More ironic than Chinese State-approved VPNs..? ..so businesses there can , y'know, cross their Great Internet Firewall, and do business with the rest of the world they so desperately need to dump their junk on😂😂😂😂
The law required ISPs to create backdoors that could be used for wiretaps by US law enforcement, and hackers have now found and accessed them. This is what you get.
I laughed for a significant amount of time when I saw the news and realized the FBI themselves have now historically discarded the entire "if nothing to hide, why need security" argument. Discussion finally over. This is precisely what every IT nerd warned everyone about.
Do you think this is the first time between the exchange of cyber-attacks between China and the United States? And more specifically, China attacking the USA. There are no saints in this war.
Hmm. I thought of something I heard about the Japanese while watching this video, and I wondered how it would apply to the Chinese - that what they lack in innovation prowess, they more than make for in expanding on and improving existing ideas. Then there's the notion from the Kurt Vonnegut book "Slapstick," where the Chinese are so advanced that they managed to be able to shrink themselves down to action figure sized. It could be that their most advanced tech is something you wouldn't recognize to look at, let alone decrypt (because you wouldn't know the gist of what you were looking at). Then there's the population size advantage, where they could have so many people communicating so much information that any valuable intel gets lost in the electronic haystack. With all of the most valuable people working for the state, they don't need anything like LinkedIn to let the entire world know who it's most valuable tech developers are. Also, with a much less globally aggressive posture, there isn't as near as much of a moral quandary about contributing one's talents to Big Brother.
This is the US Governments fault for trying to be lazy about their job. If ISPs and messaging program devs didn't have to make backdoors for them, we wouldnt even be here. I sincerely hope there's a huge pushback on this, especially since more people are aware of their privacy.
@legendaryz_ch Remember the 0day 0click iphone hack a while back? Another blatantly implemented backdoor that was found and exploited by a foreign govt.
@@SheikhBouAounby thinking: if you have control over the telecom network, you can intercept (and perhaps delay and/or delete) messages send over it and use those messages yourself to get rid of 2FA for that user since you now have the second factor.
They're really no more likely to steal two factor codes of random people than the departments that usually have access to these backdoors. Just nothing to gain from doing that, as they want the babckdoor-based surveillance to still be a thing in the future so they can regain access and try not to get caught again.
"U.S. officials urge Americans to use encrypted apps amid unprecedented cyber attack" Yknow, U.S. officials, that encryption doesnt work if you put back doors in it...
Wdym? US has ban new Chinese device and old one are forced to be pulled from production they even giving handout for telkos to switch to locally made more expensive spy machine 🤔 for years
@romekuibopuu2417 yup, not even a joke. You can't make a backdoor only the "good" guys (i don't really consider the cia a good guy lol) can have access to I wished our politicians in europe fucking understood that
Open source software isn't exactly safe from hacking either, as we saw for example with the recent XZ Utils incident. It was by sheer luck that it was caught in time. We don't know how many similar incidents may have slipped through. Just because the code is available for anyone to see is no guarantee that it has been adequately reviewed.
@tuntitommosille It's not the perfect solution, but is more realiable. You can't compare a software that you can't audit because of licenses and the source code being private with a publica avaiable one, which you can detach almost every part and analize on a lower level.
The US is like an octopus with its tentacles all over the world. Of course they do it. They have 800 military bases in the entire world and in most of the 195 countries. They've also been able overall through espionage and CIA tactics.
With these kind of attacks out there and Microsoft forcing people to move onto Windows 11 with permanent screen recording build-in... companies and most home users should really look into using a free and open-source operating system based on Linux or BSD. It's only a matter of time until we see massive leaks of private companies through this vector.
a small correction : the names you mentioned are not names that groups go by , those are names that get assigned to them by threat intelligence firms such as mandiant , microsoft , crowdstrike ...etc as an example , APT 29 is called different names : cozy bear , the dukes , Midnight Blizzard , UNC3524 depending on who did the threat intelligence. Also , CISA doesnt know the full impact of the attack and what kind of persistence do the attackers have because they are in the initial stages of a very large investigation . attackers can not hide from forensics even if they use 0 day exploits. great video dude . awesome work. thank you !
I love your journalism man thank you so much Been trying to tell my family this for years now, maybe they'll finally come around. We all have so much to lose.
seems kinda sus to me. its like they want us to think those private apps are actually private, meanwhile theyre spying on those convos that are "private". like theyre preparing for something... maybe the telegram owner was charged because he didnt want to create a backdoor in the app, while the other app owners did...
And this thing has been happening for a while (1-2 years). The US is also not the only country affected, according to another video and article I saw. Soon a very famous hack will occur that reaches the main stream news and hopefully encourages more people to consider regarding their privacy and to not take it for granted without giving it a second thought.
CN already had it's grasp in Asia a long time ago. US simply yapping about freedom and democracy when all economical endpoints are being seized by PoOh
just a question. what exactly are you afraid of ? what china would earn by surveillance of irrelevant people? I d advise to protect yourselves from the antisocial hateful propaganda of your "democratic" government.
This honestly feels urgent since you're usually so lax with speaking. I can hear each breath you take in this video! (Either that or the audio was just a bit off lmao)
It's a security problem caused by backdoors created for use by US law enforcement, so a hardware company like Huawei doesn't really have an efffect on whether it gets accessed by outside actors. Also, the Huawei ban is mostly focused on consumers. For example, American 4G networks still have a bunch of Huawei equipment. The FCC does have a "rip and replace" program, but companies aren't interested since nobody is forcing them to not use Huawei.
China is one of the most capable in cyberwarfare I am not sure the US would win a full cyberwarfare against China, China invests too much on it. Easier to steal from others instead of spending the millions in research
04:10 Mental Outlaw pretending not knowing the big flag with this exploit: renaming the file doesnt change its signature. Just right clicking the file to see its properties will show the file is compromised.
"NOOO, ONLY WE ARE ALLOWED TO DO ILLEGAL STUFF AND VIOLATE YOUR RIGHTS" I really hope we give out the United Health special to the people selling our rights and futures to the highest bidder
I tried to use an authenticator app once. But then my phone screen broke and it took me having to buy an identical phone and swap out the main board to get access to things again.
@@hiru92 Didn't want to risk breaking it. I would have still had to buy an identical phone either way. It was a galaxy s4, which I doubt they make screens for anymore. It was an easy board swap, and I didn't have any conflicts when it turned it back on. A newer phone would have made that very challenging.
this also happened to me, that's why i switched to security keys, now i don't rely solely on my phone anymore, i can use it on all my devices(OTP codes work too) and i got a second one as a backup in case something happens to it
Authenticator apps like Aegis have an import/export feature where you can transfer the keyvault. This means you can make a backup of the keyvault and store it offsite or on a second device. Only need the decryption key, the backup, and the app.
I really thought you would make a video on the Australian social media ban and how it's just an excuse for enforcing id identification on social media.
Sadly, the recommendation to stop using SMS and phone authentication is moot and pointless. The overwhelming push by supposedly high security places like banks is to force the exclusive use of SMS authentication, I guess they are under the assumption that phone authentication is anything less than totally borked and unsafe... There is no changing their mind. Then again, I am from Canada, maybe the USA banks are less arrogant and foolish than most of ours.
@3:18 I FUCKING NEW IT! I hate being right, like literally my brain recognizes diabolical patterns in a snap and they are usual right and this was a full on bullseye hearing this and suspecting it reductively for quite some time. How tf do I sniff and root these scripts?
I'm not from the USA but based on the comments I really like the people It seems like it's more the government and political actions that create a negative image of the USA, not the people themselves!
@@AR-iv6se If you think some country halfway around the world is "the enemy" of you, a common working-class person, while you're being sucked dry daily by antidemocratic, neo-feudal corporatocracy in your own country, there may be some readjustment needed in that worldview.
I've switched every 2FA I can to an authenticator app. Frustratingly, two financial companies I do business with still only offer SMS-based 2FA. And they're big companies, known nationwide. I don't understand why they haven't switched to more secure authentication methods.
The gov wants you to use Signal or Whatsap?...LOL...that's all you need to know it an OP. I rather use Session or Tox. And I would not be surprised if Session was an australian gov op.
Could a user do something similar, renaming an antivirus program to trick the malware into running while the antivirus is present? Would this make the intrusion any more detectable?
The irony of China causing FBI to recommend encrypted messaging.
Coming from the same people that want to "ban" end-to-end encryption.
They recommend US made compromised apps 😂😂😂
Sorry but neither of the above get to tell me what to do regardless.
More ironic than Chinese State-approved VPNs..?
..so businesses there can , y'know, cross their Great Internet Firewall, and do business with the rest of the world they so desperately need to dump their junk on😂😂😂😂
@@cjay2 OP said recommend not order.
so rude of the chinese hackers, dont they know the backdoors are for american surveillance only?
trix are for kids
They forgot to put a notice on the door in Chinese, not to enter
Based changs
Ur a follower
Sharing is caring 🤗
"Obviously, the feds are really pissed because they're usually the only ones that get to listen to your calls and read your text messages" LOL
Didn't they like a few months ago recommend banning things like meshtastic and signal? What irony.
Facts
spot on
🎯😂
He's not lying 😅
The law required ISPs to create backdoors that could be used for wiretaps by US law enforcement, and hackers have now found and accessed them.
This is what you get.
Lol, lmao even
Lol, the need to spy on everyone has only allowed other people to spy on the people they want to spy on.
Who would have guessed?
I know, right? EVERYONE warned the US government that the backdoors were absolutely stupid. this is a big collective "WE ALL TOLD YOU SO"
The US encouraged outsourcing of all technology manufacturing and importing of non-Americans for tech workers.
This is what you get.
China has the same backdoors and they go even deeper. And the cherry on top is having CCTV EVERYWHERE.
I laughed for a significant amount of time when I saw the news and realized the FBI themselves have now historically discarded the entire "if nothing to hide, why need security" argument.
Discussion finally over. This is precisely what every IT nerd warned everyone about.
You are absolutely right about this, haha. This is so funny, I can definitely use this to dispute that silly argument.
I feel so vindicated. These news articles boutta end all arguments 😌
Valid point, definitely a game-changer
I've been saying this for years, can't believe people are just now realizing this
Yes we did warn everyone, its always the experts that get laughed at and then proven right later on. We can only hope its not too late...
The Chinese government is watching me while I watch this
ooo kinky
Funny, but technically, you're connected via HTTPS, so no one eavesdrop on the data while it's in transit
And while you rub one out.
@@mightycrookedpigeonthat we know of
very difficult, to watch a single user, unless you are a celebrity or politician, they will use something like pegasus
We got the FBI recommending E2EE chatting apps and ad blockers before GTA 6
lmfao
well im reading what you just wrote, and can understand it !
@ well im reading what you just wrote, and can understand that there’s a 50% chance it’s sarcasm and I don’t get the point of what you just wrote !
@Pandacier half of comments are made by bots. Not even ones that use recent AI, just straight up Cleverbot.
@@poo5630 I hate it when the bots make the last half of my comments.
How the turn tables, huh?
Do you think this is the first time between the exchange of cyber-attacks between China and the United States? And more specifically, China attacking the USA.
There are no saints in this war.
😆😆
Hmm. I thought of something I heard about the Japanese while watching this video, and I wondered how it would apply to the Chinese - that what they lack in innovation prowess, they more than make for in expanding on and improving existing ideas. Then there's the notion from the Kurt Vonnegut book "Slapstick," where the Chinese are so advanced that they managed to be able to shrink themselves down to action figure sized. It could be that their most advanced tech is something you wouldn't recognize to look at, let alone decrypt (because you wouldn't know the gist of what you were looking at). Then there's the population size advantage, where they could have so many people communicating so much information that any valuable intel gets lost in the electronic haystack. With all of the most valuable people working for the state, they don't need anything like LinkedIn to let the entire world know who it's most valuable tech developers are. Also, with a much less globally aggressive posture, there isn't as near as much of a moral quandary about contributing one's talents to Big Brother.
@LunarCascader ch1 is literally the country that fill the most patent in the world
Speak English much?
This is the US Governments fault for trying to be lazy about their job. If ISPs and messaging program devs didn't have to make backdoors for them, we wouldnt even be here. I sincerely hope there's a huge pushback on this, especially since more people are aware of their privacy.
I know people making wireless equip for Verizon and they had to implement backdoors too
@legendaryz_ch If you know that, then it must be very easy for a Chinese spy to gather that information.
@legendaryz_ch Remember the 0day 0click iphone hack a while back? Another blatantly implemented backdoor that was found and exploited by a foreign govt.
i doubt that they wouldn't be able to compromise them without backdoors.
Yeah but it's the lock thing. Anything to make it harder, hopefully nothing to make it easier @@glowiedetector
OH NO!!!!!! All our systems having back doors and maintaining bugs and exploits is ... BAaAAAAaaaAADDddD?????!???!?!?!?!?
and this is why there should be no backdoors no matter how much the cops think it would be good.
*Especially* when bioluminescent agents think it would be good.
not a very high bar. we literally cant hire cops if their IQs are too high.
it's almost like we've been saying this for years
What. When AI downloads you. Foreshadowing
All them ppl saying Eric Snowden was full of it 😂
Ok. Who is “we” and where have you been saying this?
@@Kamawan0To whomever it applies, and for however long anyone else that wasn’t them denied anything simply because they could.
The ramifications of stealing two factor codes is legitimately scary.
Especially with Derek from veritasium videos with ss7 protocol easily hackable
I was unaware that this was even possible, and frankly, the video explanation is not enough. Where can I read more about this risk?
@@SheikhBouAounby thinking: if you have control over the telecom network, you can intercept (and perhaps delay and/or delete) messages send over it and use those messages yourself to get rid of 2FA for that user since you now have the second factor.
@@SheikhBouAoun Oh we know what you're up to, I'm not telling
They're really no more likely to steal two factor codes of random people than the departments that usually have access to these backdoors. Just nothing to gain from doing that, as they want the babckdoor-based surveillance to still be a thing in the future so they can regain access and try not to get caught again.
"U.S. officials urge Americans to use encrypted apps amid unprecedented cyber attack" Yknow, U.S. officials, that encryption doesnt work if you put back doors in it...
There hasn't been any case at all where encryption(AES or Assymetric+AES) has been compromised in the real world. Stop living in fantasy world.
NSA: "Noooo that's my toy!"
Imagine my shock when the US hands out their Telecom network to China then it's surprised when China uses it however it wants.
Wdym? US has ban new Chinese device and old one are forced to be pulled from production they even giving handout for telkos to switch to locally made more expensive spy machine 🤔 for years
all the US CEOs are going to sell or lose all my info anyways, what do I care if China gets it?
i cant believe this happened, how did this happen after we installed chinese equipment all over our mobile networks... what a crazy turn of events.
World never learns
they got access because us wants backdoor acces to everything
@@romekuibopuu2417 Some people might even be selling info about those backdoors
@romekuibopuu2417 yup, not even a joke. You can't make a backdoor only the "good" guys (i don't really consider the cia a good guy lol) can have access to
I wished our politicians in europe fucking understood that
Who could’ve thought
So much unpunished greed and hubris.
That's what happen when you trust the closed source nature of software, mainly on a critical system like telecom.
Open source software isn't exactly safe from hacking either, as we saw for example with the recent XZ Utils incident. It was by sheer luck that it was caught in time. We don't know how many similar incidents may have slipped through. Just because the code is available for anyone to see is no guarantee that it has been adequately reviewed.
@tuntitommosille It's not the perfect solution, but is more realiable. You can't compare a software that you can't audit because of licenses and the source code being private with a publica avaiable one, which you can detach almost every part and analize on a lower level.
@@tuntitommosille still more safe than closed source
@@tuntitommosillethere is no guarantee, but when anyone can see the code there is a higher probability of it being properly reviewed
@@tuntitommosilleyou're completely missing the point. Open source is safer. That's the only point
Once you've been compromised, assume it is all compromised.
You can't convince me the us doesn't do this to china too
The whole point of the NSA
Only China? More like *the whole world,* have you not heard of Snowden's revelations?
The US is like an octopus with its tentacles all over the world. Of course they do it. They have 800 military bases in the entire world and in most of the 195 countries. They've also been able overall through espionage and CIA tactics.
I ONLY GET SPIED ON BY MY OWN AMERICAN GOVERNMENT! HOW DARE THOSE COMMIES!
Are you 5 years old? Dude grow up, 😂
The FEDS wanting ME to use Encrypted Messaging Services???
That’s something I never would’ve heard from them
Who could have possibly foreseen that mandating back doors would lead to Swiss cheese security?
"as far back as 2020" imagine that
Let's use Windows Server for critical infrastructure... Whatever could go wrong.
Newsflash!! Carriers could care less who accesses your data as long as they get paid. They already cheerfully hand it over to the NSA.
22 seconds ago has to be a new record for any channel im subbed to
Lmao it's 2 mins for me now lol
4 min here
14 days for me
1 year for me
@@fellzerbro drop a video it’s been 11 years
Literally the only thing it could be is that they found the backdoor they left for the ABC fellas
With these kind of attacks out there and Microsoft forcing people to move onto Windows 11 with permanent screen recording build-in... companies and most home users should really look into using a free and open-source operating system based on Linux or BSD. It's only a matter of time until we see massive leaks of private companies through this vector.
So glad that we will get to hear a lot of Trump's "CHINAA" starting from February next year.
It was actually Chyna. As in Ukraine.
Your daddy Trump won’t do anything
RIP Chyna
Donald Trump Says "China" part 2
Sad Kermit At Window meme; "I just miss the way he said China".
a small correction : the names you mentioned are not names that groups go by , those are names that get assigned to them by threat intelligence firms such as mandiant , microsoft , crowdstrike ...etc as an example , APT 29 is called different names : cozy bear , the dukes , Midnight Blizzard , UNC3524 depending on who did the threat intelligence. Also , CISA doesnt know the full impact of the attack and what kind of persistence do the attackers have because they are in the initial stages of a very large investigation . attackers can not hide from forensics even if they use 0 day exploits. great video dude . awesome work. thank you !
The main problem is convincing job and family to switch to Signal app
Session is better, use that instead. It doesn't even need a phone number, unlike Signal.
Srry youtube likes to censor my comments.
"I'm only on Signal now!"
Use iMessage
Eh. No one's getting government secrets watching my mom text me about cute dogs
I love your journalism man thank you so much
Been trying to tell my family this for years now, maybe they'll finally come around. We all have so much to lose.
This is really good for privacy advocates. The FBI themselves are recommending E2EE so the normies are the crazy ones for not listening
European Union wants to read encrypted communications
They create a situation so they can fix it.
Who is they? 😊
Everyone does, they still can't
Not really
Everyone does, but they still can't. Chat Control keeps failing because the EU is a democracy.
seems kinda sus to me. its like they want us to think those private apps are actually private, meanwhile theyre spying on those convos that are "private". like theyre preparing for something... maybe the telegram owner was charged because he didnt want to create a backdoor in the app, while the other app owners did...
Yet another thank you for steering INTO the details. Always appreciated
This is what i like to call the "Boomerang Effect" 😉
Me, minding my own business after having thrown a boomerang:
And this thing has been happening for a while (1-2 years). The US is also not the only country affected, according to another video and article I saw. Soon a very famous hack will occur that reaches the main stream news and hopefully encourages more people to consider regarding their privacy and to not take it for granted without giving it a second thought.
Meanwhile in TempleOS: ✝️
Is it available for mobile? Asking for a friend.
Na 😂
@adaligone Idk man, I've looked at it and I'm pretty sure that's a big part of it.
🙏
Legendary reference pull
well well well, what did they think was going to happen LOL
China played the long game and Won .🥇 It’s going to take a while for the US to get back to the game. Until then we have to protect ourselves.
CN already had it's grasp in Asia a long time ago. US simply yapping about freedom and democracy when all economical endpoints are being seized by PoOh
just a question. what exactly are you afraid of ?
what china would earn by surveillance of irrelevant people?
I d advise to protect yourselves from the antisocial hateful propaganda of your "democratic" government.
US: Please use E2EE chat apps
EU: We're gonna spy on E2EE chat apps
This honestly feels urgent since you're usually so lax with speaking. I can hear each breath you take in this video! (Either that or the audio was just a bit off lmao)
it's urgent lol imagine the damage if they compromise your cell phone number with ss7 protocol
@4ka07_muhammadrizky I understand that it's urgent, so much so he's even speaking out of breath with each line.
Important video.
What r u hiding bro
(edited)
Wow it’s almost like you shouldn’t let your enemies make all of the hardware used in your infrastructure
They banned huawei ages ago. Stop this mindless fear mongering. USA literally tried far worse things on china.
Nextel Chirp undefeated ofc
That 10% for the big guy is really paying for itself!
why on earth would an isp use windows on its core infrastructure
we really are living in black ops 2, what happens when the enemy steals the keys?
2025 baby. We dam sure are in bo2
The numbers Mason, what do they mean?
Didn't the US claim banning Huawei will solve the security problem? So the US comm is still not secured.
It's a security problem caused by backdoors created for use by US law enforcement, so a hardware company like Huawei doesn't really have an efffect on whether it gets accessed by outside actors. Also, the Huawei ban is mostly focused on consumers. For example, American 4G networks still have a bunch of Huawei equipment. The FCC does have a "rip and replace" program, but companies aren't interested since nobody is forcing them to not use Huawei.
@@zimbu_ Is this confirmed or are you a chinese bot spreading false information? What source are you basing this backdoor on
Oh you sweet summer child. Tech issues at this high level never have “one fix”. Thats why hacking is called hacking and not “asking nicely for access”
@@TheGoldenWoe You sounded like an expert. Good on you.
Agencies recommending end to end encrypted messaging? Unexpected! What else is going to happen in 2024?
CIA+FBI+CHINA not the combo you want.
As if AT&T doesn't already pose enough threat by leaks alone.
This malware actually really thorough and well done...I mean considering that it's Chinese-made, of course.
China is one of the most capable in cyberwarfare I am not sure the US would win a full cyberwarfare against China, China invests too much on it. Easier to steal from others instead of spending the millions in research
04:10 Mental Outlaw pretending not knowing the big flag with this exploit: renaming the file doesnt change its signature. Just right clicking the file to see its properties will show the file is compromised.
Genius work.
Godspeed.
"NOOO, ONLY WE ARE ALLOWED TO DO ILLEGAL STUFF AND VIOLATE YOUR RIGHTS"
I really hope we give out the United Health special to the people selling our rights and futures to the highest bidder
I wouldn't be able to sleep at night if I didn't know the gov. was spying on me to keep me safe.
hey you should talk about the mass unknown drone sightings in New Jersey, when more info comes out
I love the details of this vulnerability, thanks much!
This competition to spy on people is just hilarious.
Sounds like Sparrow door was intended to allow the Pegasus horse to come trotting in.
Damn, if only they didn't try to backdoor so many encrypted apps
You dive deep into malware attack details but never mention how the malware reached ISP machines.
I tried to use an authenticator app once. But then my phone screen broke and it took me having to buy an identical phone and swap out the main board to get access to things again.
why not just replace screen
@@hiru92 Didn't want to risk breaking it. I would have still had to buy an identical phone either way. It was a galaxy s4, which I doubt they make screens for anymore. It was an easy board swap, and I didn't have any conflicts when it turned it back on. A newer phone would have made that very challenging.
this also happened to me, that's why i switched to security keys, now i don't rely solely on my phone anymore, i can use it on all my devices(OTP codes work too) and i got a second one as a backup in case something happens to it
Authenticator apps like Aegis have an import/export feature where you can transfer the keyvault. This means you can make a backup of the keyvault and store it offsite or on a second device. Only need the decryption key, the backup, and the app.
Great comment thread guys, witty and classy is a great combo
Commenting to boost the algorithm my guy, great reporting 🔥
"lol" said the Scorpion, "lmao".
How do you guys think this will impact the com security?
Will SS7 and other Key System be more secure?
Wow amazing malware design.
Man the Chinese hacker men have some balling handles GhostEmperor and king of the world are some great highlights 🤣
I'd bet they have their own Stingrays up all over the country.
Mental outlaw is Jayson Tatum
Faildox award -> 🏅
Mental Outlaw is Channing Tatum.
So they want us to use encrypted apps that have already been pwned by three letter guys?
And this was surprising… to absolutely no one.
where did you get that information/source you claimed at 1:53 about their spending greater than the countries combined?
Rule Type: LIGMA
Balls?
He'll yeah thank you for explaining the malware family liked and subscribed all day.
I really thought you would make a video on the Australian social media ban and how it's just an excuse for enforcing id identification on social media.
Sadly, the recommendation to stop using SMS and phone authentication is moot and pointless. The overwhelming push by supposedly high security places like banks is to force the exclusive use of SMS authentication, I guess they are under the assumption that phone authentication is anything less than totally borked and unsafe... There is no changing their mind. Then again, I am from Canada, maybe the USA banks are less arrogant and foolish than most of ours.
@3:18 I FUCKING NEW IT! I hate being right, like literally my brain recognizes diabolical patterns in a snap and they are usual right and this was a full on bullseye hearing this and suspecting it reductively for quite some time. How tf do I sniff and root these scripts?
autism
it goes deeper. state provided phones are coming with pre installed spyware. im currently dealing with that issue now
OH, NO. 0.5% of what the US does 😭😭😭
If the fbi is recommending everyone use encryption they likely have a back door into it ,
I'm not from the USA but based on the comments I really like the people
It seems like it's more the government and political actions that create a negative image of the USA, not the people themselves!
Thank you for being more discerning than most.
US officials were reluctant to tell people using encrypted apps up until now
Texting everyone i knows that I'm learning Chinese so the Chinese government knows I'm not an enemy. 我和你在一起!
Lol im just learning chinese because its fun. Know your enemy and know your friend and you will always be victorious.
An enemy would have good reasons to learn Chinese. Be careful.
Fuck china
@@AR-iv6se If you think some country halfway around the world is "the enemy" of you, a common working-class person, while you're being sucked dry daily by antidemocratic, neo-feudal corporatocracy in your own country, there may be some readjustment needed in that worldview.
我爱中国请不要杀我
As always, thank you very very much, for the informative video!
I swear windows is designed to be hacked lol.
I posted about the breach I noticed earlier this year before this became well known. Omni probe shows quite clearly how telecom nodes are compromised
OH BOY NEW MENTAL OUTLAW VIDEO
Thanks for another great video Jayson, incredible how you can play at such a high level and make these videos
guys!!! please USA backdoors only!!!
I've switched every 2FA I can to an authenticator app. Frustratingly, two financial companies I do business with still only offer SMS-based 2FA. And they're big companies, known nationwide. I don't understand why they haven't switched to more secure authentication methods.
The gov wants you to use Signal or Whatsap?...LOL...that's all you need to know it an OP. I rather use Session or Tox. And I would not be surprised if Session was an australian gov op.
Could a user do something similar, renaming an antivirus program to trick the malware into running while the antivirus is present? Would this make the intrusion any more detectable?
He we go blame another country
All I can say is that this is awesome, in the older sense of the word that it inspires awe