Besides revealing strategic location of natural resource,
military, personal, tecnologic,- they use that information at great scale, to monitor how many users are connected to what service and for what, and using what methods. etc, none virtual but veery real... -
geograph, demograph,- All that fancy aspect, the internet looks so,
friendly, fast and easy, nothing more than a fachade,
it is "something that allows you live a life
updated, that helps you, useful and user friendly tool...",
but where is your data going?
What do they do with them? What use do they give to them?
Its existence, besides generating business for
corporate of hardware, replacements parts, programs,
antivirus, etc (often they are the owners of it as well),
reveals strategic location of natural resource,
military, personal, tecnologic, geograph, demograph, etc,
none virtual but veery real,
Also shows and suggests information convenient to its masters.
Not necessarilly the necessary security filters,
but convenience filters, as well.
Sometimes politically or economically important - or military -
Why do they need to know about your conversation with your girlfriend?
in a normal situation, they use that information at great scale,
to monitor how many users are connected to what service
and for what, and using what methods.
Besides revealing strategic location of natural resource,
military, personal, tecnologic, geograph, demograph, etc,
none virtual but veery real...
About god, is the giant squid floating or ezekiel's vision..?
The russian subarine with....
Just make yourself this question: Who does the internet work for??
It all started 4 Years ago - reported - international authorities - Microsoft facilitated personal information to Yahoo and Verizon. - we've detected - "The Cyberthing"- First Google - of the conspiracy.
Microsoft Records 2:
(Also see mass-spying records below)
What happens, is that they know what's going on, but they won't tell you.
Microsoft is hands dirty here. They don't talk about their secret reunion
they had some days ago -
Hi, I am experiencing the exact same thing. The question that no
body can answer is why all of a sudden is this yellow triangle
appearing. I did not make any changes to setting. This just came
about all on its own. I also use google chrome with XP.
I am not that computer savvy so some of the steps take time.
In the last week or so, this green lock icon has started changing to a grey
lock with a yellow triangle in front of it. Basically, the lock is green
until I sign in, and then a few seconds later, it changes to the grey
one with the yellow triangle.
I'm assuming that these "other resources" are the ads on the right
of the outlook page. It's strange though, because mostly the ads
seem to be Microsoft related, or something to do with Twitter.
I don't see why they shouldn't be secure.
I'm using the Google Chrome browser.
its happening to me too...
Makes me feel like things are not secure...
- Do other people using the Chrome browser experience the same
thing after they sign in? I mean that the icon changes from a green
lock to a grey lock with a yellow triangle?
- Do you have any idea why has this only started happening recently?
Thanks for coming back here in Community forum.
I have "simulated" your concern here in our end and it is working fine.
- I have not experience the same thing you have encountered. -
I try changing my settings to stop my browser displaying pictures.
I tried this last night (when the issue was occurring more often
than it is now), and it seemed to stop the issue.
Could this be something to do with images on the outlook site?
(Close, it is not just the outlook, it is microsoft)
It seems strange that this only started happening recently, and
that other people are not experiencing the same thing.
Hi, I am experiencing the exact same thing. The question
that no body can answer is why all of a sudden is this yellow
triangle appearing. I did not make any changes to setting.
This just came about all on its own. I also use google chrome with XP.
I am not that computer savvy so some of the steps take time.
People are saying this is normal, that is fine but what changes were
made on outlooks side since this has never, and I mean never happened
until a few weeks ago. Any insight would be greatly appreciated.
People are saying this is normal, that is fine but what changes
were made on outlooks side since this has never, and I mean never
happened until a few weeks ago. Any insight would be greatly
Also see mass spying:
Mass Spying, A Global Reality:
Scroll down for theories and documentation
Es Microsoft parte de la conspiracion espia tambien?? -Yes, Microsoft was actually the problem- -(We don't recommend the Tor browser)- -Utilizacion secreta de datos desde un ordenador en modo avion, o sea, supuestamente offline sin incoming or outcoming multimedia transmission, de nuevo, "supuestamente" offline...
Microsoft talves no lo sea directamente, pero sus sistemas de seguridad talves esten facilitando la intrusion de errores y virus, luego de revisar - after reviewing this information I conclude Microsft maybe not deliberatedly doing things, but maybe its components and systems facilitate the intrusion of errors and viruses - Un tiempo despues de que le enviaron la peticion a Obama de cesar la insercion de componentes de espionaje en computadoras - Silicon Valley - luego de comprender la realidad de la situacion decidi comenzar a usar equipos cebos para poder defenderme de cyberthing, aqui estan algunas teorias y conclusiones:
El Proyecto Pandemic:
1 June, 2017
Today, June 1st 2017, WikiLeaks publishes documents from the "Pandemic" project of the CIA, a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network. "Pandemic" targets remote users by replacing application code on-the-fly with a trojaned version if the program is retrieved from the infected machine. To obfuscate its activity, the original file on the file server remains unchanged; it is only modified/replaced while in transit from the pandemic file server before being executed on the computer of the remote user. The implant allows the replacement of up to 20 programs with a maximum size of 800 MB for a selected list of remote users (targets).
As the name suggests, a single computer on a local network with shared drives that is infected with the "Pandemic" implant will act like a "Patient Zero" in the spread of a disease. It will infect remote computers if the user executes programs stored on the pandemic file server. Although not explicitly stated in the documents, it seems technically feasible that remote computers that provide file shares themselves become new pandemic file servers on the local network to reach new targets.
19 May, 2017
Today, May 19th 2017, WikiLeaks publishes documents from the "Athena" project of the CIA. "Athena" - like the related "Hera" system - provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to/from a specified directory on the target system. It allows the operator to configure settings during runtime (while the implant is on target) to customize it to an operation.
According to the documentation (see Athena Technology Overview), the malware was developed by the CIA in cooperation with Siege Technologies, a self-proclaimed cyber security company based in New Hampshire, US. On their website, Siege Technologies states that the company "... focuses on leveraging offensive cyberwar technologies and methodologies to develop predictive cyber security solutions for insurance, government and other targeted markets.". On November 15th, 2016 Nehemiah Security announced the acquisition of Siege Technologies.
In an email from HackingTeam (published by WikiLeaks here), Jason Syversen, founder of Siege Technologies with a background in cryptography and hacking, "... said he set out to create the equivalent of the military’s so-called probability of kill metric, a statistical analysis of whether an attack is likely to succeed. 'I feel more comfortable working on electronic warfare,' he said. 'It’s a little different than bombs and nuclear weapons -- that’s a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody.'" Source:
“Forensic studies of ‘Russian hacking’ into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer,” the memo states. The memo’s conclusions were based on analyses of metadata provided by the online persona Guccifer 2.0, who took credit for the alleged hack. “Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack.”
Spying Problem of Silicon Valley:
Estoy harto de sufrir acoso y bullying de Google, la verdad es que Google se quiere comer al mundo y nosotros los estamos dejando. Llevo años viendo cosas sin poder decir nada. Las copias de seguridad en este momento estan bajo ataque por Google, desde hace dias. Copias de seguridad que yo habia creado, ya que hemos visto cosas. Me toca lidiar con derechos de autor, con nuestros patrocindaores, como para tambien tener que estar lidiando con Google y su Paranoia. Es hora de que las cosas cambien por aqui. Links de los videos dañados, solo como un registro, no fueron borrados, pero ya no se veran tampoco mientras analizamos bien todo esto: ASLAS: ht tps://youtu.be/oey6jC0Wlc0 QBR1: http s://youtu.be/qmt2c9XdxCI
La conspiracion espia de Google,PRUEBAS REALES, los chips de tu computadora transmiten informacion a diferentes sectores politicos y militares:
Se avecina una guerra, primero intentaran destruir todas las computadoras para esclavizarnos con una red virtual a partir de nuestros otros devices, y controlar todas nuestras acciones, y mientras, destruir y modificar manipular la historia de la humanidad tal y como la conocemos, desde la base de datos global, hasta Wikipedia esta comprada ya. El proceso ya comenzo. Quisiera poder decir mas. No digan que nadie les advirtio cuando todo este destruido. Ellos saben que si destruyen nuestra historia habran ganado.
Realmente creen que se gastan millones implementando un algoritmo de busqueda nuevo o un nuevo botoncito con un cambio de color?? Oh claro que no, revisa los chips y Bios de tu computadora de Hewlett Packard y otras para que veas como se esta trasmitiendo tu informacion intima encriptada, crees que es coincidencia que HP se dividiera en 2 y que se esten gastando tantos millones en un proyecto secreto, mientras publicamente "se van a la quiebra"? Todo es un montaje, al final, todo ira para el mismo lugar de donde esto proviene. Alguien que ya esta viendote cuando te sacas un selfie, y escuchando tu conversacion con tu novia. Creanme, NO TIENEN LIMITE ni ningun respeto.
La historia sigue aqui:
Internal Security Files - Microsoft 1 -
Missing: - Mass Spying, a Global Reality -
Then, after reading all this, add three more names to this formula:
Edward Snowden + Jared Kushner + Donald Trump,
and tell what you get.
The Ant Farm 3 - The Secret Files 2-B - The Las Vegas Tragedy, the Cyberthing strikes:
The Ant Farm 24 - The Ancient Text
The Hunt for the Cyberthing V:
Sutherland Springs, Texas Shooting: Devin Patrick Kelley:
The Hunt for the Cyberthing IV:
The Cyberthing IV - Illegal Alien with Unreported Gun without Gun Licence
And the rest, which is too much to fill in here, and the rest which we have proof, and the rest that we bet there's under, and the rest that spread from the russian, and the rest...
And don't blame me, your politician did it all.
And don't thank me, you've never appreciated me anyway.
And don't judge me, I'm not getting anything out of this.
Eric Schmidt/Bilderberg Group Files:
Eric Schmidt Files:
Eric Schmidt, executive chairman of Google parent Alphabet, says Google's said the search engine's algorithms will be used to limit the reach of RT (Russia Today) and Sputnik, the BBC reported Tuesday. He made the comment Saturday at the Halifax International Security Forum
Yes, Microsoft was actually the problem.
(We don't recommend the Tor browser)
April 4 20:13
If you believe it or not, it's your business.
We found a terrible security issue in microsoft servers.
We've been scanning for activity using a bate.
Note: We also recommend for the ones that live in Costa Rica to
be careful with your ISP Providers.
Now anyway, now that we're changing things here,
For that, we will be closing some extensions of our site:
List of unsafe applications for the user:
1 - Linked in.
2 - Paypal (We never use paypal but paypal too). (so never purchase something
from us because we don't sell anything). - We've said this many times.
NoCiRbo9's worldwide free.
3 - Flickr due to their connection with the problematic yahoo.
4 - Outlook accounts, so for some of the contacts we have in Outlook,
if you need to contact me do it here somehow. Lets hope Facebook
isn't that bad. Or call or text me, my phone number...
5 - We will be updating. Nothing had happened to our systems so far by now,
it is an early security detection that we received from our team. - logistics -
So before things get weird-er, we opt to change our security roots systems
and to unlink any relationship with the sources of the threat. (and/or possible sources)
All of these sites works fine and will continue to until we decide it's time
6 - Remember that we can't just delete our googles because they are linked
7 - Twitter may be affected but we are still deciding that.
8 - Again, lets hope Facebook resists.
9 - Hi 5 - Obviously - it's going right to our black list, for observation, not to be deleted.
10 - Tumblr. One website was tumblr based. tumblr lost thousands of passwords. Maybe deletion, maybe blacklist for observation.
11 - CCM, because it has no instructions inside on how to do things on CCM (no CCM-self.instructive),
all it does is talking about others but no instructions of use
or important warnings.
12 - Blogger, too.
I'm leaving some notes in those two...
Samsung is ok, thank god. Instagram too... yeah, pretty much just what is listed
Summary, we can't trust Google or Yahoo (Already known). But now we can't trust microsoft either (New).
This post will be archived soon. So for the ones that listen, listen carefuly.
I get absolutely nothing by telling you this. Nothing. At all.
It is up to you. I can't tell you do this or that. Just that you can try other options.
After thinking it twice, those apps will be quarentined in our blacklist until we decide what do with them, so those won't be recommendable ways of contact - Federico -
I'll be back in about an hour to archive this message.
12 - Twicsy, we all know the twicsy server is fucked
I guess that's it. They will be operational, but abandoned. So I'm telling you, those application are unsafe for the user
It all started 4 Years ago. I reported all that to the international authorities (4 Years ago). And in Costa Rica, to the OIJ. I did what I have to do. It seemed that Microsoft facilitated personal information to Yahoo and Verizon. But now, this year, we've detected two more important security problems straight from Microsoft, reason why we put it on the blacklist and recommend you to look for other options. The problems I had with this made me investigate and eventually found out the truth about the Project Pandemia. So now they're trying to bury me with whatever they can. All this affected my personal life, at a personal level, so I started hunting down the anomalies, I made my own reports based on the anomalies from me and other users, with no need of "hacking" anyone, and created my own database with a secret file I also created and named as "The Cyberthing". First Google and Fifa, and twitter attacked my old youtube channel. then Yahoo and Verizon hacked the other Federico Sandino and messed up with our files, creating one ID using parts of both. Now this. And I know it is not about the Sandino last name. It is because of the conspiracy. They've been trying to ruin me. But it is too late. The truth is here. Your stupid little game is over.
-Or even worse, Microsoft was "hacked" too, but I don't believe in "hackings". All they are is LEAKS. People with access to the information doing the wrong thing with it.-
White House Needs Anti Harasment Training. - No wonder why needing an exorcism. Source:
Every Wednesday, some of the world's most powerful people meet in a conference room in Washington DC to learn about God. Amen Trump. You're a saint. The location can't be revealed - the Secret Service won't allow it - but the members can. Smells like big fat stinky fish for me. https://www.facebook.com/151941538483858/photos/a.603969519947722.1073741830.151941538483858/610741222603885
And the latest from Germany. Cyberthing Suspect believed to have mental illness. Welcome to the Jungle, ... fun and games
Oh yeah, almmmost forgot, you know its because facebook doesn't let me move the video section to the bottom of the page, so I'm thinking in deleting some of them, but at the same time, maybe that's what they want. We're on that. You know there's this huge conspiracy - Oh and you're so paranoid with aliens, and walls, maybe your mmmind is playing you tricks, for so many bad things you've told to everyone, are you surprised to find your house in flames??
- I've found a couple things in Google and Wikipedia, most specifically Verizon and Yahoo. Weird stuff. Password gatherings. Yeah. Pretty invasive. Thanks to "tools" like blogger, google and wikipedia, (who kidnapped Youtube and Twitter out from Microsoft and yadda yaddaa,) we have to accept that now they rule the world to abuse on it as they will. Let me give you some examples of how happy are the users with Google's "tools":-
If you ask me, I believe either Cyberthing hacked Google years ago, maybe someone who works or used to work in Google,
or, Cyberthing is Google itself. Trying to confuse us.
Maybe Google is the leak. That would explain everything.
And I'm not saying that's it. What I say is that it will explain many things. Google has so much information, delicate information,
that the minimal breach could be really dangerous. I've found a couple things in Google and Wikipedia, most specifically Verizon and Yahoo. Weird stuff. Password gatherings. Yeah. Pretty invasive.
One thing I said before is that I'm really thinking in
getting away from media, mostly because of Google,
that would include Youtube wikipedia blogger twitter etc, and try to stay with microsoft and facebook, and other supporters. Besides having better and faster functionality, they have more/or some integrity. I hate when apps start to update to look or to be like Google, like the messy Gmail, for example.
Yes, I said it before and surprised I'm saying it again,
the road world's taking is wrong.
We can't leave this unsolved for the coming generations.
Or you can see it this way: I told you about the war for the information. After that, domination is coming.
When that happens, later don't say "nobody told us".
It's time to take the world for us, and not to let the
system over us. The system should be for the man,
not the man for the system.
Thanks to "tools" like blogger, google and wikipedia,
(who kidnapped Youtube and Twitter out from Microsoft and yadda yaddaa,)
we have to accept that now they rule the world to abuse on it as they will.
Let me give you some examples of how happy are the users with Google's "tools":
Suzy • 3 years ago - God, I can't STAND Google+! I don't want all my crap linked together. I want my gmail account here, and my youtube account there. And my blog over there. I don't want them connected! And the "add people you may know" feature? What a complete invasion of my privacy! One of the top options is an old horrible boyfriend I haven't had to deal with for years. Why on earth are we being prompted to friend up? I can't get his hated face off that list because I can't get rid of that list. Google, you suck. No one wants you to make social media decisions for us.
Barry Lee Ober said:
Well thats exactly what I've been trying to do for a week and so at least I know its a google issue and I will have to consider going elsewhere so I don't have to be abused this way by google.
This world is Fucked. Fucked you listen
Totally upside dow
El internet. Es una herramienta de control.
-el internet es un arma-
La usan para provocar guerra. Y situaciones. La estan usando. Buscando la mejor estrategia. Para sus fines.