1. Are you ready for the Galaxy S20? Here is everything we know so far!

android lost directory dec 31 1969

Discussion in 'Android Lounge' started by david schneilly, Dec 22, 2014.

  1. david schneilly

    Thread Starter

    android lost directory dec 31 1969 i know exactly what it is its a hack its the key into any android phone ive been seeing it for seven years as i battled hackers into my phones of all kinds the only thing being constant is that they were android dec 31 1969 is the date the technology was found in the desert its not ours or this earths but it is definatly military and is the keys to the kingdom per say for example one of many attacks i battled and throught a sientific method of ellimination of variables i elliminated theries i received a photo from a freind next thing i know my pictures were dissapearing well through my process of ellimination i checked the details of my so called freinds photo the date was dec 31 1969 by morning my photos were gone along with my freinds photo its like a file magnet it dockes with files and extracts them somtimes taking them completely and other times copying them it is bad thing other dates are jan 30 1980 and i think march 14 1972 thre ndistinct events threee packets of technology that started it all off the beginning of android my hunch is android was stolen technol.ogy think about it if its not supossed to exist who can get in trouble next time you see them check your files and their detailes whos doing my guess government breaking our civil rights also ask your carier for an explantion of fake call doesent jive
     


    dumitchristopher likes this.
  2. Unforgiven

    Unforgiven ...eschew obfuscation...
    Moderator

    March 14, 1972, eh? I think that's the date on the fruitcake in my fridge.:p
     
    funkylogik, mikedt and lunatic59 like this.
  3. codesplice

    codesplice Elite Recognized Moderator
    Moderator

    For what it's worth, UNIX epoch time started at 00:00 on January 1, 1970 UTC (corrected for your local time zone, that would likely be December 31, 1969 if you're in the US). A lot of file systems will revert to that timestamp for files that are corrupted or otherwise have an invalid timestamp.

    Whether or not you're being hacked is a whole other issue, but rest assured that the timestamp is a symptom and not the cause. :batdroid:
     
  4. EarlyMon

    EarlyMon The PearlyMon
    VIP Member

    Oh there you go again.

    Sure, we could use words like, "logic," "reason," and "there was no internet on March 14, 1972" but I'm not going to be a party to your fear-mongering.

    The simple explanation is the best - file magnets have been sent back in time.
     
  5. iowabowtech

    iowabowtech root@android:/ #

    Slug and EarlyMon like this.
  6. I have a theory that meets in the middle. It is absolutely a folder planted by hackers. They data mine for ANYTHING photos, personal information, things that can be used to extort you, stalk you, etc. It is nearly impossible to delete and initially is a hidden folder. Heres the meet in the middle part. I believe, due to the Epoch Time Conundrum (which for its applicable purposes has been solved) setting the creation date of the application or program at December 31, 1969, an added layer of protection is in place. The system, malware and antivirus apps are either confused or don't even recognize the app for what it is. I believe it allows the app to run in the background free from interference. EVERYTHING that computers do have a correlating timestamp based in Epoch time. If an app was created before epoch time, then it can't be recognized, identified, marked etc. If the program enters your photo folder and copies all your photos, all that's left behind is an empty folder. If you do happen to locate the folder, removing it is impossible, EVEN if you format the storage device (even if you do it more than once). I agree it is or once was a government thing but it has since gone rogue. Thieves of identification, credit cards, burglars, car thieves, the homeless, some police and many what seemed to be regular members of society participate for benefit/profit. Some call them gangstalkers/gaslighters. My opinion is the Android Open Source Project should be shut down and Android as an operating system should be eliminated. ANYONE can take ANY application, add or remove lines of code to do whatever they want it to do, so long as they give notice of such changes- that's like saying the guy whos going to shoot up some place- needs to buy his gun legally. I believe, Amazon, Youtube, Gmail, Facebook, Instagram, Pokemon Go, and many other foreign social sites have compromised beyond repair and these people use said applications to for location purposes, and to use exploits to acquire data. Many of these pieces os are actually developers. What better way to have a million people test out your app then to force them to unknowingly do so with all the corresponding data, collected used for the plythera of reasons stated above.
     
    Honeybe201 likes this.
  7. Hadron

    Hadron Smoke me a kipper...
    VIP Member

    Wow: take a 5 year old post, build a conspriatorial mountain of technically-illiterate FUD and call for the elimination of open source in the mobile operating system (because nobody has ever heard of security problems on a closed-source OS, right?).

    William of Occam is currently spinning a little faster in his grave, by the way.
     
    #7 Hadron, Aug 16, 2019
    Last edited: Aug 16, 2019
    codesplice, MoodyBlues and ocnbrze like this.
  8. Oh and to ThePearlyMon or whatever it is. The guy isn't fear mongering, he's trying to figure out a pretty messed up bit of software. You know what happens once a conspiracy theory is proven right? There are millions of people in the world right now experiencing financial loss, identity theft, as well as some things that are unbelievable and extremely difficult to prove. Some people have bee experiencing constant attacks in one way or another for years. I get it, you haven't experienced it, and I hope you don't, but when that one year comes around that you have 3 or 4 hard drives left without even an operating system with one of those comps being brand new, then your car starts to have constant issues, everyone at your job turns against you, maybe you even lose your job, family and friends distance themselves from you, multiple phones get wiped, or straight up dissapear, you start getting pulled over on a regular basis, begin to find yourself in confrontations you didnt start because youre not that kind of person, end up sick, homeless, incarcerated institutionalized or worse. If you ever to become a targeted individual, I hope someone listens to you and believes you, instead of treating you like some nut job.

    And to Codesplice- you can't just make stuff up and it become the truth. Your statement is so wrong I wont even comment any further on it.
     
    Honeybe201 likes this.
  9. ocnbrze

    ocnbrze DON'T PANIC!!!!!!!!!

    first off its EarlyMon, a very well respected member of this forum since the beginning, was just joking with codesplice.....another well respected member of this forum. it was not meant to be serious at all.
    and second codesplice is correct:
    https://www.a2hosting.com/blog/whats-the-deal-with-12-31-1969/
    https://www.dailyrazor.com/blog/december-31-1969/
    https://en.wikipedia.org/wiki/Unix_time
     
    #9 ocnbrze, Aug 16, 2019
    Last edited: Aug 16, 2019
    MoodyBlues likes this.
  10. codesplice

    codesplice Elite Recognized Moderator
    Moderator

    At least we can agree on that. :)
     
  11. MoodyBlues

    MoodyBlues Compassion is cool!
    VIP Member

    *scratching head wondering why a long-dead, five year old thread gets resurrected*
     
    ocnbrze likes this.
  12. Honeybe201

    Honeybe201 Lurker

    I completely agree with you and you make points that I have said myself!! I detest Google because of all this yet Apple products are so limited on usability. Over the previous 2 years I have been hacked every way possible...thru my router, home security camera, google/gmail account and my phone as well. I had a Pixel 2 but felt like it was my crazy ex-boyfriends perfect gateway for my initial hacking experience so I didn't keep it long!! And being a single woman I am literally the #1 target for stalkers(gang or solo) so I've had to do much research and try my best to protect myself but it's not easy figuring all these things out.
    I believe it started with my ex but it left my accounts vulnerable for more experienced people. I have NEVER linked any of my accts yet my gmail, hotmail and LinkedIn were all tied together a few months ago, and all my contacts were imported into LinkedIn. I even got an email from myself threatening if I didn't send them bitcoins they were going to send a compromising video of me to everyone but I knew it was lies so I replied to myself then changed login after I saw it had been read.
    Current situation as of this week..on my laptop...admin rights have been taken away, users and apps added to share things, settings changed and greyed out. I think you're right about the files staying on bc I've hard reset it so many times!! I've already realized they're hidden...Oh, and did I mention I also have a fictitious WiFi in my living room with my old SSID name!!! This happened in August while on vacation. It kept hacking into my router, setting ports and making my real WiFi public. But nobody (locally) knows how it's possible or how to fix it. I've gotten over sounding crazy bc I have all the proof one could possibly have.
    And I found this post trying to figure out the 1969 correlation...so frustrating.
     
    #12 Honeybe201, Dec 30, 2019
    Last edited: Dec 30, 2019
  13. Hadron

    Hadron Smoke me a kipper...
    VIP Member

    It's important to distinguish the real stuff from the junk any scammer can do. So an email "from myself" means nothing(*), and I'm not certain that your contacts being uploaded to LinkedIn does either(**).

    But the other stuff, well some of it I don't understand: a WiFi SSID can't "hack into your router", that's just not how it works, though someone could set up a hotspot with your old SSID in the hope that one of your devices will try to connect to it (as a way of hacking that device or your internet traffic). But for the rest, the problem is knowing what all of the vulnerabilities are and clearing out all of the existing exploits: you need to secure both your accounts and your equipment together, one or the other isn't sufficient, and if it's this deep in then you may need specialist advice (and this isn't my speciality). I do know that it's hard to work out the cause just from a few descriptions of symptoms though: for example, you mention your WiFi router settings changing, but that could be done by anyone who had access to your laptop as well as by hacking the router directly (probably more easily, since only some routers are vulnerable that way). I think you really need a specialist to sit down with you by the sound of it.

    But the 1969 correlation is nonsense, and my advice is not to allow it to distract you from the real problem. I can understand that that earlier poster was frustrated with their problems and hence unwilling to accept that this did not mean what they thought, but anybody with the slightest familiarity with *nix systems (Unix/Linux/Android, even MacOS) knows the significance of that date.

    ---------

    (*) It's trivial to spoof email addresses, and a very simple way of scaring people who don't know this into thinking they've been backed is to spoof a mail to appear to come from the address you are sending it to. It's also easy to spot if you have an unusual email provider, e.g. if I get one of those claiming to be from my CERN email account I just need to look at the full headers to see that it did not originate from the CERN mailservers. If however they use a burner gmail account to spoof your gmail address it's much less obvious.

    (**) LinkedIn want you to upload your contacts to them (and want to spam them all with invitations). I've known very computer-literate people carefully deselect these things when creating LinkedIn accounts only for LinkedIn to ignore their choices and do it anyway. So I wouldn't rule out that one being down to LinkedIn themselves rather than any hacker (it's one of the reasons I will have nothing to do with LinkedIn).
     
    MoodyBlues, ocnbrze and codesplice like this.
  14. Honeybe201

    Honeybe201 Lurker

    I understand what you're saying, however, the email from 'myself' also contained my current pw at that time or I would've thought it was spam as well.

    From what I've read, a bridge can be built that can make it possible for the 'evil twin' to connect to the router, basically to hijack the internet usage. I was gone for 2 weeks when this happened and used almost 400GB of data when normally I use around 200GB a whole month. I changed out my router 3 times, wiped all my electronics with hard resets and changed all passwords but it kept happening. As of now that has stopped but the rogue WiFi is still present. I even used WiFi meters and tore apart the area it is showing up but couldn't find a physical device. I honestly think moving later this year will be my only refuge..for that. I do unplug it everyday now too.

    I know I need professional help but everyone I call will only work with businesses. Looking for the 1969 was more of a mild curiosity as it showed up when my cam was hacked and I got the files recovered that were deleted from the sd card, and again the other day on my laptop I noticed it. Oh, and I've also learned Dropbox and OneDrive are used for some of these illicit file transfers. I didn't even connect my hotmail account to my laptop this last reset and OneDrive shows as being active but the associated files are empty. There was also a .hidden Dropbox file on that SD card I had recovered.

    Other than jailbreaking a G1 many many years ago, I have limited knowledge about these things other than my own recent experiences. I'm a great researcher but I'm only getting the surface info, not the background for any resolutions. I do appreciate any and all thoughts tho. I'm literally at my wits end to stop the madness!! lol
     
  15. codesplice

    codesplice Elite Recognized Moderator
    Moderator

    A common scammer practice is to obtain a list of compromised credentials from various data breaches. I suspect that the password included in that email was one of those. You can check your email address at https://haveibeenpwned.com/ or even search for compromised passwords at https://haveibeenpwned.com/Passwords.

    If you ever reuse a compromised password then that really opens you up for attack. You should instead use a unique password for each and every service/account so that even if it does get compromised the impact is limited.
     
Loading...
Similar Threads - android lost directory
  1. coyote2
    Replies:
    1
    Views:
    63
  2. chinnar
    Replies:
    0
    Views:
    100
  3. Jennifer catron
    Replies:
    0
    Views:
    109
  4. Jennifer catron
    Replies:
    2
    Views:
    208
  5. sariDon2
    Replies:
    0
    Views:
    116
  6. jamstewonline
    Replies:
    0
    Views:
    95
  7. Sunshining
    Replies:
    2
    Views:
    286
  8. username988
    Replies:
    0
    Views:
    142
  9. jeff99
    Replies:
    7
    Views:
    334
  10. mdsousa
    Replies:
    3
    Views:
    363

Share This Page

Loading...