How to respond to someone else that has your wireless device, LOUIS STYLE! | |
REEEEEEEEEEEEEEEEEEEEEEEE
User ID: 80249381 United States 04/18/2021 02:59 PM Report Abusive Post Report Copyright Violation | |
Louis in Richmond
(OP) That is my arm now; broken for 7 months User ID: 77416134 United States 04/18/2021 03:01 PM Report Abusive Post Report Copyright Violation | 'Missed you my friend. Enjoy your upgrade! Until your military service has required you neutralize enemy combatants and invaders in the defense of your country, don't presume to tell us that have defended you that you don't support every shot we fired to eliminate that enemy. |
Anonymous Coward User ID: 74397141 United States 04/18/2021 03:03 PM Report Abusive Post Report Copyright Violation | |
REEEEEEEEEEEEEEEEEEEEEEEE
User ID: 80249381 United States 04/18/2021 03:04 PM Report Abusive Post Report Copyright Violation | |
Louis in Richmond
(OP) That is my arm now; broken for 7 months User ID: 77416134 United States 04/18/2021 03:09 PM Report Abusive Post Report Copyright Violation | Thank you, that is a great compliment. I maintain rage, vengeance, and destruction beneath justice under very strict control at all times. That Kraken is only released when the actions of another demand it. Until your military service has required you neutralize enemy combatants and invaders in the defense of your country, don't presume to tell us that have defended you that you don't support every shot we fired to eliminate that enemy. |
Anonymous Coward User ID: 77376498 United States 04/18/2021 03:30 PM Report Abusive Post Report Copyright Violation | |
cosmicgypsy
User ID: 80037766 United States 04/18/2021 03:34 PM Report Abusive Post Report Copyright Violation | You never change things by fighting the existing reality. To change something build a new model that makes the existing model obsolete. -Buckminster Fuller ...I adapt to the unknown, under wandering stars I've grown, by myself, but not alone... [link to www.youtube.com (secure)] |
We Who Watch.
User ID: 80259675 United States 04/18/2021 03:40 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77994864 United States 04/18/2021 03:41 PM Report Abusive Post Report Copyright Violation | |
Louis in Richmond
(OP) That is my arm now; broken for 7 months User ID: 77416134 United States 04/18/2021 03:50 PM Report Abusive Post Report Copyright Violation | You said you turned it in perhaps it was legitimately sold a sscrap? Quoting: Anonymous Coward 77376498 It would have been a legitimate sale had I not been assured it would be destroyed. They chose to not destroy either device so I used the built-in hardware back door that is present in every device to permanently render them useless. You do not need to register your personal devices so that you may control them if they are no longer in your possession. I am certain almost no one does. Engineering administrative backdoors exist in every device. This is not bragging. In my own and the careers of others we have learned the backdoors for numerous OS's, SCADA systems [I could pump 10,000 gallons of raw sewage onto Atlantic Avenue in Virginia Beach from this laptop if I chose], or shut down the power to various Naval Shipyard docks in the US. What matters is that people who will not do that are placed into those positions that could most abuse it. Even every brand of copier has an backdoor admin account and password. My cat is the background on the touch screen control panel of one gov copier nearest my office in the building I have not worked in for over a year behind COVID. Does your office have a building security system that reads your ID badge? It also has a backdoor username and password with full admin access; I have them committed to memory. The security scan badges can be imitated with a cell phone utilizing NFC, where do you think they came from? Perhaps the best lesson here is do not ever lose custody of any device or cell phone you have used and NEVER trade one in for a 'discount' on a new device as a factory reset removes NONE of your information from the device. Backdoors are tied to the CPU serial numbers so they may be found and accessed and controlled remotely regardless of their name or the network they are on. I'm simply sharing. Others may use the information as they choose. Last Edited by Louis in Richmond on 04/18/2021 03:51 PM Until your military service has required you neutralize enemy combatants and invaders in the defense of your country, don't presume to tell us that have defended you that you don't support every shot we fired to eliminate that enemy. |
Fossy
User ID: 79516540 United States 04/18/2021 03:54 PM Report Abusive Post Report Copyright Violation | I would have never noticed any of that!! https://imgur.com/a/f5dNepb Making sammiches great again! USA! USA! USA! |
Fossy
User ID: 79516540 United States 04/18/2021 03:55 PM Report Abusive Post Report Copyright Violation | |
Louis in Richmond
(OP) That is my arm now; broken for 7 months User ID: 77416134 United States 04/18/2021 03:59 PM Report Abusive Post Report Copyright Violation | Were I actually working in my building, I have a few coworkers that would teach me how to correctly write that in Hindi, even in the written Devanagari script. Sadly I am on my own at this time and my knowledge seems limited to Latin derived and Old English / Celtic languages. Until your military service has required you neutralize enemy combatants and invaders in the defense of your country, don't presume to tell us that have defended you that you don't support every shot we fired to eliminate that enemy. |
Anonymous Coward User ID: 80247245 United States 04/18/2021 03:59 PM Report Abusive Post Report Copyright Violation | |
Beyond
User ID: 80242629 Germany 04/18/2021 04:26 PM Report Abusive Post Report Copyright Violation | You said you turned it in perhaps it was legitimately sold a sscrap? Quoting: Anonymous Coward 77376498 It would have been a legitimate sale had I not been assured it would be destroyed. They chose to not destroy either device so I used the built-in hardware back door that is present in every device to permanently render them useless. You do not need to register your personal devices so that you may control them if they are no longer in your possession. I am certain almost no one does. Engineering administrative backdoors exist in every device. This is not bragging. In my own and the careers of others we have learned the backdoors for numerous OS's, SCADA systems [I could pump 10,000 gallons of raw sewage onto Atlantic Avenue in Virginia Beach from this laptop if I chose], or shut down the power to various Naval Shipyard docks in the US. What matters is that people who will not do that are placed into those positions that could most abuse it. Even every brand of copier has an backdoor admin account and password. My cat is the background on the touch screen control panel of one gov copier nearest my office in the building I have not worked in for over a year behind COVID. Does your office have a building security system that reads your ID badge? It also has a backdoor username and password with full admin access; I have them committed to memory. The security scan badges can be imitated with a cell phone utilizing NFC, where do you think they came from? Perhaps the best lesson here is do not ever lose custody of any device or cell phone you have used and NEVER trade one in for a 'discount' on a new device as a factory reset removes NONE of your information from the device. Backdoors are tied to the CPU serial numbers so they may be found and accessed and controlled remotely regardless of their name or the network they are on. I'm simply sharing. Others may use the information as they choose. How do you wipe a device such as a phone or tablet since factory reset in the standard menu doesn't actually do so? Not anutter cig nature. |
Beyond
User ID: 80242629 Germany 04/18/2021 04:29 PM Report Abusive Post Report Copyright Violation | I'm linking my thread to this thread. How do spies and hackers invade your privacy, your phone and other devices? Thread: How do spies and hackers invade your privacy, your phone and other devices? Not anutter cig nature. |
BleachedPink1111
User ID: 24625847 United States 04/18/2021 04:31 PM Report Abusive Post Report Copyright Violation | Nice. I also have a story on how I tracked down my phone lol Thread: My phone was stolen in Chicago - got it back within 3 hours! Hah! |
Thoth's Thought Form
User ID: 72091538 United States 04/18/2021 04:32 PM Report Abusive Post Report Copyright Violation | Good Show! Louis, That was hilarious, glad to see you online my friend! “Man's status in the natural world is determined, therefore, by the quality of his thinking.” “To live in the world without becoming aware of the meaning of the world is like wandering around in a great library without touching the books.” Manly P. Hall |
beeches
User ID: 78973486 United States 04/18/2021 04:38 PM Report Abusive Post Report Copyright Violation | |
Phillip J. Fry
User ID: 80253366 United States 04/18/2021 04:39 PM Report Abusive Post Report Copyright Violation | You said you turned it in perhaps it was legitimately sold a sscrap? Quoting: Anonymous Coward 77376498 It would have been a legitimate sale had I not been assured it would be destroyed. They chose to not destroy either device so I used the built-in hardware back door that is present in every device to permanently render them useless. You do not need to register your personal devices so that you may control them if they are no longer in your possession. I am certain almost no one does. Engineering administrative backdoors exist in every device. This is not bragging. In my own and the careers of others we have learned the backdoors for numerous OS's, SCADA systems [I could pump 10,000 gallons of raw sewage onto Atlantic Avenue in Virginia Beach from this laptop if I chose], or shut down the power to various Naval Shipyard docks in the US. What matters is that people who will not do that are placed into those positions that could most abuse it. Even every brand of copier has an backdoor admin account and password. My cat is the background on the touch screen control panel of one gov copier nearest my office in the building I have not worked in for over a year behind COVID. Does your office have a building security system that reads your ID badge? It also has a backdoor username and password with full admin access; I have them committed to memory. The security scan badges can be imitated with a cell phone utilizing NFC, where do you think they came from? Perhaps the best lesson here is do not ever lose custody of any device or cell phone you have used and NEVER trade one in for a 'discount' on a new device as a factory reset removes NONE of your information from the device. Backdoors are tied to the CPU serial numbers so they may be found and accessed and controlled remotely regardless of their name or the network they are on. I'm simply sharing. Others may use the information as they choose. How do you wipe a device such as a phone or tablet since factory reset in the standard menu doesn't actually do so? I generally use the permanent decryption hardware device “Mossberg 590A1” 3-4 cycles of this device is sufficient. . "Don't do anything that affects anything. Unless it turns out you were supposed to do it, in which case for the love of God. Don't not do it!" |
. User ID: 80243398 United States 04/18/2021 04:45 PM Report Abusive Post Report Copyright Violation | Maybe they bought it used and didn't know the seller was selling a stolen device. Maybe it was bought used from a big store like Best Buy. Quoting: Anonymous Coward 80247245 . You Missed HIS POINT. He WAS Told by the MFG the Devices WOULD BE DESTROYED. This is Why I Buy Dell Computers with the Keep your Hard Drive Option. Although I have Kept ALL of my Devices I have purchased and Just put them in a Drawer. If/When I should decide to get rid of any of them, I Will take a Hammer to them to Assure they ARE Not Usable In any way Once they Leave MY Possession It's the Only Way to Assure they Will Not Ever be Used by Anyone. OP Is there a possibility that the Companies involved Have Liability in the Non-Destruction and Resale of your Devices, A big Enough Law Suite might Prevent those Co.'s from this practice in the Future, Also if these Devices were Used for Government Business then The full Weight of the Government can be brought down on them. I have over 15yrs Civil Service and It's not a Good Idea for a MFG or Provider to Refurbish and Resell Equipment a Complete Data Deletion and Re-image. OP did/are you going to let your Department Know of these Corrupt actions by the Involved Company's. The Government takes Data Security Very Seriously.(Unless U R Hillary) You DID THE Right Thing. Good on You. . |
Phillip J. Fry
User ID: 80253366 United States 04/18/2021 04:47 PM Report Abusive Post Report Copyright Violation | |
beeches
User ID: 78973486 United States 04/18/2021 04:49 PM Report Abusive Post Report Copyright Violation | |
sssssteve
User ID: 80258894 United States 04/18/2021 04:55 PM Report Abusive Post Report Copyright Violation | We all have broken or lost a phone or tablet, sometimes even a laptop!!! I'm a nice guy, an old man. I have never hidden I have a gov job--I work for you the tax payers, and I believe in justice delivered without warning where appropriate. Quoting: Louis in Richmond When my Samsung tablet was returned for replacement / destruction a few years ago AT&T gave me a new one. That should have been it, right? It was now gone forever. Then six months later I received an email from Samsung stating someone was trying to access my account via that tablet from the Ukraine. The email contained links that gave me a choice to disable alerts or permanently disable that tablet so it could not be reloaded with any OS or ever used. So I nuked it of course. Lets fast forward to today. I'm trying to use my laptop as the controller and 'secondary display over wireless' of any type for my old phone as I await the new one arriving. I noticed my network connected Surface 3 LTE appeared twice in my devices. The first one whose screen was shattered was returned to M$ for a replacement, which they sent to me. Again I was assured the broken device would be destroyed. While it no longer has access to my accounts it could still accept commands from me. I see this logged into my MS Gov Admin account... https://imgur.com/fxeOC30 There is only one possible response to such an afront by another daring to access a device I maintained control over. HAPPY MONDAY MORNING WHEN YOU TRY TO USE IT TOMORROW YOU CHEAP EXCUSE FOR GHANDI... https://imgur.com/iJFX9zu And yes, I have locked the device to prevent their using it again. Good luck using it to provide 'Offshore' customer support in their job tomorrow. |
Anonymous Coward User ID: 24190996 United States 04/18/2021 04:57 PM Report Abusive Post Report Copyright Violation | |
Where Eagles Dare
Metal-American User ID: 73836248 United States 04/18/2021 05:03 PM Report Abusive Post Report Copyright Violation | Isaiah 40:31 - But they that wait upon the Lord shall renew their strength; they shall mount up with wings as eagles; they shall run, and not be weary; and they shall walk, and not faint. “They’ve got us surrounded again, the poor bastards.” - U.S. Army Paratrooper at Bastogne |
Saint Lance the Odd from BC
User ID: 77547432 Canada 04/18/2021 05:08 PM Report Abusive Post Report Copyright Violation | LOL...that made my day! Thanks Louis.... If you are not busy weaving your own magick, you are trapped in anothers spell. “It’s time you realized that you have something in you more powerful and miraculous than the things that affect you and make you dance like a puppet.” – Marcus Aurelius |
Anonymous Coward User ID: 78523258 Germany 04/18/2021 05:11 PM Report Abusive Post Report Copyright Violation | looks like it was resold without reinstalling windows or factory resetting. You were supposed to factory reset before turning it over, everybody knows that except government workers apparently. This is why government workers get the reputation they do. |
Beyond
User ID: 80242629 Germany 04/18/2021 05:14 PM Report Abusive Post Report Copyright Violation | You said you turned it in perhaps it was legitimately sold a sscrap? Quoting: Anonymous Coward 77376498 It would have been a legitimate sale had I not been assured it would be destroyed. They chose to not destroy either device so I used the built-in hardware back door that is present in every device to permanently render them useless. You do not need to register your personal devices so that you may control them if they are no longer in your possession. I am certain almost no one does. Engineering administrative backdoors exist in every device. This is not bragging. In my own and the careers of others we have learned the backdoors for numerous OS's, SCADA systems [I could pump 10,000 gallons of raw sewage onto Atlantic Avenue in Virginia Beach from this laptop if I chose], or shut down the power to various Naval Shipyard docks in the US. What matters is that people who will not do that are placed into those positions that could most abuse it. Even every brand of copier has an backdoor admin account and password. My cat is the background on the touch screen control panel of one gov copier nearest my office in the building I have not worked in for over a year behind COVID. Does your office have a building security system that reads your ID badge? It also has a backdoor username and password with full admin access; I have them committed to memory. The security scan badges can be imitated with a cell phone utilizing NFC, where do you think they came from? Perhaps the best lesson here is do not ever lose custody of any device or cell phone you have used and NEVER trade one in for a 'discount' on a new device as a factory reset removes NONE of your information from the device. Backdoors are tied to the CPU serial numbers so they may be found and accessed and controlled remotely regardless of their name or the network they are on. I'm simply sharing. Others may use the information as they choose. How do you wipe a device such as a phone or tablet since factory reset in the standard menu doesn't actually do so? I generally use the permanent decryption hardware device “Mossberg 590A1” 3-4 cycles of this device is sufficient. Completely destroy the device? Well, I would rather disassemble it and explore the components. Maybe tinker. Not anutter cig nature. |
beeches
User ID: 78973486 United States 04/18/2021 05:16 PM Report Abusive Post Report Copyright Violation | looks like it was resold without reinstalling windows or factory resetting. Quoting: Anonymous Coward 78523258 You were supposed to factory reset before turning it over, everybody knows that except government workers apparently. This is why government workers get the reputation they do. you would know, Limelove Liberalism is totalitarianism with a human face – Thomas Sowell |