Wikileaks - The Spy Files.

The war of the future will not be played on the field.

Sunday 17 June 2012

français > 

Terrorists organize themselves through the cyberspace.

Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence defense against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are established. Cannot be detected by Antivirus, Anti-malware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...

You Can’t Arrest An Idea

NordVPN is an excellent VPN for online privacy

NordVPN is an excellent VPN for online privacy

Warning – Numerous VPN service providers assure not to keep users’ log files of their connections and it is generally false! Many VPN services that (…)

1 September

Tutanota - Encrypted mailbox for free

Tutanota - Encrypted mailbox for free

Tutanota - Get your encrypted mailbox for free Tutanota, Freedom Fighters: Tutanota is open source so security experts can verify the code that (…)

17 November 2022

What is /e/OS?

What is /e/OS?

“e Foundation” was incorporated in May 2018. e Foundation is a non-profit organization leading the development of Open Source mobile operating systems that (…)

1 November 2022

Riseup : Backup Backup Backup!

Riseup : Backup Backup Backup!

Riseup provides online communication tools for people and groups working on liberatory social change. We are a project to create democratic alternatives and (…)

28 September 2022

Red Cross

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.

Your data is YOUR data

Your data is YOUR data

eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Signal

Signal

Speak Freely

Tor Browser

Tor Browser

Tor protects your privacy

NordVPN

Protect all your devices.

Secure, high-speed VPN