It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Windows 10 Banned by Torrent Trackers / File-Sharers at Risk

page: 3
23
<< 1  2    4 >>

log in

join
share:

posted on Aug, 24 2015 @ 09:52 AM
link   
a reply to: ArMaP

The closest I could find is one guy posting in a forum about how he is being monitored by MarkMonitor and found out about it by doing a reverse DNS and whois. This was back in 2005, so MarkMonitor could already be collecting data from all Windows users anyway.

The second forum post I found showed someone who's task manager was asking permission to connect to an IP address belonging to MarkMonitor, and they were using Windows 7.

It looks like MarkMonitor monitors us already. Although I don't have the technical expertise to know exactly what the deal is with each of the two situations below, I did add links to the forums I found them in.


-In my windows machine my firewall status shows me that any time I open a network related application a few connections open, from 0.0.0.0 and a port between 3000 and 4200, to some external IPs 80 port. Three of these IPs are 209.85.135.103, 74.125.39.139, and 64.124.14.70.

-Reverse DNS and whois show the IPs belong to MarkMonitor, a company whose scope I am unsure about but whose full name is Markmonitor Brand Protection Antifraud Solutions. That sounds scary.-In my windows machine my firewall status shows me that any time I open a network related application a few connections open, from 0.0.0.0 and a port between 3000 and 4200, to some external IPs 80 port. Three of these IPs are 209.85.135.103, 74.125.39.139, and 64.124.14.70.

-Reverse DNS and whois show the IPs belong to MarkMonitor, a company whose scope I am unsure about but whose full name is Markmonitor Brand Protection Antifraud Solutions. That sounds scary.


Source


taskmgr.exe is asking permission to connect to 66.152.109.110.

I am using windows 7. Is it normal? Is my machine infected with malware? Thank you!



Now let's do some whois to see who these guys are:

whois rr.com
Domain Name: rr.com

Registrar Name: Markmonitor.com
Registrar Whois: whois.markmonitor.com
Registrar Homepage: www.markmonitor.com...


Source
edit on 24amMon, 24 Aug 2015 09:53:00 -0500kbamkAmerica/Chicago by darkbake because: (no reason given)

edit on 24amMon, 24 Aug 2015 09:54:17 -0500kbamkAmerica/Chicago by darkbake because: (no reason given)



posted on Aug, 24 2015 @ 10:45 AM
link   
a reply to: darkbake

it would be really nice if people would start to verify their sources and do their own research. if you're incapable of doing so because of the lack of technical expertise required - don't post such BS.

as for the taskmanager thing, it's a stretch. a long one. they did a google search that gave them some domain that is completely unrelated to the IP at hand and they're treating it as a proof? seriously?

and having a domain registered via godaddy is 'a connection' and 'a proof' again? SERIOUSLY?

those people have completely no idea what they're talking about.

that IP belongs to TVC, revdns points to TVC as well, no website shows up when trying to connect to that IP with a web browser, at least here - and that's about it.

there's plenty of software (antivirus software being the main suspect in this case), that 'hijacks' other processes. whenever some process gets loaded (such software can even connect to already launched processes), additional code gets loaded and called. some programs use it to display an overlay with fps counter in games, some use it to provide some additional buttons for window sharing across video calls, some use it for malware monitoring, some may use it for fraudulent purposes. so it could be anything, including malware.

if such thing would happen on a freshly installed copy of windows, without any third party apps installed, it would be widely known already. since it doesn't, it's that user's third party software/malware to blame, not windows.

it's exactly the same case with that other forum post - the fact that something connects somewhere, doesn't mean it's windows-related - ANY software can hijack other apps and do such tricks, people are just too ignorant to know this.

and it's always fun to blame microsoft, right?

yawn.

btw, you were asked for official microsoft statement and you cite some paranoid posts from 2005 as a proof that windows 10 will send data to markmonitor? there are no words to describe how stupid that is.

people, you are being deluded. media (all of them, including smaller websites/portals focused on IT) need traffic. what generates most trafic? sensation, drama, FUD. so as long as windows 10 is relatively new, they WILL milk it, spreading every single lie possible to get your attention. so if you just have to post yet another thread with such fairytales, at least don't believe it blindly, spreading the false doom stories and helping those portals/youtubers/whatever in the process, but remain calm and don't make your own opinion until you'll see responses from people that have enough knowledge to understand such crap.

because if you would understand it, you wouldn't even post it.
edit on 24-8-2015 by jedi_hamster because: (no reason given)



posted on Aug, 24 2015 @ 11:15 AM
link   
I am surprised no one has mentioned '1984' yet, big brother is watching you, and lives in Redmond is it?



posted on Aug, 24 2015 @ 11:20 AM
link   
a reply to: darkbake

You do know how to block IP ranges correct? You can do it through your router or ISP if you call them and ask them to block that IP. You can even do so with the firewall.



posted on Aug, 24 2015 @ 11:24 AM
link   

originally posted by: yuppa
a reply to: darkbake

You do know how to block IP ranges correct? You can do it through your router or ISP if you call them and ask them to block that IP. You can even do so with the firewall.


or you can stop installing malware/other software that does who knows what, for the same effect.

because it sure as hell wasn't windows that was connecting to those IPs.



posted on Aug, 24 2015 @ 11:53 AM
link   
a reply to: jedi_hamster

Correct.
Enough said really.



posted on Aug, 24 2015 @ 11:58 AM
link   
Meh, I'll stay windows 7 for a bit yet. If there becomes issue, it's easy to work with a linux distro and I mean if MScrap keeps up it's thing, this will give more attention to develop out the last bits on linux to make it fully competitive with winblows. Looks like a win-win situation.




posted on Aug, 24 2015 @ 12:31 PM
link   

originally posted by: Aliensun
a reply to: darkbake

My goodness. Thieves think they are being victimized.
Well, that kind of thinking is in the air these days.
It could suggested that is one aspect of what is wrong with the general society today, but probably it would be shouted down.


Yeah, that is what's wrong with the society today. The total submission to the corporations and their grid for profits. Is this kind of thinking that we're so doomed now days. Typical corporate drone mindset.



posted on Aug, 24 2015 @ 12:42 PM
link   
I am running Windows 10. Believe me, I would have switched back to Win 8 in a heartbeat had I not been able to download my TV shows with uTorrent. So, at least here in Taiwan, BitTorrent works with Win 10. Now, I am not in any way endorsing Win 10. I still have a nagging Bluetooth problem...



posted on Aug, 24 2015 @ 01:05 PM
link   

originally posted by: supermarket2012

originally posted by: yuppa
HA sanyone heard of turining off windows update and in the srervices and disabling the rights protection? Sheesh. its a easy fix to keep windows from spying on you. SHoot you can even get programs that will block microsoft having access to the system.



So are you using win10 right now? What does windows update have to do with the topic? What makes you think disabling the ability for microsoft to spy on you via windows is possible?


-----

Actually it's very possible to do! Just run the Executables, DLL files,
DAT files, and Microsoft Jet database files through an assembler code
checker line-by-line running it within a virtual CPU to see what ports,
addresses and other things it accesses...EASY AS PIE! We can log ALL
of Windows 10 in a few days or so running it through EVERY command,
link address, CPU instruction, BIOS access, Input/Output access
(i.e. Northbridge/Southbridge chipset and disk controller access).

We will then tell you what it can do privacy wise.

Just so you know, companies like Symantec and other anti-virus
publishers and various intelligence and military agencies within
the U.S. government still pay MS at least $30 million a year for
small and large bits of Windows source dealing with common
keyboard and Human Interface Device (HID) hooks, port addresses
and NTFS file system formats so they can target ZERO-day exploits
within the OS.

There are also specific hardware-exploits and microcircuit
manufacturing flaws that have been inserted into various
CPU chip and peripheral controller masks for YEARS that
seem innocuous at first but can be targeted for exploit
to allow microcode execution from internal CPU caches
or cause iterative code execution on specific chip layers
or within specified circuit blocks creating a targeted failure
of specific circuits which technically can cause a slight rewrite
of a circuit diagram so that a targeted failure point can be invoked
allowing external or internal code be loaded or run, or specific parts
of a chip mask be made vulnerable to external exploit.

These days we can SHAVE a chip so that we can see an
entire chip mask layer by layer and then run THAT mask
diagram through a materials and circuitry profiling system
to see intentionally manufactured failure points and
improper circuit mask layering issues.

Even a SIX BILLION Transistor AMD GPU or a 1.2 billion lines-of-sode
Expert System Data Miner is NOT immune to virtual CPU instruction set,
procedural command debugging or chip circuit profiling...so what makes
you think we can't profile the latest Windows 10 OS or Intel i7 chip mask!

We made it! We can profile it and debug it!

---

P.S. This is For the Spooks! ........>>>

Some of my best buddies have Opto-Electronic systems
that can do MASSIVELY parallel operations for profiling
WAAAAAAAY into 3-digit Exaflop territory...What makes
you thing we can't analyze, profile and debug the code
base and a chip mask in JUST MERE HOURS?

edit on 2015/8/24 by StargateSG7 because: sp



posted on Aug, 24 2015 @ 01:15 PM
link   

originally posted by: StargateSG7

originally posted by: supermarket2012

originally posted by: yuppa
HA sanyone heard of turining off windows update and in the srervices and disabling the rights protection? Sheesh. its a easy fix to keep windows from spying on you. SHoot you can even get programs that will block microsoft having access to the system.



So are you using win10 right now? What does windows update have to do with the topic? What makes you think disabling the ability for microsoft to spy on you via windows is possible?


-----

Actually it's very possible to do! Just run the Executables, DLL files,
DAT files, and Microsoft Jet database files through an assembler code
checker line-by-line running it within a virtual CPU to see what ports,
addresses and other things it accesses...EASY AS PIE! We can log ALL
of Windows 10 in a few days or so running it through EVERY command,
link address, CPU instruction, BIOS access, Input/Output access
(i.e. Northbridge/Southridge chip and disk controller access).

We will then tell you what it can do privacy wise.

Just so you know, companies like Symantec and other anti-virus
publishers and various intelligence and military agencies within
the U.S. government still pay MS at least $30 million a year for
small and large bits of Windows source dealing with common
keyboard and Human Interface Device (HID) hooks, port addresses
and NTFS file system formats so they can target ZERO-day exploits
within the OS.

There are also specific hardware-exploits and microcircuit
manufacturing flaws that have been inserted into various
CPU chip and peripheral controller masks for YEARS that
seem innocuous at first but can be targeted for exploit
to cause microcode execution via internal CPU caches
or have iterative code execution on specific chip layers
or within specified circuit blocks to cause targeted failure
of specific circuits which technically can cause a slight rewrite
of a circuit diagram so that a targeted failure point can be invoked
allowing external or internal code be loaded or run, or specific parts
of a chip mask be made vulnerable to external exploit.

These days we can SHAVE a chip so that we can see an
entire chip mask layer by layer and then run THAT mask
diagram through a materials and circuitry profiling system
to see intentionally manufactured failure points and
improper circuit mask layering issues.

Even a SIX BILLION Transistor AMD GPU or a 1.2 billion lines-of-ode
Expert System Data Miner is NOT immune to procedural/command
debugging or chip circuit profiling...so what makes you think we
can't profile the latest Windows 10 OS or Intel i7 chip mask!

We made it! We can profile it and debug it!

---

P.S. This is For the Spooks! ........>>>

Some of my best buddies have Opto-Electronic systems
that can do MASSIVELY parallel operations for profiling
WAAAAAAAY into 3-digit Exaflop territory...What makes
you thing we can't profile and debug it in JUST HOURS?


would you kindly go trolling somewhere else? some other forum perhaps?

KTHXBYE



posted on Aug, 24 2015 @ 01:19 PM
link   
a reply to: jedi_hamster

----

These are links to chip mask exploits:

Surreptitiously Tampering with Computer Chips:

www.schneier.com...

and this paper:

Stealthy Dopant-Level Hardware Trojans ?

by

Georg T. Becker1, Francesco Regazzoni2, Christof Paar1,3,
and Wayne P. Burleson1

1University of Massachusetts Amherst, USA
2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland
3Horst Gortz Institut for IT-Security, Ruhr-Universitat Bochum, Germany

PDF Link
www.sharps.org...

Abstract. In recent years, hardware Trojans have drawn
the attention of governments and industry as well as the
scientifi c community. One of the main concerns is that
integrated circuits, e.g., for military or criticalinfrastructure
applications, could be maliciously manipulated during the
manufacturing process, which often takes place abroad.
However, since there have been no reported hardware
Trojans in practice yet, little is known about how such
a Trojan would look like, and how difficult it would be
in practice to implement one.

In this paper we propose an extremely stealthy approach for implementing
hardware Trojans below the gate level, and we evaluate their impact
on the security of the target device. Instead of adding additional circuitry
to the target design, we insert our hardware Trojans by changing
the dopant polarity of existing transistors. Since the modi ed circuit appears
legitimate on all wiring layers (including all metal and polysilicon),
our family of Trojans is resistant to most detection techniques, including
ne-grain optical inspection and checking against golden chips".
We demonstrate the e ectiveness of our approach by inserting Trojans
into two designs | a digital post-processing derived from Intel's cryptographically
secure RNG design used in the Ivy Bridge processors and
a side-channel resistant SBox implementation | and by exploring their
detectability and their e ects on security.

----

As chip mask tampering is more than just a MERE POSSIBILITY!

----


I Can't Do That Dave...

...or....Nie mogę tego zrobić dave

P.S. A CatBot I am not...

P.S.2. 2600 HZ -- The Tone of Life for The Digerati!

...And Bob's ur uncle and I love Mottly Ram Crue and I Code Therefore I Think!

I am the Mill...I am The House...The Sea I can Ford....The Road Is My Journey!
Alf is My Hero! I like being at the Pole Position and No Gate can block me...!

edit on 2015/8/24 by StargateSG7 because: sp

edit on 2015/8/24 by StargateSG7 because: sp



posted on Aug, 24 2015 @ 01:56 PM
link   
Windows

Windows NT

now

Windows NSA



posted on Aug, 24 2015 @ 02:18 PM
link   
a reply to: jedi_hamster

In the original news article, which I sourced in the O.P., it mentions that Windows 10 sends data to MarkMonitor. This same information was mentioned in a few dozen other articles that I found on the web. I have sources for what I said. What I was looking for was an official statement from Microsoft about sending data to MarkMonitor, but I couldn't find any.

Their user agreement states that they will send information to third parties, and supposedly there was a separate statement made by Microsoft that they send information to MarkMonitor. This second statement I could not find any evidence of beside it being referenced in over a dozen different news articles.

Microsoft User Agreement

I did not think of other spyware and the like being the reason that MarkMonitor was connecting to a forum user's PC, but if that is true, there isn't conclusive evidence that Windows is behind that.


edit on 24pmMon, 24 Aug 2015 14:20:20 -0500kbpmkAmerica/Chicago by darkbake because: (no reason given)

edit on 24pmMon, 24 Aug 2015 14:40:30 -0500kbpmkAmerica/Chicago by darkbake because: (no reason given)



posted on Aug, 24 2015 @ 02:26 PM
link   
a reply to: darkbake

If you haven't already... move to Linux..

you don’t need to be spied on ...

Ubuntu , mint , take your pick

/don't look back
edit on Mon, 24 Aug 2015 14:27:06 -0500272America/ChicagoMonday4 by rigel4 because: (no reason given)



posted on Aug, 24 2015 @ 02:27 PM
link   

originally posted by: darkbake
a reply to: jedi_hamster

In the original news article, which I sourced in the O.P., it mentions that Windows 10 sends data to MarkMonitor. This same information was mentioned in a few dozen other articles that I found on the web. I have sources for what I said. What I was looking for was an official statement from Microsoft about sending data to MarkMonitor, but I couldn't find any.

Their user agreement states that they will send information to third parties, and supposedly there was a separate statement made by Microsoft that they send information to MarkMonitor. This second statement I could not find any evidence of beside it being referenced in over a dozen different news articles.

Microsoft User Agreement

I did not think of other spyware and the like being the reason that MarkMonitor was connecting to a forum user's PC, but if that is true, there isn't conclusive evidence that Windows is behind that.



because dozens of 'news articles' repeat the same BS over and over again, doesn't make it true.

when Sorcha Faal publishes new UFO-related crap on beforeitsnews and it gets repeated over and over again on dozens of websites, it's still a hoax.

how is this any different?

IT IS NOT.

none of the articles you've posted links back to microsoft confirming that windows 10 will send data to markmonitor.

conclusion: this thread belongs to the hoax bin, just like almost every other FUD-fueled windows 10 related thread.



posted on Aug, 24 2015 @ 02:28 PM
link   
a reply to: Aliensun

Sharing information, art, culture is not a crime...



posted on Aug, 24 2015 @ 02:31 PM
link   
Go here:

distrowatch.com...

for a comprehensive list, and description of many different Linux-distributions.

There are tons of sites with help if you get stuck. Also you can use the chatrooms to get instant help.

bye bye M$!



posted on Aug, 24 2015 @ 02:32 PM
link   
Is this the start of fingerprint/ID card scanners built into smart TVs to make sure only the only the person who bought the dvd is able to watch it?

What if a friend video types some tc shows and movies for you while you are you of the country? A fee for your data/media?

Windows 10 is only going on my laptop as an upgrade from windows 8 because, windows 8 is horrible - they better leave my win7 machine be - its not full of any illegally obtained movies, regardless i dont want my stuff pawed through to check either way. Its media TSA in the home!

horrible!

win10, you had your chance and shot your own foot.

Linix conversions anyone? What about vitalised windows platforms? bleh.



posted on Aug, 24 2015 @ 02:32 PM
link   
a reply to: iDope

I am sure if YOU had any talent to actually create any of the content you mentioned you would feel different.




top topics



 
23
<< 1  2    4 >>

log in

join