[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/realnews/ - REAL NEWS

Real News Without Shills or Trolls

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


File: 1440020013708.jpg (19.38 KB, 380x227, 380:227, Bill Gates-- 'Trust me'.jpg)

 No.183

Windows 10 BUSTED, AND IT IS CREEPY

Yeah, I guess HILLARY'S E-MAILS PROVED THE NSA AS A SOURCE IS NOT GOOD ENOUGH, because using them can land you in jail. THE NEW CONSULTEE IS (PROBABLY) MICROSOFT, why have your goons infiltrate an old outdated battleship like the NSA when that can backfire?

Why does Microsoft have a right to ALL text I type, the first 35 megabytes of video from a web cam every time it is turned on, and everything that gets picked up by the microphone? Ha, they don't BECAUSE I DO NOT USE THEIR PRODUCTS, if you have not woken up yet and still do, here is what now happens:

All text typed on the keyboard is stored in temporary files, and sent (once per 30 mins) to:

oca.telemetry.microsoft.com.nsatc.net

pre.footprintpredict.com

reports.wes.df.telemetry.microsoft.com

This will allow Microsoft and the greater Jewish community to have a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.

Telemetry is sent once per 5 minutes, to:

vortex.data.microsoft.com

vortex-win.data.microsoft.com

telecommand.telemetry.microsoft.com

telecommand.telemetry.microsoft.com.nsatc.net

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

sqm.telemetry.microsoft.com

sqm.telemetry.microsoft.com.nsatc.net

This allows them to track you very accurately.

 No.184

Typing the name of any popular movie into your local file search starts a telemetry process that indexes all media files on your computer and transmits them to:

df.telemetry.microsoft.com

reports.wes.df.telemetry.microsoft.com

cs1.wpc.v0cdn.net

vortex-sandbox.data.microsoft.com

pre.footprintpredict.com

This allows them to index any "unauthorized" content, and build a dossier on you that can be used in conjunction with their tracking data to stuff almost anyone in jail when needed.

When a webcam is first enabled, ~35mb of data gets immediately transmitted to:

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

vortex-sandbox.data.microsoft.com

i1.services.social.microsoft.com

i1.services.social.microsoft.com.nsatc.net

This allows them to get a good layout of your home and surroundings, and a good look at YOU PERSONALLY so they know exactly who to go get and how to stage the attack when something you typed pissed them off.

Everything that is said into an enabled microphone is immediately transmitted to:

oca.telemetry.microsoft.com

oca.telemetry.microsoft.com.nsatc.net

vortex-sandbox.data.microsoft.com

pre.footprintpredict.com

i1.services.social.microsoft.com

i1.services.social.microsoft.com.nsatc.net

telemetry.appex.bing.net

telemetry.urs.microsoft.com

cs1.wpc.v0cdn.net

statsfe1.ws.microsoft.com

So even if you do not type anything, just talking in the room is gonna get you nailed, and if you say anything they don't like they will already have had a good look at you personally with your web cam, plus your surroundings, plus your exact location with that telemetry data, so they can PEG YOU GOOD. Yeah, I guess HILLARY'S E-MAILS PROVED THE NSA AS A SOURCE IS NOT GOOD ENOUGH, because using them can land you in jail. THE NEW CONSULTEE IS MICROSOFT, why use an old outdated battleship like the NSA when that can backfire?

If this weren't bad enough, this behaviour still happens when Cortana (microsoft's version of SIRI) is not installed is SO IT IS NOT ANY HELPFUL ASSISTANT DOING THIS, IT IS A DATA AND PRIVACY RAPE PURE AND SIMPLE.

http://82.221.129.208/ac2index.html


 No.185

Stay the fuck away from all new Winblows systems, I've already been told that years ago. I still use XP on an old laptop. That's it. I'll wipe out cookies/cache/history every day (using Ccleaner) and unplug from the modem while not using it. I also have Xubuntu, an awesome easy to use linux OS on a separate computer. Any tech released since 2009 I don't touch - hell, I don't use iphones either. If you have a camera in the laptop, carefully peel back the plastic layer from the monitor screen and snip the wire that connects to the camera circuit (or cover the camera up with black electric tape) and snap the plastic layer back to the monitor. You can often locate the mic and do the same thing if you like to feel safer. If you want to know some of the root system vulnerabilities in the older Windows systems check out this small archive (instructions included; read and follow carefully):

REG_WARS.zip

https://mega.co.nz/#!nsEwGCTK!xGM7T77TSmob_TSmYtTEbvnN4rTGp9Aezaik2Uzg9PQ


 No.239

>>185

Thanks.


 No.248

>>183

>>184

Has anybody got any proof or documentation on the above claims. Sure, I want to believe it, but I want a little bit of actual proof.


 No.249

>>248

Someone leaked the full details of this data here:

http://8ch.net/leaked/res/549.html


 No.250

>>249

This isn't proof. This is a list of processes that may not even exist. I need proof, packet analysis, not some conspiracy jargon.

I'm going to show you how to block clowns from invading your computer, first you need to block this in hosts:

127.0.0.1 clown.invasion.suckmyballs.com


 No.251

>>250

Don't complain to me, #1. I did not create this report, someone else did. #2. I do not use Windows 10, nor will I ever use it, so I don't know if this is legit or not. I just stumbled upon this info. If you want to really secure Windows, I'd recommend you get an older OS and follow these instructions >>185 because this is confirmed to work well.


 No.252

>>250

>>251

Here, this explains how hosts.txt works:

http://support.isoc.net/Page.aspx/117/hosts.html

mirrored: https://archive.is/6STs

127.0.0.1 annoying-commercial.com

"The IP-address 127.0.0.1 is the machine's local address. This means that the first line blocks all contact with annoying-commercial.com by linking it to the computer self. This will give the browser a busy signal, and it will give up trying to find it. Hence any links to annoying-commercial.com won't make it to your machine. This is a usual way of blocking unwanted advertising web pages."


 No.255

>>252

I just looked up the hosts file in my old Windows Vista and opened it, OK this info is confirmed! Note: my computer is old-school. All it has listed inside C:\windows\system32\drivers\etc\hosts is simply this:

127.0.0.1 localhost

That's it! My computer works just fine! So simply erase all the other crap in the new system hosts file (except for the one above), save it and everything should work just fine.


 No.804

Related: >>185

Not interested in installing Windows 10 on your computer after reading news reports indicating Microsoft will track your online behavior and save your search queries, private emails and contents of private folders, including photos?

Too bad. You may not be given much of a choice.

Microsoft’s Windows 10 is preparing to automatically download onto computers currently installed with Windows 7 or 8 – without the computer users’ knowledge, London’s Guardian reported.

According to the report, Microsoft announced that Windows 10 will become a “recommended update” in 2016, and anyone who has automatic updates activated will have the new program installed automatically on their PC.

After it has downloaded, the Windows 10 installer will begin. At that point, users will need to actively cancel Windows 10.

https://archive.is/ItnZs

http://www.wnd.com/2015/10/windows-10-to-automatically-download-on-your-pcs/


 No.945

Related: >>185 ; >>804

The laptop this got onto just sits there like a brick, TOTALLY unused unless for some reason it is started up to play music, which even at that is unusual. It is not a daily thing. However, yesterday I turned it on and forgot to turn it off. It went into "sleep mode" for about five hours. I then started it up and shut it off. Today I started it and went into the music directories, and voila! that new star of david character was mixed into the titles of any song that had latin characters, in place of the latin characters. That computer NEVER HAD THAT CHARACTER BEFORE SHOW UP IN ANYTHING EVER. Additionally, the contents of the music folders were re-arranged, with large song playlists that had been given their own folders dis-assembled completely and dumped into one large folder. DID MICROSOFT TAKE THOSE FILES, MOVE THEM INTO ONE DRIVE WITHOUT MY PERMISSION, AND SCREW UP THEIR ARRANGEMENT? POSSIBLY!

RED ALERT: THERE IS NO WAY THIS COULD POSSIBLY HAVE HAPPENED TO THIS SYSTEM, WHICH NEVER GOES ONLINE, HAS NEVER DONE ANYTHING LIKE THIS BEFORE OR AFTER BEING PERMANENTLY TAKEN OFF THE WEB SO IT IS NOT MALWARE OR A VIRUS, THE ONLY WAY A NEW CHARACTER SET COULD HAVE BEEN LOADED AND FOLDERS SCREWED UP IS IF IT WAS DONE THROUGH A LOCAL WIFI I NEVER HAD ACCESS TO.

This happened when:

1. There is no internet for this computer.

2. Updates are disabled anyway.

3. Windows installer is disabled as well, so nothing can install, and it has been that way since I bought that computer 3 years ago.

4. The computer has not been used much for the past year, (used approximately once a week) which is enough to know it worked fine.

5. Absolutely nothing was installed by me or anyone else, nothing was re-configured, and no memory cards or flash drives had been plugged into it.

6. Absolutely NO ONE used that computer, there were no guests or children that had access to it.

When this happened:

1. The character set was changed to an English character set on a Latin computer, because no doubt Windows 10 discovered the computer was used entirely in English with Firefox and other applications installed in English despite being purchased in Latin America. When this was done, anything that was a specifically Latin character now has a star of david in it's place when before it all displayed the way it should.

2. The music folders got messed up with songs not appearing where they should be in folders. Playlists were destroyed. All songs were still on the computer, but they were not in the correct places. This can't happen unless someone or something does it, and WHAT COULD HAVE if the computer is just an offline brick that has worked perfect as an offline brick for a year?

3. The computer looked perfectly normal, as if it had Windows 7 installed on it, as usual. The computer ran the same as usual. It did not get clunky or messed up like it would if Malware took it over, or if it had a virus. But the character set is now different, THIS COMPUTER NEVER HAD AN OPERATING SYSTEM BASED ENGLISH CHARACTER SET ON IT EVER, HOW DID ONE GET ONTO IT?

Windows 7 starter never had the option to change languages or character sets out of box AT ALL, how did it suddenly get that ability out of nowhere?

YOU GUESS.

It sure looks to me like a Windows 10 infected machine will search its WIFI environment for any other totally unsuspecting Microsoft machine and install itself, even if there is no allowed connection in that environment. When it does this, it keeps it all a secret but NOT WITH ME, MICROSOFT, IF YOU ARE GOING TO DO THIS YOU CAN'T HAVE A SYSTEM THAT SCREWS UP AND MAKES IT OBVIOUS!

Time to brick that laptop, in concrete.


 No.946

>>945

FLASHBACK: I SAID HOW THIS COULD HAPPEN BEFORE, AND PAUL JOSEPH WATSON QUOTED ME AND MANY OTHERS IN A COMBINED REPORT THAT SAYS PRECISELY HOW MICROSOFT COULD AND EVIDENTLY IS RAM RODDING WINDOW'S 10 UP THE WORLD'S BEHIND:

Paul Joseph Watson, September 26, 2013

Intel Core vPro processors contain a secret 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.

Although the technology has actually been around for a while, the attendant privacy concerns are only just being aired. The secret 3G chip that Intel added to its processors in 2011 caused little consternation until the NSA spying issue exploded earlier this year as a result of Edward Snowden's revelations.

In a promotional video for the technology, Intel brags that the chips actually offer enhanced security because they don't require computers to be powered on and allow problems to be fixed remotely. The promo also highlights the ability for an administrator to shut down PCs remotely even if the PC is not connected to the network, as well as the ability to bypass hard drive encryption.

Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now, reports Softpedia. Jeff Marek, director of business client engineering for Intel, acknowledged that the company's Sandy Bridge microprocessor, which was released in 2011, had the ability to remotely kill and restore a lost or stolen PC via 3G.

Core vPro processors contain a second physical processor embedded within the main processor which has it's own operating system embedded on the chip itself, writes Jim Stone. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system's phantom power and is able to quietly turn individual hardware components on and access anything on them.

Although the technology is being promoted as a convenient way for IT experts to troubleshoot PC issues remotely, it also allows hackers or NSA snoops to view the entire contents of somebody's hard drive, even when the power is off and the computer is not connected to a wi-fi network. It also allows third parties to remotely disable any computer via the secret 3G chip that is built into Intel's Sandy Bridge processors. Webcams could also be remotely accessed.

This combination of hardware from Intel enables vPro access ports which operate independently of normal user operations, reports TG Daily. These include out-of-band communications (communications that exist outside of the scope of anything the machine might be doing through an OS or hypervisor), monitoring and altering of incoming and outgoing network traffic. In short, it operates covertly and snoops and potentially manipulates data.

Not only does this represent a privacy nightmare, it also dramatically increases the risk of industrial espionage.

The ability for third parties to have remote 3G access to PCs would also allow unwanted content to be placed on somebody's hard drive, making it easier for intelligence agencies and corrupt law enforcement bodies to frame people.

The bottom line? The Core vPro processor is the end of any pretend privacy, writes Stone. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web at all, think again. There is now more than just a ghost in the machine.

AND I HAVE NO DOUBT THIS IS IN MANY CASES HOW MICROSOFT IS RAMRODDING WINDOWS 10 ONTO MANY COMPUTERS, WANTED OR NOT.

http://82.221.129.208/ifyouarinamericayouprobablycantseethisc2.html


 No.947

Related: >>185 ; >>804 ; >>945 ; >>946

OLD-SCHOOL WINDOWS FORTIFICATION TOOLS!

CCleaner_Cache_Exposé.zip

(With this tool you can find all the deeply hidden caches, activity logs, cookies / browser history, cryptnet cache, LSO (flash cookies aka "evercookies"), and other obscure third party logging! Comes with DIY instructions.)

http://www.mediafire.com/download/bq1a8ii84ixcg36/CCleaner_Cache_Expos%C3%A9.zip

REG_WARS.zip

(With regedit.exe you can permantly defunct CLSIDs (class object registry) of any unwanted software and/or firmware deep within the computer! You must be very careful with this program, instructions on how to fortify your older system is included, step-by-step! You MUST follow these instructions or you could damage your system! Be very careful, you do NOT want to mess with anything you don't know about! Also included is a VERY USEFUL step-by-step instruction on how to 100% NULLIFY TO HELL the Windows Auto-updater! I don't care what some people may say, in order to truly resist Auto-updates, you must defunct the Auto-updater registry (CLSID) so it can no longer function!)

http://www.mediafire.com/download/ixz7q978d4bra7a/REG_WARS.zip

For those who think I'm full of shit, I just want you all to know I have NO anti-spyware at all!

I have never had a problem with my system! I have never had an update, EVER! Yes, I've checked!

I have never been hacked or doxed! Nothing! My system works just fine with the use of these two tools!

You want a great system like mine? Install Windows XP (search bit-torrent), download these two tools and get to work!


 No.1020

Windows 10 is a botnet. It is scanning the internet to detect any older Windows operating systems to force auto-updates against the users' will.

You want proof? Read here: https://archive.is/ItnZs

Do you know that users can take care of this?

If you have an older Windows operating system, all you have to do is make sure the Auto-updater is defunct and can no longer work on the operating system … and it's no secret how to do this either!

Visit my new board to find out how to completely HACK & NULLIFY Windows Auto-update! Also, I gots tons of Windows XP backups you can download and store in your underground bunkers! Plus, tons of software bundles! And to top it off, I have instructions how to fortify older Windows operating systems too!

>>>/purgewin10/


 No.1229

File: 1451612445476.jpg (455.1 KB, 1024x768, 4:3, 1451492680901.jpg)

Windows XP Professional SP2 & SP3 Backups!

http://www.mediafire.com/?8pleulcef91dr

This is a bundle of Windows XP (SP2 and SP3) operating systems including the Warez "Black Edition" (available for 32-bit and 64-bit processors)!

Some come with serials and others are Pre-activated! Many versions of Windows XP are included in the bundle! This huge bundle includes pretty much ALL you will ever need!

Following files include:

• ~Windows XP Professional SP3 Integrated August 2013 (32 Bit).zip

• EN Windows XP Pro sp3 VL (MSDN).zip

• Microsoft Windows XP Professional x86 (32 Bit) Edition with SP3 VLEN.zip

• Microsoft.Windows.Xp.Pro.Sp2.32Bit.October.2007.iso

• Microsoft.Windows.XP.Professional.SP3.x86.Integrated.April.2014-Maherz.zip

• MICROSOFT.WINDOWS.XP.PROFESSIONAL.WITH.SP3.x86.RTM.VOLUME.ENGLISH-WZTiSO.zip

• WIN XP SP3 (1-1).ZIP

• Windows XP Professional BACKUPS + Serial.pdf

• Windows XP Professional SP2 Original with key [trutorrent].zip

• Windows XP Professional SP3 + Serial.iso

• Windows XP PROFESSIONAL SP3 Jan 2015 + SATA Drivers [TechTools.net].zip

• Windows XP Professional SP3 x86 - Black Edition 2014.7.13.zip

• Windows XP Professional with SP2 ISO, Pre-activated, and key included.zip

• Windows_XP_Pro_SP3_32bit_Black_Edition_2013.4.16.zip

PLEASE don't forget to disable auto-update! Windows auto-update can detect, and likely will defunct pirated versions!


 No.1231

You're probably saying something important, but any time I see someone writing in excessive capitalization I automatically write them off as a blithering idiot so sadly I guess I'll never know.


 No.1232

>>1231

The OP came from Jim Stone's blogspot, he always types that way. Why? I really don't know either. I think he's a smart guy, but too eccentric sometimes.

Steve Quayle will type in all caps too, but that's because he has pour vision and can't see very well.




[Return][Go to top][Catalog][Post a Reply]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]