TikTok & The F.B.I. - Star Crossed Lovers

21

  • 3
  • 0
  • 0.013
  • Reply

  • Open in the desktop app ADD TO PLAYLIST

    bitcoingodmode

    Published on Jan 12, 2022
    About :

    The following is a screen recording of recent activity on a Samsung Galaxy S 20 plus, from January 3rd, 2022. It shows the device installing, then initializing, the Android version of the application known as TickTock, obtained from Google's Play Store. The intention is to investigate the sources of any network requests received from the TikTok application.

    There is a firewall installed on this device. So, requests from any I.P. addresses that are not whitelisted within the firewall's filters, are initially blocked and treated as pending. A corresponding notification will then be delivered. The user can then examine the request and determine whether or not the connection should be permitted.

    The firewall app keeps a detailed activity log of all requests. Any I.P. addresses originating from TikTok requesting a connection to the network, are recorded for analysis. Immediately proceeding the running of the TikTok application, 45 pending requests from new, individully unique IP addresses are logged. As the screen recording reveals, this activity occurs less than 10 seconds after the app is installed. The total number of blocked requests was 161, all occuring within a 2 minute period proceeding the install. It is noted this is not typical app behavior, and ultimately is a gross misuse of network resources. This tactic not only proves to be counterintuitive, but also exemplifies the obvious amateur coding abilities of the development team. These substandard techniques also reveal a true lack of proficiency and imagination in the overall design and implementation of the entire application. A more obfuscated approach to these, high school hacker level methods, could have been easily implemented on a passive level with minimal possibility of user detection or interaction.

    The bombardment of new and repeated requests continue to be recorded by the firewall. The persistent application behavior shows a clear lack of concern from the developer regarding the volume of user data the application consumes, as well as a complete disregard toward the potential expenditure on the hardware of any devices handling the traffic. It is noted that the majority of these requests appear to be originating from IP addresses located in the same subnet. The subnet is owned by Akamai Technologies, which is a cloud computing company based out of Massachusetts.

    One of these addresses is selected at random to investigate further. A visual traceroute is run on the address. Results will provide an estimated geographic location of the requesting IP address, as well as the location of any network hops between source and endpoint. The software utilized for geo-locating is known as intrace. Intrace determined the coordinates of the address requesting access to our device through the TikTok application to be within a close, logistically feasible proximity, either inside or around, the building for the Federal Bureau of Investigation, in Newark, NJ.

    End transmission.

    Tags :

    hive tiktok 3speak conspiracy internet fbi intro

    Woo! This creator can upvote comments using 3speak's stake today because they are a top performing creator! Leave a quality comment relating to their content and you could receive an upvote worth at least a dollar.

    Their limit for today is $0!
    Comments:
    Time until bitcoingodmode can give away $0 to their commenters.
    0 Days 0 Hours 0 Minutes 0 Seconds
    Reply:

    To comment on this video please connect a HIVE account to your profile: Connect HIVE Account

    bitcoingodmode has no more videos yet.

    More Videos

    03:14
    9 views 4 years ago $
    06:20
    35 views 2 years ago $
    01:11
    46 views 2 years ago $
    02:20
    39 views 3 years ago $