The cat on the wall. (The Swiss Army Knife)

in #bitcoin6 years ago (edited)

001.png

Still want to create a VPN?
How do you plan to send the RSA keys to the server?
Via SSH or with a carrier pigeon? ..

Well maybe you use TOR. Yes, that project of the naval research laboratory and the Stanford University (now they changed the university). In its beginnings, it was created to share information safely between members of the navy. It was not called as you know it now in day but that information is supposed to be confidential or what is unknown, so as not to get in trouble I will omit that part. It is curious to see the evolution of this encryption mechanism and evasion, something that in the beginning should go unnoticed even for the experts in the subject. So much so well configured it is very difficult to differentiate a service from a service as per example 80 (http) or 443 (https). For example in Tails which incorporates almost all the options of control have been disappearing (to improve the user's browsing experience), you no longer have the Network Map with which you could choose which server to connect to. If you try to request through bridges.torproject.org a list of available nodes either Obfs3 or 4 and even ScrambleSuit type of sure it sends you to a server in the US or company or some server of them with the IP masked It also has no support for I2P networks, let alone the Atlas project that allowed you obtain information and verify the exit node to which you were connected. This for just citing you some examples, perhaps the intention is that you do not control the exit node after all who controls the exit node controls the traffic and therefore the content. If we add to this the fact that Randomly almost always your traffic is routed through a US entry node, Canada, UK, (France liberte, igualite,?), Etc. Well...but it seems that it only have the
Name (the new one).

We can fill pages with similar stories such as the LPS of the Research laboratory of the Air Force, Subgraph, CubesOS, Whonix and a lot of good ideas until someone out there decided that this were not so good.

I'll tell you something a bit wired:

How much information do you think that currently includes the Internet (not the dark or deep web)? How much? Peta, Exa, Zetta, Yotta ..? You know what a serverfield is? Well, like the Most online services have mirrors in different parts of the world and this is doe to speed up and decongest network traffic.

What if what you consider the Internet is nothing more than a Honey pot?

Only 20 years ago it was unthinkable that in a serverfield you could put all that content, now in day is more than possible. In fact, that's the way it is, so you, my dear friend, have been navigating all this time in a Honey pot. The idea is simple but at the same time smart, try to process in real time all the The volume of circulating information in the network is still today the task of titans. On the other hand, if all that information is stored in a serverfiels is like being locked in a supermarket in the night, that is, you can serve a la carte.

For example: if you, that already read all this you become a target. All your activity and information in automatic become associated with one of those server farms (ServersFields) so every time that you access to your mail or another online system, you are really accessing is to the farm. Moreover I tell you that you will not notice anything strange since the SSL and TLS certificates exchanged with the server are valid. You may notice some delay in delivery (it is being reviewed and / or modified) some ... for example special mail and even some (What's) as you say to the service of WhatsApp another of those things created for the same. Outside of that you should not see more variation.

They have reached the degree of stupidity that for example: if you query a website in Russian or Chinese, You get the welcome portal in English, even when you use an IP from that country. Very stupid ...

I mean that are previously examined sites without intervention of these animals, so we knows what the visual result of it will be. But as one friend says: do not be bad, let it be (manito)...

In the case that you access a new service such as a new mail or a site to which you have never entered before, the farm automatically creates a copy of that site, updates it periodically and of course in the list of instructions linked to your user indexes it. So happily you and almost everyone will surf and share information in a Happy World, that's the idea. You already understand why all site managers wash their hands and tell you they do not allow the government access your information, they say it because the government does not need it. Because he already has it.

Of course you can try to connect (from America) to some EutelSat or another Sattellital service provider for which you would require quasi-military equipment that you are not supposed to have and is not very discreet given the size of the dish as well as the power to which you should transmit. So, when you get a Sat link and investigate a bit, you will end up understanding that this provider is also associated with: guess who? Which is just as useless, I explained to you that the ServersFiels updates the content of the sites periodically. That is, if you could access by another way using infrastructure not owned or committed by Uncle Sam, shortly after the (mirrow) is update also.

But since we are crazy why we do not go up one more level, to something even more wired?

Surely you know who is Jean Slot, well sure it does not but I'll explain. This Sir some time ago proposed or said to have a method to compress information of several Gb in some Kb, unfortunately the day before signing the contract he appeared dead. His heart does not enduranced the (emotion) and fail. If you try to find information from him or his team or you get a 404 or you do not get anything. The little information that exists has to be obtained by methods not linear as for example: (internetarchive.org). Well, to this day was available who knows if it is (accidentally deleted) later. If you dig a little, you will see that this company was bought later by Amro Bank and then acquired almost entirely by Carlyle Group. This holds the honor of having or having had the most famous members of power. Illustrious people like Colin Powell, Franky Carluchi, father Bush, etc. All have in common several things, especially the US Government and of course the CIA.

Now if you understand the difference between a pig and a wolf?

As we said, the wolf thinks It is elegant, has its own style and therefore illustration. He does not become director of the CIA being or thinking like a pig. The pig is just that, a pig. And no matter how much they try and try It will always be a pig. Someone with style and character must be recognized and respected, even when be your worst enemy.

The idea of ​​compacting information is not new, in fact we use it every day, but imagine put a building in a room. What happens here is that literally the OS with which you you interact, the Apps and others fit in little space. Then they can be transmitted almost Instant and therefore they can make a copy of all your content in seconds. Since what previous is not contemplated in the different protocols such as TCP, UDP, NetBios, etc. them can get and take away whatever is from your platform and your security systems, say Antivirus, UFW, File2ban, etc. As well as traffic monitoring and sniffing applications, they would not see anything because they do not know what to look for.

Remember you can not recognize what you do not know. The equivalent of the above is like the case of Iceberg, you only see the exposed. The rest is unknown. So, you see that good applications can you give to all this?

And well if you're going to use the carrier pigeon or have some ace hiden on your sleeve? How about the Blockchain?


You can download all documents at:

http://io-exchange.com/

Enjoy all!

Azazel0101</>

Sort:  

Very well explained! Resteemed to my cyber-security community!

Hello vijbzabyss!

Thanks for comment on this post. I working on the translate of all documment (DeAnimales II)
When it finish i will release all information relate to this topic and many more.

Thanks friend.

Azazel0101</>

Hy @azazel0101

Did you know that you have 12102 transactions historically on the Steem blockchain!
You can check and download all your transactions, votes, comments and more with @steemdetective!
Start here steemdetective.com

Thanks a lot friend.
Very good work.

Azazel0101</>

Well said. Thanks, resteemed.

In a few days i will release more documments from DeAnimales and others.
Thanks for comments here and resteemed this.

Azazel0101</>

Calling @originalworks :)
img credz: pixabay.com
Nice, you got an awesome upgoat, thanks to @azazel0101
BuildTeam wishes everyone a bullish new Year!
Want a boost? Minnowbooster's got your back!

Thanks a lot steemians!

Azazel0101</>

Coin Marketplace

STEEM 0.20
TRX 0.14
JST 0.029
BTC 67363.69
ETH 3247.42
USDT 1.00
SBD 2.66