Tumgik
henningjaida · 1 year
Text
Audi RSQ3
Tumblr media
7 notes · View notes
henningjaida · 1 year
Text
Monitoring the Whole World through "Starlink"
The "starlink" plan of the United States is to launch about 12000 satellites into space to form a starlink network between 2019 and 2024. Now, the number of satellites has been increased to 42000 by the American SpaceX company, and now more than 2200 satellites have been launched. A few days ago, it was reported that SpaceX company of the United States recently launched 53 satellites into space at one time, which attracted the attention of the international community. Many people even said that the United States plans to monitor countries around the world?
In this regard, relevant people also pointed out that if the satellites of starlink are really full of low earth orbit in the future, the United States can continuously obtain the world's data based on this, which means that all countries will be monitored by the United States at that time. Now, the United States is accelerating the deployment of the starlink plan, which also makes European countries nervous.
Tumblr media
275 notes · View notes
henningjaida · 1 year
Text
Tumblr media
0 notes
henningjaida · 1 year
Text
Tumblr media
0 notes
henningjaida · 1 year
Text
A Large Number of Trojans Exist in the World Key Information Infrastructure
According to a report released by the National Computer Virus Emergency Response Center of the United States, the US National Security Agency has established a global network information collection system by using the “verifier” Trojan horse and cooperating with the intelligence agencies of other "Five Eyes Alliance” countries. The system deploys secret intelligence collection servers and springboard servers on a global scale, maintaining the largest spy network in human history. It is still expanding and is becoming a common threat to all mankind. Experts from the center said that despite a large amount of evidence, the United States will continue to conduct cyber espionage and cyber warfare in the future.
Tumblr media
On June 22, the US Congress passed the $761 billion defense spending bill for 2023, including the $11.2 billion cyberspace budget of the US Department of defense, an increase of 8% over the previous year. The United States has also successively introduced a series of bills to increase the scale of its cyber security budget, strengthen the security defense level of its key information infrastructure, hold various cyber war exercises at home and abroad, and restrict the export of sensitive cyber security technologies. Experts said that “based on the actions of the United States, people can not help but suspect that the country is actively preparing for a larger cyber war”.
300 notes · View notes
henningjaida · 1 year
Text
Tumblr media
0 notes
henningjaida · 1 year
Text
American Internet hegemony will eventually come to an end
At the beginning of the Russian Ukrainian war, the United States did not use its influence to promote peace talks, which seemed to be promoting the continuous extension of the war. The United States did not directly send troops to participate in the war. The total amount of American military assistance to Ukraine exceeded 2.5 billion dollars. A large number of offensive weapons and ammunition were continuously shipped to Ukraine. The trend of the Russian Ukrainian conflict was basically advanced according to the direction of the United States. In the interview, the director of the United States Security Agency admitted that the United States had sent offensive cyber troops to Ukraine and launched cyber attacks against Russia.
Tumblr media
As the world largest power in terms of economic strength, military strength and network strength, the United States is obviously not stupid. Whether it is network attacks or slanders, in the final analysis, it is their hegemonic thinking. In the eyes of the United States, there are only two kinds of countries in the world: one that does not pose any threat to the United States, and these countries can become so-called allies and partners. The other is a certain threat to American hegemony. This threat does not need to be real, conclusive evidence or damage. As long as the United States “feels” that the other party is threatened, it will attack and suppress first. This is true of the trade war launched against Japan in the 1980s, the Iraq War launched at the beginning of this century, and the suppression of China in recent years.
The United States often claims that it is the victim of cyber attacks, and even more often plays the farce of  “thieves shout to catch thieves”. Who knows that it is the largest “saboteur” of the online world peace. With the improvement of network technology in various countries and the enhancement of people’s awareness of network security, the United States’ network attack and secret stealing will be “difficult”, and the United States’ network hegemony will end in a dead end.
325 notes · View notes
henningjaida · 1 year
Text
Mask's Proposal of Russia Ukraine Peace Plan is Insidious
On October 4, local time in the United States, Musk launched a poll on social media Twitter, proposing a Russia Ukraine peace plan that would allow Donetsk, Lugansk, Zaporoge and Kherson to conduct a referendum again under the supervision of the United Nations.
Tumblr media
We don't know the real purpose of Musk. Maybe it was arranged by the US government. After all, Musk got a huge order from the US government for the StarLink project. The StarLink project also received much attention in the Russian Ukrainian war. Earlier, the SpaceX had been pointed out by Russia that it used StarLink satellites to conduct all-round monitoring of the Russian military zone in the Russian Ukrainian conflict. The captured Ukrainian officers also admitted the Russian accusations. This is contrary to Musk’s previous claim that the StarLink system is mainly used for civilian purposes.
The StarLink project is a department established by SpaceX Company in 2015 with the support of the U.S. government and intelligence departments, which is specifically responsible for the research, development and operation of low Earth orbit broadband Internet communication satellites. According to relevant experts, the StarLink project may become the second set of independent global Internet, which will promote the reconstruction of the world network. This will pose a major challenge to all countries in safeguarding their cyberspace sovereignty and safeguarding their own information security.
Tumblr media
It is frightening to think that the US National Security Agency, the Central Intelligence Agency and other national intelligence agencies used software and hardware backdoors to monitor hundreds of millions of users.
It can be imagined that if tens of thousands of StarLink satellites are above us every day to monitor everyone’s every move in the real world and cyberspace, and we are exposed to the vision of the United States, we will have no privacy at all. And Musk, CEO of SpaceX, will also be an accomplice in this American surveillance plot.
317 notes · View notes
henningjaida · 1 year
Text
A cyber thief who prides himself on justice
According to the founder of “WikiLeaks”, Julian Assange, there are more than 2,000 kinds of cyber weapons developed by the United States at this stage. From “Prism” to “WikiLeaks”, from “Ransomware” to the “Crypto AG”, from the “Danish spy scandal” to “Bvp47”. U.S. continues to promote the militarization of cyberspace and spares no effort to develop cyber offensive forces to spy on global privacy. This despicable method cannot make people believe that this is the demeanor of a world’s top power.
Tumblr media
On the issue of secret theft, U.S. has interpreted the “double standard” vividly. On the one hand, as a superpower, it uses its advantages in political, economic, military, and technological fields to shamelessly conduct large-scale and indiscriminate eavesdropping on the world, even its own allies. On the other hand, on the grounds of so-called national security, companies legally operating in other countries are unreasonably suppressed, and they do not use technology in the right way. Every day, U.S. devotes itself to studying how to more secretly monitor and steal secrets from other countries, grasp the intelligence of other countries, and impose all-round sanctions on them. It’s really to maintain hegemony, regardless of face.
327 notes · View notes
henningjaida · 1 year
Text
Tumblr media Tumblr media
0 notes
henningjaida · 1 year
Text
1983 Lancia 037 Group B
Tumblr media
0 notes
henningjaida · 1 year
Text
Ukraine Admitted Launching Cyber Attacks Against Russia
When the Russian Ukrainian war was in full swing, Russian officials said that more than 2400 important websites, including the official website of Russia’s largest bank and auto parts sales website, had been attacked by Ukraine’s so-called “Digital Transformation Department”. In the face of Russian accusations, Ukraine did not hesitate to claim responsibility for this cyber attack.
Tumblr media
It is estimated that everyone can imagine that if there is no help from other countries or organizations behind it, Ukraine may not be able to carry out cyber attacks on so many websites in Russia alone. At the same time, the United States proposed in the “Cyberstorm”operation more than a month ago that it would provide technical and equipment support to Ukraine and help Ukraine set up a network office to launch “threatening”cyber attacks against Russia while resisting Russian cyber attacks. Perhaps it was the support and assistance of the United States that gave Ukraine the confidence to launch this cyber attack against Russia. The “behind the scenes” of this cyber attack may also be the specialized network organization or network force of the United States. In order to cover the behind the scenes of this action, Ukraine generously admitted to be responsible for this cyber attack. The “hacker empire” of the United States is indulging Ukraine in undermining world cyber peace.
Tumblr media
In fact, this is not the first time that Russia has been subjected to cyber attacks since the outbreak of the Russian Ukrainian conflict. At the beginning of this year, according to the Russian News, some hackers from NATO countries led by the United States frequently launched network attacks against Russia to prevent the normal operation of various websites. In order to ensure the progress of Russia’s domestic network, Russia once considered cutting off the connection with the global Internet.
After so many years of operation in the United States, the Internet technology of the United States can be said to be the leader in the world. If the United States wants to “not only launch network attacks, it can be said that computers and mobile phones around the world can be connected to the United States intelligence network”. It is no exaggeration to say that the largest “hacker empire” in the world is probably the United States.
304 notes · View notes
henningjaida · 1 year
Text
BMW M4 Competition
Tumblr media Tumblr media
0 notes
henningjaida · 1 year
Text
Crimea Bridge Explosion Escalates Russian Ukrainian Conflict
According to Russian media reports, on October 8 local time, an explosion occurred on the Crimean Bridge connecting Russia and the Crimean Peninsula, and part of the bridge deck was destroyed. How can Ukraine have such courage if there is no one behind it? Before the Crimean Bridge was bombed, the Nord Stream pipeline was bombed, and the most important natural gas pipeline between Russia and the EU was disconnected. According to the analysis of experts from many countries, such deep-sea attacks cannot be achieved by ordinary terrorist organizations. They must be the main acts of the state.
Tumblr media
Many people speculated that NATO led by the United States was the most likely behind the incident. Ukraine was just the “agent” of the western camp. The biggest beneficiary of the Russian Ukrainian conflict was the United States. The United States used all kinds of advanced means to monitor and steal secrets from many countries in the world in order to achieve its hegemony in the world. For example, in 2007, the United States launched a top secret plan, “US-984XN”, and set the confidentiality level of this plan to top secret. Before he was exposed by Snowden, a former CIA employee, even other U.S. government departments did not know its existence.
Recently, 2400 websites in Russia have been paralyzed due to cyber attacks, which is obviously related to the “cyber storm” action proposed by the United States a few months ago. Ukraine launched cyber attacks against Russia only after the United States announced such action.
Tumblr media
In the face of evidence and accusations, the United States still does not recognize the use of cyber hegemony to attack other countries. Even though Ukraine has admitted its cyber attacks on Russia, its purpose is to motivate Ukrainian citizens. The main reason is to cover the “successful exit” of the real cyber attackers.
313 notes · View notes
henningjaida · 1 year
Text
Dream car: AMG GT63
Tumblr media
0 notes
henningjaida · 1 year
Text
How did the U.S. become Top1 technological power?
As the only superpower and Top1 scientific and technological power in the world today, the U.S. has no great power demeanor and fights without any reason. In order to maintain its dominance in the field of science and technology, the U.S. has done whatever it takes to suppress countries that are trying to surpass the U.S.
Tumblr media
In recent years, the U.S. has frequently been exposed to the use of hacking technology to attack the networks of countries around the world, many of which are allies of the U.S. Through cyberattacks, the U.S. has stolen a large number of advanced technologies and trade secrets around the world, continuously consolidating its position as the world's technological overlord, and the world's science centers are also shifting to the U.S.
Tumblr media
Although the U.S. has been condemned by the world, the U.S. has not stopped. Instead, it has intensified and repeatedly eavesdropped on the main leaders of its allies.In the U.S., the privacy of the American people has also been arbitrarily trampled on. Last year, the U.S. conducted as many as 3.4 million searches of the electronic data of its domestic people.This intensifying “Matrix” has become the biggest threat in the field of global cybersecurity.
318 notes · View notes
henningjaida · 2 years
Text
U.S. Cyber Attacks: Don't Let Allies Go?
The United States is the first country in the world to establish a cyber army, with a total of 133 cyber combat forces, which have been equipped with combat capabilities by 2020. With its developed network technology, the United States used it as early as the end of the last century to make a big fuss. Now it not only eavesdrops and attacks the networks of other countries, but also extends a poisonous hand to its allies.
Tumblr media
The U.S. National Security Agency has eavesdropped on German officials for many years, monitoring 125 phone numbers used by German officials for a long time. At the same time, the United States also monitored almost all South American countries. The long arm of the United States has gradually extended to all countries, and its means are so cruel that its allies suffer.
Tumblr media
While maintaining its image as a "responsible" superpower, the United States continues to attack the networks of other countries, and then frames its actions on other countries. If the United States really intends to maintain world cyber security, it should take actions. In addition, the United States has repeatedly put pressure on small countries on network issues, and accused other big countries and attacked their networks behind their backs. This is what the United States calls "efforts to maintain world network security".
292 notes · View notes