19
Comments (23)
sorted by:
16
not_a_sheep 16 points ago +16 / -0

LARP.

I browed the vis. Elbrus is a Russian CPU architecture. 400MHz? With 1MB L2 cache? 50 million transistors (MOSFETS) in the cache there alone. Slip in through the syringe without anyone noticing it? What's powering a 400MHz chip with +50 million transistors? Who wants L1 and L2 caches in a tiny chip with no direct power source? What's powering it? Gatorade? Because it's got all the electrolytes CPUs crave?

OH MY GOD, Putin is GOD. All hail Komrade Putin, OUR SAVIOUR.

Come on. This is rubbish.

5
deleted 5 points ago +5 / -0
2
swizzley [S] 2 points ago +2 / -0

That shit is funny though. Love that movie. But I’ve seen real ones in action that are like stickers on the body, can read and transmit data and they are practically invisible. No idea what powers them, but Tesla could pull electricity out of thin air using the earth’s own EMF.

1
not_a_sheep 1 point ago +1 / -0

The newer UHF toll tags are around 915MHz, but antennas printed on plastic is still pretty big -- they need to be to get enough power to run the chip. I have found a couple of useful links:

https://en.wikipedia.org/wiki/EZ_TAG

https://transcore.com/literature

Plenty of literature there. Without a battery, there is just not enough power for any kind of processing. The communications protocol has a bit of smarts for separating multiple chips responding to a transponder. It's just for ID purposes. Programming flash will takes lots and lots of power (milliwatts), so the ID is fixed at the time it is affixed.

1
Mr_A 1 point ago +1 / -0

C'mon man... textbook application of induction by 5G!

2
not_a_sheep 2 points ago +2 / -0

I promised a fren here to provide a less jokey critique on this vid. Here is is:

At 2:10, he tries to connect to the URL alexeykapyshev.sputnik-v.ru. ssh (secure shell) response gives [127.0.0.1]:20000, 20000 is the requested port while 127.0.0.1 is always the local machine. It's his own laptop or PC. The name can be resolved by adding the name in the /etc/hosts text file (even Windows have that).

At 2:27. Once logged in, the other side starts a secure shell (console) session. The first line is telling:

Linux alexey-kapyshev-mcst 4.19.0.14-amd64 #1 SMP Debian 4.19.171-2 (2021-01-30) x86-64

Caption says "we are in the machine" and the response from the machine is the line above. "amd64" and "x86-64", so it's probably an AMD laptop, haha.

At 2:48, the sputnik-V-control command can be easily faked, it's just text. Even the "gathering info..." thing, those are also text and can be easily generated by a script, say a Python script which one can rustle up in less than an hour.

The info is copy and pasted from several sources. At 2:54, one can see the firmware line: PKQ1.180904.001. Look it up, that's an Android 9.0 firmware. So that may have been copied from his smartphone.

At 3:02, the CPU info appears. It's Elbrus, so that may have been copied from somewhere convenient. Specs matches Elbrus-2S+ Wikipedia info (500MHz & cache sizes matches). It's likely a workplace machine, because the ssh line has "mcst", or Moscow Center of SPARC Technologies, which is where they develop Elbrus.

The vacc info can be faked since it's just some text on his same machine (127.0.0.1). All you need is a flair for the dramatic to sell the fiction.

So it's just his own laptop and someone who has free time to do LARPing.

Elbrus-2S+ is 289 sq mm. On TSMC 7nm, it would scale to about 2 sq mm. Too big and too obvious. Of course it would be impossible to power the thing like RFID tags. UHF 915MHz toll tags that are batteryless don't have power for anything but a limited protocol to separate multiple responders. Not enough power to process anything, much less run Linux on a powerful chip with over 368 million transistors. Plus, UHF toll tags need a large (printed) antenna for power gathering efficiency and the UHF transponder is zapping it from nearby.

Nothing in the vid is credible. I would only sit up and pay attention if a credible news outlet that is consistently on our side (TGP or OANN) do a proper investigation.

2
swizzley [S] 2 points ago +2 / -0

thats just the reference architecture, it could be virtualized and powered by 5G EMF radiation or the bodies own EMF I dunno. EASILY hoaxed... but maybe not.

3
deleted 3 points ago +3 / -0
2
redtoe-skipper 2 points ago +2 / -0

Well done. I missed that one.

7
deleted 7 points ago +7 / -0
0
swizzley [S] 0 points ago +2 / -2

Bro that doesnt mean anything. Wireguard is a VPN that remaps to local interfaces on specific ports that could bounce out to anything. In this case its ssh to somewhere. Or total fucking hoax I dunno.

4
deleted 4 points ago +4 / -0
-1
swizzley [S] -1 points ago +1 / -2

No spinup because its already running, local 20k is just a tunnel, mapping is done on server side. But I dunno.

3
deleted 3 points ago +3 / -0
7
deleted 7 points ago +7 / -0
0
redtoe-skipper 0 points ago +1 / -1

Not neccesarily.

He could have something running on his localhost that connects to Ljoha, he seems to indicate he setup something with an easy to remember password.

To me it seems, he appears to be reading data ..... yet the behind the scene connection is not clear.

2
deleted 2 points ago +2 / -0
2
CanadianAnon 2 points ago +2 / -0

It said he was sleeping! WTF?

2
RedPillQ17 2 points ago +2 / -0

The MSM (if they ever do a story on this at all) will use it as yet another "Russia - Russia - Russia" disinfo campaign. Too bad this vid is from Russia - that alone will be the basis for entirely dismissing it as not trustworthy per the MSM.

1
UltimateMastermind 1 point ago +1 / -0

Give it shitpost flare pls. :)

1
deleted 1 point ago +1 / -0
0
deleted 0 points ago +1 / -1
0
swizzley [S] 0 points ago +3 / -3

Flood coming? Last great awakening was when video came out of the holocaust. Could this be the wakeup that everybody needs?