This media is not supported in your browser
VIEW IN TELEGRAM
SF drone footage during the #BayAreaFires on 9/9/20, set to Blade Runner 2049 music
I know this video has nothing to do with threats to security / privacy / democracy on the net. Or somehow it does? Clearly something we should think about !!
๐ ๐๐ผ State of emergency declared:
https://www.gov.ca.gov/2020/08/18/governor-newsom-declares-statewide-emergency-due-to-fires-extreme-weather-conditions-2/
๐บ ๐๐ผ https://www.youtube.com/watch?v=x_m9TUP_t_Y
#BayAreaFires #usa #emergency #thinkabout #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
I know this video has nothing to do with threats to security / privacy / democracy on the net. Or somehow it does? Clearly something we should think about !!
๐ ๐๐ผ State of emergency declared:
https://www.gov.ca.gov/2020/08/18/governor-newsom-declares-statewide-emergency-due-to-fires-extreme-weather-conditions-2/
๐บ ๐๐ผ https://www.youtube.com/watch?v=x_m9TUP_t_Y
#BayAreaFires #usa #emergency #thinkabout #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Social Dilemma
Why the algorithms of #TikTok are possibly optimized more for screentime and less for suicide removal is explained very clearly in the new Netflix documentary "The Social Dilemma". Director Jeff Orlowski has put all the ethics big shots from Silicon Valley in front of the camera - from Tristan Harris to Shoshanna Zuboff - and lets them once again unravel the business model of surveillance capitalism in a striking way.
๐บ ๐๐ผ The Social Dilemma ๐๐ผ #video #documentary #surveillance #capitalism #SocialDilemma #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Why the algorithms of #TikTok are possibly optimized more for screentime and less for suicide removal is explained very clearly in the new Netflix documentary "The Social Dilemma". Director Jeff Orlowski has put all the ethics big shots from Silicon Valley in front of the camera - from Tristan Harris to Shoshanna Zuboff - and lets them once again unravel the business model of surveillance capitalism in a striking way.
๐บ ๐๐ผ The Social Dilemma ๐๐ผ #video #documentary #surveillance #capitalism #SocialDilemma #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Ransomware accounted for 41% of all cyber insurance claims in H1 2020
Cyber insurance claims ranged in size from $1,000 to well over $2,000,000 per security incident.
Ransomware incidents have accounted for 41% of cyber insurance claims filed in the first half of 2020, according to a report published today by Coalition, one of the largest providers of cyber insurance services in North America.
The high number of claims comes to confirm previous reports from multiple cyber-security firms that ransomware is one of today's most prevalent and destructive threats.
"In the first half of 2020 alone, we observed a 260% increase in the frequency of ransomware attacks amongst our policyholders, with the average ransom demand increasing 47%," the company added.
๐ ๐๐ผ https://www.zdnet.com/article/ransomware-accounts-to-41-of-all-cyber-insurance-claims
#ransomware #cyber #ensurance #claims
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Cyber insurance claims ranged in size from $1,000 to well over $2,000,000 per security incident.
Ransomware incidents have accounted for 41% of cyber insurance claims filed in the first half of 2020, according to a report published today by Coalition, one of the largest providers of cyber insurance services in North America.
The high number of claims comes to confirm previous reports from multiple cyber-security firms that ransomware is one of today's most prevalent and destructive threats.
"In the first half of 2020 alone, we observed a 260% increase in the frequency of ransomware attacks amongst our policyholders, with the average ransom demand increasing 47%," the company added.
๐ ๐๐ผ https://www.zdnet.com/article/ransomware-accounts-to-41-of-all-cyber-insurance-claims
#ransomware #cyber #ensurance #claims
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange
Cybercriminals successfully plundered another digital cryptocurrency exchange.
European cryptocurrency exchange #Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars.
Eterbase, which has now entered maintenance mode until the security issue is resolved, described itself as Europe's Premier #Digital #Asset #Exchange.
Based in Bratislava, Slovakia, and launched in 2019, Eterbase is a small cryptocurrency exchange platform that focuses on crypto to SEPA integration (via individual IBAN accounts), multi-asset support, and regulatory compliance.
On Monday night, #malicious threat actors managed to raid six Eterbase's hot wallets for #Bitcoin, #Ethereum, #XRP, #Tezos, #Algorand, and #TRON and transferred the funds into their #wallets managed at six rival #crypto #exchanges, Eterbase reported on its Telegram channel on Tuesday.
๐ ๐๐ผ https://twitter.com/ETERBASE/status/1303829913015902210
๐ ๐๐ผ https://thehackernews.com/2020/09/hackers-stole-cryptocurrencies.html
#hackers #hacked #cryptocurrencies
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Cybercriminals successfully plundered another digital cryptocurrency exchange.
European cryptocurrency exchange #Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars.
Eterbase, which has now entered maintenance mode until the security issue is resolved, described itself as Europe's Premier #Digital #Asset #Exchange.
Based in Bratislava, Slovakia, and launched in 2019, Eterbase is a small cryptocurrency exchange platform that focuses on crypto to SEPA integration (via individual IBAN accounts), multi-asset support, and regulatory compliance.
On Monday night, #malicious threat actors managed to raid six Eterbase's hot wallets for #Bitcoin, #Ethereum, #XRP, #Tezos, #Algorand, and #TRON and transferred the funds into their #wallets managed at six rival #crypto #exchanges, Eterbase reported on its Telegram channel on Tuesday.
๐ ๐๐ผ https://twitter.com/ETERBASE/status/1303829913015902210
๐ ๐๐ผ https://thehackernews.com/2020/09/hackers-stole-cryptocurrencies.html
#hackers #hacked #cryptocurrencies
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
X (formerly Twitter)
ETERBASE on X
#Eterbase will continue with operations!
Our investigation shows a big part of stollen funds ended up on @binance, @HuobiGlobal, and @hitbtc.
Your assistance will be appreciated.
Thank you!
@cz_binance #compliant #EU #cryptocurrency #exchange #trading
Our investigation shows a big part of stollen funds ended up on @binance, @HuobiGlobal, and @hitbtc.
Your assistance will be appreciated.
Thank you!
@cz_binance #compliant #EU #cryptocurrency #exchange #trading
Facebook pilots Campus, a college student-only section similar to The Facebook of '04
The company is aiming to personalize Facebook's core service for the modern-day college experience.
Facebook announced Wednesday that it's piloting a new college-only section on the platform called Facebook Campus. The space is meant to serve as a hub for students on college campuses, offering ways to find and connect with fellow classmates, and keep up with campus events -- sort of like the original The Facebook that launched as a social network for college students back in 2004.
With this new version, however, the company is aiming to personalize Facebook's core service for the modern-day college experience.
"This year, students across the country are facing new challenges as some campuses shift to partial or full-time remote learning, so it's more important than ever to find a way to stay connected to college life," Charmaine Hung, product manager for Facebook Campus, wrote in a blog post.
๐ ๐๐ผ https://about.fb.com/news/2020/09/introducing-facebook-campus/
๐ ๐๐ผ https://www.zdnet.com/article/facebook-pilots-campus-a-college-student-only-section-similar-to-the-facebook-of-04
#fb #DeleteFacebook #campus #students
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The company is aiming to personalize Facebook's core service for the modern-day college experience.
Facebook announced Wednesday that it's piloting a new college-only section on the platform called Facebook Campus. The space is meant to serve as a hub for students on college campuses, offering ways to find and connect with fellow classmates, and keep up with campus events -- sort of like the original The Facebook that launched as a social network for college students back in 2004.
With this new version, however, the company is aiming to personalize Facebook's core service for the modern-day college experience.
"This year, students across the country are facing new challenges as some campuses shift to partial or full-time remote learning, so it's more important than ever to find a way to stay connected to college life," Charmaine Hung, product manager for Facebook Campus, wrote in a blog post.
๐ ๐๐ผ https://about.fb.com/news/2020/09/introducing-facebook-campus/
๐ ๐๐ผ https://www.zdnet.com/article/facebook-pilots-campus-a-college-student-only-section-similar-to-the-facebook-of-04
#fb #DeleteFacebook #campus #students
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Meta Newsroom
Introducing Facebook Campus
A college-only space designed to help students connect with fellow classmates no matter where they are.
Smart contact lens prototype raises eyebrows
This prosthetic iris demonstrates the power and promise of nanotechnology.
Smart contact lenses are a sci-fi trope, but they may also offer hope for sufferers of certain kinds of debilitating eye ailments. That's the goal of new research into a a tunable, low-powered iris embedded in a smart contact lens.
It's a good example of the growing role of nanotechnology in human augmentation and therapeutics. The human iris controls pupil size in response to light, a critical function that allows the retina to take in appropriate sensory information. Too much light and the world is washed out, too little and it's veiled in darkness. A host of eye diseases and deficiencies inhibit the iris from responding appropriately, including aniridia and keratoconus. Light sensitivity, similarly, is a painful debilitation and is often associated with chronic migraine.
Researchers at Imec, an innovation hub based in Belgium, along with partners like CMST, a Ghent University-affiliated research group, the Instituto de Investigaciรณn Sanitaria Fundaciรณn Jimรฉnez Dรญaz in Madrid, Spain, and Holst Centre have been developing an low-powered wearable solution. The contact lens's iris aperture is tunable thanks to an integrated liquid crystal display (LCD) that manipulates concentric rings.
๐ ๐๐ผ https://www.zdnet.com/article/smart-contact-lens-prototype-raises-eyebrows
#smart #contactlens #prototype
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
This prosthetic iris demonstrates the power and promise of nanotechnology.
Smart contact lenses are a sci-fi trope, but they may also offer hope for sufferers of certain kinds of debilitating eye ailments. That's the goal of new research into a a tunable, low-powered iris embedded in a smart contact lens.
It's a good example of the growing role of nanotechnology in human augmentation and therapeutics. The human iris controls pupil size in response to light, a critical function that allows the retina to take in appropriate sensory information. Too much light and the world is washed out, too little and it's veiled in darkness. A host of eye diseases and deficiencies inhibit the iris from responding appropriately, including aniridia and keratoconus. Light sensitivity, similarly, is a painful debilitation and is often associated with chronic migraine.
Researchers at Imec, an innovation hub based in Belgium, along with partners like CMST, a Ghent University-affiliated research group, the Instituto de Investigaciรณn Sanitaria Fundaciรณn Jimรฉnez Dรญaz in Madrid, Spain, and Holst Centre have been developing an low-powered wearable solution. The contact lens's iris aperture is tunable thanks to an integrated liquid crystal display (LCD) that manipulates concentric rings.
๐ ๐๐ผ https://www.zdnet.com/article/smart-contact-lens-prototype-raises-eyebrows
#smart #contactlens #prototype
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNET
Smart contact lens prototype raises eyebrows
This prosthetic iris demonstrates the power and promise of nanotechnology.
Trump Twitter Account Hacked (2016) by Dutch Hackers With The Password "Yourefired"
๐ ๐๐ผ https://www.reddit.com/r/worldnews/comments/iqnjcu/trump_twitter_account_hacked_by_dutch_hackers/
๐ ๐๐ผ https://nos.nl/artikel/2347694-nederlandse-hackers-schrokken-toen-ze-trumps-twitteraccount-binnendrongen.html
๐ ๐๐ผ https://www.vn.nl/tijdlijn-zo-verliep-de-hack-van-trump/
#trump #ToddlerTrump #twitter #hacked #dutch #hackers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ ๐๐ผ https://www.reddit.com/r/worldnews/comments/iqnjcu/trump_twitter_account_hacked_by_dutch_hackers/
๐ ๐๐ผ https://nos.nl/artikel/2347694-nederlandse-hackers-schrokken-toen-ze-trumps-twitteraccount-binnendrongen.html
๐ ๐๐ผ https://www.vn.nl/tijdlijn-zo-verliep-de-hack-van-trump/
#trump #ToddlerTrump #twitter #hacked #dutch #hackers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
F5 Big-IP RCE writeup + full exploit
When TEAMARES began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory released last month, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research. The advisory states that the vulnerability impacts a variety of capabilities when exploited, including the ability to execute arbitrary Java code, which stood out to us.
๐ ๐๐ผ https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
๐ ๐๐ผ https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902
#f5 #ip #remote #code #execution #exploit #teamares #poc #writeup
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
When TEAMARES began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory released last month, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research. The advisory states that the vulnerability impacts a variety of capabilities when exploited, including the ability to execute arbitrary Java code, which stood out to us.
๐ ๐๐ผ https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
๐ ๐๐ผ https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902
#f5 #ip #remote #code #execution #exploit #teamares #poc #writeup
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
I am a former (convicted) Darknet vendor, dealing in cocaine and heroin to all 50 states from June of 2016 to early 2017. AMA! - ask me anything
My short bio: I was one of the most popular USA domestic cocaine vendors on the darknet on Alphabay and Dream, beginning in the summer of 2016 into early 2017. I initially started selling pure cocaine, and expanded my menu to Xanax and Heroin a couple of months in. AMAA! My Proof: Proof submitted confidentially to moderators
๐ ๐๐ผ https://www.reddit.com/r/IAmA/comments/iqlr29/iama_i_am_a_former_convicted_darknet_vendor/
#darknet #vendor #dealer #questions
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
My short bio: I was one of the most popular USA domestic cocaine vendors on the darknet on Alphabay and Dream, beginning in the summer of 2016 into early 2017. I initially started selling pure cocaine, and expanded my menu to Xanax and Heroin a couple of months in. AMAA! My Proof: Proof submitted confidentially to moderators
๐ ๐๐ผ https://www.reddit.com/r/IAmA/comments/iqlr29/iama_i_am_a_former_convicted_darknet_vendor/
#darknet #vendor #dealer #questions
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Reddit
IamA I am a former (convicted) Darknet vendor, dealing in cocaine and heroin to all 50 states from June of 2016 to early 2017.โฆ
16K votes, 3.8K comments. 23M subscribers in the IAmA community. I Am A, where the mundane becomes fascinating and the outrageous suddenly seemsโฆ
Chinaโs โpurificationโ of classrooms: A new law erases history, silences teachers and rewrites books
HONG KONG โ The high school visual arts teacher couldnโt go to the front lines of protest, but he took inspiration from the pro-democracy marches and unleashed his own brand of subversion: cartoons.
He drew a policeman sweeping a bloodied protester under a rug fashioned after the Chinese flag. Another sketch captioned โLunchtimeโ depicted popular snacks โ an egg custard tart and deep-fried French toast โ next to a canister of tear gas. He captured the unrelenting despair that seized Hong Kongers after the demonstrations each night with an image of a man lying in bed crying himself to sleep.
Everywhere Wong looked, he saw China constricting the freedoms that had made Hong Kong an unabashed city of towering glass, raucous politics and quicksilver commerce. He drew in harrowing detail what he was losing, sharing his work on social media under the pen name @vawongsir. He thought his identity was safe. But then came the anonymous complaint to the Education Bureau that he was โpublishing inappropriate illustrations online.โ
Wong would end up losing his job.
โI felt powerless,โ he said.
With Chinaโs tightening control over Hong Kong, including passage of a new national security law, the territoryโs pro-democracy activists, politicians, journalists and others are facing a Communist Party determined to crush dissent. Perhaps the greatest threat from this new purge โ one that will affect generations to come โ is the increasing pressure on schools and teachers over what to put in the minds of students. Both activists and bureaucrats know that a nationโs soul is distilled in the classroom; history can be erased with the silencing of teachers and rewriting of textbooks.
๐ ๐๐ผ https://www.latimes.com/world-nation/story/2020-09-11/hong-kong-teacher-purge
#china #hongkong #purification #teacher #classrooms #erase #history #rewrite #books #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
HONG KONG โ The high school visual arts teacher couldnโt go to the front lines of protest, but he took inspiration from the pro-democracy marches and unleashed his own brand of subversion: cartoons.
He drew a policeman sweeping a bloodied protester under a rug fashioned after the Chinese flag. Another sketch captioned โLunchtimeโ depicted popular snacks โ an egg custard tart and deep-fried French toast โ next to a canister of tear gas. He captured the unrelenting despair that seized Hong Kongers after the demonstrations each night with an image of a man lying in bed crying himself to sleep.
Everywhere Wong looked, he saw China constricting the freedoms that had made Hong Kong an unabashed city of towering glass, raucous politics and quicksilver commerce. He drew in harrowing detail what he was losing, sharing his work on social media under the pen name @vawongsir. He thought his identity was safe. But then came the anonymous complaint to the Education Bureau that he was โpublishing inappropriate illustrations online.โ
Wong would end up losing his job.
โI felt powerless,โ he said.
With Chinaโs tightening control over Hong Kong, including passage of a new national security law, the territoryโs pro-democracy activists, politicians, journalists and others are facing a Communist Party determined to crush dissent. Perhaps the greatest threat from this new purge โ one that will affect generations to come โ is the increasing pressure on schools and teachers over what to put in the minds of students. Both activists and bureaucrats know that a nationโs soul is distilled in the classroom; history can be erased with the silencing of teachers and rewriting of textbooks.
๐ ๐๐ผ https://www.latimes.com/world-nation/story/2020-09-11/hong-kong-teacher-purge
#china #hongkong #purification #teacher #classrooms #erase #history #rewrite #books #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Los Angeles Times
Chinaโs โpurificationโ of classrooms: A new law erases history, silences teachers and rewrites books
China's crackdown on Hong Kong is purging teachers, rewriting textbooks and increasing pressure on schools over what to put in the minds of students. A new national security law has endangered freedom of thought and expression.
Huawei opens core tech to developers and hopes to inspire the next TikTok
It also laid out plans to see Google replacement HarmonyOS on smartphones from next year and a handful of new consumer devices.
Huawei has announced it will fully open core technologies, including its software and hardware capabilities, to developers and partners.
As part of this plan, Huawei will open software services, such as browsing, search, map, payment, advertising kits, and hardware capabilities, including AR map, communication and transmission tools, as well as security capabilities.
Huawei consumer business group CEO Richard Yu appealed to developers and partners to work with the company to "jointly build a fully-connected all-scenario intelligent ecosystem" featuring new apps across different categories.
"Developers can benefit from all the resources we have โฆ we're dedicated to introducing Chinese developers' work to global consumers, hoping to see more TikTok in the future, so that we can take them to the overseas market," Yu said, speaking through a translator during his keynote speech at Huawei's Developer Conference 2020.
๐ ๐๐ผ https://www.zdnet.com/article/huawei-opens-core-tech-to-developers-and-hopes-to-inspire-the-next-tiktok
#huawei #open #core #tech #HarmonyOS #developers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
It also laid out plans to see Google replacement HarmonyOS on smartphones from next year and a handful of new consumer devices.
Huawei has announced it will fully open core technologies, including its software and hardware capabilities, to developers and partners.
As part of this plan, Huawei will open software services, such as browsing, search, map, payment, advertising kits, and hardware capabilities, including AR map, communication and transmission tools, as well as security capabilities.
Huawei consumer business group CEO Richard Yu appealed to developers and partners to work with the company to "jointly build a fully-connected all-scenario intelligent ecosystem" featuring new apps across different categories.
"Developers can benefit from all the resources we have โฆ we're dedicated to introducing Chinese developers' work to global consumers, hoping to see more TikTok in the future, so that we can take them to the overseas market," Yu said, speaking through a translator during his keynote speech at Huawei's Developer Conference 2020.
๐ ๐๐ผ https://www.zdnet.com/article/huawei-opens-core-tech-to-developers-and-hopes-to-inspire-the-next-tiktok
#huawei #open #core #tech #HarmonyOS #developers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNet
Huawei opens core tech to developers and hopes to inspire the next TikTok
It also laid out plans to see Google replacement HarmonyOS on smartphones from next year and a handful of new consumer devices.
Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm
Digital Citizens Investigation Finds Malware on PiracyApps That Steal User Names and Passwords, Probe to Breach Networks, and Secretly Upload Data.
๐ ๐๐ผ (PDF)
https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Fishing_in_the_Piracy_Stream_v6.pdf
๐ ๐๐ผ Read as well:
Dark Web-Hosted Movies and Fake Apps Are Costing the US Movie and TV Industry Billions Every Year
https://tapeucwutvne7l5o.onion/dark-web-hosted-movies-and-fake-apps-are-costing-the-us-movie-and-tv-industry-billions-every-year
#darknet #darkweb #movies #piracy #report #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Digital Citizens Investigation Finds Malware on PiracyApps That Steal User Names and Passwords, Probe to Breach Networks, and Secretly Upload Data.
๐ ๐๐ผ (PDF)
https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Fishing_in_the_Piracy_Stream_v6.pdf
๐ ๐๐ผ Read as well:
Dark Web-Hosted Movies and Fake Apps Are Costing the US Movie and TV Industry Billions Every Year
https://tapeucwutvne7l5o.onion/dark-web-hosted-movies-and-fake-apps-are-costing-the-us-movie-and-tv-industry-billions-every-year
#darknet #darkweb #movies #piracy #report #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Dark Web-Hosted Movies and Fake Apps Are Costing the US Movie and TV Industry Billions Every Year
The dark web facilitates the movie piracy industry thatโs costing the US movie and TV industry billions of dollars in lost revenue
Illegal movie downloads and counterfeit entertainment apps are costing the US movie and television industry billions of dollars every year.
Today, there are more than 150 billion views of illicit multimedia being consumed across the US every single year. It turns out that a majority of these views have been unaccounted for as a significantly high number of offenders continue to operate under the radar of copyright enforcement authorities.
Illegal file sharing is normally facilitated via torrent websites, which denote online platforms where individuals upload large files.
The torrent websites are accessible to people looking out to download uploaded information that would include pirated movie content, software programs, and video games.
Importantly, the dark web, which is known for hosting illicit goods and services for sale, has become a significantly relevant player in the illegal movies and fake apps business. Here, millions of illicit files are uploaded and accessed by darknet downloaders.
While speaking to Amarillo News, Dr. Brandon Bang, a criminal justice expert, said that the current circumstance surrounding pirated entertainment material has led to the loss of employment opportunities and revenue streams across the economic spectrum.
He went on to highlight the role of torrent websites in enabling the illegal movie download business that has affected the entire industry. The criminal justice pundit went on to cite the case involving shutdown of the torrent website MegaUpload โ an event that was big enough to cause noticeable positive changes in the TV industry, which gained a more than 5 percent increase in revenue due to the anti-piracy operation.
๐ ๐๐ผ https://tapeucwutvne7l5o.onion/dark-web-hosted-movies-and-fake-apps-are-costing-the-us-movie-and-tv-industry-billions-every-year
๐ ๐๐ผ https://abc7amarillo.com/news/local/illegal-downloading-is-costing-the-us-movie-television-industry-billions-per-year
๐ ๐๐ผ Read as well (pdf)
Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm
https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Fishing_in_the_Piracy_Stream_v6.pdf
#darknet #darkweb #movies #piracy #report #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The dark web facilitates the movie piracy industry thatโs costing the US movie and TV industry billions of dollars in lost revenue
Illegal movie downloads and counterfeit entertainment apps are costing the US movie and television industry billions of dollars every year.
Today, there are more than 150 billion views of illicit multimedia being consumed across the US every single year. It turns out that a majority of these views have been unaccounted for as a significantly high number of offenders continue to operate under the radar of copyright enforcement authorities.
Illegal file sharing is normally facilitated via torrent websites, which denote online platforms where individuals upload large files.
The torrent websites are accessible to people looking out to download uploaded information that would include pirated movie content, software programs, and video games.
Importantly, the dark web, which is known for hosting illicit goods and services for sale, has become a significantly relevant player in the illegal movies and fake apps business. Here, millions of illicit files are uploaded and accessed by darknet downloaders.
While speaking to Amarillo News, Dr. Brandon Bang, a criminal justice expert, said that the current circumstance surrounding pirated entertainment material has led to the loss of employment opportunities and revenue streams across the economic spectrum.
He went on to highlight the role of torrent websites in enabling the illegal movie download business that has affected the entire industry. The criminal justice pundit went on to cite the case involving shutdown of the torrent website MegaUpload โ an event that was big enough to cause noticeable positive changes in the TV industry, which gained a more than 5 percent increase in revenue due to the anti-piracy operation.
๐ ๐๐ผ https://tapeucwutvne7l5o.onion/dark-web-hosted-movies-and-fake-apps-are-costing-the-us-movie-and-tv-industry-billions-every-year
๐ ๐๐ผ https://abc7amarillo.com/news/local/illegal-downloading-is-costing-the-us-movie-television-industry-billions-per-year
๐ ๐๐ผ Read as well (pdf)
Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm
https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Fishing_in_the_Piracy_Stream_v6.pdf
#darknet #darkweb #movies #piracy #report #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
KVII
Illegal downloading is costing the U.S. movie & television industry billions per year
Illegal downloading is costing the U. S. movie & television industry, billions of dollars a year. We spoke to Dr. Brandon Bang, assistant Professor of criminal justice at WT and director of the criminal justice program, who said it's also costing the U. S.โฆ
QAnon Website Shuts Down After N.J. Man Identified as Operator
A popular website for posts about the conspiracy group QAnon abruptly shut down after a fact-checking group identified the developer as a New Jersey man.
Qmap.pub is among the largest websites promoting the QAnon conspiracy, with over 10 million visitors in July, according to web analytics firm SimilarWeb Ltd., and served as the primary archive of QAnonโs posts. The website aggregates posts by Q, the anonymous figure behind the QAnon theory, and the creator of the Qmap.pub website is known online only as โQAppAnon.โ
The fact-checking site Logically.ai identified Jason Gelinas of New Jersey on Sept. 10 as the โdeveloper and mouthpieceโ for the site. New Jersey state records connect QAppAnon to Gelinasโs home address, Bloomberg found.
Reached outside his home, Gelinas declined to comment on the Logically report, saying only that someone had sent it to him on Twitter after it was published.
โIโm not going to comment on any of that,โ Gelinas said when asked if he was behind the website Qmap. โIโm not going to get involved. I want to stay out of it.โ
Wearing an American flag baseball cap, Gelinas said that QAnon is a โpatriotic movement to save the country.โ
๐ ๐๐ผ https://www.bloomberg.com/news/articles/2020-09-11/qanon-website-shuts-down-after-n-j-man-identified-as-operator
#qanon #qmap #QAppAnon #website #shutdown
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A popular website for posts about the conspiracy group QAnon abruptly shut down after a fact-checking group identified the developer as a New Jersey man.
Qmap.pub is among the largest websites promoting the QAnon conspiracy, with over 10 million visitors in July, according to web analytics firm SimilarWeb Ltd., and served as the primary archive of QAnonโs posts. The website aggregates posts by Q, the anonymous figure behind the QAnon theory, and the creator of the Qmap.pub website is known online only as โQAppAnon.โ
The fact-checking site Logically.ai identified Jason Gelinas of New Jersey on Sept. 10 as the โdeveloper and mouthpieceโ for the site. New Jersey state records connect QAppAnon to Gelinasโs home address, Bloomberg found.
Reached outside his home, Gelinas declined to comment on the Logically report, saying only that someone had sent it to him on Twitter after it was published.
โIโm not going to comment on any of that,โ Gelinas said when asked if he was behind the website Qmap. โIโm not going to get involved. I want to stay out of it.โ
Wearing an American flag baseball cap, Gelinas said that QAnon is a โpatriotic movement to save the country.โ
๐ ๐๐ผ https://www.bloomberg.com/news/articles/2020-09-11/qanon-website-shuts-down-after-n-j-man-identified-as-operator
#qanon #qmap #QAppAnon #website #shutdown
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Bloomberg.com
QAnon Website Shuts Down After N.J. Man Identified as Operator
A popular website for posts about the conspiracy group QAnon abruptly shut down after a fact-checking group identified the developer as a New Jersey man.
Bitcoin Inventory Out-of-Memory Denial-of-Service Attack - Researcher kept a major Bitcoin bug secret for two years to prevent attacks
The INVDoS bug would have allowed attackers to crash Bitcoin nodes and other similar blockchains.
In 2018, a security researcher discovered a major vulnerability in Bitcoin Core, the software that powers the Bitcoin blockchain, but after reporting the issue and having it patched, the researcher opted to keep details private in order to avoid hackers exploiting the issue.
Technical details were published earlier this week after the same vulnerability was independently discovered in another cryptocurrency, based on an older version of the Bitcoin code that hadn't received the patch.
Called INVDoS, the vulnerability is a classic denial-of-service (DoS) attack. While in many cases, DoS attacks are harmless, they are not for internet-reachable systems, which need to have stable uptime in order to process transactions.
INVDoS was discovered in 2018 by Braydon Fuller, a Bitcoin protocol engineer. Fuller found that an attacker could create malformed Bitcoin transactions that, when processed by Bitcoin blockchain nodes, would lead to uncontrolled consumption of the server's memory resources, which would eventually crash impacted systems.
๐ ๐๐ผ CVE-2018-17145: Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (pdf)
https://invdos.net/paper/CVE-2018-17145.pdf
๐ ๐๐ผ https://www.zdnet.com/article/researcher-kept-a-major-bitcoin-bug-secret-for-two-years-to-prevent-attacks
#researcher #bitcoin #bug #INVDoS #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The INVDoS bug would have allowed attackers to crash Bitcoin nodes and other similar blockchains.
In 2018, a security researcher discovered a major vulnerability in Bitcoin Core, the software that powers the Bitcoin blockchain, but after reporting the issue and having it patched, the researcher opted to keep details private in order to avoid hackers exploiting the issue.
Technical details were published earlier this week after the same vulnerability was independently discovered in another cryptocurrency, based on an older version of the Bitcoin code that hadn't received the patch.
Called INVDoS, the vulnerability is a classic denial-of-service (DoS) attack. While in many cases, DoS attacks are harmless, they are not for internet-reachable systems, which need to have stable uptime in order to process transactions.
INVDoS was discovered in 2018 by Braydon Fuller, a Bitcoin protocol engineer. Fuller found that an attacker could create malformed Bitcoin transactions that, when processed by Bitcoin blockchain nodes, would lead to uncontrolled consumption of the server's memory resources, which would eventually crash impacted systems.
๐ ๐๐ผ CVE-2018-17145: Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (pdf)
https://invdos.net/paper/CVE-2018-17145.pdf
๐ ๐๐ผ https://www.zdnet.com/article/researcher-kept-a-major-bitcoin-bug-secret-for-two-years-to-prevent-attacks
#researcher #bitcoin #bug #INVDoS #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Welcome to the quantum Internet, with privacy guaranteed by the laws of physics
Quantum computing is gradually moving from the realm of science โ and even science fiction โ to become a practical technology that is being used in real-life contexts.
Three years ago, Privacy News Online wrote about one aspect โ the possibility that quantum computers will be able to unlock all of todayโs encryption, including the strongest. But increasingly, a more positive vision of quantum computing is emerging. It is centered around the creation of what is being called the quantum Internet.
Thatโs just a shorthand way of saying a global network of quantum computers and other devices based on the physics of quantum mechanics, able to exchange information much as ordinary systems do across todayโs non-quantum Internet. But the quantum version has one crucial property that makes it of great importance for privacy: it offers a fundamentally secure way of communication in which privacy is guaranteed by the laws of physics.
Thatโs because the quantum bits โ qubits โ that move across a quantum network link are subject to the observer effect: any attempt to monitor them as they traverse the network would modify them. As a result, it will be evident when things like encryption keys or data have been compromised en route. There is no way around this โ it is an inherent property of quantum mechanical systems โ which is why so many companies and governments are exploring how to create quantum networks and the quantum Internet.
๐ ๐๐ผ https://www.privateinternetaccess.com/blog/welcome-to-the-quantum-internet-with-privacy-guaranteed-by-the-laws-of-physics/
๐ ๐๐ผ (pdf)
https://www.energy.gov/sites/prod/files/2020/07/f76/QuantumWkshpRpt20FINAL_Nav_0.pdf
#quantum #internet #privacy #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Quantum computing is gradually moving from the realm of science โ and even science fiction โ to become a practical technology that is being used in real-life contexts.
Three years ago, Privacy News Online wrote about one aspect โ the possibility that quantum computers will be able to unlock all of todayโs encryption, including the strongest. But increasingly, a more positive vision of quantum computing is emerging. It is centered around the creation of what is being called the quantum Internet.
Thatโs just a shorthand way of saying a global network of quantum computers and other devices based on the physics of quantum mechanics, able to exchange information much as ordinary systems do across todayโs non-quantum Internet. But the quantum version has one crucial property that makes it of great importance for privacy: it offers a fundamentally secure way of communication in which privacy is guaranteed by the laws of physics.
Thatโs because the quantum bits โ qubits โ that move across a quantum network link are subject to the observer effect: any attempt to monitor them as they traverse the network would modify them. As a result, it will be evident when things like encryption keys or data have been compromised en route. There is no way around this โ it is an inherent property of quantum mechanical systems โ which is why so many companies and governments are exploring how to create quantum networks and the quantum Internet.
๐ ๐๐ผ https://www.privateinternetaccess.com/blog/welcome-to-the-quantum-internet-with-privacy-guaranteed-by-the-laws-of-physics/
๐ ๐๐ผ (pdf)
https://www.energy.gov/sites/prod/files/2020/07/f76/QuantumWkshpRpt20FINAL_Nav_0.pdf
#quantum #internet #privacy #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Privacy News Online by Private Internet Access VPN
Welcome to the quantum Internet, with privacy guaranteed by the laws of physics
Quantum computing is gradually moving from the realm of science โ and even science fiction โ to become a practical technology that is being used in
ByteDance won't allow TikTok's algorithm to be part of a sale: Report
As the deadline for a forced sale or shutdown of the U.S. operations of the TikTok video-sharing app fast approaches, ByteDance is said to have decided its algorithm won't be part of any sale that happens.
September 15, the date by which U.S. President Donald Trump has ordered ByteDance to either sell TikTok to a U.S. company or see the service banned from the U.S. market, is looming. Today, September 13, The South China Morning Post is reporting (based on an unnamed source that the SCMP says was briefed on the Chinese company's boardroom discussions) that ByteDance has decided TikTok's algorithm won't be included as part of the sale.
So now the question is will a sale still happen by Tuesday? Will Microsoft and Walmart, Oracle -- with close ties to Trump -- and/or various TikTok investors still see enough value in TikTok to push forward with a purchase? And for how much?
Even before today's report about terms around the algorithm, there were questions whether a sale would happen at all. The Wall Street Journal reported on September 9 that ByteDance was discussing with the U.S. government various possible arrangements that would allow TikTok to avoid a full sale of its U.S. operations. And before that, the Chinese government had put in place steps designed to make a sale to a U.S. company more difficult, if not impossible.
๐ ๐๐ผ https://www.scmp.com/economy/china-economy/article/3101362/tiktoks-algorithm-not-sale-bytedance-tells-us-source
๐ ๐๐ผ https://www.zdnet.com/article/bytedance-wont-allow-tiktoks-algorithm-to-be-part-of-a-sale-report
#report #TikTok #DeleteTikTok #china #usa #sale #algorithm
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
As the deadline for a forced sale or shutdown of the U.S. operations of the TikTok video-sharing app fast approaches, ByteDance is said to have decided its algorithm won't be part of any sale that happens.
September 15, the date by which U.S. President Donald Trump has ordered ByteDance to either sell TikTok to a U.S. company or see the service banned from the U.S. market, is looming. Today, September 13, The South China Morning Post is reporting (based on an unnamed source that the SCMP says was briefed on the Chinese company's boardroom discussions) that ByteDance has decided TikTok's algorithm won't be included as part of the sale.
So now the question is will a sale still happen by Tuesday? Will Microsoft and Walmart, Oracle -- with close ties to Trump -- and/or various TikTok investors still see enough value in TikTok to push forward with a purchase? And for how much?
Even before today's report about terms around the algorithm, there were questions whether a sale would happen at all. The Wall Street Journal reported on September 9 that ByteDance was discussing with the U.S. government various possible arrangements that would allow TikTok to avoid a full sale of its U.S. operations. And before that, the Chinese government had put in place steps designed to make a sale to a U.S. company more difficult, if not impossible.
๐ ๐๐ผ https://www.scmp.com/economy/china-economy/article/3101362/tiktoks-algorithm-not-sale-bytedance-tells-us-source
๐ ๐๐ผ https://www.zdnet.com/article/bytedance-wont-allow-tiktoks-algorithm-to-be-part-of-a-sale-report
#report #TikTok #DeleteTikTok #china #usa #sale #algorithm
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
South China Morning Post
Exclusive | TikTokโs algorithm not for sale, ByteDance tells US: source
Chinese tech company decides not to sell or transfer code behind the popular video-sharing app, source says.
Protect your information from physical threats
๐ก ๐๐ผ Table of Contents ๐๐ผ
๐ ๐๐ผ What you can learn from this guide
๐ ๐๐ผ Assessing your risks
๐ ๐๐ผ Creating your physical security policy
๐ ๐๐ผ Protecting your information from physical intruders
๐ ๐๐ผ Software and settings related to physical security
๐ ๐๐ผ Maintaining a healthy environment for your equipment
๐ ๐๐ผ Further reading
๐ก ๐ ๐๐ผ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ก ๐๐ผ Table of Contents ๐๐ผ
๐ ๐๐ผ What you can learn from this guide
๐ ๐๐ผ Assessing your risks
๐ ๐๐ผ Creating your physical security policy
๐ ๐๐ผ Protecting your information from physical intruders
๐ ๐๐ผ Software and settings related to physical security
๐ ๐๐ผ Maintaining a healthy environment for your equipment
๐ ๐๐ผ Further reading
๐ก ๐ ๐๐ผ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
securityinabox.org
Protect against physical threats
China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal
A Chinese company with links to Beijing's military and intelligence networks has been amassing a vast database of detailed personal information on thousands of Australians, including prominent and influential figures.
A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data which is believed to be used by China's intelligence service, the Ministry of State Security.
Zhenhua has the People's Liberation Army and the Chinese Communist Party among its main clients.
Information collected includes dates of birth, addresses, marital status, along with photographs, political associations, relatives and social media IDs.
It collates Twitter, Facebook, LinkedIn, Instagram and even TikTok accounts, as well as news stories, criminal records and corporate misdemeanours.
While much of the information has been "scraped" from open-source material, some profiles have information which appears to have been sourced from confidential bank records, job applications and psychological profiles.
The company is believed to have sourced some of its information from the so-called "dark web".
One intelligence analyst said the database was "Cambridge Analytica on steroids", referring to the trove of personal information sourced from Facebook profiles in the lead up to the 2016 US election campaign.
๐ ๐๐ผ https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668
#china #beijing #australia #eu #uk #canada #hybrid #war #mass #surveillance #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A Chinese company with links to Beijing's military and intelligence networks has been amassing a vast database of detailed personal information on thousands of Australians, including prominent and influential figures.
A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data which is believed to be used by China's intelligence service, the Ministry of State Security.
Zhenhua has the People's Liberation Army and the Chinese Communist Party among its main clients.
Information collected includes dates of birth, addresses, marital status, along with photographs, political associations, relatives and social media IDs.
It collates Twitter, Facebook, LinkedIn, Instagram and even TikTok accounts, as well as news stories, criminal records and corporate misdemeanours.
While much of the information has been "scraped" from open-source material, some profiles have information which appears to have been sourced from confidential bank records, job applications and psychological profiles.
The company is believed to have sourced some of its information from the so-called "dark web".
One intelligence analyst said the database was "Cambridge Analytica on steroids", referring to the trove of personal information sourced from Facebook profiles in the lead up to the 2016 US election campaign.
๐ ๐๐ผ https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668
#china #beijing #australia #eu #uk #canada #hybrid #war #mass #surveillance #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
www.abc.net.au
China's mass surveillance of 35,000 Australians revealed
A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data, which is believed to be used by China's intelligence service, the Ministry of State Security.
Forwarded from cRyPtHoNโข INFOSEC (DE)
Interview mit den Machern vom Zeroday-Podcast: bitte Fragen einreichen!
Zeroday-Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven. Schon seit Ende 2016 begeistern uns die beiden regelmรครig mit ihrem Podcast. In den einschlรคgigen Telegram-Nachrichten Kanรคlen sind sie schon lange regelmรครig vertreten. Aber auch in unseren Lesetipps sind sie immer wieder mit dabei und gern gesehene Gรคste. Jetzt haben wir endlich die Gelegenheit fรผr ein Interview mit den beiden.
So ein Podcast ist schon eine feine Sache. Egal wo man sich gerade befindet, man kann sich immer und รผberall zu seinen Lieblingsthemen etwas Passendes anhรถren. Und klar, welches Thema kรถnnte fรผr einen Leser der Tarnkappe passender sein, als Informationssicherheit und Datenschutz. Denn digitale Selbstverteidigung, Informationssicherheit und unser Datenschutz werden immer wichtiger.
Stefan und Sven haben sich genau diesem Thema verschrieben. Seit Ende 2016 sind sie mit viel Leidenschaft dabei. Mit ihrem regelmรครig erscheinenden Zeroday-Podcast, versuchen sie seit nun fast vier Jahren ihre Hรถrer fรผr diese Themen zu begeistern.
๐ง ๐๐ผ https://t.iss.one/cRyPtHoN_INFOSEC_DE/4335
โ ๏ธ Denkt immer daran, diese Techniken oder Hardware nur bei Gerรคten anzuwenden, deren Eigner oder Nutzer das erlaubt haben. Der unerlaubte Zugriff auf fremde Infrastruktur ist strafbar (In Deutschland ยง202a, ยง202b, ยง202c StGB).
๐ ๐๐ผ https://tarnkappe.info/interview-mit-den-machern-von-zeroday-podcast-bitte-fragen-einreichen/
#Interview #Zeroday #Podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Zeroday-Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven. Schon seit Ende 2016 begeistern uns die beiden regelmรครig mit ihrem Podcast. In den einschlรคgigen Telegram-Nachrichten Kanรคlen sind sie schon lange regelmรครig vertreten. Aber auch in unseren Lesetipps sind sie immer wieder mit dabei und gern gesehene Gรคste. Jetzt haben wir endlich die Gelegenheit fรผr ein Interview mit den beiden.
So ein Podcast ist schon eine feine Sache. Egal wo man sich gerade befindet, man kann sich immer und รผberall zu seinen Lieblingsthemen etwas Passendes anhรถren. Und klar, welches Thema kรถnnte fรผr einen Leser der Tarnkappe passender sein, als Informationssicherheit und Datenschutz. Denn digitale Selbstverteidigung, Informationssicherheit und unser Datenschutz werden immer wichtiger.
Stefan und Sven haben sich genau diesem Thema verschrieben. Seit Ende 2016 sind sie mit viel Leidenschaft dabei. Mit ihrem regelmรครig erscheinenden Zeroday-Podcast, versuchen sie seit nun fast vier Jahren ihre Hรถrer fรผr diese Themen zu begeistern.
๐ง ๐๐ผ https://t.iss.one/cRyPtHoN_INFOSEC_DE/4335
โ ๏ธ Denkt immer daran, diese Techniken oder Hardware nur bei Gerรคten anzuwenden, deren Eigner oder Nutzer das erlaubt haben. Der unerlaubte Zugriff auf fremde Infrastruktur ist strafbar (In Deutschland ยง202a, ยง202b, ยง202c StGB).
๐ ๐๐ผ https://tarnkappe.info/interview-mit-den-machern-von-zeroday-podcast-bitte-fragen-einreichen/
#Interview #Zeroday #Podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Telegram
cRyPtHoNโข INFOSEC (DE)
Zeroday Podcast - Ist Payback sicher? Wie sicher ist Payback?
Der Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven
Nachdem sich Stefan in Zeroday-Folge 9 bereits #Payback unter Datenschutzaspekten angesehen hat, wollen wir heute ausโฆ
Der Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven
Nachdem sich Stefan in Zeroday-Folge 9 bereits #Payback unter Datenschutzaspekten angesehen hat, wollen wir heute ausโฆ
IRS Wants to Pay $625,000 for Tools to Track Monero
The United States Internal Revenue Service is offering $625,000 for Monero-tracing software, according to a recently published proposal request.
In the proposal request, the IRS described the need for โinnovative solutions for tracing and attribution of privacy coins,โ including Monero and the Bitcoin Lightning Network.
The use of privacy coins is becoming more popular for general use, and is also seeing an increase in use by illicit actors,โ the IRS wrote in the proposal. โCurrently, there are limited investigative resources for tracing transactions involving privacy cryptocurrency coins such as Monero, Layer 2 network protocol transactions such as Lightning Labs, or other off-chain transactions that provide privacy to illicit actors.โ
The IRS is planning on spending $1 million this fiscal year on multiple proposals, according to the document.
๐ก Documents attached to the proposal: ๐๐ผ
๐๐ผ Pilot+IRS+Crypto+RFP+FINAL.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Pilot+IRS+Crypto+RFP+FINAL.pdf
๐๐ผ Clauses+Provision+Attachment+Crypto.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Clauses+Provision+Attachment+Crypto.pdf
๐๐ผ Related: CipherTrace Provided Feds with โMonero Tracingโ Tools
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/ciphertrace-provided-feds-with-monero-tracing-tools/
๐ ๐๐ผ https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/
#irs #monero #tracking #tracing #privacy #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The United States Internal Revenue Service is offering $625,000 for Monero-tracing software, according to a recently published proposal request.
In the proposal request, the IRS described the need for โinnovative solutions for tracing and attribution of privacy coins,โ including Monero and the Bitcoin Lightning Network.
The use of privacy coins is becoming more popular for general use, and is also seeing an increase in use by illicit actors,โ the IRS wrote in the proposal. โCurrently, there are limited investigative resources for tracing transactions involving privacy cryptocurrency coins such as Monero, Layer 2 network protocol transactions such as Lightning Labs, or other off-chain transactions that provide privacy to illicit actors.โ
The IRS is planning on spending $1 million this fiscal year on multiple proposals, according to the document.
๐ก Documents attached to the proposal: ๐๐ผ
๐๐ผ Pilot+IRS+Crypto+RFP+FINAL.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Pilot+IRS+Crypto+RFP+FINAL.pdf
๐๐ผ Clauses+Provision+Attachment+Crypto.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Clauses+Provision+Attachment+Crypto.pdf
๐๐ผ Related: CipherTrace Provided Feds with โMonero Tracingโ Tools
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/ciphertrace-provided-feds-with-monero-tracing-tools/
๐ ๐๐ผ https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/
#irs #monero #tracking #tracing #privacy #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag