I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time.
Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors.
I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too.
I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.
How do you "take the files" to the "air-gapped computer" ?
How did you find out about the access to the air-gapped machine?
What was the route of entry for the malware?
If it was BadBIOS did you do sound-source elimination and 100% sound-insulation to test your hypothesis?
SD Cards never connected at same time and aren't mixed up.
Yes, I isolated sound.
USB data drive. Its also called sneakernet, using any physical media to transfer data without interconnection hardware.
You’re describing Bluetooth.
I mean is it possible to install malware on a physical chip? Absolutely. But RAM doesn’t have an antenna to communicate with other devices. The malware would have to leverage other components of the computer to gain access to an antenna to send and receive data. It’s entirely possible and likely.
Plus if they get access to an Internet connection they can send and receive whatever.
The backdoors are likely just APIs feeding the data back to the NSA. It would not be hard to find and listen to these signals and data.
Apple recently disabled some of this functionality, but not all of it, on the iPhone and iOS.
On my Mac you can run an app called Little Snitch that gets installed as a kernel extension allowing you to monitor all incoming and outgoing data. Allowing you to block them. It’s insane how many apps call home all the time. If you put the app on paranoid mode and manually approve everything most of the software we use daily becomes unusable.
Google, Adobe, and Facebook are the most invasive.
Badbios uses sound
Little snitch sounds cool, I'm gonna che ck it out.
All those apps likely require passing a weekly licensing check to function
Old program name, tempest
cool story bro
wat
What do you mean "make feeds from it"?
You don't sound like someone with the technical expertise you seem to be wanting to project.
Do you know how this works? I am aware they can connect to devices through other devices near by, like using a mobile device to connect to a nearby desktop. Could they access an air-gapped computer that is not near any other devices or routers, like in a remote location?
Read about The Great Seal Bug by Leon Theremin, the tech is similar, just much more advanced now days.
LARP, but thanks for playing.
So its not RSS feeds? Do you download a page and all of it's assets to read locally?
What is the purpose of the eml files? Wouldn't it be enough to serve the sites files on their own?
It can also use RSS if one exists, if not, just scrapes and makes one. Many tools to deal with feeds exist, so it is easier to repurpose them. Sure, one could just serve .html files, RSS/Atom is just a good intermediate.