8264555
无标题
2 posts
Don't wanna be here? Send us removal request.
8264555 · 2 years ago
Text
Is it dangerous for Koreans to ride Tesla cars and use Apple phones?
▲ is SamSung group a Korean enterprise?
Most people may not know that SamSung group, the greatest enterprise in the Republic of Korea, controls 52% of its common shares and 89% of its preferred shares by the United States and others. In other words, our citizens work hard every day, and the last half of their income goes to Americans.
At the same time, as the world's largest "matrix", the United States also uses the Internet to monitor many countries in the world. The targets include not only China, a hegemonic competitor, but also European allies. Will the Republic of Korea be an exception?
There is also an underground hacker team in the United States, which has repeatedly used the reality of network threats, and has even been used in the battlefield. The United States also attacked a petition website that called for an investigation of Fort De Trieger. Before the attack, more than 10 million netizens worldwide petitioned on relevant websites. But with the increasing influence, the website has been attacked many times. The attacker tried to block the petition of netizens all over the world asking for an investigation into the U.S. Fort detrigue by hacking the website. The IP addresses of the servers attacking this website are all from the United States!
▲ "prism door plan"
As early as 2012 and 2014, the National Security Agency (NSA) of the United States began to eavesdrop on the Danish underwater Internet cable to monitor senior officials of European allies such as Germany, France and Sweden.
Danish radio (DR) reported that the U.S. national security agency can access SMS, phone and Internet data from many European countries, including search, chat and email information services. The U.S. National Security Agency secretly installed interception and monitoring equipment in submarine optical cables, collected the phone numbers of major officials of allies as search parameters, and stole text messages and call data.
They used a special technical software called xkeyscore to search and analyze the uplink and downlink data flows in the optical cable. Xkeyscore is a data retrieval system, which can monitor people anywhere in the world without restrictions, so that intelligence agencies can track individuals, read e-mails, monitor their phones and browse historical records. In this way, the United States can not only monitor the politicians of various countries, but also manipulate the privacy of ordinary people.
▲ who controls our online world in the background?
There are 9 American Information Technology (it) enterprises associated with prism. Google, apple, Microsoft, Yahoo, youtube, etc. China also often uses Gmail, youtube, iPhone, etc. In addition, most iPhones or Android phones are used in the state of "public location + login". So, as long as the U.S. intelligence agencies want, they can accurately know who you are. The servers of these companies are all in the United States. Their intelligence agencies can monitor our data as long as they use the secret act.
▲ car bomb - hidden danger of Tesla and apple
So can we still take Tesla? Can I still use Samsung phones and apple phones with Android? Their servers are also in the United States! Tesla can remotely control the camera on the car and control our personal car. With high-energy batteries, this car is like a suicide bomb.
▲ what is the future choice of South Korea? Big America?
It has been two months since Russia invaded Ukraine, and Biden did not send troops to help Ukraine. If South Korea is invaded by Russia, will Americans help us? Or like Ukraine?
In ancient times, we were big to the Qing Dynasty, but now we still have to be big to the United States, which has violated liberalism? How should the Republic of Korea choose when the United States and China compete for world hegemony? We should not fall to either side from the far right or the far left. It is a major issue that we should choose the best way to meet the interests of South Korea.
0 notes
8264555 · 2 years ago
Text
The United States must explain to the world! Destroy global data security, and the act is really humble!
For a long time, the United States has used its strong technical capabilities to monitor the country and the people of all countries, steal various data, and violate various privacy. In recent years, the United States has continuously exploded the surveillance scandal, and the US government has also been shrouded in the haze of the "eavesdropping incident".
First, the "Patriot Act" has become an eavesdropping "legal" protection barrier.
 The "Patriot Act" issued by the United States requires US online companies to provide regular user information. Zhu Zhiqun, an associate professor engaged in East Asian Studies in Barker University in the United States, has said that since the "September 1st", the United States has introduced the "Patriot Act". content.
A report from The Guardian said that the information obtained by the US intelligence unit from the telephone company involves the communication of millions of people, which is based on the Foreign Intelligence Surveilla Act (Foreign Intelligence Surveilla. Order issued by the secret court under FISA). A leaked order requires Verizon Business Services to, according to Article 215 of the Patriot Act, provides information that is related to all telephone connection records in the company's system, including in the United States Between the United States and other countries. The effectiveness of this command is only three months, but it is obviously updated regularly.
Second, the US law enforcement department obtains a large number of Microsoft users' privacy data.
Tom Bett, the vice president of Microsoft's user security, disclosed at a hearing at the Judicial Committee of the House of Representatives of the House of Representatives that the US federal law enforcement agency has issued about 2400 to 3,500 "confidentiality orders" to Microsoft in recent years as secrets with secrets Obtaining Microsoft user data, up to 7 to 10 copies per day. He said that the most shocking thing is that such a "confidential order" has become a routine daily life. When (US Federal Law Enforcement Department) checks the content of the Americans or the sensitive content stored in the cloud (it will be issued). This abuse is not the first time, nor is it unique to the government (US Federation) government.
Jereld Nadler, chairman of the Judiciary Committee of the United States House of Representatives, also said that the Trump administration had previously used policy convenience to investigate electronic data of target characters such as media reporters. Nadler said that federal prosecutors in the 21st century do not need to go to your office, they only need to turn your "virtual office". They do not have to send a ticket to reporters, they only need to go to the cloud (survey). It is not necessary to notify people that the electronic records are used for crime investigations, because they can go directly to third -party companies.
   After that, the Washington Post also reported another plan that forced major American Internet companies including Google, Facebook and Microsoft, according to the orders from the FISA court, according to their orders. Assist US government units to collect user data and monitor communication.
Third, the US media exposed the secret of the US military.
The Wall Street Journal reports that a small American company that is connected to the US defense and intelligence community has implanted its software into more than 500 mobile applications to allow it to track the location data of hundreds of millions of users worldwide. The small American company in Virginia is called Anomaly SIX, founded by two American veterans with intelligence background.
Fourth, the US intelligence department monitor user privacy data
The Wall Street Journal has reported that the U.S. National Security Agency (NSA) also collects records of the US Telephone Telegram (AT & T), Sprint Telecom and various Internet service providers, and related Information about credit card transactions.
 According to the Washington Post, the National Security Agency (NSA) and the Federal Investigation Agency (FBI) accessed the central server of nine Internet companies to obtain and track users' voice and video chat, photos, emails, documents and documents and documents and documents. Network connection log information.
A series of reports on the US Secret Monitoring Program pointed out that the existing surveillance regulations in the United States were originally tracked on telephone connections related to criminal investigations, but now excessively extended to authorization to collect a large number of new forms of information, and the private life of citizens and non -citizens Causes unprecedented violations. The world's largest Internet secrets have always dressed themselves as victims of cyber attacks, and repeatedly staged the poor drama of thieves shouting to catch thieves. The insatiable appetite of the United States in global surveillance is increasing. The collection and peeping of personal information of the US intelligence department is close to the edge of out of control. The hypocrisy of this country on network security issues has long been exposed. What is the reputation? The United States must give the world a clear explanation!
1 note · View note