Showing posts with label WikiLeaks. Show all posts
Showing posts with label WikiLeaks. Show all posts

Friday, August 10, 2018

Strange things about WikiLeaks

https://metsantarinoita.blogspot.com/

Kimmo Huosionmaa

WikiLeaks has brought to the people know the things, what the government would want to hide, but there is one big mystery in this website: why it is not banned by DDOS-attacks? When the governments and private security corporations Emails were delivered to WikiLeaks, it was targeted the short period DDOS-attack, and in some claiming, some of the files were removed or changed during the attack, and in those files were some very interesting knowledge of the co-operation between governmental and private security corporations, what are actually intelligence agencies.


Somebody has even claimed, that the  CIA has been behind the WikiLeaks and the reason, why almost all the files, what are published in those sites are American origin, but the thing is made for confessing the audience, that the USA would be the primary target for those uncovered secrets. This means that the purpose of publishing those papers is meant for countenancing the persons, who want to steal the papers from the Pentagon or NSA send them to WikiLeaks, where counterintelligence has very easy to find those documents, and then I must say that those files can be used to track the information thief.


This means that in every single file may have the unique code, what is unseen for normal computers. But if the person has the right program, would the number of the handler be seen on the screen. And that number allows tracking the person, who has been downloaded that file, and also foreign partners have their own numbers, that the NSA can track the persons, who deliver the secret material to the Internet. That's why those papers must no be delivered to the Internet.


Those PDF-files seems like the normal, but the NSA:s main computer makes there the covered digital signature in those files. That's why everybody must know, that there are many secrets, what is very interesting, but those papers are meant for confidential. And in the real world, we must ask, is it better to track people by using electronic equipment, or is it more comfortable to make a very large police force, what comes to the people's home for searching the missing persons. This is one argument for supporting the surveillance of the people. But sometimes is clearly seen, that the terrorist attacks are supporting the growing security business.


Those corporations collect very much data, and that can be used for many things. If the information, that is collecting by using Trapwire, would contain business secrets, and somebody would sell those secrets,  some corporations will get very much benefits in their work. And this is one of the most concerning things in the world. If some private intelligence would sell those pictures and data, that would give the very good position for that corporation, that buys those pictures and data from the security corporations.


If some corporations would get too close cooperation with the government, that company would allow accessing the data, what is only reserved for governmental purposes. This means that the surveillance cameras can also collect data from the screens, and in those cases, there would be no sign of the security leak. So those servers data security, what operates surveillance cameras must be extremely highly secured. If the information would leak from secured areas, the benefits, what some company would get are extremely high.

Tuesday, June 19, 2018

The thoughts about "WikiLeaks"



http://metsantarinoita.blogspot.com/p/the-thoughts-about-wikileaks-kimmo.html

Kimmo Huosionmaa

The thing what might seem nothing may have more meaning, what you ever imagine, and this is the very good way to think when we are going to make little information leak from the NSA. We might want to use some well-known homepage for that action, and why don't we choose the "Wikileaks for that thing, where we would release 2000 pages top secret material to those servers.  The question, what becomes important in this case, is who pays Assange's phone bill?


Of course, there seem to be many servers around the world, what would support that kind of actions, and the next thing, what might be interesting is, who pays the electric bill of those departments, where those servers would stay? Those questions are things, what is very important when we are making the data leaks to the Internet. Also, when seeing that Mr. Assange is traveling very much, we might want to know about who pays for those tickets?


In the real life there are many ways to screw up on the Internet, and one is to make data leaks without thinking those questions because in the worst cases, those servers can be actually "honeypots", what tracks the persons and their IP-addresses from the Internet, and there is one thing, what makes me believe that at least one part of this network is meant for use as the "honeypots", and it is, that none of those servers are isolated from the Internet. This kind of network, of course, should be attractive for the persons, who want to share secret or confidential information across the Internet.


And the technology, what is used in that kind of devices is very nasty. That server could sometimes track the deliverer of that information in seconds, but there is the very big possibility, that this server would deliver a different kind of information for the computers, what is used by leaking the data. Sometimes those "honeypots" would start to round the data, what is meant for the deliverer of the data thru them, and that allows making the illusion, that those data, what the deliverer have sent actually seen in there.


"Honeypots" are trap servers, what mission is to track the hackers, and some of them are copying the IP-address of those computers, but some of those servers can also track the place of the computer, and take the control of those devices cameras and audio-system. They can also connect the computer viruses to the material, what is delivered from that system, and that might collapse the computers, what is downloading the material, and those viruses can be connected to the PDF-documents. Some of them might open the back gate to the system, and the honeypot can now track all data, what is delivered to that computer. In this case, the tracking software would set every data package, what is delivered from that computer the tracking cookie, what would guide the data packages thru the tracking server.


Then somebody starts to leak the information to the Internet, would the "honeypot-server" just set the little cookie in that internet connection. This cookie would set the stable IP-virtual server in that system. And even if the user of the computer uses dynamic-IP, what means that the IP-address of the system changes every time when it would put on, would there still be stable IP in somewhere at the net, and when this computer would put in the net, would the data start to surround thru the "honeypot".  The meaning of this operation would be provocative other leakers to put their information to that server, what would help to track those persons.

Newtonian and Einstein models are still useful tools.

The Einstein and Newtonian gravitational principles are still “hard stuff”. And today, we can say that all gravitational models are suitable...