1 2

Learn machine dangerous spyware CreepyDOL people to collect data from anywhere and put into it and converted to the world of three-dimensional


Technological progress is a mainstay of the spy, and thus all the technology has huge potential will be subservient to spy and this proved it the story of the cat and mousebetween the National Security Agency and the traitor Edward Snowden andrevelations of possibilities and Technology enormous available to the agency to spy on the world , Yes, it is spying on you and and the whole. On the whole this is not our topic in this article, I loved in this thread that Oqrbak more of a spy is very seriousmajority of you did not hear him never, not for the National Security Agency or other it is the invention of the young man spent him a few bucks can then monitor the entire neighborhood or anywhere he wants to extract all the information and data. 




A security researcher Brendan O'Connor in addition to being the founder of a consulting

firm called Malice Afterthought, who is also a student at the Faculty of Lawat the University of Wisconsin in Madison 0.27 years old when he invented a systemhe called a dangerous spy CreepyDOL and means "Creepy Distributed Object
Locator", depending on the construction some small plastic boxes and somesensors including the Wi-Fi adapters and then a group of computers Raspberry Pismall size that are running Linux does not cost each and every one of them more than$ 60. 

The delivery of these funds to the controller's command and control where he developed a system for visualizing data is to monitor the sensors pick it from thewireless traffic emitted from each wireless device in the nearby areas including smart phones and then embodying the three-dimensional map. 

And has started producing 10 copies of these cans and thought to use the same bigVfuji ability to capture a large amount of information and data including browsing,calls, passwords, messages, and others. Then, the system collects all this data andthen send him encrypted through service tor. 
After that starts Imaging System data in the creation of personal files "profiles" for people who has watched and then puts it on the three-dimensional map showing their faces and their identities and then the real places and their movements over time. 

With this system it is a dangerous spy can not escape it, Imagine that you can spy oneveryone just put boxes sensing small everywhere, cafes, streets, buildings task,without a care about and can also help in the identification and collection of data the crowd in a demonstration for example. 

This was the information that I was able to get it and come back last year but could not get information like buying a patent this invention by a specific organization orwhether it is produced by a specific destination, but I read in one of the news sitesthat have been developed and used with small drones to spy on some areas. 

Do not forget to express your opinion on this article for the encouragement to write articles pertaining to some other high-end devices and sometimes secret.
Comments
0 Comments

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now