Hidden TPM & hidden bluetooth in XP, Visa & 7 latops

Not open for further replies.


Sep 2, 2013
TPM uses hidden embedded bluetooth to geolocate and completely remotely control computers regardless whether they are offline or online. Laptops released at least as far back as 2009 who's specifications say no bluetooth actually have a hidden embedded bluetooth inaccessible to users. Laptops released at least as far back as 2009 who's specifications say there is bluetooth actually have two bluetooths: one bluetooth accessible to users and a hidden embedded bluetooth not accessible to users.

Regardless whether you believe TPM is a backdoor and Microsoft required
manufacturers to install hidden bluetooth, both TPM and bluetooth have
an extremely visible unique identifier (UUID). Their UUID can be
geolocated. TPM and hidden bluetooth cannot be disabled nor uninstalled.

Starting in 2006 with Vista, Microsoft secretly required manufactuers to
install TPM. The hype is that users had the option to enable TPM in the
BIOS and then had to activate it and that Microsoft required TPM to be
shipped activated only with Windows 8. This is false and a spin. I say
secretly because the manufacturers' specifications do not include TPM.
The notebook reviews didnt discuss TPM. Vista, Windows 7 and Linux do
not have an TPM icon to click to enable. The BIOS did NOT have an option
to enable TPM. I have read the specs of numerous netbooks. None
mentioned TPM. I have looked at the BIOS of numerous netbooks to make
sure none had computrace. None of the BIOS listed TPM. Windows and Linux
hardware profilers do not list TPM. Hence, I naively purchased netbooks
that had TPM.

My HP Mini 1000 netbook, released in 2009 with Windows XP has TPM. My
Asus 1025C netbook released in 2011 with Windows 7 has TPM. lsmod shows
the TPM is enabled, activated and being used but not by me. :

lsmod from live DVD of Tails using Asus 1025C netbook on Jan 9, 2013:

tpm 17566 1 tpm_tis
tpm_bios 12836 1 tpm
tpm_tis 13150 0

lsmod from live DVD of Tails using HP Mini 1000 netbook on 9/2/2013:

tpm 17735 1 tpm_tis
tpm_bios 13244 1 tpm
tpm_tis 13040 0

TPM is very active. I didn't encrypt my harddrive with TPM. I didn't use
TPM. What is TPM doing?

I believe TPM uses hidden embedded bluetooth to disclose geolocation of
both their UUIDs and data when the computers are offline. Microsoft is
requiring manufacturers to install bluetooth starting with Windows 8.1.
This is a spin as apparently Microsoft had required manufacturers to
install hidden bluetooth probably starting with 2009.

The specifications of laptops are misleading. eMachine 250's
specification listed bluetooth none. MSI specified "n/a" for bluetooth
in their specification of my two MSI L1350D netbooks. "n/a" is
ambiguous. Asus specified some 1015PE has them and some not depending on
"region." HP Mini 100 netbook specification was some have bluetooth,
some don't. Toshiba specified "no antennae" for the Toshiba NB505
erroneously indicating bluetooth could not be transmitted without an

Windows and Linux bluetooth manager did not detect bluetooth. Windows
and Linux hardware profilers did not detect bluetooth. I naively
purchased netbooks misbelieving they neither had bluetooth nor TPM.
Thereby, enabling my abuser's crackers to continue to geolocate,
bluesnarf and infect my netbooks offline. The only netbook I purchased
that the specs stated had bluetooth was an Asus 1015PX (different model
than 1015PE). I paid a computer repairman to open the Asus to remove the
Broadcom combo wifi/bluetooth half mini PCI card. Yet, I continued to be
cracked offline.

lsmod of Asus 1015X after removal of combo wifi/bluetooth card:

bnep 18863 2
bluetooth 258249 7 bnep
rfkill 20451 4 bluetooth, asus_wmi

DMESG, lsmod, ps ax | grep blue detected active bluetooth in all of my
netbooks. I posted lsmod outputs on forums inquiring whether Linux loads
bluetooth modules on all computers or just computers with bluetooth. I
asked for someone without bluetooth to post their lsmod. No one posted.
The only response I received was that my lsmod showed active bluetooth.

It as not until I actually read the processes listed by Conky on the
desktop of a live PartedMagic CD that I realized that bluetooth was not
only installed but extremely active. Blueman is almost always the top
first process in memory. Three out of the top five processes in memory
that Conky lists are bluetooth:

blueman-app PID 4218

Bluetooth is being used but not by me.

HP, eMachine and MSI do not list bluetooth in the BIOS. Asus 1015PX
listed bluetooth in the BIOS for the combo card but not for its second
bluetooth which is hidden. I cannot disable bluetooth in the BIOS. I
attempted to kill bluetooth in htop but could not. I typed bluetooth=no
upon boot up. Bluetooth still loaded.

The commands to kill TPM are at
http://lunaticoutpost.com/private.php?action=send&uid=3135. I could not kill TPM.

I waited months to purchase an open hardware linux laptop at http://rhombus-tech.net/community_ideas/laptop/. But rhombus lacks donations and volunteers.

Thus, I purchased even older netbooks. This month, I purchased an used Averatec 1150 netbook released in 2006 and an used Asus 900 released in 2008 from Ebay. I diagnostics that they won't have TPM and hidden bluetooth.

This morning, I read the three comments by CLU: " Disable TPM hardware drivers in linux by blacklisting them and bluetooth. That's the NSA backdoor. . .That's part of the bluetooth stack. If you blacklist the drivers it can't connect and by proxy disables the cell phone built into every laptop since 2005. You'll note that you get back around 7% of system resources (at least on the i7 I have running) after doing so. On the craptacular i3's I have it returns around 20% of the system CPU. " http://www.zerohedge.com/contributed/2013-06-25/government-spying-you-through-your-own-computer%E2%80%99s-webcam-or-microphone

If CLU is correct that starting in 2005, laptops have a cell phone built in (hidden bluetooth), I didn't go far enough back in history. If dmeg, lsmod, ps ax | grep blue, conky and/or htop detect bluetooth, I won't be able to use my new used 2006 and 2008 netbooks.

Two nights ago, I ordered an open hardware linux pengpod tablet without bluetooth and TPM. Tablets don't replace netbooks. I need an open hardware laptop!

Users should file a class action suit against the manufacturers of laptops who's specifications misrepresented no bluetooth. Users should file a class action suit against manufacturers of laptops who's specifications stated bluetooth but failed to disclose two bluetooths.
How does bluetooth geo-locate? It needs another bluetooth device within 15-20 feet to even reach. I don't know what you are talking about.

Then you quote some nutjob site on top of that ranting on smart meters and everything else under the sun.


Sep 2, 2013
The pengpod tablet is a linux open source hardware project. I trust open source hardware except for the processor. Though users of linux use linux because it is open source software, they prefer closed ARM processors with TrustZone, viritualization extensions and Mobicore over the only processor that is more open which is MIPS. MIPS is slower. Linux users prefer speed over safety.

As I wrote, bluetooth and TPM have an unique MAC address. The MAC address is highly visible. Users cannot disable or uninstall the hidden bluetooth module.

Bluetooth does not require "another bluetooth device wthin 15-20 feet to even reach." A computer, smart phone and drones with bluetooth sniffing software will detect bluetooth regardless whether they have bluetooth installed. http://news.cnet.com/8301-31921_3-20088180-281/wireless-drone-sniffs-wi-fi-bluetooth-phone-signals/

Governments and private corporations use bluetooth scanners. Bluetooth scanners are similar to automated license plate readers. Both bluetooth scanners and automated license plate readers are owned and operated by government and by private corporations such as private security firms that surveil mall parking lots. The scanners are mounted in public areas. Government "shares" the data with corporations. Corporations sell their data base to information brokers who in turn sell it to private investigators who in turn sell it to abusers. Victims eluding and relocating from their abuser get geolocated by their license plate and devices with hidden bluetooth.



Older computers had classic bluetooth (BR/EDR). Newer computers have low energy bluetooth. Classic bluetooth's range was discussed at http://www.tomshardware.com/forum/50518-34-bluetooth-range-distance

Low energy bluetooth 4.0 range is 250 meters which is 820 feet.

DARPA funded a project to build a motherboard hidden in a powerstrip which broadcasts Bluetooth signals to 300 meters. > http://www.zdnet.com/power-pwn-this-darpa-funded-power-strip-will-hack-your-network-7000001331/
The method government and corporations are capturing the MAC address of Bluetooth and wifi is via preinstalled hidden scanning software on Microsoft, Apple and Android computers and smart phones. Thereby, they and Skyhook use users as spies. We are unwittingly spying on each other. Google admitted substituting their roving trucks with Android devices to capture nearby MAC addresses of all wifi devices. The wifi devices include nearby routers, laptops, tablets and cell phones.

The capturing of nearby MAC addresses cannot be disabled by the user of Microsoft, Apple and Google devices. Though Google and Microsoft ceased making geolocating of the wifi device available to users, they admit to continuing to track the location of wifi devices. Government and corporations including private investigators geolocate the MAC address of computers, laptops, tablets and phones enabling abusers to geolocate their victims.

What the articles below should also discuss is that the device does not need to be connected to the internet for wifi’s MAC address to be captured and geolocated. MAC addresses are visible simply by turning on the device. BIOS of newer computers no longer offer the option to disable wifi. Disabling the wifi in the operating system does not suffice. While the computer boots up and shuts down, the MAC address is visible and is captured.

The articles also do not discuss is that Microsoft, Apple, Google and Skyhook are also capturing and geolocating the MAC address of Bluetooth of computers, laptops, tablets and smartphones. The BIOS of new computers do not offer the option to disable Bluetooth. Disabling Bluetooth in the operating system does not suffice.






"I believe TPM uses hidden embedded bluetooth to disclose geolocation of
both their UUIDs and data when the computers are offline. "

You believe? Do you have any proof that a TPM chip, which is simply a chip with a unique private key embedded into for encryption, has a bluetooth sending device built in to, or did you come up with this using your linux tablet under a tinfoil blanket?


Sep 2, 2013
Getochkn, there are lots of articles that TPM has a backdoor. Backdoors are not "simply a chip with a unique private key..."

Getochkn, to answer your question, I am asking you and other readers to conduct a simple scan. Download a free copy of PartedMagic at sourceforge.net/projects/partedmagic/. PartedMagic is the easiest linux distro to use for this scan as it is the only linux distro that has Conky procesor scanner preinstalled on the desktop. You don't need to press any keys to read the top five processes in memory.

Before booting to PartedMagic, disable bluetooth in the BIOS if your older laptop offers that option. Newer laptops don't. No wonder why.

Linux does not automatically connect to wifi hotspots. Do not connect an ethernet cable to your laptop before booting. Read the top five processes in memory for a few minutes and then post them here. Bluetooth processes are: blueman-app, blueman-mechani, krfcommd and obex-data-server. Blueman-mechani comes up quickly and disappears from the top 5 so read Conky immediately after booting for two minutes.

Then open up Bluetooth Manager to ascertain whether Bluetooth Manager can detect and control bluetooth. If not, this bluetooth device was not installed by the laptop's manufacturer for users' use.

Click on System Profiler hardware detection tool. Does it detect bluetooth? If Conky detects bluetooth and neither Bluetooth Manager nor System Profiler detect bluetooth, the laptop has a hidden embedded bluetooth.

To further answer Getochkn's question, I removed the wifi card from all of my netbooks. I removed the harddrive. Nor are my netbooks connected to ethernet via a ethernet cable. After immediately booting to a linux DVD with my HP Mini 1000 netbook and Asus 1025C netbook, the hidden bluetooth is extremely active. It remains the number one process in memory. TPM is immediately active and remains active. I am only typing commands in the terminal to detect bluetooth and TPM and reading a processes scanner such as Conky or Htop.

My abuser hired private investigators who hired crackers. They have been bluesnarfing my netbooks via the hidden embedded bluetooth preinstalled by the netbook manufacturers.

Jack Alter's crackers have bluesnarfed my other netbooks that also have hidden embedded bluetooth but not TPM: Asus 1015PE, Toshiba NB505 and MSI. TPM is not required for bluesnarfing. I believe the crackers are using TPM in my netbooks that have TPM because TPM is immediately active and remains active despite my never enabling, activating nor using TPM.
Wow, your paranoid. Just because you remove wifi, that doesn't remove bluetooth for an FYI. most laptops have a separate bluetooth module or it's embedded in the board. It doesn't mean that it's a secret TPM chip. Doesn't mean people are hacking/tracking you.

Wow, your paranoid. Just because you remove wifi, that doesn't remove bluetooth for an FYI. most laptops have a separate bluetooth module or it's embedded in the board. It doesn't mean that it's a secret TPM chip. Doesn't mean people are hacking/tracking you.

Not open for further replies.