I'm writing this here, because you are writing software for crisis responds, election monitoring and building BRCK.
I'm investigating security vulnerabilities and I have found some very big ones that are nowhere mentioned.
I'm from Germany and I get a lots of pressure not to publish it from many western and eastern nations, so I've thought, this is the best place.
It is so big, that I have start early, that you can believe it, but if you are just interested in the tecnical aspects jump down.
Currently I'm a kind of outlaw, the state institutions are not helping me or are making false claims, and are trying to place me in psychotherapy with open end.
Let's start with the big picture and go back to the cold war, when software vulnerabilities even didn't existed. Western, free media, has blamed the east block to be in total surveillance of the government, and in lots of movies and medias they have shown the image of an large domestic secret agency, that is breaking in someones home and wiretapping it. Don't you think it would have been easier for such a state to build all their electronics like TVs and radios especially for wiretapping from the start? No more need to break somewhere in, hard to detect, and almost impossible for a citizen to get rid of surveillance and live with these amnenities. And for these reasons, they have done it.
So now you might ask why you never heard about it. Well, because the West did exactly the same thing and even back in these days we had no free press that would have informed you about that important matter. The east and west had so much tact that they have never thrown an atomic bomb at each other and, and never blamed their opponent about this illegal practice, because it would have been a Boumerang.
Even back on these days you could buy eastern devices in the west and the other way round. The agency's did not care, because they have analyzed the devices and the signals anyhow.
Nowadays most of our devices are developed in the west, produced in the east, and distributed all over the world, but the core hasn't changed: The hardware is still built to spy at you. Software vulnerabilities are just the scapegoat if something got leaked or sabotaged. If there is no agency behind the case, the criminals are found pretty fast, because of this super surveillance capability.
This is what I have found out:
1. I have tested 5 Flat screen monitors and 2 laptops - all of these screens are working as a radio transceiver. The capability of receiving and sending of this secret channel is far beyond everything public available. I was not able to stop the communication no matter what shielding I've applied and where I went. It can be remotely deactivated and can send at least in a range from 200-950 MHz. Probably it communicates directly with the mobile network or satellites. It is the illuminated part who is sending. I assume it is a phased-array antenna. So if you search for a technology to get Internet access everywhere, you're just looking at it.
There is a data connection standardized in each connection between Monitor and Computer, thereby a monitor can manipulate a computer like someone sits in front of the computer.
Computers can also communicate over the power grid.
Something easy to verify: Try to understand how hybrid coils (https://en.wikipedia.org/wiki/Hybrid_coil) are working and used. Hybrid coils are historically one of the first elements for signal conditioning and were already used in the beginning of analogue telephony. With such a device it is possible to separate the sent and received signal on e.g. a symmetric cable pair of an ethernet or DSL connection or even separating the signal going to and coming from an loudspeaker (loudspeakers are just transducers and work also the other way). With that technology from the stone age of electronic communication it is possible to use a pair of wires in both ways at the same time. The same technique is also used in radar to filter the received echo from the signal sent, so even this simple construction works on a fairly big freqeuency spectrum.
If you watch out for them, you will find them on many locations, where you won't have expected them:
Although Ethernet dedicates each pair either for sending or receiving, you will find them right beside of every ethernet network interface socket as also in every DSL Modem. At least I have not found a single interface without hybrid coils, which had not connected all needed pins to an IC. So as a matter of fact even though, ethernet standard mandates separate lines for sending and receiving, and DSL standard mandates different freqeuency spectrums for sending and receiving, virtually all interfaces are using hybrid coils, and are thereby able to send and receive on the same line and freqeuency at the same time.
Scematic 1 ( http://www.mouser.com/ds/2/336/H329-262036.pdf
, page 3)
Just look in one of your devices. If you analyse the electronic circuit right nearby the ethernet plug, it will look like Scematic 1, with the difference that at least one of pins 2 and 7 are not connected to an capacitor but to the network IC and forming thereby a hybrid coil. For Ethernet following the real standard the splitted coil on the chip side is not needed. Every connection of you, adds at least the same bandwidth to an unspecified shadownet and nobody asks or tells who controls it, but every manufacturer builds their electronic to support it.
And there is still another hidden channel in the ethernet spec. I would define it as an unbalanced phantom circuit. It's a bit harder to understand but easy to verify: connect one output of a computers sound card to chassis. take another completely disconnected computer and connect the two computers just with an ethernet cable. Take some active loudspeakers and touch with the input pins the chassis of the second PC. You will hear the sound. Why? it's transfered over the phantom circuit and the unused wires of your cable. if you have a spare cable, just cut the unused pairs in your network cable. It still works! Refering to Scematic 1, the music travels from the chassis through the EFI capacitor, through the transformer to all signal lines at the sending side. On the receiving side it takes the exact opposite way. That part of the circuit is absolutely not needed for the official ethernet, but a perfect hidden communication channel.
Point 4 is not useful for you, but it make it possible for everyone to verify that I say the truth. My final point is, that it is not necessary to invent a technology to get internet everywhere. It already exists, you have it and you've already paid for it! Now it is just used to spy on you wherever you are. Use your energy to bring it to the daylight!
P.S.: For now my account is still on hold for "security reasons", so the system does only publish my first message. when I got cleared, I will write something more. if you want to get into contact: stefan.groissmeier (at) asf dot online