/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

I Built an Air-Gapped Feed Reader and That Unveiled US’ Military Surveillance Anonymous 07/10/2021 (Sat) 23:26:40 No. 4795
I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time. Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors. I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too. I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.
interesting thought but do you have any actual proof
>>4795 Why wouldn't they just inject propaganda into the files that you transfer or whatever?


Forms
Delete
Report
Quick Reply