say, once a week. And there's NOTHING the entire governments with all of their super computers
I have a credible source familiar with the NSA I'm totally just guessing, but the NSA runs a hierarchical system of hardware backdoors, so if they want to trace a machine engaged in a DDOS, or a drop through proxies, and shut it down, they send a signal to the first IP that appears, and this unlocks the machine, and dump its network traffic to the utah facility. This data is then parsed, sent back, and the next set of IPs in the list, in a descending and expanding tree of machines, is accessed, until they have all machines at some level N.
From there all the machines at the bottom of the trace tree simply have their modems, wifi cards, and/or network interfaces, stop working 'for no apparent reason'.
"And there's NOTHING the entire governments with all of their super computers (every computer on the planet)"
Supposedly it takes one year to decrypt a modern key at a cost of about two million dollars. This was in 2018 though, so it has likely come down significantly.
"The government does not have near the control over everything that you think it does"
At the mid level (congress, senate) thats true. At the top level, the DOD alone has 60,000 employees whose entire job is to manufacture new identifies, acquire equipment, and engage in spying.
60,000 black budget spies domestically.
For one agency.
The mid level has less control then they want us to believe, and the top level has far and beyond more control than you understand.
I'm totally just guessing, but the NSA runs a hierarchical system of hardware backdoors, so if they want to trace a machine engaged in a DDOS
This is also stuff that TLAs (three letter agencies) make up to scare people. They really don't. They have a set of 0 Days that they choose not to tell people about but their set is much smaller than some organized hacking groups such as nation state threat actors that routinely target the US. Don't believe their propoganda. Additionally, there's still 1,001 ways around anything you think the NSA/CIA/FBI could possibly have to stop someone from using a modern dead man switch.
This data is then parsed
I think at this point, you're just adding in jargon to make your point to seem more legit but it makes no sense to parse anything at this point if the systems involved are already compromised - it's already be decrypted in your scenario. There's no point to parse anything at this point in your theoretical set of steps. Your entire plan revolves around a nonexistent backdoor, as well. If what you said was correct, then how is it that the TLAs get fooled all the time but rather stupid but tech savy street thugs involved in international crimes? You know how those folks get caught? Poor secops. Not the technology they use. They just make sloppy mistakes instead of following their processes.
I think at this point, you're just adding in jargon
Not at all. "parse" here, simply means to "extract" something. In this case, an ip address. Nothing fancy.
" it's already be decrypted in your scenario.'
I want you to consider what a DDOS or even a deadman switch might entail:
The controlling machine is not the one directly sending traffic, or data, to the target.
You have a series of hopes, and proxies, that redirect traffick flow, in order to obfuscate origin.
So if the final location to send a drop, or even a DDOS is location A, it might look like the following (assuming formatting doesn't mangle my message):
A
/ \
B C
/ \ / \ D E F G \ H
Where H is the machine that issues the command, and D, E, F, G, are the proxies, and B, and C are the bot machines that receive commands from the proxies.
What the NSA might do is send a command, a bit of code, to a backdoor on A, that reveals the IPs of B and C. And this, almost like a worm, raids the network interface controller for a history of packets received, getting the addresses of D, E, F, G, and so on, down the layers of proxies and bots, until they all have a single machine or subnet in common.
If this exists, it likely exists as a common protocol in ring 0 (or even lower rings) on modern chipsets across multiple manufacturers, not simply zero days. And for the purpose of plausible deniability, at each step of retrieving the next layer of IPs, it would defer to a subset of major nodes on many common carriers, where the parsing would be done, instead of saying embedding an IP address that points directly back to the DOD, lol. All it would look like, if you could even capture the network traffic, would be anomalous diagnostic data being sent to your carrier, with a single hop, maybe disguised as a SYN packet or an errant SYN-ACK with no preceding SYN packet, but other implementations could be possible too.
Not at all. "parse" here, simply means to "extract" something. In this case, an ip address. Nothing fancy.
I know what it means which should be quite obvious from what I said after that. I criticized your use of parse as appropriate in that set of steps as it is absolutely meaningless/useless to do at that point in your steps. It was me pointing out that you're using jargon to cover up the fact that you don't really know what you're talking about. I had to explain modern dead man switches to you, remember?
Since I'm not getting any value out of this conversation in addition to you thinking you're an expert when you're not, I'll ignore you.
(post is archived)