/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(121.26 KB 1280x720 defeating-microwave-weapons.jpg)

Defeating Microwave Weapons Anonymous 06/03/2022 (Fri) 11:08:08 No. 8634
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult. >Eric Schmidt: We don’t want them to catch up. We want to stay ahead. This is important, by the way, for our commercial industry as well as for national security for obvious reasons. By the way, chips, I’m not just referring to CPU chips, there’s a whole new generation, I’ll give you an example, of sensor chips that sense things. It’s really important that those be built in America. https://www.hoover.org/research/pacific-century-eric-schmidt-talks-about-great-sino-us-tech-war-and-how-win-it What are the chips that “sense things” that Schmidt wants to prevent from being available to any other country? Since the 1980s, Silicon Valley has used semiconductor radars to collect data about what you think (your inner speech) by means of machine learning with data extract from wireless imaging of your face and body. It has proved very convenient for them, as this enables blackmail, extortion, theft, sabotage and murder like nothing else. They can do this because they design the semiconductor used on your phone, computer, TV, car and for your telecom supplier’s network equipment, which makes possible to embed silicon trojans everywhere. Don’t underestimate what machine learning can do. e.g. Study shows AI can identify self-reported race from medical images that contain no indications of race detectable by human experts. https://news.mit.edu/2022/artificial-intelligence-predicts-patients-race-from-medical-images-0520 Also, don’t underestimate the number of people Silicon Valley is willing to kill to maintain a monopoly, as you may be the next victim. “Protesters turn to tinfoil hats as increasing sickness blamed on Gov beaming radiation rays” https://www.nzherald.co.nz/nz/politics/protesters-turn-to-tinfoil-hats-as-increasing-sickness-blamed-on-government-beaming-radiation-rays/FDCP6NEFJUQWWINL2GXI7OKS6E/ Prompted by this, someone made the video “Defeating Microwave Weapons!” about how microwaves work and how to defend against this kind of weaponry. https://yewtu.be/watch?v=Lg_aUOSLuRo https://yewtu.be/watch?v=UC3O6B_K9Us Blame Silicon Valley for inserting "Silicon Trojans" and "Defeat Devices" in microwave cell transmitters and processors, enabling them to be used as weapon (SDR phased array with beam steering). The "Electromagnetic Emissions Scandal" shall be bigger than the "Diesel Emissions Scandal" and the fines shall be paid in something more expensive than money. https://en.wikipedia.org/wiki/Defeat_device https://en.wikipedia.org/wiki/Diesel_emissions_scandal Your priority is to make a shielded room to defend yourself, then make portable shields for when global riots start to end this all. For every cell transmitter on your location, you need to add one more layer of shielding. Make it thick. Consult OpenCellID.org to see how many cells are around you.
[Expand Post] For more: https://twitcasting.tv/c:_persona_non_grata/community/
>>8634 If this is a threat, please no.
Newfriends don't know about TEMPEST attacks.
>>8929 TEMPEST as a side channel attack vector is something from the disco era. Glass tube CRT monitors gave out so much electromagnetic radiation that someone from a government spook shop in a van across the street could use equipment to reconstruct the image on your screen... theoretically. If there weren't hundreds of other people in the office building using the same kind of equipment at the same time. It's the reason most software puts dots or asterisks on the screen when you type in a password. The idea that someone, presumably a state actor with a nation-state's resources, is so interested in you that he's in a black helicopter above your house trying to decrypt your Wi-Fi traffic is pretty low on the list of things to worry about, in my opinion... and when the State wants someone that badly, they aren't going to bother with subtlety, it'll be a 2am SWAT raid where they'll shoot you in your bed, then they will announce their techs found terabytes of CP on your computer and a meth lab in your kitchen. Don't worry about signal leakage from the tiny currents in a DVI cable. Worry about password stuffing. Worry about remote access software. Don't be lazy and reuse passwords. Don't stick that neat looking USB stick you found in the parking lot into your computer. Don't click on attachments or links to random stuff people post in places like this. Don't share passwords. Don't reuse passwords--in fact use strong passwords and change them frequently. Don't let people look over your shoulder. Simple things like this are all it takes to move yourself and your computer out of the category of "low hanging fruit."
>>8938 You forgot the most important thing, using full disk encryption that works (this means no bitlocker and ideally using linux/bsd), and keeping encrypted backups as needed.
>>8938 If a SWAT team has kicked down your door and you are cooling your heels in a holding cell while their computer forensics guys are pulling the HDD out of your computer and plugging it into one of their server farms, that right there falls into the category of "when the State wants someone that badly," it is not going to matter very much whether you used the 256-bit AES default keylength or homebrewed something using 4096-bit RSA. If the unblinking panopticon eye of the State has fallen upon you, and you are sufficiently interesting that someone felt it appropriate to bring a nation-state's resources to bear against you, this isn't going to end well for you regardless of how technically savvy you are. Not coming to the State's attention in the first place is neat if you can manage it. Just saying.
>>8952 I really don't believe that the FBI (or any other state-level actors) would lie or plant information just to get somebody. I mean, that would never happen outside of a Dan Brown novel, right?
>>8978 https://www.bitchute.com/video/LkY4ASXEDy3S/ (Ruby Ridge) https://www.bitchute.com/video/3YwBNbz19sP7/ (Waco) https://www.bitchute.com/video/2bLXJCmuvO5u/ (Oklahoma City bombing) inb4 >wah that's too many hours of proof, I'm not watching that You'd complain if the videos were short, too
>>8952 >If a SWAT team has kicked down your door and you are cooling your heels in a holding cell while their computer forensics guys are pulling the HDD out of your computer and plugging it into one of their server farms They will literally just murder you, fabricate evidence, and tell the press what the official story needs to be. Please consider watching the videos posted here >>9129 or at least consider skimming through them
https://www.cia.gov/readingroom/docs/CIA-RDP96-00788R001300020001-6.pdf Excerpt: PART F - Electromagnetic Energy 1. (C/NFD) Super-high frequency electromagnetic oscilations (SHF) may have potential use as a technique for altering human behaviour. Soviet Union and other foreign literature sources contain over 500 studies devoted to the biological effect of SHF. Lethal and non-lethal aspects have been shown to exist. In certain non-lethal exposures, definite behavioural changes have occured. There also appears to be change in mammals, when exposed to SHF, in the sensitivity to sound, light, and olfactory stimuli (55). Keep in mind that 5G range is inside the SHF range.
>>16452 high frequencies are real bad at passing through objects
>>16462 Do you know why? Because they interact with objects, including the body. Something that just passes through you without interacting whatsoever is nothing to be scared of.
>>8634 Doesn't 5G use channel 36-69 from antenna tv?
>>16472 Read this document >>16452 . Package data is way worse than analogue stream of a specific frequency. Package data = turning it on and off rapidly. Old TVs got a stream of data. Imagine you drop a hammer on your hand that's on a table. Most likely a small bump but no big deal. You leave it on your hand whole day and nothing bad happens. Now compare it with the package data, e.g. after you drop it pic it up immediately and drop it again and again all day. When you do that it could cause serious damage to your hand bones and joints.
>>16499 So all the 5G specific problems have been happening since like 2009?


Forms
Delete
Report
Quick Reply