Anonymous ID: c3d791 March 15, 2019, 4:23 p.m. No.5710025   🗄️.is 🔗kun   >>0065

GHIDRA

https://www.nsa.gov/resources/everyone/ghidra/

 

Ghidra is supposed to be an amazing tool to reverse engineer just about anything. It is a tool to reverse engineer architectures and vendor formats. Any program you can think of you can decompile anything with Ghidra. It can also take the instruction sets and compile them back to a :C readable snippet of codes?

 

If Ghidra is run, the NSA can execute ANY piece of code on your machine. KEYSTONE? Ghidra = Keystone? If they know you are running Ghidra, you can be exploited by anyone - not just NSA. Pretty easy to scan the internet for ports. You can target people who are reverse engineering software at different times of the day, you send pings. ISPs will not usually do anything even with worldwide pings.

 

The NSA can easily get the name of an administrator and an IP of any computer.

 

REMOTE ACCESS TROJANS

A Remote Access Trojan. Malware that controls a system through a remote network connection. Installed without the victim's knowledge.

 

You can cipher files to your own shell. Easily. Run anything. Do exactly what you want. Every user interface action can be done by the NSA. The NSA has a rat in your machine if they can do this. Panic increases RAT population.

Anonymous ID: c3d791 March 15, 2019, 4:49 p.m. No.5710523   🗄️.is 🔗kun

New Zealand

Guy from 8chan?

So the place where the elites use to avoid any record of five eyes surveillance.

UMBRELLA surveillance.

Upstream.

Not just AOL, Apple, Facebook, Yahoo, Google and YouTube, Microsoft and Skype.

All communications on fiber optics and infrastructure as data passes.

Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States. It cannot be used to target a person outside the United States if the purpose is to acquire information from a person inside the United States.

But it can if you're in New Zealand.

And there's no record of it.