Telegram Web Link
Forwarded from JizyaNews [M. Inc]
In less than two weeks, the number of martyrs in Al Fasher, Sudan, is at least 110. All civilians, killed by the Rapid Support Forces.

Quick Information

RSF is a paramilitary group, originally backed by the Sudanese government but later opposed the Sudanese government. This group’s fight against the Sudanese is based on tribalism alone, their use of Islamic language and rhetoric is opportunistic and pragmatic.


Let’s not forget our Sudanese brothers and sisters who are in dire need of our support and prayers.
😒3πŸ‘1🀨1
It's αŒαˆα‹
❀1
Assalamualaikum members
We'd like to announce we've created a back up channel in light of recent developments, join in ✨
❀3
Muslim Memes [M. Inc]πŸ§•πŸ§”β€β™‚οΈ pinned Β«Assalamualaikum members We'd like to announce we've created a back up channel in light of recent developments, join in ✨»
Forwarded from Muhammad || Ω…Ψ­Ω…Ψ―
>posts cat and funny memes
> Get Blocked by local authority
😁6
⚑️5 Startling Technology Leaks from Julian Assange's Wikileaks
@takebackourtech

Today a judgement was passed in Julian Assange’s extradition case, although it drags the case on and gives the possibility for a final rejection. If this happens, Assange will spend up to 175 years in a US maximum security prison.

His crime? Publishing classified documents which corroborated war crimes, covert surveillance programs, and torture. We pray for his release, and we will never forget how Assange and Wikileaks illuminated public awareness of these shadowy programs so we could begin to protect ourselves.

Follow Taylor Hudak for coverage on the Assange Trial.
Follow the #TBOT Telegram Channel
Follow the #TBOT substack.

In honor of Julian Assange, here are 5 published Wikileaks that expanded our awareness on technology surveillance.

1. The Location of 100 Amazon Data Centers

Amazon, the largest cloud computing provider in the world is also one of the largest cloud providers for government and military. They wouldn’t be doing their jobs if they weren’t protecting the locations of their data centers, unforunately for them - they didn’t see Wikileaks coming. In 2018, Wikileaks published a highly confidential document that listed the IP addresses of one-hundred data centers.

No, there’s no creepy looking Amazon badge on these buildings - these buildings were operated under front companies. The names of these front companies were leaked along with addresses, contact emails, and directions - and a map of their locations.

What secrets lie behind the walls of these unassuming buildings?

https://wikileaks.org/amazon-atlas

2. ELSA, Locating Windows Computers Through WiFi

Leaked in 2017 as part of the Vault 7 CIA hacking tools, ELSA is a geo-location malware project that can detect the location of Windows devices. Once ELSA has infected a target computer, it takes a list of available WiFi access points and cross-references these access points with public geo-location databases supplied by Google or Microsoft. Based on the signal strength it can calculate the position of the device which can be exfiltrated later.

#TBOT Tip: Don’t use Windows. Learn to love Linux.

3. No Isolated Network Is Safe, Brutal Kangaroo

Brutal Kangaroo, also a part of the Vault 7 tools was used to target closed β€˜air-gapped’ networks that are not connected to to the outside world. Brutal Kangaroo is deployed using a thumbdrive, and can spread through use of the thumbdrive on other computers. Eventually, controlled computers begin communicating directly with each other to exchange data.

#TBOT Tip: Be watchful over your devices. No external USBs, avoid having USBs delivered.

4. Is your local router a FlyTrap?

CheryBlossom, another tool from Vault 7 is used to capture wireless network devices like wireless routers. Routers can be compromised over the internet through a firmware upgrade, at which point the router becomes a FlyTrap and acts as an β€˜Man-In-The-Middle’, manipulating the internet traffic passing through it. It can scan for email addresses, chats, MAC addresses of devices, and VoIP numbers.

#TBOT Tip: Run a VPN on each device to encrypt internet traffic before it reaches a network.

5. Scribbles: Hidden watermarks in printed documents

A tool that has likely been used to catch whistleblowers, Scribbles is yet another Vault 7 project that embeds beacons into Microsoft Office documents. When a whistleblower prints the documents and releases them, the watermark can be restored to discover the source of the leak. Alternative softwares like OpenOffice or LibreOffice made this watermark visible to the target, and it was recommended to make the watermark match the document.

Readers may be reminded of the NSA’s case against whistlerblower Reality Leigh Winner, a former Air Force Linguist who worked for the NSA and sent a printed document to be published at The Intercept. Certain printers use microdots to identify the printer, date and time of printing.

Be careful what you print!
Please open Telegram to view this post
VIEW IN TELEGRAM
✍1πŸ‘1
Forwarded from Toppestofkeks
πŸ’―8✍1
No wonder the Madkhalis are so happy about this Rabbi visiting Damascus. The Madkhali Judeo-Muslims can't wait to bring Judaism to the whole Middle East.
😑3πŸ€”1
Nothing to be worried about, guys.
πŸ€·β€β™‚2😑2
2025/07/12 22:12:34
Back to Top
HTML Embed Code: