It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Maxatoria
reply to post by Gu1tarJohn
You aint technical or of a piractical nature or you'd think its more about some warez being released by a group of pirates....but a C before the :::::: and an 8 at the end would of pushed it into the naught region
Originally posted by sean
Many have wondered if Microsoft has a backdoor to your system. The answer to that may not be to far from the truth. A few days ago a thread popped up about it and It got me thinking and poking around. Microsoft themselves has said Windows 7 etc does not have back doors. However, what I am about to show you is a remote connection done everyday from your system without your knowledge. The most concerning part about all this is.... Well you will see for yourself...
The service we're talking about here is CryptSvc..
--------------------Description------------------------
Service name: CryptSvc
Description: Provides four management services: Catalog Database Service, which confirms the signatures of Windows files and allows new programs to be installed; Protected Root Service, which adds and removes Trusted Root Certification Authority certificates from this computer; Automatic Root Certificate Update Service, which retrieves root certificates from Windows Update and enable scenarios such as SSL; and Key Service, which helps enroll this computer for certificates. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start.
Path to executable: C:windowssystem32svchost.exe -k NetworkService
Startup type: Automatic
--------------------Hidden Network Account------------------
------------------CMD.exe Scan-------------------------
Note: Normally you cannot get this type of information without first elevating your CMD.exe to Administrator privileges. I created a log scanning at 10 second intervals. The command used shows the name of the file, ports/IP & what PID number was used.
-Command used: netstat -bo 10 > C:netstat.txt
---------------------Output--------------------------------
TCP 192.168.1.100:49175 64.4.11.42:http ESTABLISHED 1324 CryptSvc [svchost.exe]
---------------------Final Thoughts---------------------------------
As you can see this connection runs automatically as a service and has a login/password to this service. This account doesn't exist under management users/groups. If you type 64.4.11.42 in your web browser it will resolve to Microsoft. The most concerning of all this....a Crypto service connecting to a HTTP non secured unencrypted web server?? Wow Microsoft really??? Stopping this service will undoubtedly cause issues. So there you have it enjoy your potential security hole.
Originally posted by Maxatoria
reply to post by StargateSG7
Can we have some links to see how these are done....no wonder the NSA costs so much when they need to have so many specialist hardware engineers along with low level coders for the firmware
Originally posted by myn4m3
This is kind of an interesting read: "Your computer BY DEFAULT is spying on you
Did you know: Your computer BY DEFAULT is spying on you and sending everything you do to MS... It's true OPEN the following (following applies to win7)
Start Menu
Accessories
System Tools
Task Scheduler
On the left you'll see "Task Scheduler Library" seems innocent enough right... Expand it the expand microsoft then expand Windows. As you go through the list some are innocent enough but there are several that are sending your use info to "who knows who" at MS. Just a few that I've disabled are "application experience" "customer experience improvement program" "location" "WPD" "
www.diyaudio.com...
Originally posted by phishyblankwaters
reply to post by sean
Apparently no one else finds it odd for a service account that has a 15 character salted password connecting to a normal http web server.
Well, you wouldn't want that account open, as a hacker could modify the system files / ssl certificates and have you pulling updates from a compromised source.
As well, I'd have to assume, and probably be right, that any files that do get pulled down are hashchecked in some manner, removing the need for a secure SSL connection.
And lastly, if there is an issue with your SSL store, this would be the means of fixing it, how exactly are you going to pull down updates if your ssl is fried?
Originally posted by sean
reply to post by StargateSG7
Thanks for the list of info what's your take on CPU dep? Have you seen the video of the raspberry pi server cluster? It's funny as the rack is all built out of legos.
Originally posted by StargateSG7
Originally posted by sean
reply to post by StargateSG7
Thanks for the list of info what's your take on CPU dep? Have you seen the video of the raspberry pi server cluster? It's funny as the rack is all built out of legos.
---
Love the Raspberry PI server cluster demo...not sure what you mean by the term "CPU dep" tho.......
but in terms of tracking, almost ALL CPU's have a UNIQUE serial number on them that allows software
to TRACK an individual CPU so that the powers that be can find if it was YOUR machine that is the
source of any shenanigans.
You can print your OWN silicon by using the Open Source Super/UltraSPARC CPU designs
and using copper-vapor deposition on plastic substrates at process sizes around one micron or less
which means you could literally "laserprint" out a whole CPU on an 11 by 17 inch sheet of plastic.
It would be a bit power hungry and slow (at about 250 to 500 MHZ) but its definitely doable if you
want to make sure that no one can subvert your hardware. You can even layer them in stacks to
form your OWN supercluster of plastic CPU's!
If you want .95nm or 0.65nm CPU processes that will cost you some bucks but you CAN get some used
lithography and older 120mm silicon disc wafer manufacturing gear for less that $500,000 which means
you can print your own chips by the bazillions to your hearts content.
Originally posted by abecedarian
TCP 192.168.1.100:49175 64.4.11.42:http ESTABLISHED 1324 CryptSvc [svchost.exe]
192.168.*.* is a private address range, never to be directly connected to the Internet.
Originally posted by Pearj
Originally posted by abecedarian
TCP 192.168.1.100:49175 64.4.11.42:http ESTABLISHED 1324 CryptSvc [svchost.exe]
192.168.*.* is a private address range, never to be directly connected to the Internet.
Thought I'd reitterate the address in the OP (192.168) is an internal address, the established connection is your localhost (your computer). It's talking to itself.
I believe svchost checks keys against running programs to be sure they're legit. I'm pretty sure it's been around a while.
Not sure though, it's been a while since my MCP and we stay far away from windows (all Open Source for home machines and web servers). Happy Campers.
Originally posted by tetra50
Microsoft/Apple, whatever....they all have backdoors for remote control. Take a look at the current patents on all things computing......
Everyone seems to think that computer networks are security conscious, more than paper or anything. Nothing could be further from the truth. It was why this computational universal connection was created, after all.