You may get charged for Extreme Watching Porn, you are being watched on webcam

Do you watch porn to an extreme level? Do you keep on searching for new free porn sites for new content? Extreme Watching Porn is fine, but let me tell you some dark sites of watching extreme level porn that will make you rethink it.

You are an easy hacker target without your knowledge by looking at porn. With the increasing number of porn viewers, hackers can easily target their masses. They hack your system and record your webcam activities, and you don’t get any clues about it.

What actually happens?

The hackers install one malware on their laptop or PC to record the users’ online activities and record the porn on webcam. Now, the hackers send users a message and ask for money. The video is attached. Even if the user denies money, they are in danger of mailing this video to all their contacts. The criminals are therefore obliging users to pay cash and this case in the cybercrime community is classified as Sextortion.

The hackers will start sending the user mails full of Sextortion, to emotionally blackmail them and make them pay the money they have demanded. In most cases, users are asked to pay via bitcoins. But normally users keep avoiding such mails, but the hacker has the way out. They will send some online private links to those videos.

Even a few days ago these mails are considered spam by the major email providers like Google, Apple, Yahoo, Microsoft, etc. But hackers have become smarter enough to structure the message in such a way the spam filters are also getting fooled and enters directly in the user’s inbox.

However, the only matter of relief is that Google, Apple, and Microsoft are now developing technology to prevent such scams. We hope this will end soon, moreover ban pron from your browsing habit.

How you can be safe?

The simplest way is,

Say No to PORN

But still, to be on the safe side, you can

Disable Your Webcam

Windows:

Press windows key -> search “Device Manager” -> click on it -> find “Imaging Device” or “Cameras” dropdown -> Click to expand -> You will find you camera name listed -> right click on the name -> click disabled.

MacBooks:

  1. Open the terminal and type in the command below. Note that if you do not want a backup made, you may save this phase but retain a backup, so you can reverse the process should you want to use your camera again. In this phase, we are going to create a backup of the script.
    mkdir /System/Library/QuickTime/.iSightBackup
  2. It’s now time to move the Quick Time component of the iSight camera (which enables apps to access it) to the backup folder we created in step
    • Use the following command:
      sudo mv
      System/Library/QuickTime/QuickTimeUSBVDCDigitizer.component
      /System/Library/QuickTime/ .SightBackup/
  3. Reboot and you are done!

In case you want to use the camera again, just put the file QuickTimeUSBVDCDIgitizer.component in the following directory /system/library/quicktime and reboot.

Ubuntu:

Run: gksu gedit /etc/modprobe.d/blacklist.conf

Add blacklist uvcvideo at the bottom. Save the file and quit the text editor.

Regarding the comment:

Find the vendor and device id for the webcam with lsusb:

Bus 001 Device 002: ID 05a9:2640 OmniVision Technologies, Inc. OV2640 Webcam

Next …

cd /sys/bus/usb/devices/
ls 

Do a “grep” on the vendor id and product id:

$ grep 05a9 */idVendor
1-1/idVendor:05a9

$ grep 2640 */idProduct
1-1/idProduct:2640

and 1-1 is what you need. cd into 1-1.

The file, bConfigurationValue in this directory, needs to contain a 0 to disable the device or a 1 to enable it. But this file is owned by root so to alter it (change the 0 to a 1 to enable) …

 sudo -i
 echo 0 > bConfigurationValue

to disable. You can check the camera and it will be disabled.

This is not permanent yet. A reboot will set it back to what it was before. To make it permanent:

 sudo -i
 echo 0 > /sys/bus/usb/devices/1-1/bConfigurationValue

(where 1-1 is the directory we used and use a 1 to enable)

Pingback: Are hotel bookings safe for couples in India anymore?

Pingback: Let’s break down the concept of big data

Pingback: What Blockchain Technology Means

 

Leave a Reply