Then pewish
If you're new to tumblr from reddit, we don't do down vote here.
We have a much more …elegant system in place, which I’m sure one of my mutuals would be willing to demonstrate here.
I’m crying over this picture
They mass reported this video and got it flagged as adult content and terminated my blog over this picture
[ID: A video of coffee beans dancing from Killer Bean, set to Clubbing To Death by Rob Dougan, whilst text is shown on screen. The text reads:
‘The FBI distributes viruses and keyloggers that mainstream Anti-Viruses software are legally not allowed to detect [Magic Lantern, CIPAV, Carnivore (DCS1000), Network Investigative Technique]
The NSA has forced Intel, AMD, and chip makers to backdoor their CPU’s and allow them to access your computer even if it is ‘turned off’) as long as it has access to electricity_ [Intel ME, AMD PSP]
The NSA has also forced hardware manufacturers to backdoor their ‘Random Number Generators’, to allow them to break RSA encryption [Dual Elliptic Curve]
America-made electronics transmit radio frequencies which allow the FBI and NSA to access your computer even if it’s not connected to the internet [Cottonmouth-1, SURLYSPAWN, ANT/TAO Catalog]
The NSA intercepts computers/laptops/phones purchased online and installs malware chips (see: ANT/TAO Catalog) on them before delivering it to you [TAO Team]
If you are a ‘Person of Interest’ the NSA is intercepting your mail, opening em up, and installing bugs on any electronics you order of the internet (e.g. TV’s, microwaves, phones, video games, smart refrigerators) [ANT/TAO Catalog]
The NSA has already broken Tor networks and can identify you and attack you if you use Tor; ISP companies like Verizon, AT&T, Comcast assist with this [FOXACID, QUANTUMINSERT, EGOTISTICALGIRAFFE]
Major American tech companies like Microsoft willingly provide the NSA advanced warnings of Zero-Day security vulnerabilities before revealing them to the public [TAO TEAM, PRISM, NSA hoarding program]
The CIA can infect your car’s control systems, which would allow them to remotely take it over and drive it [Vault 7]
The CIA/MI5 can hack into all smart devices (like TVs and Alexa) connected to the internet and spy on you [Weeping Angel]’
It ends with a ‘Glowie’ meme, an image of an FBI agent glowing green.]
requested by @str8aura-no-not-that-one
RATING: UNRELIABLE*
*Whilst a few of the details are accurate, the majority is misinformation, and the overall implications are misleading.
I will quote each claim before fact checking it, as this is such a long post.
1.
CLAIM: ‘The FBI distributes viruses and keyloggers that mainstream Anti-Viruses software are legally not allowed to detect [Magic Lantern, CIPAV, Carnivore (DCS1000), Network Investigative Technique]’
The FBI does use this software, but it is unconfirmed whether mainstream anti-virus software detects it or covers it up.
Source: ‘The FBI is developing software capable of inserting a computer virus onto a suspect’s machine and obtaining encryption keys, a source familiar with the project told MSNBC.com. The software, known as “Magic Lantern,” enables agents to read data that had been scrambled, a tactic often employed by criminals to hide information and evade law enforcement.’
2.
CLAIM: The NSA has forced Intel, AMD, and chip makers to backdoor their CPU’s and allow them to access your computer even if it is ‘turned off’) as long as it has access to electricity_ [Intel ME, AMD PSP]
Whilst the NSA is likely campaigning against encryption, Intel has explicitly denied these claims. Intel ME may be a security hazard, but the risk is overstated.
Source: ‘One claim that a lot of people are hitching their conspiracy theories on is that the ME allows for access to a computer even when the the computer is powered off. Let’s consider this: Even if the ME firmware would allow someone entry to a machine via an isolated TCP stack, what kind of information could an intruder obtain if that machine is powered down?
Say, for instance, said machine used standard hard drives (not Solid State Drives); how could anyone gain access to a platter-based drive when the drive has no power to spin? And because the ME is hardwired into the firmware, there’s no way to install anything or save instructions’.
3.
CLAIM: The NSA has also forced hardware manufacturers to backdoor their ‘Random Number Generators’, to allow them to break RSA encryption [Dual Elliptic Curve]
This claim appears to be mostly accurate, although ‘forced’ is not - it seems that they made a deal for $10 million with RSA.
Source: ‘Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a “back door” in encryption products.
‘Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software’
4.
CLAIM: America-made electronics transmit radio frequencies which allow the FBI and NSA to access your computer even if it’s not connected to the internet [Cottonmouth-1, SURLYSPAWN, ANT/TAO Catalog]
Whilst this implant technology does exist for the NSA to use, it is not in all American-made electronics. Each device costs $20,000.
Source: Just over a year ago, Jacob Appelbaum and Der Spiegel revealed pages from the National Security Agency’s ANT catalog, a sort of “wish book” for spies that listed technology that could be used to exploit the computer and network hardware of targets for espionage. One of those tools was a USB cable with embedded hardware called Cottonmouth-I—a cable that can turn the computer’s USB connections into a remote wiretap or even a remote control.
‘Cottonmouth-I is the sort of man-in-the-middle attack that hackers dream of. Built into keyboard or accessory cables, it allows an attacker to implant and communicate with malware even on a computer that’s “airgapped"—completely off a network. And its hardware all fit neatly into a USB plug. Because of the sophistication of the hardware, the advertised price for Cottonmouth-I was over $1 million per lot of 50—meaning each single device cost $20,000.’
5.
CLAIM: The NSA intercepts computers/laptops/phones purchased online and installs malware chips (see: ANT/TAO Catalog) on them before delivering it to you [TAO Team]
Whilst it is speculated that this has happened, it isn’t done to all tech purchased online - this would be a massive and costly operation. These methods are used by the NSA in order to surveil specific targets.
Source: ‘In some cases, the NSA has modified the firmware of computers and network hardware—including systems shipped by Cisco, Dell, Hewlett-Packard, Huawei, and Juniper Networks—to give its operators both eyes and ears inside the offices the agency has targeted.’
6.
CLAIM: If you are a ‘Person of Interest’ the NSA is intercepting your mail, opening em up, and installing bugs on any electronics you order of the internet (e.g. TV’s, microwaves, phones, video games, smart refrigerators) [ANT/TAO Catalog]
As far as I can tell, the NSA does not intercept mail, except for when technology is being delivered. The NSA is focused on cybersecurity and data. Search warrants are required to intercept mail, which may be carried out by the US Postal Inspection Service. As stated in point 5, the NSA has intercepted and modified the firmware of computers and network hardware ordered online, although I’ve seen no reference to the NSA intercepting other tech like microwaves and refrigerators.
7.
CLAIM: The NSA has already broken Tor networks and can identify you and attack you if you use Tor; ISP companies like Verizon, AT&T, Comcast assist with this [FOXACID, QUANTUMINSERT, EGOTISTICALGIRAFFE]
The NSA are able to identify TOR users in certain cases. I have not been able to locate information that suggests ISP companies assist with this.
Source: ‘A solution lies in the NSA’s QUANTUMCOOKIE attack, which they’ve utilized to de-anonymize Tor users.’
Source: ‘“Quantum cookie” attacks are plausible but only in highly limited cases.’
8.
CLAIM: Major American tech companies like Microsoft willingly provide the NSA advanced warnings of Zero-Day security vulnerabilities before revealing them to the public [TAO TEAM, PRISM, NSA hoarding program]
The NSA does have information on security vulnerabilities, but as far as I can tell, this information is not provided by the tech companies, and in fact the NSA does not inform the tech companies when they find a vulnerability.
Source: It raises an uncomfortable question: should the NSA have told the companies about the weaknesses in their software three years ago?’
9.
CLAIM: The CIA can infect your car’s control systems, which would allow them to remotely take it over and drive it [Vault 7]
Leak of CIA documents known as Vault 7 showed that the CIA was researching ways to infect vehicle control systems, but whether this was achieved is unknown.
Source: ‘Also in the documents, the majority of which remain unread and unveiled by journalists, are suggestions that vehicle systems, the Internet of Things and more may be targeted by the CIA in the future.’
10.
CLAIM: The CIA/MI5 can hack into all smart devices (like TVs and Alexa) connected to the internet and spy on you [Weeping Angel]’
The codename referenced here was only used in exploiting smart TVs, specifically the Samsung F series, and can only be installed in person with a USB drive.
Source: ‘One of the exploits found in smart TVs was called ‘Weeping Angel’. The documents show Weeping Angel targeted the Samsung F8000 Smart TV. They say the TV could be turned into “covert listening devices” by putting the TV into “fake-off” mode. When the televisions appeared to be off, it was possible for conversations to be recorded. The CIA documents, which are from 2014, state ‘future work’ on the vulnerability could include capturing video from the televisions and being able to leave Wi-Fi turned on while ‘fake-off’ mode was enabled.’
Source: ‘ This version only works on F-Series models and it can only be installed in person, by plugging a USB drive into the TV you want to infect. That means Weeping Angel can’t be used for mass surveillance, and even if you own a Samsung F-Series, it’s extremely unlikely your TV has been targeted and infected.’
Taking beastrogen to become a wretched creature
Taking pestosterone to become a nasty nuisance
A collection
cattese evades even the most enlightened thinkers
Wild Dogs see a Domesticated Dog
African wild dogs are one of my favorite animals. Those huge round circle ears and tricolored coats. I love you African wild dogs
HEY. HEY. HOW DID YOU GET OUT??? HEY-
despite staff's recent changes, we're... winning??????
i was looking for special cat feeders because ours are gluttons who gorge themselves and i found this one...device:
this sounded fun so i checked the comments and...
im??
come to the dark side we have dry food scattered in strategically designed green colored plastic tubes
Hi I’m op of the twitter post. I was referencing this tumblr post I saw ages ago. I didnt expect it to blow up.
hi I’m the guy that made that post. Yours is funnier
“Caramelldansen” with every second beat removed
imagine if this post was the only thing left to signify humanity was ever here
I found photos of those Pallas Cat kittens born this year and bye I'm deceased
here’s my one whole discourse post for pride month. you fucks will never ever ever wean off the radfem shit if you keep trying to give “cis men are evil” nuance. no, it’s not bad because they could be closeted or questioning, it’s bad because gender essentialism is a fucking brain poison and it makes you stupid
this is “not all men” cloaked in progressive-sounding vocabulary
harry potter blog.
every goddamn time
















