During the summer of 2020 I reported an incident at Apple concerning 2 potential pedophiles. Nothing was done.
Recent reports of security breaches concerning the iPhone 6 and 6 Plus, the Messaging App connecting with the front-end of the Apple Support App and the backend of the Core App connecting Apple Support agents throughout the internal network have been reported by myself. Nothing was done.
Every iPhone 6 and 6 Plus is vulnerable to attack simply because they cannot be updated to recent versions of iOS. THEY ARE ALL VULNERABLE TO OLD EXPLOITS.
Recently, reports of pedophilia and necrophilia have been reported to the FBI. Nothing was done.
Every company is hackable. Every system is vulnerable. EVERY-THING can be hacked.
Read a book. THey’re easy to steal online. Just download a pdf.
If you’re real, I have a job for you. A mission. A journey. A game.
Here’s a list. Start with DNS.
Want a hint?
Cicada 3301. Here’s the answer: it’s all just a simple pattern to build a rootkit. U dumbasses. Chasing IP addresses, coordinates, and abandoned buildings. It’s just basic route distraction. Every text, every phone call, every steganographic mission, is just a pattern to refer to a library, download, and decrypt. Repeat the pattern.
Download Kali Linux. The FBI uses and distributes it. Watch Mr. Robot. Eliot’s door clearly says “FED”
There’s a lot of great tools if you enjoy getting your system backdoored.
-rEFInd fork to rEFIT
- control booting MacOS/OSx “perfect dual booting.”
- u can boot from USB
- Once Kali has been installed we complete control over EFI and can wipe, erase, or write to RAM EFI
- potentially persistent
The entire OS is a tutorial for building and deploying a rootkit.
Beginners and Sk1dd5 just download and take advantage of the tools. Get your exploits on Rapid 7.
Target the servers and see how many bodies u can catch. There’s more to come.
And remember… many of these girls were abandoned, kidnapped, or murdered.
Rm -rf /
Once u get there.
RXM2 6ix 2uece