• Secret agents raid webcam artist
    16 replies, posted
[url]http://www.bbc.co.uk/go/rss/int/news/-/news/technology-14080438[/url]
He's got the EFF helping, this'll be great.
They may just seize all his equipment, without even arresting him?
Oh shit oh shit oh shit This is [B]exactly [/B]like a creepypasta I read (watching people through webcams) Oh god oh man
[QUOTE=mobrockers2;30988978]They may just seize all his equipment, without even arresting him?[/QUOTE] Land of the free.
Don't most webcams have a light that comes on when it activates?
[QUOTE=DiscoBiscut;31012008]Don't most webcams have a light that comes on when it activates?[/QUOTE] The elite hackers can turn off the light so you'll never know! Once they've gotten past the firewalls there's nothing they can't do, my uncle had some uber-hacker in Transylvania turn his computer into a bomb!
Why exactly does Apple have the power to use the Secret Service as a personal army? Secret Service...SS. And Steve Jobs. Huge rallies on announcements of a product. I think I've pieced it all together.
wtf government
lol "freedom"
[QUOTE=Nikota;31018843]Why exactly does Apple have the power to use the Secret Service as a personal army? Secret Service...SS. And Steve Jobs. Huge rallies on announcements of a product. I think I've pieced it all together.[/QUOTE] Apple was founded April 1st of 1976, which is April Fools' Day. April Fool was a codename for the spy who played a key role in the downfall of Saddam Hussein, Saddam Hussein = S.H S.H = Sherlock Holmes Sherlock Holmes' partner was John H. Watson. JHW = Jared Waerea-Hargreaves, who plays rugby with the Sydney Roosters. rebelsport.com are currently selling NRL Retro Sydney Roosters 1976 Jerseys. "1976" was also the year Apple was founded. Conclusion? The Sydney Roosters are the secret service. .... wait, what am I doing?
You obtained permission from the security guard to take photos, you didn't obtain permission to install unwanted software onto the computers.
[QUOTE=SwissArmyKnife;31017094]The elite hackers can turn off the light so you'll never know! Once they've gotten past the firewalls there's nothing they can't do, my uncle had some uber-hacker in Transylvania turn his computer into a bomb![/QUOTE] Are you serious? If you know anything about computers you would just isolate the node and reroute the code into the router subsystems
I love applejuice, but this is an outrage!
[QUOTE=fenwick;31019242]You obtained permission from the security guard to take photos, you didn't obtain permission to install unwanted software onto the computers.[/QUOTE] Who are you talking to, and how the fuck would you know what kind of permission he got.
[QUOTE=DiscoBiscut;31023003]Are you serious? If you know anything about computers you would just isolate the node and reroute the code into the router subsystems[/QUOTE] You could but when you isolate nodes the communications pathway's bandwidth is usually exceeded.
[QUOTE=Fatman55;31024678]You could but when you isolate nodes the communications pathway's bandwidth is usually exceeded.[/QUOTE] Upgrade your hack tool.
Sorry, you need to Log In to post a reply to this thread.