I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time.
Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors.
I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too.
I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.
You’re describing Bluetooth.
I mean is it possible to install malware on a physical chip? Absolutely. But RAM doesn’t have an antenna to communicate with other devices. The malware would have to leverage other components of the computer to gain access to an antenna to send and receive data. It’s entirely possible and likely.
Plus if they get access to an Internet connection they can send and receive whatever.
The backdoors are likely just APIs feeding the data back to the NSA. It would not be hard to find and listen to these signals and data.
Apple recently disabled some of this functionality, but not all of it, on the iPhone and iOS.
On my Mac you can run an app called Little Snitch that gets installed as a kernel extension allowing you to monitor all incoming and outgoing data. Allowing you to block them. It’s insane how many apps call home all the time. If you put the app on paranoid mode and manually approve everything most of the software we use daily becomes unusable.
Google, Adobe, and Facebook are the most invasive.
Badbios uses sound