Nov 16

red-alert

WHAT I HAVE NEXT IS FAR MORE IMPORTANT:

MICROSOFT IS FORCING VEILED UPDATES ONTO COMPUTERS THAT ARE NOT WEB CONNECTED. MICROSOFT IS DOING THIS VIA UNAUTHORIZED WIFI AND CELL CONNECTIONS, EVEN WITH COMPUTERS THAT ARE COMPLETELY ISOLATED WITH PHYSICAL LOCKUP, AND THE OPERATING SYSTEMS REMAIN LOOKING NORMAL DESPITE BEING CHANGED.

Via ANY visible WIFI connection, even ones your computer is not authorized to access, a secret operating system is being rammed onto everyone’s computer RIGHT NOW and changing the operating system to something new. This is happening EVEN IF WINDOWS INSTALLER IS DISABLED AND UPDATES ARE DISABLED, AND THE COMPUTER ITSELF HAS NO INTERNET ACCESS OF ITS OWN. Even if you have never logged onto your neighbor’s wifi and never asked to, EVEN IF YOU NEVER LAUNCH A BROWSER, the operating systems are coming in, and installing themselves IN SECRET. Once the hijacking operating system is installed, I suspect the computers then upload their entire contents to a remote server that commands them to.

I HAVE PROOF, READ THE MAIN REPORT BELOW. THIS IS FAR MORE IMPORTANT THAN ANY “TERROR ATTACK” IN PARIS, WHICH IS PROBABLY JUST ANOTHER PHONY OR FALSE FLAG ANYWAY.

The only reason I can think of for this to be done is to get all secrets off of all computers that were kept private by never being hooked up to the internet at all. AND THIS WOULD BE DONE BEFORE A WAR, SO THEY WILL KNOW EVERYTHING ABOUT EVERYONE AND KNOW EXACTLY WHO TO “REMOVE” FROM SOCIETY.

Impossible you say? Well, how about Intel Corevpro technology being used to ram changes onto computers via the always on cell phone connection that ALL Corevpro proccessors have? How about anything Sandy Bridge? How about via wireless networks your AMD system does not even have the password to? DING DING DING AND I HAVE THIS TOTALLY AND IRREVOCABLY DOCUMENTED.

Microsoft is ramming what is probably Windows 10 onto ALL COMPUTERS via wifi connections and initiating the updates, even if you have no authorized WIFI connection for a computer that never hits the web. After your operating system has been changed, the GUI remains looking normal if you have updates disabled but in the background, the whole thing is changed. How do I know? Microsoft did this to my never on the web purchased in Latin America LATIN ONLY laptop, and installed a non-latin compatible character set. When this happened, the music directories that had latin songs with incompatible (in English) characters in the titles had the latin only characters show up as stars of david with a question mark in the center of them!

THIS IS NOT AN ERROR. THE ONLY WAY THIS COULD HAVE HAPPENED IS IF SOMEONE RAMMED CHANGES ONTO THAT COMPUTER, WHICH CANNOT EVEN ACCESS THE WEB AS IS. It has WIFI, yes, and several neighbors show up on WIFI, but ALL neighbors are password protected (as is default in Mexico) and I never once, EVER approved any of those networks to access this laptop, nor did they ever approve my laptop to access their networks. The computer has been demoted to a music player that has had the exact same songs on it for an entire year prior to this (after I discovered I had passwords that were typed into it stolen instantly, which led to web site problems and hacks) and since then have made no changes to it whatsoever, have plugged no flash drives into it whatsoever and this same computer is NEVER on the web AT ALL and has not been on the web AT ALL for an entire year.

I noticed on the Linux machine that people with Windows machines started sending that star of david character mixed in with the message window messages, (this started about a month ago when the Windows 10 controversy really got going) and I guessed that this new character is part of Windows 10, which Windows 10 substitutes out when it does not know a character, rather than output gobbledygook. But getting these characters in the mail window is easily explained – they came from somewhere else. This is NOT POSSIBLE however on a computer that has not seen the web AT ALL since Windows 10 was released, unless Microsoft back doored their way in via the neighbor’s WIFI which I have no permission to access. Additionally I have no WIFI set up at all in this house, it is 100 percent cell modem which should not be able to interface with WIFI at all.

The laptop this got onto just sits there like a brick, TOTALLY unused unless for some reason it is started up to play music, which even at that is unusual. It is not a daily thing. However, yesterday I turned it on and forgot to turn it off. It went into “sleep mode” for about five hours. I then started it up and shut it off. Today I started it and went into the music directories, and voila! that new star of david character was mixed into the titles of any song that had latin characters, in place of the latin characters. That computer NEVER HAD THAT CHARACTER BEFORE SHOW UP IN ANYTHING EVER. Additionally, the contents of the music folders were re-arranged, with large song playlists that had been given their own folders dis-assembled completely and dumped into one large folder. DID MICROSOFT TAKE THOSE FILES, MOVE THEM INTO ONE DRIVE WITHOUT MY PERMISSION, AND SCREW UP THEIR ARRANGEMENT? POSSIBLY!

RED ALERT: THERE IS NO WAY THIS COULD POSSIBLY HAVE HAPPENED TO THIS SYSTEM, WHICH NEVER GOES ONLINE, HAS NEVER DONE ANYTHING LIKE THIS BEFORE OR AFTER BEING PERMANENTLY TAKEN OFF THE WEB SO IT IS NOT MALWARE OR A VIRUS, THE ONLY WAY A NEW CHARACTER SET COULD HAVE BEEN LOADED AND FOLDERS SCREWED UP IS IF IT WAS DONE THROUGH A LOCAL WIFI I NEVER HAD ACCESS TO.

This happened when:

1. There is no internet for this computer.
2. Updates are disabled anyway.
3. Windows installer is disabled as well, so nothing can install, and it has been that way since I bought that computer 3 years ago.
4. The computer has not been used much for the past year, (used approximately once a week) which is enough to know it worked fine.
5. Absolutely nothing was installed by me or anyone else, nothing was re-configured, and no memory cards or flash drives had been plugged into it.
6. Absolutely NO ONE used that computer, there were no guests or children that had access to it.

When this happened:

1. The character set was changed to an English character set on a Latin computer, because no doubt Windows 10 discovered the computer was used entirely in English with Firefox and other applications installed in English despite being purchased in Latin America. When this was done, anything that was a specifically Latin character now has a star of david in it’s place when before it all displayed the way it should.

2. The music folders got messed up with songs not appearing where they should be in folders. Playlists were destroyed. All songs were still on the computer, but they were not in the correct places. This can’t happen unless someone or something does it, and WHAT COULD HAVE if the computer is just an offline brick that has worked perfect as an offline brick for a year?

3. The computer looked perfectly normal, as if it had Windows 7 installed on it, as usual. The computer ran the same as usual. It did not get clunky or messed up like it would if Malware took it over, or if it had a virus. But the character set is now different, THIS COMPUTER NEVER HAD AN OPERATING SYSTEM BASED ENGLISH CHARACTER SET ON IT EVER, HOW DID ONE GET ONTO IT?

Windows 7 starter never had the option to change languages or character sets out of box AT ALL, how did it suddenly get that ability out of nowhere?

YOU GUESS.

It sure looks to me like a Windows 10 infected machine will search its WIFI environment for any other totally unsuspecting Microsoft machine and install itself, even if there is no allowed connection in that environment. When it does this, it keeps it all a secret but NOT WITH ME, MICROSOFT, IF YOU ARE GOING TO DO THIS YOU CAN’T HAVE A SYSTEM THAT SCREWS UP AND MAKES IT OBVIOUS!

Time to brick that laptop, in concrete.

FLASHBACK: I SAID HOW THIS COULD HAPPEN BEFORE, AND PAUL JOSEPH WATSON QUOTED ME AND MANY OTHERS IN A COMBINED REPORT THAT SAYS PRECISELY HOW MICROSOFT COULD AND EVIDENTLY IS RAM RODDING WINDOW’S 10 UP THE WORLD’S BEHIND:

Paul Joseph Watson, September 26, 2013

Intel Core vPro processors contain a secret 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.

Although the technology has actually been around for a while, the attendant privacy concerns are only just being aired. The secret 3G chip that Intel added to its processors in 2011 caused little consternation until the NSA spying issue exploded earlier this year as a result of Edward Snowden’s revelations.

In a promotional video for the technology, Intel brags that the chips actually offer enhanced security because they don’t require computers to be powered on and allow problems to be fixed remotely. The promo also highlights the ability for an administrator to shut down PCs remotely even if the PC is not connected to the network, as well as the ability to bypass hard drive encryption.

Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now, reports Softpedia. Jeff Marek, director of business client engineering for Intel, acknowledged that the company’s Sandy Bridge microprocessor, which was released in 2011, had the ability to remotely kill and restore a lost or stolen PC via 3G.

Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself, writes Jim Stone. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.

Although the technology is being promoted as a convenient way for IT experts to troubleshoot PC issues remotely, it also allows hackers or NSA snoops to view the entire contents of somebody’s hard drive, even when the power is off and the computer is not connected to a wi-fi network. It also allows third parties to remotely disable any computer via the secret 3G chip that is built into Intel’s Sandy Bridge processors. Webcams could also be remotely accessed.

This combination of hardware from Intel enables vPro access ports which operate independently of normal user operations, reports TG Daily. These include out-of-band communications (communications that exist outside of the scope of anything the machine might be doing through an OS or hypervisor), monitoring and altering of incoming and outgoing network traffic. In short, it operates covertly and snoops and potentially manipulates data.

Not only does this represent a privacy nightmare, it also dramatically increases the risk of industrial espionage.

The ability for third parties to have remote 3G access to PCs would also allow unwanted content to be placed on somebody’s hard drive, making it easier for intelligence agencies and corrupt law enforcement bodies to frame people.

The bottom line? The Core vPro processor is the end of any pretend privacy, writes Stone. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web at all, think again. There is now more than just a ghost in the machine.

AND I HAVE NO DOUBT THIS IS IN MANY CASES HOW MICROSOFT IS RAMRODDING WINDOWS 10 ONTO MANY COMPUTERS, WANTED OR NOT.

 

Tags: , , , , , ,

Leave a Reply