Category: Technology

GREY PILL: Technology- “The Imminent Danger of using Cloud Based Storage Services”

GREY PILL: Technology- “The Imminent Danger of using Cloud Based Storage Services”

GREY PILL: TECHNOLOGY: New Youtube Video!

“How does the cloud work?”

With the rising need for data protection and storage online, many companies and their employees have been implementing cloud based technology as a solution for this necessity providing more convenience. You also have an increasing number of internet users by the millions, of whom are adopting cloud based technologies within their own households.  One of the most widely known cloud based storage services, for example, is Google Drive. Google Drive is a free online service that allows anyone with a Gmail account to make use of for storing most if not all of their files from their hard drive on an online server that will serve as an additional data storage.  As of right now, Google Drive grants all users with 15GB of free storage for completely free with no additional costs which is actually quite good in comparison to other cloud based storage services like Drop Box at a 2GB start and BOX at a start of 10GB. Now, although these options seem like very useful services, it may be a ploy to suck people into storing their personal files on the server, in which there is a price to pay undoubtedly. And an ever “bigger” price to pay so to speak, for the paid services.

 

“What does Cloud Based mean?”

“Cloud based”, via the webopedia.com definition, is “a term that refers to applications, services or resources made available to users on demand via the Internet from a cloud computing provider’s servers. “  On of the main reasons why numerous companies worldwide have adopted this service is due to the convenience of being able to access a software platform or host anywhere in the world using an internet connection. I think the reason why this technology is so crucial, is because of the security that comes with cloud based services to help prevent any kind of malicious, hacking activities to protect their data.

 

The Argument FOR Cloud Based Services:

In fact, one good argument for the use of cloud based services is the ever increasing reports of hacking through social engineering.  In one of my earlier videos here on my channel titled, BLACKHAT HACKER SECRETS- THE DARK SIDE OF TECHNOLOGY (PART 1)

…I went in depth on how hackers have learned the ability to hack and breach data with relative ease using a form of “social engineering”. Meaning, trespassing top secret areas and gaining access to computers and devices within a company by ‘faking’ their identity and using the power of manipulation through their words. They have been able to do this without even needing to hack into the network using brute force attacks from a laptop, but simply, by walking into the premises to gain any information they seek. With that being said, these hackers could simply plug in a storage device from all forms of countless mediums such as the following:

 

-USB flash drives

-Memory cards

-Internal/fixed hard drives

-External/portable hard drives

-Network attached storage

-Magnetic tape

-Copy/fax machine memory

-Mobile devices (phones, tablets, audio players, video game systems)

-CD/DVD/Blu-ray discs

-Cloud storage (via a direct installed, remote connection)

Any of these can be plugged into or attached to a computer or piece of office equipment to extract data in the flash of a second. Once achieved, the hacker calmly leaves the building as if nothing even happened. Unfortunately, even employees hired onto companies have done this. But going back to what I was saying earlier, if a company adopts the usage of cloud based services and stores all of their data on a cloud based network, it will make it 10x harder for the hacker to breach because instead of being able to access the data straight from the internal network, they would then need to bypass an EXTERNAL network, or SERIES of networks to then get into the cloud itself which would take a significant amount of time due to the extra layer of security, and especially if they’re already pressed for time to do their dirty work.

Another good argument for the use of Cloud Based services is the lack of longevity and the limited lifespan of physical storage devices like I had mentioned earlier. To put this into a better perspective, here’s a mind-blowing concept I wanted to mention to help make light of this:

Let’s say you have a small empty box, and you own a CD-ROM and a USB-Drive in which both have data already stored on them. Now, you take this same CD-ROM and USB-Drive and place them both inside of this box, and leave it sitting for 100 years from today’s date.  What is the guarantee that anyone who finds this box and retrieves the CD-ROM and USB-Drive inside of it will have access to the data stored on them? I mean, of course, we still have access to the data stored on various physical devices from decades ago, but could we possibly conceive the rate at which technology will improve, so much so to the point where the technology we use 100+ years from now will not even be able to read such old and archaic devices that we have, TODAY? You could even make the argument that the CD-ROM and USB DRIVES may lose that data over time through increasing heat temperatures or humidity levels in the room or decreasing freezing low temperatures. In an article by clir.org, it states that,

“Among the manufacturers that have done testing, there is consensus that, under recommended storage conditions, CD-R, DVD-R, and DVD+R discs should have a life expectancy of 100 to 200 years or more; CD-RW, DVD-RW, DVD+RW, and DVD-RAM discs should have a life expectancy of 25 years or more.”

HOWEVER, it also goes on to say that,

“If left in a very humid environment, moisture—and oxygen—will eventually reach the aluminum, causing it to lose its data. reflectivity.” This is why cloud based services would be deemed a necessary solution to this problem due to the fact that the data is being stored in an online, digital format as opposed to a physical format that can defrag over time.”

 

The Argument AGAINST Cloud Based Services:

As we all know, everything in this world comes with a set of pros and cons. I’ve already made note of the strongest arguments FOR Cloud Based Services, now, what is it about Cloud Based Services that could be completely detrimental to us as a society? In the cyber world, it’s no secret that privacy is almost nonexistent. For example, If you were to go so far back as to when you first, first used the internet, whatever age you were, you would find out that the very first file you uploaded online is still somewhere deep in the online database. I don’t care what type of file it was, how big or how large, and if you so called “permanently” deleted that file off the net ages ago. Every single piece of information that is uploaded or stored online will exist indefinitely, forever. And there is absolutely nothing that can be done about it. Another great example of this is a website that I’m a big fan of called,”archieve.org” also known as “WayBack Machine” which advertises on its homepage, “Explore more than 299 billion web pages saved over time”. What this website is, is the biggest online database of websites that, after an embargo period, saves ALL web pages and all of its cache, data and archives and stores it so that any user can be able to visit those same websites and have access to its contents in whatever earlier date in time, even if the website was to no longer exist in today’s date for whatever reason. You can also enter the URL of a website to request a “snapshot” of that website for use at a later date in time in case it was to get taken down for any reason. For example, one could simply search up Youtube.com and go so far back to 2005 when Youtube first began. And can extract the cache data through an Alexa crawl from any given web page. Millions worldwide have also used this website to find any file they could ever possibly want. From any PDF to movies, music, top secret files, you name it. This website has even been proven to be more effective than any Torrent search if done correctly using proper search/filter techniques.

 

How does this affect our privacy rights as people?

 

“The Danger of Cloud Based Services is imminent…”

 

If you REALLY want to know the purpose behind Cloud based services and how it can be a threat to our privacy, allow me to explain. The “Cloud” is simply a surveillance and intelligence gathering apparatus of the population. Users of the cloud are not very smart at all, as it can be an invasion and breach of privacy. Yes feel free to use the cloud, but just remember your service provider, whatever company that may be, is ultimately reading and permanently archiving said data. By using any Cloud Based services, you are voluntarily forfeiting your rights of said information. In addition, service providers can also sell your info for profits and legally, you can’t do a damn thing about it. So my advice is to not participate in any online storage services, or any (patent pending) intellectual property ideals on said systems. In actuality, this is called “data mining” and this is a big, black-market business. There’s a ton of money being made from it. If you were to store anything on the likes of “Google Drive” or “Dropbox” make sure it’s something of very little importance, like dog and cat photos. Now don’t get me wrong, there are already online services out there with pre-existing encryption-like “Spider-oak” for storing stuff of importance, but even then I personally wouldn’t trust that either. The way it works is before uploading it’s encrypted on your end and then moved up. Spider-oak also encrypts and they don’t have access to your key: “Zero Knowledge” and if they did, they would just see another blob of data. There also exist “Semaphor”, which is “ENCRYPTED GROUP CHAT & FILE SHARING FOR YOUR TEAM, FRIENDS, OR FAMILY.

 

I’m just simply pointing these out as options in case you absolutely, positively still needed some form of cloud based service due to your personal circumstances.

 

“So much fun isn’t it!”

 

Now, speaking of “Encrypted group chat and file sharing” don’t you find it interesting how after so long, mobile apps like “snap chat” and later “WhatsApp” made it to where messages and files being sent between two users are inevitably vanished after 60 seconds upon reading? Do you really believe that those files are truly “vanished” after the time limit? I’ve said it once and I’ll say it again, once it’s uploaded on the net across any platform, it exists…FOREVER.

THE SECRET OF CLOUD BASED SERVICES EXPOSED (The Kicker):

 SO in all HONESTLY, to close this off, if you TRULY believe any currently available online commercial encryption is immune from folks like the NSA you’re fooling yourself. Unless you have something like ‘three part’ encryption technologies like (rotating key [SecurID key fob for example], or biometric (fingerprint) scanner, and properly rotated, 25+ character secure passwords) anything they can touch they can crack. Use this as a guide to help protect the data and privacy for you and your loved ones. And spread the word…

Thank you for your time,

Rayneoflyte888

PeoplesBrain Blog 2017

MINDBLOWN Episode #3: The 52 Standard Card Deck Factorial….CRAZY!!!

MINDBLOWN Episode #3: The 52 Standard Card Deck Factorial….CRAZY!!!

Hello everyone, welcome to Episode 3 of the “MINDBLOWN” series!

In this episode, you wlll discover a mind-blowing fact about the “52 Factorial” behind a standard 52 deck of cards. If you shuffle a deck of standard playing cards, then the order in which they are now in has never happened before, ever, with any deck of playing cards, that has ever existed, in the history of playing cards. 

 

The number of possible combination in which a standard deck of playing cards can be in, no Jokers, no bridge rules just four suits of thirteen cards Ace through King is known as 52 shriek or just written as 52! It is worked out by multiplying each number of possible combinations remaining after one has been shown so its 52*51*50*49…etc all the way down to 1. That is a very large number, there is a 1 in 80658175170943878571660636856403766975289505440883277824000000000000 chance that you will produce a repeat sequence.

To place this in a little bit of perspective imagine you have 1,000,000 (1 Million) planets, on each planet there are 1,000,000 people, each person has 1,000,000 computers, each computer is running a program shuffling 1,000,000 decks of cards 1,000,000 times each second. If I set these individuals to this task on the day the Universe was created some 13.7 billion years ago only now in the PRESENT DAY would there start to be repeat combinations…

I don’t know about anyone else but this makes my brain hurt just to think about…

Oh and I found this explanation while researching the numbers 52 Factorial just in case your having trouble with my explanation of 52! enjoy.

Edit* This answer is based purely on statistics and not actual facts we don’t (and never will) know the outcome of every card shuffle ever, but odds are we have not covered even 0.000001% of the total possible combinations yet, which means if you shuffle a deck of cards and lay them out there is a 99.999999% chance you have laid out an absolute world first.

 

-PeoplesBrain

Google Earth Online 2017- STRANGE FINDINGS! (120!) *Video Series*

Google Earth Online 2017- STRANGE FINDINGS! (120!) *Video Series*

Google Earth Online 2017- STRANGE FINDINGS! (120!) *Video Series*

Hello ladies and gentlemen of Youtube. Welcome to my new video series TITLED “Google Earth Online- Strange Findings (120!) 2017.
Now I’m sure many people have heard of Google Earth Online, and for those of you who haven’t, I’ll give you a brief rundown of what it is.  Google Earth is basically a program created by Google that allows the user to view the planet using satellite technology.  You can also view outer space which surprisingly, a lot of people don’t know about because- I guess they automatically assume that it’s only planet based due to the name of the program.

 

Google Earth Live
Google Earth is an Excellent Tool that Allows you To See the Planet at your leisure

 

Now the cool thing about Google Earth is that you can run the program within your browser in its own tab at any time, or you can download the program and run it from your desktop. I myself have been using Google Earth since early 2007 and there would be times when I would stay up around the clock searching up different landmarks, historical sites, hidden places and the whole 9. I’d also spend a lot of time viewing different constellations and planets as well. Now because this technology is free and so readily available to anyone at no cost, with almost no difficulty, this gives everyone the ability to pretty much view the planet as they please.  And because of this, many users have discovered some pretty strange and interesting things on the planet, I myself included.

 

In this series, take a journey with me as I explore the most up to date, strangest findings on Google Earth known to users as of this year (2017). Some are absolutely mind blowing, breath taking, and others are quite creepy and bone-chilling as well.  Through research, I have gathered a total of 120 of the best strangest findings on Google Earth that I’ll be sharing with you throughout this video series, with audio commentary. I’ll be going through the list starting from #1, all the way to #120 and typing in each set of coordinates, to show you a live, unedited and unaltered view of each location. As proof, in the video description below, I’ll provide everyone with that same exact file that you can download so you can have access to all these coordinates and the info about each location, at your leisure, for personal use.  I do want to also add that some of these locations have “mysteriously” been either blurred out or completely covered by Google themselves, in an attempt to hide whatever was once visible. In this case, I’ll provide an image on screen of what was visible BEFORE it was hidden. This is definitely going to be a fun, intriguing and interesting video series and I cannot wait to share these locations with you all. Hope you all enjoy this series of “Google Earth Online– Strange Findings.”
-Rayne

BlackHat Hacker Secrets- The DARK SIDE of Technology (Part 2)

BlackHat Hacker Secrets- The DARK SIDE of Technology (Part 2)

BlackHat Hacker Secrets – The DARK SIDE of Technology (Part 2)

So far in part one, we have already learned that in this brave and scary world of technology. But it get’s EVEN MORE SHOCKING!!!

Remote access hacking is DANGEROUS FOLKS…From VEHICLES to WIRELESS HEALTH DEVICES AND EVEN PLANES!!

All of this information is absolutely USELESS to unless we TRAIN OURSELVES to PROTECT OUR PRIVACY AND INFORMATION. We have to become “INVISIBLE“,- So I purchased this book (below) and this is what gave me an inside knowledge of how the secret world of technology works!

And there you have it everyone! Part 2 is up!

Welcome to part 2 of the “Dark Side of Technology” part of the “Grey Pill” series.

BlackHat Hacker Secrets

Click below for a physical copy: 

black hat hacker secrets

 

 

 

 

 

 

 

 

 

 

 

 

And as promised, here are all the links to the research and information in regards to the vehicle hacks, as shared in the video below:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

How to hack a car (Phreaked Out) – https://www.youtube.com/watch?v=3jstaBeXgAs

Chrysler Hack Recall (1.4 MILLION vehicles): http://money.cnn.com/2015/07/24/technology/chrysler-hack-recall/

Hacker Remotely crasheS jeep from 10 miles away: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/11754089/Hacker-remotely-crashes-Jeep-from-10-miles-away.html

Hacker steals more than 30 jeeps and Dodges in houston!! https://jalopnik.com/hackers-stole-more-than-30-jeeps-and-dodges-in-houston-1784839376

 

Always kindly,

 

-RayneofLyte888

PeoplesBrain Blog

 

 

 

 

BlackHat Hacker Secrets- The DARK SIDE of Technology (Part 1)

BlackHat Hacker Secrets- The DARK SIDE of Technology (Part 1)

BlackHat Hacker Secrets- The DARK SIDE of Technology (Part 1)

Technology” How many of us use it? Or even more importantly, how often do we use it?

Technology has become such a booming industry over the past couple of decades that it has completely consumed mankind- which has led to both good causes and bad.  Technology to me, is a double edged sword. It can be extremely beneficial- it can make life easier, it can save lives- technology can be a gateway to a universe of information. However, It’s obvious to note that technology can cause a lot of harm if put in the wrong hands. …so why not learn the BlackHat Hacker Secrets to help protect yourself from such activity?

In this video I am going to show you some very MIND BLOWING facts about the dark side of technology that many of you probably didn’t even think was possible.  What makes this even more interesting is that some of these are done with very little effort.  I put together this video to educate you on how easy it is for someone to snoop on your or steal your information. I’ll be talking about things such as….person dressed up as a janitor walking into an IT building in hopes of acquiring top secret information through social engineering. And I’ll also make you think twice the next time you use any piece of technology, be it a cellphone or computer, or the next time you look up at a surveillance camera. Just know that there are people out there on the other side of these various devices that have access to YOUR world.

 

All of this information is absolutely USELESS unless we TRAIN OURSELVES to PROTECT OUR PRIVACY AND INFORMATION. We have to become “INVISIBLE“. I purchased this book (below) and this is what gave me an inside knowledge of how BlackHat Hacker Secrets and how the secret world of technology works!

I also uploaded a new video to add to the ‘Grey Pill’ series playlist on my Youtube Channel titled “The Dark Side of Technology (Part 1)”. 

Click below for a physical copy: 

Blackhat Hacker Secrets

 

 

 

 

 

 

 

 

 

 

 

 

INFORMATION ON HOW TO PREVENT SUCH MALICIOUS ACTIVITY: (LINKS BELOW)

Choosing a strong wifi password: https://security.stackexchange.com/questions/111938/how-to-choose-a-good-and-easy-to-use-wifi-password

Malware Bytes (MALWARE REMOVAL SOFTWARE- MUST HAVE): https://www.malwarebytes.com/

“How to Tap Your Network and See Everything That Happens On It” (LIFE-HACKER ARTICLE HOW-TO): https://lifehacker.com/how-to-tap-your-network-and-see-everything-that-happens-1649292940

PERMANENTLY delete files and folders off of your computer: http://www.makeuseof.com/tag/5-tools-permanently-delete-sensitive-data-hard-drive-windows/

DISCLAIMER: “Please DO NOT try any of these methods at home. You can and WILL face disciplinary action which may lead to punishment through the LAW. The methods shared in this video are for informational purposes ONLY  to help people become more aware of the many flaws within technology that we THOUGHT was secure. Again, please do not try this at home. I do not condone in ANY malicious, black-hat activity and neither should you. “

-Rayneoflyte888

‘PeoplesBrain’ Blog

 

 

Skip to toolbar