Fast E-Bike 29er goes 32 mph, powered by 48v – 17ah LiP04 battery with a powerful 1500w brushless rear wheel motor. FOR SALE! ** $1200 **

Try finding another 34 mile range 29er mountain e-bike with a top speed of 32 mph at only $1200. Leave your car parked and ride to work! You’ll have a blast! This 1500 watt powered mountain bike is big with 29 inch wheels and moves a 5’11” 190lb body at 32 mph / 34 mile range.

Purchase in Dallas TX area / Pickup Only / No shipping    **  $1200  **

Serious inquires only please e-mail ** bamtec70@gmail.com **

  • Locking down tube LiP04 48 volt / 17 amp hours battery (comes with keys)
  • 1500 watt brushless rear wheel motor
  • LCD Display with backlight mode for night riding
  • 5 modes for rider assist / battery life indicator/ distance and time indicators
  • Auto shut-off when front or back brakes applied
  • twist throttle just like a motorcycle
  • 48 volt / 1500 watt controler
  • 29 inch wheels (29er) E-Bike with hardtail aluminum frame
  • Supple front suspension fork for small bumps
  • 21-Speeds
  • Comes with 2 amp battery charger / 4 hour charge time
  • Splashproof battery, controller, and motor

lcd29er

American soldier asks male refugees why they won’t help him fight for freedom

Maybe Sweden should consider adding testosterone welfare supplements for these male refugees.

Speaking with an American soldier, Syrian refugee states nuclear weapons is the only solution to kill ISIS.

The soldier was in Denmark asking refugees questions on why they won’t fight for their own freedoms. “I’m no need go — go to the war,” one Denmark welfare recipient stated. One of the refugees admitted that he abandoned his wife and children, leaving them back in his homeland. One said it was a “delusion” for people to expect him to fight for his country. “There’s too much problem,” he said, and that is why he went to Denmark…. or was it the FREE welfare.

Cyber Security Analysts warn Hackers are hiding computer viruses in movie subtitles

North Korea hackers need to help feed their population somehow.

Cyber security analysts warn hackers can hide computer viruses inside online video subtitles and use malicious software code taking control of computers.

The cyber security group Check Point discovered the flaw and states millions of people who use video software to stream films and TV shows on computers could be at risk. The attack lets hackers take “complete control” over any type of device using the malicious software which includes smart TVs. Four programs are identified to be vulnerable – VLC, Kodi, Popcorn Time and Stremio.

“We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerabilities reported in recent years,” Check Point said.

>> Continue Reading <<

 

Wikileaks publishes CIA Apple hacking tactics

“BIG BROTHER IS WATCHING YOU!” -Blake

Wikileaks Thursday released trove of new documents from their CIA leak, outlining how the agency attacked Apple products.

Wikileaks is nicknaming this posting “Dark Matter.”

Dark matter is the second batch of leaks from the CIA archive Wikileaks has nicknamed Vault 7, largely describing hacking techniques the agency used. So far all of the techniques have been for targeted surveillance  (not bulk surveillance, like the NSA would conduct) and many require the CIA to have physical access to devices to attack them. The documents range in age, and Apple announced after the first release of documents that many of the security flaws mentioned in that archive had long since been patched.

One user manual released in Dark Matter describes “Sonic Screwdriver” – a technique taking its name from Dr. Who’s utility tool – as a way to use a modified Thunderbolt-to-Ethernet network adapter (or, potentially, other modified hardware) to load malware while a Mac is booting. That document is dated 2012.

Another document describes “DarkSeaSkies,” a hacking technique that lurks in the firmware of MacBook Airs version 1.1. Firmware controls hardware that is not controlled by an operating system (firm, because it’s in between ‘soft’ and ‘hard’ ware). The DarkSeaSkies documents, dated 2009, describe similar implants for iPhones, but the document is dated 2009, and may not be a still working attack for either.

Other documents provide historic information for “DerStarke,” a firmware attack leaked in the last set of Wikileaks docs. The documents in this posting describe it and related malware in its 2013 form, before the 2016 form already released.

Lawmakers and intelligence officials have been more concerned that the documents were stolen than the sensitivity of any of the documents released.

Sen. Ben Sasse (R-Neb) said that Wikileaks head Julian Assange should spend the rest of his life in “an orange jumpsuit” following the first document dump.

courtesy: TheHill

>> DARK MATTER <<

Patriot missile used to shoot down $200 Drone

Must be nice to have that kind of money to waste!

A U.S. ally used a $3 million Patriot missile to shoot down a $200 drone purchased from Amazon.com, an American general has revealed, questioning the economic consequences of the operation.

Gen. David Perkins told the Association of the United States Army’s Global Force Symposium in Huntsville, Alabama that the strike was made by a “very close ally.”

“A very close ally of ours was dealing with an adversary that was using the small quadcopter UASes and they shot it down with a Patriot missile,” he said, stopping short of actually naming the country in question.

“Now, that worked, they got it… that quadcopter that cost $200 on Amazon.com did not stand a chance against a Patriot.”

While Perkins admitted the ally “won” when it came to the “kinetic exchange ratio,” he questioned whether the move was economically wise.

“I am not sure that it is a good economic exchange ratio, in fact, if I am the enemy, I am thinking ‘I am just going to go on eBay and buy as many of these $300 quadcopters that I can and expend all these Patriot missiles,’” he said.

He went on to explain that there are more cost effective ways to combat such drones.

“There’s ways to get at this with electronic warfare, with cyber,” he said.

Thirteen countries possess Patriot missiles, according to manufacturer Raytheon.

Unmanned aerial vehicles (UAVs) are becoming an increasing problem for militaries, with Islamic State (IS, formerly ISIS/ISIL) jihadists modifying commercial drones to carry 40mm rifle grenades in Syria.

In January, the US Air Force placed an order for net-filled shotgun shells designed to shoot down unmanned aerial vehicles (UAVs).

Courtesy: RT

New to Drones? LEARN to FLY for $20!

FACEZAM App will scan your Facebook profile picture giving ‘creepers’ your information!

You will never see my actual ‘face’ on Facebook again! -Blake

British entrepreneur develops facial recognition application identifying strangers by scanning a photograph.

FACZAM

Facezam can identify people by matching a photo of them with their Facebook profile. All users have to do is take a picture of someone on the street and run it through the app, which will tell them who it thinks the person in the photo is.

“Facezam could be the end of our anonymous societies,” said Jack Kenyon, founder of Facezam. “Users will be able to identify anyone within a matter of seconds, which means privacy will no longer exist in public society.”

Facezam scans billions of Facebook profile images a second, which it accesses through a database for developers, until it finds a match. It claims to be able to link most photos with a profile on the social network within 10 seconds.

The app, which will launch on iOS on March 21, has been tested on more than 10,000 images to date with a 70 per cent accuracy.

Facebook can delay the launch, which said Facezam violates its privacy policies.

“This activity violates our terms and we’re reaching out to the developer to ensure they bring their app into compliance,” said Facebook.

Facebook reviews apps that use its data before they go live to check they adhere to its policies. Apps that collect users’ data or use automated technology to scan Facebook are forbidden from launching without permission from the social network.

Facezam refuted that the app violates Facebook’s terms. “We’ve looked into this, and are confident the app won’t be violating Facebook’s terms,” said Kenyon.

The technology could help reduce crime by making everyone identifiable, Kenyon said, adding that the public implications of the app couldn’t be predicted. “There may be a mix of positives and negatives,” he said.

‘The end of anonymous society’

Unfortunately there is no way for the privacy conscious to remove themselves from the app, which can use its identification software on anyone with a Facebook profile.

Its accuracy does however drop to 55 per cent when a person’s face is obscured in either the photo of them or in their Facebook profile image. Factors that affect its success include obscuring hair, sunglasses, a large hat or odd angle, Kenyon said.

The inspiration for Facezam comes from Shazam, the music lookup service that can tell users the name and artist of a song after hearing just a few bars. Facezam said its legal consultants weren’t concerned that the name infringed on Shazam’s copyright.

Facial recognition software is already used by internet giants such as Facebook and Google to group photos together and suggest who should be tagged in them. It is also used in some law enforcement databases and by companies such as Tesco to map customer demographics.

But Facezam’s launch marks the first time that the general public will be able to use Facebook data in this way. Facebook blocked the now defunct NameTag, a Google Glass recognition app, from using its data in a similar way. Google then banned the technology altogether from being applied to Glass.

A similar tool called Find Face lets users look up people online using a photo that it matches with images on VKontakte, a Russian social network. British augmented reality company Blippar recently launched a similar search tool but it can only scan faces on its database. These include public figures such as politicians and musicians, with users able to add their own faces if they want to.

Toyota Built a Secret Racetrack in Denton Texas For its Execs and VIPs

Hey Toyota, may I borrow your new racetrack?

Hidden away in Denton County, Texas, is a private racetrack retreat for Toyota executives and VIPs.

Toyota
The site of the Toyota executive retreat in Denton County includes a racetrack and buildings between Hilltop Road and FM1830 on the outskirts of Argyle.

If you blink, you might miss the street sign for the tree-lined country road south of Denton. The two-lane Hilltop Road leads you past mostly modest houses, small farms and rural businesses along the border of the town of Argyle. While tucked away among the trees and stock ponds, construction is underway on one of the most hush-hush developments in North Texas.

International auto giant Toyota is turning a patch of farmland into a multimillion-dollar, ranch-style executive retreat for its top local executives and visiting VIPs.

The spread covering more than 75 acres — which extends all the way to FM1830 — includes a motor track, horse stables, guest houses and barns. >> Continue Reading <<