Welcome to the Temple of Zeus's Official Forums!

Welcome to the official forums for the Temple of Zeus. Please consider registering an account to join our community.

⚠ Mass surveillance is about to begin ⚠

Joined
Nov 22, 2024
Messages
276
Website
zdarkblow.netlify.app
surveillance.png
The feared reality seems to be getting closer and closer. I think you've heard about “ChatControl” lately. It's a horrible mass surveillance system, a hardware backdoor, a chip that could be pre-installed on devices in the European Union to obtain data before it is encrypted so that governments, secret services, etc. can spy on end-to-end encrypted messaging app chats. This news is truly horrific. People don't seem to understand the gravity of the situation. There is even talk of entire chips already pre-installed in the hardware of new phones, so it is impossible to escape. Similar to the Chinese communist model of mass espionage, People need to wake up. The enemy wants to implement its agenda now that it is collapsing, and it will not go away without a fight!

And guess what? There are many more EU members who support this crap than there are who oppose it, which means that it now seems only a matter of time before we find ourselves in a giant “George Orwell's 1984.”

We are talking about an official regulation aimed at preventing and combating online child sexual abuse. First launched in May 2022 by Commissioner Ylva Johansson, it aims to oblige platforms such as WhatsApp, Signal, and Telegram to automatically scan users' messages for CSAM material and suspicious grooming behavior. Many experts and leading privacy organizations are sounding the alarm: the technology is not foolproof and risks generating millions of false positives per day, i.e., innocent messages interpreted as suspicious. Some European governments even report error rates of up to 80% in certain investigations.

At this point, I wouldn't be surprised if they try to introduce backdoors into Linux systems in the future, as the NSA already has them in Windows and Mac.

monitoring.pnghttps://fightchatcontrol.eu/

 
Linux is open-source, so if any backdoors were put into it, they would be found and it would be known quickly that there is a backdoor in it, so people would stop using it or patch it or change to a different version. That's what open-source means - anyone, including you - can check the programming code and see what's in it and what it does. That's not to say hardware (the physical components of the phone or computer) can't contain backdoors, though, and the same with apps that others make, which can also contain backdoors. One would have to use Linux's own repositories and visit forums and websites which deal with programming, to keep up-to-date with knowledge and to keep safe. For hardware, that might be more difficult, so there'd have to be somthing like... a Linux Hardware division (or Linux Hardware Division, with a capital D, for an example name) who actually manufacture safe and open-source hardware.

There are some small projects doing open-source (as I'm calling it) hardware, such as (from ChatGPT) -
  • Purism (Librem laptops/phones) – open firmware, hardware kill switches for mic/cam, PureOS.
  • Pine64 (PinePhone, PineBook) – community-driven open hardware, though not all firmware is blob-free.
  • Framework Laptop – modular design, parts transparency, and repairability, though it’s not 100% open-source firmware yet.
The challenge is that completely open hardware is expensive to develop and harder to mass-produce than open-source software. It also runs into the problem of sourcing chips — most are made by a small number of fabs, and those fabs can be pressured to insert backdoors.

That’s why a “Linux Hardware Division” would have to not just design the boards, but also either control or tightly audit the chip fabrication process — otherwise the openness stops at the PCB level.


PCB is printed circuit board. So it's not entirely impossible, but can be difficult. Like I said recently, you own... not enough to be able to have enough power. Own more stuff, have more power. It's a materialistic World, but at least we have Spirituality to use, which will overtake if people don't be lazy - again as I said recently, laziness is expensive; we can raise Energies free! That doesn't cost!
 
I mean, sexual assault and pedophilia are tragic but why wouldn't people find it suspicious for governments to implement very invasive control methods for solving the issue?
When I entered the Linux rabbithole, I was this annoying privacy guy. I was saying to my friends things like "google/the government know wich porn you are watching ! It doesn't scare you ?"

I quickly gave up. Normies doesn't give a shit about human rights, unless the media tell them to care (because we need a casus belli for a war, for example).
 
If you know all the ip adress they will use for this surveillance and if you block them using a DNS server I think that should work.
 
They would probably be able to log what you write on your keyboard, analyzing these with AI you are just putting more suspicion on yourself by sending these pgp encrypted messages.
Key-loggers do exist. They can record what keys are pressed and also mouse movements and clicks, and even see what's on the clipboard, capture screenshots, and see webcam input. There are hardware ones and software ones.
 
If you know all the ip adress they will use for this surveillance and if you block them using a DNS server I think that should work.
Things like PeerGuardian, which is defunct now, apparently could block IP addresses and ranges, but I read somewhere that they weren't as good as one might hope. I don't know for certain, but it seems probable that they could block advert servers, as well, which must be similar to what advert blockers do in web browsers.
 
....why wouldn't people find it suspicious for governments to implement very invasive control methods....
This... I'm trying not to be a dick about it but I think it's at least partially inseparable from being straight forward. The average person is so fucking stupid and/or incapable of actual conscious thought it's sickening, and terrifying.
Things that to us are as instantly and effortlessly obvious as the glaring Sun, are beyond what many are capable of understanding. Others are blinded by indoctrination, fears, other things.
Wlim
 
I also wanted to create another separate post for an even more subtle method of espionage used by intelligence agencies and even private entities. With the advancement of technology, espionage techniques have evolved in ways that were unthinkable just a few decades ago.

microphone.png

Microphones Hidden in Electrical Outlets:
One of the most common and least invasive methods of espionage is the use of hidden microphones. These devices can be inserted into electrical outlets, making them virtually invisible. Microphones hidden in electrical outlets work by picking up sound vibrations through the electrical cable and converting them into audio signals that can be transmitted to a remote receiver.

How It Works:
Installation: The microphone is inserted into the electrical outlet, often replacing an existing outlet with one that contains the spying device.
Sound Capture: The microphone captures sound vibrations through the electrical cable and converts them into electrical signals.
Transmission: The electrical signals are then transmitted to a remote receiver via radio waves or Bluetooth.
Reception: The receiver decodes the signals and converts them back into audio, allowing the operator to listen to conversations.

eeee.gif

Microphones Hidden in Telephone Cables:
Another common method is the use of microphones hidden in telephone cables. These devices can be inserted directly into the telephone cable, allowing telephone conversations to be intercepted.

How It Works:
Installation: The microphone is inserted into the telephone cable, often by cutting the cable and connecting the device in series.
Sound Capture: The microphone captures sound vibrations through the telephone cable and converts them into electrical signals.
Transmission: The electrical signals are then transmitted to a remote receiver via radio waves or Bluetooth.
Reception: The receiver decodes the signals and converts them back into audio, allowing the operator to listen to the conversations.

Tower_Animation_1.gif

3D Mapping Using Radio Waves:
One of the most advanced espionage technologies is 3D mapping using radio waves. This technique allows you to create a three-dimensional map of the interior of a structure without physically entering the building.

How It Works:
Radio Wave Emission: A device emits high-frequency radio waves toward the target building.
Wave Reflection: The radio waves bounce off the interior surfaces of the building and return to the device.
Signal Analysis: The device analyzes the reflected signals to determine the distance and position of the interior surfaces.
3D Map Creation: Using advanced algorithms, the device creates a three-dimensional map of the interior of the building.

x-ray.png

X-ray cameras:
X-ray cameras are one of the most advanced and invasive espionage technologies. These cameras can see through walls and create detailed images of the interior of a structure.

How it works:
X-ray emission: A device emits X-rays toward the target building.
X-ray Absorption: The X-rays are absorbed by the internal structures of the building in different ways depending on the material.
Image Capture: A sensor captures the images reflected by the X-rays.
Image Creation: Using advanced algorithms, the device creates detailed images of the interior of the building.
 

Attachments

  • audio-wave-5692234-4798534.gif
    audio-wave-5692234-4798534.gif
    1.5 MB · Views: 135
View attachment 8119The feared reality seems to be getting closer and closer. I think you've heard about “ChatControl” lately. It's a horrible mass surveillance system, a hardware backdoor, a chip that could be pre-installed on devices in the European Union to obtain data before it is encrypted so that governments, secret services, etc. can spy on end-to-end encrypted messaging app chats. This news is truly horrific. People don't seem to understand the gravity of the situation. There is even talk of entire chips already pre-installed in the hardware of new phones, so it is impossible to escape. Similar to the Chinese communist model of mass espionage, People need to wake up. The enemy wants to implement its agenda now that it is collapsing, and it will not go away without a fight!

And guess what? There are many more EU members who support this crap than there are who oppose it, which means that it now seems only a matter of time before we find ourselves in a giant “George Orwell's 1984.”

We are talking about an official regulation aimed at preventing and combating online child sexual abuse. First launched in May 2022 by Commissioner Ylva Johansson, it aims to oblige platforms such as WhatsApp, Signal, and Telegram to automatically scan users' messages for CSAM material and suspicious grooming behavior. Many experts and leading privacy organizations are sounding the alarm: the technology is not foolproof and risks generating millions of false positives per day, i.e., innocent messages interpreted as suspicious. Some European governments even report error rates of up to 80% in certain investigations.

At this point, I wouldn't be surprised if they try to introduce backdoors into Linux systems in the future, as the NSA already has them in Windows and Mac.

View attachment 8120https://fightchatcontrol.eu/

Well, this is a serious matter. Although, if it is used right AND they can destroy the csam sickos and groomers, I am all for it. I am tired of hearing news stories about a worthless pos molesting a child. It always disgusts and saddens me.

With that said, I do not like the idea of them knowing all of my likes, dislikes, religious affilliation, energy practices, tech I am building, or any thing else like that. So in the end I am torn, as I am sure many others are as to how we can handle this.

I think one law we could implement is public torture and execution for any child molester (15 and under) over the age of 20, caught in the act... but that is just me.
 
Well, this is a serious matter. Although, if it is used right AND they can destroy the csam sickos and groomers, I am all for it. I am tired of hearing news stories about a worthless pos molesting a child. It always disgusts and saddens me.

With that said, I do not like the idea of them knowing all of my likes, dislikes, religious affilliation, energy practices, tech I am building, or any thing else like that. So in the end I am torn, as I am sure many others are as to how we can handle this.

I think one law we could implement is public torture and execution for any child molester (15 and under) over the age of 20, caught in the act... but that is just me.

unfortunately, one can't go without the other. If you want to arrest every pedo of a territory consuming csam, you have to spy on everyone. And these spying infrastructures would then be used by the current politicians in power to push their agenda, without any means to resist.


If you want to live free, you have to accept evil exists.
 
Of course they will try ;)

But I think as long as you have some good security, they can't. If you are on Linux, and take some "physical security" measures (for example setting a password on your boot menu, so a random guy can't just boot your computer on a sus usb stick), you're good, isn't it ?



Yes, this is why we need to use as much open source software as we can 🤓

@չ∂αяквℓσω thanks for your posts. I learned a lot. Do you have solutions (particularly concerning the "espionage" part) to suggest ?

The best thing to do is to always use open source software, and hardware if possible. If you have Android, I recommend a privacy-focused custom ROM. Avoid Apple and Microsoft products, and if possible, use Linux systems for desktops instead of Windows and MacOS. Most importantly, protest and protest so that these terrible laws are not passed.
 
The best thing to do is to always use open source software, and hardware if possible. If you have Android, I recommend a privacy-focused custom ROM. Avoid Apple and Microsoft products, and if possible, use Linux systems for desktops instead of Windows and MacOS. Most importantly, protest and protest so that these terrible laws are not passed.

I 100% agree.

In my case I use arch btw :cool:

I did some resarch about graphene, postmarketOS ect but it seems if you don't have the money to buy a google pixel (and even that will eventually become obsolete, as google kinda "closed" their code, if I understood right), you can give up your privacy on smartphone...

There is still the "Universal Android Debloater" but it doesn't remove all the spyware, from what I've read.

I guess I will buy a Pinephone when I'l have money to waste.
 

Official Temple of Zeus Links

Back
Top