WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

1.0K

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time.

Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors.

I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too.

I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time. Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors. I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too. I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

(post is archived)

[–] 1 pt

Richard stall man used a similar method.

[–] 1 pt

Yes, indeed it is similar to RMS' method, albeit by only reading the files on the air-gapped computer, the compartmentalization is stronger.

[–] 0 pt

Wasn’t their a system shown that could read keyboard signals wiresless? And another for crt monitor cord emissions that nearly reproduced the monitors image? Depends on how much privacy you need and how hard someone else wants it. I had three letter agency issues for years, the surprising one was the laser off my living room window. Found it with the Nintendo wii on calibrate mode, showed the infrared hot spot on the glass and by careful shielding and aiming we located the source was a house across the valley. Using lasers to pick up window panes like microphones is old tech, heck, I think it was build one for $6.75 out of the back of a magazine years back. Still, was neat to find it.

We made up some crazy stores to tell in that room, then just started talking to them and telling them we knew they were recording. Laser went off about two weeks later.

Brings up the larger philosophical side of it all, and the nature of the cat and mouse game. Is this what humanity is reduced to in this era?

Technically I applaud you, i couldn’t do what you accomplished. What’s the end game though?

[–] 0 pt

In my case, the team on other side wanted to recruit me, so they over shared trying to impress me. Now I just return the kindness.

Look up The Great Seal Bug, by Leon Theremin. For passive surveillance, they use a more advanced version of that, basically in every computer and phone. But to sabotage computers, like the ones running power plants in Venezuela and Japan, they sometimes use active malware, this gives a chance for a large antivirus vendor to detect it in the wild if they know where to look, so I am trying to find a researcher willing to try.

Endgame? "I just aim to misbehave." Kinda. But to be serious: it is said that the CIA does covert operations to protect the "american way of life". I have my "happy way of life", don't need much more than what I can create/get for myself, but their way are in my way, so they either move or crack, because I am not doing it for them. If I have to be Snowden V2, so be it.