What's New Here?

 

Dancer puts audience in complete shock. Kenchi Ebina blows away judges with GRAVITY DEFYING dance moves you've ever seen in your entire life.



Vision Without Glasses

Neo with the Matrix Has Nothing on This Kid!

 

Dancer puts audience in complete shock. Kenchi Ebina blows away judges with GRAVITY DEFYING dance moves you've ever seen in your entire life.



Vision Without Glasses

We documented earlier today that - if you are near your smart phone – the NSA or private parties could remotely activate your microphone and camera and spy on you.

This post shows that the same is true for our computer.

Initially, the NSA built backdoors into the world’s most popular software program – Microsoft Windows – by 1999.

And a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (confirmed). Even that is just “the tip of the iceberg”, according to a congress member briefed on the NSA’s spying program.

The New York Times reported in 2011 that German police were using spyware to turn on the webcam and microphone on peoples’ computers:

A group that calls itself the Chaos Computer Club prompted a public outcry here recently when it discovered that German state investigators were using spying softwarecapable of turning a computer’s webcam and microphone into a sophisticated surveillance device.

The club …announced last Saturday it had analyzed the hard drives of people who had been investigated and discovered that they were infected with a Trojan horse program that gave the police the ability to log keystrokes, capture screenshots and activate cameras and microphones.

Reuters documented last year that the U.S. and Israeli governments can remotely turn on a computer’s microphone:

Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010 [i.e. the U.S. and Israel], according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections.

Kaspersky researchers said they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.

Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.

***

The virus contains about 20 times as much code as Stuxnet, which caused centrifuges to fail at the Iranian enrichment facility it attacked. It has about 100 times as much code as a typical virus designed to steal financial information, said Kaspersky Lab senior researcher Roel Schouwenberg.

Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.

Kaspersky Lab said Flame and Stuxnet appear to infect machines by exploiting the same flaw in the Windows operating system and that both viruses employ a similar way of spreading.

***

“The scary thing for me is: if this is what they were capable of five years ago, I can only think what they are developing now,” Mohan Koo, managing director of British-based Dtex Systems cyber security company.

PC Magazine tech columnist John Dvorak writes:

From what we know the NSA has back door access into Apple, Microsoft [background], and Google. What kind of access we don’t know, but let us assume it is similar to what they did about 7 years ago to AT&T. They had a secret room at Fulsom St. in San Francisco and the AT&T engineers had no control and no access to a room full of NSA equipment that had direct access to everything AT&T could do.

Microsoft is the source of the operating system for Windows and Windows cell phones. Apple controls the OS for Macs, iPhones, and iPads. Google controls the Chrome OS, Chrome Browser, and Android cell phones. The companies regularly push operating system upgrades and security updates to users on a regular basis.

Imagine however that the NSA has access to these updates at the source and has the ability to alter these update in order to install some sort of spyware on your phone, tablet, or computer. The software could turn on your camera or microphone remotely, read all your private data, or erase everything and brick your phone or computer.

Moreover – as documented by Microsoft, Ars Technica, cnet, the Register, Sydney Morning Herald, and many other sources – private parties can turn on your computer’s microphone and camera as well.

Cracked noted in 2010:

All sorts of programs are available to let you remotely commandeer a webcam, and many of them are free. Simple versions will just take photos or videos when they detect movement, but more complex software will send you an e-mail when the computer you’ve installed the program on is in use, so you can immediately login and control the webcam without the hassle of having to stare at an empty room until the person you’re stalking shows up.

The bottom line is that – as with your phone, OnStar type system or other car microphone, Xbox, and other digital recording devices – you shouldn’t say or do anything near your computer that you don’t want shared with the world.

Postscript: You could obviously try to cover your webcam and microphone when you don’t want to use them.

But if you really want privacy, take a lesson from spy movies: Go swimming with the person you want to speak with … since electronics can’t operate in water.


Vision Without Glasses

Is the Government Spying On You Through Your Webcam?

We documented earlier today that - if you are near your smart phone – the NSA or private parties could remotely activate your microphone and camera and spy on you.

This post shows that the same is true for our computer.

Initially, the NSA built backdoors into the world’s most popular software program – Microsoft Windows – by 1999.

And a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (confirmed). Even that is just “the tip of the iceberg”, according to a congress member briefed on the NSA’s spying program.

The New York Times reported in 2011 that German police were using spyware to turn on the webcam and microphone on peoples’ computers:

A group that calls itself the Chaos Computer Club prompted a public outcry here recently when it discovered that German state investigators were using spying softwarecapable of turning a computer’s webcam and microphone into a sophisticated surveillance device.

The club …announced last Saturday it had analyzed the hard drives of people who had been investigated and discovered that they were infected with a Trojan horse program that gave the police the ability to log keystrokes, capture screenshots and activate cameras and microphones.

Reuters documented last year that the U.S. and Israeli governments can remotely turn on a computer’s microphone:

Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010 [i.e. the U.S. and Israel], according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections.

Kaspersky researchers said they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.

Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.

***

The virus contains about 20 times as much code as Stuxnet, which caused centrifuges to fail at the Iranian enrichment facility it attacked. It has about 100 times as much code as a typical virus designed to steal financial information, said Kaspersky Lab senior researcher Roel Schouwenberg.

Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.

Kaspersky Lab said Flame and Stuxnet appear to infect machines by exploiting the same flaw in the Windows operating system and that both viruses employ a similar way of spreading.

***

“The scary thing for me is: if this is what they were capable of five years ago, I can only think what they are developing now,” Mohan Koo, managing director of British-based Dtex Systems cyber security company.

PC Magazine tech columnist John Dvorak writes:

From what we know the NSA has back door access into Apple, Microsoft [background], and Google. What kind of access we don’t know, but let us assume it is similar to what they did about 7 years ago to AT&T. They had a secret room at Fulsom St. in San Francisco and the AT&T engineers had no control and no access to a room full of NSA equipment that had direct access to everything AT&T could do.

Microsoft is the source of the operating system for Windows and Windows cell phones. Apple controls the OS for Macs, iPhones, and iPads. Google controls the Chrome OS, Chrome Browser, and Android cell phones. The companies regularly push operating system upgrades and security updates to users on a regular basis.

Imagine however that the NSA has access to these updates at the source and has the ability to alter these update in order to install some sort of spyware on your phone, tablet, or computer. The software could turn on your camera or microphone remotely, read all your private data, or erase everything and brick your phone or computer.

Moreover – as documented by Microsoft, Ars Technica, cnet, the Register, Sydney Morning Herald, and many other sources – private parties can turn on your computer’s microphone and camera as well.

Cracked noted in 2010:

All sorts of programs are available to let you remotely commandeer a webcam, and many of them are free. Simple versions will just take photos or videos when they detect movement, but more complex software will send you an e-mail when the computer you’ve installed the program on is in use, so you can immediately login and control the webcam without the hassle of having to stare at an empty room until the person you’re stalking shows up.

The bottom line is that – as with your phone, OnStar type system or other car microphone, Xbox, and other digital recording devices – you shouldn’t say or do anything near your computer that you don’t want shared with the world.

Postscript: You could obviously try to cover your webcam and microphone when you don’t want to use them.

But if you really want privacy, take a lesson from spy movies: Go swimming with the person you want to speak with … since electronics can’t operate in water.


Vision Without Glasses

It sounds like something out of George Orwell’s book 1984, yet scientists have touted it as a major advancement in the field of medicine. Have you heard of the ‘electronic tattoo’ fully equipped with the ability to track patients’ vital signs and report the findings to researchers? The technology is known as an epidermal electronic system (EES), and was developed by an international team of researchers from the United States, China and Singapore.

When it comes to microchips, implants, or electronic tattoos—it all sounds a little too futuristic, like these “advances” may be paving the way for government tracking of citizens, or worse. But some industries are promoting these high-tech ideas as major advancements in their field. The medical field is just one place these ideas are gaining a foothold.

According to the International Business Times, hospitals and doctors’ offices may one day soon outfit their patients with temporary electronic tattoos. These little skin-patches are said to carry a wealth of information in a tiny space and can reportedly help reduce medical errors while improving care.

“Our goal was to develop an electronic technology that could integrate with the skin in a way that is mechanically and physiologically invisible to the user,” says John Rogers with the University of Illinois at Urbana-Champaign. So, invisible electronic tattoos are good?

“It’s a technology that blurs the distinction between electronics and biology,” says Rogers in characterizing the patches that allow researchers to track vital signs and more.

The devices are small and “nearly weightless”. They are thinner than a human hair and attach to the body using water rather than an adhesive. In that regard, they are very much like temporary tattoos. But unlike the bubblegum tattoos, these have electronic components.

Researchers believe they will one day be used in hospitals worldwide. And given the fact that even our animals are implanted with a microchip, the researchers may be right. It isn’t as difficult it seems to convince the people what’s ‘right’ for them.

Rather than hooking someone up to a wide range of wires and adhesives, the small patches will give medical professionals all of the vital information they need. In addition, the researchers are working on variations that are voice activated, allowing wearers to operate a voice-activated video game with more than 90-percent accuracy.

This aspect could lead you to wonder, if they are able to be voice operated by the wearer, couldn’t they be voice-operated by another controller?

Vision Without Glasses

“Electronic Tattoo” to Track Your Medical Information; a prelude to ‘Mark of the Beast’ ?

It sounds like something out of George Orwell’s book 1984, yet scientists have touted it as a major advancement in the field of medicine. Have you heard of the ‘electronic tattoo’ fully equipped with the ability to track patients’ vital signs and report the findings to researchers? The technology is known as an epidermal electronic system (EES), and was developed by an international team of researchers from the United States, China and Singapore.

When it comes to microchips, implants, or electronic tattoos—it all sounds a little too futuristic, like these “advances” may be paving the way for government tracking of citizens, or worse. But some industries are promoting these high-tech ideas as major advancements in their field. The medical field is just one place these ideas are gaining a foothold.

According to the International Business Times, hospitals and doctors’ offices may one day soon outfit their patients with temporary electronic tattoos. These little skin-patches are said to carry a wealth of information in a tiny space and can reportedly help reduce medical errors while improving care.

“Our goal was to develop an electronic technology that could integrate with the skin in a way that is mechanically and physiologically invisible to the user,” says John Rogers with the University of Illinois at Urbana-Champaign. So, invisible electronic tattoos are good?

“It’s a technology that blurs the distinction between electronics and biology,” says Rogers in characterizing the patches that allow researchers to track vital signs and more.

The devices are small and “nearly weightless”. They are thinner than a human hair and attach to the body using water rather than an adhesive. In that regard, they are very much like temporary tattoos. But unlike the bubblegum tattoos, these have electronic components.

Researchers believe they will one day be used in hospitals worldwide. And given the fact that even our animals are implanted with a microchip, the researchers may be right. It isn’t as difficult it seems to convince the people what’s ‘right’ for them.

Rather than hooking someone up to a wide range of wires and adhesives, the small patches will give medical professionals all of the vital information they need. In addition, the researchers are working on variations that are voice activated, allowing wearers to operate a voice-activated video game with more than 90-percent accuracy.

This aspect could lead you to wonder, if they are able to be voice operated by the wearer, couldn’t they be voice-operated by another controller?

Vision Without Glasses




Doctor simply shrugs off mans healing as his own misdiagnosis when all biopsy tests and results conclusively showed presence of severe lung cancer.
Doctor would not acknowledge natural cure










Visit Carl's web site at: www.HealthyHolisticAging.com 




Vision Without Glasses

Lung Cancer,- Man Given 6 Months To Live Cures His Own Cancer (Talks to AC)




Doctor simply shrugs off mans healing as his own misdiagnosis when all biopsy tests and results conclusively showed presence of severe lung cancer.
Doctor would not acknowledge natural cure










Visit Carl's web site at: www.HealthyHolisticAging.com 




Vision Without Glasses

Rich Lee has freed himself from the frustrations of misplacing or having to untangle his headphones ever again. How? He's what's known as a grinder: someone who experiments with surgical implants or body-enhancements, and he's come up with a doozie.

Implanted in his tragus—the stiff protrusion just in front of your ear canal—is a small magnet that works like an earbud built into his head.

To keep the implant almost completely imperceptible, audio signals are transmitted via a coil Lee wears around his neck—based on this Instructable—that creates a magnetic field causing the implant to vibrate and produce sound. Audio quality is certainly nowhere near close to what you'd get from headphones or an actual pair of earbuds, but Lee's approach has a lot of distinct advantages.

In addition to listening to music whenever and wherever he wants, Lee also has plans to hook the wireless system up to various sensors like ultrasonic rangefinders, thermometers, and even geiger counters, giving him the ability to hear distances like a bat, or sense how hot something is without touching it.

The implanted magnet even seems like the perfect tool for Cyrano de Bergerac types who need a little coaching when wooing someone. Or gamblers needing a little extra info from incognito scouts surrounding a poker table. Whether that makes this human hacking experience worth it, well, that's up to you.



Vision Without Glasses

Invisible Headphone Implant Means You Never Have To Worry About Earbuds Again

Rich Lee has freed himself from the frustrations of misplacing or having to untangle his headphones ever again. How? He's what's known as a grinder: someone who experiments with surgical implants or body-enhancements, and he's come up with a doozie.

Implanted in his tragus—the stiff protrusion just in front of your ear canal—is a small magnet that works like an earbud built into his head.

To keep the implant almost completely imperceptible, audio signals are transmitted via a coil Lee wears around his neck—based on this Instructable—that creates a magnetic field causing the implant to vibrate and produce sound. Audio quality is certainly nowhere near close to what you'd get from headphones or an actual pair of earbuds, but Lee's approach has a lot of distinct advantages.

In addition to listening to music whenever and wherever he wants, Lee also has plans to hook the wireless system up to various sensors like ultrasonic rangefinders, thermometers, and even geiger counters, giving him the ability to hear distances like a bat, or sense how hot something is without touching it.

The implanted magnet even seems like the perfect tool for Cyrano de Bergerac types who need a little coaching when wooing someone. Or gamblers needing a little extra info from incognito scouts surrounding a poker table. Whether that makes this human hacking experience worth it, well, that's up to you.



Vision Without Glasses

Archaeologists are stumped after finding a 100-year-old Swiss watch in an ancient tomb that was sealed more than 400 years ago.


They believed they were the first to visit the Ming dynasty grave in Shangsi, southern China, since its occupant's funeral.


But inside they uncovered a miniature watch in the shape of a ring marked 'Swiss' that is thought to be just a century old.


Mystery: Archeologists have uncovered a 100-year-old watch in a tomb believed to have been undisturbed for 400 years

The mysterious timepiece was encrusted in mud and rock and had stopped at 10:06 am.
Watches were not around at the time of the Ming Dynasty and Switzerland did not even exist as a country, an expert pointed out.
The archaeologists were filming a documentary with two journalists when they made the puzzling discovery.
'When we tried to remove the soil wrapped around the coffin, suddenly a piece of rock dropped off and hit the ground with metallic sound,' said Jiang Yanyu, former curator of the Guangxi Museum.
'We picked up the object, and found it was a ring.
'After removing the covering soil and examining it further, we were shocked to see it was a watch,' he added.

The Ming Dynasty - or the Empire of the Great Ming - was the was ruling dynasty in China from 1368 to 1644.

Vision Without Glasses








Mystery as Century-Old Swiss Watch Discovered in Ancient Tomb Sealed for 400 Years

Archaeologists are stumped after finding a 100-year-old Swiss watch in an ancient tomb that was sealed more than 400 years ago.


They believed they were the first to visit the Ming dynasty grave in Shangsi, southern China, since its occupant's funeral.


But inside they uncovered a miniature watch in the shape of a ring marked 'Swiss' that is thought to be just a century old.


Mystery: Archeologists have uncovered a 100-year-old watch in a tomb believed to have been undisturbed for 400 years

The mysterious timepiece was encrusted in mud and rock and had stopped at 10:06 am.
Watches were not around at the time of the Ming Dynasty and Switzerland did not even exist as a country, an expert pointed out.
The archaeologists were filming a documentary with two journalists when they made the puzzling discovery.
'When we tried to remove the soil wrapped around the coffin, suddenly a piece of rock dropped off and hit the ground with metallic sound,' said Jiang Yanyu, former curator of the Guangxi Museum.
'We picked up the object, and found it was a ring.
'After removing the covering soil and examining it further, we were shocked to see it was a watch,' he added.

The Ming Dynasty - or the Empire of the Great Ming - was the was ruling dynasty in China from 1368 to 1644.

Vision Without Glasses








Get this gadget at Twitter for blogger
© 2013 . WP Theme-junkie converted by BloggerTheme9
Blogger templates. Proudly Powered by Blogger.
back to top