New Trump Appointee Puts Global Internet Freedom at Risk, Critics Say
A battle involving Michael Pack and a U.S.-funded tech group revolves around software from Falun Gong, the secretive, anti-Beijing spiritual movement with pro-Trump elements.
WASHINGTON โ When Michael Pack, a conservative filmmaker and ally of Stephen K. Bannon, recently fired the heads of four U.S. government-funded news outlets, many became alarmed that he would turn the independently operated organizations, as well as the Voice of America, into โTrump TV.โ
But Mr. Pack, the new chief executive of the U.S. Agency for Global Media, also cleaned house last month at the lesser-known Open Technology Fund, an internet freedom group overseen by the agency Mr. Pack now runs.
Many worry that the move could have an even greater effect.
In less than a decade, the Open Technology Fund has quietly become integral to the worldโs repressed communities. Over two billion people in 60 countries rely on tools developed and supported by the fund, like Signal and Tor, to connect to the internet securely and send encrypted messages in authoritarian societies.
After Mr. Pack was confirmed for his new post on June 4, following a personal campaign of support by President Trump, Mr. Pack fired the technology groupโs top officials and bipartisan board, an action now being fought in the courts. A federal judge on Thursday ruled in Mr. Packโs favor, a decision that plaintiffs will likely appeal.
On Friday, Mr. Pack appointed an interim chief executive, James M. Miles, to head the fund, according to a letter obtained by The New York Times. Mr. Miles is little known in the internet freedom community, and his appointment needs approval from the fundโs new board, which is stacked with Trump administration officials and chaired by Mr. Pack.
This battle revolves around software developed by Falun Gong, the secretive spiritual movement persecuted by the Chinese Communist Party.
Some Falun Gong members have become notable players in American politics. The Epoch Times, a newspaper started by Falun Gong practitioners, has spent millions of dollars on pro-Trump ads, including conspiratorial ones, on Facebook and YouTube โ and was even banned by Facebook last year from buying more ads because it had tried to evade advertising rules.
Now, allies of Falun Gong are making a big push for the Open Technology Fund and the State Department to give money to some of the groupโs software, notably Ultrasurf, developed about a decade ago by a Falun Gong member.
https://www.nytimes.com/2020/07/04/us/politics/michael-pack-china-internet.html
#thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
A battle involving Michael Pack and a U.S.-funded tech group revolves around software from Falun Gong, the secretive, anti-Beijing spiritual movement with pro-Trump elements.
WASHINGTON โ When Michael Pack, a conservative filmmaker and ally of Stephen K. Bannon, recently fired the heads of four U.S. government-funded news outlets, many became alarmed that he would turn the independently operated organizations, as well as the Voice of America, into โTrump TV.โ
But Mr. Pack, the new chief executive of the U.S. Agency for Global Media, also cleaned house last month at the lesser-known Open Technology Fund, an internet freedom group overseen by the agency Mr. Pack now runs.
Many worry that the move could have an even greater effect.
In less than a decade, the Open Technology Fund has quietly become integral to the worldโs repressed communities. Over two billion people in 60 countries rely on tools developed and supported by the fund, like Signal and Tor, to connect to the internet securely and send encrypted messages in authoritarian societies.
After Mr. Pack was confirmed for his new post on June 4, following a personal campaign of support by President Trump, Mr. Pack fired the technology groupโs top officials and bipartisan board, an action now being fought in the courts. A federal judge on Thursday ruled in Mr. Packโs favor, a decision that plaintiffs will likely appeal.
On Friday, Mr. Pack appointed an interim chief executive, James M. Miles, to head the fund, according to a letter obtained by The New York Times. Mr. Miles is little known in the internet freedom community, and his appointment needs approval from the fundโs new board, which is stacked with Trump administration officials and chaired by Mr. Pack.
This battle revolves around software developed by Falun Gong, the secretive spiritual movement persecuted by the Chinese Communist Party.
Some Falun Gong members have become notable players in American politics. The Epoch Times, a newspaper started by Falun Gong practitioners, has spent millions of dollars on pro-Trump ads, including conspiratorial ones, on Facebook and YouTube โ and was even banned by Facebook last year from buying more ads because it had tried to evade advertising rules.
Now, allies of Falun Gong are making a big push for the Open Technology Fund and the State Department to give money to some of the groupโs software, notably Ultrasurf, developed about a decade ago by a Falun Gong member.
https://www.nytimes.com/2020/07/04/us/politics/michael-pack-china-internet.html
#thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
NY Times
New Trump Appointee Puts Global Internet Freedom at Risk, Critics Say
A battle involving Michael Pack and a U.S.-funded tech group revolves around software from Falun Gong, the secretive, anti-Beijing spiritual movement with pro-Trump elements.
Facebook, WhatsApp, Twitter Suspend Review of Hong Kong Requests for User Data
Action is taken โpending further assessmentโ of Chinaโs national-security law for territory, WhatsApp says
"Facebookโs WhatsApp messaging service has suspended its processing of requests for user data from Hong Kong law-enforcement agencies following Chinaโs imposition of a national-security law on the city.
The company is โpausingโ such reviews โpending further assessment of the impact of the National Security Law, including formal human rights due diligence and consultations with human rights experts,โ a WhatsApp spokeswoman said in response to a Wall Street Journal query on Monday [โฆ]
Dubai-based Telegram Group Inc. said in a statement that was earlier reported by the Hong Kong Free Press that it doesnโt intend to process โany data requests related to its Hong Kong users until an international consensus is reached in relation to the ongoing political changes in the city.โ A Telegram representative said in a statement that the company โhas never shared any data with the Hong Kong authorities in the past.โ
https://9to5mac.com/2020/07/06/whatsapp-and-telegram/
https://www.wsj.com/articles/whatsapp-to-suspend-processing-law-enforcement-requests-for-user-data-in-hong-kong-11594034580
#china #hk #fb #DeleteFacebook #wa #twitter
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
Action is taken โpending further assessmentโ of Chinaโs national-security law for territory, WhatsApp says
"Facebookโs WhatsApp messaging service has suspended its processing of requests for user data from Hong Kong law-enforcement agencies following Chinaโs imposition of a national-security law on the city.
The company is โpausingโ such reviews โpending further assessment of the impact of the National Security Law, including formal human rights due diligence and consultations with human rights experts,โ a WhatsApp spokeswoman said in response to a Wall Street Journal query on Monday [โฆ]
Dubai-based Telegram Group Inc. said in a statement that was earlier reported by the Hong Kong Free Press that it doesnโt intend to process โany data requests related to its Hong Kong users until an international consensus is reached in relation to the ongoing political changes in the city.โ A Telegram representative said in a statement that the company โhas never shared any data with the Hong Kong authorities in the past.โ
https://9to5mac.com/2020/07/06/whatsapp-and-telegram/
https://www.wsj.com/articles/whatsapp-to-suspend-processing-law-enforcement-requests-for-user-data-in-hong-kong-11594034580
#china #hk #fb #DeleteFacebook #wa #twitter
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
9to5Mac
WhatsApp and Telegram will not hand over user data to Hong Kong authorities
Both WhatsApp and Telegram have announced that they will not โ for now, at least โ hand over user data to Hong Kong authorities. The move follows China ...
SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07.PDF
224.8 KB
National Security Agency |Cybersecurity Information
Securing IPsec Virtual Private Networks
Many organizations currently utilizeIP Security (IPsec) Virtual Private Networks (VPNs) to connect remote sites andenable telework capabilities. These connections use cryptographytoprotect sensitive information that traversesuntrusted networks. To protect this trafficand ensure data confidentiality, it is critical that these VPNs use strong cryptography.This guidance identifiescommon VPN misconfigurations andvulnerabilities.
๐ PDF:
https://media.defense.gov/2020/Jul/02/2002355625/-1/-1/0/SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07_01_FINAL_RELEASE.PDF
#nsa #cybersecurity #IPsec #vpn #information #guide #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
Securing IPsec Virtual Private Networks
Many organizations currently utilizeIP Security (IPsec) Virtual Private Networks (VPNs) to connect remote sites andenable telework capabilities. These connections use cryptographytoprotect sensitive information that traversesuntrusted networks. To protect this trafficand ensure data confidentiality, it is critical that these VPNs use strong cryptography.This guidance identifiescommon VPN misconfigurations andvulnerabilities.
๐ PDF:
https://media.defense.gov/2020/Jul/02/2002355625/-1/-1/0/SECURING_IPSEC_VIRTUAL_PRIVATE_NETWORKS_EXECUTIVE_SUMMARY_2020_07_01_FINAL_RELEASE.PDF
#nsa #cybersecurity #IPsec #vpn #information #guide #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
U.S. looking at banning Chinese social media apps, including TikTok
(Reuters) - Secretary of State Mike Pompeo said on Monday that the United States is โcertainly looking atโ banning Chinese social media apps, including TikTok, suggesting it shared information with the Chinese government, a charge it denied.
โI donโt want to get out in front of the President (Donald Trump), but itโs something weโre looking at,โ Pompeo said in an interview with Fox News.
U.S. lawmakers have raised national security concerns over TikTokโs handling of user data, saying they were worried about Chinese laws requiring domestic companies โto support and cooperate with intelligence work controlled by the Chinese Communist Party.โ
Pompeo said Americans should be cautious in using the short-form video app owned by China-based ByteDance.
โOnly if you want your private information in the hands of the Chinese Communist Party,โ Pompeo remarked when asked if he would recommend people to download TikTok.
๐ Read more ๐ฌ๐ง:
https://www.reuters.com/article/us-usa-tiktok-china-pompeo/pompeo-says-u-s-looking-at-banning-chinese-social-media-apps-including-tiktok-fox-idUSKBN2480DF
๐ Read in ๐ฉ๐ช:
https://t3n.de/news/social-media-apps-china-visier-1297614
#DeleteTikTok #TikTok #usa #china #pompeo #ToddlerTrump
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
(Reuters) - Secretary of State Mike Pompeo said on Monday that the United States is โcertainly looking atโ banning Chinese social media apps, including TikTok, suggesting it shared information with the Chinese government, a charge it denied.
โI donโt want to get out in front of the President (Donald Trump), but itโs something weโre looking at,โ Pompeo said in an interview with Fox News.
U.S. lawmakers have raised national security concerns over TikTokโs handling of user data, saying they were worried about Chinese laws requiring domestic companies โto support and cooperate with intelligence work controlled by the Chinese Communist Party.โ
Pompeo said Americans should be cautious in using the short-form video app owned by China-based ByteDance.
โOnly if you want your private information in the hands of the Chinese Communist Party,โ Pompeo remarked when asked if he would recommend people to download TikTok.
๐ Read more ๐ฌ๐ง:
https://www.reuters.com/article/us-usa-tiktok-china-pompeo/pompeo-says-u-s-looking-at-banning-chinese-social-media-apps-including-tiktok-fox-idUSKBN2480DF
๐ Read in ๐ฉ๐ช:
https://t3n.de/news/social-media-apps-china-visier-1297614
#DeleteTikTok #TikTok #usa #china #pompeo #ToddlerTrump
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
Reuters
Pompeo says U.S. looking at banning Chinese social media apps, including TikTok
(Reuters) - Secretary of State Mike Pompeo said on Monday that the United States is โcertainly looking atโ banning Chinese social media apps, including TikTok, suggesting it shared information with the Chinese government, a charge it denied.
69: Human Hacker
Darknet Diaries - EP 69: Human Hacker
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing.
๐ง https://darknetdiaries.com/episode/69/
#DarknetDiaries #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing.
๐ง https://darknetdiaries.com/episode/69/
#DarknetDiaries #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
Introducing Project Freta - Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service
Microsoft has announced a new free-to-use initiative aimed at uncovering forensic evidence of sabotage on Linux systems, including rootkits and intrusive malware that may otherwise go undetected.
The cloud offering, dubbed Project Freta, is a snapshot-based memory forensic mechanism that aims to provide automated full-system volatile memory inspection of virtual machine (VM) snapshots, with capabilities to spot malicious software, kernel rootkits, and other stealthy malware techniques such as process hiding.
The project is named after Warsaw's Freta Street, the birthplace of Marie Curie, the famous French-Polish physicist who brought X-ray medical imaging to the battlefield during World War I.
"Modern malware is complex, sophisticated, and designed with non-discoverability as a core tenet," said Mike Walker, Microsoft's senior director of New Security Ventures. "Project Freta intends to automate and democratize VM forensics to a point where every user and every enterprise can sweep volatile memory for unknown malware with the push of a button โ no setup required."
The objective is to infer the presence of malware from memory, at the same time gain the upper hand in the fight against threat actors who deploy and reuse stealthy malware on target systems for ulterior motives, and more importantly, render evasion infeasible and increase the development cost of undiscoverable cloud malware.
https://www.microsoft.com/en-us/research/blog/toward-trusted-sensing-for-the-cloud-introducing-project-freta/
https://thehackernews.com/2020/07/microsoft-linux-forensics-rootkit.html
#microsoft #linux #cloud #Freta #forensics #research #rootkit #malware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Microsoft has announced a new free-to-use initiative aimed at uncovering forensic evidence of sabotage on Linux systems, including rootkits and intrusive malware that may otherwise go undetected.
The cloud offering, dubbed Project Freta, is a snapshot-based memory forensic mechanism that aims to provide automated full-system volatile memory inspection of virtual machine (VM) snapshots, with capabilities to spot malicious software, kernel rootkits, and other stealthy malware techniques such as process hiding.
The project is named after Warsaw's Freta Street, the birthplace of Marie Curie, the famous French-Polish physicist who brought X-ray medical imaging to the battlefield during World War I.
"Modern malware is complex, sophisticated, and designed with non-discoverability as a core tenet," said Mike Walker, Microsoft's senior director of New Security Ventures. "Project Freta intends to automate and democratize VM forensics to a point where every user and every enterprise can sweep volatile memory for unknown malware with the push of a button โ no setup required."
The objective is to infer the presence of malware from memory, at the same time gain the upper hand in the fight against threat actors who deploy and reuse stealthy malware on target systems for ulterior motives, and more importantly, render evasion infeasible and increase the development cost of undiscoverable cloud malware.
https://www.microsoft.com/en-us/research/blog/toward-trusted-sensing-for-the-cloud-introducing-project-freta/
https://thehackernews.com/2020/07/microsoft-linux-forensics-rootkit.html
#microsoft #linux #cloud #Freta #forensics #research #rootkit #malware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Microsoft Research
Toward trusted sensing for the cloud: Introducing Project Freta - Microsoft Research
Editorโs note, Feb. 14, 2024 โ The Project Freta analysis web portal is no longer publicly accessible. Please contact [email protected]. โSunlight is said to be the best of disinfectants.โ โLouis D. Brandeis, 1914 Weโฆ
Police data - BlueLeaks server confiscated near Zwickau (Germany)
A few weeks ago, the transparency collective Distributed Denial of Secrets published hundreds of thousands of internal data from 200 police stations in the USA. The case now also occupies the public prosecutor's office in Zwickau, which apparently confiscated a server of the collective.
Zwickau police have confiscated a server on which data from US police departments known as BlueLeaks was available for download. This was announced by Emma Best via Twitter, a person associated with the Leaking collective Distributed Denial of Secrets (DDoS). The server is the "primary public download server" and no sources are in danger due to the confiscation.
In another tweet, an excerpt from an e-mail from the provider is attached, in which the provider states the file number and writes that he should only now have informed the persons concerned. He was not allowed to say more about the case. This provider is apparently the company Hetzner, which maintains a data centre near Zwickau. A used IP address of DDoS also refers to Hetzner.
A short-term inquiry by netzpolitik.org on Tuesday evening, on what basis the server was seized and what the operators are accused of, has not yet been answered by the Zwickau public prosecutor's office.
https://twitter.com/NatSecGeek/status/1280519169151205381
More info ๐ฉ๐ช:
https://netzpolitik.org/2020/polizei-daten-blueleaks-server-bei-zwickau-beschlagnahmt/
#BlueLeaks #DDoS #Zwickau
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A few weeks ago, the transparency collective Distributed Denial of Secrets published hundreds of thousands of internal data from 200 police stations in the USA. The case now also occupies the public prosecutor's office in Zwickau, which apparently confiscated a server of the collective.
Zwickau police have confiscated a server on which data from US police departments known as BlueLeaks was available for download. This was announced by Emma Best via Twitter, a person associated with the Leaking collective Distributed Denial of Secrets (DDoS). The server is the "primary public download server" and no sources are in danger due to the confiscation.
In another tweet, an excerpt from an e-mail from the provider is attached, in which the provider states the file number and writes that he should only now have informed the persons concerned. He was not allowed to say more about the case. This provider is apparently the company Hetzner, which maintains a data centre near Zwickau. A used IP address of DDoS also refers to Hetzner.
A short-term inquiry by netzpolitik.org on Tuesday evening, on what basis the server was seized and what the operators are accused of, has not yet been answered by the Zwickau public prosecutor's office.
https://twitter.com/NatSecGeek/status/1280519169151205381
More info ๐ฉ๐ช:
https://netzpolitik.org/2020/polizei-daten-blueleaks-server-bei-zwickau-beschlagnahmt/
#BlueLeaks #DDoS #Zwickau
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
White Hat and Black Hat: Racism debate about designations for hackers
Do the hacker terms white hat and black hat evoke racist associations? The head of Android security sees it that way and causes a debate.
https://twitter.com/DaveKSecure/status/1279472868712013824
#lostnfound #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Do the hacker terms white hat and black hat evoke racist associations? The head of Android security sees it that way and causes a debate.
https://twitter.com/DaveKSecure/status/1279472868712013824
#lostnfound #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Twitter
David Kleidermacher
Language change is not โthe answerโ, itโs but one (small) part of the fight against racial, ethnic, and other injustice and inequity that has a many important battlefields. The fact that weโre having this conversation, even with inevitable twitter trollingโฆ
Microsoft takes legal action against COVID-19-related cybercrime
Today, the U.S. District Court for the Eastern District of Virginia unsealed documents detailing Microsoftโs work to disrupt cybercriminals that were taking advantage of the COVID-19 pandemic in an attempt to defraud customers in 62 countries around the world. Our civil case has resulted in a court order allowing Microsoft to seize control of key domains in the criminalsโ infrastructure so that it can no longer be used to execute cyberattacks.
Microsoftโs Digital Crimes Unit (DCU) first observed these criminals in December 2019, when they deployed a sophisticated, new phishing scheme designed to compromise Microsoft customer accounts. The criminals attempted to gain access to customer email, contact lists, sensitive documents and other valuable information. Based on patterns discovered at that time, Microsoft utilized technical means to block the criminalsโ activity and disable the malicious application used in the attack. Recently, Microsoft observed renewed attempts by the same criminals, this time using COVID-19-related lures in the phishing emails to target victims.
This malicious activity is yet another form of business email compromise (BEC) attack, which has increased in complexity, sophistication and frequency in recent years. According to the FBIโs 2019 Internet Crime Report, the most-costly complaints received by their Internet Crime Complaint Center (IC3) involved BEC crimes, with losses of over $1.7 billion, representing nearly half of all financial losses due to cybercrime. While most of the publicโs attention in recent years has justifiably focused on the malign acts of nation state actors, the increasing economic harm caused by cybercriminals must also be considered and confronted by the public and private sectors. For our part, Microsoft and our Digital Crimes Unit will continue to investigate and disrupt cybercriminals and will seek to work with law enforcement agencies around the world, whenever possible, to stop these crimes.
https://blogs.microsoft.com/on-the-issues/2020/07/07/digital-crimes-unit-covid-19-cybercrime/
#microsoft #DCU #cybercrime #corona
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Today, the U.S. District Court for the Eastern District of Virginia unsealed documents detailing Microsoftโs work to disrupt cybercriminals that were taking advantage of the COVID-19 pandemic in an attempt to defraud customers in 62 countries around the world. Our civil case has resulted in a court order allowing Microsoft to seize control of key domains in the criminalsโ infrastructure so that it can no longer be used to execute cyberattacks.
Microsoftโs Digital Crimes Unit (DCU) first observed these criminals in December 2019, when they deployed a sophisticated, new phishing scheme designed to compromise Microsoft customer accounts. The criminals attempted to gain access to customer email, contact lists, sensitive documents and other valuable information. Based on patterns discovered at that time, Microsoft utilized technical means to block the criminalsโ activity and disable the malicious application used in the attack. Recently, Microsoft observed renewed attempts by the same criminals, this time using COVID-19-related lures in the phishing emails to target victims.
This malicious activity is yet another form of business email compromise (BEC) attack, which has increased in complexity, sophistication and frequency in recent years. According to the FBIโs 2019 Internet Crime Report, the most-costly complaints received by their Internet Crime Complaint Center (IC3) involved BEC crimes, with losses of over $1.7 billion, representing nearly half of all financial losses due to cybercrime. While most of the publicโs attention in recent years has justifiably focused on the malign acts of nation state actors, the increasing economic harm caused by cybercriminals must also be considered and confronted by the public and private sectors. For our part, Microsoft and our Digital Crimes Unit will continue to investigate and disrupt cybercriminals and will seek to work with law enforcement agencies around the world, whenever possible, to stop these crimes.
https://blogs.microsoft.com/on-the-issues/2020/07/07/digital-crimes-unit-covid-19-cybercrime/
#microsoft #DCU #cybercrime #corona
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Microsoft On the Issues
Microsoft takes legal action against COVID-19-related cybercrime
Today, a U.S. court unsealed detaiils of Microsoftโs work disrupting cybercriminals that were taking advantage of the COVID-19 pandemic in an attempt to defraud customers around the world. Our civil case has resulted in a court order allowing Microsoft toโฆ
Firefox Send offline due to malware distribution
Mozilla has taken his Firefox send offline. This is due to malware abuse of the file transfer. The service is being revised.
The Firefox Send web service, which was launched by browser manufacturer Mozilla just under a year ago, is offline. However, this is not a short failure or error. Mozilla itself pulled the plug on the service, which is supposed to transfer files quickly, easily and encrypted over the web.
On the service's website it says: "Firefox Send is temporarily unavailable while we work on product improvements. Thank you for your patience as we improve the Firefox Send experience". Details or a public statement as to why the Service is currently unavailable from Mozilla are not available on the website.
https://send.firefox.com/
๐๐ผ Read more ๐ฌ๐ง:
https://www.zdnet.com/article/mozilla-suspends-firefox-send-service-while-it-addresses-malware-abuse/
๐๐ผ Read more ๐ฉ๐ช:
https://www.golem.de/news/mozilla-firefox-send-wegen-malware-verbreitung-offline-2007-149529.html
#mozilla #ff #firefox #send #malware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Mozilla has taken his Firefox send offline. This is due to malware abuse of the file transfer. The service is being revised.
The Firefox Send web service, which was launched by browser manufacturer Mozilla just under a year ago, is offline. However, this is not a short failure or error. Mozilla itself pulled the plug on the service, which is supposed to transfer files quickly, easily and encrypted over the web.
On the service's website it says: "Firefox Send is temporarily unavailable while we work on product improvements. Thank you for your patience as we improve the Firefox Send experience". Details or a public statement as to why the Service is currently unavailable from Mozilla are not available on the website.
https://send.firefox.com/
๐๐ผ Read more ๐ฌ๐ง:
https://www.zdnet.com/article/mozilla-suspends-firefox-send-service-while-it-addresses-malware-abuse/
๐๐ผ Read more ๐ฉ๐ช:
https://www.golem.de/news/mozilla-firefox-send-wegen-malware-verbreitung-offline-2007-149529.html
#mozilla #ff #firefox #send #malware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Mozilla
Mozilla - Internet for people, not profit (US)
Weโre working to put control of the internet back in the hands of the people using it.
Bunker.is - a non-profit isp
collaborating to create shared platforms with open products and no vendor lock-in
๐๐ผ #Cloud:
A nextcloud instance for our contributors
๐๐ผ #VPN:
We provide vpn services to our contributors
๐๐ผ #Search:
A non-tracking search engine
๐๐ผ #Etherpad:
A shared open etherpad instance
๐๐ผ #Mail:
We provide mail accounts to our contributors
๐๐ผ #Ethercalc:
An open public ethercalc instance
๐๐ผ #Cryptpad:
We provide an open public instance of cryptpad
Our free services are possible due to the generosity of our users. Becoming a contributor gives you access to a wider range of services.
We dont think the users should be the product. We think you should know who has access to your data and why. Meet us and find out more.
๐๐ผ https://bunker.is/ ๐๐ผ
#bunker #isp
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
collaborating to create shared platforms with open products and no vendor lock-in
๐๐ผ #Cloud:
A nextcloud instance for our contributors
๐๐ผ #VPN:
We provide vpn services to our contributors
๐๐ผ #Search:
A non-tracking search engine
๐๐ผ #Etherpad:
A shared open etherpad instance
๐๐ผ #Mail:
We provide mail accounts to our contributors
๐๐ผ #Ethercalc:
An open public ethercalc instance
๐๐ผ #Cryptpad:
We provide an open public instance of cryptpad
Our free services are possible due to the generosity of our users. Becoming a contributor gives you access to a wider range of services.
We dont think the users should be the product. We think you should know who has access to your data and why. Meet us and find out more.
๐๐ผ https://bunker.is/ ๐๐ผ
#bunker #isp
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
bunker.is
Services | bunker.is
together
PimEyes - A Polish company just abolishes our anonymity
Research by netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. All of whom have photos on the Internet could already be part of their database.
Dylan smiles into the camera, arm in arm with the other guests of a queer boat party. Behind them, glasses glisten on the shelves of a bar. Eight years ago a party photographer uploaded this snapshot on the internet. Dylan had already forgotten it - until today. Because with a reverse search engine for faces, everyone can find this old party photo of Dylan. All they have to do is upload his profile picture from the Xing career network, free of charge and without registration. But Dylan wants to keep his private and professional life separate: During the day he works as a banker in Frankfurt am Main.
The name of the search engine is PimEyes. It analyses masses of faces on the Internet for individual characteristics and stores the biometric data. When Dylan tests the search engine with his profile picture, it compares it with the database and delivers similar faces as a result, shows a preview picture and the domain where the picture was found. Dylan was recognized even though, unlike today, he did not even have a beard then.
Our research shows: PimEyes is a wholesale attack on anonymity and possibly illegal. A snapshot may be enough to identify a stranger using PimEyes. The search engine does not directly provide the name of a person you are looking for. But if it finds matching faces, in many cases the displayed websites can be used to find out name, profession and much more.
๐ ๐๐ผ ๐ฌ๐ง PimEyes - A Polish company just abolishes our anonymity
https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/
๐ ๐๐ผ ๐ฉ๐ช: https://netzpolitik.org/2020/gesichter-suchmaschine-pimeyes-schafft-anonymitaet-ab/
๐ ๐๐ผ ๐ฌ๐ง https://www.bbc.com/news/technology-53007510
๐ ๐๐ผ ๐ฌ๐ง https://petapixel.com/2020/06/11/this-creepy-face-search-engine-scours-the-web-for-photos-of-anyone/
๐ ๐๐ผ ๐ฉ๐ช Automated face recognition -
Enforce our data protection rights at last!
https://netzpolitik.org/2020/automatisierte-gesichtserkennung-setzt-unsere-datenschutzrechte-endlich-auch-durch/
#PimEyes #facialrecognition #searchengine #privacy #anonymity #ourdata #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Research by netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. All of whom have photos on the Internet could already be part of their database.
Dylan smiles into the camera, arm in arm with the other guests of a queer boat party. Behind them, glasses glisten on the shelves of a bar. Eight years ago a party photographer uploaded this snapshot on the internet. Dylan had already forgotten it - until today. Because with a reverse search engine for faces, everyone can find this old party photo of Dylan. All they have to do is upload his profile picture from the Xing career network, free of charge and without registration. But Dylan wants to keep his private and professional life separate: During the day he works as a banker in Frankfurt am Main.
The name of the search engine is PimEyes. It analyses masses of faces on the Internet for individual characteristics and stores the biometric data. When Dylan tests the search engine with his profile picture, it compares it with the database and delivers similar faces as a result, shows a preview picture and the domain where the picture was found. Dylan was recognized even though, unlike today, he did not even have a beard then.
Our research shows: PimEyes is a wholesale attack on anonymity and possibly illegal. A snapshot may be enough to identify a stranger using PimEyes. The search engine does not directly provide the name of a person you are looking for. But if it finds matching faces, in many cases the displayed websites can be used to find out name, profession and much more.
๐ ๐๐ผ ๐ฌ๐ง PimEyes - A Polish company just abolishes our anonymity
https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/
๐ ๐๐ผ ๐ฉ๐ช: https://netzpolitik.org/2020/gesichter-suchmaschine-pimeyes-schafft-anonymitaet-ab/
๐ ๐๐ผ ๐ฌ๐ง https://www.bbc.com/news/technology-53007510
๐ ๐๐ผ ๐ฌ๐ง https://petapixel.com/2020/06/11/this-creepy-face-search-engine-scours-the-web-for-photos-of-anyone/
๐ ๐๐ผ ๐ฉ๐ช Automated face recognition -
Enforce our data protection rights at last!
https://netzpolitik.org/2020/automatisierte-gesichtserkennung-setzt-unsere-datenschutzrechte-endlich-auch-durch/
#PimEyes #facialrecognition #searchengine #privacy #anonymity #ourdata #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
netzpolitik.org
PimEyes: A Polish company is abolishing our anonymity
An investigation by netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. Whoeverโs photos have been published on the Internet could already be part of their database.
Atlas of Surveillance - A project of the Electronic Frontier Foundation
The Atlas of Surveillance database, containing several thousand data points on over 3,000 city and local police departments and sheriffs' offices nationwide, allows citizens, journalists, and academics to review details about the technologies police are deploying, and provides a resource to check what devices and systems have been purchased locally.
๐ ๐๐ผ https://atlasofsurveillance.org/ ๐๐ผ ๐
๐ ๐๐ผ https://www.eff.org/press/releases/eff-launches-searchable-database-police-agencies-and-tech-tools-they-use-spy
#eff #atlas #surveillance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The Atlas of Surveillance database, containing several thousand data points on over 3,000 city and local police departments and sheriffs' offices nationwide, allows citizens, journalists, and academics to review details about the technologies police are deploying, and provides a resource to check what devices and systems have been purchased locally.
๐ ๐๐ผ https://atlasofsurveillance.org/ ๐๐ผ ๐
๐ ๐๐ผ https://www.eff.org/press/releases/eff-launches-searchable-database-police-agencies-and-tech-tools-they-use-spy
#eff #atlas #surveillance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Hacker breaches security firm in act of revenge
Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.
A hacker claims to have breached the backend servers belonging to a US cyber-security firm and stolen information from the company's "data leak detection" service.
The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches.
The databases have been collected inside DataViper, a data leak monitoring service managed by Vinny Troia, the security researcher behind Night Lion Security, a US-based cyber-security firm.
๐ ๐๐ผ https://www.zdnet.com/article/hacker-breaches-security-firm-in-act-of-revenge/
๐ ๐๐ผ https://gist.github.com/campuscodi/226b0758e08592df2e5d898979d1da17
#DataViper #leak #breach #hacked
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.
A hacker claims to have breached the backend servers belonging to a US cyber-security firm and stolen information from the company's "data leak detection" service.
The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches.
The databases have been collected inside DataViper, a data leak monitoring service managed by Vinny Troia, the security researcher behind Night Lion Security, a US-based cyber-security firm.
๐ ๐๐ผ https://www.zdnet.com/article/hacker-breaches-security-firm-in-act-of-revenge/
๐ ๐๐ผ https://gist.github.com/campuscodi/226b0758e08592df2e5d898979d1da17
#DataViper #leak #breach #hacked
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNET
Hacker breaches security firm in act of revenge
Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.
๐2
Media is too big
VIEW IN TELEGRAM
Quantum Hardening Cryptographic Protocols
This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.
If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00
๐บ ๐๐ผ ๐ฌ๐ง https://media.ccc.de/v/DiVOC-19-quantum-en
๐บ ๐๐ผ ๐ฉ๐ช https://media.ccc.de/v/DiVOC-19-quantum
#ccc #DiVOC #video #quantum #hardening
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.
If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00
๐บ ๐๐ผ ๐ฌ๐ง https://media.ccc.de/v/DiVOC-19-quantum-en
๐บ ๐๐ผ ๐ฉ๐ช https://media.ccc.de/v/DiVOC-19-quantum
#ccc #DiVOC #video #quantum #hardening
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Startpage.com interview: still the most discreet search engine?
StartPage.com has always presented itself as a data-saving alternative. Since the sale of the majority of shares to a data broker last autumn, the provider has been vehemently criticized. We are of course interested in the background of the takeover, but not only.
Of course we have addressed this issue in our detailed interview. We give the operators the opportunity to comment on the incident themselves. With the help of our community we have collected the questions in advance. At this point, I would like to thank Jรถrg Bauer, the press spokesman of Startpage, who dealt with the countless questions. Many thanks also to Sunny, who organized numerous questions and the translation into English. You can find the german interview here.
๐ ๐๐ผ ๐ฌ๐ง https://tarnkappe.info/startpage-com-interview-still-the-most-discreet-search-engine/
๐ ๐๐ผ ๐ฉ๐ช https://tarnkappe.info/startpage-com-im-interview-noch-immer-die-diskreteste-suchmaschine/
#startpage #interview
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
StartPage.com has always presented itself as a data-saving alternative. Since the sale of the majority of shares to a data broker last autumn, the provider has been vehemently criticized. We are of course interested in the background of the takeover, but not only.
Of course we have addressed this issue in our detailed interview. We give the operators the opportunity to comment on the incident themselves. With the help of our community we have collected the questions in advance. At this point, I would like to thank Jรถrg Bauer, the press spokesman of Startpage, who dealt with the countless questions. Many thanks also to Sunny, who organized numerous questions and the translation into English. You can find the german interview here.
๐ ๐๐ผ ๐ฌ๐ง https://tarnkappe.info/startpage-com-interview-still-the-most-discreet-search-engine/
๐ ๐๐ผ ๐ฉ๐ช https://tarnkappe.info/startpage-com-im-interview-noch-immer-die-diskreteste-suchmaschine/
#startpage #interview
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Tarnkappe.info
Startpage.com im Interview: noch immer die diskreteste Suchmaschine?
StartPage.com im Interview bei Tarnkappe.info. Diese Suchmaschine stellt sich stets als datensparsame Alternative dar, doch stimmt das noch?
BlackBox (Security) Archiv
When Google listens to you breathe The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this. How much does Google know about us? In otherโฆ
Google offers data pledge in bid to win EU okay for Fitbit buy
Alphabet Incโs (GOOGL.O) Google has offered not to use health data of fitness tracker company Fitbit to help it target ads in an attempt to address EU antitrust concerns about its proposed $2.1 billion acquisition, the U.S. tech company said late on Monday.
The bid, announced in November last year, would help Google take on market leader Apple (AAPL.O) and Samsung (005930.KS) in the fitness-tracking and smart-watch market, alongside others including Huawei [HWT.UL] and Xiaomi (1810.HK).
โThis deal is about devices, not data. We appreciate the opportunity to work with the European Commission on an approach that safeguards consumersโ expectations that Fitbit device data wonโt be used for advertising,โ Google said in an emailed statement.
Reuters reported last week that such a data pledge may likely help Google secure EU approval for the deal.
With just 3% of the global wearables market as of the first quarter of 2020, Fitbit is far behind Appleโs 29.3% share and also trails Xiaomi, Samsung and Huawei, according to data from market research firm International Data Corp.
๐ ๐๐ผ When Google listens to you breathe
https://t.iss.one/BlackBox_Archiv/1003
๐ ๐๐ผ https://www.reuters.com/article/us-fitbit-m-a-alphabet-eu-exclusive-idUSKCN24E2X5?taid=5f0cf7d82841fc000146e530
#google #DeleteGoogle #Fitbit #healthdata #advertising #ourdata #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Alphabet Incโs (GOOGL.O) Google has offered not to use health data of fitness tracker company Fitbit to help it target ads in an attempt to address EU antitrust concerns about its proposed $2.1 billion acquisition, the U.S. tech company said late on Monday.
The bid, announced in November last year, would help Google take on market leader Apple (AAPL.O) and Samsung (005930.KS) in the fitness-tracking and smart-watch market, alongside others including Huawei [HWT.UL] and Xiaomi (1810.HK).
โThis deal is about devices, not data. We appreciate the opportunity to work with the European Commission on an approach that safeguards consumersโ expectations that Fitbit device data wonโt be used for advertising,โ Google said in an emailed statement.
Reuters reported last week that such a data pledge may likely help Google secure EU approval for the deal.
With just 3% of the global wearables market as of the first quarter of 2020, Fitbit is far behind Appleโs 29.3% share and also trails Xiaomi, Samsung and Huawei, according to data from market research firm International Data Corp.
๐ ๐๐ผ When Google listens to you breathe
https://t.iss.one/BlackBox_Archiv/1003
๐ ๐๐ผ https://www.reuters.com/article/us-fitbit-m-a-alphabet-eu-exclusive-idUSKCN24E2X5?taid=5f0cf7d82841fc000146e530
#google #DeleteGoogle #Fitbit #healthdata #advertising #ourdata #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Telegram
BlackBox (Security) Archiv
When Google listens to you breathe
The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this.
How much does Google know about us? Inโฆ
The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this.
How much does Google know about us? Inโฆ
AssangeLeaks
DDoSecrets Announcement About This Folder
With the Justice Department's superseding indictment against Assange, public access to the evidence becomes critical. The documents in this file illuminate that case and illustrate how WikiLeaks operates behind closed doors. AssangeLeaks is not for or against Julian Assange or WikiLeaks, and is only interested in the evidence.
๐ ๐๐ผ https://assangeleaks.org/
#DDoSecrets #leak #Assange #FreeAssange
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
DDoSecrets Announcement About This Folder
With the Justice Department's superseding indictment against Assange, public access to the evidence becomes critical. The documents in this file illuminate that case and illustrate how WikiLeaks operates behind closed doors. AssangeLeaks is not for or against Julian Assange or WikiLeaks, and is only interested in the evidence.
๐ ๐๐ผ https://assangeleaks.org/
#DDoSecrets #leak #Assange #FreeAssange
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Huawei to be closed out of UKโs 5G infrastructure. Spyware, ransomwareโฆ
Huawei to be closed out of UKโs 5G infrastructure. Spyware, ransomware, and botnets. The odd case of Data Viper. SAP has a major patch out.
The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if youโre a user, CISA advises you to take this one seriously.
๐ง ๐๐ผ https://thecyberwire.com/podcasts/daily-podcast/1129/notes
#cyberwire #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if youโre a user, CISA advises you to take this one seriously.
๐ง ๐๐ผ https://thecyberwire.com/podcasts/daily-podcast/1129/notes
#cyberwire #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Confirmed: Spotify launches in Russia (and 12 other countries); service now reaches 92 markets globally
Spotify is launching in Russia as you read this, in addition to 12 other European markets, the streaming company has announced.
In addition to Russia, the 13 new markets in which Spotify is launching today include Albania, Belarus, Bosnia & Herzegovina, Croatia, Kazakhstan, Kosovo, Moldova, Montenegro, North Macedonia, Russia, Serbia, Slovenia and Ukraine.
๐ ๐๐ผ https://www.musicbusinessworldwide.com/confirmed-spotify-launches-in-russia-and-12-other-countries-service-now-reaches-92-markets-globally/
#spotify #russia
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Spotify is launching in Russia as you read this, in addition to 12 other European markets, the streaming company has announced.
In addition to Russia, the 13 new markets in which Spotify is launching today include Albania, Belarus, Bosnia & Herzegovina, Croatia, Kazakhstan, Kosovo, Moldova, Montenegro, North Macedonia, Russia, Serbia, Slovenia and Ukraine.
๐ ๐๐ผ https://www.musicbusinessworldwide.com/confirmed-spotify-launches-in-russia-and-12-other-countries-service-now-reaches-92-markets-globally/
#spotify #russia
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Music Business Worldwide
Confirmed: Spotify launches in Russia (and 12 other countries); service now reaches 92 markets globally
Todayโs launch opens the door for nearly 250 million fans to start discovering new music from around the world on Spotify."
Huawei is facing a lawsuit regarding Image Processing patents
Huawei, the known smartphone maker, is being sued by Cedar Lane Technologies. The latter had filed a lawsuit earlier this week for patent infringement and claims that Huawei infringed on their image processing patents and even used these patented methods in their systems and devices.
According to Cedar Lane Technologies, the Chinese tech giant has infringed on multiple different patents including JPEG compression, scene recognition, electro-luminescent devices, image processing systems, VR camera, and more. Cedar Lane alleged that the smartphone maker has infringed one particular patent on a variety of its products such as smartphones like the Mate Xs, Mate X, Mate 20, Mate 20 Pro, Honor View 10, Honor 8 and even tablets like the MediaPad M5, MediaPad M6, and MediaPad T5.โ
Cedar Lane said that these products have been โmade, used, sold, imported, and offered for sale by Defendant.โ The infringement from Huawei revolves around one particular patent, namely 527 patent, which covers โ[a] method for interfacing analog/digital converting means and JPEG compression means, said JPEG compression means having a built-in memory device, comprising the steps of: sequentially reading a predetermined number of image lines from the image data output of said analog/digital converting means.โ
๐ ๐๐ผ https://www.gizmochina.com/2020/07/15/huawei-facing-lawsuit-image-processing-patents/
#huawei #lawsuit #image #processing #patents #CedarLane
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Huawei, the known smartphone maker, is being sued by Cedar Lane Technologies. The latter had filed a lawsuit earlier this week for patent infringement and claims that Huawei infringed on their image processing patents and even used these patented methods in their systems and devices.
According to Cedar Lane Technologies, the Chinese tech giant has infringed on multiple different patents including JPEG compression, scene recognition, electro-luminescent devices, image processing systems, VR camera, and more. Cedar Lane alleged that the smartphone maker has infringed one particular patent on a variety of its products such as smartphones like the Mate Xs, Mate X, Mate 20, Mate 20 Pro, Honor View 10, Honor 8 and even tablets like the MediaPad M5, MediaPad M6, and MediaPad T5.โ
Cedar Lane said that these products have been โmade, used, sold, imported, and offered for sale by Defendant.โ The infringement from Huawei revolves around one particular patent, namely 527 patent, which covers โ[a] method for interfacing analog/digital converting means and JPEG compression means, said JPEG compression means having a built-in memory device, comprising the steps of: sequentially reading a predetermined number of image lines from the image data output of said analog/digital converting means.โ
๐ ๐๐ผ https://www.gizmochina.com/2020/07/15/huawei-facing-lawsuit-image-processing-patents/
#huawei #lawsuit #image #processing #patents #CedarLane
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Gizmochina
Huawei is facing a lawsuit regarding Image Processing patents
Huawei, the known smartphone maker, is being sued by Cedar Lane Technologies. The latter had filed a lawsuit earlier this week for patent infringement and claims that Huawei infringed on their image processing patents and even used these patented methodsโฆ