1 2

Learn machine dangerous spyware CreepyDOL people to collect data from anywhere and put into it and converted to the world of three-dimensional


Technological progress is a mainstay of the spy, and thus all the technology has huge potential will be subservient to spy and this proved it the story of the cat and mousebetween the National Security Agency and the traitor Edward Snowden andrevelations of possibilities and Technology enormous available to the agency to spy on the world , Yes, it is spying on you and and the whole. On the whole this is not our topic in this article, I loved in this thread that Oqrbak more of a spy is very seriousmajority of you did not hear him never, not for the National Security Agency or other it is the invention of the young man spent him a few bucks can then monitor the entire neighborhood or anywhere he wants to extract all the information and data. 




A security researcher Brendan O'Connor in addition to being the founder of a consulting

firm called Malice Afterthought, who is also a student at the Faculty of Lawat the University of Wisconsin in Madison 0.27 years old when he invented a systemhe called a dangerous spy CreepyDOL and means "Creepy Distributed Object
Locator", depending on the construction some small plastic boxes and somesensors including the Wi-Fi adapters and then a group of computers Raspberry Pismall size that are running Linux does not cost each and every one of them more than$ 60. 

The delivery of these funds to the controller's command and control where he developed a system for visualizing data is to monitor the sensors pick it from thewireless traffic emitted from each wireless device in the nearby areas including smart phones and then embodying the three-dimensional map. 

And has started producing 10 copies of these cans and thought to use the same bigVfuji ability to capture a large amount of information and data including browsing,calls, passwords, messages, and others. Then, the system collects all this data andthen send him encrypted through service tor. 
After that starts Imaging System data in the creation of personal files "profiles" for people who has watched and then puts it on the three-dimensional map showing their faces and their identities and then the real places and their movements over time. 

With this system it is a dangerous spy can not escape it, Imagine that you can spy oneveryone just put boxes sensing small everywhere, cafes, streets, buildings task,without a care about and can also help in the identification and collection of data the crowd in a demonstration for example. 

This was the information that I was able to get it and come back last year but could not get information like buying a patent this invention by a specific organization orwhether it is produced by a specific destination, but I read in one of the news sitesthat have been developed and used with small drones to spy on some areas. 

Do not forget to express your opinion on this article for the encouragement to write articles pertaining to some other high-end devices and sometimes secret.
Comments
0 Comments
  • Facebook begins to implement its policy base on users
    Facebook begins to implement its policy base on users

    Three months before the publication of the Secretary raghib episode talking about Facebook vile policy…

  • The only requirement for the mark to the ghriba for hiring a new person on Facebook (video)
    The only requirement for the mark to the ghriba for hiring a new person on Facebook (video)

    With the expansion of the activities of the companies of the digital world has become the pressing need…

  • Breaking the habit, tonight !!!
    Breaking the habit, tonight !!!

    Are you haunted by a bad habit? Do you have a habit that has been haunting you since years?Do you…

  • Psychology of Love
    Psychology of Love

    Why do we fall in love?  You are going in the usual way,…

  • Snape chat admits: We are not the owners of the original idea of ​​the application
    Snape chat admits: We are not the owners of the original idea of ​​the application

    There is no doubt that the application of Instant Messaging (Snape chat) achieved during the…

  • Three steps smart to choose the name of a blog nowhere else
    Three steps smart to choose the name of a blog nowhere else

    Blog is the name of the success factors, so it is important to choose the appropriate…

  • The detection of the first Smartphone labeled "VAIO"
    The detection of the first Smartphone labeled "VAIO"

    "VAIO " is a name associated with SONY known as giant, for many years, this company is known for its…

  • Learn techniques and methods used by hackers to penetrate Wi-Fi
    Learn techniques and methods used by hackers to penetrate Wi-Fi

    We will look at this subject to the months and the most important ways to break through Wi-Fi. The aim…

  • 12 sites most unusual to spend your time on the Internet!
    12 sites most unusual to spend your time on the Internet!

    As we all know the Internet has become one of the most important sources of learning,…

  • Disclosure of the date of the first
    Disclosure of the date of the first "Microsoft Lumia" phones provide

    Shortly after the announcement by Microsoft for finally abandoning its mark in Nokia smart phones…

  • Three people are accused of stealing billion e-mail! How made $ 2 million
    Three people are accused of stealing billion e-mail! How made $ 2 million

    United States on Friday accused three people accused of stealing billion email!! The Justice Department…

  • Reduced number of fans of Facebook pages starting from next week
    Reduced number of fans of Facebook pages starting from next week

    The news undoubtedly will obtain consent many users especially those pages on the social networking site…

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now