Get your information here!
https://8ch.net/cbts/catalog.html
Get your information here!
https://8ch.net/cbts/catalog.html
People will question where BO is, and most people won't reverse image search it and realize it's from last year. It's just a show.
Owned by the CIA no less.
I found 'The Hammer' a CIA supercomputer does data analysis to spy on people.
>Whistleblower Tapes: Trump Wiretapped โA Zillion Timesโ By โThe Hammer,โ Brennanโs and Clapperโs Secret Computer System
Maybe they're using it to interfere with Q/Administration now, maybe it doesn't just connect the dots, maybe it can hammer some of those dots.
Maybe they hacked the hammer once already but it can either fix itself, has redundancies they didn't know about, or someone unhacked it.
Note that this thing can AUTMATICALLY BREACH SECURE COMPUTER SYSTEMS.
What they mean by secure is anybodies guess. I'm of the opinion that every device at every level is hacked.
I assure you, those are owned as well. OS doesn't matter when the hardware it runs on is compromised to include CPU, APU, Power Management, Ethernet, GPU's, all the drivers for those chips, the firmwares for those chips. Those contain closed source blobs, bad practices for package management. FreeBSD is my favorite but I won't be fooled into thinking it's not owned minimally because of the hardware as well. It's best not to worry about it, it's the price we're paying for the rampant corruption, I'm sure it's on DJT's list of things to hire someone for fixing.
Pic related!
And why no electronics are allowed into those rooms.
Jumper might be referring to software that can infect other hardware by jumping air gaps. This can be done by turning parts of your computer into radio or using the ethernet cables in the walls as radios. Your phones can produce tones you can't hear and computers can listen through any number of devices such as speakers, the buzzer you hear sometimes on your computer, even the capacitors can be used as microphones (through piezoelectric effect). There's so many outlandish ways to hack a computer and if hammer does that automatically there's no telling what's vulnerable, or what it has access too.
A supercomputer/AI that hacks things automatically is kind of scary, an AI that can discern threat models and methods to defeat them is even more scary. Geez, I always knew it was possible but I can't believe somebody actually did it.
Shut the fuck up, is this a thing? I remember mirror, mirror too.
False, the open source drivers hand off control the the GPU, the firmwares of the chips are not modifiable by the kernel. This is why nouveau doesn't work with GTX10XX cards, the drivers are signed and controlled by the GPU.
>Doesn't mean anyone should use Windows10.
I see you straw man, I never once said use windows, I said don't worry about it because your shit is owned by design on the hardware level. What you said just now is irrelevant to the point.
>Windows users are the only ones being infected from PDFs.
That you know of.
Go ahead, switch, they'll just pwn you through X, if you decline X, they'll pwn your ssh keys, your gpu, the package manager, etc etc.
It doesn't matter what you run it's owned. Period. Start a new thread and I'll argue about it with you there.
Stop being ignorant and realize that 'computer security' is a facade. A dog and pony show. You want to evangelize linux go to /tech/ where they will laugh at you. You are sliding disinfo.
You are ignorant if you believe that. Layers do nothing if your device and hardware has undocumented API's for this precise reason. Read Vault 7 while listening to Defcon for a taste of what's possible.
Then remember every foreign power has better than this, better teams developing stuff like this, money and the legal authority to do so and cooperation with manufacturers.
Just be quiet, the adults are talking.
Vault 7 is relevant if Hammer is relevant.
Exactly, this is a method and others can be used to jump air gaps. https://en.wikipedia.org/wiki/Air_gap_(networking)
If hammer has this as a capability all bets are off.
>I know, security is about layers.
>I know.
>I don't choose to acknowledge the undocumented API's that people beyond our own federal gov't have discovered.
Who glows in the dark here?
Here's a pdf that explains how one can get passwords from keystroke recordings.
The sky is the limit when we start discussing side channel attacks.
http://archive.fo/zcieX
Then I'll just use the power management built into the hardware to measure power consumption, or timing analysis, or literally any other side channel.
One thing I don't understand, is those computers are ancient, circa 2000. Were they upgraded or decommissioned and we should be looking at newer CIA Supercomputers instead? The CIA has shitloads of modern supercomputers.
https://news.clearancejobs .com/2013/03/04/top-5-intelligence-agency-supercomputers-2/
http://archive.fo/7KBpt
The Hammer:
http://archive.fo/AATlt
If Q was using Tor his id would be 000000
And do you have any proof for that or are you baselessly speculating?
>I think Show White refers to computer network, perhaps quantum computers.
The 7 Dwarfs was confirmed to be the 7 Supercomputers from 2000.
That poster is talking about Snow White, not the seven dwarfs. According to this article: http://archive.fo/yCwf9 'Show White refers to:
> Directorate of Operations code-named Snow White.
The Hammer is a SUPERCOMPUTER that hacks secure systems automatically and is under JOINT CIA/NSA CONTROL.
http://archive.fo/AATlt
Part of a SECURE system is having an AIR GAP. Malware can JUMP the airgap to infect the quarantined system.
https://en.wikipedia.org/wiki/Air_gap_(networking)
They thought they had control of The Hammer, but the CIA must have hid a little present for the NSA to discover.
But a hack your shit supercomputer jointly controlled by the CIA/NSA would potentially cause that problem.
Agreed, but I don't think he specifically means THOSE computers I think he means to look at CIA supercomputers. The 7Dwarfs are 17 years old, they're irrelevant in terms of 'SuperComputers'
Or just something that listens for certain events and if they don't happen it acts like a Dead Mans Switch.
Valerie Jarret. Michelle's true love.
'Routing through various networks' is called Pivoting, not jumping. Jumping likely refers to breaking an Air Gap.
You think an adversary has physical access to the hardware in a SCI[F] situation or is it more likely jump refers to breaking air gaps?
>The bad guys control the entire school system
False, Betsy Devos now controls the DoEd and that means no more fabian society.
The 7 Dwarfs are ancient 'Super Computers' from 2000. Were they upgraded? There is no way the original 7 dwarfs are still relevant today.
According to this article: http://archive.fo/yCwf9 'Show White' refers to:
> Directorate of Operations code-named Snow White.
According to >>11497
>Directorate versus Director is important. Snow White is code name for the GROUP that runs the computers.
I think the unanticipated event was 'The Hammer' breaking their secure system.
http://archive.fo/AATlt
The CIA and the NSA had JOINT CONTROL of this system. The NSA likely took the CIA out and the Hammer had a 'hidden feature' like a dead mans switch which proc'd once the NSA got rid of the CIA operators.
Because the unanticipated event was The Hammer breaking their security protocols. A jump probably means to 'JUMP' an airgap.
https://en.wikipedia.org/wiki/Air_gap_(networking)
Q is not posting from Tor or his id would be 000000