Saturday, October 22, 2016

Access comes from within...

For years we have been telling you that "ALL" software can be hacked, but people believe what they want to believe...
 
Apple users thought for the longest time that they were secure and that only Microsoft computers were vulnerable of getting viruses, :-D when in fact they were getting hit more than Windows...
 
The thing of it was they didn't know they were getting attacked because plain and simply put they didn't want them to know and was better letting them think they were safe to keep the lines open...
 
Steve Jobs knew this but instead kept people in the dark because even he knew that he couldn't afford failure when your reputation is on the line...
 
The sad part is that Apple users of yesterday still believe today that they don't need malware protection and that their system is impenetrable, but truth be known that these people are most likely the zombie systems that are being used as gateways...
 
In order to be anonymous one needs to hide behind walls and curtains while pipelines are being laid all around them...
 
Misdirection is the key to anonymity so keep them following what they can see, this way the work gets done for them as they sit quietly sipping tea...
 
In the News:
 
"The attackers used hundreds of thousands of internet-connected devices that had previously been infected with a malicious code that allowed them to cause outages that began in the Eastern United States and then spread to other parts of the country and Europe"
 
A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system...
 
Samuel L. Jackson was right when he said, "Shit doesn't happen, shit takes time, shit takes effort"
 
Access comes from within, just like it takes an inside person to help pull off the perfect crime...
 
The fact that we know this is due to the wording they used to describe the incident, 9 years...

sidenote: Data is the name, getting to it is the game...
 
The backbone of the internet is "Linux" which is the inside access they needed, now all they need is their cover, that's the cloud, so all that's left is the means, and that's you...and that's a fact!

No comments:

Post a Comment