WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

568

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time.

Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors.

I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too.

I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time. Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors. I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too. I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

(post is archived)

[–] 2 pts

Next you'll be telling us that Intel and AMD CPUs have a secret hidden independent processor with wireless remote capabilities which has access to all hardware on your PC. Can read your files remotely, even if PC is off. Can turn on webcam but leave the activity light off and all sorts of other creative things like stealing encryption keys to anything encrypted your computer has ever opened....

Because that would be crazy dude...

Welcome to 2008.

[–] 0 pt

A large antivirus vendor could detect it in the wild if they knew where to look - I will tell them. We just need some researchers to give it a go.

[–] 1 pt

Richard stall man used a similar method.

[–] 1 pt

Yes, indeed it is similar to RMS' method, albeit by only reading the files on the air-gapped computer, the compartmentalization is stronger.

[–] 0 pt

Wasn’t their a system shown that could read keyboard signals wiresless? And another for crt monitor cord emissions that nearly reproduced the monitors image? Depends on how much privacy you need and how hard someone else wants it. I had three letter agency issues for years, the surprising one was the laser off my living room window. Found it with the Nintendo wii on calibrate mode, showed the infrared hot spot on the glass and by careful shielding and aiming we located the source was a house across the valley. Using lasers to pick up window panes like microphones is old tech, heck, I think it was build one for $6.75 out of the back of a magazine years back. Still, was neat to find it.

We made up some crazy stores to tell in that room, then just started talking to them and telling them we knew they were recording. Laser went off about two weeks later.

Brings up the larger philosophical side of it all, and the nature of the cat and mouse game. Is this what humanity is reduced to in this era?

Technically I applaud you, i couldn’t do what you accomplished. What’s the end game though?

[–] 0 pt

In my case, the team on other side wanted to recruit me, so they over shared trying to impress me. Now I just return the kindness.

Look up The Great Seal Bug, by Leon Theremin. For passive surveillance, they use a more advanced version of that, basically in every computer and phone. But to sabotage computers, like the ones running power plants in Venezuela and Japan, they sometimes use active malware, this gives a chance for a large antivirus vendor to detect it in the wild if they know where to look, so I am trying to find a researcher willing to try.

Endgame? "I just aim to misbehave." Kinda. But to be serious: it is said that the CIA does covert operations to protect the "american way of life". I have my "happy way of life", don't need much more than what I can create/get for myself, but their way are in my way, so they either move or crack, because I am not doing it for them. If I have to be Snowden V2, so be it.

[–] 1 pt

What a load of garbage.

Chinese 5G is about spying on all public communication infrastructure.

Using radio would require BIOS/driver updates of the WIFI radio, assuming the computer even has WIFI.

Email is only going to contain Javascript, which is sandboxed. Sure you might be able to exploit LAN resources, but even that is highly specialized. Usually requires cached credentials and access of your router. So on and so on.

Additionally, identification of any of this wouldn't require an air gap. And it could effectively be done within a VM. So an airgap isn't required.

I could keep going and going.

What a complete load and kike-chinesium bullshit.

[–] 0 pt

If I provided you with an email could you send me the files as well?

[–] 0 pt

10GBs of email every few days, not as much useful without the localhost setup. I could, but don't think it is a good idea. Just learn how to use any feed reader then you can follow the sites that matter to you, because, as I am saying, you aren't much better with my setup, given the ubiquitous surveillance - albeit I find mine very convenient still, but I am used to it.