Anonymous ID: 8b8374 Nov. 29, 2017, 11:51 a.m. No.11069   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1071 >>1076 >>1105 >>1144 >>1155

>>11039

I found 'The Hammer' a CIA supercomputer does data analysis to spy on people.

>Whistleblower Tapes: Trump Wiretapped โ€œA Zillion Timesโ€ By โ€˜The Hammer,โ€™ Brennanโ€™s and Clapperโ€™s Secret Computer System

 

Maybe they're using it to interfere with Q/Administration now, maybe it doesn't just connect the dots, maybe it can hammer some of those dots.

Anonymous ID: 8b8374 Nov. 29, 2017, 11:58 a.m. No.11099   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1106

>>11078

Maybe they hacked the hammer once already but it can either fix itself, has redundancies they didn't know about, or someone unhacked it.

 

Note that this thing can AUTMATICALLY BREACH SECURE COMPUTER SYSTEMS.

 

What they mean by secure is anybodies guess. I'm of the opinion that every device at every level is hacked.

Anonymous ID: 8b8374 Nov. 29, 2017, 12:08 p.m. No.11132   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1137 >>1221 >>1227

>>11106

I assure you, those are owned as well. OS doesn't matter when the hardware it runs on is compromised to include CPU, APU, Power Management, Ethernet, GPU's, all the drivers for those chips, the firmwares for those chips. Those contain closed source blobs, bad practices for package management. FreeBSD is my favorite but I won't be fooled into thinking it's not owned minimally because of the hardware as well. It's best not to worry about it, it's the price we're paying for the rampant corruption, I'm sure it's on DJT's list of things to hire someone for fixing.

 

>>11105

Pic related!

Anonymous ID: 8b8374 Nov. 29, 2017, 12:18 p.m. No.11172   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1302

>>11146

Jumper might be referring to software that can infect other hardware by jumping air gaps. This can be done by turning parts of your computer into radio or using the ethernet cables in the walls as radios. Your phones can produce tones you can't hear and computers can listen through any number of devices such as speakers, the buzzer you hear sometimes on your computer, even the capacitors can be used as microphones (through piezoelectric effect). There's so many outlandish ways to hack a computer and if hammer does that automatically there's no telling what's vulnerable, or what it has access too.

 

A supercomputer/AI that hacks things automatically is kind of scary, an AI that can discern threat models and methods to defeat them is even more scary. Geez, I always knew it was possible but I can't believe somebody actually did it.

Anonymous ID: 8b8374 Nov. 29, 2017, 12:32 p.m. No.11230   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1241 >>1267

>>11221

False, the open source drivers hand off control the the GPU, the firmwares of the chips are not modifiable by the kernel. This is why nouveau doesn't work with GTX10XX cards, the drivers are signed and controlled by the GPU.

 

>Doesn't mean anyone should use Windows10.

I see you straw man, I never once said use windows, I said don't worry about it because your shit is owned by design on the hardware level. What you said just now is irrelevant to the point.

Anonymous ID: 8b8374 Nov. 29, 2017, 12:36 p.m. No.11246   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1260 >>1267

>>11241

>Windows users are the only ones being infected from PDFs.

 

That you know of.

 

Go ahead, switch, they'll just pwn you through X, if you decline X, they'll pwn your ssh keys, your gpu, the package manager, etc etc.

It doesn't matter what you run it's owned. Period. Start a new thread and I'll argue about it with you there.

Anonymous ID: 8b8374 Nov. 29, 2017, 12:49 p.m. No.11293   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1315

>>11280

You are ignorant if you believe that. Layers do nothing if your device and hardware has undocumented API's for this precise reason. Read Vault 7 while listening to Defcon for a taste of what's possible.

 

Then remember every foreign power has better than this, better teams developing stuff like this, money and the legal authority to do so and cooperation with manufacturers.

 

Just be quiet, the adults are talking.

Anonymous ID: 8b8374 Nov. 29, 2017, 12:58 p.m. No.11333   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>11313

Vault 7 is relevant if Hammer is relevant.

>>11302

Exactly, this is a method and others can be used to jump air gaps. https://en.wikipedia.org/wiki/Air_gap_(networking)

If hammer has this as a capability all bets are off.

>>11315

>I know, security is about layers.

>I know.

>I don't choose to acknowledge the undocumented API's that people beyond our own federal gov't have discovered.

 

Who glows in the dark here?

 

Here's a pdf that explains how one can get passwords from keystroke recordings.

The sky is the limit when we start discussing side channel attacks.

http://archive.fo/zcieX

Anonymous ID: 8b8374 Nov. 29, 2017, 1:07 p.m. No.11387   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>11349

Then I'll just use the power management built into the hardware to measure power consumption, or timing analysis, or literally any other side channel.

 

>>11357

One thing I don't understand, is those computers are ancient, circa 2000. Were they upgraded or decommissioned and we should be looking at newer CIA Supercomputers instead? The CIA has shitloads of modern supercomputers.

 

https://news.clearancejobs .com/2013/03/04/top-5-intelligence-agency-supercomputers-2/

http://archive.fo/7KBpt

 

The Hammer:

http://archive.fo/AATlt

Anonymous ID: 8b8374 Nov. 29, 2017, 1:31 p.m. No.11475   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1497

>>11457

>I think Show White refers to computer network, perhaps quantum computers.

 

>>11463

The 7 Dwarfs was confirmed to be the 7 Supercomputers from 2000.

 

>>11466

That poster is talking about Snow White, not the seven dwarfs. According to this article: http://archive.fo/yCwf9 'Show White refers to:

> Directorate of Operations code-named Snow White.

Anonymous ID: 8b8374 Nov. 29, 2017, 1:38 p.m. No.11509   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1633

>>11485

But a hack your shit supercomputer jointly controlled by the CIA/NSA would potentially cause that problem.

 

>>11497

Agreed, but I don't think he specifically means THOSE computers I think he means to look at CIA supercomputers. The 7Dwarfs are 17 years old, they're irrelevant in terms of 'SuperComputers'

 

>>11502

Or just something that listens for certain events and if they don't happen it acts like a Dead Mans Switch.

Anonymous ID: 8b8374 Nov. 29, 2017, 1:50 p.m. No.11561   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1569

>>11549

The 7 Dwarfs are ancient 'Super Computers' from 2000. Were they upgraded? There is no way the original 7 dwarfs are still relevant today.

 

According to this article: http://archive.fo/yCwf9 'Show White' refers to:

 

> Directorate of Operations code-named Snow White.

 

According to >>11497

>Directorate versus Director is important. Snow White is code name for the GROUP that runs the computers.

Anonymous ID: 8b8374 Nov. 29, 2017, 1:53 p.m. No.11576   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1579 >>1589

>>11562

I think the unanticipated event was 'The Hammer' breaking their secure system.

 

http://archive.fo/AATlt

 

The CIA and the NSA had JOINT CONTROL of this system. The NSA likely took the CIA out and the Hammer had a 'hidden feature' like a dead mans switch which proc'd once the NSA got rid of the CIA operators.