The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)



Etiquette mavens say the book on manners must be rewritten, literally, to take into
account new technologies and social media (AFP Photo/Ed Jones)

A 2012 survey by Intel found that in several countries, a majority said they were put
off by "oversharing" of pictures and personal information on the
internet and smartphones (AFP Photo/Nicolas Asfouri)

German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Friday, March 24, 2017

WikiLeaks releases CIA hacks of Apple Mac computers

Yahoo – AFP, March 23, 2017

According to Wikileaks documents the CIA can inject a undetectable bug deep
 into the essential firmware of an Apple Mac computer that will not be erased
even when the computer is reformatted (AFP Photo/JUSTIN SULLIVAN)

Washington (AFP) - The Central Intelligence Agency is able to permanently infect an Apple Mac computer so that even reinstalling the operating system will not erase the bug, according to documents published Thursday by WikiLeaks.

In its second release allegedly from the CIA's arsenal of hacking tools, WikiLeaks also said that it appears the US spy agency has been able since 2008 to insert it bugs onto new and unused iPhones by intervening in Apple's supply and distribution network.

The release follows the initial publication on March 9 by the anti-secrecy group of thousands of pages of instructions and code from what it called the entire CIA arsenal of hacking tools.

The documents are generally believed to be genuine although the CIA has not acknowledged this.

The publication of the documents sparked a US counterintelligence investigation into how the documents leaked out from the CIA and made their way to WikiLeaks, with some people pointing fingers at the agency's use of private subcontractors as a likely source.

The newest documents focus on how the CIA targets Apple's popular personal electronics to spy on users.

They show the CIA developed a tool in 2012 called "Sonic Screwdriver" that can hijack an Apple computer's password-protected boot process from peripheral devices like adapters and USB drives.

By doing so, they can inject a undetectable bug deep into the computer's essential firmware that will not be erased even when the computer is reformatted.

The manual for the "NightSkies" bug shows that the CIA developed it in 2008 to be implanted physically in brand new iPhones.

"While CIA assets are sometimes used to physically infect systems in the custody of a target, it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments," WikiLeaks said.

The documents provide a glimpse into the workings of the CIA. One showed the agency urgently trying to adapt NightSkies to a certain Apple laptop.

The agency "has the opportunity to gift a MacBook Air to a target that will be implanted with this tool," one 2009 document said.

"The tool will be a beacon/implant that runs in the background of a MacBook Air that provides us with command and control capabilities."

Related Article:


No comments: