Hackers

Home | Radio Show | Wall of Fame | Events | Files | Annual Letter | Terms | Contact

--------------------------------------------------------------------------------------------------------------------------------------------------

2014 Letter

2015 Letter

For every second that passes the Earth generates an ever inflating amount of entropy which is seething and writhing from the world of the microscopic out into the cosmos. The creatures of this planet seem to have reached a point of anthropomorphism that they are actually affecting the planet herself by becoming a variation of virus; a parasite draining every resource and even killing each other in the process of winning a race towards self-destruction. When shall we work together for the betterment of the lives of all and for the self; when shall we become the light which exposes the wrong doings of propaganda slandering warmongers who do nothing more than enslave and herd people into their misconduct; the time is now to take a stand towards these evils and proclaim your freedom.

Our nations are being bombarded with more threats than ever before and the extreme connectivity of the people of the world is dissolving strong barriers which once stood segregating us from one another. A repercussion of this is the willing sacrifice of privacy; we are more exposed than any other time in history as it only takes a few clicks or taps to download the complete historical record of almost any human being that is connected to the internet. Minute by minute anyone can monitor a targets movements via web postings which may or may not include GPS coordinates. Since the average person uses the same name and password for multiple accounts across the web, this makes it quite trivial to locate, stalk, and eventually take complete control over a victims life, both digitally and physically. What's fascinating about this endeavor is the fact that it isn't your average hacker or technically inclined sorcerer doing most of the targeting and tracking of users, but rather it is large corporations, national governments, and shadow agencies peppered throughout the globe. The United States of America has been shown to have the most sizable chip on their shoulder being showcased in leaked documents detailing the collection and analysis of more than just simple metadata from its networks as well as the shadowing of its people.

Social turmoil such as the execution and detainment of unarmed civilians, namely African Americans, puts the absurd expanding federal and local corruption on display; not only are they killing their own people, but they are trying to justify it in order to minimize persecution. Of course this isn't the first time a country has eliminated some of its citizens, however, the problem will continue to fester like a cancer until the issue has been completely rectified by its people. With more attacks and threats both domestic and foreign, it is only a matter of time before the United States constitution is effectively altered and perhaps even martial law being established; documents can be found on official military servers detailing a regime closely resembling the Nazi party, outlining and paving the path for internment camps and other barbarisms, which should be revolted against by everyone. Obviously the U.S is not the only country being influenced by terrorism and political corruption, but it definitely is one of the most well known. The fight of corruption and extremism is not only a physical fight, but a digital one as well. Hackers and hacktivists around the globe have taken arms with terminals and root-kits in hand as they target websites associated with terror groups, DDoSing, defacing, and completely rooting servers to make sure that their wickedness is stopped in its tracks. Extremists have begun to wise up towards the eavesdropping of their communications and thus naturally gravitating towards encryption and secure communication tools such as PGP. In an attempt to counteract this move the governments of the world, namely the U.S, have recently started pushing for the right to backdoors in standard encryption tools and algorithms in order to “combat terrorism”. This wouldn't be worrisome if it weren't for the fact that if they were able to use a backdoor to spy, then everyone could use the backdoor to spy, it's mathematically proven. Even though criminals use secure methods of communication that doesn't give justification for eavesdropping on all secure communications; not only do extremists use encryption tools, but so do reporters, scientists, and medical personnel.

Even though secure communication techniques are coming under fire, it is still imperative in this day and age to encrypt all of your data. Using an RSA key pair of 4096 and above is crucial as 2048 and 1024 are virtually useless. Do not store your keys in the open either, hide them in plain sight using steganography and other techniques, most people will overlook your key if it is hidden within a mess of other random files and will eventually give up searching. It seems that protection of data is becoming more and more a necessity than times past given the constant raiding and dumping of popular services within the past year such as iCloud, Ashley Madison, and Web.com. To be frank, we must stop uploading and trusting our files to cloud services for it is only a matter of time before they are hacked, exposing all of your data, and sometimes that data will be sold; there's no telling who might have your banking information or children's baby photos or that certain dirty secret.

Encryption and securing our communications doesn't seem to be enough however, as there are products that seem to want to invade the privacy of our own homes, namely items such as Samsung's smart TV's, which were definitely eye-catching at first until we learned that our conversations were being monitored. In an age of interconnectivity of everyday luxuries it is important to realise what is and isn't transmitting and receiving data within your house, and this may mean learning how to monitor your own network traffic. As more products are developed to be “smart” we must stay vigilant to which devices are even allowed to be smart; meaning that when you aren't using a certain function or feature then it is advisable to turn those functions or features off if you can, disable bluetooth, disable wifi, and only allow those devices to communicate when needed.

In the not so distant future nearly all devices will have a way of transmitting and receiving data including means of transportation such as cars or bikes as well as houses. And like all devices that are capable of smart technologies, they will most likely be connected to the internet, and this indicates being vulnerable to remote exploitation. This is quite unnerving as somebody could be relaxing in their home while at the same time an attacker has infiltrated the home's internal computer allowing remote control of lights, appliances, and viewing of cameras throughout the house; and if the cameras have a microphone attached to them then it is likely that conversations would be recorded as well.

With Moore's law still in effect, technology is becoming increasingly small and even more versatile than ever before and it is only a matter of time before mechanized contact lenses and aerosols become the norm. Nano machines which could be ingested or injected into the blood stream would also grant us the power to perform what was once considered miracles such as reconstructing muscle tissue or aiding with issues such as Mitral Valve Prolapse (Barlow syndrome) and other biological defects. The singularity is quickly approaching us as we rush towards nano computers as well as artificial intelligence and it is up to the people of the planet to choose what happens next.

No matter what occurs in the coming years we all need to remember not to lose ourselves in somebody else's or even our own lie for we must remember where we came from. We are human beings capable of intelligent design and forethought, not cattle to be prodded and herded; No one man controls the planet nor the cosmos that lives externally and which dwells within us all; No one man knows of all things and therefore you should always question your sources as well as yourself for the easiest person to fool in the world is yourself.

Stay vigilant. Stay curious.

- Madara

 

 

 

©1991 - 2016 Hackers