Anonymous ID: c377c9 April 9, 2018, 11:33 a.m. No.969087   🗄️.is 🔗kun

>>968707

No.

You will find comparators. There are many ways to construct comparators, but most systems use NAND topography as it is faster and more efficient. After a signal goes through an amplifier, it is put up against an array of biased nand gates. The higher the voltage, the more gates switch off. By sampling this array thousands of times per second, you get a raw binary representation of your signal.

 

Of course, there are many other strategies that can be used to similar effect... But all of these technologies are integrated these days. Even if a bridge rectifier was part of the deal, it is four components within a mass integrated device of hundreds or thousands of transistors.

 

Anything compromised in your motherboard is such a device. It is not a single component that is on your motherboard, but a series of systems lithed into the dies of a north/south bridge. It is not possible to remove without the capacity to make your own lithed dies. That requires clean rooms... And a pin-for-pin compatible setup with acceptable performance will require Fab tech not currently accessible to the home user.

Anonymous ID: c377c9 April 9, 2018, 11:39 a.m. No.969217   🗄️.is 🔗kun

>>969048

Why would you need to be chipped when every wifi access point is mapped by phones in range of them?

 

Why would you need to be chipped when every email address can be profiled to real people and any time they are used be logged?

 

Why do you need to be chipped when your friend with a phone has your number and his microphone can pick up names and voices? The phone is powerful enough to process voice to text. It is powerful enough to process voice as an ID. Your friend sends you a text, you meet up and talk in the presence of a phone, it has info on you that it sends to big G.

Anonymous ID: c377c9 April 9, 2018, 11:57 a.m. No.969513   🗄️.is 🔗kun

>>969319

There are a lot of potential applications of phones used as a distributed microwave element net. That said, I somewhat doubt it is used on a massive scale. Though I could be underestimating the hardware capability.

 

That said, I think you are much closer on point with your bridge. If SSL and others are compromised technologies or vulnerable to meta-data analytics (a sort of attack vector and goal different from, say, knowing your credit card number or password)… Then it means that FB and Google have access to far more of a user's history than simply cookies. Advanced mapping of networks and their activity can be done, allowing profiling of individual workstations.

 

It is an orwellian nightmare.