Telegram Web Link
It's αŒαˆα‹
Assalamualaikum members
We'd like to announce we've created a back up channel in light of recent developments, join in ✨
Muslim Memes [M. Inc]πŸ§•πŸ§”β€β™‚οΈ pinned Β«Assalamualaikum members We'd like to announce we've created a back up channel in light of recent developments, join in ✨»
Forwarded from Muhammad || Ω…Ψ­Ω…Ψ―
>posts cat and funny memes
> Get Blocked by local authority
⚑️5 Startling Technology Leaks from Julian Assange's Wikileaks
@takebackourtech

Today a judgement was passed in Julian Assange’s extradition case, although it drags the case on and gives the possibility for a final rejection. If this happens, Assange will spend up to 175 years in a US maximum security prison.

His crime? Publishing classified documents which corroborated war crimes, covert surveillance programs, and torture. We pray for his release, and we will never forget how Assange and Wikileaks illuminated public awareness of these shadowy programs so we could begin to protect ourselves.

Follow Taylor Hudak for coverage on the Assange Trial.
Follow the #TBOT Telegram Channel
Follow the #TBOT substack.

In honor of Julian Assange, here are 5 published Wikileaks that expanded our awareness on technology surveillance.

1. The Location of 100 Amazon Data Centers

Amazon, the largest cloud computing provider in the world is also one of the largest cloud providers for government and military. They wouldn’t be doing their jobs if they weren’t protecting the locations of their data centers, unforunately for them - they didn’t see Wikileaks coming. In 2018, Wikileaks published a highly confidential document that listed the IP addresses of one-hundred data centers.

No, there’s no creepy looking Amazon badge on these buildings - these buildings were operated under front companies. The names of these front companies were leaked along with addresses, contact emails, and directions - and a map of their locations.

What secrets lie behind the walls of these unassuming buildings?

https://wikileaks.org/amazon-atlas

2. ELSA, Locating Windows Computers Through WiFi

Leaked in 2017 as part of the Vault 7 CIA hacking tools, ELSA is a geo-location malware project that can detect the location of Windows devices. Once ELSA has infected a target computer, it takes a list of available WiFi access points and cross-references these access points with public geo-location databases supplied by Google or Microsoft. Based on the signal strength it can calculate the position of the device which can be exfiltrated later.

#TBOT Tip: Don’t use Windows. Learn to love Linux.

3. No Isolated Network Is Safe, Brutal Kangaroo

Brutal Kangaroo, also a part of the Vault 7 tools was used to target closed β€˜air-gapped’ networks that are not connected to to the outside world. Brutal Kangaroo is deployed using a thumbdrive, and can spread through use of the thumbdrive on other computers. Eventually, controlled computers begin communicating directly with each other to exchange data.

#TBOT Tip: Be watchful over your devices. No external USBs, avoid having USBs delivered.

4. Is your local router a FlyTrap?

CheryBlossom, another tool from Vault 7 is used to capture wireless network devices like wireless routers. Routers can be compromised over the internet through a firmware upgrade, at which point the router becomes a FlyTrap and acts as an β€˜Man-In-The-Middle’, manipulating the internet traffic passing through it. It can scan for email addresses, chats, MAC addresses of devices, and VoIP numbers.

#TBOT Tip: Run a VPN on each device to encrypt internet traffic before it reaches a network.

5. Scribbles: Hidden watermarks in printed documents

A tool that has likely been used to catch whistleblowers, Scribbles is yet another Vault 7 project that embeds beacons into Microsoft Office documents. When a whistleblower prints the documents and releases them, the watermark can be restored to discover the source of the leak. Alternative softwares like OpenOffice or LibreOffice made this watermark visible to the target, and it was recommended to make the watermark match the document.

Readers may be reminded of the NSA’s case against whistlerblower Reality Leigh Winner, a former Air Force Linguist who worked for the NSA and sent a printed document to be published at The Intercept. Certain printers use microdots to identify the printer, date and time of printing.

Be careful what you print!
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Toppestofkeks
No wonder the Madkhalis are so happy about this Rabbi visiting Damascus. The Madkhali Judeo-Muslims can't wait to bring Judaism to the whole Middle East.
Nothing to be worried about, guys.
Grand Rabbi of Saudi stands with the Syrian Revolution.

Nothing to see here, folks. Don't ask questions, just celebrate!

And if you so much as raise an eyebrow, that means you're a munafiq or, even worse, a crypto-Shii Iranian agent!
Muslim Memes [M. Inc]πŸ§•πŸ§”β€β™‚οΈ pinned Β«Discussion platform for the Muslim memes channel ❗️MEMBER'S RULES❕ 1. NO TROLLING other members 2. NO throwing slurs around 3. Use RESPECTFUL terms when trying to explain your views or ideas 4. Members get 3 warnings before getting banned Ψͺ https://t.me…»
2025/07/07 16:23:47
Back to Top
HTML Embed Code: