WARNING! Connection Time-out Errors ensures my server is down ATT Routers have serious issues which can cause damage to your hardware, bandwidth, and more.

The following is where I was at in reference to investigating this topic a mere 5 days ago (before starting this web page):


YouTube censored another username off the Public Internet

(only one video was uploaded on there!).

The Photo below shows what my 50mb download agreement looks like every now and then. What if I pay $1 less to the monopoly next month? That's right, they'll penalize with interest and ultimately penalties. To be clear, we are the victims in the agreement with monopolies but have the association completely de-programmed from our memory banks (in other words if I slighted you in an agreement, you'd be at my house with pitch-forks and fists; but when a monopoly slights us we MIGHT write to one of their public relations group such as our Attorney General or FCC or FTC or Consumer Affairs or ....I can tell you from experience that this method only marginally works and it won't work at all without a LOT of work on your part to gain some semblance of recompense).

This is what over $50 in 2017 will get you from a monopoly
The screenshot above shows what my over $50.00 per month (well over half a thousand dollars each year) will get you, which is an all-too common unfair problem. For me, it insures that nobody will see or hear my website, but this is a rampant Enron-type occurrence. When we go to the store and buy a chicken breast but after paying find out it is a chicken wing at best, what's the compensation? Why is it we are not given a partial refund based on the Provider's inability to deliver their part in our agreements with them?

How can communications stay up with this controlled service by the monopoly interests?

The following is from ATT's web site where their customers are "free" (variable word) to leave comments about problems with the AT&T Routers. The reason you see the stated reason "cloned account" on the notice shown below, is due to the root of the problem (obviously it would be due to the ATT monopoly censoring off my original user name). When something is important to solve or know, one might go an extra few steps forward by making another user name.
(would you believe I've been banned using their site in 4 or 5 usernames now?)

Stifled and Censored from public consideration
The problem with censorship is that it hides truth and manipulates pro-ruling interests, which in turn create profits to the monopoly at the expense of the next fish victim customer.
(good for business, bad for us humans).

Keep in mind that I'm trying to get involved in solving a problem that the general public should also be made aware of since it affects them also (and possibly in a very bad way).

What makes a seemingly simple task so hard to do (tell others to prepare themselves and give valid reasons why), is when the monopoly is the controller I'm using to attempt to warn the public (not against monopolies even, it's more important I inform the public that it is NOT their computer and probably hasn't anything to do with the websites that they are visiting that causes their computer to run slow at times (or do quirky things which forces the fish back to the computer repair store).

So now it's time to host without the dictators.
Irrefutable Video Evidence is forthcoming on this website (God willing).

The fact is, I have video evidence that the ATT newly installed router CAME with a Trojan Horse installed in the router/modem provided by ATT.

Now this might not seem to concern you, right? Well before assuming the programmed statement of: "oh I don't care what they are doing or what happens, anyone watching me will be bored to death", or the other one, "Oh I don't do anything on the net and have nothing really important on there anyway", consider the notion that the minute you connect a cable to the IP Provider, your connection is two-way.

Two way communications has come a long way since our mom and pop's day. One need only basic classes to know how to manipulate communications. In 2018, it's a bloody cornucopia of science.

Even if your computer is off, when was the last time you inspected the devices on the motherboard inside that modem/router? Last year? Never?
Now that's blind faith in action. God would be jealous.

I first started documenting the hacks back in 2014 (but I was aware of the problems about 7 years prior). Here's a couple of the older sites in which I've done my retarded best at documenting only a COUPLE of the issues: One, Two.

If anyone wants more "credible" sources that speak a better English than I, here's your sign:

This one is from GADGET REVIEW

This one is from JUDICIARY REPORT: http://www.judiciaryreport.com/att_u_verse_hacked.htm

This one is from ZDNET: https://www.zdnet.com/article/flaws-in-att-routers-put-customers-at-risk/

There's tons more on the Internet and I won't be adding links to compile a conclusive list (what's the point, the powers that be ensure the links are working today and gone tomorrow). But here's a few from AT&T's own Website. Listen to what the people are commenting about here:



The following link is Another ATT Website with customers' claims of problems


*Will add personal video here

This one is from the ATT Website


Let's hear from Zack:

Router flaws put AT&T customers at hacking risk
Zack Whittaker
By Zack Whittaker for Zero Day | September 4, 2017 -- 13:23 GMT (06:23 PDT) | Topic: Security

Thousands of routers, many of which belong to AT&T U-verse customers, can be easily and remotely hacked through several critical security vulnerabilities.
Five flaws were found in common consumer Arris routers used by AT&T customers and other internet providers around the world. The flaws were detailed in a blog post by Joseph Hutchins, who described some of the them as being as a result of "pure carelessness" by the IP Providers.
The report said Arris NVG589 and NVG599 modems with the latest 9.2.2 firmware are affected, but it's not clear who's responsible for the bugs.
Hutchins said that some of the flaws may have been introduced after the routers were delivered to the internet provider, which often adds customized code for remote interactions, such as customer support and diagnostics.
"Some of the problems discussed here affect most AT&T U-verse modems regardless of the OEM, while others seem to be OEM specific," said Hutchins. "So it is not easy to tell who is responsible for this situation. It could be either, or more likely, it could be both."
Among the vulnerabilities are hard-coded credentials, which can allow "root" remote access to an affected device, giving an attacker full control over the router. An attacker can connect to an affected router and log-in with a publicly-disclosed username and password, granting access to the modem's menu-driven shell. An attacker can view and change the Wi-Fi router name and password, and alter the network's setup, such as rerouting internet traffic to a malicious server.
The shell also allows the attacker to control a module that's dedicated to injecting advertisements into unencrypted web traffic, a common tactic used by internet providers and other web companies. Hutchins said that there was "no clear evidence" to suggest the module was running but noted that it was still vulnerable, allowing an attacker to inject their own money-making ad campaigns or malware. Here are 2017's biggest hacks, leaks, and data breaches so far
Here are 2017's biggest hacks, leaks, and data breaches so far
Dozens of data breaches, millions of people affected. Read More
Buggy routers don't always lead to unauthorized network access, but can instead be hijacked as part of botnet operations, like Mirai, which when powered up can target and throw websites and services offline.
Rapid7 reported the vulnerability as an 8/10, on the higher end of the severity scale.
It's not known exactly how many devices are affected, however.
One estimation said as many as 138,000 routers are vulnerable to attackers, according to a tweet by Victor Gevers, chairman of the GDI Foundation, a Dutch non-profit organization dedicated to internet security. The numbers are more nuanced, he explained, and the vulnerabilities are not limited to the hardcoded credentials flaw.
Another bug affects "every single" Arris-built AT&T U-verse device, according to Hutchins, putting potentially millions of customers at risk.
An attacker can bypass the firewall on the device by brute-forcing the half-completed MAC address on the device. Hutchins said that he believes the bug allows AT&T staff to connect to an AT&T-issued television digital recorder on the same network, but the implementation went "terribly wrong."
He said that this "most widespread vulnerability" has the easiest fix. Hutchins has published several self-mitigation methods on the blog.
Hutchins said it was "hard to believe" that the flaws are not being actively exploited.
A spokesperson for Arris said the company wouldn't comment on specifics as it was "currently verifying" the report. "We can confirm ARRIS is conducting a full investigation in parallel and will quickly take any required actions to protect the subscribers who use our devices," the spokesperson said.
AT&T did not respond to a request for comment outside business hours. (Monday is a US national holiday.) We'll update if that changes.

Security Alert: AT&T customers with Arris modems at risk of remote hacking, claim infosec.
Just the usual procession of firmware vulnerabilities By Richard Chirgwin 1 Sep 2017 at 02:01 14 Reg comments SHARE
Infosec consulting firm No motion has reported vulnerabilities in Arris broadband modems and which it says are trivial to exploit, and could affect nearly 140,000 devices.
The report claims the modems carry hard-coded credentials, serious since a firmware update turned on SSH by default. That would let a remote attacker access the modem's cshell service and take a leisurely walk through most of the devices' controls and levers.
“The username for this access is remote ssh and the password is 5SaP9I26”, Nomotion states.
The shell's capabilities include “viewing/changing the WiFi SSID/password, modifying the network setup, re-flashing the firmware from a file served by any tftp server on the Internet” and there's also access to a kernel module “whose sole purpose seems to be to inject advertisements into the user’s unencrypted web traffic.”
That last isn't in use in the modem, No motion's Joseph Hutchins writes but the code is present and vulnerable.
The modems in question are the Arris NVG589 and NVG599, which No-motion notes are provided as standard customer premises equipment for AT&T U-verse customers.
The bugs could have been added by AT&T, the report says, since while “examining the firmware, it seems apparent that AT&T engineers have the authority and ability to add and customize code running on these devices, which they then provide to the consumer (as they should).”
The cshell runs as root, which means any other possible exploit is also trivial to exploit. For example, he provides a demonstration of a command injection using its ping functionality.
Other vulnerabilities Hutchins says he's found in the modems include:
Default https server credentials Hutchins isn't sure why there's an https server running on port 49955, but it's there, and user “tech” with no password can access it; Command injection the same https server (named “caserver”) accepts commands to upload a firmware image; rifle through its internal databases; and send configuration commands with requests to a set_data command; More information disclosure and hard-coded credentials a service on port 61001 leaks device information under the right conditions, including another set of credentials, “bdctest/bdctest”; and A firewall bypass on port 49152.

Go to Page 2

2803 Troy Road Springfield Ohio Product of USA

+1 (937) 718-3586
This Website is created in memorium of a Clark County Municipal Court Case ripoff (i.e. http://www.springfield-ohio-post.com) UNDER CONSTRUCTION, READ AT YOUR OWN RISK! There are over 3,000 files in this site and all are to be considered a rough draft pending a final edit.