Submitted by nsopegasusyou in Tech

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time.

Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors.

I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too.

I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

1

Comments

You must log in or register to comment.

8823a413f wrote

Sounds like you're crazy. If you know about some backdoor in your computer just describe it in technical language. Otherwise you're just pushing conspiracy theories.

8

unvaccinatedcomedian wrote

How did the feed reader end up revealing these secrets?

5

nsopegasusyou OP wrote

It was the bait that made the people on the other side try to recruit me. Then they shared too much with me, now I will pay the favour by sharing it with the world.

Morons got it coming.

−2

unvaccinatedcomedian wrote

Well I think you'll have to write up something much more in depth and with more evidence for any effects to be made against the US military

5

Fool wrote

Tempest (Emissions) security for electronic devices is good practice if you have good reason to hide data. It is standard practice in security manuals published by governments, so they're pretty aware everyone is planting things in hardware.

The 5G thing is pretty simple, if you're planning to litter radio transceivers/transmitters around your cities, do you get your enemy to build them? It would be like paying to build a spy network for your enemy.

Social media using military data? I think it's more the opposite. I know most countries use Google Earth for spying, because it's better than their own satellites.

I would be interested in looking at the malware you have, do you want me to create a drop location to put it in?

5

AnarchoDoom wrote (edited )

Nice copypasta, bruh! Yet still no evidence to back up this BadBIOS conspiracy theory.

So China good, US bad. Social credit system and massive surveillance tech ain't no big deal in China... it's all against them Western agents and Uyghur terrorists. /s

Btw I ran an ultrasound detector on my laptop, and it couldn't detect anything of interest...

3

existential1 wrote

I dont have the skills, know-how, or time to contribute...but sounds mighty interesting and useful.

2

BadEmpanada wrote

Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS).

I'm so confused. What feeds are you talking about? And exactly how did you come to the conclusion that the US military is able to proactively control all CPUs? BadBIOS seems to just be an alleged rootkit which utilizes ultrasonic communications via speakers and microphones. It doesn't look like it's something that comes as a backdoor in all CPUs by default, let alone something that even exists in the first place.

That's not to say jumping airgaps is not possible, because it certainly is. But the claim that all hardware is backdoored with very sophisticated malware that utilizes ultrasonic communications to transmit data that it analyzes is a very big claim.

2