E46 BMW Social Directory E46 FAQ 3-Series Discussion Forums BMW Photo Gallery BMW 3-Series Technical Information E46 Fanatics - The Ultimate BMW Resource BMW Vendors General E46 Forum The Tire Rack's Tire Wheel Forum Forced Induction Forum The Off-Topic The E46 BMW Showroom For Sale, For Trade or Wanting to Buy

Welcome to the E46Fanatics forums. E46Fanatics is the premiere website for BMW 3 series owners around the world with interactive forums, a geographical enthusiast directory, photo galleries, and technical information for BMW enthusiasts.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact contact us.

Go Back   E46Fanatics > Everything Else > The Off-Topic > General Off-Topic

General Off-Topic
Everything not about BMWs. Posts must be "primetime" safe and in good taste. You must be logged in to see sub-forums.
Click here to browse all new posts.

Reply
 
Thread Tools Search this Thread Rate Thread Display Modes
Old 03-07-2017, 11:52 AM   #1
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
Snowden 2.0

Wikileaks has posted a zip file and password to a CIA hack online.

Basically the CIA can hack any electronic device - Apple, MicroSoft, even Samsung TV's - and turn them into a spying device.

Even supposedly uncrackable encryption used by What'sApp is no longer secure. The article says that the CIA was able to intercept the messages before the encryption was applied.

This level of infiltration makes me think (IMHO, I'm not in the industry) that the CIA recruited employees of these companies to divulge corporate secrets.

Discuss.

https://www.rt.com/news/379757-your-...ife-is-hacked/
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 11:55 AM   #2
boostedisbetter
Registered User
 
boostedisbetter's Avatar
 
Join Date: Mar 2011
Location: Tampon
Posts: 1,621
My Ride: NiNe tHoUsAnD!!!
I gotz nothin to hide, hack me up CIA
__________________
** Political sig removed **
boostedisbetter is offline   Reply With Quote
Old 03-07-2017, 12:05 PM   #3
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
WikiLeaks on Tuesday dumped a trove of documents and files hacked from the Central Intelligence Agency -- the largerst ever published from within the U.S. spy agency.

The 8,761 documents code named "VAult 7" contain amazing things, such as the "weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."

"The CIA had created, in effect, its 'own NSA' with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified," WikiLeaks said in its release.

The documents show that "a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads."

The CIA also runs "a very substantial effort to infect and control Microsoft Windows users with its malware."

The documents also show that "in addition to its operations in Langley, Virginia, the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

"CIA hackers operating out of the Frankfurt consulate ( 'Center for Cyber Intelligence Europe' or CCIE) are given diplomatic ('black') passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: 'Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport.' "

"There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of 'Year Zero' goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective," said WikiLeaks editor Julian Assange.




http://www.dailywire.com/news/14173/...ign=benshapiro
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 12:08 PM   #4
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
Quote:
Originally Posted by boostedisbetter View Post
I gotz nothin to hide, hack me up CIA
So you're ok with losing your right to free speech also?
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 12:14 PM   #5
Act of God
Registered User
 
Join Date: Dec 2004
Location: NY
Posts: 335
My Ride: Longboard
Send a message via ICQ to Act of God Send a message via AIM to Act of God Send a message via Yahoo to Act of God
They can even make it look like a foreign entity did the hacking

*ahem*
__________________
"In the modern welfare state, a vote becomes a license to take what others create" - Thomas Sowell
Act of God is offline   Reply With Quote
Old 03-07-2017, 12:16 PM   #6
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
If anyone is ok with having their privacy eliminated just post up your passwords and links to all your social media/email accounts here.

We're your friends! We wouldn't ever dream of using any of that information other than in your best interest.

Link to Wikileaks Vault 7 (Weeping Angel): https://wikileaks.org/ciav7p1/index.html
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.

Last edited by swordsman11868; 03-07-2017 at 12:17 PM.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 12:16 PM   #7
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
Quote:
Originally Posted by Act of God View Post
They can even make it look like a foreign entity did the hacking

*ahem*
Oh snap!
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 12:30 PM   #8
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
Quote:
Originally Posted by Act of God View Post
They can even make it look like a foreign entity did the hacking

*ahem*
From WikiLeaks analysis:

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.

Last edited by swordsman11868; 03-07-2017 at 12:31 PM.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 12:57 PM   #9
cowmoo32
.--. . -. .. ...
 
cowmoo32's Avatar
 
Join Date: Jul 2003
Location: FL
Posts: 5,545
My Ride: Yukon
Quote:
Originally Posted by swordsman11868 View Post
Wikileaks has posted a zip file and password to a CIA hack online.

Basically the CIA can hack any electronic device - Apple, MicroSoft, even Samsung TV's - and turn them into a spying device.

Even supposedly uncrackable encryption used by What'sApp is no longer secure. The article says that the CIA was able to intercept the messages before the encryption was applied.

This level of infiltration makes me think (IMHO, I'm not in the industry) that the CIA recruited employees of these companies to divulge corporate secrets.

Discuss.

https://www.rt.com/news/379757-your-...ife-is-hacked/
I've always operated under the assumption that this was the case. There is no such thing as a network-connected device that cannot be remotely exploited. And Whatsapp became insecure the second Facebook took them over.
Quote:
Originally Posted by boostedisbetter View Post
I gotz nothin to hide, hack me up CIA
Yeah! Fvck the 4th Amendment! We don't need no privacy as long as it keeps us safe from terrorists! It baffles me that people think like you, but you're in the majority. If a cop showed up at your house and started looking through your things you might care a little more, but because it isn't tangible you're fine with it.
__________________

Last edited by cowmoo32; 03-07-2017 at 12:59 PM.
cowmoo32 is offline   Reply With Quote
Old 03-07-2017, 01:00 PM   #10
Act of God
Registered User
 
Join Date: Dec 2004
Location: NY
Posts: 335
My Ride: Longboard
Send a message via ICQ to Act of God Send a message via AIM to Act of God Send a message via Yahoo to Act of God
Again, this is why I don't want medical records online. It would lead to serious mishandling of confidential information.
__________________
"In the modern welfare state, a vote becomes a license to take what others create" - Thomas Sowell
Act of God is offline   Reply With Quote
Old 03-07-2017, 01:13 PM   #11
SuperFan86
Registered User
 
Join Date: Sep 2010
Location: Charleston, SC
Posts: 38
My Ride: '14 Jeep GC
Quote:
Originally Posted by Act of God View Post
Again, this is why I don't want medical records online. It would lead to serious mishandling of confidential information.
I used to support a Military contract dealing with medical record management. If you only knew the things we saw and the people who handled them.... just wow.
__________________

Quote:
Originally Posted by GRIFFIN
I was stayign at this one girls ass for what felt like 5 mins. My gil sadi what the fvck are you looking at. I said just thnking about how beautiful she was goign to look in her wedding dress. Road head for the win.
SuperFan86 is offline   Reply With Quote
Old 03-07-2017, 01:16 PM   #12
cowmoo32
.--. . -. .. ...
 
cowmoo32's Avatar
 
Join Date: Jul 2003
Location: FL
Posts: 5,545
My Ride: Yukon
https://wikileaks.org/ciav7p1/
Quote:
This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.
Come on guys, you're better than that.
Quote:
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Do all smart TVs have mics in them?
__________________
cowmoo32 is offline   Reply With Quote
Old 03-07-2017, 01:23 PM   #13
Act of God
Registered User
 
Join Date: Dec 2004
Location: NY
Posts: 335
My Ride: Longboard
Send a message via ICQ to Act of God Send a message via AIM to Act of God Send a message via Yahoo to Act of God
Quote:
Originally Posted by cowmoo32 View Post
https://wikileaks.org/ciav7p1/
Come on guys, you're better than that.

Do all smart TVs have mics in them?
Speaking of

https://www.cnet.com/how-to/samsung-smart-tv-spying/
Disable this feature to stop your Samsung Smart TV from listening to you
__________________
"In the modern welfare state, a vote becomes a license to take what others create" - Thomas Sowell
Act of God is offline   Reply With Quote
Old 03-07-2017, 01:25 PM   #14
boostedisbetter
Registered User
 
boostedisbetter's Avatar
 
Join Date: Mar 2011
Location: Tampon
Posts: 1,621
My Ride: NiNe tHoUsAnD!!!
Quote:
Originally Posted by swordsman11868 View Post
So you're ok with losing your right to free speech also?
Quote:
Originally Posted by cowmoo32 View Post

Yeah! Fvck the 4th Amendment! We don't need no privacy as long as it keeps us safe from terrorists!
Was my post not sarcastic enough? I suck at the internets


Quote:
Originally Posted by swordsman11868 View Post
If anyone is ok with having their privacy eliminated just post up your passwords and links to all your social media/email accounts here.

We're your friends! We wouldn't ever dream of using any of that information other than in your best interest.
AMEX:
Username: BobRoss1956
Password: Happylittletree
__________________
** Political sig removed **
boostedisbetter is offline   Reply With Quote
Old 03-07-2017, 01:26 PM   #15
cowmoo32
.--. . -. .. ...
 
cowmoo32's Avatar
 
Join Date: Jul 2003
Location: FL
Posts: 5,545
My Ride: Yukon
Quote:
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
This is the one big downside of autonomy and if someone gained control over the entire network the results would be beyond bad.
__________________
cowmoo32 is offline   Reply With Quote
Old 03-07-2017, 01:26 PM   #16
cowmoo32
.--. . -. .. ...
 
cowmoo32's Avatar
 
Join Date: Jul 2003
Location: FL
Posts: 5,545
My Ride: Yukon
Quote:
Originally Posted by boostedisbetter View Post
Was my post not sarcastic enough? I suck at the internets
Like I said, that's a majority opinion that I've seen expressed on here.
__________________
cowmoo32 is offline   Reply With Quote
Old 03-07-2017, 01:28 PM   #17
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
Quote:
Originally Posted by boostedisbetter View Post
Was my post not sarcastic enough? I suck at the internets




AMEX:
Username: BobRoss1956
Password: Happylittletree


I've been accused of missing sarcasm in other threads as well. My bad.
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.
swordsman11868 is offline   Reply With Quote
Old 03-07-2017, 01:32 PM   #18
cowmoo32
.--. . -. .. ...
 
cowmoo32's Avatar
 
Join Date: Jul 2003
Location: FL
Posts: 5,545
My Ride: Yukon
Some loser at the CIA got paid to write this. Where do they find the people willing to do this? https://wikileaks.org/ciav7p1/cms/page_17760284.html

Some of the exploits are amazing but it blows me away that there are people with that level of skill set that are willing to build the tools used to spy on their own country.
__________________

Last edited by cowmoo32; 03-07-2017 at 01:32 PM.
cowmoo32 is offline   Reply With Quote
Old 03-07-2017, 01:34 PM   #19
boostedisbetter
Registered User
 
boostedisbetter's Avatar
 
Join Date: Mar 2011
Location: Tampon
Posts: 1,621
My Ride: NiNe tHoUsAnD!!!
Quote:
Originally Posted by swordsman11868 View Post


I've been accused of missing sarcasm in other threads as well. My bad.
lol no worries, I was a bit hyper this morning and post-happy, like Trump on twitter.
__________________
** Political sig removed **

Last edited by boostedisbetter; 03-07-2017 at 01:34 PM.
boostedisbetter is offline   Reply With Quote
Old 03-07-2017, 01:41 PM   #20
swordsman11868
Registered User
 
Join Date: Aug 2006
Location: Las Vegas
Posts: 1,303
My Ride: 2003 325i
This looks ominous and sounds surprisingly simple(?)...


"Actually Hooking ExitBootServices

When ExitBootServices is called, the DXE phase is about to end. The firmware has done all that it needs to do from UEFI to set up the system for the OS, and the OS itself has already been loaded into memory. You can be creative with what you could do to the kernel that is just sitting there in memory, not protected by anything.

Because the ExitBootServices service can be found by getting its pointer from the global EFI_BOOT_SERVICES table, hooking the ExitBootServices call is trivial."
__________________
I'm just here to change the world.
BMW Wiki: http://www.bimmerfest.com/wiki/index.php

E46Fanatics inspiration Robolop: http://forum.e46fanatics.com/showthr...87566&page=101

2016 Beheadings in Saudi Arabia: 92.
swordsman11868 is offline   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On
Censor is ON





All times are GMT -5. The time now is 08:09 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2017, vBulletin Solutions, Inc.
(c) 1999 - 2016 performanceIX Inc - privacy policy - terms of use