• "Spreading the ideas of freedom loving people on matters regarding high finance, politics, constructionist Constitution, and mental masturbation of all types"

Method Audio Hacking on the WEB 3.0

Joined
Nov 15, 2016
Messages
374
Likes
173
#1
http://www.magwebdesigns.net/wp/2018/05/16/method-audio-haxxing-web-3-0-hacking/
We as Humans have a very limited depth perception in regards to audio wave lengths. That is which this post attempts to exploit. Now We as humans have an existential reach to transmit frequencies beyond our normal ear shot. We can basically amplify our voice to infinitum. How do we do this?

Well one way is tapping into the “Smart” web 3.0 technologies. We have access to manipulate frequencies Mozart could only dream of. There are a ton of free utilities for frequency manipulation. And it’s really not even WEB 3.0 Tech its just the same old synthesizers that Skinny Puppy and Trent Reznor used back in the day. Any one remember Apex twin or Flint Custom?

Back to the software to easily do this. My Fav is FL studio super simple yet SUDO. Make your loop in FL studio, cast it over to sound forge, rinse repeat. What you can’t hear beyond the normal human frequency? Well here’s some news for you consumer Your “Smart web 3.0 Device” can.

This is just a cornucopia of WEB 3.0 Exploits. Or as it were a Pandoras Box Of 3.0 web potential.

Now Lets get into these “Home helper 3.0 Tech Bots” Pushed by the big guys.

These modern day devices record EVERY THING YOU SAY. Just ask Google, or help Alexa ,or please siri and all the other privates. So my main point in this long winded expedited post is this. STFU. No, I’m just kidding.

My main point is. Why? You won’t even need to buy the new tech from Amazon or Apple. Google already provides this service. It comes preloaded on your Android phone. Just say ask Google.

This is the potential for complete control. Of your smart phone or any other dumass recording device you install in your home. WOO behold any 3.0 bot linking on your “Smart 3.0 phone” one that links a credit card now… You can keep your head buried in the sand or you can finally wake up.

Cause now your average dude on the street can do the same thing the big guys do.

 
Last edited:
Joined
Nov 15, 2016
Messages
374
Likes
173
#2
How “Fansmitter” Malware Steals Data from Air-Gapped Computers
Changing a computer’s fan speed produces an audio signal that can be hijacked for web 3.0 audio hacking to steal data, say computer security experts who have tested the technique.

https://www.technologyreview.com/s/...alware-steals-data-from-air-gapped-computers/

Today, Mordechai Guri and pals at Ben-Gurion School in Israel.

When it comes to computer security, the ultimate protection is the “air gap”—a physical space between a computer and the Internet to ensure that the device is entirely isolated from the dangerous world of hacking.

But while air-gapping computers is an effective way to protect them, it is not perfect. In recent years, computer security experts have devised various fiendish strategies for extracting information from these devices. One is to commandeer the computer’s built-in speakers and use them to send data ultrasonically to a nearby recording device, such as a mobile phone. Indeed, some security researchers claim to have seen exactly this kind of ultrasonic malware in the wild.

Finally, the team put their malware through its paces by it to regulate both a CPU enthusiast and a framework fan, both which are normal on today's computer systems. As a device, they used a Samsung Galaxy S4 smartphone with a mike sampling at 44.1 hertz. The tests environment was their computer laboratory with ordinary backdrop sound, seven workstations, several network switches, and a dynamic air-conditioning system.

The rate of which the team could send information was tied to the distance between your smartphone and the computer, and by the quantity of background noises. Nevertheless, these were able to transfer at rates as high as 900 bits each hour. "Using our method we efficiently sent data from air-gapped computer without music hardware, to a smartphone device in the same room," boast the team.

Guri and co say the strategy can be employed to other devices too. "We show our method can even be used to drip data from different kinds than it equipment, inserted systems, and IoT devices that contain no audio tracks hardware, but contain admirers of varied types and sizes," they state.