Non-emergencey contact to personal device security research institutes collaborative thread - General Topics

This posts here to increase the effect of sending my phones and other devices targetedly hacked files and file contents to the correct places to help forward the progress of patching the in routes and exploits used to conmlrimise my devices. im not mass generically hacked like all content marketing oriented loa pricepoint device users are. im also targetedly hacked, being a poster of evidence of organized crime. how i know this is surveying the various search results of numerous parts of code grep'd through for everything from 'usually' to 'when the' and the like and finding undocumented code); analytics traces reports screenshots etc i need to send to the correct agencies labs and engineers to effetiely take an opportunity one rarely has, not a whole lot more luck needed just to expose what ive found to get help swnding it all to the right researchers.., here to also overstep and des mceibe a social engineerig aspect to this criminal co-perogative that seems to be boiled down to a method or science always changing specific tech understanding apartide line that one would say would be inperceptible if not being lóoked for. These effects are already known, ask any journalist or researcher whos benefitted from the use of tor. do u ever get o ly search results fro. 2013 2014? ueah thats not right its 2022 and those are whats been whiddled down as passable as results to you that will derail your presumptive expectation to find usefull relevant info. like free black market oligarchay totalitarianiasm censorship of good info by masses of evil black hearted tyranical rulers. What is or was being done was not unlike untargeted hacking, wasnt unlike stalking, wasnt unlike gaslighting, was engineered by heinous psychologists under a larger tech side of a harasment as a service outfit utilizing specific individually itemized psychological attacks managed and administered from a heirerarchal chain of command involong hassers unbeknownst (effectively anyone), and salaried operative sabetuer assailant rights violators harassers, being orchestrated by a few headpieces workong to effect intimidation, harm, debilitation, eventual ruin of targets. im a lucky one to have escaped their heretounforsceen murderous grasp... technical implementation and phychological advice, and the client criminal operations, all likley make io the types involved.. and some .MOs? . A score is kept of each targets perceptable work toward outing the criminal client(most dont continually announce display post what they know under threat to their familys, i fly in the face of these intimidations and threats as ofton as possible, or as necessary. they especoally anger me and i ofton
make sure to give a speech about it if needed bwcause id say thaTs the proverbial time and place for that
the stalker or stalkers will note it all and interfere suggesting or positing jackassedly outloud (the two harasser grouping lends to this) which is being pumped as audio to the tatget , only filtered down to narrow effective frequency bands of audible sound. a effort to disturb distract frustrate is debilitating especially at length. i have audio recorsdngs of this subliminal harassment,¹¹¹i will post and have posted online. Undocmentble and likely undocumented (ie unprovable) aspects of reality, of which there are many, are derived contrieved etc by the stalkers one after the next and projected subliminally to the target as heassments, threats, psychosis induction, all to kéep reports from going to police, knowlede of anythining relevant or related from being learned basically preventing anything the target might do in the course of a day,, randomly or specifically or especially if ostensibly they were heading to the police station printing store etc. a target has to endure : Internet is filtered
friends are threatened and harssed the programs on anyones phone in the vicinity re beiing montoped to know if recording or video apps start running. Im not the only person who knows bout what i videod and posted, many involved are plausibly victims, many benefiting, profiting, buying àre monstors heartless soulless murderous enemys to mankind. How i got targeted? i was attacked by two guards at a high rise, recorded it incidentally, posted it online, in the bckground is evidence of the activities of aug fifteenth sixteenth twentyeighteen, some largescale illegal sex crime party for high rolling invertebrate clients, and not just in the background, but my interactions with the guards upclose are all evidence and the 15 mins of video as i exited the vicinity all contain evidence. They usually keep anything like video taken on a cell phone contained and from ever reaching the net, but i was recording to disk and feeling extra like it was a miracle i survived the attack gonna take the disk out for safe keeping minded also, gonna post immediately minded after evading immedite stalker harassers traveled on foot strategizing for 12 hours, went forward in visiting an art school campus, visiting the library and uploading over a simple Vpn to youtube (browser built in one if i remember correctly). My civil rights activism prior to this gave me some ability to evade gang stalker harassments, and all in all i had been being targeted digitally and had some upload strategy to use because of the same, the civil rights and land use activism i was doing videoing and posting. So the stops were pulled and full scale cmpaigns were deployed to psychologically or otherwise send me into ruin in a way that would be indetectible in any way as being foul play or at least un reportably or documentably, because tens if not hindreds had to have noticed the oddities of patterns and diversions from the norms of everything everywhere variousley i frequented. stalkers effirts were all made with intention to have effect but also to effectively obscure what was being done, why, what crime there was to reported if any, and any routes or reasons provable that i might have to seek relief from foundations for the crimes against me, so as to be able to persist and continually attack playing any and all angles of various of psychological and physiological attacks through incetivatized or otherwise achieved malfunction or alternate to normal operation of things ... this is where conputers come in, my devices were and still are if im being realistic used for and integral in facilitating this, but not without a lot of code paper trail i was expected not ever to be able to ascertain knowledge of or obtain. Largescale distributed obscured attack on individual targets isnt always viable, but ofton is it would seem... In the curse of weathering this attack i achieved slowely progress in my life , trancendance above and beyond the thercheous pitfalls and all that laid out figuritvely to ensnare me, and have atained for myself many if not a few more of my life goals as well. I have explained and exposed the immediate harassments and stalking to those being subjected to its immediate and side effects, and a page long list of other focused intentional sometimes subtle corrective or stimulating vitalization of some sort to the social and interpersonal climate within which i live life ive been, seeing as how it was being accurely poluted. it wasnt always easy or obvious but certainly something of the needed necessary and natural reaction type of measure i believe either way i know i have succeeded in the various ways i went about keeping my life from falling apart. Somewhere in these outcomes, milemarkers, graduations and self afirmations i categorically became, non susceptible to a certain category of sheer wall affront to a person who is targeted. socially, technically, socially correctovely, verbally, orationally, (speech giving?), attritionally effectively strategically, in one too many ways they cant effect their zero click exploit on one Kyle Varela, as it were, and now im here, right pretty much where id be, only here in my hand is alot of the info needed to disenfranchise those who this computer based evasion of my privacy and much worse was undertaken by, to help potentionally a lot of people, to help the world operate one incriment less innificiently... But i have to delve into realms unknown to turn in the files and doing so will continue to make it self aparent in its non accomplishability approached alone by just me. ...Leading to my posts reason.
Stated: source help, advice, and leads into and about the most suspicious of the many entrys and code snippets within the uploaded files all taken from systems i was using, and i believe is likley to contain evidence provingthY the disfunctionalityt of my devices software and hardware was intentional identifiable and ultimately hopefully reportable and patchable.
This post will be finished with attachments after getting initial post up. Just a moment

Related

[Q] A consumers prayer about good App design

Designers, programmers, managers,
Lets say You have an App in which after you have completed a demographic search you are to pick at least 3 Cities that begin with the letters "Mel" from anywhere in the world. The search report display output contains 1,000 cities in no particular order.
Question: How long would it take flipping from page to page on your phone or tablet to locate those 3 Cities that match your criteria?
If you could take the time loss multiplied by the number of similar apps multiplied by minutes wasted multiplied by total number of people using apps like these then you're going to be talking about major league waste of time and effort.
Question: Allow those same cities to be sorted in Ascending order. How long will it take now? You get the picture.
Such an extreme example is to illustrate a somewhat bothersome trend in recent application design. That after a team or individual has gone through all of the time and trouble of creating their masterpiece of an application that they abandon the final phase which involves presentation of their output/display data from in an unruly, unsorted mess thereby doing their clients, customers, fans and themselves a major disservice.
The productivity hit from wasted time can be major.
Designers, programmers, managers please remember that computers are meant to bring order and harmony into our lives not disarray and hardship. Adding suitable sorting controls and filters can help do that in a major way and lends itself under the category of best practices.
The people who use your apps on a day to day basis will be ever grateful for your thoughtfulness.
Your comment appreciated.
T.
Interesting observation/comment.......... a bit convoluted ........
In simpler terms, make an app, make sure you understand how the end user needs it to be laid out vs how you the designer thinks it should be laid out. Remember the end user Always needs to rule this argument if success is the goal
oka1 said:
Interesting observation/comment.......... a bit convoluted ........
In simpler terms, make an app, make sure you understand how the end user needs it to be laid out vs how you the designer thinks it should be laid out. Remember the end user Always needs to rule this argument if success is the goal
Click to expand...
Click to collapse
That's just good app design on any platform... know your user; understand how the user interacts and what the user needs.
Sorry for all of the convolution. I just seized on the pet peeve of the moment and went with it. Sometimes I forget that the very act of software development can be a black art all in itself and the wizards who perform all of the designs are but mere mortals

[Q] Scenario: you might have bought a compromised smart phone

It is highly propable that you've already read about such, not so mystical, threats to your personal information security like those related to mobile applications asking for too much rights and those where certificates for websites have got compromised. I'm curious to get to know what you know about possibility of the flaws in the actual logistics and manufacturing related to the smart phone you bought yesterday (for example).
Let me put my question this way: If you ought to choose a standpoint, where you tell others why you think that smart phones can not contain any physical components that are actually intended to leak information (usage patterns, meta information of viewed photos, installed applications, etc.) to the certain spesific party, what would you say?
Try also thinking something "smaller" than a company as a whole (*). Think about small working groups and teams containing designers, coders etc. from different continents and cultures, people involved in the transportation of the devices, level of abilities of manufacturers of the pirated goods, personality of sailsmen in the stores, personality of repairmen, social networks, etc.
If you really need to use word "carrieriq" in your answers, may I kindly ask you to say something that you think haven't been said well enough. Also, try to think something more spectacular than a single virus that got accidently installed at the factory.
If you feel that I seem to be the one, who is lacking knowledge in some area, please tell me. I'm always open for re-organizing my views of the world, if enough effort is used in the form of a good explanation.
--
(*) Actually you might not be thinking a company "as a whole". You might just add the name of a company to some sentence without actually thinking what you just wrote. People tend to think that they are thinking.

[APP][4.0+] Force of Me - Your guide to desired future you

Your guide to desired future you.
This application helps you achieve life goals and maintain general happiness by actively encouraging you to think positive and questioning your beliefs through emotional evaluation.
The Theory
This application helps you achieve life goals and maintain general happiness by encouraging you to think positive and questioning your beliefs through emotional evaluation.
The theory behind this is based on the fact that we emotionally react to our reality constantly in everyday situations. But how we feel about it, is defined by held beliefs shaped through the years of our lifelong education.
The problem
Now, the problem with our belief system is that any belief we hold might conflict with another belief in any situation.
For instance: when someone wishes for more money (popular subject these days, hence the analogy) and subconsciously believes that money can destroy a person, those are two conflicting beliefs concerning the same matter that in combination cannot result in joyful emotion.
Consequently in this situation most likely money won’t happen and person failing tend to blame it on something or someone else without realizing that the problem is his own to start with. As well as the power to do something about it.
Another problem arises when people tend to focus on absence of wanted instead of what they want. Focusing on your problems not only will bring more problems
but will also shape your beliefs into more conflicts.
The solution
This application provides a solution by actively reminding you that you alone are responsible for your own reality and motivates you into believing in yourself.
It challenges you to question your own beliefs, identify conflicting ones, stay and think positive and in general move up the emotional scale.
But at the end of a day it’s still up to you to make it happen. As explained above – you alone are responsible for your own being,
and I hope this app will help you realize that this might be easier than you thought.
Click to expand...
Click to collapse
Major update:
- Get awarded for feeling good, see your progress.
- New functionalities on context evaluation. See the influences your actions have on certain activities.
- Better tagging
- Option to delete tags
- Choose notification sound
- Community pages
- Updated external libraries
- Tons of minor improvements and fixes

Samsung Galaxy 7 Under attack and can't get free. Need Help ASAP!

For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine owners options. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no place in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing
0

My Galaxy 7 ihas been Hijacked and I can not Stop It- I need help!

For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic,, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing

Categories

Resources