BlackBox (Security) Archiv
4.07K subscribers
183 photos
393 videos
167 files
2.67K links
πŸ‘‰πŸΌ Latest viruses and malware threats
πŸ‘‰πŸΌ Latest patches, tips and tricks
πŸ‘‰πŸΌ Threats to security/privacy/democracy on the Internet

πŸ‘‰πŸΌ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
PimEyes - A Polish company just abolishes our anonymity

Research by
netzpolitik.org shows the potential for abuse of PimEyes, a free search engine for 900 million faces. All of whom have photos on the Internet could already be part of their database.

Dylan smiles into the camera, arm in arm with the other guests of a queer boat party. Behind them, glasses glisten on the shelves of a bar. Eight years ago a party photographer uploaded this snapshot on the internet. Dylan had already forgotten it - until today. Because with a reverse search engine for faces, everyone can find this old party photo of Dylan. All they have to do is upload his profile picture from the Xing career network, free of charge and without registration. But Dylan wants to keep his private and professional life separate: During the day he works as a banker in Frankfurt am Main.

The name of the search engine is PimEyes. It analyses masses of faces on the Internet for individual characteristics and stores the biometric data. When Dylan tests the search engine with his profile picture, it compares it with the database and delivers similar faces as a result, shows a preview picture and the domain where the picture was found. Dylan was recognized even though, unlike today, he did not even have a beard then.

Our research shows: PimEyes is a wholesale attack on anonymity and possibly illegal. A snapshot may be enough to identify a stranger using PimEyes. The search engine does not directly provide the name of a person you are looking for. But if it finds matching faces, in many cases the displayed websites can be used to find out name, profession and much more.

πŸ‘€ πŸ‘‰πŸΌ πŸ‡¬πŸ‡§ PimEyes - A Polish company just abolishes our anonymity
https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/

πŸ‘€ πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ: https://netzpolitik.org/2020/gesichter-suchmaschine-pimeyes-schafft-anonymitaet-ab/

πŸ‘€ πŸ‘‰πŸΌ πŸ‡¬πŸ‡§ https://www.bbc.com/news/technology-53007510

πŸ‘€ πŸ‘‰πŸΌ πŸ‡¬πŸ‡§ https://petapixel.com/2020/06/11/this-creepy-face-search-engine-scours-the-web-for-photos-of-anyone/

πŸ‘€ πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ Automated face recognition -
Enforce our data protection rights at last!
https://netzpolitik.org/2020/automatisierte-gesichtserkennung-setzt-unsere-datenschutzrechte-endlich-auch-durch/

#PimEyes #facialrecognition #searchengine #privacy #anonymity #ourdata #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Atlas of Surveillance - A project of the Electronic Frontier Foundation

The Atlas of Surveillance database, containing several thousand data points on over 3,000 city and local police departments and sheriffs' offices nationwide, allows citizens, journalists, and academics to review details about the technologies police are deploying, and provides a resource to check what devices and systems have been purchased locally.

πŸ‘€ πŸ‘‰πŸΌ https://atlasofsurveillance.org/ πŸ‘ˆπŸΌ πŸ‘€

πŸ‘€ πŸ‘‰πŸΌ
https://www.eff.org/press/releases/eff-launches-searchable-database-police-agencies-and-tech-tools-they-use-spy

#eff #atlas #surveillance
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Hacker breaches security firm in act of revenge

Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.

A hacker claims to have breached the backend servers belonging to a US cyber-security firm and stolen information from the company's "data leak detection" service.

The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches.

The databases have been collected inside DataViper, a data leak monitoring service managed by Vinny Troia, the security researcher behind Night Lion Security, a US-based cyber-security firm.

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/hacker-breaches-security-firm-in-act-of-revenge/

πŸ‘€ πŸ‘‰πŸΌ https://gist.github.com/campuscodi/226b0758e08592df2e5d898979d1da17

#DataViper #leak #breach #hacked
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
πŸ‘2
Media is too big
VIEW IN TELEGRAM
Quantum Hardening Cryptographic Protocols

This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.

If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00

πŸ“Ί πŸ‘‰πŸΌ πŸ‡¬πŸ‡§ https://media.ccc.de/v/DiVOC-19-quantum-en

πŸ“Ί πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ https://media.ccc.de/v/DiVOC-19-quantum

#ccc #DiVOC #video #quantum #hardening
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Startpage.com interview: still the most discreet search engine?

StartPage.com has always presented itself as a data-saving alternative. Since the sale of the majority of shares to a data broker last autumn, the provider has been vehemently criticized. We are of course interested in the background of the takeover, but not only.

Of course we have addressed this issue in our detailed interview. We give the operators the opportunity to comment on the incident themselves. With the help of our community we have collected the questions in advance. At this point, I would like to thank JΓΆrg Bauer, the press spokesman of Startpage, who dealt with the countless questions. Many thanks also to Sunny, who organized numerous questions and the translation into English. You can find the german interview here.

πŸ‘€ πŸ‘‰πŸΌ πŸ‡¬πŸ‡§ https://tarnkappe.info/startpage-com-interview-still-the-most-discreet-search-engine/

πŸ‘€ πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ https://tarnkappe.info/startpage-com-im-interview-noch-immer-die-diskreteste-suchmaschine/

#startpage #interview
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
BlackBox (Security) Archiv
When Google listens to you breathe The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this. How much does Google know about us? In other…
Google offers data pledge in bid to win EU okay for Fitbit buy

Alphabet Inc’s (GOOGL.O) Google has offered not to use health data of fitness tracker company Fitbit to help it target ads in an attempt to address EU antitrust concerns about its proposed $2.1 billion acquisition, the U.S. tech company said late on Monday.

The bid, announced in November last year, would help Google take on market leader Apple (AAPL.O) and Samsung (005930.KS) in the fitness-tracking and smart-watch market, alongside others including Huawei [HWT.UL] and Xiaomi (1810.HK).

β€œThis deal is about devices, not data. We appreciate the opportunity to work with the European Commission on an approach that safeguards consumers’ expectations that Fitbit device data won’t be used for advertising,” Google said in an emailed statement.

Reuters reported last week that such a data pledge may likely help Google secure EU approval for the deal.

With just 3% of the global wearables market as of the first quarter of 2020, Fitbit is far behind Apple’s 29.3% share and also trails Xiaomi, Samsung and Huawei, according to data from market research firm International Data Corp.

πŸ‘€ πŸ‘‰πŸΌ When Google listens to you breathe
https://t.iss.one/BlackBox_Archiv/1003

πŸ‘€ πŸ‘‰πŸΌ https://www.reuters.com/article/us-fitbit-m-a-alphabet-eu-exclusive-idUSKCN24E2X5?taid=5f0cf7d82841fc000146e530

#google #DeleteGoogle #Fitbit #healthdata #advertising #ourdata #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
AssangeLeaks

DDoSecrets Announcement About This Folder

With the Justice Department's superseding indictment against Assange, public access to the evidence becomes critical. The documents in this file illuminate that case and illustrate how WikiLeaks operates behind closed doors. AssangeLeaks is not for or against Julian Assange or WikiLeaks, and is only interested in the evidence.

πŸ‘€ πŸ‘‰πŸΌ https://assangeleaks.org/

#DDoSecrets #leak #Assange #FreeAssange
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Huawei to be closed out of UK’s 5G infrastructure. Spyware, ransomware…
Huawei to be closed out of UK’s 5G infrastructure. Spyware, ransomware, and botnets. The odd case of Data Viper. SAP has a major patch out.

The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if you’re a user, CISA advises you to take this one seriously.

🎧 πŸ‘‰πŸΌ https://thecyberwire.com/podcasts/daily-podcast/1129/notes

#cyberwire #podcast
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Confirmed: Spotify launches in Russia (and 12 other countries); service now reaches 92 markets globally

Spotify is launching in Russia as you read this, in addition to 12 other European markets, the streaming company has announced.

In addition to Russia, the 13 new markets in which Spotify is launching today include Albania, Belarus, Bosnia & Herzegovina, Croatia, Kazakhstan, Kosovo, Moldova, Montenegro, North Macedonia, Russia, Serbia, Slovenia and Ukraine.

πŸ‘€ πŸ‘‰πŸΌ https://www.musicbusinessworldwide.com/confirmed-spotify-launches-in-russia-and-12-other-countries-service-now-reaches-92-markets-globally/

#spotify #russia
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Huawei is facing a lawsuit regarding Image Processing patents

Huawei, the known smartphone maker, is being sued by Cedar Lane Technologies. The latter had filed a lawsuit earlier this week for patent infringement and claims that Huawei infringed on their image processing patents and even used these patented methods in their systems and devices.

According to Cedar Lane Technologies, the Chinese tech giant has infringed on multiple different patents including JPEG compression, scene recognition, electro-luminescent devices, image processing systems, VR camera, and more. Cedar Lane alleged that the smartphone maker has infringed one particular patent on a variety of its products such as smartphones like the Mate Xs, Mate X, Mate 20, Mate 20 Pro, Honor View 10, Honor 8 and even tablets like the MediaPad M5, MediaPad M6, and MediaPad T5.”

Cedar Lane said that these products have been β€œmade, used, sold, imported, and offered for sale by Defendant.” The infringement from Huawei revolves around one particular patent, namely 527 patent, which covers β€œ[a] method for interfacing analog/digital converting means and JPEG compression means, said JPEG compression means having a built-in memory device, comprising the steps of: sequentially reading a predetermined number of image lines from the image data output of said analog/digital converting means.”

πŸ‘€ πŸ‘‰πŸΌ https://www.gizmochina.com/2020/07/15/huawei-facing-lawsuit-image-processing-patents/

#huawei #lawsuit #image #processing #patents #CedarLane
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Google sued for 'blatant lies' about user privacy

A new suit alleges that Android and potentially iOS users are secretly having their personal data harvested by "voyeur extraordinare" Google, even if they are not using Google's own apps.

In its second suit against Google in as many months, law firm Boies Schiller Flexner is accusing the search giant of illicitly gathering user data from mobile users. Where the previous suit was specifically regarding the use of Google Chrome, this one concerns the use of many apps on the Android platform β€” and potentially on iOS, too.

"Google is always watching," the suit, seen by Law360, says. "Even when it promises to look away, Google is watching. Every click, every website, every app β€” our entire virtual lives. Intercepted. Tracked. Logged. Compiled. Packaged. Sold for profit."

As the suit notes, Google has an optional setting to prevent tracking of "web & app activity," but it alleges that this and other reassurances about privacy are "blatant lies."

πŸ‘€ πŸ‘‰πŸΌ https://appleinsider.com/articles/20/07/15/google-sued-for-blatant-lies-about-user-privacy

πŸ‘€ πŸ‘‰πŸΌ https://www.law360.com/articles/1292121/boies-schiller-files-new-privacy-suit-against-voyeur-google

#DeleteGoogle #lies #android #ios #privacy #ourdata #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Report: No-Log VPNs Exposed Users’ Logs and Personal Details for All to See

A group of free VPN (virtual private network) apps left their server completely open and accessible, exposing private user data for anyone to see. This lack of basic security measures in an essential part of a cybersecurity product is not just shocking. It also shows a total disregard for standard VPN practices that put their users at risk.

The vpnMentor research team, led by Noam Rotem, uncovered the server and found Personally Identifiable Information (PII) data for potentially over 20 million VPN users, according to claims of user numbers made by the VPNs.

Each of these VPNs claims that their services are β€œno-log” VPNs, which means that they don’t record any user activity on their respective apps. However, we found multiple instances of internet activity logs on their shared server. This was in addition to the PII data, which included email addresses, clear text passwords, IP addresses, home addresses, phone models, device ID, and other technical details.

The VPNs affected are UFO VPN, FAST VPN, Free VPN, Super VPN, Flash VPN, Secure VPN, and Rabbit VPN – all of which appear to be connected by a common app developer and white-labeled for other companies.

πŸ‘€ πŸ‘‰πŸΌ https://www.vpnmentor.com/blog/report-free-vpns-leak/

#vpn #breach #leak #cybersecurity
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Massive Bitcoin fraud wave rolls over Twitter

Do not send Bitcoins! They will certainly not be doubled.

Prominent Twitter accounts such as those of Bill Gates, Elon Musk, Jeff Bezos, Joe Biden, Apple and Uber currently promise to double Bitcoins sent to certain wallets. Numerous crypto currency exchanges also tweet similar "invitations". Some refer to an alleged "Crypto for Health" campaign.

This is a large-scale fraud attempt. The most likely scenario at present is a security hole in Twitter, which allows the perpetrators to access numerous, perhaps even all, Twitter accounts. Therefore, it cannot be ruled out that the perpetrators will send less conspicuous tweets to any Twitter account. Now, special caution is required when interpreting tweets.

πŸ‘‰πŸΌ πŸ‘€ πŸ‡¬πŸ‡§ https://www.coindesk.com/hackers-take-over-prominent-crypto-twitter-accounts-in-simultaneous-attack

https://twitter.com/TwitterSupport/status/1283518038445223936

πŸ‘€ πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ https://www.heise.de/news/Massive-Bitcoin-Betrugswelle-ueberrollt-Twitter-4844911.html

#twitter #fraud #bitcoin #hacked
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Hackers Convinced Twitter Employee to Help Them Hijack Accounts

After a wave of account takeovers, screenshots of an internal Twitter user administration tool are being shared in the hacking underground.

A Twitter insider was responsible for a wave of high profile account takeovers on Wednesday, according to leaked screenshots obtained by Motherboard and two sources who took over accounts.

On Wednesday, a spike of high profile accounts including those of Joe Biden, Elon Musk, Bill Gates, Barack Obama, Uber, and Apple tweeted cryptocurrency scams in an apparent hack.

"We used a rep that literally done all the work for us," one of the sources told Motherboard. The second source added they paid the Twitter insider. Motherboard granted the sources anonymity to speak candidly about a security incident. A Twitter spokesperson told Motherboard that the company is still investigating whether the employee hijacked the accounts themselves or gave hackers access to the tool.

The accounts were taken over using an internal tool at Twitter, according to the sources, as well as screenshots of the tool obtained by Motherboard. One of the screenshots shows the panel and the account of Binance; Binance is one of the accounts that hackers took over today. According to screenshots seen by Motherboard, at least some of the accounts appear to have been compromised by changing the email address associated with them using the tool.

πŸ‘€ πŸ‘‰πŸΌ https://www.vice.com/en_us/article/jgxd3d/twitter-insider-access-panel-account-hacks-biden-uber-bezos

#twitter #fraud #bitcoin #hacked #insider
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
cp200091de.pdf
250.6 KB
EU court smashes Privacy Shield

The highest court in the EU demands effective protection of European data from mass surveillance in the USA.

The European Court of Justice does not consider the level of data protection in the US to be equivalent to that in the European Union. That is why the court declared a decision by the EU Commission on the transfer of personal data of Europeans* to the USA, known as Privacy Shield, illegal today, Thursday.

https://www.commondreams.org/news/2020/07/16/win-rebuke-us-mass-surveillance-eu-court-blocks-data-transfers-web-corporations

πŸ‘€ πŸ‘‰πŸΌ PDF:
https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdf

#masssurveillance #usa #eu #court #privacyshield #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Fan Uses AI Software To Lipread What Actors Really Said In TV Series Before Chinese Authorities Censored Them

It's hardly news to Techdirt readers that China carries out censorship on a massive scale. What may be more surprising is that its censorship extends to even the most innocuous aspects of life. The ChinAI Newsletter, which provides translations by Jeff Ding of interesting texts from the world of Chinese AI, flags up one such case. It concerns a Chinese online TV series called "The Bad Kids". Here's how the site Sixth Tone describes it:

"Since its first episodes were released on China's Netflix-like video platform iQiyi in mid-June, "The Bad Kids" has earned sweeping praise for its plot, cinematography, casting, dialogue, pacing, and soundtrack. It's also generated wide-ranging online discussion on human nature due to the psychology and complex motivations of its characters."

πŸ‘€ πŸ‘‰πŸΌ Lip Recognition Tech Applied to Hit Chinese Drama
https://chinai.substack.com/p/chinai-102-lip-reading-the-bad-kids

https://www.techdirt.com/articles/20200715/07190444905/fan-uses-ai-software-to-lipread-what-actors-really-said-tv-series-before-chinese-authorities-censored-them.shtml

#lostnfound #china #lipread #censorship #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
This media is not supported in your browser
VIEW IN TELEGRAM
Your personal data is going on a journey

The EU is constructing a number of new systems for the screening, monitoring and tracking of international travellers that places them under an increasing veil of suspicion. Justified primarily in the name of ensuring security, all non-EU citizens attempting to visit the Schengen area will have their biometric and biographic data registered in large centralised databases, where it will be cross-referenced against a host of other systems and used to feed new databases, profiling tools and watchlists...(...)

πŸ‘€ πŸ‘‰πŸΌ Your personal data is going on a journey
https://www.statewatch.org/automated-suspicion-the-eu-s-new-travel-surveillance-initiatives/conclusions-your-personal-data-is-going-on-a-journey/

#ourdata #BigData #eu #screening #monitoring #tracking #biometric #biographic #profiling #watchlist #surveillance #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
GitHub preserves its open-source software code deep in the arctic for future generations

GitHub Inc. said today it has delivered a copy of all of the open-source software code stored on its website to a data repository at the Arctic World Archive, which is a very long-term archival facility buried 250 meters deep in the permafrost of an Arctic mountain.

The operation is part of the GitHub Archive Program, which is a project announced last year that aims to preserve today’s open-source software for future generations. To do that, GitHub said, it will store its code in an archive called the GitHub Arctic Code Vault, which it says has been built to last for a thousand years.

GitHub said it carried out the operation in partnership with a long-term data storage company called Piql, which copied the entire contents of its active public repositories and wrote that data to 186 reels of hardened microfilm. The microfilm was then shipped to the island of Svalbard in Norway, which is located inside the Arctic Circle, and transported to a decommissioned coal mine set within a mountain that’s now home to the Arctic World Archive.

Once there, the encoded microfilm was placed inside the GitHub Arctic Code Vault, which is a deep chamber that’s buried inside hundreds of meters of permafrost.

πŸ‘€ πŸ‘‰πŸΌ https://siliconangle.com/2020/07/16/github-preserves-open-source-software-code-deep-arctic-future-generations/

#GitHub #open #source #software #arcticCodeVault
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
VPN firm that claims zero logs policy leaks 20 million user logs

The VPN company in the discussion is a Hong Kong-based UFO VPN owned by Dreamfii HK Limited.

Perhaps, the most ironic moments in the cybersecurity world occur when those who promise to protect your online privacy cannot guard their own turf. We’ve seen this happen from time to time with security firms getting hacked themselves.

Another similar case has emerged recently when the database of a Hong Kong-based VPN provider called UFO VPN was exposed with more than 20 million users logs.

Discovered by researchers from Comparitech on July 1st, 2020; the exposure occurred due to the database hosted on an Elasticsearch cluster being left without any password.

πŸ‘€ πŸ‘‰πŸΌ https://www.hackread.com/vpn-firm-zero-logs-policy-leaks-20-million-user-logs/

#vpn #leak #UFOVPN #hongkong #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
This media is not supported in your browser
VIEW IN TELEGRAM
pyIDM / PyIDM

PyIDM is a python open source (Internet Download Manager) with multi-connections, high speed engine, it downloads general files and videos from youtube and tons of other streaming websites .
Developed in Python, based on "pyCuRL/libcurl", "youtube_dl", and "PySimpleGUI"

πŸ‘€ πŸ‘‰πŸΌ https://github.com/pyIDM/PyIDM

#pyIDM #PyIDM #download #manager
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Inside Citizen, the App That Asks You to Report on the Crime Next Door

From its need to make money to its ever-changing relationship with law enforcement, the hyperlocal news-reporting app faces growing pains.

The first thing you see when you open Citizen is a map. It is an app that always runs in dark mode, the black grids of New York, San Francisco, Baltimore, Los Angelesβ€”any of the 19 cities where the app is currently availableβ€”splayed across the screen. Pinch and zoom and you’ll see dots show up on the map. Each one indicates a local crisis: a fire, an assault, a man wielding two tridents. All this geolocated information is gleaned from the city’s emergency scanners and filtered through Citizen employees, who compile the incidents and place them on the map. The app’s always-on location awareness is a necessity. If the incident is in your neighborhood, the app sends you a push notification about the potential danger. If Citizen decides you’re really close, a button appears to let you livestream what’s happening.

πŸ‘€ πŸ‘‰πŸΌ https://www.wired.com/story/citizen/

#citizen #crime #usa #thinkabout #why
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag