aluzzardi / pam_usb

Hardware authentication for Linux using ordinary USB Flash Drives.
GNU General Public License v2.0
151 stars 82 forks source link

pamusb is on NSA/CIA Huntdown list #44

Open braindef opened 4 years ago

braindef commented 4 years ago

Hello aluzzardi

They use Psychological Warfare against those who would like to continue pamusb development.

https://twitter.com/FailDef/status/1216514303416815616

aledged and known attacking vectors known so far: http://hackerscardgame.ch (they will maybe qFire your modem if you access it [see Jacob Applebaum: to protect and infect part 2, -> part with Quantum Inserts, TURBINE, TARMOIL

greetings from a bigger penguin Marc jr. Landolt

ghost commented 4 years ago

@braindef Can you explain for guys like me what exactly is in twitter?

And why this repo is unmaintained?

braindef commented 4 years ago

hi @hardhub

Twitter is in my opinion some sort of Honey Pot, 1960s and old people would maybe identify with it since "Project Bluebird" would have been their "secret", i though use twitter, since i try to be some sort of reverse honey pot...

i used pam_usb, so i could reduce the parameter hardware backdoor / i²c / tempest attack, since even if they could read the keystrokes they could not login to my linux...

...in 2015 i had still problems so was reading && twittering about EquationGroup things... https://github.com/braindef/HackersCardgame6/blob/master/jpg/EN/e6.jpg

...so i ended up in a mental institution again... https://github.com/braindef/HackersCardgame6/blob/master/jpg/EN/m138.jpg (in german mental institution means "Psychiatrie" and if you ask Jaro-Winkler-Algorithm, Psychiatrie and Psychologische Kriegsführung (PsychologicalWarfare) does not match, but i'm not quite sure about that)

in the famous talk "To protect and infect, Part 2" from @ioerror Jake talks about that they use all 13 attack vectors you know only 10. but i think they also need to unlock them somehow(?)...

...pam_usb is really great to make you live worse, but in fact it makes it better since it helps people to reduce the equation...

...further it seems that everything that is pam-related has some Layer 8 (ISO-OSI) malware, some sort of psychological warfare socio-psychology design patterns, that you can enumerate and identify as false, some i can not, so the only way to prevent me from doing things like HackersCardgame::m44 would be to disable or jam sigint / comit. https://github.com/braindef/HackersCardgame6/blob/master/jpg/EN/t1.jpg (this thing was 70 years ago)

...but i got it running somehow for debian bulllseye https://github.com/braindef/pam_usb/tree/debian-bullseye2 (one-time pad not yet done)

... after that they possibly overwritten my bootsector maybe with Equation Group Malware, that would have some remote interface like the eyefi wireless SD Card, or tempest... (so if you see a electron microscope laying around please tell me)

Greetings FAILdev

Spartan-767 commented 4 years ago

Not sure what you mean by using "Psychological Warfare against those who would like to continue pamusb development". Or why anyone would want to target those working on it. You said this software was related to OSI malware but its still present here so do you mind providing more details as to what the f*ck your talking about. Seems to be my inability to understand what your referring to however not meant to carry a aggressive tone.

braindef commented 4 years ago

hello @STAR-Sec

i always end up in mental institutions when i try to revive pam-usb. Alluzardis version does not work on stretch, buster and bullseye. all the people that forked it and also tried to fix it seem to never finish thier work. it looks like some sort of cyber-mass-grave if you look at the forks.

so my hypothesis:

premise 1: pam-usb would prevent that people get access to your linux box with i²c, hardware keylogger, maybe intelME and other low-tech methods that focus on getting your password (if you properly unplug the key and lock when you walk away)

so if you would have some important data about local powerful people they maybe would want to delete this data. such things happen, see the case Gustl Mollath in Germany.

in this case the attacker would need some more powerful hacking tolls (exploits) like kernel exploits, exploits of firmware blobs in eg. Networking cards

premise 2: as far as i heard the secret services are internationally share such exploits among the agencies (source: To Protect and Infect Part 2 from Jacob Applebaum). So just in case in case i really have some relevant information about my local city (only 16k People) then they maybe would make use of such a bigger attack.

even if i'm completely wrong, pam-usb lets you sleep better, because you maybe feel bad if you have been owned, but you feel less bad if you see that the other older people use really big tools, but they just use them, they did not develop them. So even when you don't win the game not to be owned, you though will win the psychological warfare "game" since the other party uses products they bought for lots of money.

My opinion: the NSA (technology) is just the support guy of CIA (that spin-doctos news, does mindcontrol or even overthrow governments that is proven in many cases)

If you can falsify my hypothesis and premises i would be happy, but as long you can not better think of mental institutions as some instrument of mindcontrol, not for all patients but for some, CCC even has a notice on their congress page for getthing help with mental institutions. And just btw Jacob Applebaum's Mother ended up in a mental institution too, that does not mean that she is a great hacker like jake, but they go against your whole family, so therefor i question mental institutions.

in the end pam-usb is working on buster and bulleseye: https://github.com/braindef/pam_usb/ but onetime pad not yet done, and also not audited. I can write large C/C++ projects, but when it comes to such things i tend to get in serios trouble, and end up in mental institutions, even when i was still using windows and the proprietary product Proteg (thats some sort of windows-pam-usb) i had the same problem.

Greethings Marc jr.

Further readings: Ask yourself what Donald Ewen Cameron did here in Switzerland in Burghölzli

HackersCardgame commented 3 years ago

additional informaions:

one of the socio-psychology-design-pattern they seem to abuse is to sabotage the library or just change the library

a) udisks1 -> udisks2 b) utmp.h -> utmpx.h (freeBSD) c) see also [0]

going against the library or upstream things would hide the direct attack, that would also imply that it is a bigger group of people... HUST NSA? i guess they test the ways how people fix or mitigate the problem and then create some sort of Hohle Gasse [1] out ouf (almost) all ways to fix the problem to drive the people that try to fix that insane.

[0] Inkscape Extension Manager Eaten by Upstream Snakes! - Patreon Update 9th Jan 2021 https://www.youtube.com/watch?v=OgJRkNAYTC0

[1] SwissCulture::WilhelmTell

and they seem to have a super duper special team for pam things / library that would make completely sense if they would like to own all systems globally

Sincerely Marc jr. Landolt owner of the domain HackersCardgame.ch