Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
VoodooShield
CyberLock 8.0
Message
<blockquote data-quote="Fan-of-spyshelter" data-source="post: 1128255" data-attributes="member: 96367"><p>[USER=89910]@RSE9[/USER] : </p><p>if you are a little aware about cyber military defense from a kind of expression of liberty that was describe above, </p><p></p><p>understand that, is not about being compromised directly, user 89910, </p><p>it's about to have the possibility for somebody like me (a alerted consumer with responsibilities) to communicate with another lambda consumer on the world wide web, from sharing some information to my known insecure collaborators who are using any third party security software they do not the same work as i do daily, as a watcher. </p><p></p><p>why it matter ?</p><p>for example from this security solution (that i was just saying in the beginning there is a big bug and reply to me : "that the owner don't understand what i said" ),</p><p></p><p>has inside a trust security API key from MICROSOFT to unlock the windows kernel OS (from a driver host svc) and command it without any consent of users, in total silence.</p><p></p><p>&</p><p></p><p>because we, consumers :</p><p></p><p>don't have a trusted installer control only the super administrator,</p><p>are only the owners of the license of the OS, not the OS it self, </p><p></p><p> - with a remote functionality (from silent domain names systems queries), every software like this can be used for what we call snooping, </p><p></p><p>[MEDIA=youtube]pDwENUhCxdw[/MEDIA]</p><p></p><p>We don't want that our communication can be snooped in any sort of queries, with the people with who we are speaking with, because we have no right to say to them, you should use this...</p><p></p><p>Even our queries are just in a database with no eyes drops officially, they are always eyes drop, this is how we make unfair business !</p><p></p><p>protocol n°1 : </p><p>*don't let somebody snoop, to make the business fair. </p><p></p><p>protocol n°2 : </p><p>*every legitimate security software need to have a secure protocol to transmit the data </p><p>inside a database with no user interaction from the backed side (duty of the developer)</p><p>and who can only be transferable from the client side (right for the client)</p><p></p><p>protocol n°3 : </p><p>*if you want to distribute your software for commercial purpose</p><p>use a root signed certificate inside all the sub-software, to distribute your software globally</p><p></p><p><u>consequences for the future : </u></p><p></p><p>"<em><strong>What I’m trying to say for every one who is reading me, is that even though a system hasn’t been directly compromised, it can still be vulnerable due to the negligence of other users I communicate with. If these users don’t have the same security practices as I do, it can expose our communication to risks, even if I’m taking all the necessary steps to secure my own data. For example, if someone uses security tools that aren’t as reliable, or if there’s a vulnerability in their system, it can affect the integrity of our communication and allow malicious actors to intercept the information. It’s not just about individual protection, but also about how our collective actions regarding security can impact the privacy of everyone involved, and we all want trust in our business for legitimate interest that express our personalities, that's al</strong></em>l"</p></blockquote><p></p>
[QUOTE="Fan-of-spyshelter, post: 1128255, member: 96367"] [USER=89910]@RSE9[/USER] : if you are a little aware about cyber military defense from a kind of expression of liberty that was describe above, understand that, is not about being compromised directly, user 89910, it's about to have the possibility for somebody like me (a alerted consumer with responsibilities) to communicate with another lambda consumer on the world wide web, from sharing some information to my known insecure collaborators who are using any third party security software they do not the same work as i do daily, as a watcher. why it matter ? for example from this security solution (that i was just saying in the beginning there is a big bug and reply to me : "that the owner don't understand what i said" ), has inside a trust security API key from MICROSOFT to unlock the windows kernel OS (from a driver host svc) and command it without any consent of users, in total silence. & because we, consumers : don't have a trusted installer control only the super administrator, are only the owners of the license of the OS, not the OS it self, - with a remote functionality (from silent domain names systems queries), every software like this can be used for what we call snooping, [MEDIA=youtube]pDwENUhCxdw[/MEDIA] We don't want that our communication can be snooped in any sort of queries, with the people with who we are speaking with, because we have no right to say to them, you should use this... Even our queries are just in a database with no eyes drops officially, they are always eyes drop, this is how we make unfair business ! protocol n°1 : *don't let somebody snoop, to make the business fair. protocol n°2 : *every legitimate security software need to have a secure protocol to transmit the data inside a database with no user interaction from the backed side (duty of the developer) and who can only be transferable from the client side (right for the client) protocol n°3 : *if you want to distribute your software for commercial purpose use a root signed certificate inside all the sub-software, to distribute your software globally [U]consequences for the future : [/U] "[I][B]What I’m trying to say for every one who is reading me, is that even though a system hasn’t been directly compromised, it can still be vulnerable due to the negligence of other users I communicate with. If these users don’t have the same security practices as I do, it can expose our communication to risks, even if I’m taking all the necessary steps to secure my own data. For example, if someone uses security tools that aren’t as reliable, or if there’s a vulnerability in their system, it can affect the integrity of our communication and allow malicious actors to intercept the information. It’s not just about individual protection, but also about how our collective actions regarding security can impact the privacy of everyone involved, and we all want trust in our business for legitimate interest that express our personalities, that's al[/B][/I]l" [/QUOTE]
Insert quotes…
Verification
Post reply
Top