Anonymous ID: a28a3c May 7, 2020, 3:07 p.m. No.9070231   🗄️.is 🔗kun   >>0452

>>9063132

 

Hmmm. While this is a true statement it is not necessary true for all apps. Take for example GEO location, facial recognition, voice recognition, iris tracking, finger print, sentance structure and language usage. etc…. There are all ways to correlate who you are, who you are communicating with, where you are, where you go, and what you are thinking about and create a dynamic profile. Notice recently that Scroogle and other companies stopped using cookies? Why? Because they don't need them any more for tracking. This tech is very advanced. They are using other techniques to identify you on your devices. While command and control (if well designed and thought out) does behave in this manor you are suggesting. There are many many layers and many many techniques as to how personal data / life is now compromised. Ghidra is very good at what it does. However extending your tool kits to steganography hide and seek tools, malware analysis checkers etc are very important as you do your detective work. There are many clues that can be discovered with Ghidra. Some can be easily missed. I just found an exe that was zipped up in an img file. I didn't see the exe in Ghidra (it was hidden very well) but I did find the bread crumbs for the zip file. Once I found the exe I put it back into Ghidra to see whats up…another layer of hidden information. Still working on that one particular challenge. I am always working to expand my tool kits and sharing what I know. If other anons have go to apps they like for this work it would be great to see what tools you use and the process you use for de compiling. It will take a digital army of anons to clean up all the compromised phone apps, PC, and Mac software. Now that we are on our way to cleaning up the compromised MSM "system" now its time to rip apart the web and its applications. Its disgusting what it has become. I love technology, been working in this area of tech for many years. I have watched brilliant technology get used for corruption fo way too long. Its time for this behavior to stop and make Technology Great Again. Our industry must be saved from what it has become. Surveillance is at an all time high right now. Chinese tech has subverted everything technical from the inside of or apps out. (Its a pervasive pattern in fact its right out of their playbook. Look up the book Unrestricted Warfare if interested). There are so many craptastic applications and services we all really need to get our shit together and fix these problems. Its a matter of national security when you think about how many chip sets we have in our homes, and businesses. They are all compromised in one way or another. Its shocking actually.

….Hack the planet anons. Lets roll!!

Anonymous ID: a28a3c May 7, 2020, 5:07 p.m. No.9071733   🗄️.is 🔗kun

>>9063737

 

The short answer is yes it is possible.

There are a few tools out there for decode. I had one at one time on my system I was looking at but can't remember the name. If you dig on PDF Steganography decoders you should find it….