SlideShare a Scribd company logo
1 of 10
GOD’S EYE
-Tracking you
*Introduction
*Initial thoughts
*Working
*Usage
*Conclusion
*It was supposed to be a hacking
program.
*Invented by Jonathan James and
Aaron Swartz.
*From their thoughts as a source.
*Developed with a program, even they
can’t decrypt it.
*To introduce an advance search.
*Should track anyone anywhere in the
world.
*Be in a flash drive.
*Should carry anywhere.
*Can’t be decrypted.
*Can’t be used by any other hacker.
*Basically God's Eye is a software that
is able to access any anything that is
digital.
*It is able to hack phones to computers
and to satellites..., and see what is
around it and find anybody
*It receives the data whatever it tracks
and stores in a device having
1000yottabites of space.
*In Canada, the prototype got illegally
used by cops.
*Taken 4 streets as a track.
*Results are good.
*With a blur quality of pics, poor video.
*Possibilities are very less to use this
software with the present day
technology.
*It needs a very huge space to store
the data.
*Connectivity: as speed as a rocket.
God’s eye - Technology
God’s eye - Technology

More Related Content

What's hot

What's hot (20)

Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Anti forense
Anti forenseAnti forense
Anti forense
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Android simple calculator
Android simple calculatorAndroid simple calculator
Android simple calculator
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
File000152
File000152File000152
File000152
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Installing Windows 10 in VirtualBox
Installing Windows 10 in VirtualBoxInstalling Windows 10 in VirtualBox
Installing Windows 10 in VirtualBox
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Kismet
KismetKismet
Kismet
 

Viewers also liked

Viewers also liked (9)

On taxonomies of code and how to hack it
On taxonomies of code and how to hack itOn taxonomies of code and how to hack it
On taxonomies of code and how to hack it
 
Hack programming language
Hack programming languageHack programming language
Hack programming language
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
30 Brilliant marketing growth hack cards.
30 Brilliant marketing growth hack cards.30 Brilliant marketing growth hack cards.
30 Brilliant marketing growth hack cards.
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
10 Event Technology Trends to Watch in 2016
10 Event Technology Trends to Watch in 201610 Event Technology Trends to Watch in 2016
10 Event Technology Trends to Watch in 2016
 
Publishing Production: From the Desktop to the Cloud
Publishing Production: From the Desktop to the CloudPublishing Production: From the Desktop to the Cloud
Publishing Production: From the Desktop to the Cloud
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking Resources
 

Similar to God’s eye - Technology

Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
faithxdunce63732
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
Laura Aviles
 
Internet History
Internet HistoryInternet History
Internet History
techwork7
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
100656472mercier
 

Similar to God’s eye - Technology (20)

Dark Net
Dark NetDark Net
Dark Net
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Deep web
Deep webDeep web
Deep web
 
Software-Defined Radio Presentation
Software-Defined Radio PresentationSoftware-Defined Radio Presentation
Software-Defined Radio Presentation
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Darknet
DarknetDarknet
Darknet
 
Internet History
Internet HistoryInternet History
Internet History
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep and dark web
Deep and dark web Deep and dark web
Deep and dark web
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
The Potential of the Hacker's Search Engine
The Potential of the Hacker's Search EngineThe Potential of the Hacker's Search Engine
The Potential of the Hacker's Search Engine
 
Dark net
Dark netDark net
Dark net
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

God’s eye - Technology

  • 3. *It was supposed to be a hacking program. *Invented by Jonathan James and Aaron Swartz. *From their thoughts as a source. *Developed with a program, even they can’t decrypt it.
  • 4.
  • 5. *To introduce an advance search. *Should track anyone anywhere in the world. *Be in a flash drive. *Should carry anywhere. *Can’t be decrypted. *Can’t be used by any other hacker.
  • 6. *Basically God's Eye is a software that is able to access any anything that is digital. *It is able to hack phones to computers and to satellites..., and see what is around it and find anybody *It receives the data whatever it tracks and stores in a device having 1000yottabites of space.
  • 7. *In Canada, the prototype got illegally used by cops. *Taken 4 streets as a track. *Results are good. *With a blur quality of pics, poor video.
  • 8. *Possibilities are very less to use this software with the present day technology. *It needs a very huge space to store the data. *Connectivity: as speed as a rocket.