It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The only way to be secure from hacking is being offline.
Traditionally, common belief held that one of the most effective measures against Internet surveillance was to "air-gap" a computer containing sensitive information — or, in plain English, unplug the laptop or computer's Internet connection, isolating it from the outside world. But thanks to these tiny bugs, this protection method isn't foolproof anymore.
originally posted by: dude77
a reply to: interupt42
I'm guessing some time in the future they'll be able to read minds so no one will be safe
Edward Chang, a neurosurgeon at the University of California, San Francisco, says he is working toward building a wireless brain-machine interface that could translate brain signals directly into audible speech using a voice synthesizer.
the Defense Advanced Research Projects Agency, or DARPA, awarded two large contracts to Massachusetts General Hospital and the University of California, San Francisco, to create electrical brain implants capable of treating seven psychiatric conditions, including addiction, depression, and borderline personality disorder.
the development of microlectronic systems that can fit in the body; and substantial evidence that thoughts and actions can be altered with well-placed electrical impulses to the brain.
originally posted by: lightedhype
a reply to: Stuyvesant
So if you know just how deep surveillance is - I do as well. How can you reasonably say 'we are the ones putting our personal data out there?'
That is simply not true anymore. They can pull absolutely anything and everything from your computer, they can access your webcam, your private files, they can even access protected encrypted information stored on your device.
Many people would like to use their computers for record keeping and they would never ever put said data online - they simply store stuff on their hard drives for accessibility and because let's face it typing # is way easier.
Yet the government still steals this stuff...yes steals....They have gone way beyond crossing the line at this point.
originally posted by: devious003
a reply to: kranskik
Ok here is how to beat this lol when ever you use tor you use it on a virtual machine running a different operating system. Virus is down loaded to a sand box os.
That can be recovered and will not have admin privlages on your actual os. Best of luck to the new tor users you can also get it on your andriod or apple phone its called orbot and orweb. all this does is catch people new to tor dont forget to use proxy chains on your scanner or apps as they will give up your actual ip address.
The reason a virtual machine will work is because the virus will stay on the virtual machine and only be able to access the vms files. Few viruses can infect two diffrent operating systems. You can get vmware or virtual box then get the iso for linux or apple or windows and mount it to the vmware or virtual box