Gå til innhold

Ryuuou

Medlemmer
  • Innlegg

    293
  • Ble med

  • Besøkte siden sist

Alt skrevet av Ryuuou

  1. Bare en liten sannhet og mulig fremtid. Mountainhead (2025) https://www.bbc.com/culture/article/20250521-mountainhead-review
  2. Fordømte gråspurver bråker så jævlig utenfor vinduet mitt. Vurderer å sage ned treet. Ble jo vekket av dem plattringa for f.
  3. Media som går på info terror. Ingen reaksjon? Huh.
  4. Møkka vær. Hater lavtrykk. Helsa ikke så veldig bra da nei. Blir kjellerkoop.
  5. Det gikk bra. Ble en kombo. Sov litt det ringte på jeg tok varene inn og nå får jeg ikke sove lenger. Får være oppe litt no.
  6. Oda er dumme men Meny kan legge utenfor døren uten noe problem.
  7. Snart meny på døra kl 8-10. Kan legge meg etter det.
  8. Jeg har kokos olje enn så lenge. https://www.nutiva.com/products/organic-virgin-coconut-oil?variant=8723933200444
  9. Ikke jeg Ser på Mountainhead på HBO Max.
  10. Kan ikke stemme på noe. Har ikke en *Myndigheter kan hemmeligjøre viss informasjon* siden det er ikke nødvendigvis forsettlig men ikke noe bra alikevel. Det ender opp men at verden tror det kommer fra Kina, at Kina har sluppet det ut eller at USA har bevisst experimentert med dette viruset. Dette er nå hva Jeff Sachs sier. Virker som en fornuftig og veldig reel mulig forklaring. Ingen konspirasjonsteorier her. Bare hemmeligjøring runt viss informasjon. What Might the US Owe the World for Covid-19? A US-funded laboratory origin of Covid-19 would certainly constitute the most significant case of governmental gross negligence in history. The people of the world deserve transparency and factual answers on vital questions.
  11. https://www.starbuckschilledcoffee.com/no/products/starbucks-tripleshot/tripleshot-espresso/ Denne her er helt perfekt. Masse kaffe og koffein. Hi hi
  12. An OpenAI whistleblower warns of the reckless race to AI dominance | GZERO World with Ian Bremmer AI superintelligence is coming. Should we be worried? | GZERO World with Ian Bremmer The AI Revolution Is Underhyped | Eric Schmidt | TED Humans "no longer needed" - Godfather of AI | 30 with Guyon Espiner Demis Hassabis Lex Fridman #299 DeepMind CEO Demis Hassabis on How A.I. Is Reshaping Google | Interview What's next for AI at DeepMind, Google's artificial intelligence lab | 60 Minutes Dark Side of AI - How Hackers use AI & Deepfakes | Mark T. Hofmann | TEDxAristide Demetriade Street AI Is Dangerous, but Not for the Reasons You Think | Sasha Luccioni | TED Can we build AI without losing control over it? | Sam Harris Why AI Is Our Ultimate Test and Greatest Invitation | Tristan Harris | TED Har sett en del på YT om Kunstig Intelligens/Artificial Intelligens KI/AI i det siste. Disse er bare noen av dem men de er veldig informative og interessante. Vankskelig å si hva man skal tenke om det. Bare bra? Bare dårlig? Begge deler tenker jeg. Det er veldig mye nytte med KI men også mye virkelige risiko elementer assosiert med KI. Denne her er nok den verste. Høres bare SCI-FI ut men det er tatt fra ett reelt vitenskaps perspektiv. Denne her er også ganske skummel. Tatt fra han her. >Geoffrey Hinton_ https://www.britannica.com/biography/Geoffrey-Hinton ~
  13. Ser på denne nå A Decent Man Ikke så værst men litt messy. Fortsatt ikke gått helt over streken enda. Tar opp noen interesante temaer.
  14. 3 spise skjeer med tran. Neste gått ut på dato. Ikke noe mer der. Må kjøpe en ny.
  15. Bare vær sikker det ikke inneholder noe du ikke tåler så. Taco pizza er digg.
  16. zero click exploits er skummel spyware. Huff.
  17. Her er litt info med hjelp av GPT 4.1 ~~ PEGASUS SPYWARE 1. Introduction Pegasus is a highly advanced, proprietary spyware developed by the Israeli cyberarms firm NSO Group Technologies. First identified publicly in 2016, Pegasus has since become synonymous with zero-click and zero-day mobile exploitation, allowing attackers to gain near-complete access to targeted smartphones running iOS or Android. 2. Origin and Purpose Developer: NSO Group Technologies (founded 2010, Israel) Stated Purpose: Marketed to government agencies and law enforcement for counterterrorism and crime-fighting. Actual Use: Evidence confirms widespread deployment against journalists, activists, politicians, and business executives, often without legal oversight. 3. Target Platforms Primary Targets: iOS (Apple) and Android (Google). Key Feature: Cross-platform capability. NSO engineers rapidly adapt exploits for new OS versions. 4. Infection Vectors 4.1. Zero-Click Exploits Definition: Attacks that require no user interaction; merely receiving a message, call, or push notification is enough. Examples: iMessage Exploits: Malformed iMessages trigger vulnerabilities in Apple’s messaging stack. WhatsApp Vulnerability (2019): Buffer overflow exploit via missed call. 4.2. One-Click Exploits (Social Engineering) Method: Victim is tricked into clicking a malicious link via SMS, email, or instant messaging. URL Shorteners: Obfuscate links to malicious domains. 4.3. Physical Access Less common: Installation via USB or brief physical contact with the device. 5. Technical Capabilities 5.1. Persistence and Stealth Root/Jailbreak: Gains root privileges (Android) or leverages jailbreak techniques (iOS) for persistence. Stealth: Leaves minimal traces, often auto-deletes or self-updates to evade detection. 5.2. Surveillance Functions Data Extraction: Accesses contacts, messages, call logs, calendar, emails, and browsing history. Live Surveillance: Activates microphones and cameras in real-time. File Exfiltration: Copies files, including photos, videos, and documents. Geolocation: Tracks device location continuously. 5.3. Command & Control (C2) Encrypted Channels: Communicates with remote servers using encrypted protocols (HTTPS, custom TLS). Dynamic C2: Frequently rotates server infrastructure to avoid blacklisting and takedowns. 5.4. Evasion Techniques Anti-Forensics: Cleans logs, removes itself upon detection or when instructed. Zero-Day Exploits: Regular use of previously unknown (zero-day) vulnerabilities. 6. Exploitation Details 6.1. iOS Exploitation Key Focus: Exploits vulnerabilities in iMessage, FaceTime, Photos, Safari WebKit, and Apple’s sandboxing. FORCEDENTRY (2021): Used a PDF parsing vulnerability in CoreGraphics (CVE-2021-30860). 6.2. Android Exploitation Approach: Exploits device firmware or application vulnerabilities, uses privilege escalation exploits (e.g., MediaServer flaws). Difficulties: Greater device fragmentation makes widespread infection harder but still effective on unpatched or out-of-support devices. 7. Detection and Indicators of Compromise (IOC) 7.1. Forensic Artifacts iOS: Artifacts are ephemeral; traces found in crash logs, message caches, or suspicious network traffic. Android: Root-level access may alter system files or leave unusual binaries. 7.2. Detection Tools MVT (Mobile Verification Toolkit): Developed by Amnesty International to scan for Pegasus indicators. Network Analysis: Unusual connections to known Pegasus infrastructure. 8. Notable Incidents Jamal Khashoggi (2018): Associates’ phones infected; linked to his murder. Project Pegasus (2021): Leak of 50,000 potential target numbers, implicating governments globally. 9. Countermeasures and Mitigation 9.1. For Individuals Update Frequently: Always run the latest OS versions and security patches. Minimal Exposure: Limit app permissions, disable iMessage or FaceTime if at high risk. Use Encrypted Communications: Prefer end-to-end encrypted platforms. 9.2. For Organizations Network Monitoring: Deploy intrusion detection/prevention systems to spot suspicious traffic. Threat Intelligence: Subscribe to IOC feeds and apply blocklists for Pegasus infrastructure. 9.3. For Device Vendors Bug Bounties: Apple and Google maintain programs for zero-day reporting. Rapid Patching: Accelerate response to identified vulnerabilities. 10. Legal and Ethical Concerns Dual Use Technology: Intended for criminal/terrorism investigations, but abused for political repression. Accountability: NSO claims to vet clients, but enforcement is opaque. Litigation: Apple and WhatsApp (Meta) have sued NSO; outcomes remain unresolved. 11. Current Status and Future Directions Ongoing Arms Race: NSO continues developing new exploits as vendors patch vulnerabilities. Sanctions and Blacklisting: US government blacklisted NSO Group (2021). Market Landscape: Other firms offer similar “lawful intercept” spyware, contributing to a global surveillance industry. 12. Summary Table Aspect Details Developer NSO Group Technologies Platforms iOS, Android Infection Vector Zero-click, one-click, physical Capabilities Data exfiltration, live surveillance, persistence, stealth Detection Forensics, network analysis, toolkits Legal Status Blacklisted in US, subject to ongoing litigation Ethics Significant human rights concerns 13. Pegasus represents a paradigm shift in digital surveillance, offering nation-states a turnkey capability to compromise any mobile device, often with little or no user interaction. Its technical sophistication, ability to evade detection, and exploitation of zero-day vulnerabilities make it a formidable threat to privacy, security, and civil liberties globally. Ongoing countermeasures by vendors and researchers represent only a partial answer; the underlying market for such spyware remains robust and largely unregulated. ~~ Jeg har laget noen lenker til litt mer avanserte utrykk. Kan hjelpe å lese litt. Ikke si at dette er noe mystisk.
  18. Leste du hele inlegget i det hele tatt?
  19. ~ Wired https://www.wired.com/story/pegasus-spyware-war-zone-first-time/ On November 10, 2021, Varuzhan Geghamyan, an assistant professor at Yerevan State University in Armenia, received a notification from Apple on his phone. His device had been compromised by Pegasus, a sophisticated piece of spyware created by the Israeli NSO Group that has been used by governments to spy on and repress journalists, activists, and civil society groups. But Geghamyan was mystified as to why he’d been targeted. Ja, det stemmer og det er skummelt. Bare spør chatgpt nøyaktig hvordan det fungerer.
  20. Uff da, det er kjedelig.
×
×
  • Opprett ny...