Wikieaks live stream keeps crashing, Multiple attempts, audio only, but Assange seems to be under attack, can't stay connected.
First minutes of new "Dark Matters" release showed that any device with USB can be infected and cannot be cleaned, even if hard drive and RAM is thrown away. Firmware itself is infected.
UTI Boot sector also infected, but that section of the presentation was when Assange's connection completely dropped - he has tried a dozen times to reconnect but is dropped again within seconds.
My personal understanding is that this means there is no secure way to use Bitcoin. Look at the sales spike of BTC in the last 20 minutes - I think many people agree!
I think the CIA just screwed us all - Russia or China could shut down our world and there is no fix that I can think of without touching every single system - even then if UTI is infected it can tell the system whatever it wants to hide itself!
This is Digital Armaggedon This is by a half ton of beans and rice and keep it in the basement HUUUUUUGE!
We will see if the security community agrees. The news is literally 20 minutes old!
https://btc-e.com/
i was gonna post the stream to but it kept fucking up what do you think is going on
UTI Being hacked is Digital Armaggedon - that is unfixable. UTI comes before anything else in the Boot process, so if you own that, you can report back to who ever is trying to fix the system that nothing is there.
SHA verified Boot CD's, hardware wallets - nothing is secure!
If I was a Individual hacker - I would wait for years until the day the bug is fixed in hardware - likely 2 - 3 years from now, and on the day the before the first safe system is released, I would clean out every BTC wallet whose encryption key I had obtained.
If I was a state actor - you could wipe every infected control system in the World - if there is even one infected system on the network they are all infected, and no government can shutdown, say, every computer in a nuclear plant, replace them all, and never put any of them on the Internet again.
These idiots at the CIA have paid a bunch of Genius hackers to develop them a tool that makes no network safe. You could shut down damns, nuclear plants, wipe entire data centers, send us back to the stone age - or at least the 1970's
omg thats scary waht do we do
I rewrote this CIA Wikileaks post to be more clear about what they have done - please do check it out when you can :
https://steemit.com/wikileaks/@jredded/the-cia-has-killed-the-banks-and-crypto-currency-wikileaks-dark-matter
I'm trying to understand how a stream that is being attacked is related to Bitcoin
The part of the stream that was being attacked said that UTI is hacked - this makes BTC hardware wallets and SHA verified bootable CD's, the only real ways to keep a high value digital asset like BTC secure, completely insecure.
As such, if the first time you try to use your BTC the encryption key is owned by a threat that is impossible to neutralize, the asset class of crypto currency no longer has potential to be cash equivalent. If it loses it's security, what is left?
If the US dollar could be printed in your basement, or stolen from any basement in the world, it's value would be highly limited. The Dollar must be physically stolen, but with UTI hacked, there is no secure system in the world, which is a huge, perhaps deadly blow to digital currency.
The only hope is to hold the crypto currency until it can be accessed from a secure system, which has not yet been developed. Since that system does not exists, and the beach that makes every system insecure is on Bit Torrent right now, I do not see how anybody can consider BTC a secure asset class, which, IMHO, makes it nearly worthless.
This is my opinion, we will see if the security and BTC communities agree, at this point nobody has had time to publish and the stream was so messed up, with only 3000 people watching, and no review available on Periscope, that I assume it will be a day or two before a full assessment can be made.
I'm saying that UTI being hacked and that hack being publically available is the end of computer security, no boot CD, no hardware wallet can overcome the UTI breach, and the breach is in the wild, which is a big deal for a digital asset.
The market will have to price how much value there is to an asset which cannot be spent until a new fundamental hardware system is developed (or repaired) which is time indefinite. That should all be part of the reporting - but who will report on this FUBAR CIA move but us?
Help me understand what UTI means, I know you think the hack is a dangerous, I just want to understand how it works. Thanks!
You know how when you boot the computer, before the Windows or Apple logo comes up you can press F10 or F2 to go into your BIOS? That area is what is hacked.
That area is in charge of loading your Operating System, generating the randomness for even the most advanced encryption, and all other modern security measures. This BIOS / ETI / Firmware infection attacks the root of modern digital security.
The actual firmware of the system is pwned, which is independent of the hard drive and the RAM. A reinstall of your operating system is no longer a solution, throwing away the hard drive and RAM does nothing - once infected the system is lost forever.
The BIOS is loaded before your antivirus or malware protection, before your operating system, before anything that can protect you. It can then take that very small malware infection and install a gigantic, infinitely complex virus on your hard drive and then tell your computer that the entire infected area of your hard drive does not exist, or is empty - so that no anti virus can ever find whatever complex infection you produce.
Do you want to scan a system for strings that look like bitcoin keys or SHA keys or whatever encryption, done. You could monitor the keyboard itself, or monitor the USB data stream, and the operating system (much less the AV) would never even know.
Do you want to wipe a hard drive clean, or change existing data in a database without generating a transaction, or turn off the cooling fans on a room full of servers, done. No more need to hide the code, no more anti virus signatures catching the infection, the AV thinks it is just empty space - the possibilities are endless, this is a new World.
Whatever infects this BIOS / firmware / EFI area first owns the system - and from what I could make of the highly fragmented stream, it appears this can be done on Mac products straight out of the box - meaning you don't have to visit an infected link - you can be proactively targeted and attacked.
Macs run on the same underlying architecture Intel Architecture as PC's so if they can do it on an out of the box Macbook, they can do it on anything. The idea is that they can infect the firmware of a system - and that hardware wallets and bootable CD's rely on security that would be loaded after the infected firmware has already hidden whatever virus the attacker can dream up.
It makes attackers life soooooo much easier, no more obfuscating code, no more worrying if your virus gets caught by an AV vendor and signature added to the AV community products - you could name you virus "Virus" and have it run a keylogger and save the keystrokes to disk and hide all of that obvious stuff from Antivirus using that BIOS infection to mark yourself off a little space anywhere in memory or on disk that is simply not available to the Operating System to interrogate - nothing can see what your virus is doing once you have owned the firmware that loads before any of the security stuff on the market today.
Anti Virus can't even scan memory well - we are a very long way from protecting the BIOS.
I have been saying UTI - it is called EFI on Macs. The outcome is the same, but I must have crossed a mental wire on infection names.