Singapore Government Hackers Love to Hack Teo En Ming's Computers, Smartphones, and Internet Online Accounts
Teo En Ming
teo.en.ming at gmail.com
Mon Aug 10 11:23:33 UTC 2015
On Sun, Aug 9, 2015 at 1:00 AM, <silver.bullet at zoho.com> wrote:
> On Sat, 8 Aug 2015 23:31:08 +0800, Teo En Ming wrote:
>>Dear Ubuntu Users,
>>
>>If I download and install Ubuntu 15.04 Desktop natively on my home
>>desktop computer system, install and configure Shorewall Firewall to
>>block ALL incoming connections, disable OpenSSH server, and stop all
>>unnecessary daemons/services from running permanently, would Singapore
>>Government hackers be able to hack into my home desktop computer
>>again?
>>
>>If Singapore Government hackers are able to hack into my home desktop
>>computer again, would it be due to a Linux kernel security
>>vulnerability, or web browser security vulnerability, or Adobe Flash
>>Player security vulnerability, or any GNU Linux-related security
>>vulnerability like Shellshock? I am making an educated guess that the
>>Singapore Government hackers are exploiting the above-mentioned
>>security vulnerabilities. How else would Singapore Government hackers
>>be able to hack into my computer system when I have blocked all
>>incoming connections? Are Singapore Government hackers using DNS
>>poisoning to redirect all my HTTP requests so that I download software
>>which have been tampered with or trojaned??? I apologize for my lack
>>of knowledge in advanced networking as I am not CCENT or CCNA or CISSP
>>trained. My knowledge of networking is still considered elementary,
>>
>>How can I stop Singapore Government hackers from hacking into my
>>computers, Android smartphones, and internet online accounts like
>>Facebook, Youtube, and Gmail, etc etc?
>>
>>Please let me reiterate/repeat some internet postings which I have
>>made recently.
>>
>>(1) Singapore Government Hackers Have Hacked Into Teo En Ming's
>>Computer Again
>>=============================================================
>>
>>Hi,
>>
>>Singapore Government hackers have hacked into my computer, again.
>
> I stopped reading here.
>
>
> Toooooooooooooooo loooooooooooooooong toooooooooooooo reeeeeeeeeeeeeead.
>
> Are you sure your computer was hacked?
>
> Anyway, here are a few guesses regarding your requests.
>
> Even the TOR browser developers mention that they wouldn't use Firefox
> again. OTOH I wouldn't trust the great browser, with the likely good
> sandbox. I don't trust some aspects of the companies policy. Yes I'm,
> talking about the Google thingy.
>
> Nothing proprietary belongs on a secure PC, let alone that usage of
> Adobe software is eminently questionable.
>
> Learn how to verify the ISO!!!
>
> It's a PITA that there are so many download buttons and at best most
> people just compare checksums, but without taking care of the signature.
>
> For example, download Ubuntu Studio
>
> http://cdimage.ubuntu.com/ubuntustudio/releases/vivid/release/
>
> and check it like this
>
> https://help.ubuntu.com/community/VerifyIsoHowto
>
> The only problem still is
>
> https://en.wikipedia.org/wiki/Web_of_trust
>
> If it's important were you live, you should find a way to get keys that
> confirm ownership of other keys.
Dear silver.bullet,
Yes, I am extremely sure that my computers were hacked by the
Singapore Government led by Prime Minister Lee Hsien Loong. Not only
were my computers hacked, my Android smartphone and internet online
accounts like Facebook, Youtube, and Gmail, etc etc, are hacked by the
Singapore Government as well.
Regarding web browsers, I have been using Firefox web browser for many
years. I prefer using Firefox to Internet Explorer, Microsoft Edge,
Google Chrome, Opera, and Safari. Firefox is my favorite web browser.
I don't want to use the Tor network as it is incredibly slow. I have
tried using the Tor network before, it is really incredibly slow.
As for Adobe software, I am aware that there are security flaws with
Adobe Flash Player. I have been advised by Norton Internet Security
2014 to update Adobe Flash Player to the latest version as soon as
possible.
Pertaining to downloading ISO files for operating systems like Windows
and Linux, sometimes I will just check the MD5 checksum only to verify
the integrity of the download. I didn't go further than checking MD5
checksums. Sorry to say, but I don't know how to use keys and I don't
understand the web of trust.
Yours sincerely,
Subtle Denial of Medical Treatment by the Singapore Government for Mr.
Teo En Ming (Zhang Enming)
Link: https://www.scribd.com/doc/258700156/Subtle-Denial-of-Medical-Treatment-by-the-Singapore-Government-for-Mr-Teo-En-Ming-Zhang-Enming
More information about the ubuntu-users
mailing list