“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” - 4th Amendment, US Constitution RIP our rights
Unless the rights of the "aggressor(s)" are *broken* and used to protect or defend you, then you're thankful beyond words. Imagine your child is kidnapped as a part of a human trafficking ring or a loved one is murdered as a result of a terrorist event. Change perspective a bit? I'm not saying it always ok, I'm saying what is "right and wrong" is usually a matter of convenience and perspective. No government/organization is spending hundreds of thousands or millions of dollars to surveil your browser activity/history just "because."
I don't want to draw too much attention to myself, but as a Mexican person listening to this podcast was a little hard but I gotta thank you for it. Won't go into much details, but one of the main reasons why I became a privacy advocate was because of the whole Pegasus scandal in my country.
@@TymexComputing I can do a one up. I've been listening to most episodes, but I do that late at night and guess what happens. So, 'must have been listening at least 125 times.
Psh Jack cheats, he's even calling part 2 of an episode his 100th. If he's gonna build an audience of autists the he better be more precise in the future 😜
Hate to tell you but NSA and FBI have had a remote back door in every iPhone since iPhone 3GS… Apple just says there isn’t so people keep buying the devices
Wikileaks had an entire section detailing known agency backdoors into basically every operating system ever made going back to early versions of Windows, even Linux, Unix, etc. There have aparrently been backdoors into every consumer device from the beginning of the internet.
Literally anything that can connect to the internet or any other kind of remote connection protocol (Bluetooth, any kind of radio etc) is compromised. Nothing you own is secure
Omg this happened to me. I visited an unnamed country and my Pixel 5 started acting funny, like changing the country code to a number I'm texting, and sms threads deleting. I won't go into details but I immediately bought a new phone. Then my smart TVs at home said I wasn't in the country. It said I was in the country I visited. When I went into incognito mode on a wireless device and searched "where am I?", it said I was in that country. I replaced my Netgear router and that fixed it. Weird. But now that replacement is unusable and I've isolated the network. I don't remember clicking any link, so I assume it was an Android 0 day. None of my phones are jailbroken, I got sick of the cat and mouse game. I have a firewall, so I must have brought the payload in on my phone and when I joined my home network it infected my network. If someone can suggest a good infosec forum, I'd like to investigate further. I've made my own phone roms in the past so I think I can manage the technical part.
Idk man kinda just sounds like location issues. Is there any actual evidence that you're infected other than your location being set to a location you actually visited?
Bro this is the absolute deep thinking I have. The future of cyber security is yet to peak. Along the way slews of new development and programming careers which I respect.
It's also entirely possible you purchased a device that was already infected. I've seen some devices get infected at stores before sale. Sometimes someone slips up (or gets paid) and allows malware into a device build. And on some devices Pegasus and other malware packages don't even need a click to work - just receiving it can be enough. Most of those have been patched, but nation states hoard zero days, and NSO gets paid to. Search on Linksys Security Advisories to start.
But there is way to know. Your cpu load will be higher and your battery will drain faster ( due to camera use especially) so if ur battery drains without gaming and browsing ur watched
Let’s hope Jack doesn’t get “disappeared” What used to be stories of by-gone hackers now seems to be getting closer to real life current day bad actors. Congrats on 100 episodes sir 👍🏻
he would never disappear. theyd buy him before needing to disappear him. and what he talks about is public information, nothing the gov doesnt already know and know others know. Corporations on the other hand, dont want this to be well known. and we know what they are capable of from various corpos like chevron.
That's just it .... hackers , Spyware, censorship, control , is government works ... governments are behind all war , devision, problems around the world. At the end of the day a true man will continue to speak the truth regardless of consequences.. respects to the people that do speak out ...🫡
Thank you so much Jack / DnD / CitizenLab and JSR for bringing awareness to these absolutely terrifying and horrific issues. Can't believe I've been asleep on this channel and your podcasts for so long. I also cannot believe this stuff is not more thoroughly covered by mainstream media -- everybody should be aware. It seems to me to be an extreme lack of due diligence and even responsibility for the mainstream media not to make the things you report on far more publicised. Amazing work, fascinating and horrifying, feeding all my nightmares -- and thank you (:
Point of comment that you're not understanding that you yourself are making an excellent case for - THE MAINSTREAM MEDIA IS NOT TRYING TO INFORM THE PUBLIC, BUT INSTEAD, THEY ARE TRYING TO ACTIVELY DISTRACT AND RUN COVER! They are nearly 100% being ran by the intelligencia.
NSO dude must be very very important, he must be more important than all of your guests combined! He's the most important person I've ever heard of, years of our time don't add up to an hour of his, astounding! He didn't name any countries he wouldn't sell to. Would they dare let anyone sit in on their ethics meetings?
Like the people think that the president is the most important person of the country, so is NSO in the IT world the real deal. That is not to say that a president has no influence and has no access to certain file cabinets hidden for the “normal” people, but a president is just the host of The Muppet Show. You can likewise consider NSO. They're no nobodies, but entities that prefer to be invisible have no name and are sometimes even everywhere. If you're really interested in intrigues, then I can give you a name: Rex Michael Sherwood. RIP. This hero unfortunately died in Dulce, Los Alamos. Nobody knows anything about this former computer expert and what he was doing there. Good luck. Wherever it may lead you.
Thank you for all of the amazing work Jack. This is basically public service, your stories are so relevant. Mostly when i try and talk cyber everyone groans, but i show them this channel and one of your stories and they grab popcorn. Youre a F'ing boss. ❤
I'm 70 years old, and I'm already freaked out by what I'm seeing going on around the world involving our the attacks on our freedoms. Then I had to find you guys. Jesus Christ, there goes a few more nights sleep. Glad you're out there. This was a great piece, and congrats on your 100th episode. Thank you.
At least you have your eyes open old mate I try telling my parents stuff I see and read and they just won't listen or believe me to a point where I had to give up
Real life datapoint: I have a Sagem feature phone that I was using about 12 years ago that I noticed behaved strangely. When I called someone, on what appeared to me as the reverse call sound, there were mixed in the microphone sounds of the party I was calling. Crazy, right? I _could hear what they were speaking in the room without them answering the phone_. I've tested it calling other phones on different mobile operators and it worked as well. I could obviously could not test the fixed phone operator but I tested it in the reverse. I called from fixed phone my SAGEM and _my microphone_ was opened on the reverse call. My conclusion is that the comm protocols definitely permit eavesdropping a phone without you ever being aware that a call is established. The Sagem's firmware was obviously buggy in a way that stumbled onto a permitting configuration in operators systems. I still have that phone but I did not test it since but for more mundane reasons. The charger port was broken and I fixed it a couple of time until the pcb could no longer sustain the repair. Today I probably could do something about it and repeat the test. When I realized what I could do with it the damage was done.
I know someone whos phone was remotely shut down. I went to a few repair places with the guy and one said it was switched off at the network and then other said the mother board was probably remotely damaged. The guy who the phone belonged to is related to a former coup president and he felt his life had been suppressed and sabotaged year's ago from aged 20 and it affected him till 3 year's ago. ( EDIT till now). He seemingly had written emails and other messages to several intelligence agencies and threatened to release some unkown information unless he was helped to compensate for year's of abuses. 3 year's ago the police were called to my friend's house after an accident broke glass and he thought someone was injured so he called the emergency services. During the call he checked on the person he thought was injured and luckily they weren't. Basically a family member had shut a jammed shower door too hard and it all shattered into pieces. Anyway 5 minutes after the his IPhone 6 just switched off. That symbol went around in middle of screen and it has never been on since. Less than 5 minutes later the police arrived and were very polite but asked if they could check on everyone.
In the 80' and 90's I used to write program, even back then I saw the potential for unwanted control and manipulation from those that would do that. Since then I have become self reliant in all facets of life. I highly recommend it. However, that smart phone is not unlike a drug for it's users.
Zero day exploits on BIOS and OS can be retroactively patched but on an age of AI. Why not try a different approach?. Make an AI to search for Zero day exploits on any new software before launch and use systems sand box environment virtual machines with read only settings to open all kind of mail. Big tech will always cooperate on the mass surveillance and can not be trusted.
With the stuff happening in Mexico and the families being targeted that sounds more like cartel action. I’d be worried that the cartels already have Pegasus which means they could target anybody which is completely crazy and if it’s that easy, what happens if the US president or a military general or somebody with the nuke codes is targeted have they found a security patch to prevent this from happening to everyone?
Probably Not!!Only that's what happens to those who think it's a great idea at first,then afterwards they end up realizing too late,when it starts to unfolds into some massive dire infective spiritual & or technological viral plague which effects most everyone ingeneral on the planet or life form within this world.
It's like you gotta be afraid 😨 of being labeled antisemitic. If you speak against isreal 🇮🇱 ! it's an isreal company firm 🇮🇱. They get all the funding of welfare that they want. This funding is from the United States 🇺🇸 of America 🇺🇸 😑
Brilliant, thank you for making this, we pretty much figured this out after Standing Rock Indigenous pipeline protest. Activists pretty much figured out they were being eavesdropped upon. Now, those social justice warriors have acquiesced that their phones networks have been compromised and are being monitored, whether thats is in real time or not? I dont know? however a lot of activists phones are buggy as if there is a layer/mask/firewall that seems to be running in realtime in the background, where apps load boot up twice , does not matter if passwords have been changed or not the same weird issues are occuring, with that being said this is probably global and will get more intrusive as AI monitors everyone in real time. Its beast system that AI /chat gpt will be able to play god.
Never heard of magic lantern, thought it was code named pegasus... Either way zero click exploits are out there and a very real threat... Been saying this for years even before Snowden skipped the country...
first time I've heard you Jack...and after 1 story (2 parts) and I'm already a sub and more importantly...I'm a fan!! “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety” -Benjamin Franklin
man I sure do just love this show, can't believe I've actually watched 100 EPs plus the all bonus ones. Your show is an inspiration jack, I'll pour one out for 100 more Darknet Diaries!
Yaaaay! Congrats on the 100th episode! Keep up the great work! You are shedding a light into dark places that intrigue us all, and you're doing it very well.
They were also in my bank account from Firefox every 5hours like it was on an alarm. The bank said the IP address are mine. What do I do? I don’t believe local law enforcement has the tools to conduct a proper investigation. I firmly believe it’s a bigger issue than most are capable of figuring out.
CAUSE ITS SUPPOSED TO TAKE OVER. Invest in Gold, privacy is nonexistant, if you store money electronically it CAN AND WILL be stolen and especially if u flash money around shady ppl. This is tech from mid 00s wirelessly?
amen to that. I had a tooth extracted today, episode 100 could not have hit at a better time...8pm for me, he is uploading perfect prime time here in Australia...what an epic episode 100 it is!
Great work jack . Follow your work for more then 3 years now , always waiting for new episodes , Thankyou for your dedication and high quality stories🎉❤
Yeah…. Started seeing this last year as I was just getting into tech. Always been a nerd. But answered the call a little later than most people would expect a geek like me to. After applying for a life changing intro course I along with the rest of the class (Cybersecurity) was texted episode 137 as a homework based motivator. I’ve been hooked ever since. And I’ve watched this channel everyday. “I’m sorry, what is this shit called the news again?”😂😂. Now some 10 ten certificates later and a new job to boot, I feel like I’ve accessed a realm of entertainment that I didn’t even know I was waiting for. Jack Rhsyder is the best at what he does!
No anyone with a phone android is just as bad as apple.Also any app you download gives this ability to those companies.They turn around and sell your data to uncle Sam or who has the bucks.
As a Targted Individual the ones doing the harassment can change the layout of the page I'm viewing online in real time, remotely. Right in front of my eyes. The world's just going to keep getting worse until we stand up for ourselves. Stand together against organized harassment!
12 minutes up, like button already hit, my priorities for the evening have been adjusted, kitty cat taken care of. Perfect timing, I get to relax now, thank you and ⭐Congrats on 100 episodes💥 Hope you have a wondwrful relaxing time at the beach, later!
My very "civilian" stalkers are offended I'm listening to you Jack. I just got interrupted four times half way through, and my 'like' got removed too.😂😂😂 Ain't stopping me educating myself. For the record, I am no dissident nor am I an activist. Thanks, Jack.
Guerrilla tactics are distinct from terrorist tactics. Guerrillas target the military or strategic targets connected to government or the country's war machine, while terrorists target the government indirectly by attacking civil society. Terrorism is often an accelerationist strategy, i.e. intended to widen a conflict.
@@LouiseBrooksBob The notion of targeting only military targets is a very recent one. For most of history, the military saw civilians as a very useful target. Kill/Enslave the farmers, burn the crops, and the nobles will starve. What if the nation want to start a conflict? The US was bombing Japan cities and Vietnam. So on your definition, the US is just as much of a terrorist state than Hezbollah, Isis or Al Qaeda. Check for the official definitions of terrorism. Here is one from the US Department of State: "Terrorism: Premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents." Look at how vague this definition is. Politicians can say anything they want about terrorists, they can't specifically define what a terrorist really is. Under that definition, the Americans that fought on the War of the Independence are terrorists. They didn't just attack military targets. They took entire cities, there is no way to not cause violence to noncombatant targets that way.
@@rumplstiltztinkerstein What is classically referred to as "terrorism" is a form of asymmetric warfare, adopted usually by a weaker adversary against a stronger one, maybe too weak even to use guerrilla tactics. It is quite clear that militarily strong adversaries may use terror as part of total war, which no longer distinguishes between the military and civil society, because industrial production is targeted, and there is often an extra aim to coerce and demoralise the enemy, but this is not really terrorism. The meaning of the word "terrorism" has become muddied by being used as a pejorative. Not applying the word "terrorist" to a power which is at war, does not excuse the methods that may be used.
Guerrilla warfare is a military tactic. Terrorism is a political strategy that uses violence to make citizens believe that their state/government isn't capable of protecting them.
My cousin caught his first wife cheating on him way back in 1999 around. He found a key logger and installed it on there only Pc. He didn’t even know how to use it. But it was enough for him to start an investigation. Turned out to be true. I dislike lies! That’s why I’m single. It worked out great for him. He caught her but it’s scary that this stuff is out there. Makes me wanna stay off the internet. I don’t do anything wrong. But who knows who’s watching if you pay bills online!
It's basically like: ">B4 Ed. Snowed IN rU55i@ Everyone thought I was paranoid for suspecting Spyware used by spooks and called me conspiracy theorist >AFTER eddy Snowed IN ru55i@ IDGAF anymore I'm going HOG WILD and typing kïk3 and n¡**3*, and looking at legal degeneracy and "politically incorrect edge" while most users started self censoring." Reverse psych in this tech, in this case.
@@NEDMKitten nope chaotic good. fbi has even said they missed used this by mass deployment of spyware even without warrants. everyone has a right to privacy unless warrant is served. so notify of this spy tools isn't only patriot but human rights.
The WhatsApp vs NSO case is still ongoing. The last major update was in January 2023 when SCOTUS refused to hear arguments that it should be dismissed. Still no trial date tho.
Thank you. This kind of investigation needs done for the millions of Targeted Individuals. ,like myself whose phones are totally compromised. Its on a level higher than what's described here. I've bought brand new phones and the compromised OS is installed as soon as I turn on the phone, every time. The one time I was able to have an apparently non hacked phone, was when I bought a used phone and immediately had it flashed with a nightly updated ROM, called lineage OS, which gave me lots control over my phone but within three weeks they were able to re-establish control. It uses mind control technology like silent sound spread spectrum, which embeds commands which your conscious mind can't detect but is totally absorbed by the sub conscious mind. And the mind has no firewall. It has seemingly altered my behaviour in big ways. I wish I could get help with this.
I'm targeted too. Only God and the bible and lots of prayer helps me get through it. They tortured me for years but God kept rescuing me. Horrible evil beings.
Doubt it, since it would be conspicuous if a software engineer touched code that resulted in security issues more than once.. I think it's the other way, they have there finger on the pulse in the underground and shell out money anytime this stuff shows up.
"They will no longer be a customer" - wow. 1. they already bought the weapon, it's good for 3-4 years phones, maybe longer 2. they can send different people to buy a new version
You can always protect a computer that runs a linux kernel from executing any malware other than a rop chain program that only lives in ram linux has modules that only allow signed binaries to run so only the sim card and rop chains are vulnerable to malware but most sim attacks were patched after sim jacker so you can prevent this attack with linux even if the phone doesn't have linux support you can still turn the original kernel and drivers into a uefi smm module and run linux on top of that then the malware can't run even if the original os could be exploited
@@Just_a_Reflection Security from nation states for everyone is very important to me especially after I was hacked by the N azi S tate A ttackers using a quantum computer they broke into my ssh server running over tor authorized client and it only took them a month to break multiple ed25519 keys and installed malware on my computer only because my opsec was so good that they can't spy on me that is when I started learning about security and privacy from nation state attackers not just anonymity to protect people that actually need to hide from nation states those nazis at the NSA even bricked one of my drives by installing malware into the firmware because I kept deleting there persistence and broke into my house and stole my encrypted key drive after they that had all my luks keys stored on it because they couldn't keep malware on my computer because it caused btrfs errors and got scrubbed out because it was hiding so well so they used the quantum computer to deanonymize my tor circuit and trace it back to me all nation state hackers are criminals that is why I leak all the zero days they used on me and tell people what software I should have been running at the time to prevent the attack from happening like enforcing binary signing and using post quantum asic resistant encryption for everything
@@sgt.freyrpepper1871 what did you check the binary signing modules exist and efidroid proves that making a stock kernel and driver into an efi smm modules is possible but it would be much harder if you only had the binary and what I said about the NSA is all true but it requires extremely hardened tor with bridges in iat mode 2 and excluding all 14 eyes countries and any other country that censors the internet and using exit nodes in countries that don't censor the internet and have very good privacy laws and running vanguards to use a more secure version of the tor protocol by having at least 10 bridges and use 2 that change every day and use the normal first hop time for the second hop with only 2 nodes instead of 3 and change exit nodes every few hours and run some post quantum security over it like an ssh tunnel because they have post quantum kex but pre quantum authentication and routing all traffic through tor to make them suspicious enough to hack you if you use opsec like that you have better opsec than the CIA and NSA so that will make them notice you because they can't spy on you and it is those nazis job to spy on everyone so they will try to actively attack you eventually like they did to me if they aren't attacking you it means you have bad opsec and they can spy on you
Here is a thought: you know how Pegasus was first intercepted by Citizen Lab with an iPhone? What if some of these infections and assassinations where done by bad actors who acquired Pegasus in the same way and not the actual governments who acquired Pegasus legitimately?
Citizen Lab just detected if phones were compromised by Pegasus. They didn't actually get access to the entire source code AFAIK. I'm not sure if they could get enough info to reverse engineer it, but it's possible.
Yeah dude when I get on meth I watch hours of porn, screenshot great frames n even go as far as too edit them too! I'm not ashamed I love a good still frame n sometimes it needs the shades, colours n tones adjusted for a still shot, I've collected quiet a few intense, vulgar n kamakazi screenshots for when I does happen...
Imagine if NSO and all of the things going on in the strip are connected and maybe this is another reason why our country is willing to do anything for Israel. It sounds like they know to much about what we have done to the world and it's people :)
It's this twisted, horror plot of a group(s) fulfilling "prophecies" scripts used as organic brain devices with sound waves and light through eyeballs, until the Enki Ravenous Beasts can insert brain chips to hack nervous systems of mil. Personnel.
If you believe your gov is working in any way to protect you - you don't understand how our world is broken and what is really taking place .... (but I'm sure you do [understand])
This junk is still actively used on Americans likely by Americans. I found it while scraping through a iPhone dump looking for some pictures and crypto keys. For those wondering how it gets around Apple’s “sandbox” once you’re jailbroken you can interact with anything and decrypt the file system. Switched to a Pixel with the intent of running GrapheneOs but it came with Pegasus and other crap and really sucked. I don’t think there’s a safe phone maybe a Tails style phone but I don’t think anyone makes that or would want it so I switched back to iPhone.
I stay away from having to give my info. out. I only have a bank app on my phone. other than that just watch youtube. technology that's not in your control is very scary.
we used to use the AOL aim messenger to send loggers with videos, then send another, just click to watch the spiral gif, and we were ghosting their screens. oh the y2k scare.
I have a question for you, Jack. If someone buys a new phone but the phone they had was being backed up automatically to say Google and then when they install the same phone number to the new phone and the backup downloads to the new phone, does that mean that all of the software that's infected from the old phone will be transferred to the new phone or are new versions of all those software being installed which would erase any traces of Malware?
Good question. I would say it would not install the software because the apps it installs are just a list from the play store. Example: if you download an app from the play store and have your phone set to backup everything. The maker of that app stops supporting it and takes it down from the play store. Your app on your phone keeps working as it requires no connection to the host.. (tv remote control app) so you happily keep using it. You get a new phone because you smashed yours. You restore your backup and find that app is no longer available. This happened to me with a Sony supported remote control for TVs. The app still worked great on my old phone but I couldn’t get it on my new phone as it was not supported any longer. Basically it seems that even though it saves your settings, usernames, passwords it doesn’t save installation files.
The internet, networking, computer o/s, and computers have always been designed to spy as well as basically control others from the concept idea. It was always palnned.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” - 4th Amendment, US Constitution
RIP our rights
Read "Anatomy of the State" by Murray Rothbard. He goes over how the state always unshackles itself from any limits placed upon it.
MEANS NOTHING..
*LEST YE FORGET*
Unless the rights of the "aggressor(s)" are *broken* and used to protect or defend you, then you're thankful beyond words. Imagine your child is kidnapped as a part of a human trafficking ring or a loved one is murdered as a result of a terrorist event. Change perspective a bit? I'm not saying it always ok, I'm saying what is "right and wrong" is usually a matter of convenience and perspective. No government/organization is spending hundreds of thousands or millions of dollars to surveil your browser activity/history just "because."
Most common people don't have rights, they have privileges. The only real rights you have in this world are those you can enforce yourself.
To think I was headed to bed and an accidental refresh was the best thing to happen all day! Love these man thank you for providing!!!
R.I.P. my morning. No regrets.
I know how this goes
@David-jq8jt❤b ok❤❤🎉🎉🎉 x😂summer Mn
Exactly the same thing here
I don't want to draw too much attention to myself, but as a Mexican person listening to this podcast was a little hard but I gotta thank you for it. Won't go into much details, but one of the main reasons why I became a privacy advocate was because of the whole Pegasus scandal in my country.
What is that?
Wait until you meet spy barroon! All ur privacy are berong to us!
@@Mingtye The goverment used Pegasus with Journos and Human Rights activists during the 2012-2018 admin. and some even say that in current admin.
Current admin for sure
Firewalls VPNs are ESSENTIAL where truth and freedom are forbidden info
You're telling us we've listened to 100 episodes already?! That is some achievement, capturing your audience like that. Way to go mr. Jack!
100b is only 4 :) - this is my first btw and i fast forwarded
@@TymexComputing I can do a one up. I've been listening to most episodes, but I do that late at night and guess what happens. So, 'must have been listening at least 125 times.
Psh Jack cheats, he's even calling part 2 of an episode his 100th. If he's gonna build an audience of autists the he better be more precise in the future
😜
wtf, we are at 900+
Hate to tell you but NSA and FBI have had a remote back door in every iPhone since iPhone 3GS… Apple just says there isn’t so people keep buying the devices
No not until they killed Steve Jobs because he wouldn't give them access
How come no one else has found it.
but its ez to protect from that lol
Julian assiange from wiki leaks showed us that. Interesting how he’s been unfairly locked up for so many years now…. Right?
@@ricksmith7232 Assange is a state-sponsored stooge. You'll need to dig further than being spoon-fed "whistle-blowers."
This has got to be one of the best tech shows on the internet hands down!!! Keep up the good work Jack!👍👍
Wikileaks had an entire section detailing known agency backdoors into basically every operating system ever made going back to early versions of Windows, even Linux, Unix, etc. There have aparrently been backdoors into every consumer device from the beginning of the internet.
Literally anything that can connect to the internet or any other kind of remote connection protocol (Bluetooth, any kind of radio etc) is compromised. Nothing you own is secure
💔
And that’s just software. There are hardware exploits based on chips that have secret functions added at the fabrication stage.
What wikileaks never posted that
Do you have proof for that or did you pull that out of your ass?
Omg this happened to me. I visited an unnamed country and my Pixel 5 started acting funny, like changing the country code to a number I'm texting, and sms threads deleting. I won't go into details but I immediately bought a new phone. Then my smart TVs at home said I wasn't in the country. It said I was in the country I visited. When I went into incognito mode on a wireless device and searched "where am I?", it said I was in that country. I replaced my Netgear router and that fixed it. Weird. But now that replacement is unusable and I've isolated the network. I don't remember clicking any link, so I assume it was an Android 0 day. None of my phones are jailbroken, I got sick of the cat and mouse game. I have a firewall, so I must have brought the payload in on my phone and when I joined my home network it infected my network. If someone can suggest a good infosec forum, I'd like to investigate further. I've made my own phone roms in the past so I think I can manage the technical part.
Fascinating. Sounds like malware that "Phreaks" the user/victim.
Idk man kinda just sounds like location issues. Is there any actual evidence that you're infected other than your location being set to a location you actually visited?
Bro this is the absolute deep thinking I have. The future of cyber security is yet to peak. Along the way slews of new development and programming careers which I respect.
It's also entirely possible you purchased a device that was already infected. I've seen some devices get infected at stores before sale. Sometimes someone slips up (or gets paid) and allows malware into a device build. And on some devices Pegasus and other malware packages don't even need a click to work - just receiving it can be enough. Most of those have been patched, but nation states hoard zero days, and NSO gets paid to.
Search on Linksys Security Advisories to start.
nerd
But there is way to know.
Your cpu load will be higher and your battery will drain faster ( due to camera use especially) so if ur battery drains without gaming and browsing ur watched
Let’s hope Jack doesn’t get “disappeared” What used to be stories of by-gone hackers now seems to be getting closer to real life current day bad actors. Congrats on 100 episodes sir 👍🏻
he would never disappear. theyd buy him before needing to disappear him. and what he talks about is public information, nothing the gov doesnt already know and know others know. Corporations on the other hand, dont want this to be well known. and we know what they are capable of from various corpos like chevron.
Actors being the key word and sense i get from this video as well....
That's just it .... hackers , Spyware, censorship, control , is government works ... governments are behind all war , devision, problems around the world. At the end of the day a true man will continue to speak the truth regardless of consequences.. respects to the people that do speak out ...🫡
This is extremely important journalism in its own right.
Excellent!
Great episode, this was a great listen because its a concerning topic for everyone.
Privacy is non-existent.
For years I've just assumed that the government has full access to every device I own. It's lot easier that way.
Just one government? man, I assume there's got a be a least a few
@@o1-preview The global elite is one government.
And people think I'm paranoid when I say things 😭
They just obey the matrix what do you expect?
Just because you're paranoid doesn't mean you're wrong.
Thank you so much Jack / DnD / CitizenLab and JSR for bringing awareness to these absolutely terrifying and horrific issues. Can't believe I've been asleep on this channel and your podcasts for so long. I also cannot believe this stuff is not more thoroughly covered by mainstream media -- everybody should be aware. It seems to me to be an extreme lack of due diligence and even responsibility for the mainstream media not to make the things you report on far more publicised. Amazing work, fascinating and horrifying, feeding all my nightmares -- and thank you (:
Point of comment that you're not understanding that you yourself are making an excellent case for - THE MAINSTREAM MEDIA IS NOT TRYING TO INFORM THE PUBLIC, BUT INSTEAD, THEY ARE TRYING TO ACTIVELY DISTRACT AND RUN COVER! They are nearly 100% being ran by the intelligencia.
if you ever cross a border the border patrol runs pegasus on your phone
NSO dude must be very very important, he must be more important than all of your guests combined! He's the most important person I've ever heard of, years of our time don't add up to an hour of his, astounding!
He didn't name any countries he wouldn't sell to.
Would they dare let anyone sit in on their ethics meetings?
NSO is a group that helps bad governments do bad things.
@@michaelnieves8087😂
its israel, they have no ethics
That one woman said she would "love to" but I would "love to" be a billionaire but that doesn't mean anything about wether I can.
Like the people think that the president is the most important person of the country, so is NSO in the IT world the real deal. That is not to say that a president has no influence and has no access to certain file cabinets hidden for the “normal” people, but a president is just the host of The Muppet Show. You can likewise consider NSO. They're no nobodies, but entities that prefer to be invisible have no name and are sometimes even everywhere. If you're really interested in intrigues, then I can give you a name: Rex Michael Sherwood. RIP. This hero unfortunately died in Dulce, Los Alamos. Nobody knows anything about this former computer expert and what he was doing there. Good luck. Wherever it may lead you.
Thank you for all of the amazing work Jack. This is basically public service, your stories are so relevant. Mostly when i try and talk cyber everyone groans, but i show them this channel and one of your stories and they grab popcorn. Youre a F'ing boss. ❤
Muh...propaganda much. Russia bad, ukraine good, istael good, palestine bad.. ISRAEL AWESOME.... 🤢🤢🤢🤢 SHEEPLE
I'm 70 years old, and I'm already freaked out by what I'm seeing going on around the world involving our the attacks on our freedoms. Then I had to find you guys. Jesus Christ, there goes a few more nights sleep. Glad you're out there. This was a great piece, and congrats on your 100th episode. Thank you.
At least you have your eyes open old mate I try telling my parents stuff I see and read and they just won't listen or believe me to a point where I had to give up
Oh, they're just getting started.
Real life datapoint: I have a Sagem feature phone that I was using about 12 years ago that I noticed behaved strangely. When I called someone, on what appeared to me as the reverse call sound, there were mixed in the microphone sounds of the party I was calling. Crazy, right? I _could hear what they were speaking in the room without them answering the phone_.
I've tested it calling other phones on different mobile operators and it worked as well. I could obviously could not test the fixed phone operator but I tested it in the reverse. I called from fixed phone my SAGEM and _my microphone_ was opened on the reverse call.
My conclusion is that the comm protocols definitely permit eavesdropping a phone without you ever being aware that a call is established. The Sagem's firmware was obviously buggy in a way that stumbled onto a permitting configuration in operators systems.
I still have that phone but I did not test it since but for more mundane reasons. The charger port was broken and I fixed it a couple of time until the pcb could no longer sustain the repair. Today I probably could do something about it and repeat the test. When I realized what I could do with it the damage was done.
The fact that you had a backup audio track is impressive
I know someone whos phone was remotely shut down. I went to a few repair places with the guy and one said it was switched off at the network and then other said the mother board was probably remotely damaged. The guy who the phone belonged to is related to a former coup president and he felt his life had been suppressed and sabotaged year's ago from aged 20 and it affected him till 3 year's ago. ( EDIT till now).
He seemingly had written emails and other messages to several intelligence agencies and threatened to release some unkown information unless he was helped to compensate for year's of abuses.
3 year's ago the police were called to my friend's house after an accident broke glass and he thought someone was injured so he called the emergency services.
During the call he checked on the person he thought was injured and luckily they weren't. Basically a family member had shut a jammed shower door too hard and it all shattered into pieces.
Anyway 5 minutes after the his IPhone 6 just switched off. That symbol went around in middle of screen and it has never been on since.
Less than 5 minutes later the police arrived and were very polite but asked if they could check on everyone.
Congrats on episode 100! I had no interest in computers. When I started listening to this podcast, now I’m learning about microcontrollers
In the 80' and 90's I used to write program, even back then I saw the potential for unwanted control and manipulation from those that would do that. Since then I have become self reliant in all facets of life. I highly recommend it. However, that smart phone is not unlike a drug for it's users.
Like heroine
You may not be able to stop endpoint penetration but the odd notifications and glitches make it obvious. Pay attention to your keystrokes too.
What do you mean by keystrokes?
Zero day exploits on BIOS and OS can be retroactively patched but on an age of AI. Why not try a different approach?. Make an AI to search for Zero day exploits on any new software before launch and use systems sand box environment virtual machines with read only settings to open all kind of mail. Big tech will always cooperate on the mass surveillance and can not be trusted.
Sometimes when I click on these videos I think” welp I’m going to be hacked right now I bet” disclaimer…I’m dumb 😂
With the stuff happening in Mexico and the families being targeted that sounds more like cartel action. I’d be worried that the cartels already have Pegasus which means they could target anybody which is completely crazy and if it’s that easy, what happens if the US president or a military general or somebody with the nuke codes is targeted have they found a security patch to prevent this from happening to everyone?
Probably Not!!Only that's what happens to those who think it's a great idea at first,then afterwards they end up realizing too late,when it starts to unfolds into some massive dire infective spiritual & or technological viral plague which effects most everyone ingeneral on the planet or life form within this world.
So by now who doesn't know governments are cartel!
Thats not how nuclear codes work btw, you can’t pull them off a phone.
And presidents have very strict device usage regulations
It's like you gotta be afraid 😨 of being labeled antisemitic. If you speak against isreal 🇮🇱 ! it's an isreal company firm 🇮🇱. They get all the funding of welfare that they want. This funding is from the United States 🇺🇸 of America 🇺🇸 😑
The US government has their own version of Pegasus that isn’t beholden to NSO, called Paragon Graphite.
Which AVs protect against it?
@@phantomtr1 none
Why wouldn't non US AVs protect against it? Like russia
@@phantomtr1 because it’s designed and regularly updated to evade all of them
And AVs are updated to find them
Brilliant, thank you for making this, we pretty much figured this out after Standing Rock Indigenous pipeline protest.
Activists pretty much figured out they were being eavesdropped upon.
Now, those social justice warriors have acquiesced that their phones networks have been compromised and are being monitored, whether thats is in real time or not? I dont know? however a lot of activists phones are buggy as if there is a layer/mask/firewall that seems to be running in realtime in the background, where apps load boot up twice , does not matter if passwords have been changed or not the same weird issues are occuring, with that being said this is probably global and will get more intrusive as AI monitors everyone in real time.
Its beast system that AI /chat gpt will be able to play god.
Never heard of magic lantern, thought it was code named pegasus... Either way zero click exploits are out there and a very real threat... Been saying this for years even before Snowden skipped the country...
first time I've heard you Jack...and after 1 story (2 parts) and I'm already a sub and more importantly...I'm a fan!! “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety” -Benjamin Franklin
man I sure do just love this show, can't believe I've actually watched 100 EPs plus the all bonus ones. Your show is an inspiration jack, I'll pour one out for 100 more Darknet Diaries!
Yaaaay! Congrats on the 100th episode! Keep up the great work! You are shedding a light into dark places that intrigue us all, and you're doing it very well.
Goverments having such tools is wrong in every way. Goverments shouldn't be allowed to spy on own cityzens
They're entitled psychopaths bro. Easy to justify evil when you don't have human emotions.
They arent allowed to spy on their own citizens in the US
Good , i need governments to know my ideas as they are very hard to contact .
They were also in my bank account from Firefox every 5hours like it was on an alarm. The bank said the IP address are mine. What do I do? I don’t believe local law enforcement has the tools to conduct a proper investigation. I firmly believe it’s a bigger issue than most are capable of figuring out.
CAUSE ITS SUPPOSED TO TAKE OVER. Invest in Gold, privacy is nonexistant, if you store money electronically it CAN AND WILL be stolen and especially if u flash money around shady ppl. This is tech from mid 00s wirelessly?
I'm a target too! Keep minimal balances in the bank!
Excellent video Jack! The public needs to reflect upon this issue. Congrats on episode 100 and keep up all the good work. 👍
They are definitely coming for you my guy. Great episode man very informative as always
15:50 to 16:08
I can believe it. This is the most engaging presentation on youtube! Excellent stuff.
Jack really comes thru with these night time uploads..
I literally just opened YT like "Ah, 1:10AM time to start winding down" and sure enough "9 Minutes ago" this video was uploaded
Jack does what Jack will
@@NEDMKitten for he is the Almighty
So true!
amen to that. I had a tooth extracted today, episode 100 could not have hit at a better time...8pm for me, he is uploading perfect prime time here in Australia...what an epic episode 100 it is!
Great work jack . Follow your work for more then 3 years now , always waiting for new episodes , Thankyou for your dedication and high quality stories🎉❤
"Activist" had become such a dirty word. It basically means someone who is "activated" for militant activity, not a deep thinker.
Perfect timing right when I get home from work and head to bed. My favorite podcast. Literally have watched every upload.
Never seen you before but clearly you are someone really clever and good at communicating. Congrats on the content!
The underlying point is : government by the people is an ILLUSION. Think about it.
Past two episodes have been amazing and compelling.
Anyone who watched this now has a keyloger 😂😂😂😂
Erase this now.... NSA
Yeah…. Started seeing this last year as I was just getting into tech. Always been a nerd. But answered the call a little later than most people would expect a geek like me to. After applying for a life changing intro course I along with the rest of the class (Cybersecurity) was texted episode 137 as a homework based motivator. I’ve been hooked ever since. And I’ve watched this channel everyday. “I’m sorry, what is this shit called the news again?”😂😂. Now some 10 ten certificates later and a new job to boot, I feel like I’ve accessed a realm of entertainment that I didn’t even know I was waiting for. Jack Rhsyder is the best at what he does!
No anyone with a phone android is just as bad as apple.Also any app you download gives this ability to those companies.They turn around and sell your data to uncle Sam or who has the bucks.
Snowden told everyone in the world they are watching the built a backdoor into intel processors in 2010 and beyond.
Jokes on you! I got plenty keyloggers
As a Targted Individual the ones doing the harassment can change the layout of the page I'm viewing online in real time, remotely. Right in front of my eyes. The world's just going to keep getting worse until we stand up for ourselves. Stand together against organized harassment!
I'm in the UK and I dread to imagine whats been done due to the surveillance on me
If no phreaking has happened to you, then count yourself lucky
Count yourself lucky your just a nonentity I'm under an domestic terrorism act
🎉 Congrats & THANK YOU for 💯 Episodes Jack!!!!
12 minutes up, like button already hit, my priorities for the evening have been adjusted, kitty cat taken care of. Perfect timing, I get to relax now, thank you and
⭐Congrats on 100 episodes💥
Hope you have a wondwrful relaxing time at the beach, later!
This is like the only podcast I listen to you’re seriously incredible
You deserve a vacation Jack! Thank you and the team
NSO lies?!!!!?? Inconceivable
My very "civilian" stalkers are offended I'm listening to you Jack. I just got interrupted four times half way through, and my 'like' got removed too.😂😂😂 Ain't stopping me educating myself. For the record, I am no dissident nor am I an activist. Thanks, Jack.
In history, we called it Guerrilla Tactics. Today, we call it terrorism.
Guerrilla tactics are distinct from terrorist tactics. Guerrillas target the military or strategic targets connected to government or the country's war machine, while terrorists target the government indirectly by attacking civil society. Terrorism is often an accelerationist strategy, i.e. intended to widen a conflict.
@@LouiseBrooksBob The notion of targeting only military targets is a very recent one. For most of history, the military saw civilians as a very useful target. Kill/Enslave the farmers, burn the crops, and the nobles will starve.
What if the nation want to start a conflict? The US was bombing Japan cities and Vietnam. So on your definition, the US is just as much of a terrorist state than Hezbollah, Isis or Al Qaeda.
Check for the official definitions of terrorism. Here is one from the US Department of State:
"Terrorism: Premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents."
Look at how vague this definition is. Politicians can say anything they want about terrorists, they can't specifically define what a terrorist really is. Under that definition, the Americans that fought on the War of the Independence are terrorists. They didn't just attack military targets. They took entire cities, there is no way to not cause violence to noncombatant targets that way.
@@rumplstiltztinkerstein What is classically referred to as "terrorism" is a form of asymmetric warfare, adopted usually by a weaker adversary against a stronger one, maybe too weak even to use guerrilla tactics.
It is quite clear that militarily strong adversaries may use terror as part of total war, which no longer distinguishes between the military and civil society, because industrial production is targeted, and there is often an extra aim to coerce and demoralise the enemy, but this is not really terrorism. The meaning of the word "terrorism" has become muddied by being used as a pejorative. Not applying the word "terrorist" to a power which is at war, does not excuse the methods that may be used.
True , Back then thé bris called America’s independence activists’ terrorists’ , it’s well documented.
Guerrilla warfare is a military tactic. Terrorism is a political strategy that uses violence to make citizens believe that their state/government isn't capable of protecting them.
ethical , morals , saving lives and isre**li are words that just don't add up and cannot be in the same sentence 💀
My cousin caught his first wife cheating on him way back in 1999 around. He found a key logger and installed it on there only Pc. He didn’t even know how to use it. But it was enough for him to start an investigation. Turned out to be true. I dislike lies! That’s why I’m single. It worked out great for him. He caught her but it’s scary that this stuff is out there. Makes me wanna stay off the internet. I don’t do anything wrong. But who knows who’s watching if you pay bills online!
It's basically like:
">B4 Ed. Snowed IN rU55i@
Everyone thought I was paranoid
for suspecting Spyware used by spooks and
called me conspiracy theorist
>AFTER eddy Snowed IN ru55i@
IDGAF anymore I'm going HOG WILD and typing kïk3 and n¡**3*, and looking at legal degeneracy and "politically incorrect edge" while most users started self censoring."
Reverse psych in this tech, in this case.
16 mins.... Every. Single. Time.
The real McCafee would absolutely have let it trigger. He was a goddamn patriot.
Chaotic neutral 😐
@@NEDMKitten nope chaotic good. fbi has even said they missed used this by mass deployment of spyware even without warrants. everyone has a right to privacy unless warrant is served. so notify of this spy tools isn't only patriot but human rights.
That's why he got taken out
And by Patriot you nutjob with authority problems....
Blindly trusting the government =/= being a patriot
This episode originally aired 31 August 2021. I'm back from the beach k. Stop asking how's the vacation's going. It's over.
How have things changed in 2 years?
I like ur podcasts keep up the good work!;)
What about android phones?
The WhatsApp vs NSO case is still ongoing. The last major update was in January 2023 when SCOTUS refused to hear arguments that it should be dismissed. Still no trial date tho.
Thank you, I was wondering
I'm so glad I found this channel; it's really good, and there's a LOT of content.
Ya, good luck having the perpetrators prosecute themselves.
We've investigated ourselves and found no wrongdoing.
shalev if he follows the talmud literally will lie to you no matter what its to circumvent
and they have to or their sinning
pretty evil stuff.
The videos regarding NSO are super exciting to listen! Keep them up Jack 👍
LMAO he really said prevent nine leven like it wasn’t an inside job 😂
IKR!! Like seriously, that Israeli has the NERVE to pretend it wasn't a demolition.
A criminal isn't gonna prosecute him/her self.
Thank you. This kind of investigation needs done for the millions of Targeted Individuals. ,like myself whose phones are totally compromised. Its on a level higher than what's described here. I've bought brand new phones and the compromised OS is installed as soon as I turn on the phone, every time. The one time I was able to have an apparently non hacked phone, was when I bought a used phone and immediately had it flashed with a nightly updated ROM, called lineage OS, which gave me lots control over my phone but within three weeks they were able to re-establish control. It uses mind control technology like silent sound spread spectrum, which embeds commands which your conscious mind can't detect but is totally absorbed by the sub conscious mind. And the mind has no firewall. It has seemingly altered my behaviour in big ways. I wish I could get help with this.
Targeted Individual from NZ here going through exactly the same thing, crazy world we live in huh
@@L0L0KAYhow do you know if you're targeting? I had someone else's phone display on my screen. It happened to my friend to.
Your not alone. Im going through this also. Not a minute peace 24/7 and they keep saying i have cancer its petrifying.
Only way to prevent that is hammering the phone into dust
I'm targeted too. Only God and the bible and lots of prayer helps me get through it. They tortured me for years but God kept rescuing me. Horrible evil beings.
You Have the Right to Remain Silent, You have no other Right.
"You have the right to free speech, if your stupid enough to actually use it"
-the clash
You have the right to remain silent. The ability, however, remains to be seen.
Great episode. Have you done one that explains how Apple can’t figure out how to prevent this?
They have added lockdown mode on new iPhones
@@Aera223hereto say it doesn't work
Fascinating story. Well worth watching. People need to more aware of this sypware and the nso.
Really good episode, I’m a huge fan. I’m in Australia and I’ve been targeted for sure. How can I get the list of 50,000 numbers? Thanks
Targeted here in New Zealand too
I love tour vids, but man the more i learn the more i lose hope for digital privacy.
Interesting to think about how NSO is able to always have a new exploit in the pipeline, Insiders at Android/Apple?
Doubt it, since it would be conspicuous if a software engineer touched code that resulted in security issues more than once.. I think it's the other way, they have there finger on the pulse in the underground and shell out money anytime this stuff shows up.
Makes sense
They pay researchers millions of dollars sometimes to find these exploits.
"They will no longer be a customer"
- wow.
1. they already bought the weapon, it's good for 3-4 years phones, maybe longer
2. they can send different people to buy a new version
I wonder what odds are that there's a back door so they can get that Intel anytime they want..
fact
This has been well worth my time to listen to this. Thank You!❤
You can always protect a computer that runs a linux kernel from executing any malware other than a rop chain program that only lives in ram linux has modules that only allow signed binaries to run so only the sim card and rop chains are vulnerable to malware but most sim attacks were patched after sim jacker so you can prevent this attack with linux even if the phone doesn't have linux support you can still turn the original kernel and drivers into a uefi smm module and run linux on top of that then the malware can't run even if the original os could be exploited
Thank you.
@@Just_a_Reflection Security from nation states for everyone is very important to me especially after I was hacked by the N azi S tate A ttackers using a quantum computer they broke into my ssh server running over tor authorized client and it only took them a month to break multiple ed25519 keys and installed malware on my computer only because my opsec was so good that they can't spy on me that is when I started learning about security and privacy from nation state attackers not just anonymity to protect people that actually need to hide from nation states those nazis at the NSA even bricked one of my drives by installing malware into the firmware because I kept deleting there persistence and broke into my house and stole my encrypted key drive after they that had all my luks keys stored on it because they couldn't keep malware on my computer because it caused btrfs errors and got scrubbed out because it was hiding so well so they used the quantum computer to deanonymize my tor circuit and trace it back to me all nation state hackers are criminals that is why I leak all the zero days they used on me and tell people what software I should have been running at the time to prevent the attack from happening like enforcing binary signing and using post quantum asic resistant encryption for everything
Checked
@@sgt.freyrpepper1871 what did you check the binary signing modules exist and efidroid proves that making a stock kernel and driver into an efi smm modules is possible but it would be much harder if you only had the binary and what I said about the NSA is all true but it requires extremely hardened tor with bridges in iat mode 2 and excluding all 14 eyes countries and any other country that censors the internet and using exit nodes in countries that don't censor the internet and have very good privacy laws and running vanguards to use a more secure version of the tor protocol by having at least 10 bridges and use 2 that change every day and use the normal first hop time for the second hop with only 2 nodes instead of 3 and change exit nodes every few hours and run some post quantum security over it like an ssh tunnel because they have post quantum kex but pre quantum authentication and routing all traffic through tor to make them suspicious enough to hack you if you use opsec like that you have better opsec than the CIA and NSA so that will make them notice you because they can't spy on you and it is those nazis job to spy on everyone so they will try to actively attack you eventually like they did to me if they aren't attacking you it means you have bad opsec and they can spy on you
Holy nasty spyware Batman! Great post in a long string of great posts
Here is a thought: you know how Pegasus was first intercepted by Citizen Lab with an iPhone? What if some of these infections and assassinations where done by bad actors who acquired Pegasus in the same way and not the actual governments who acquired Pegasus legitimately?
Citizen Lab just detected if phones were compromised by Pegasus. They didn't actually get access to the entire source code AFAIK. I'm not sure if they could get enough info to reverse engineer it, but it's possible.
Jack happy one hundreth. Fantastic show, I love it any you're the king 👑! ❤
I guess they will have to get used to my pornography addiction.
I don't know why i laughed so hard at this. I'm imagining smurfs for some reason lol
O😅mflolololroflolmao
Yeah dude when I get on meth I watch hours of porn, screenshot great frames n even go as far as too edit them too! I'm not ashamed I love a good still frame n sometimes it needs the shades, colours n tones adjusted for a still shot, I've collected quiet a few intense, vulgar n kamakazi screenshots for when I does happen...
No doubt porn sites even the established ones are an easy way for governments to infect millions of phones they can then piggy back off to infect more
NSO is lying!
I love this channel, quality of the conversations you have with your guests is unmatched on UA-cam
Have been listening to Jack all night, so nice there's a new one to start the morning :D
First time here ty for video sir, that whole video remind me the quote from Matrix
Yes, machines are tools.They've made to be used.It's their nature
Imagine if NSO and all of the things going on in the strip are connected and maybe this is another reason why our country is willing to do anything for Israel. It sounds like they know to much about what we have done to the world and it's people :)
Well Jeffrey Epstein already compromised everyone in USA
It's this twisted, horror plot of a group(s) fulfilling "prophecies" scripts used as organic brain devices with sound waves and light through eyeballs, until the Enki Ravenous Beasts can insert brain chips to hack nervous systems of mil. Personnel.
I for one assume every time you click on an israeli news site you have been infected.
If you believe your gov is working in any way to protect you - you don't understand how our world is broken and what is really taking place .... (but I'm sure you do [understand])
This junk is still actively used on Americans likely by Americans. I found it while scraping through a iPhone dump looking for some pictures and crypto keys. For those wondering how it gets around Apple’s “sandbox” once you’re jailbroken you can interact with anything and decrypt the file system. Switched to a Pixel with the intent of running GrapheneOs but it came with Pegasus and other crap and really sucked. I don’t think there’s a safe phone maybe a Tails style phone but I don’t think anyone makes that or would want it so I switched back to iPhone.
Are you saying the Pixel or GrapheneOS comes with Pegasus built in? Please explain.
What do you mean "came with Pegasus"
I seriously doubt that bro
This was incredibly detailed and well organized. Thank you and great job.
I stay away from having to give my info. out. I only have a bank app on my phone. other than that just watch youtube. technology that's not in your control is very scary.
I hope you know your bank app could be very easily targeted if someone had a reason to get into it.
we used to use the AOL aim messenger to send loggers with videos, then send another, just click to watch the spiral gif, and we were ghosting their screens. oh the y2k scare.
Imagine using this to track women that "might" be traveling for an abortion. We have to get more young people voting.
Sounds like they are attacking dissidents. Welcome to the SCS
I have a question for you, Jack. If someone buys a new phone but the phone they had was being backed up automatically to say Google and then when they install the same phone number to the new phone and the backup downloads to the new phone, does that mean that all of the software that's infected from the old phone will be transferred to the new phone or are new versions of all those software being installed which would erase any traces of Malware?
Good question. I would say it would not install the software because the apps it installs are just a list from the play store.
Example: if you download an app from the play store and have your phone set to backup everything.
The maker of that app stops supporting it and takes it down from the play store. Your app on your phone keeps working as it requires no connection to the host.. (tv remote control app) so you happily keep using it.
You get a new phone because you smashed yours. You restore your backup and find that app is no longer available.
This happened to me with a Sony supported remote control for TVs.
The app still worked great on my old phone but I couldn’t get it on my new phone as it was not supported any longer.
Basically it seems that even though it saves your settings, usernames, passwords it doesn’t save installation files.
That's pretty much what I figured, but I wanted to make sure I didn't guess wrong. Thanks, @@ohioplayer-bl9em!
@@ohioplayer-bl9em Yeah but lets say that a malicious install file got backed up because Google's security isn't allowed to detect it in a scan. 🤔
@@ohioplayer-bl9emThe APK app files are uploaded to google drive... if selected to backup apps.
The internet, networking, computer o/s, and computers have always been designed to spy as well as basically control others from the concept idea. It was always palnned.
Eh NSO guy lying his ass off..
These make my work days much more enjoyable