Hackers are everywhere. People know about them, they know very little except movies. Hackers are everyone. Every human within an internet connection is, was or can be a hacker. Hackers have jobs, flip burgers to owning businesses. Hackers are journalists, writers, speakers and hackers are on the front lines of protests. Hackers are thought of to be bad like hacks which are considered viruses to regular people. Hackers use hacks and some hackers are looking for revenge while others are protecting. Then there are humans like me, humans who went to far in the internet's early-prime. Some of us figured out that changing numbers looking at the number sets and learning to decode encrypted text was the way the Internet worked. After that the Internet becomes a game of, "on/off, on/off, on/off," and the computer is the machine that drives you through the abyss of code. The heads of the Internet designed it to be unbreakable and we broke it. Yeah ego got to our heads but we figured it out, we can improve it! We were shut down many times in the past with so many arrested with long sentences to scare the hackers. It failed, hackers got pissed, online they erupted and took down site after site destroying every thing in their path! They laid a secret "open source world" but they didn't know it yet. Since the hackers were so powerful the computer companies created even stronger encrypting systems, hiding them between layers of randomizers. They struck with force then the only sliver of hacker existence was through viruses but they really weren't. The government increased Internet and privacy laws to put hackers away longer and longer. Many hackers during these raids were 16 - 28 years old, I was in this bracket, I was hit and I was out away on 3 accounts stolen but I created them okay one was stolen. I was also given 3 accounts of non criminal hacking for digital protests and building a hacking device. 10 years in a state pen probably wouldn't be so bad if I wouldn't keep getting in trouble. After being convicted at 18 I was locked with stoners. They knew I'd be easily killed if I was put with the bigger groups. The stoner pit was great. People could get stuff in easily and did what all I could. I knew how to build, design, network and hide. Me and Gary set up and made black-boxes to do all sorts from turn on devices and set up relays to do random absurdities like call in 50 pizzas to my jail cell every Friday. Gary isn't a fried but someone who was better at math than me. I never met him personally but he wrote the code scripts and the put together a way to get me many pre-made circuit boards. Other people got us speakers, switches and lith-batteries but i had two jobs in this process. Gary could do long complicated math equations and do short scripts but I could memorize these scripts one letter at a time and I knew Morse Code. I programmed the chips with the scripts. I would work every evening, every second I could work I did work. I was going well for almost 2 years until a guard decided to ask questions. I was laying down coding away, "P 9 G E..." a new guard noticed the clicking noises and entered my room. At that very second, I lost my place, pulled my magnetic-nail and went for the neck. I didn't notice it was guard until after I wiped his blood off my face. The blood went everywhere and the other guards locked him in. So while we waited for help i smoked the guards cigarettes, puked by the door and spoke to the guard, "I didn't know who you were. I was afraid it was a bad human. If you would sit up you might live and use pressure," the guard sat up and I told him about how people stare at me so I can't sleep and I went on and on and on not once saying, "there's a Morse code machine in my pillowcase." The guard didn't press charges and after that the guard understood why other guards didn't enter my room not even for a medical emergency. I was in confinement after that, no more fun in there. The moment I got out of jail, I'm shipped half way across my state and dropped off at an empty lot. The land my parents were living on when I was arrested was bought, my parents was forced to move and the building was destroyed. I have $500 no where to live and it seems everything is against me. I'm ready thou, so I sit on the curb present myself with my used government issued smartphone and download cyberghost, shadow sockets, Tor Orbot, Tor fox and Fire.Onion. I start cyberghost, once Tor and related is downloaded, I start with Tor Orbot. It bootstraps me to .onion and I want to be there. I wait for it to finish, I wrap my device and it locks my cyberghost to on. So cyberghost keeps changing my IP address with a false mask but I'm also relayed across the globe. I then use Fire.Onion browser for searching and finding sites but Tor Fox for coding and powershell navigation. Every move I do is educated and timed to seem like a bot, I'm trying to hide in 70% of all internet traffic. I never refresh, I always wait for the page to load, if it doesn't...I use powershell navigation to find my link, picture hash and more. Going back doesn't exist, your looking at your cached files but my phone won't hold a cache thanks to a change of settings and shadow sockets allows internet traffic with corresponding pgp keys or similar to find me no matter my IP. I don't always run shadow only when I'm expecting something. So I need money, bitcoin & altcoin! I hit my home screen button, jump to Google play and get Xapo, Ethereum & Protonmail among faucets. These downloads take time but I need a Wi-Fi or land line for what's next. I walk further into this bushelling Christian town to the first Nat-Food service with a viewable Wi-Fi. I grab a sniffer, 3-D mapper and a couple brute force setups. I use the sniffer to find the "invisible" version of the "guest" Wi-Fi. It's the same name, used by most handheld POS so a Taffer-bar or National-chain are usual spots. I get my order receipt with my employee name & number. I shall have terminal number, time stamp and transaction ID/approval ID...I have a cash purchase, this is how I knew there was an invisible Wi-Fi. Transaction ID or Approval ID indicates the terminal is a subsystem or sister system so there inventory system is online and/or so are their books. A guest internet can be "limited" so I force my way into the "invisible router" add my shadow socket ID (S5) as an IP. Then I reset the router to get my S5 to attach, once it's back online I activate my shadow socket and download the chain for bitcoin and Ethereum, I set up half a dozen other altcoin accounts but then I get board. I surf the businesses records for fun while I eat. I look through personal names and numbers but then accidently in the word file there's a IP noted. Why have a reason footer just be "noted [IP address]" there's gotta be something else there. I look for that IP and it's local, okay I'm hoping it's the gate to the order and POS terminals. I can't connect, oh yes this is it. A simple SSL/SSH unknown IP just won't do. I mask my already multi-layered IP mask to mimic the router, so the net mesh will just consider one of the duped IPs to be fake but only one at a time, alternating until one dissipates or needs to take further action. Once I'm in I remove my mimic mask, don't need the slow down but wait on this phone my internet is cut. My terminal is running though. I'm a bit flabbergasted when I notice the employee number and terminal number. I drop out and return back to the invisible router to search the business and name of my server to find their facebook profile. I try to get a pic of the servers face while they work, I get one and search Google by image. I get their family photo, posted by their mother maybe but they are tagged. In bolder blue font there's the servers name. I click on it...right now normal restrictions and more would keep away from seeing this profile but I'm hidden within a hidden-.onion.facebook-gate to this profile. I had to copy the facebook added portion of the hyperlink. Then find the Tor 808 entrance for facebook, enter, add the facebook add and click that name. Bam, there I can see almost everything posted but it's cached files ATM, I don't have access to the live stream .onion gate, yet. Cached is fine because here's favorite human, dog, food, etc and through cached photos I'll find names of humans, pets, schools, jobs, family, friends. Through their blocked list I find these enemies maybe pretending to be over of these could help or knowing their names could wave me. I insert the new data into my brute force machines. I go back to the transfer gate and mimic the router to pass the gate then I find the terminal they worked at and brute their password to order more food, to-go, I'm downloaded.
Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
If you enjoyed what you read here, create your account today and start earning FREE STEEM!