Wikileaks - The Spy Files

Wikileaks - The Spy Files

The war of the future will not be played on the field.

Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...

Sunday 17 June 2012 > français

Tor Project

Tor protects your privacy

Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Tor Project
Security Alert: Sextortion is on the rise

Security Alert: Sextortion is on the rise

January 21, 2019. The latest report from cybersecurity company Symantec shows that extortion scams are on the rise. The company blocked almost 300 million emails of this type in the first five months of 2019. The time-tested scams are making a comeback (...)


Why the NordVPN network is safe

Why the NordVPN network is safe

Information has recently surfaced about a NordVPN breach caused by vulnerabilities in a third-party datacenter. Here are the key facts about the NordVPN breach situation: One server was affected in March 2018 in Finland. The rest of our service was not (...)


Riseup - Radical tech collective

Riseup - Radical tech collective

This email is the first of several in Riseup’s fall fundraising drive, where every donation carries other Riseup users with you. We wouldn’t exist without you, so please donate if you can. It could be a recurrin donation of $10, one dollar, or tens of (...)


Tails - donation campaign for 2019

Tails - donation campaign for 2019

Donate to fight surveillance and censorship Tails is available for free because we believe that nobody should have to pay to be protected from surveillance and censorship. Tails is free software because if our source code was closed, there would be no (...)


Red Cross

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%