that would work well for countries that could easily be cordoned off militarily because of how their developed contact is otherwise limited, but if that airborne shit gets on a plane and gets to a metropolitan area, it'll be fucking mayhem. Especially if it ends up in Europe in the midst of the mass immigration, which is the last thing we want. Also, another reason I said it would be too effective, is that if a disease kills the host too rapidly, it doesn't have time to spread. It's the reason ebola has a hard time getting any real distance even in a shithole like Africa, and simply hasn't really ended up in India despite the fucking atrocious hygeine. Compared to the potential losses caused by a deadly airborne strain, I think the limited numbers caused by the sts would be somewhat acceptable, given that whites increased their replacement rates appropriately by then.
Keep in mind that with genetic-specific plagues, they easily vector-hop to a new species or sub-species, especially. Hemorrhagic fevers frequently come from ground rodents or bats, as an example. Imagine how much easier it would be for a targeted virus to hop from one race to another in comparison, and I think you can see the faults in that suggestion.
Misinformation. This collective of "hackers" has not proven they're who they say they are, and the note to President Trump, purposefully written in broken "Russian English," is nothing more than an attempt to get our so-called "news" agencies to imply that Russian hackers got Trump elected.
This is utter bullshit, if there was a leak in the NSA involving their toys, it was an NSA employee that walked out of their offices with it in his pocket.
the BO of /polk/ behaves EXACTLY THE SAME WAY AS Holla Forums BO and mods. (the archives above are a great example) they delete all the same exact things, and give the same shitty excuses. I would not be surprised if /polk/ is run by exactly the same people as Holla Forums.
in fact, Holla Forums /polk/ and Holla Forums moderation, volunteers, mods, board owners all exhibit the same exact behaviors. do not be surprised if they are all the same group of people all working together to manipulate everyone and disrupt the spread of the truth.
after some serious critical thinking about the events taking place in the present, and seemingly unrelated experiences in the past we have uncovered the extremely strong possibility that /a/ and Holla Forums to a moderate but slightly lesser extent were shill testing grounds for the disruption and culture molding tactics to be later used on Holla Forums, Holla Forums, and /polk/, only moving on when the community had been permanently ruined. they needed alot of training because /a/ didn't have the willpower and the meme magic that Holla Forums
The moderators are banning people who out them. The moderators are banning people who do nothing more than link to threads on the /sudo/ board. The moderators are banning people who QUOTE POSTS from the /sudo/ board. The moderators are REGULARLY banning groups of 70,000's of IP addresses (in explicit violation of the site rules against doing so). The moderators make a point of banning people who explicitly violate No BOARD rules, SITE rules, or US LAW, while also EXPLICITLY leaving up content that violates rules.
You need to go. This is a nigger communist tier understanding.
KYS.
Benjamin Turner
lel
Jacob Garcia
He tried to warn us.
Henry Brown
I hate to cause more fear, but there is something called "supercookies" too, which are enabled by flashplayer and javascript. These supercookies are very difficult to find and get rid of. Another problem is these supercookies will reappear after you delete them. This is one way the NSA is able to uniquely identify Tor users is through the use of tracking unique supercookie IDs.
I found out there is a supercookie in Firefox called "SiteSecurityServiceState.txt" I did some research and this is something called HSTS tracking.
When you "wipe" the browser history in the settings, this supercookie will appear in the browser's directory and can be used to track users who have privacy settings on.
I have added this to CCleaner to wipe out routinely, but like many other supercookies it will just come right back.
Or maybe spilling the beans to save their own ass.
Elijah Sanchez
ok
Jaxon Bell
I my mind, I'm always a winner in my wife's son eyes
Ethan Perez
Problem is it's not just Windows where supercookies can be used to covertly track you. Every Operating System is vulnerable to supercookies if you don't take the right steps to mitigate these threats. And yes, even Tor utilizes Mozilla's platform so HSTS cookies (among other superccookies) can be used to uniquely identify your activity.
This does not necessarily mean they know exactly who you are, what this means is that they can identify you browsing even when you change IPs and clean out your browser history / web caches. You can routinely wipe these supercookies out (highly recommended) but they will still come back every time with new IDs to track you again… and again… and again…
Dylan Turner
Please tell me more about how to clean these supercookies
Charles Walker
Yes you faggots, your antivirus will bitch, these are exploits not episodes of MLP
David Myers
Have to admit, 'supercookie' sounds kind of delicious.
Colton Bailey
Well this is rather tricky user. The reason is the directions would vastly vary, all depending on what Operating System you use (and what edition / version in use)…
I'll give you an example… in Windows XP (SP1 & SP2), you could find some of these supercookies by going to the following directories:
xxxxxx = your 'user name' or login alias
C:\Documents and Settings\xxxxxx\Local Settings\Temp\ C:\Documents and Settings\xxxxxx\Local Settings\Application Data\Temp C:\Documents and Settings\xxxxxx\Application Data\Macromedia\ C:\Documents and Settings\xxxxxx\Application Data\Macromedia\Flash Player\ C:\Documents and Settings\xxxxxx\Application Data\Microsoft\CryptnetUrlCache\Content\ C:\Documents and Settings\xxxxxx\Application Data\Microsoft\CryptnetUrlCache\MetaData\ C:\Documents and Settings\xxxxxx\Application Data\Adobe\Flash Player\AssetCache\
Here is where the HSTS supercookie would be located:
C:\Documents and Settings\xxxxxx\Application Data\Mozilla\Firefox\Profiles\randomID.default\SiteSecurityServiceState.txt
Here's what I recommed you do: do some research about supercookies, figure out where these would be stored within whatever OS you currently use, when you identify them, research some tools you can use to routinely "bleach" them off the OS. Something like Ccleaner (for Windows & Mac) or Bleachbit (for Win/Mac/Linux) would likely have some configuration settings so you could add the supercookie directories to purge out these files. However they will come back later on, and you'll have to routinely bleach them every other day.
Noah Gonzalez
I am not sure if its entirely related to this thread, but I have been thinking as to shareblues strategy. You know how the CIA tries to identify our organic structure and try to make it work?
I think that we may be facing a new treat soon. That of organized narrative weavers.
When a conflict thing arises, they may want to shape the narrative through google, through facebook and maybe even through youtube, in a coordinated fashion. From the top.
They could have an army of blog/article writers, who then get propped up directly in the google results. And then also propped up on faceberg.
I got a feeling that with the syria thing they already gave it a test run.
Samuel Gray
Thanks
Adam Russell
Here is a Youtube video about how to disable the "supercookie" settings.
How to disable DOM Storage in Firefox and Internet Explorer - Also known as Super Cookies
You can also use a Firefox addon called Random Agent Spoofer to disable DOM storage. NOTE: if you do this, some web functionality for certain websites may no longer work! Some websites require DOM storage.
Connor Morgan
user, the excellence is on you, this is exactly what i have thought aswell.
In return, i give you a way to hack your brain to new hights so you can realise your ideas into practice, if you are not already, or more so.
TLDR: Take 10 or 20 mg of legal supplements PPQ + Ubiquinol and put a cheap infrared LED lamp from amazon or ebay (link on website) to your brain every other or every third day for about 30 sec to 1 minute or a maximum of 1.30 minutes on each EEG spot.
Then reap a boosted brain to write code and learn new things to make the happening happen.
"If you are writing a political manifesto that is not in code in 2017 you are doing it wrong."
Michael Cruz
That is PQQ and not PPQ
Kayden Perez
I've got a related request for any Anons that happen to have other alphabet agency leaks.
Does anyone have the leaked CIA subversion manual, specifically the part where it says women are best subverted emotionally while men respond to 'qualitative argument'? I've got a feminist friend who is undergoing a long-term existential crisis over my views and wants to see my evidence.
Jose James
DOM storage includes sessionStorage, localStorage, WebSQL and IndexedDB… basically all client-side storage solutions… some angular sites might stop working for you guys
Jace Collins
I'd hit that like a free taco bowl polite sage
Noah Flores
Also, the IR LED that you buy should have a wavelength of 850nm and the amount of Ubiquinol (better then the suggested CoQ10) can be tested to what you think is a sufficient dosage. They are sold in 100 mg bottles, get a good manufacturer.
So again.. TLDR
1. IR LED lamp with 850nm wavelenght
2. Put the LED lamp on all regions of your brain before you go to bed for 30 sec to a maximum of 1.30 every other or every third day.
3. take about 10 / 20 mg PQQ + Ubiquinol (50 100 or 200 mg) and Shilajit (optional in my opinion but is individual for it to work, so try all suggestions)
Note that you will get a brain boost and will be learning faster and more efficient, but if you do it too much you will get setbacks and the opposite effect, it's not an exact science yet and very fringe in the biohacking world.
If you get the opposite effect and overdo it, cold showers or a cold bath will help to ease the effect. But less is more is a good rule when overclocking your brain with this method,
Enjoy putting ideas into code and get more done. Pic related for good diet as additional help.
Gavin Miller
Things were pretty damn weird to begin with. Quantumly weird.
Lincoln White
Look into "BDNF with RDP glycoprotein" For ultimate intelligence boost
Carson Myers
So who is the hacker known as Holla Forums going to strike next?
Oliver Perez
this
Parker Edwards
dejavu did you post like this 4 months ago?
Joshua Walker
You missed an opportunity here user.
Also I'm debating grabbing one of these old beater laptops I've got lying around, heading over to Wendy's, and seeing what I can get into with this. I'm more of a hardware guy though, so not much probably.
Gabriel Hughes
Nope, it's still a majority that believe most of what they hear in school and media. It's just a tiny bit of skepticism when the news is blatantly contradictory.
A democracy cannot work with full suffrage. The votes need to be limited very dramatically for it to not destroy itself.
Austin Lopez
Answer: They are mocking the MSM bullshit narrative of the allegedly Trump Russian connection.
Also a hint of the NSA pretending to be russians in their own attacks. Shadowbrokers are trolling normies and MSM for the lulz by futher obfuscation of their identity by continuing to present themselves in that narrative.
nah. If you don't actually run the shit you'll be fine. If you do run it, most of the exploits seem to be geared towards Red hat linux specifically so don't use the RHEL kernel release or compiler. or just use strings to find out what it does before you run shit like a normal person.
Aaron Flores
girls cute but her nose has definitely been broken
Carson White
Where's the opsec thread when you need one ?
James Lee
When you absolutely positively are only going to tell her once.
Connor Jackson
Lrn2english
you know 99% of people here aren't going to sandbox it before using it.
you're also tacitly assuming WYSIWYG, which is a fucking terrible idea with anything NSA related.
Joseph Wilson
...
Christian Lopez
You can tell by the rhetoric that they are lolbertarians. The freedom caucus to them represents "the movement" - so they see themselves as aligned with people like Rand, and somehow that group as having elected Trump. Very narrow view of the political landscape to call the freedom caucus the representatives of the movement.
Christian Garcia
Ok, then explain why so many people voted for the Jew or the woman.
Jeremiah Baker
There are so many 0-day exploits here that potentially someone could make a new Internet Worm out of it and hack and wipe nearly every computer in existence.
Nolan Wright
What did he mean by this?
Camden Moore
...
Aiden Carter
someone who rapes newborns
Jonathan Roberts
man tee
Liam Sanchez
theyre all really outdated. But it shows that they pwn E V E R Y T H I N G. They probably have exploits for all the latest softwares too.
Ayden Hall
Lol. the internet is not vital for military. There are many other "internets" and worldwide networks that are both classified and unclassified.
See MILNET, NIRPNet, SIPRNet, RIPR, Joint Worldwide Intelligence Communications System (JWICS), Intellipedia Protected Distribution System, Crisis Response Operations in NATO Operating Systems (CRONOS) is the NATO equivalent of SIPRNet
I know for a fact DHS has their own classified network, and other agencies likely do too. To say nothing of the more classified intelligence networks.
The internet is one of many worldwide networks, completely controlled and monitored by them. All internet traffic is recorded, and can be rewinded through, replayed, data streams isolated, and likely an AI manages a lot of this work.
Tyler Howard
I would rather not do what this man of taste is reccomending, but that's not only because I am scared to death of new things. I believe in our own directive to be far superior when directed not by our egos, sense and logic, but gut instincts, experience and intuition. In given circumstances man quickly evolves his exeptional brain power. We need balance in the whole of our being to bring out the best in us. And no, I don't refer to ripped bodies, halal-veganism and other top-down mentality-directed elitism. If one's instincts, feelings, sense and intuition all go together we all make progress.
I have no doubt, however, that what needs to be done here really is needed, not only for the sake of humanity, but for the great computer as well, our earth. Let's not hope any intergalactic highway is needed yet.
Godspeed, anons.
Ayden Evans
you could have used Deus Ex or cyberpunk esq you fucking faggot.
Dominic Sanders
wtf:^)
Carson Young
Im just a low tier manual labour pleb running Shitdows on a shitty laptop.Can i do anything with this stuff or do i have to have large know how?I dont really care if i go to prison or get shot,the white race and its continued existance is the only thing i have.
Jacob Jackson
do what this user suggested and also read the Protocols of the Learned elders of Zion, Jewish Revolutionary Spirit by E. Michael Jones, Culture of Critique by Kevin B. MacDonald and the International Jew by Henry Ford. Extra credit if you read revolt against the modern world by Julius Evola.
Evan Brown
Mein Kampf is a huge greenpill and gives me so much hope.
Caleb Gutierrez
And you call yourself a nazi.
Nathan Hughes
lolwut, never heard of him. Must have been very damn well written. Oh look at the clock, it is German time and I speak it. Summer literature? Is it readable or Fichte-Tier convoluted?
Jonathan Cook
Schrödingers Weltpolitik.
Luke Murphy
You don't have ghosts.
Hunter Flores
This is deeper than politics.
David Cooper
is your pc clock set right?
had that happen to me before
Evan Rogers
chmod -R 0444 ~/.mozilla will keep your browser from saving anything at all.
You could just chmod to read only the files storing cookies tbh fam. or take a walk on the wildside and do sudo apt-get purge firefox then build your own like not a faggot
Nobody has the autism to go through several million lines of code to look for every possible vulnerability,backdoor,exploit,etc. Which is why we made strings, readelf, gdb, and grep.
Myself included. Okay so they intended to try the ol' shell switcherooni to gain root. Neat. I suppose that exploit was probably patched a while ago. Lrn2Computer fam.
Best thing you can do is kill yourself to improve the bell curve tbh.
ghosts? that's in /Linux/bin/ghost_x86 next time use find.
Mason Cook
shit I should have thought of that
Connor Carter
wtf I hate wtf now
Adrian Ramirez
Phone Company/ISP fag here, this is why we run multiple circuits when burying cable. When there's a break we just switch over to a spare. It's something telecom engineers anticipated since the 1890's. In NYC our POTS go back to the late 1910's (before that a smaller less-reliable gauge lead was used), and since getting digging permits in Manhattan is a bitch many, places are still on copper with no fiber. The diamond district is still on ADSL, but once we run out of pairs, they're fucked. Luckily those cables are encased in lead and were back-filled by people who knew what the fuck they were doing.
Jaxon Turner
tinker with PI or beaglebone much?
Isaac Nguyen
...
Aiden Gray
Someone from within the NSA who probably hates Trump decided to try and get rid of Trump by framing themselves as a Russian and leaking shit, pretending that Russia betrayed Trump because he betrayed them with the Syrian strikes.
Someone deepstate leaked this to draw an invisible link to Trump and Russia.
Adam Wright
The grease stains in the box are a nice touch.
Sebastian Robinson
Same thing happened with avast, just disable and re-enable afterwards. Duhh.
So uhh, how does this shit work? There like some kinda NSA handbook? running through a vm, what fork should be used?
Elijah Ramirez
God bless you user. Best of luck! I'm tech-illiterate though, unfortunately.
I'm not this tech savvy user, so I use about:config setting, and use helpful security addons like Tinfoil and Random Agent Spoofer to disable (most) of the logging shit. Plus I re-configured Noscript to allow only the sites I routinely visit and block all global scripts too.
As far as DOM storage, I wish I could find a way to disable this for (most) websites except for the ones I visit that actually need it to function. Otherwise I configured my Cache Cleaner to purge the supercookies when I wipe my browser history.
BTW, can you provide some dumbasses like myself a set of instructions to build our own Firefox browser? That would be pretty radical, I'd like to know how to do this!
Dylan Powell
No, it means they """leaked""" yet another distraction. Their actual top secret toolset is well kept. On github of all places? Just how naive are you? That github repo would have stayed up for no more than 1 minute if this were true. Open your eyes for fuck's sake.
Jeremiah Parker
If the NSA had anything worthwhile, like 0dayz the hackers would have probably kept them to theirselves. Hackers love new shiny tools.
This leak is pretty disappointing. Small and lots of old crap. Would sure suck to pay $1,000,000 or whatever the guy wanted for this.
Brandon Green
He wanted 1 MILLION BITCOINS hahah.. really
Carter Hughes
you will be fine haha see you in the fema camp, user
Brayden Ross
What's the point ? we all know the kikes over in Isreal already try hacking US resources. What would change? No one would even give a shit .
Tyler Carter
Fuck it, I'll build my own web-browser. With blackjack, and xvideos
Ayden Richardson
Such work. Much wow.
Zachary Bennett
Get the fuck out, you worthless newfag
Zachary Campbell
...
Cooper Turner
This is why everyone hates redditors.
Juan Jenkins
I'm wondering if it's a way for them to encrypt when *they* use magic jack? I've looked through it briefly and it seems to possibly have some method for encoding and it's definitely for creating connections. Logic would think it's an exploit for magic jack but it doesn't look like that to me?
*not super programmer
Lincoln Davis
or perhaps it's for decrypting files they have stored somewhere on servers that are hosted by magic jack that they have a backdoor for?
Brandon Roberts
Its intentional. They are American for all we know, the grammatical and spelling errors are to throw off linguistic fingerprinting.
Jonathan Wilson
the nsa has some good guys in it with more to come
Web servers are extremely common, and thanks to the widespread use of (((PHP))), often exploitable. NSA is less interested in hacking Web sites than in gaining jump boxes from which to perform further attacks. The auction files appear to have been collected from such a jump box.
Not quite. While the leaked files are the "ready-to-fire" forms of the exploits, the callback listeners and general operations procedures they assume aren't in the leaks so far.
I've got some Bad News… the NSA is a bunch of script kiddies fronting for a handful of specialists. The "opscripts" in the leak are basically step-by-step directions for driving the NSA-o-Matic(tm) Hack-O-Matic(R) toolkit. We've got the business end of the Hack-O-Matic, but not the controls.
This stuff is already old. The only boxes you'll hack with this belong to incompetent admins. There are a lot of incompetent admins.
This stuff isn't just old —- it's ancient. But there are a lot of unmaintained boxes out there still running such ancient software.
Or just laughably insecure. NEVER RELY ON AN ISP-SUPPLIED EDGE DEVICE ALWAYS PUT A HARDWARE FIREWALL AT THE EDGE OF YOUR NETWORK
Those are hacked jump boxes associated with PITCHIMPAIR. NSA uses chains of hacked jump boxes to launch their attacks.
No. I've looked into those. Those folders contain keys for backdoors planted on those computers. I don't know how to use those keys, but that's what's in the folders.
Henry King
Something in the download was so ancient that even AVG detected it.
Speaking of rootkits, according to the leaked documentation, this bash one-liner will cause STOICSURGEON on Linux to panic-delete itself if any processes are hidden:
for i in `seq 1 $(cat /proc/sys/kernel/pid_max)`; do test -d /proc/$i && echo -n $i && readlink /proc/$i/exe; done
You don't even need to run it as root, an ordinary user is enough. NSA is really paranoid about getting caught.
Even though this thread is about an actual leak —- HEED THIS MAN'S WORDS IF YOU DON'T KNOW ENOUGH TO MAKE YOUR OWN CALL —- this thread is genuine. The next one could be bait. DON'T TAKE THE BAIT!
Not just any hacking tools, but hacking tools that are meant to be "forward deployed" onto other people's computers to use those computers as bases of operations for more hacking. Any decent AV should throw every alarm it has at that.
Yes, but as soon as you activate a port on the node to tap in on, Network Operations will know. Make a habit of using the same node and someone will wait for you in the tunnel.
If you are really serious, you also have internal network monitoring that will catch the use of those backdoors. Now you have packet traces that do interesting things when replayed to an Intel/AMD box. Interesting things like "never show up in Wireshark". Backdoor revealed, Intel/AMD burns. ZOG coercion comes to light, all US IT exports burn. Economy crashes, kikes burn.
…
The kikes wouldn't dare.
Cameron Foster
Fast backbones WILL be fiber. The really fat pipes are also using hardware that you won't have on your laptop. If you know how to get into one of those lines, you wouldn't be talking about it here. You'll need to find a node where fibers are crossed and hope it has a port that your laptop can use. Then you just have to configure your laptop to speak whatever that port expects.
You'll be better off abandoning a RasPi as a relay node and seeing how long it lasts. Make damn sure you leave no fingerprints. You'll probably need a power supply for the Pi that runs on 48VDC. If the ISP you tapped has a clue, it'll be gone within a week. If it's still there after a month, they are clueless, start using it. If it lasts a year, you have free reign, do whatever you want with it.
Good Luck.
It doesn't.
No, that was the CIA's program to do the same thing.
That's why you don't run unknown binaries.
And you wonder why we say to get proprietary software out of your life?
None of this will work for you. Look for other opportunities.
There's an elaborate control system for it that we don't have.
Dominic Martinez
ALL YOU HAD TO DO WAS MAKE FOLDER "listeningposts" AND NOT MODIFY ANYTHING IN fb.py