-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
cdbb915
commit 5cc34b5
Showing
2 changed files
with
144 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,133 @@ | ||
[![Sponsor](https://img.shields.io/badge/sponsor-GitHub-green)](https://github.com/sponsors/dedsec1121fk) | ||
[![Bluesky](https://img.shields.io/badge/Bluesky-@dedsec1121fk-green)](https://bsky.app/profile/dedsec1121fk.bsky.social) | ||
[![Instagram](https://img.shields.io/badge/Instagram-@loukas_floros-green)](https://www.instagram.com/loukas_floros/profilecard/?igsh=MnR2eTdxaTN5ZHZi) | ||
|
||
Click the titles to read! | ||
|
||
<details> | ||
<summary>### DedSec Project Introduction</summary> | ||
The **DedSec Project** is a versatile collection of tools aimed at advancing cybersecurity, secure communication, and automation. It offers a range of features for anonymous data collection, real-time monitoring, and personal environment customization, all designed to be used ethically and responsibly. Whether you're looking to test phishing defenses, build private servers, or communicate anonymously, DedSec has tools tailored for your needs. | ||
|
||
## The Truth About Government Surveillance: We're Being Controlled | ||
|
||
You think you're free? Think again. Governments have made it clear—they’re not just watching us, they’re controlling us. The systems they’ve built around surveillance, data collection, and manipulation are more pervasive than ever before. It’s not about security or safety; it’s about maintaining power. In a world where every click, every message, every step we take is monitored, we’ve lost more than just privacy. We’ve lost control. | ||
|
||
### **Surveillance: The All-Seeing Eye That Never Blinks** | ||
|
||
We live in a time where surveillance has become normalized, so much so that most of us don't even notice it anymore. Every time you unlock your phone, every time you log into a website, every time you share something on social media, you’re being watched. And it’s not just the government—corporations, too, have their eyes on you. They’ve created an entire ecosystem designed to monitor, record, and analyze your every move. | ||
|
||
Governments around the world justify this surveillance with promises of safety—terrorism, crime, and national security, they say. But the reality is far darker. The systems they’ve built, from mass data collection to facial recognition technology, aren’t just for monitoring criminals or terrorists. They’re for monitoring everyone. The same tools that are supposedly used to protect you are also used to track your movements, understand your habits, and control your behavior. | ||
|
||
What’s worse, most of us willingly give up our privacy for the sake of convenience. Every time you click "I agree" without reading the terms, you’re handing over your data. Every time you use a free service, you're being tracked. And the worst part? We’ve come to accept it. We’ve been conditioned to believe that privacy is a luxury, not a right. The government doesn't need to break down your door anymore—they already have access to your life through your devices. | ||
|
||
### **Data: The New Currency of Control** | ||
|
||
In the digital age, your data is more valuable than anything else. Your personal information is a commodity—sold to the highest bidder, used to shape your actions, and even to control your decisions. It’s not just the government that profits from your data; corporations, too, are raking in billions. Every click you make, every search you perform, every time you buy something online, your data is being collected and sold. And it’s not just used to target ads—it’s used to control you. | ||
|
||
Think about it: Have you ever wondered why your social media feed is always full of things you’re interested in? Why you see certain political posts or news stories over and over? It’s not a coincidence. The algorithms are designed to reinforce your existing beliefs and keep you engaged, to keep you hooked. The more time you spend online, the more data you generate, and the more control the system has over you. | ||
|
||
But it goes deeper than that. Your data isn’t just about marketing—it’s about shaping your behavior. Governments use the same data to predict what you’ll do next, to suppress dissent, and to keep you in line. If you’re not playing by their rules, they can use your data to target you, track you, and even destroy your reputation. They can discredit you, manipulate public opinion, and control the narrative. | ||
|
||
And what do you get in return? A few “free” apps, a better shopping experience? It’s not worth it. You’re being sold, and you don’t even realize it. | ||
|
||
### **The Manipulation of Truth: The System Controls What You See** | ||
|
||
In *Watch Dogs*, ctOS isn’t just a surveillance system—it’s a propaganda machine. It controls the flow of information, shaping how people think and what they believe. And in the real world, the system is no different. Governments, media outlets, and corporations have found ways to control the narrative, shaping public opinion and steering the masses in the direction they want. | ||
|
||
News isn’t just information anymore—it’s a tool of power. It’s not about reporting the truth; it’s about shaping a narrative that serves those in power. The news you see on your screen, the stories that dominate the headlines, and the social media posts you interact with are all curated to fit an agenda. And the more you consume, the more the system shapes your view of the world. You’re not just reading news—you’re being manipulated. | ||
|
||
But it’s not just about controlling the news. The algorithms that power social media and search engines also play a role in controlling what you see. These algorithms are designed to keep you engaged, to feed you content that keeps you scrolling, clicking, and consuming. And they’re not neutral—they’re designed to reinforce your biases, to make you think you’re right, to make you feel like your worldview is the only one that matters. | ||
|
||
In this world, truth is malleable. It’s not about facts—it’s about control. And the more you’re shaped by the content you consume, the less control you have over your own thoughts. | ||
|
||
### **Control: The Invisible Chains** | ||
|
||
It’s not just about surveillance. It’s about control. When governments and corporations know everything about you—your habits, your beliefs, your desires—they can control what you do, how you think, and even how you vote. The systems they’ve built aren’t just watching you; they’re guiding you, nudging you in the direction they want you to go. They know what you want before you do. They know what you fear, what you desire, and what will make you act. | ||
|
||
It’s a subtle form of control. You don’t even realize it’s happening. Every time you see an ad that perfectly matches your needs, every time a post reinforces your beliefs, every time you’re pushed toward a decision that benefits the system—it’s all part of the plan. You’re not making choices. The system is making them for you. | ||
|
||
And it’s not just about influencing you in small ways. Governments can use your data to suppress opposition, to target activists, to silence dissent. If you challenge the status quo, the system can use everything it knows about you to discredit you, to ruin your reputation, to shut you down. They can track your movements, predict your actions, and manipulate your surroundings to keep you in line. | ||
|
||
### **Reclaiming Control: It’s Time to Fight Back** | ||
|
||
But it doesn’t have to be this way. You’re not powerless. We have the tools to fight back, to take control of our own lives and our own data. Just like DedSec in *Watch Dogs*, we can expose the system, tear down the surveillance state, and reclaim our freedom. | ||
|
||
It starts with awareness. You need to understand what’s really going on before you can fight back. Stop blindly accepting the terms and conditions. Use encryption. Protect your privacy. Start questioning everything. Why do they need your data? Why are they tracking you? Who’s controlling the narrative, and why? | ||
|
||
The truth is out there, and it’s up to us to expose it. We can fight for stronger privacy laws, demand transparency from the companies and governments that collect our data, and hold them accountable for how they use it. We can use technology to protect ourselves, to secure our communications, and to reclaim our privacy. | ||
|
||
It’s time to wake up. It’s time to stop being complicit in your own surveillance. You don’t have to be a product. You don’t have to be controlled. The system is built on your complacency, but you have the power to tear it down. | ||
|
||
We’ve been given the tools to fight back, to resist the systems of control that are being built around us. It’s time to start using them. The fight for freedom isn’t just about resisting the physical chains—it’s about rejecting the digital chains that bind us. The truth is that we’re not just products to be sold—we are people, and it’s time to take back control of our lives, our data, and our future. The system is rigged, but it’s not invincible. We have the power to break it. | ||
|
||
**Disclaimer:** The tools in this repository are strictly for educational and ethical use. Misuse or unauthorized deployment may lead to legal consequences. | ||
</details> | ||
|
||
--- | ||
|
||
<details> | ||
<summary>### Features</summary> | ||
|
||
#### 1. Secure Communication | ||
- **DedSec's Chat**: Enables anonymous chatting for 8 users. No chats are saved, ensuring complete privacy; files can be shared. | ||
- **Fox Chat**: Enables anonymous chatting for unlimited users. No chats are saved, ensuring complete privacy; files can be shared. | ||
|
||
#### 2. Camera Tools | ||
- **Camera Phish**: Share a link to capture continuous images from the front or back camera (user's choice). Images are saved automatically in `Internal Storage/Download/Camera-Phish`. | ||
|
||
#### 3. Audio Recording | ||
- **Sound Recording**: Share a link to record high-quality audio. Recordings are saved in `Internal Storage/Download/Recordings`. | ||
|
||
#### 4. Geolocation Tools | ||
- **Live Location Tracker**: Retrieve real-time GPS coordinates and street details via shared links. | ||
|
||
#### 5. Database Management | ||
- **DedSec Database**: Build and manage personal databases or servers. Includes efficient search, retrieval, and export features for organized data management. | ||
|
||
#### 6. Phishing Simulations | ||
- **Donation Phishing**: Create phishing templates for controlled simulations, improving awareness and security measures. | ||
|
||
#### 7. Radio Mode | ||
- Provides a personalized music experience by playing shuffled audio files from user-defined folders. | ||
- Users can select "stations" (folders) from a dedicated directory (`~/DedSec/Radio Mode`). | ||
- Features controls for stopping, continuing, and switching between stations, all accessible through an intuitive terminal interface. | ||
- Designed for entertainment while maintaining the DedSecOS aesthetic and functionality. | ||
|
||
#### 8. Authentication Framework | ||
- **T-Login**: Secure multi-user authentication with encryption, session tracking, and audit logging. | ||
|
||
#### 9. Customization | ||
- **Customization Tool**: Modify terminal settings like color schemes, fonts, and layouts. Save and load profiles to automate repetitive tasks. | ||
</details> | ||
|
||
--- | ||
|
||
<details> | ||
<summary>### Why DedSec?</summary> | ||
With DedSec, users can: | ||
- **Ethically Collect Data**: Use secure links to gather images, recordings, or location details for testing and analysis. | ||
- **Communicate Anonymously**: Chat without leaving a trace. | ||
- **Simulate Attacks**: Conduct phishing tests to identify and improve system weaknesses. | ||
- **Customize Workflows**: Personalize environments for efficiency. | ||
- **Gather Intelligence**: Automate OSINT tasks for research and analysis. | ||
</details> | ||
|
||
--- | ||
|
||
<details> | ||
<summary>### Storage Paths</summary> | ||
- **Images**: `Internal Storage/Download/Camera-Phish` | ||
- **Audio**: `Internal Storage/Download/Recordings` | ||
</details> | ||
|
||
--- | ||
|
||
<details> | ||
<summary>### Legal & Ethical Usage</summary> | ||
1. Obtain explicit permission from system owners before deployment. | ||
2. Follow all applicable local, national, and international laws. | ||
3. DedSec is designed for ethical use only—misuse is strictly prohibited. | ||
|
||
**DedSec empowers innovation, education, and cybersecurity research. Use it to make a positive impact!** | ||
</details> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
07/01/2025 Removed OSINTDS,added more artists to Radio Mode,added html websites to camera,location,recording h4cks,fixed some bugs. | ||
|
||
01/01/2025 Added Radio Mode with currently 20 Songs from 3 different artists to choose to listen while doing your things,re-designed the menu,added a Real Identity file with password to ensure the project won't get copied and last added a barcode poster so you can download it,print it and paste it somewhere you want! | ||
|
||
25/12/2024 Serveo Tunnel stopped working,but I found other way to make links public,so check Make Your Links Public.md to see how,is easy and simple! | ||
|
||
23/12/2024 First I created this file,lol,second,radio mode with unpopular Greek artists in some music genders like rap,rock,punk etc will be added to the main menu so you can listen to some music while doing your things,so stay tuned! | ||
|
||
22/12/2024 Now you have an easily menu accessable everytime you open the Terminal,so even the dumb users can use the project,check the Tutorial.md for further information! | ||
|
||
15/12/2024 Chats are now supporting no character limit for usernames,file sharing and emojis! |