BlackBox (Security) Archiv
4.07K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
New Trump Appointee Puts Global Internet Freedom at Risk, Critics Say

A battle involving Michael Pack and a U.S.-funded tech group revolves around software from Falun Gong, the secretive, anti-Beijing spiritual movement with pro-Trump elements.

WASHINGTON โ€” When Michael Pack, a conservative filmmaker and ally of Stephen K. Bannon, recently fired the heads of four U.S. government-funded news outlets, many became alarmed that he would turn the independently operated organizations, as well as the Voice of America, into โ€œTrump TV.โ€

But Mr. Pack, the new chief executive of the U.S. Agency for Global Media, also cleaned house last month at the lesser-known Open Technology Fund, an internet freedom group overseen by the agency Mr. Pack now runs.

Many worry that the move could have an even greater effect.

In less than a decade, the Open Technology Fund has quietly become integral to the worldโ€™s repressed communities. Over two billion people in 60 countries rely on tools developed and supported by the fund, like Signal and Tor, to connect to the internet securely and send encrypted messages in authoritarian societies.

After Mr. Pack was confirmed for his new post on June 4, following a personal campaign of support by President Trump, Mr. Pack fired the technology groupโ€™s top officials and bipartisan board, an action now being fought in the courts. A federal judge on Thursday ruled in Mr. Packโ€™s favor, a decision that plaintiffs will likely appeal.

On Friday, Mr. Pack appointed an interim chief executive, James M. Miles, to head the fund, according to a letter obtained by The New York Times. Mr. Miles is little known in the internet freedom community, and his appointment needs approval from the fundโ€™s new board, which is stacked with Trump administration officials and chaired by Mr. Pack.

This battle revolves around software developed by Falun Gong, the secretive spiritual movement persecuted by the Chinese Communist Party.

Some Falun Gong members have become notable players in American politics. The Epoch Times, a newspaper started by Falun Gong practitioners, has spent millions of dollars on pro-Trump ads, including conspiratorial ones, on Facebook and YouTube โ€” and was even banned by Facebook last year from buying more ads because it had tried to evade advertising rules.

Now, allies of Falun Gong are making a big push for the Open Technology Fund and the State Department to give money to some of the groupโ€™s software, notably Ultrasurf, developed about a decade ago by a Falun Gong member.

https://www.nytimes.com/2020/07/04/us/politics/michael-pack-china-internet.html

#thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
Facebook, WhatsApp, Twitter Suspend Review of Hong Kong Requests for User Data

Action is taken โ€˜pending further assessmentโ€™ of Chinaโ€™s national-security law for territory, WhatsApp says

"Facebookโ€™s WhatsApp messaging service has suspended its processing of requests for user data from Hong Kong law-enforcement agencies following Chinaโ€™s imposition of a national-security law on the city.

The company is โ€œpausingโ€ such reviews โ€œpending further assessment of the impact of the National Security Law, including formal human rights due diligence and consultations with human rights experts,โ€ a WhatsApp spokeswoman said in response to a Wall Street Journal query on Monday [โ€ฆ]

Dubai-based Telegram Group Inc. said in a statement that was earlier reported by the Hong Kong Free Press that it doesnโ€™t intend to process โ€œany data requests related to its Hong Kong users until an international consensus is reached in relation to the ongoing political changes in the city.โ€ A Telegram representative said in a statement that the company โ€œhas never shared any data with the Hong Kong authorities in the past.
โ€

https://9to5mac.com/2020/07/06/whatsapp-and-telegram/

https://www.wsj.com/articles/whatsapp-to-suspend-processing-law-enforcement-requests-for-user-data-in-hong-kong-11594034580

#china #hk #fb #DeleteFacebook #wa #twitter
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07.PDF
224.8 KB
National Security Agency |Cybersecurity Information

Securing IPsec Virtual Private Networks

Many organizations currently utilizeIP Security (IPsec) Virtual Private Networks (VPNs) to connect remote sites andenable telework capabilities. These connections use cryptographytoprotect sensitive information that traversesuntrusted networks. To protect this trafficand ensure data confidentiality, it is critical that these VPNs use strong cryptography.This guidance identifiescommon VPN misconfigurations andvulnerabilities.

๐Ÿ‘€ PDF:
https://media.defense.gov/2020/Jul/02/2002355625/-1/-1/0/SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07_01_FINAL_RELEASE.PDF

#nsa #cybersecurity #IPsec #vpn #information #guide #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
U.S. looking at banning Chinese social media apps, including TikTok

(Reuters) - Secretary of State Mike Pompeo said on Monday that the United States is โ€œcertainly looking atโ€ banning Chinese social media apps, including TikTok, suggesting it shared information with the Chinese government, a charge it denied.

โ€œI donโ€™t want to get out in front of the President (Donald Trump), but itโ€™s something weโ€™re looking at,โ€ Pompeo said in an interview with Fox News.

U.S. lawmakers have raised national security concerns over TikTokโ€™s handling of user data, saying they were worried about Chinese laws requiring domestic companies โ€œto support and cooperate with intelligence work controlled by the Chinese Communist Party.โ€

Pompeo said Americans should be cautious in using the short-form video app owned by China-based ByteDance.

โ€œOnly if you want your private information in the hands of the Chinese Communist Party,โ€ Pompeo remarked when asked if he would recommend people to download TikTok.

๐Ÿ‘€ Read more ๐Ÿ‡ฌ๐Ÿ‡ง:
https://www.reuters.com/article/us-usa-tiktok-china-pompeo/pompeo-says-u-s-looking-at-banning-chinese-social-media-apps-including-tiktok-fox-idUSKBN2480DF

๐Ÿ‘€ Read in ๐Ÿ‡ฉ๐Ÿ‡ช:
https://t3n.de/news/social-media-apps-china-visier-1297614

#DeleteTikTok #TikTok #usa #china #pompeo #ToddlerTrump
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
69: Human Hacker
Darknet Diaries - EP 69: Human Hacker

We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing.

๐ŸŽง https://darknetdiaries.com/episode/69/

#DarknetDiaries #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
Introducing Project Freta - Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service

Microsoft has announced a new free-to-use initiative aimed at uncovering forensic evidence of sabotage on Linux systems, including rootkits and intrusive malware that may otherwise go undetected.

The cloud offering, dubbed Project Freta, is a snapshot-based memory forensic mechanism that aims to provide automated full-system volatile memory inspection of virtual machine (VM) snapshots, with capabilities to spot malicious software, kernel rootkits, and other stealthy malware techniques such as process hiding.

The project is named after Warsaw's Freta Street, the birthplace of Marie Curie, the famous French-Polish physicist who brought X-ray medical imaging to the battlefield during World War I.

"Modern malware is complex, sophisticated, and designed with non-discoverability as a core tenet," said Mike Walker, Microsoft's senior director of New Security Ventures. "Project Freta intends to automate and democratize VM forensics to a point where every user and every enterprise can sweep volatile memory for unknown malware with the push of a button โ€” no setup required."

The objective is to infer the presence of malware from memory, at the same time gain the upper hand in the fight against threat actors who deploy and reuse stealthy malware on target systems for ulterior motives, and more importantly, render evasion infeasible and increase the development cost of undiscoverable cloud malware.

https://www.microsoft.com/en-us/research/blog/toward-trusted-sensing-for-the-cloud-introducing-project-freta/

https://thehackernews.com/2020/07/microsoft-linux-forensics-rootkit.html

#microsoft #linux #cloud #Freta #forensics #research #rootkit #malware
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Police data - BlueLeaks server confiscated near Zwickau (Germany)

A few weeks ago, the transparency collective Distributed Denial of Secrets published hundreds of thousands of internal data from 200 police stations in the USA. The case now also occupies the public prosecutor's office in Zwickau, which apparently confiscated a server of the collective.

Zwickau police have confiscated a server on which data from US police departments known as BlueLeaks was available for download. This was announced by Emma Best via Twitter, a person associated with the Leaking collective Distributed Denial of Secrets (DDoS). The server is the "primary public download server" and no sources are in danger due to the confiscation.

In another tweet, an excerpt from an e-mail from the provider is attached, in which the provider states the file number and writes that he should only now have informed the persons concerned. He was not allowed to say more about the case. This provider is apparently the company Hetzner, which maintains a data centre near Zwickau. A used IP address of DDoS also refers to Hetzner.

A short-term inquiry by netzpolitik.org on Tuesday evening, on what basis the server was seized and what the operators are accused of, has not yet been answered by the Zwickau public prosecutor's office.

https://twitter.com/NatSecGeek/status/1280519169151205381

More info ๐Ÿ‡ฉ๐Ÿ‡ช:
https://netzpolitik.org/2020/polizei-daten-blueleaks-server-bei-zwickau-beschlagnahmt/

#BlueLeaks #DDoS #Zwickau
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Microsoft takes legal action against COVID-19-related cybercrime

Today, the U.S. District Court for the Eastern District of Virginia unsealed documents detailing Microsoftโ€™s work to disrupt cybercriminals that were taking advantage of the COVID-19 pandemic in an attempt to defraud customers in 62 countries around the world. Our civil case has resulted in a court order allowing Microsoft to seize control of key domains in the criminalsโ€™ infrastructure so that it can no longer be used to execute cyberattacks.

Microsoftโ€™s Digital Crimes Unit (DCU) first observed these criminals in December 2019, when they deployed a sophisticated, new phishing scheme designed to compromise Microsoft customer accounts. The criminals attempted to gain access to customer email, contact lists, sensitive documents and other valuable information. Based on patterns discovered at that time, Microsoft utilized technical means to block the criminalsโ€™ activity and disable the malicious application used in the attack. Recently, Microsoft observed renewed attempts by the same criminals, this time using COVID-19-related lures in the phishing emails to target victims.

This malicious activity is yet another form of business email compromise (BEC) attack, which has increased in complexity, sophistication and frequency in recent years. According to the FBIโ€™s 2019 Internet Crime Report, the most-costly complaints received by their Internet Crime Complaint Center (IC3) involved BEC crimes, with losses of over $1.7 billion, representing nearly half of all financial losses due to cybercrime. While most of the publicโ€™s attention in recent years has justifiably focused on the malign acts of nation state actors, the increasing economic harm caused by cybercriminals must also be considered and confronted by the public and private sectors. For our part, Microsoft and our Digital Crimes Unit will continue to investigate and disrupt cybercriminals and will seek to work with law enforcement agencies around the world, whenever possible, to stop these crimes.

https://blogs.microsoft.com/on-the-issues/2020/07/07/digital-crimes-unit-covid-19-cybercrime/

#microsoft #DCU #cybercrime #corona
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Firefox Send offline due to malware distribution

Mozilla has taken his Firefox send offline. This is due to malware abuse of the file transfer. The service is being revised.

The Firefox Send web service, which was launched by browser manufacturer Mozilla just under a year ago, is offline. However, this is not a short failure or error. Mozilla itself pulled the plug on the service, which is supposed to transfer files quickly, easily and encrypted over the web.

On the service's website it says: "Firefox Send is temporarily unavailable while we work on product improvements. Thank you for your patience as we improve the Firefox Send experience". Details or a public statement as to why the Service is currently unavailable from Mozilla are not available on the website.

https://send.firefox.com/

๐Ÿ‘‰๐Ÿผ Read more ๐Ÿ‡ฌ๐Ÿ‡ง:
https://www.zdnet.com/article/mozilla-suspends-firefox-send-service-while-it-addresses-malware-abuse/

๐Ÿ‘‰๐Ÿผ Read more ๐Ÿ‡ฉ๐Ÿ‡ช:
https://www.golem.de/news/mozilla-firefox-send-wegen-malware-verbreitung-offline-2007-149529.html

#mozilla #ff #firefox #send #malware
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Bunker.is - a non-profit isp

collaborating to create shared platforms with open products and no vendor lock-in

๐Ÿ‘‰๐Ÿผ
#Cloud:
A nextcloud instance for our contributors

๐Ÿ‘‰๐Ÿผ #VPN:
We provide vpn services to our contributors

๐Ÿ‘‰๐Ÿผ #Search:
A non-tracking search engine

๐Ÿ‘‰๐Ÿผ #Etherpad:
A shared open etherpad instance

๐Ÿ‘‰๐Ÿผ #Mail:
We provide mail accounts to our contributors

๐Ÿ‘‰๐Ÿผ #Ethercalc:
An open public ethercalc instance

๐Ÿ‘‰๐Ÿผ #Cryptpad:
We provide an open public instance of cryptpad

Our free services are possible due to the generosity of our users. Becoming a contributor gives you access to a wider range of services.

We dont think the users should be the product. We think you should know who has access to your data and why. Meet us and find out more.

๐Ÿ‘‰๐Ÿผ https://bunker.is/ ๐Ÿ‘ˆ๐Ÿผ

#bunker #isp
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
PimEyes - A Polish company just abolishes our anonymity

Research by
netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. All of whom have photos on the Internet could already be part of their database.

Dylan smiles into the camera, arm in arm with the other guests of a queer boat party. Behind them, glasses glisten on the shelves of a bar. Eight years ago a party photographer uploaded this snapshot on the internet. Dylan had already forgotten it - until today. Because with a reverse search engine for faces, everyone can find this old party photo of Dylan. All they have to do is upload his profile picture from the Xing career network, free of charge and without registration. But Dylan wants to keep his private and professional life separate: During the day he works as a banker in Frankfurt am Main.

The name of the search engine is PimEyes. It analyses masses of faces on the Internet for individual characteristics and stores the biometric data. When Dylan tests the search engine with his profile picture, it compares it with the database and delivers similar faces as a result, shows a preview picture and the domain where the picture was found. Dylan was recognized even though, unlike today, he did not even have a beard then.

Our research shows: PimEyes is a wholesale attack on anonymity and possibly illegal. A snapshot may be enough to identify a stranger using PimEyes. The search engine does not directly provide the name of a person you are looking for. But if it finds matching faces, in many cases the displayed websites can be used to find out name, profession and much more.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง PimEyes - A Polish company just abolishes our anonymity
https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช: https://netzpolitik.org/2020/gesichter-suchmaschine-pimeyes-schafft-anonymitaet-ab/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง https://www.bbc.com/news/technology-53007510

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง https://petapixel.com/2020/06/11/this-creepy-face-search-engine-scours-the-web-for-photos-of-anyone/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช Automated face recognition -
Enforce our data protection rights at last!
https://netzpolitik.org/2020/automatisierte-gesichtserkennung-setzt-unsere-datenschutzrechte-endlich-auch-durch/

#PimEyes #facialrecognition #searchengine #privacy #anonymity #ourdata #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Atlas of Surveillance - A project of the Electronic Frontier Foundation

The Atlas of Surveillance database, containing several thousand data points on over 3,000 city and local police departments and sheriffs' offices nationwide, allows citizens, journalists, and academics to review details about the technologies police are deploying, and provides a resource to check what devices and systems have been purchased locally.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://atlasofsurveillance.org/ ๐Ÿ‘ˆ๐Ÿผ ๐Ÿ‘€

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ
https://www.eff.org/press/releases/eff-launches-searchable-database-police-agencies-and-tech-tools-they-use-spy

#eff #atlas #surveillance
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Hacker breaches security firm in act of revenge

Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.

A hacker claims to have breached the backend servers belonging to a US cyber-security firm and stolen information from the company's "data leak detection" service.

The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches.

The databases have been collected inside DataViper, a data leak monitoring service managed by Vinny Troia, the security researcher behind Night Lion Security, a US-based cyber-security firm.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.zdnet.com/article/hacker-breaches-security-firm-in-act-of-revenge/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://gist.github.com/campuscodi/226b0758e08592df2e5d898979d1da17

#DataViper #leak #breach #hacked
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
๐Ÿ‘2
Media is too big
VIEW IN TELEGRAM
Quantum Hardening Cryptographic Protocols

This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.

If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00

๐Ÿ“บ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง https://media.ccc.de/v/DiVOC-19-quantum-en

๐Ÿ“บ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://media.ccc.de/v/DiVOC-19-quantum

#ccc #DiVOC #video #quantum #hardening
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Startpage.com interview: still the most discreet search engine?

StartPage.com has always presented itself as a data-saving alternative. Since the sale of the majority of shares to a data broker last autumn, the provider has been vehemently criticized. We are of course interested in the background of the takeover, but not only.

Of course we have addressed this issue in our detailed interview. We give the operators the opportunity to comment on the incident themselves. With the help of our community we have collected the questions in advance. At this point, I would like to thank Jรถrg Bauer, the press spokesman of Startpage, who dealt with the countless questions. Many thanks also to Sunny, who organized numerous questions and the translation into English. You can find the german interview here.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง https://tarnkappe.info/startpage-com-interview-still-the-most-discreet-search-engine/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://tarnkappe.info/startpage-com-im-interview-noch-immer-die-diskreteste-suchmaschine/

#startpage #interview
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
BlackBox (Security) Archiv
When Google listens to you breathe The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this. How much does Google know about us? In otherโ€ฆ
Google offers data pledge in bid to win EU okay for Fitbit buy

Alphabet Incโ€™s (GOOGL.O) Google has offered not to use health data of fitness tracker company Fitbit to help it target ads in an attempt to address EU antitrust concerns about its proposed $2.1 billion acquisition, the U.S. tech company said late on Monday.

The bid, announced in November last year, would help Google take on market leader Apple (AAPL.O) and Samsung (005930.KS) in the fitness-tracking and smart-watch market, alongside others including Huawei [HWT.UL] and Xiaomi (1810.HK).

โ€œThis deal is about devices, not data. We appreciate the opportunity to work with the European Commission on an approach that safeguards consumersโ€™ expectations that Fitbit device data wonโ€™t be used for advertising,โ€ Google said in an emailed statement.

Reuters reported last week that such a data pledge may likely help Google secure EU approval for the deal.

With just 3% of the global wearables market as of the first quarter of 2020, Fitbit is far behind Appleโ€™s 29.3% share and also trails Xiaomi, Samsung and Huawei, according to data from market research firm International Data Corp.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ When Google listens to you breathe
https://t.iss.one/BlackBox_Archiv/1003

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.reuters.com/article/us-fitbit-m-a-alphabet-eu-exclusive-idUSKCN24E2X5?taid=5f0cf7d82841fc000146e530

#google #DeleteGoogle #Fitbit #healthdata #advertising #ourdata #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
AssangeLeaks

DDoSecrets Announcement About This Folder

With the Justice Department's superseding indictment against Assange, public access to the evidence becomes critical. The documents in this file illuminate that case and illustrate how WikiLeaks operates behind closed doors. AssangeLeaks is not for or against Julian Assange or WikiLeaks, and is only interested in the evidence.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://assangeleaks.org/

#DDoSecrets #leak #Assange #FreeAssange
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Huawei to be closed out of UKโ€™s 5G infrastructure. Spyware, ransomwareโ€ฆ
Huawei to be closed out of UKโ€™s 5G infrastructure. Spyware, ransomware, and botnets. The odd case of Data Viper. SAP has a major patch out.

The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if youโ€™re a user, CISA advises you to take this one seriously.

๐ŸŽง ๐Ÿ‘‰๐Ÿผ https://thecyberwire.com/podcasts/daily-podcast/1129/notes

#cyberwire #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Confirmed: Spotify launches in Russia (and 12 other countries); service now reaches 92 markets globally

Spotify is launching in Russia as you read this, in addition to 12 other European markets, the streaming company has announced.

In addition to Russia, the 13 new markets in which Spotify is launching today include Albania, Belarus, Bosnia & Herzegovina, Croatia, Kazakhstan, Kosovo, Moldova, Montenegro, North Macedonia, Russia, Serbia, Slovenia and Ukraine.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.musicbusinessworldwide.com/confirmed-spotify-launches-in-russia-and-12-other-countries-service-now-reaches-92-markets-globally/

#spotify #russia
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Huawei is facing a lawsuit regarding Image Processing patents

Huawei, the known smartphone maker, is being sued by Cedar Lane Technologies. The latter had filed a lawsuit earlier this week for patent infringement and claims that Huawei infringed on their image processing patents and even used these patented methods in their systems and devices.

According to Cedar Lane Technologies, the Chinese tech giant has infringed on multiple different patents including JPEG compression, scene recognition, electro-luminescent devices, image processing systems, VR camera, and more. Cedar Lane alleged that the smartphone maker has infringed one particular patent on a variety of its products such as smartphones like the Mate Xs, Mate X, Mate 20, Mate 20 Pro, Honor View 10, Honor 8 and even tablets like the MediaPad M5, MediaPad M6, and MediaPad T5.โ€

Cedar Lane said that these products have been โ€œmade, used, sold, imported, and offered for sale by Defendant.โ€ The infringement from Huawei revolves around one particular patent, namely 527 patent, which covers โ€œ[a] method for interfacing analog/digital converting means and JPEG compression means, said JPEG compression means having a built-in memory device, comprising the steps of: sequentially reading a predetermined number of image lines from the image data output of said analog/digital converting means.โ€

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.gizmochina.com/2020/07/15/huawei-facing-lawsuit-image-processing-patents/

#huawei #lawsuit #image #processing #patents #CedarLane
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag