>https://eam-watch.s3.amazonaws.com/CSV/eams.csv
Ya FUCK to the NO am I downloading your fucking .csv. Paste the contents in the clear you fucking pleb. Da fuq you think this is? Your link is aids.
>https://eam-watch.s3.amazonaws.com/CSV/eams.csv
Ya FUCK to the NO am I downloading your fucking .csv. Paste the contents in the clear you fucking pleb. Da fuq you think this is? Your link is aids.
Any software that has macro execution like MS Excel or Open Office can execute malicious code from a .csv.
Please educate yourself.
https://www.contextis.com//resources/blog/comma-separated-vulnerabilities/
It is bullshit reporting that you copied and pasted. If (you) would have taken the time to listen to the CSPAN segment the article cites you would have discerned the reporting is bullshit fear mongering.
If you would have taken the time to go to qresear.ch and read notables in the past 24 hours you would have seen this has been discussed. Get better. If you're not part of the team parroting this bullshit story for website and youtube views you are a lazy fuck.
Engage your brain before you cut and copy. You glow like a shill. If you are not a shill stop glowing like one.
I have come to accept that if the right person wants access to muh digital life, they will get it with relative ease.
OS Backdoors (pooter, phone)
Public Records
IMSI Catchers
…etc
Those that want to be truly secure need to make yuge life changes. IMO those types of life changes could paint an even larger target on your back if the wrong person, with enough means wants to fuck with you.
Cloaking devices? You mean they just don't squak a transponder code? Or they use transponder codes that show CIV aircraft?
You know they don't have to squak a code under certain operating conditions?