Nefarious Ways

"NefyWay"

Circa. (2015-2016)


"NefyWay" was an algorithmic set of protocols on onion server(s) to specifically "break the encryption chain...",

which allowed her executable's to discover and find criminals or predatory pedophiles

-who cowardly hid behind the veil of encrypted apps and programs.


Tech*


     Unlike malware such as Pegasus or phishing schemes, "NefyWay" used various algorithms and protocols on servers, initiated by the user (law enforcement, agencies, or parents). It employed specific techniques to "break" encryption chains or traditional exploits, depending on the target's device, app, or program. In 2015 and today, the encryption used by P2P apps and programs, which "NefyWay" algorithms relied upon, remains easily penetrable, simplifying the process of locating and identifying wrongdoers who attempt to hide behind encryption.


The Inconceivable Modern Reality 

    Since technology moves at such an impetuous or reckless murderous rate of corrigendum, versus the speed at which the laws are made to help “protect the innocent,”; the Laws are inconceivable obsolete(!)-by the time they are pressed into actions, they inevitably crumble under the definitions of the laws themselves.


Dubiously and Regrettably.....


     Unfortunately back in 2015-2016, any parent who might have used "NefyWay's" platform (even if it was for Parental reassurance or to find and discover the hidden identities of their child's online anonymous pedophile), the Parents themselves were actually "breaking the law"-because of the way our current laws are written.  :/

     So if a parent would discover or associate with a pedophile-their stored images, pics, videos..., the Parent themselves would be "guilty-by-association" and "accused" of being a Pedophile(s) themselves. :/


Our digital laws,

 which are to protect people,

 are outrageously and insanely outdated. 

:/


End of Line NOte:


"NefariousWays

was just another one of my rapid R&D projects,

which I did as a knee jerk reaction

 "to  protect the innocent..."


Yet, because of her inherent automated function(s) 

and our current "antiquated laws"...,

she was regrettably terminated

and now lives next to the

"Ark of the Covenant "...



  ... Eskimo ...  

Soap Box: 


      App Developers and Companies that are responsible for intentionally making "nefarious apps," programs, or websites*1. They should be held accountable or liable for making "bad programming" or illicit Marketing decisions; especially if they have 'intentional' or collateral damage or actions, which will cause harm to children, psychological imprints, or abuse... :/


     Intentionally making or designing an app(s) that have nefarious intrinsic programming or Marketing characteristics (which allow criminals & pedophiles to have easy access or associations with children-minors, or not correcting those faults, even after children have been harmed); then they are intentionally exploiting children for adult sexual and illicit gain(s); which inevitably add additional victims exponentially, all to profit from ads, links, and marketing ploys for financial or personal gain*2. 


     All app 'Makers' should be held accountable by their association, intrinsic actions, and applications; they innately become an "Accessory to Pedophile" as an avenue for intentional exploitation towards children and a crime by their purposeful illicit or Nefarious programming & Marketing actions; that Developer and Companies use to exploit children. 


...End of Lecture...

Tech*


    The standard level of " Pier to Pier " encryption (P2P) apps and programs that " NefyWay's " algorithm targeted (circa 2015/2016), was and still is (in 2021) extremely easy to breach and "break" the encryption chain... One of " NefyWay's " capabilities, was to use an automated set of "Frankenstein code(s)" to legally send unique "marking and indexing tag(s)"- with a modulating amplifying code, to inevitably fragment and " breach " the targeted (criminal or pedophile's) computer or phones app's or software's " authoritarian lines of code ", which sent a reciprocation code to instantaneously discover and identified the target (which included discovering and exploiting their Location-approximate location (network-based), Identity-find accounts on the device, Contacts-find accounts on the device, Storage-Phone-Device ID & call information/read phone status and identity, Photos/Media/Files read the contents of your USB storage/modify or delete the contents of your USB storage, Camera-take pictures and videos, Device ID & call information read phone status and identity, "Other"-receive data from Internet-view network connections-change system display settings-full network access-change your audio settings-use accounts on the device-prevent device from sleeping, modify system settings-run at startup)


   Once a "Target" is identified, her secondary protocols were to verify the validity of the online user-criminal or pedophile's persona, age, etc., from within their phone's app settings and permissions. If the user's persona or age (child 0-16) did not match (within specific reasonable parameters) from the discovered settings, permissions, indexes, and now "known" Online Social Accounts "databases" like FB, Instagram, Twitter, Snapchat, Amazon, Google, etc. " NefyWay " would automatically send "traffic," "bait," or a "payload" to instantaneously inject malware, or by default "intentionally freeze-in" the target's phone, apps, associated associations, and accounts. This aids law enforcement, prosecution, evidence collection, for future legal reason (posterity), or to derive a phycological effect on the user. 

Additional "Notes"

*1 Onion server or Onion routing is a technique for anonymous communication. By default, it is not indexed by HTTP severs, so you can only discoverer them if someone directly gives you the web address or by referral. Non indexed sites hopefully would prevent "bad" people from discovering and taking advantage of the system/program.

* 2. "Apps" are one-click launch programs, which may offer simplify yet sophisticated procedures, operations, websites, chat software, encrypted, or program. Still, more-over this allows developers or companies to control user content, exploit "user privacy" and gain inevitably monetary gain from the user....You. :(

*3 They will never intentional changing their Marketing and Programming characteristics, because they would rather make money from the exploitation of children; which would hamper or slow new member accounts. By adding a validation of e-mail conformation, a simple change would easily cut erroneous and bogus accounts by 92%.

Share by: