pastebin - collaborative debugging

pastebin is a collaborative debugging tool allowing you to share and modify code snippets while chatting on IRC, IM or a message board.

This site is developed to XHTML and CSS2 W3C standards. If you see this paragraph, your browser does not support those standards and you need to upgrade. Visit WaSP for a variety of options.

n3tBin / Home / Archive

Copyright © 2007-2011, n3t-t3z Team

Posted by ULTIMATE BACKDOO on June Thu 12th 3:32 PM - Never Expires
download | new post

  1. ULTIMATE BACKDOORS - Encryption Compromised Since 2003
  2.  
  3. https://www.quickleak.org/eDlAPcSi
  4.  
  5.  
  6.  ULTIMATE BACKDOORS - Encryption Compromised Since 2003 or so -
  7. Electronic Spying Everywhere With Just About All Devices
  8.  
  9.  I have had this in the back of my mind for a while, why Snowden got such
  10. publicity, and I did not while I clearly stated the exact same things
  11. Snowden did, years before he did. And I still take things a step farther
  12. than Snowden ever did.
  13.  
  14.  Why did Snowden get all the attention all of a sudden? Perhaps because he
  15. never mentioned reactor 3, tsunami nukes, and a man made "9.1" earthquake
  16. that did absolutely no significant damage other than tsunami damage in
  17. Sendai, which was only 30 miles from the epicenter? Perhaps Snowden got
  18. all the attention because he has yet to mention that every Intel processor
  19. since Centrino has two processing sections, one for the NSA and one for the
  20. user? You can't secure your data from the NSA AT ALL with an always on cell
  21. connection from the heart of your CPU, and a separate smaller CPU on the
  22. same die that works exclusively for them, and snags your encryption keys
  23. to boot.
  24.  
  25.  In fact, Snowden only came out with his revelations after my CoreVpro and
  26. smart meter report, which spoke about how even your microwave can now be
  27. rigged to spy on you if it is smart meter compliant, and that every smart
  28. meter now has 3G, wifi, bluetooth, and several CPU's on board.
  29.  
  30.  But I did not see Snowden as a psy op early on, I saw him as vindication
  31. because all he did was stop people from shilling my inbox saying I had to
  32. be full of crap with all of this. SO, now what is Snowden NOT SAYING?
  33.  
  34.  He is not telling you that every car in America released after 2004 has,
  35. VIA FEDERAL MANDATE, an engine control computer that is always hooked up
  36. to the cell network complete with microphones, GPS and often in car cameras
  37. to spy on you. When I was in the NSA they made it clear that if you wanted
  38. to discuss anything classified outside a secure area the best thing to do
  39. was leave all cell phones and other transmitters behind and go for a drive,
  40. because there was no way to spy on a conversation in a moving car. But after
  41. 2004, that is no longer true no matter what car you have, and many cars
  42. before 2004 were already spy boxes with systems such as Onstar.
  43.  
  44.  Snowden is also not telling you that in many cases, (especially with cell
  45. phones that stopped delivering full battery life, which is a huge percentage
  46. now) that when this happens, it is because the phone is bugged and is sending
  47. out audio and usually video of everything happening around it. And this can
  48. happen to your phone even if you are completely innocent of everthing if
  49. their algorithms detect that at any time you get within the vicinity of
  50. anyone they are watching. They want YOUR PHONE switched on as a spy device
  51. in the event you get near anyone they are interested in, and they can
  52. calculate if you are likely to because they stole all your meta data. So
  53. now you have an Iphone that goes dead quickly, or other device that is now
  54. practially trash as far as usefulness because they hijacked it and basically
  55. stole it from you.
  56.  
  57.  Now, I know the above statements to be true, because all the technology
  58. surrounding it was discussed there. Now let me make a few guesses.
  59.  
  60.  It is my guess that all cars after 2004 have every conversation ever made
  61. in them recorded and permanently stored. Certainly every place they ever went
  62. is recorded and permanently stored. America's cell service is ridiculously
  63. expensive compared to other nations and I suspect it is because when you get
  64. a cell phone you are actually paying to support all the spy devices in
  65. everything else.
  66.  
  67.  One thing I do know is that with the old land lines, they could always record
  68. everything in every house in America because when you hang up, the phone's
  69. microphone remains connected to the system, only the earpiece cuts and a signal
  70. is sent to cut the call. But it was standard procedure for the NSA to over
  71. ride the system and just listen in on the microphones and record whatever
  72. they saw fit. At that time it was not policy to record everything in America,
  73. though they could have if they wanted to. 911 changed all that.
  74.  
  75.  It is my guess that a new system is going into place for total information
  76. awareness, and that smartmeters will play a central role in this. For what
  77. reason would a smartmeter need wifi, bluetooth, and cell connectivity, as
  78. well as an ability to communicate via the power outlets in the home? If all
  79. that smartmeter was doing is radioing in how much power you used, it would
  80. not need ANY of the above, a simple radio transmitter that had nothing to
  81. do with any of the above would do it.
  82.  
  83.  In fact, if smartmeters were legit, they would have their own protocols and
  84. if one could not reach the base station, it should be able to chat with a
  85. different smartmeter that was in it's vicinity and pass along your consumption
  86. by word of mouth. After all, it would only need to chat a few digits. A
  87. minimalist system is all that would be needed if the meters were legit, they
  88. don't need multiple processors, multiple connectivity options and gigabit
  89. bandwidth for legitimate business.
  90.  
  91.  But if their real purpose is to talk to the NSA via your Samsung SmartTV's
  92. camera, a microphone in your microwave compliments of the beeper that can
  93. double as a microphone, or hook up to your PC via your Intel processor, or
  94. your cell phone camera, or any other device you might have sitting around
  95. including even an Xbox, then such connectivity and processing power would
  96. be needed because it might have to negotiate with multiple devices in your
  97. house if you have them, and handle all that video and audio throughput.
  98. THAT MUCH is certain, my guess is that all devices will be recorded and
  99. stored all the time. I think they could probably do it now with all the
  100. taxes getting raped, to then turn around and screw you with.
  101.  
  102. Heads up, I made a big error
  103.  
  104.  I have in the past stated that the always on cell connection in Intel
  105. processors made it's debut with Sandy Bridge. BUT, Yesterday I sat down to
  106. an ancient computer here in Mexico, that said Windows Vista on it, and
  107. Equipped with Intel Corevpro Technology, with the Core2 logo on it. I think
  108. it was a Compaq. SO, now we know for sure that the Centrino technology,
  109. which was rolled into Core2 and every Intel processor since including the
  110. Pentiums and Celerons, have that cell connection on the processor die.
  111. With an always on cell connection and Corevpro, you can't encrypt anything
  112. on your computer because Corevpro snags all encryption keys and holds them
  113. in a separate processor that runs parallel with the main processor and that
  114. second processor has as a feature an always on cell connection. It's the
  115. ultimate back door.
  116.  
  117.  Centrino was designed exclusively in Israel. Leave it up to the Jewists to
  118. put a permanent back door into every processor they develop, there for their
  119. exploit. We have not had any data security with Intel processors since 2003
  120. or so.
  121.  
  122.  The problem is a lot older and a lot worse than I thought. So I will apologize
  123. for not warning people how bad it really was, but won't cry with that apology
  124. because WHO ELSE OUT THERE WILL SAY IT AT ALL?
  125.  
  126. Is Snowden authentic?
  127.  
  128.  There are numerous shill reports out there now shilling against Snowden,
  129. saying the NSA is compartmentalized and there is no way Snowden could have
  130. gotten access to so many files from so many places in the NSA. After all
  131. it's not easy to steal files from the NSA, is it?
  132.  
  133.  Having worked for the NSA I can confirm that it in fact would be if you
  134. were in the correct position. I am only saying this to address the shills
  135. out there in the MSM and even alternative media now who are saying it can't
  136. be done. WELL, IT CAN. Here is how.
  137.  
  138.  The NSA switched over a lot of the work from centralized computers to
  139. standalone workstations in the late 80's and going into the 90�s through
  140. today. This was done on ordinary computers you could get at Best Buy. And
  141. they used the AMI bios (and others, but AMI was very common).
  142.  
  143.  In the bios you have options. Boot from CD, boot from USB, boot from HDD0
  144. ect. So all Snowden would have had to do is smuggle in a flash drive with
  145. Linux Live loaded on it, and if he worked in maintenance (his actual position
  146. was unclear here,) NOT! it would have allowed him to get private access to
  147. any machine in the facility. You have to be allowed this access to do any
  148. maintenance with a computer. And I know when I was there the bios passwords
  149. were not set, and they really can't be from a maintenance perspective,
  150. sometimes you HAVE TO get in there. This means that in a maintenance position
  151. you could just go into the bios, set it to boot from USB, plug in a fingernail
  152. sized card reader with a 32 gig micro SD card and linux live loaded onto it,
  153. and when you start that computer, it will boot to Linux and from there you
  154. can rape anything you want. The NSA would not find a fingernail sized card
  155. reader on anyone, it's just too small and for expedience they can't look
  156. that close, you just wave your badge in front of the scanner, they might
  157. check any bags or briefcases you are carrying and you are in or out.
  158.  
  159.  Obviously Linux Live leaves no trace at all. And if the NSA removed the USB
  160. ports to prevent this, all it would then take is to bring a second hard drive
  161. in (if you worked maintenance, which Snowden did) and have Linux loaded on
  162. that, make it HDD0, boot linux and rape the machine that way. A little more
  163. work, but not too much more for anyone in the know, the difference would be
  164. about 45 seconds. Since Snowden reportedly had it all on flash drives, I
  165. doubt he had to take this step. AND, if Snowden came across a computer that
  166. had an inaccesible BIOS, working a maintenance position, all he would have
  167. to do is take the hard drive out, put it into a machine had an accessible
  168. BIOS and then rape that hard drive with Linux.
  169.  
  170.  For expediency none of the bios passwords are set, so even if Snowden did
  171. not work maintenance (which he did) this is how it would be done anyway. At
  172. least this would have been possible when I was there. The facilities are
  173. large, and not all areas are manned at all times. So all Snowden would
  174. have had to do if he did not work maintenance is pay attention to when
  175. people would be in an area, and in the off shifts just go over and rape
  176. them. It's that simple. Once you get through security things get easy, your
  177. security clearance really does pretty much do it all.
  178.  
  179.  You are never limited to a specific area once you get your clearance. You
  180. can walk through all of them to get to the operation floor snack table or
  181. anywhere else you want to go if you can state even the most tenuous reason,
  182. and you won't be asked anyway, your badge is basically a free pass.
  183.  
  184.  This is why I never called B.S. on Snowden, screwing an American intelligence
  185. agency once inside would actually be quite easy to do. I call B.S. on those
  186. who are calling B.S. on Snowden, anyone why says it is not possible has either
  187. never been there or a shill.
  188.  
  189. New Intel based PC's PERMANENTLY hackable
  190.  
  191.  So you think no one can access your data because your computer is turned off.
  192. Heck it's more than turned off, you even took the main hard drive out, and
  193. only the backup disk is inside. There is no operating system installed at all.
  194. So you KNOW you are safe.
  195.  
  196.  Frank from across the street is an alternative operating systems hobbyist,
  197. and he has tons of computers. He has Free BSD on a couple, his own compilation
  198. of Linux on another, a Mac for the wife, and even has Solaris on yet another.
  199. Frank knows systems security, so he cannot be hacked . . . . or so he thinks.
  200.  
  201.  The government does not like Frank much, because they LOVE to look at
  202. everything. Privacy is a crime don't you know, and it looks like Frank's
  203. luck with privacy is about to run out because his latest and greatest machine
  204. was a Corevpro equipped I7.
  205.  
  206.  The new Intel Core vPro processors contain a new remote access feature which
  207. allows 100 percent remote acess to a PC 100 percent of the time, even if the
  208. computer is TURNED OFF. Core vPro processors contain a second physical processor
  209. embedded within the main processor which has it's own operating system embedded
  210. on the chip itself. As long as the power supply is available and and in working
  211. condition, it can be woken up by the Core vPro processor, which runs on the
  212. system's phantom power and is able to quietly turn individual hardware components
  213. on and access anything on them.
  214.  
  215.  This is being touted as something that makes IT administration easy. It is
  216. being advertised as something that will allow IT professionals the ability to
  217. remotely troubleshoot a PC no matter what is wrong with it. It allows IT
  218. professionals to view the contents of hard drives, check the memory, or hunt
  219. for problems on a machine without actually being in front of it. And to that,
  220. I call B.S, outside of snooping it's only real world applications would
  221. involve accessing a recovery partiton and restoring the computer to out of
  222. box state, installing software outside the knowledge of the main operating
  223. system, and secretly placing or deleting files.
  224.  
  225.  But the intelligence agencies LOVE THIS. Because Frank is going on vacation
  226. soon and they know it. They have listened to all of his calls. They KNOW
  227. frank is a terrorist, because they have never been able to access anything
  228. Frank has done with a PC, and who would hide their use, other than a criminal?
  229. Frank keeps his computers up to date, and THREE of them now have Core vPro
  230. processors in them, and when Frank is gone, they are going to get their
  231. chance to access ALL of his files because the main backup hard disk went
  232. into the newest machine.
  233.  
  234. Real world use for Core vPro processors will involve the following:
  235.  
  236.  Accessing any PC ANYWHERE, no matter what operating system is installed,
  237. even if it is physically disconnected from the internet. You see, Core vPro
  238. processors work in conjunction with Intel's new Anti Theft 3.0, which put
  239. 3g connectivity into every Intel CPU after the Sandy Bridge version of the
  240. I3/5/7 processors. Users do not get to know about that 3g connection, but
  241. it IS there. Frank was not stupid so he unplugged his router. Unfortunately
  242. for Frank, that won't work, because anti theft 3.0 always has that 3g
  243. connection on also, even if the computer is turned off. Sorry frank, you
  244. were good with operating systems, but did not know EVERYTHING about
  245. hardware. And now the real reason for your finicky security habits will
  246. be known to the NSA - you found a way to route photons to any place in
  247. the world without any sort of cable. You revolutionized communications.
  248. You were going public when you returned from your vacation, but thanks to
  249. your new Core vPro processors, a major communications firm is going to go
  250. public with your invention BEFORE you get home, and your research will be
  251. deleted and replaced with "criminal activity" so you will be arrested when
  252. you get back and unable to speak about the theft of your invention.
  253. Fascism is GREAT.
  254.  
  255.  If a system has the ram chips pulled, a Core vPro processor will read
  256. the hard disk anyway because it has all the ram it needs embedded in
  257. the vPro core.
  258.  
  259.  If you encrypted your hard drive, a Core vPro processor will read it
  260. anyway, because it snagged your encryption key
  261.  
  262.  If your system has been taken apart, and has no video card, ram, floppy,
  263. or hard drive, your Core vPro processor nailed you, because you left a
  264. flash drive plugged in. Or a CD in the CD drive. And what about that
  265. web cam?
  266.  
  267.  The bottom line? The Core vPro processor is the end of any pretend privacy.
  268. If you think encryption, Norton, or anything else is going to ensure your
  269. privacy, including never hooking up to the web AT ALL, think again. There
  270. is now more than just a ghost in the machine.
  271.  
  272.  The Zionist, Globalist, Banker scamming war mongering cabal has a history
  273. of using the marketing of security as a means to remove ALL security and
  274. nail you. If you believe Intel's cheerful hype about these processors
  275. making things more secure than ever, think again, because any processor
  276. which allows a machine to be accessed even when it's turned off equates
  277. to an information tyrant's dream come true Please engage your brain while
  278. watching this, the security pitch is unadulterated B.S. These processors
  279. in fact represent an ABSOLUTE BREACH of security no matter HOW they are
  280. marketed. From the techinical viewpoint of someone who worked for an
  281. intelligence agency, I call B.S. on Intel, avoid these processors like
  282. the plague!
  283.  
  284. Got AMD? What about your smart meter?
  285.  
  286.  Many people are interested in the issue of smart meters, and for good
  287. reason. Not only does a smart meter have a full time connection to the
  288. outside world via the cell phone network, but it also has direct access
  289. to the wiring in your house. Is this a cause for concern? I'd say
  290. definitely, and this article will outline the reasons why, and show you
  291. the security holes this obvious snooping device has introduced into your
  292. home or business.
  293.  
  294.  It has been publicly stated that your smart meter has a one watt wifi
  295. transmitter and reciever in it (which is far beyond legal power for
  296. little people), as well as a full time 3g or better connection to the
  297. cell network which is always on. It is fully admitted that smart meters
  298. can communicate with appliances designed to do so, and that eventually
  299. all appliances will be able to communicate with it and receive instructions
  300. from the meter to modify their functioning on demand from a centralized
  301. control center.
  302.  
  303.  Seemingly, to assuage fears, it is being stated that the smart meter
  304. only communicates with appliances in a minimal way, and I call B.S. on
  305. that. I call B.S. because "they" lie about everything. The diagram at
  306. this site, produced by processor manufacture ARM, (which has nothing
  307. to lose by telling it like it is), shows three wireless connectivity
  308. options per smart meter, PLUS an ability to communicate through the
  309. power system, as well as Ram, Rom, and Flash, complete with an ultra
  310. DMA hard drive controller (needed to provide storage to the flash memory)
  311. and FIVE CPU's TOTAL. ??!!??. It's a safe bet thatsuch extreme connectivity
  312. and CPU power, plus 3 memory options could only be needed for nefarious
  313. purposes. If your refrigerator is Wifi equipped (a ridiculous RF polluting
  314. waste) when it could simply receive commands through the wiring, your
  315. refrigerator, microwave, you name it, could also be equipped with audio
  316. and visual surveillance capabilities and have that ability remain
  317. perfectly hidden, all to be transmitted out through the smart meter.
  318. With advanced devices now available for less than $10 containing
  319. microphones and video sensors, as well as buttons and flash card support,
  320. the stated $10 cost of this so called wifi device that is to be put in
  321. all appliances could easily cover the cost of the sensors as well.
  322.  
  323.  But a microphone and video sensor would be obvious, and therefore they
  324. would never do it, right? Well, no. After having worked for the NSA and
  325. learning the tricks, I played around a LOT with common components no one
  326. would ever think could be used for snooping that work EXCELLENT. The most
  327. surprising of all is electronic beepers that use simple piezo drivers. The
  328. piezo element, never associated with anything other than an ability to beep
  329. makes an astonishing microphone. When properly coupled to a microphone
  330. amplifier (totally free to do at zero cost nowadays) a beeper element
  331. can be used to hear through the walls and into a detached neighboring
  332. house. That is not an exaggeration. Piezo elements are unbelievably
  333. powerful microphones, as are high impedance conventional magnetic speakers.
  334. They outperform all microphones hands down, and provide such strong input
  335. that they have to be strongly attenuated to be useful. So if your microwave
  336. or refrigerator has any ability to beep, and it is smart meter compliant,
  337. you can safely bet that it has ears that can hear you whisper from behind
  338. a closed door.
  339.  
  340.  Nowadays, any device that can accept remote control commands can easily
  341. conceal a camera.
  342.  
  343.  My first introduction to this was with 1980's vintage Scientific Atlanta
  344. cable TV boxes (the standard back then) which all came fully equipped with
  345. CCD sensors concealed in the remote sensor, and microphones. If you can
  346. get your hands on one of them, take it apart and look. I have seen this
  347. myself. If you have ever wondered why so many open channels were available
  348. on these cable boxes, it is because the unused channels could be accessed
  349. and used in reverse to snoop. And towards the end of their dominance these
  350. boxes still cost more than basic cable ready televisions, possibly because
  351. that CCD sensor was not cheap. What about your TV nowadays? I have not
  352. taken apart any HD televisions for a look, but knowing what happened in
  353. the past I'd say it will be a safe bet that many of these televisions will
  354. have the ability to use their remote sensor as a camera, and speakers as
  355. microphones. It's an obvious no brainer. Throw a smart meter into the mix,
  356. and there is your outgoing connection.
  357.  
  358. But WAIT, there's more!
  359.  
  360.  What about the obvious ability to send signals to appliances via the home's
  361. wiring - what are the limits?
  362.  
  363.  I never paid attention to this in the past, and had to take a look at the
  364. guts of one of the circuit breakers that are used in homes to do this report.
  365. These circuit breakers use an electromagnet to trip, and pass all the current
  366. that gets delivered though the breaker through that electromagnet. When the
  367. current gets high enough, the magnet pulls hard enough and trips the breaker.
  368. So I knew the frequency you could send through a breaker would be limited by
  369. this electromagnet, which will operate as a choke because it has a coil with
  370. a magnetically attractive core, which will further increase the ability of
  371. that coil to stop high frequencies from passing. Question is, how much would
  372. it really choke off the signal from a smart meter?
  373.  
  374.  I no longer have my inductance meter after the Fuku report, so I cannot put
  375. it in a formula. However, I can make a guess based on experience and how
  376. things look. And my guess is that you won't get megabits to pass through
  377. it, but that it would be safe to assume you could easily get a 256 kbps
  378. connection through any household circuit breaker. Why would that be important,
  379. when wifi is megabits? Well, let me explain.
  380.  
  381.  Remember the dialup days, when 57.6 was the norm? How about five times that?
  382. Was it impossible to surf the web way back in the early days when the standard
  383. was 14.4? 14.4 actually worked pretty good. And even 500 baud will exceed the
  384. speed of the fastest typist. So I'd say 256kbps would represent a serious
  385. security problem if you have a power supply in your computer which can
  386. accept power line commands, switch on your hardware in secret, and raid you.
  387. I don't think this is a reality nowadays, but I do not know it is not either,
  388. and it's a safe bet with the government getting more and more snoopy that
  389. this will be a way to get into the most secure of computer systems. Forget
  390. about avoiding a CoreVPro processor, which has built in 3g, forget about
  391. removing all wifi and bluetooth - the final holy grail of information
  392. gathering would be a direct power line grab. You can bet they are working
  393. on it and your friendly smart meter will play a key role.
  394.  
  395.  The following got wiped and I had to retype it, they obviously do not like
  396. the punch line . . . .
  397.  
  398.  I am going to make a prediction here - that in the future, the very NEAR
  399. future, the only way you will keep a system secure is to have it run off an
  400. inverter bank, separated from the wall with a non electronic old transformer
  401. style battery charger constantly charging a battery. Filtering the smart
  402. meter signal while running directly off the line would have limited effect
  403. - If you used the right choke setup you could limit the smart meter baud
  404. rate to below 500 before you messed up the power factor too badly to run a
  405. PC, but even a 500 baud connection would only slow things down for the snoops.
  406. With patience (and they have a lot) they could at least raid every text file
  407. off your machine, 500 baud would allow them to nail 1 kilobyte of data in
  408. approximately 18 seconds (slower than actual baud because of parity checking
  409. and other technicalities, but the answer is still clear - filtering will not
  410. be good enough. The only answer is a complete isolated disconnect from the grid.)
  411.  
  412.  UPS power supplies and ordinary surge protectors will not be good enough,
  413. because surge protectors wont' filter the type of signal a smart meter would
  414. produce, and a UPS could be rigged to bypass the signal from the computer
  415. directly to the line while feeding the computer inverter power. On top of
  416. this a majority of UPS power supplies do not run full time inverter anyway.
  417. Normally they keep you connected to the main and switch you over to inverter
  418. very rapidly when the power goes out, before the capacitors in your computer's
  419. power supply run out of juice. The fact that UPS power supplies normally keep
  420. you directly connected, as well as the fact that UPS power supplies usually
  421. have processors that could pass the smart meter signal along to your PC
  422. anyway makes UPS power supplies an un acceptable method of blocking snooping
  423. via the power line. The only option is an old or totally brainless 1980's
  424. style car battery charger, a battery, and a standalone inverter if data
  425. security really is that important.
  426.  
  427.  I suggest governments and businesses take what I said here to heart and
  428. apply it, the ability to snoop via the power line against high priority
  429. targets is definitely possible, and definitely will be done in the future
  430. (and against the highest priority targets, is definitely happening now.)
  431. If you value your privacy, I'd implement these security measures now.
  432.  
  433.  Even if you have your wifi "turned off", it is not turned off. There is a
  434. separate channel that always stays open and sniffs out all available
  435. connections. And if your computer has been bugged to begin with, it will,
  436. through this back door channel, connect to any available wifi network hidden
  437. or not, and send everything you type or do straight to the NSA. And this
  438. connection will also allow "PC anywhere" type remote access to your machine.
  439. I had problems with this last night because I forgot to pull the wifi card
  440. out of the laptop I was working with, and someone went straight in and
  441. destroyed several hours of work on a machine that runs Linux and never
  442. screws up. Am I just paranoid?

Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
Syntax Highlighting:
To highlight particular lines, prefix each line with @@
Pressing TAB inserts 3 spaces