Cervantes

Hoy es el día más hermoso de nuestra vida, querido Sancho; los obstáculos más grandes, nuestras propias indecisiones; nuestro enemigo más fuerte, el miedo al poderoso y a nosotros mismos; la cosa más fácil, equivocarnos; la más destructiva, la mentira y el egoísmo; la peor derrota, el desaliento; los defectos más peligrosos, la soberbia y el rencor; las sensaciones más gratas, la buena conciencia, el esfuerzo para ser mejores sin ser perfectos, y sobretodo, la disposición para hacer el bien y combatir la injusticia dondequiera que esté.

MIGUEL DE CERVANTES
Don Quijote de la Mancha.

2 de julio de 2017

CIA Can Geo-locate Your Computer by Listening to WiFi Signals

By Aaron Kesel
WikiLeaks Vault 7 has provided great insight into the CIA’s hacking capabilities. So far we have learned they can hack into various electronic devices such as smartphones, TVs, and computers. Some of the CIA’s tech revealed by Vault 7 is outdated and over-hyped, but the latest revelation called project Elsa seems frightening.
Elsa is the code name for the CIA’s geo-location malware for WiFi-enabled devices like laptops running the Microsoft Windows operating systems according to WikiLeaks.
One of the scariest things about Elsa WikiLeaks notes is that once CIA malware is installed on a target’s system, it doesn’t even need to be connected to the Internet to function.
“Once persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals. To perform the data collection the target machine does not have to be online or connected to an access point; it only needs to be running with an enabled WiFi device,” WikiLeaks wrote.
If the system is connected to the Internet, it then proceeds to log the geo-location of the target using databases from Google or Microsoft. The malware then stores the longitude and latitude data along with a timestamp for when the information was collected in an encrypted location on the user’s hard drive.
Further, WikiLeaks has showcased that Elsa doesn’t phone home to the CIA; the data has to be extracted by a CIA agent using separate CIA exploits and backdoors or air gapping it out using a computer’s hard drive LED light.
The latter sounds like science fiction, but if the computer was infected with malware a drone could then exfiltrate the data if the drone were able to get close enough to see the computer’s light according to Wired.
With the revelation of this type of hacking technique, it begs the question, why would this method be used? The answer is almost certainly for targeting hackers and terrorists such as the CIA’s mad experiment in the Middle East, ISIS. With the geological location data of a target, it would make droning a target easy peasy lemon squeezy.
Aaron Kesel writes for Activist Post. Follow us at Twitter and Steemit. This article is Creative Commons and can be republished in full with attribution.

Alerta Venezuela

No dejen de ver este conmovedor video

LatinoAmérica Calle 13

The American Dream

Facebook, Israel y la CIA











La Revolucion de la Clase Media


Descontento en el corazon del capitalismo: el Reino Unido

Descontento en el corazon del capitalismo: el Reino Unido

La Ola se extiende por todo el mundo arabe : Bahrein

La Caida de un Mercenario

La Revolucion no sera transmitida (I)

(II) La revolucion so sera transmitida

(III) La Revolucion no sera transmitida

(IV) La Revolucion no sera transmitida

(V) La Revolucion no sera transmitida

(VI) La Revolucion no sera transmitida

(VII) La revolucion no sera transmitida

(VIII) La Revolucion no sera transmitida

Narcotrafico SA

La otra cara del capitalismo...

Manuel Rosales mantenia a la oposicion con el presupuesto de la Gobernacion del Zulia...

El petroleo como arma segun Soros

Lastima que se agacho...

El terrorismo del imperio

Promocional DMG

Uribe y DMG