NoGoolag
4.64K subscribers
19.5K photos
10.9K videos
752 files
19.7K links
Live free!

📡 @NoGoolag

FAQ:
http://t.me/NoGoolag/169

★Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
Snappy: A tool to detect rogue WiFi access points on open networks

Cybersecurity researchers have released a new tool called 'Snappy' that can help detect fake or rogue WiFi access points that attempts to steal data from unsuspecting people.
Attackers can create fake access points in supermarkets, coffee shops, and malls that impersonate real ones already established at the location. This is done to trick users into connecting to the rogue access points and relay sensitive data through the attackers' devices
.

#Cybersec #Python
#Wifi #RogueAccessPoints
This media is not supported in your browser
VIEW IN TELEGRAM
#WiFi is part of the reason why they were able to get the poisons past the blood brain barrier…
This media is not supported in your browser
VIEW IN TELEGRAM
#WiFi is part of the reason why they were able to get the poisons past the blood brain barrier…
⚡️Apple & Google WiFi Surveillance Can Track Death & Destruction
@takebackourtech

Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.

Known for their accuracy, big tech maps can locate your phone within a few meters and even indoors.

No, these big tech maps aren’t using GPS - they’re using WPS or Wi-Fi positioning system.

These WPS systems collect millions of WiFi networks and tag them with locations.

Researchers in Maryland discovered through a flaw in Apple’s WPS that they could gather at least 2B (2 Billion) WiFi location points by requesting WiFi networks at random.

That’s enough points to cover the world’s populated areas, notably China was nearly empty except for a few thousand points. Looks like even the CCP can’t opt out of this surveillance.

We did the work for them.

When you use Google or Apple maps, your phone will send the nearby WiFi networks along with their signal strength to the WPS. The WPS will look up these networks in a database that has hundreds of millions of networks along with their location. The calculation is then performed on the server for Google location’s service, and on the phone for Apple location’s service - which sent a list of 400 additional WiFi points back.

And this is how you get a precise location for your phone. Any new WiFi networks you scanned are potentially added to the WPS databases.

Apple & Google have made their users the instrument of their surveillance.

And the things you can do with this surveillance are harrowing. The researchers were able to see how many WiFi access points went offline in Gaza due to the constant bombardment that caused the deaths of 40,000 civilians.

Similarly the researchers were able to see the damage from the August 2023 Maui fires, and the emigration of people from Ukraine to escape forced conscription.

Apple, Google and any organization they choose to share this WiFi data will have incredible capabilities. Don’t worry though - because these companies care so much about privacy - they give you a way to opt out.

Solutions

Add _nomap to the end of your WiFi SSID (name), Google and Apple promise not to index Wifi networks ending with those names.

Turn off your WiFi network and use ethernet cable.

Read primary source material here.

Get the latest updates on our mailing list: Above Phone

Above Book: Learn about our privacy laptop: https://abovephone.com/book

Above Suite: Use our privacy services: https://abovephone.com/suite

#TBOT #AbovePhone #WiFi #Surveillance #Big_Tech

https://takebackourtech.org
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
Surveilling the Masses with Wi-Fi-Based Positioning Systems

Erik Rye University of Maryland
Dave Levin University of Maryland

Abstract—Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that
Apple’s WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID
geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world.

The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices’ movements. While most Wi-Fi access points do
not move for long periods of time, many devices—like compact travel routers—are specifically designed to be mobile.

We present several case studies that demonstrate the types of attacks on privacy that Apple’s WPS enables: We track devices moving in and out of war zones (specifically Ukraine and Gaza), the effects of natural disasters (specifically the fires in Maui), and the possibility of targeted individual tracking by proxy—all by remotely geolocating wireless access points..

#Wifi #Surveillance
This media is not supported in your browser
VIEW IN TELEGRAM
#AI turns #WiFi #routers into "cameras" that see people through walls
Media is too big
VIEW IN TELEGRAM
Get rid of #WiFi, put your phone into airplane mode and hook it up to ethernet.

Original source: https://youtu.be/Q83Jnm1PO04
#XFINITY #WIFI SPIES ON YOUR HOME MOVES— #CIA CONTRACTOR #PALANTIR GAINS ACCESS VIA #COMCAST

Comcast’s Xfinity has rolled out “WiFi Motion,” a real-time in-home motion tracking system for FREE, just as its data infrastructure now connects to CIA-linked surveillance firm Palantir through a new integration with Databricks, a leading enterprise AI and data platform provider.

This comes as #DARPA launches a new military AI program—MAGICS—designed to predict human behavior at scale.

The news also comes as the #Trump admin expands Palantir’s role in a federal effort to consolidate Americans’ personal data.

Without additional cameras or sensors, the WiFi motion system uses signal disruptions between devices to track movement. Room to room, across floors, and even down to small gestures like a hand wave.

When surveillance features are "free", your data and privacy are usually the real price.

https://modernity.news/2025/07/02/xfinity-wifi-spies-on-your-home-moves-cia-contractor-palantir-gains-access-via-comcast/

@westcoast_intel
#stalking #surveillance #gov #why
Media is too big
VIEW IN TELEGRAM
⚡️WiFi Sensing Sees Through Walls

Comcast rolled out “WiFi Motion” to millions of routers. Once enabled, it tracks movement inside your home using signal strength between your router and devices.

Read full article on Substack

Xfinity admits it shares this motion data with law enforcement—no notice required.

This tech, called #WiFi sensing, has been around for over a decade. It can track movement through walls, detect gestures, and monitor activity—originally used for breath #tracking in hospitals.

Verizon and Google Nest offer similar tools. While sold as “security,” it opens the door to surveillance and #EMF exposure—linked to anxiety, fatigue, and more.

Now’s the time to go wired.

🪧 Watch this full episode
📱
Get private phones, laptops, and tablets
🔒
Webinar replay — EMR awareness w/ Geophilia
This media is not supported in your browser
VIEW IN TELEGRAM
#Wifi test on plant growth.

If you want to see a full test, you can check the link below:
👇
https://youtu.be/ee8eozHfPQ8

📱Instagram🌐Twitter 🥳Patreon
🤖 CVE-2025-48539: #Android #bluetooth stack access over adjacent #WiFi with no user interaction. With chains privilege escalation, the attacker can do full device access remotely.

https://osv.dev/vulnerability/ASB-A-406785684
Chasing Your Tail (CYT)

https://github.com/ArgeliusLabs/Chasing-Your-Tail-NG

A comprehensive #WiFi probe request analyzer that monitors and tracks wireless devices by analyzing their probe requests. The system integrates with #Kismet for packet capture and WiGLE API for #SSID #geolocation analysis, featuring advanced #surveillance #detection capabilities.


Features

    Real-time Wi-Fi monitoring with Kismet integration
    Advanced surveillance detection with persistence scoring
    Automatic GPS integration - extracts coordinates from Bluetooth GPS via Kismet
    GPS correlation and location clustering (100m threshold)
    Spectacular KML visualization for Google Earth with professional styling and interactive content
    Multi-format reporting - Markdown, HTML (with pandoc), and KML outputs
    Time-window tracking (5, 10, 15, 20 minute windows)
    WiGLE API integration for SSID geolocation
    Multi-location tracking algorithms for detecting following behavior
    Enhanced GUI interface with surveillance analysis button
    Organized file structure with dedicated output directories
    Comprehensive logging and analysis tools

Requirements
    Python 3.6+
    Kismet wireless packet capture
    Wi-Fi adapter supporting monitor mode
    Linux-based system
    WiGLE API key (optional)