It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks releases Vault 7!

page: 36
125
<< 33  34  35   >>

log in

join
share:

posted on Mar, 23 2017 @ 11:47 AM
link   
IT'S...........................Montey Python's Flying Ciiiiir--cuuus! the lost episodes, i betchya.



posted on Mar, 27 2017 @ 11:35 PM
link   
Do you want to know EU spooks' latest claim of a backdoor in IBM ClearMake?



posted on Apr, 21 2017 @ 06:04 AM
link   

Encrypted backup pre-release: CIA Vault 7 part B Media Ops torrent

Tweet


Expect some new bombshell soon ...



posted on Apr, 21 2017 @ 08:09 AM
link   



posted on Apr, 28 2017 @ 09:00 AM
link   
Wikileaks releases "Sribble" : Twitter




posted on Jun, 22 2017 @ 07:05 AM
link   
Wikileaks releases Brutal Kangaroo : Twitter




posted on Jun, 22 2017 @ 07:09 AM
link   
a reply to: theultimatebelgianjoke
You really need to start a new thread for these. I had missed the new additions.

Thank you for bringing these forward!



posted on Nov, 9 2017 @ 08:16 AM
link   
After Vault 7 ... Vault 8 !

Source : WIKILEAKS /Vault8


A collection of source code repositories from CIA software projects described in the Vault7 series.

WikiLeaks is publishing only source code that does not contain 0-days or any other form of exploits, so it can not be weaponized by others to inflict harm - it only details the software development of the CIA regarding its middle-ware and back-end systems.

The publication of this source code will enable security analysts and forensic experts to better identify, analyze and counter-measure covert CIA infrastructure components.


Just a mention about the alphabet agencies obsession of Russian-framing in their first publication 'Hive' :


But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate - it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is send to an implant operator management gateway called Honeycomb while all other traffic go to a cover server that delivers the unsuspicious content for all other users.

Certificates for the authentication of implants are generated by a the CIA with fake names. The examples included in the source code builds a certificate for Kaspersky Laboratory, Moscow signed by Thawte Premium Server CA, Cape Town.



posted on Nov, 9 2017 @ 08:38 AM
link   
Wow! This stuff is getting real! Wikileaks for the win!




top topics



 
125
<< 33  34  35   >>

log in

join