Protect your information from physical threats
๐ก ๐๐ผ Table of Contents ๐๐ผ
๐ ๐๐ผ What you can learn from this guide
๐ ๐๐ผ Assessing your risks
๐ ๐๐ผ Creating your physical security policy
๐ ๐๐ผ Protecting your information from physical intruders
๐ ๐๐ผ Software and settings related to physical security
๐ ๐๐ผ Maintaining a healthy environment for your equipment
๐ ๐๐ผ Further reading
๐ก ๐ ๐๐ผ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ก ๐๐ผ Table of Contents ๐๐ผ
๐ ๐๐ผ What you can learn from this guide
๐ ๐๐ผ Assessing your risks
๐ ๐๐ผ Creating your physical security policy
๐ ๐๐ผ Protecting your information from physical intruders
๐ ๐๐ผ Software and settings related to physical security
๐ ๐๐ผ Maintaining a healthy environment for your equipment
๐ ๐๐ผ Further reading
๐ก ๐ ๐๐ผ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
securityinabox.org
Protect against physical threats
China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal
A Chinese company with links to Beijing's military and intelligence networks has been amassing a vast database of detailed personal information on thousands of Australians, including prominent and influential figures.
A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data which is believed to be used by China's intelligence service, the Ministry of State Security.
Zhenhua has the People's Liberation Army and the Chinese Communist Party among its main clients.
Information collected includes dates of birth, addresses, marital status, along with photographs, political associations, relatives and social media IDs.
It collates Twitter, Facebook, LinkedIn, Instagram and even TikTok accounts, as well as news stories, criminal records and corporate misdemeanours.
While much of the information has been "scraped" from open-source material, some profiles have information which appears to have been sourced from confidential bank records, job applications and psychological profiles.
The company is believed to have sourced some of its information from the so-called "dark web".
One intelligence analyst said the database was "Cambridge Analytica on steroids", referring to the trove of personal information sourced from Facebook profiles in the lead up to the 2016 US election campaign.
๐ ๐๐ผ https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668
#china #beijing #australia #eu #uk #canada #hybrid #war #mass #surveillance #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A Chinese company with links to Beijing's military and intelligence networks has been amassing a vast database of detailed personal information on thousands of Australians, including prominent and influential figures.
A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data which is believed to be used by China's intelligence service, the Ministry of State Security.
Zhenhua has the People's Liberation Army and the Chinese Communist Party among its main clients.
Information collected includes dates of birth, addresses, marital status, along with photographs, political associations, relatives and social media IDs.
It collates Twitter, Facebook, LinkedIn, Instagram and even TikTok accounts, as well as news stories, criminal records and corporate misdemeanours.
While much of the information has been "scraped" from open-source material, some profiles have information which appears to have been sourced from confidential bank records, job applications and psychological profiles.
The company is believed to have sourced some of its information from the so-called "dark web".
One intelligence analyst said the database was "Cambridge Analytica on steroids", referring to the trove of personal information sourced from Facebook profiles in the lead up to the 2016 US election campaign.
๐ ๐๐ผ https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668
#china #beijing #australia #eu #uk #canada #hybrid #war #mass #surveillance #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
www.abc.net.au
China's mass surveillance of 35,000 Australians revealed
A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data, which is believed to be used by China's intelligence service, the Ministry of State Security.
Forwarded from cRyPtHoNโข INFOSEC (DE)
Interview mit den Machern vom Zeroday-Podcast: bitte Fragen einreichen!
Zeroday-Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven. Schon seit Ende 2016 begeistern uns die beiden regelmรครig mit ihrem Podcast. In den einschlรคgigen Telegram-Nachrichten Kanรคlen sind sie schon lange regelmรครig vertreten. Aber auch in unseren Lesetipps sind sie immer wieder mit dabei und gern gesehene Gรคste. Jetzt haben wir endlich die Gelegenheit fรผr ein Interview mit den beiden.
So ein Podcast ist schon eine feine Sache. Egal wo man sich gerade befindet, man kann sich immer und รผberall zu seinen Lieblingsthemen etwas Passendes anhรถren. Und klar, welches Thema kรถnnte fรผr einen Leser der Tarnkappe passender sein, als Informationssicherheit und Datenschutz. Denn digitale Selbstverteidigung, Informationssicherheit und unser Datenschutz werden immer wichtiger.
Stefan und Sven haben sich genau diesem Thema verschrieben. Seit Ende 2016 sind sie mit viel Leidenschaft dabei. Mit ihrem regelmรครig erscheinenden Zeroday-Podcast, versuchen sie seit nun fast vier Jahren ihre Hรถrer fรผr diese Themen zu begeistern.
๐ง ๐๐ผ https://t.iss.one/cRyPtHoN_INFOSEC_DE/4335
โ ๏ธ Denkt immer daran, diese Techniken oder Hardware nur bei Gerรคten anzuwenden, deren Eigner oder Nutzer das erlaubt haben. Der unerlaubte Zugriff auf fremde Infrastruktur ist strafbar (In Deutschland ยง202a, ยง202b, ยง202c StGB).
๐ ๐๐ผ https://tarnkappe.info/interview-mit-den-machern-von-zeroday-podcast-bitte-fragen-einreichen/
#Interview #Zeroday #Podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Zeroday-Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven. Schon seit Ende 2016 begeistern uns die beiden regelmรครig mit ihrem Podcast. In den einschlรคgigen Telegram-Nachrichten Kanรคlen sind sie schon lange regelmรครig vertreten. Aber auch in unseren Lesetipps sind sie immer wieder mit dabei und gern gesehene Gรคste. Jetzt haben wir endlich die Gelegenheit fรผr ein Interview mit den beiden.
So ein Podcast ist schon eine feine Sache. Egal wo man sich gerade befindet, man kann sich immer und รผberall zu seinen Lieblingsthemen etwas Passendes anhรถren. Und klar, welches Thema kรถnnte fรผr einen Leser der Tarnkappe passender sein, als Informationssicherheit und Datenschutz. Denn digitale Selbstverteidigung, Informationssicherheit und unser Datenschutz werden immer wichtiger.
Stefan und Sven haben sich genau diesem Thema verschrieben. Seit Ende 2016 sind sie mit viel Leidenschaft dabei. Mit ihrem regelmรครig erscheinenden Zeroday-Podcast, versuchen sie seit nun fast vier Jahren ihre Hรถrer fรผr diese Themen zu begeistern.
๐ง ๐๐ผ https://t.iss.one/cRyPtHoN_INFOSEC_DE/4335
โ ๏ธ Denkt immer daran, diese Techniken oder Hardware nur bei Gerรคten anzuwenden, deren Eigner oder Nutzer das erlaubt haben. Der unerlaubte Zugriff auf fremde Infrastruktur ist strafbar (In Deutschland ยง202a, ยง202b, ยง202c StGB).
๐ ๐๐ผ https://tarnkappe.info/interview-mit-den-machern-von-zeroday-podcast-bitte-fragen-einreichen/
#Interview #Zeroday #Podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Telegram
cRyPtHoNโข INFOSEC (DE)
Zeroday Podcast - Ist Payback sicher? Wie sicher ist Payback?
Der Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven
Nachdem sich Stefan in Zeroday-Folge 9 bereits #Payback unter Datenschutzaspekten angesehen hat, wollen wir heute ausโฆ
Der Podcast fรผr Informationssicherheit und Datenschutz von Stefan und Sven
Nachdem sich Stefan in Zeroday-Folge 9 bereits #Payback unter Datenschutzaspekten angesehen hat, wollen wir heute ausโฆ
IRS Wants to Pay $625,000 for Tools to Track Monero
The United States Internal Revenue Service is offering $625,000 for Monero-tracing software, according to a recently published proposal request.
In the proposal request, the IRS described the need for โinnovative solutions for tracing and attribution of privacy coins,โ including Monero and the Bitcoin Lightning Network.
The use of privacy coins is becoming more popular for general use, and is also seeing an increase in use by illicit actors,โ the IRS wrote in the proposal. โCurrently, there are limited investigative resources for tracing transactions involving privacy cryptocurrency coins such as Monero, Layer 2 network protocol transactions such as Lightning Labs, or other off-chain transactions that provide privacy to illicit actors.โ
The IRS is planning on spending $1 million this fiscal year on multiple proposals, according to the document.
๐ก Documents attached to the proposal: ๐๐ผ
๐๐ผ Pilot+IRS+Crypto+RFP+FINAL.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Pilot+IRS+Crypto+RFP+FINAL.pdf
๐๐ผ Clauses+Provision+Attachment+Crypto.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Clauses+Provision+Attachment+Crypto.pdf
๐๐ผ Related: CipherTrace Provided Feds with โMonero Tracingโ Tools
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/ciphertrace-provided-feds-with-monero-tracing-tools/
๐ ๐๐ผ https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/
#irs #monero #tracking #tracing #privacy #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The United States Internal Revenue Service is offering $625,000 for Monero-tracing software, according to a recently published proposal request.
In the proposal request, the IRS described the need for โinnovative solutions for tracing and attribution of privacy coins,โ including Monero and the Bitcoin Lightning Network.
The use of privacy coins is becoming more popular for general use, and is also seeing an increase in use by illicit actors,โ the IRS wrote in the proposal. โCurrently, there are limited investigative resources for tracing transactions involving privacy cryptocurrency coins such as Monero, Layer 2 network protocol transactions such as Lightning Labs, or other off-chain transactions that provide privacy to illicit actors.โ
The IRS is planning on spending $1 million this fiscal year on multiple proposals, according to the document.
๐ก Documents attached to the proposal: ๐๐ผ
๐๐ผ Pilot+IRS+Crypto+RFP+FINAL.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Pilot+IRS+Crypto+RFP+FINAL.pdf
๐๐ผ Clauses+Provision+Attachment+Crypto.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Clauses+Provision+Attachment+Crypto.pdf
๐๐ผ Related: CipherTrace Provided Feds with โMonero Tracingโ Tools
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/ciphertrace-provided-feds-with-monero-tracing-tools/
๐ ๐๐ผ https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/
#irs #monero #tracking #tracing #privacy #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Magento online stores hacked in largest campaign to date
Almost 2,000 Magento stores have been compromised over the weekend in the largest hacking campaign since 2015.
More than 2,000 Magento online stores have been hacked over the weekend in what security researchers have described as the "largest campaign ever."
The attacks were a typical Magecart scheme where hackers breached sites and then planted malicious scripts inside the stores' source code, code that logged payment card details that shoppers entered inside checkout forms.
"On Friday, 10 stores got infected, then 1,058 on Saturday, 603 on Sunday and 233 today," said Willem de Groot, founder of Sanguine Security (SanSec), a Dutch cyber-security firm specialized in tracking Magecart attacks.
"This automated campaign is by far the largest one that Sansec has identified since it started monitoring in 2015," de Groot added. "The previous record was 962 hacked stores in a single day in July last year."
๐ ๐๐ผ https://sansec.io/research/largest-magento-hack-to-date
๐ ๐๐ผ https://www.zdnet.com/article/magento-online-stores-hacked-in-largest-campaign-to-date
#magento #online #store #hacked
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Almost 2,000 Magento stores have been compromised over the weekend in the largest hacking campaign since 2015.
More than 2,000 Magento online stores have been hacked over the weekend in what security researchers have described as the "largest campaign ever."
The attacks were a typical Magecart scheme where hackers breached sites and then planted malicious scripts inside the stores' source code, code that logged payment card details that shoppers entered inside checkout forms.
"On Friday, 10 stores got infected, then 1,058 on Saturday, 603 on Sunday and 233 today," said Willem de Groot, founder of Sanguine Security (SanSec), a Dutch cyber-security firm specialized in tracking Magecart attacks.
"This automated campaign is by far the largest one that Sansec has identified since it started monitoring in 2015," de Groot added. "The previous record was 962 hacked stores in a single day in July last year."
๐ ๐๐ผ https://sansec.io/research/largest-magento-hack-to-date
๐ ๐๐ผ https://www.zdnet.com/article/magento-online-stores-hacked-in-largest-campaign-to-date
#magento #online #store #hacked
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Sansec
Cardbleed: 3% of Magento install base hacked
Media is too big
VIEW IN TELEGRAM
Joe Rogan Experience #1536 - Edward Snowden
Former CIA contractor turned whistleblower Edward Snowden shocked the world when he revealed the misdeeds of the US intelligence community and its allies. Now living in Russia, he is a noted privacy advocate and author who serves as president of the Freedom of the Press Foundation.
๐บ ๐๐ผ https://www.youtube.com/watch?v=_Rl82OQDoOc
#snowden #cia #whistleblower #usa #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Former CIA contractor turned whistleblower Edward Snowden shocked the world when he revealed the misdeeds of the US intelligence community and its allies. Now living in Russia, he is a noted privacy advocate and author who serves as president of the Freedom of the Press Foundation.
๐บ ๐๐ผ https://www.youtube.com/watch?v=_Rl82OQDoOc
#snowden #cia #whistleblower #usa #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
You are not anonymous on Tor - Last February, my Tor onion service came under a huge Tor-based distributed denial-of-service (DDoS) attack
I spent days analyzing the attack, developing mitigation options, and defending my server. (The Tor service that I run for the Internet Archive was down for a few hours, but I managed to keep it up and running through most of the attack.)
While trying to find creative ways to keep the service up, I consulted a group of friends who are very active in the network incident response field. Some of these are the people who warn the world about new network attacks. Others are very experienced at tracking down denial-of-service attacks and their associated command-and-control (C&C) servers. I asked them if they could help me find the source of the attack. "Sure," they replied. They just needed my IP address.
I read off the address: "152 dot" and they repeated back "152 dot". "19 dot" "19 dot" and then they told me the rest of the network address. (I was stunned.) Tor is supposed to be anonymous. You're not supposed to know the IP address of a hidden service. But they knew. They had been watching the Tor-based DDoS. They had a list of the hidden service addresses that were being targeted by the attack. They just didn't know that this specific address was mine.
As it turns out, this is an open secret among the internet service community: You are not anonymous on Tor !!
๐ก Threat Modeling
There are plenty of documents that cover how Tor triple-encrypts packets, selects a route using a guard, relay, and exit, and randomizes paths to mix up the network traffic. However, few documents cover the threat model. Who can see your traffic?
๐ ๐๐ผ https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html
#tor #onion #service #zeroday #DDoS #attacks #anonymous #poc #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
I spent days analyzing the attack, developing mitigation options, and defending my server. (The Tor service that I run for the Internet Archive was down for a few hours, but I managed to keep it up and running through most of the attack.)
While trying to find creative ways to keep the service up, I consulted a group of friends who are very active in the network incident response field. Some of these are the people who warn the world about new network attacks. Others are very experienced at tracking down denial-of-service attacks and their associated command-and-control (C&C) servers. I asked them if they could help me find the source of the attack. "Sure," they replied. They just needed my IP address.
I read off the address: "152 dot" and they repeated back "152 dot". "19 dot" "19 dot" and then they told me the rest of the network address. (I was stunned.) Tor is supposed to be anonymous. You're not supposed to know the IP address of a hidden service. But they knew. They had been watching the Tor-based DDoS. They had a list of the hidden service addresses that were being targeted by the attack. They just didn't know that this specific address was mine.
As it turns out, this is an open secret among the internet service community: You are not anonymous on Tor !!
๐ก Threat Modeling
There are plenty of documents that cover how Tor triple-encrypts packets, selects a route using a guard, relay, and exit, and randomizes paths to mix up the network traffic. However, few documents cover the threat model. Who can see your traffic?
๐ ๐๐ผ https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html
#tor #onion #service #zeroday #DDoS #attacks #anonymous #poc #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
You are not anonymous on Tor
๐ ๐๐ผ https://t.iss.one/BlackBox_Archiv/1252
#tor #onion #service #zeroday #DDoS #attacks #anonymous #poc #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ ๐๐ผ https://t.iss.one/BlackBox_Archiv/1252
#tor #onion #service #zeroday #DDoS #attacks #anonymous #poc #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Billions of devices vulnerable to new 'BLESA' Bluetooth security flaw
New BLESA attack goes after the often ignored Bluetooth reconnection process, unlike previous vulnerabilities, most found in the pairing operation.
Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer.
Named BLESA (Bluetooth Low Energy Spoofing Attack), the vulnerability impacts devices running the Bluetooth Low Energy (BLE) protocol.
BLE is a slimmer version of the original Bluetooth (Classic) standard but designed to conserve battery power while keeping Bluetooth connections alive as long as possible.
Due to its battery-saving features, BLE has been massively adopted over the past decade, becoming a near-ubiquitous technology across almost all battery-powered devices.
As a result of this broad adoption, security researchers and academics have also repeatedly probed BLE for security flaws across the years, often finding major issues.
๐ ๐๐ผ https://www.zdnet.com/article/billions-of-devices-vulnerable-to-new-blesa-bluetooth-security-flaw
#BLESA #BLE #bluetooth #security #flaw
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
New BLESA attack goes after the often ignored Bluetooth reconnection process, unlike previous vulnerabilities, most found in the pairing operation.
Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer.
Named BLESA (Bluetooth Low Energy Spoofing Attack), the vulnerability impacts devices running the Bluetooth Low Energy (BLE) protocol.
BLE is a slimmer version of the original Bluetooth (Classic) standard but designed to conserve battery power while keeping Bluetooth connections alive as long as possible.
Due to its battery-saving features, BLE has been massively adopted over the past decade, becoming a near-ubiquitous technology across almost all battery-powered devices.
As a result of this broad adoption, security researchers and academics have also repeatedly probed BLE for security flaws across the years, often finding major issues.
๐ ๐๐ผ https://www.zdnet.com/article/billions-of-devices-vulnerable-to-new-blesa-bluetooth-security-flaw
#BLESA #BLE #bluetooth #security #flaw
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNET
Billions of devices vulnerable to new 'BLESA' Bluetooth security flaw
New BLESA attack goes after the often ignored Bluetooth reconnection process, unlike previous vulnerabilities, most found in the pairing operation.
A Chrome Reverse Proxy Extension has been put up for sale by the threat actor MrMillionaire.
According to the actor the extension turns victim Chrome browsers into fully-functional HTTP/HTTPS proxies, allowing the actors to browse sites as their victims.
๐ ๐๐ผ https://twitter.com/shad0wintel/status/1306080368114589698
#chrome #reverse #proxy #extension #MrMillionaire
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
According to the actor the extension turns victim Chrome browsers into fully-functional HTTP/HTTPS proxies, allowing the actors to browse sites as their victims.
๐ ๐๐ผ https://twitter.com/shad0wintel/status/1306080368114589698
#chrome #reverse #proxy #extension #MrMillionaire
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Revealed: Israeli Firm Provided Phone-hacking Services to Saudi Arabia
A representative of Cellebrite, which states that it has complied with the rules, flew to Riyadh from London last November, and at the request of the Saudi prosecutorโs office hacked into a Samsung cellphone
In November of last year, a representative of the Israeli firm Cellebrite landed at King Khaled International Airport in the Saudi capital, Riyadh. The man, a foreign national whose identity is known to TheMarker, Haaretzโs sister publication, arrived on a commercial flight from London to hack into a phone in the possession of the Saudi Justice Ministry. The details of the visit were agreed upon before the hacker landed.
The staff at Cellebrite demanded of the Saudis that their employee be met at the Riyadh airport by a government representative. They insisted that he pass through passport control without his passport being stamped and without an inspection of the electronic equipment that he would have with him, which they demanded would not leave his possession and only which he would use.
From there, it was agreed in advance that the hacker would be immediately taken to an isolated hotel room, where the Saudis committed not to install cameras โ and where the job of hacking and copying information from a mobile cellphone was carried out. When the work was completed, Cellebriteโs representative returned to the airport and flew back to London.
Cellebrite is not the only Israeli company to provide hacking or other cybersecurity services to the Saudi kingdom, but it is apparently the only one that does so without any oversight from the Israeli Defense Ministry.
๐ ๐๐ผ https://www.haaretz.com/israel-news/tech-news/.premium-revealed-israeli-firm-provided-phone-hacking-services-to-saudi-arabia-1.9161374
๐ ๐๐ผ https://twitter.com/haaretzcom/status/1306233686761889798
#israel #hacking #samsung #cellebrite #saudiarabia
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A representative of Cellebrite, which states that it has complied with the rules, flew to Riyadh from London last November, and at the request of the Saudi prosecutorโs office hacked into a Samsung cellphone
In November of last year, a representative of the Israeli firm Cellebrite landed at King Khaled International Airport in the Saudi capital, Riyadh. The man, a foreign national whose identity is known to TheMarker, Haaretzโs sister publication, arrived on a commercial flight from London to hack into a phone in the possession of the Saudi Justice Ministry. The details of the visit were agreed upon before the hacker landed.
The staff at Cellebrite demanded of the Saudis that their employee be met at the Riyadh airport by a government representative. They insisted that he pass through passport control without his passport being stamped and without an inspection of the electronic equipment that he would have with him, which they demanded would not leave his possession and only which he would use.
From there, it was agreed in advance that the hacker would be immediately taken to an isolated hotel room, where the Saudis committed not to install cameras โ and where the job of hacking and copying information from a mobile cellphone was carried out. When the work was completed, Cellebriteโs representative returned to the airport and flew back to London.
Cellebrite is not the only Israeli company to provide hacking or other cybersecurity services to the Saudi kingdom, but it is apparently the only one that does so without any oversight from the Israeli Defense Ministry.
๐ ๐๐ผ https://www.haaretz.com/israel-news/tech-news/.premium-revealed-israeli-firm-provided-phone-hacking-services-to-saudi-arabia-1.9161374
๐ ๐๐ผ https://twitter.com/haaretzcom/status/1306233686761889798
#israel #hacking #samsung #cellebrite #saudiarabia
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Haaretz.com
Revealed: Israeli firm provided phone-hacking services to Saudi Arabia
***
My stolen credit card details were used 4,500 miles away. I tried to find out how it happened
When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.
On a Thursday back in February I was relaxing and watching TV when my evening was interrupted by the ping of a text message from my bank.
"You will shortly receive an SMS to confirm recent activity on your card."
I was puzzled. I certainly hadn't made any strange or unexpected purchases that day, so what was this about? About 30 seconds later, I received my answer in a second text message.
It said my credit card details had been used less than a minute before to try to make a payment of ยฃ108 at a store with an unfamiliar name.
A quick search online revealed it to be a supermarket in the city of Paramaribo, Suriname โ a small country on the north-eastern coast of South America, bordered by Brazil, Guyana and French Guiana. That's quite a long way from my home in London, so I was pretty sure I hadn't popped into that store to pick anything up in the last 60 seconds.
The alert asked me to confirm the transaction by replying with 'Yes' or 'No'. It did cross my mind that perhaps this was a double- or triple-bluff scam and that by responding to an unexpected text message, I would be making a big mistake. Just in case, I chose to phone the bank instead.
They confirmed that yes, someone had attempted to use my card details over 4,500 miles away from London โ but the attempted payment was blocked as suspicious, so no money was stolen.
I cancelled my card and ordered a new one as the recommended safety precaution, given someone else had my details. But as a reporter I was left wondering how did this happen?
How was it that my bank details were somehow stolen, passed onto someone on the other side of the world and almost successfully used at what looked to be a small retailer in Suriname?
Credit cards are a solution - and part of the problem
Debit and credit cards are a part of everyday life that we don't think about, but not so long ago they would have felt like a strange concept to those using physical currency to buy things. The first UK credit card was issued in 1966, while the first debit card didn't arrive in the UK until 1987.
Now, there are over 51 million debit cardholders in the UK, accounting for 96% of adults, while over 32 million UK adults have a credit card. According to the trade association UK Finance, total spending on credit and debit cards accounted for over ยฃ800 billion during 2018, with over 20 billion transactions over the course of the year.
Such is the increased popularity of using card payments โ helped by online shopping and the ability to make contactless payments in stores โ that it's overtaken cash as the most common form of payment in the UK, and the number of card payments is still growing.
๐ ๐๐ผ https://www.zdnet.com/article/my-stolen-credit-card-details-were-used-4500-miles-away-i-tried-to-find-out-how-it-happened
#stolen #creditcard #details #story
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.
On a Thursday back in February I was relaxing and watching TV when my evening was interrupted by the ping of a text message from my bank.
"You will shortly receive an SMS to confirm recent activity on your card."
I was puzzled. I certainly hadn't made any strange or unexpected purchases that day, so what was this about? About 30 seconds later, I received my answer in a second text message.
It said my credit card details had been used less than a minute before to try to make a payment of ยฃ108 at a store with an unfamiliar name.
A quick search online revealed it to be a supermarket in the city of Paramaribo, Suriname โ a small country on the north-eastern coast of South America, bordered by Brazil, Guyana and French Guiana. That's quite a long way from my home in London, so I was pretty sure I hadn't popped into that store to pick anything up in the last 60 seconds.
The alert asked me to confirm the transaction by replying with 'Yes' or 'No'. It did cross my mind that perhaps this was a double- or triple-bluff scam and that by responding to an unexpected text message, I would be making a big mistake. Just in case, I chose to phone the bank instead.
They confirmed that yes, someone had attempted to use my card details over 4,500 miles away from London โ but the attempted payment was blocked as suspicious, so no money was stolen.
I cancelled my card and ordered a new one as the recommended safety precaution, given someone else had my details. But as a reporter I was left wondering how did this happen?
How was it that my bank details were somehow stolen, passed onto someone on the other side of the world and almost successfully used at what looked to be a small retailer in Suriname?
Credit cards are a solution - and part of the problem
Debit and credit cards are a part of everyday life that we don't think about, but not so long ago they would have felt like a strange concept to those using physical currency to buy things. The first UK credit card was issued in 1966, while the first debit card didn't arrive in the UK until 1987.
Now, there are over 51 million debit cardholders in the UK, accounting for 96% of adults, while over 32 million UK adults have a credit card. According to the trade association UK Finance, total spending on credit and debit cards accounted for over ยฃ800 billion during 2018, with over 20 billion transactions over the course of the year.
Such is the increased popularity of using card payments โ helped by online shopping and the ability to make contactless payments in stores โ that it's overtaken cash as the most common form of payment in the UK, and the number of card payments is still growing.
๐ ๐๐ผ https://www.zdnet.com/article/my-stolen-credit-card-details-were-used-4500-miles-away-i-tried-to-find-out-how-it-happened
#stolen #creditcard #details #story
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNET
My stolen credit card details were used 4,500 miles away. I tried to find out how it happened
When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.
In China, smart locks are being used to track citizens and enforce lockdowns
Proprietary "smart" devices are an absolute nightmare. If users can't audit the code they don't know what they are doing and the device works for the tech company selling it rather than the user.
๐ ๐๐ผ See here: https://moniotrlab.ccis.neu.edu/wp-content/uploads/2019/09/ren-imc19.pdf
On a really basic level think about the information someone can infer just by looking at data from devices like this:
Your door is opened and locked at 7:30 am everyday and then reopened and unlocked at 6:30 pm but never during the hours in between? Chances are you ....
๐ ๐๐ผ https://www.reddit.com/r/privacytoolsIO/comments/its9h7
#smart #locks #thinkabout #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Proprietary "smart" devices are an absolute nightmare. If users can't audit the code they don't know what they are doing and the device works for the tech company selling it rather than the user.
๐ ๐๐ผ See here: https://moniotrlab.ccis.neu.edu/wp-content/uploads/2019/09/ren-imc19.pdf
On a really basic level think about the information someone can infer just by looking at data from devices like this:
Your door is opened and locked at 7:30 am everyday and then reopened and unlocked at 6:30 pm but never during the hours in between? Chances are you ....
๐ ๐๐ผ https://www.reddit.com/r/privacytoolsIO/comments/its9h7
#smart #locks #thinkabout #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
US charges two Russians for stealing $16.8m via cryptocurrency phishing sites
The two hackers stole from hundreds of users of cryptocurrency exchanges Poloniex, Binance, and Gemini.
The US Department of Justice has filed charges today against two Russian nationals for orchestrating a multi-year phishing operation against the users of three cryptocurrency exchanges.
The two suspects stand accused of creating website clones for the Poloniex, Binance, and Gemini cryptocurrency exchanges, luring users on these fake sites, and collecting their account credentials. These phishing operations began around June 2017.
US officials said the Russian duo โ made up of Danil Potekhin (aka cronuswar) and Dmitrii Karasavidi; residents of Voronezh and Moscow, respectively โ used the stolen credentials to access victim accounts and steal their Bitcoin (BTC) and Ether (ETH) crypto-assets.
In total, US officials estimated the victims in the hundreds. Court documents cite 313 defrauded Poloniex users, 142 Binance victims, and 42 users at Gemini.
Losses were estimated at $16,876,000.
๐ ๐๐ผ (pdf)
https://assets.documentcloud.org/documents/7211805/Potekhin-Superseding-Indictment.pdf
๐ ๐๐ผ https://www.zdnet.com/article/us-charges-two-russians-for-stealing-16-8m-via-cryptocurrency-phishing-sites
#Potekhin #cryptocurrency #phishing #russia #usa
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The two hackers stole from hundreds of users of cryptocurrency exchanges Poloniex, Binance, and Gemini.
The US Department of Justice has filed charges today against two Russian nationals for orchestrating a multi-year phishing operation against the users of three cryptocurrency exchanges.
The two suspects stand accused of creating website clones for the Poloniex, Binance, and Gemini cryptocurrency exchanges, luring users on these fake sites, and collecting their account credentials. These phishing operations began around June 2017.
US officials said the Russian duo โ made up of Danil Potekhin (aka cronuswar) and Dmitrii Karasavidi; residents of Voronezh and Moscow, respectively โ used the stolen credentials to access victim accounts and steal their Bitcoin (BTC) and Ether (ETH) crypto-assets.
In total, US officials estimated the victims in the hundreds. Court documents cite 313 defrauded Poloniex users, 142 Binance victims, and 42 users at Gemini.
Losses were estimated at $16,876,000.
๐ ๐๐ผ (pdf)
https://assets.documentcloud.org/documents/7211805/Potekhin-Superseding-Indictment.pdf
๐ ๐๐ผ https://www.zdnet.com/article/us-charges-two-russians-for-stealing-16-8m-via-cryptocurrency-phishing-sites
#Potekhin #cryptocurrency #phishing #russia #usa
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Piratebay.org Sold for $50,000 at Auction, ThePiratebay.com Up Next
Several Pirate Bay-related domains become available again this month after their owner failed to renew the registration. Yesterday, Piratebay.org was sold in a Dropcatch auction for $50,000 and ThePiratebay.com will follow soon. Both domains were previously registered to the official Pirate Bay site.
The Pirate Bay is arguably the best known pirate site on the web.
The iconic pirate ship logo is notorious around the world and more than 17 years after it first appeared online, the site still attracts millions of visitors.
During its tumultuous history, The Pirate Bay has weathered many storms. The site was targeted in large scale police raids twice and was the subject of a criminal prosecution in Sweden that landed several of its co-founders in prison.
Pirate Bayโs Backup Domains
The site also faced several domain name issues. In 2012 it switched from its original ThePiratebay.org name to ThePiratebay.se, fearing that the former would be seized by US authorities. Later on, when the .se domain was threatened, it rotated across several other domains in search of a safe haven.
That safe haven turned out to be the original ThePiratebay.org domain from which it still operates today.
๐ ๐๐ผ https://torrentfreak.com/piratebay-org-sold-for-50000-at-auction-thepiratebay-com-up-next-200916/
#thepiratebay #auction #sold
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Several Pirate Bay-related domains become available again this month after their owner failed to renew the registration. Yesterday, Piratebay.org was sold in a Dropcatch auction for $50,000 and ThePiratebay.com will follow soon. Both domains were previously registered to the official Pirate Bay site.
The Pirate Bay is arguably the best known pirate site on the web.
The iconic pirate ship logo is notorious around the world and more than 17 years after it first appeared online, the site still attracts millions of visitors.
During its tumultuous history, The Pirate Bay has weathered many storms. The site was targeted in large scale police raids twice and was the subject of a criminal prosecution in Sweden that landed several of its co-founders in prison.
Pirate Bayโs Backup Domains
The site also faced several domain name issues. In 2012 it switched from its original ThePiratebay.org name to ThePiratebay.se, fearing that the former would be seized by US authorities. Later on, when the .se domain was threatened, it rotated across several other domains in search of a safe haven.
That safe haven turned out to be the original ThePiratebay.org domain from which it still operates today.
๐ ๐๐ผ https://torrentfreak.com/piratebay-org-sold-for-50000-at-auction-thepiratebay-com-up-next-200916/
#thepiratebay #auction #sold
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Torrentfreak
Piratebay.org Sold for $50,000 at Auction, ThePiratebay.com Up Next * TorrentFreak
The Piratebay.org domain name was sold in a Dropcatch auction for $50,000 and Thepiratebay.com will follow soon.
Major German shopping site leaks customer data
A publicly-listed multinational retailer with millions of dollars in annual revenues was discovered to be operating a completely unsecured server, thereby publicly exposing private data belonging to around 700,000 of its customers.
Our Security team, led by Anurag Sen, discovered a vulnerable and unsecured server containing more than 6 terabytes of data operated by German company windeln.de.
Our team detected the breach on 13 June 2020 and estimates that the server vulnerability was exposed on the Internet on 11 June 2020.
The ElasticSearch server and its vulnerability were discovered during a routine check of IP addresses on particular ports. Our team found that the server was completely unsecured and publicly exposed without a password โ meaning that anyone in possession of the serverโs IP address could access the entire database.
We tried to reach out to Windeln.de, but nobody ever got back to us. We then contacted the German CERT, so they could inform the company about the data leak. A few days later, the server got secured.
๐ ๐๐ผ https://www.safetydetectives.com/blog/windeln-leak-report/
#windeln #germany #vulnerability #leak #data #dataleak #customers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A publicly-listed multinational retailer with millions of dollars in annual revenues was discovered to be operating a completely unsecured server, thereby publicly exposing private data belonging to around 700,000 of its customers.
Our Security team, led by Anurag Sen, discovered a vulnerable and unsecured server containing more than 6 terabytes of data operated by German company windeln.de.
Our team detected the breach on 13 June 2020 and estimates that the server vulnerability was exposed on the Internet on 11 June 2020.
The ElasticSearch server and its vulnerability were discovered during a routine check of IP addresses on particular ports. Our team found that the server was completely unsecured and publicly exposed without a password โ meaning that anyone in possession of the serverโs IP address could access the entire database.
We tried to reach out to Windeln.de, but nobody ever got back to us. We then contacted the German CERT, so they could inform the company about the data leak. A few days later, the server got secured.
๐ ๐๐ผ https://www.safetydetectives.com/blog/windeln-leak-report/
#windeln #germany #vulnerability #leak #data #dataleak #customers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
SafetyDetectives
Major German shopping site leaks customer data
A publicly-listed multinational retailer with millions of dollars in annual revenues was discovered to be operating a completely unsecured server, thereby publi
Cyber security alert issued following rising attacks on UK academia
The NCSC has issued an alert to the academic sector following a spate of online attacks against UK schools, colleges and universities.
The National Cyber Security Centre, a part of GCHQ, is supporting establishments to keep criminals out of their networks after a spike in ransomware attacks.
The rise in attacks was recorded in August as cyber criminals turn their attention to a sector focused on the return of students.
Cyber security experts have today (Thursday) stepped up support for UK schools, colleges, and universities following a spate of online attacks with the potential to de-rail their preparations for the new term.
The National Cyber Security Centre (NCSC) issued an alert to the sector containing a number of steps they can take to keep cyber criminals out of their networks, following a recent spike in ransomware attacks.
The NCSC dealt with several ransomware attacks against education establishments in August, which caused varying levels of disruption, depending on the level of security establishments had in place.
Ransomware attacks typically involve the encryption of an organisationโs data by cyber criminals, who then demand money in exchange for its recovery.
With institutions either welcoming pupils and students back for a new term, or preparing to do so, the NCSCโs alert urges them to take immediate steps such as ensuring data is backed up and also stored on copies offline.
They are also urged to read the NCSCโs newly-updated guidance on mitigating malware and ransomware attacks, and to develop an incident response plan which they regularly test.
๐ ๐๐ผ https://www.ncsc.gov.uk/news/alert-issued-following-rising-attacks-on-uk-academia
#alert #NCSC #cyber #security #uk #academia #ransomware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The NCSC has issued an alert to the academic sector following a spate of online attacks against UK schools, colleges and universities.
The National Cyber Security Centre, a part of GCHQ, is supporting establishments to keep criminals out of their networks after a spike in ransomware attacks.
The rise in attacks was recorded in August as cyber criminals turn their attention to a sector focused on the return of students.
Cyber security experts have today (Thursday) stepped up support for UK schools, colleges, and universities following a spate of online attacks with the potential to de-rail their preparations for the new term.
The National Cyber Security Centre (NCSC) issued an alert to the sector containing a number of steps they can take to keep cyber criminals out of their networks, following a recent spike in ransomware attacks.
The NCSC dealt with several ransomware attacks against education establishments in August, which caused varying levels of disruption, depending on the level of security establishments had in place.
Ransomware attacks typically involve the encryption of an organisationโs data by cyber criminals, who then demand money in exchange for its recovery.
With institutions either welcoming pupils and students back for a new term, or preparing to do so, the NCSCโs alert urges them to take immediate steps such as ensuring data is backed up and also stored on copies offline.
They are also urged to read the NCSCโs newly-updated guidance on mitigating malware and ransomware attacks, and to develop an incident response plan which they regularly test.
๐ ๐๐ผ https://www.ncsc.gov.uk/news/alert-issued-following-rising-attacks-on-uk-academia
#alert #NCSC #cyber #security #uk #academia #ransomware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
www.ncsc.gov.uk
Cyber security alert issued following rising attacks on UK academia
The NCSC has issued an alert to the academic sector following a spate of online attacks against UK schools, colleges and universities.
Mozilla shuts down Firefox Send and Firefox Notes services
Mozilla will shut down Send for good after a ZDNet report over the summer that highlighted the service's popularity with malware operators.
Mozilla is shutting down two of its legacy products, Firefox Send and Firefox Notes, the company announced today.
"Both services are being decommissioned and will no longer be a part of our product family," a Mozilla spokesperson told ZDNet this week.
Firefox Send
Of the two, the most beloved was Firefox Send, a free file-sharing service, and one of the few that supported sharing files in encrypted formats.
Launched in March 2019, the service gained a dedicated fanbase but Send was taken offline earlier this summer after ZDNet reported on its constant abuse by malware groups.
At the time, Mozilla said that Send's shutdown was temporary and promised to find a way to curb the service's abuse in malware operations. But weeks later, things changed after Mozilla leadership laid off more than 250 employees as part of an effort to re-focus its business on commercial products.
Now, most of the staff that was supposed to re-engineer Send has been let go, and the ones who are still there are now working on commercial products, such as Mozilla VPN, Firefox Monitor, and Firefox Private Network.
Firefox Notes
The same reasons are also valid for Firefox Notes. Launched as a way to save and sync encrypted notes between Firefox browsers, the service was available as an Android app and browser extension.
๐ ๐๐ผ https://www.zdnet.com/article/mozilla-shuts-down-firefox-send-and-firefox-notes-services
#ff #firefox #mozilla #browser #notes #send
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Mozilla will shut down Send for good after a ZDNet report over the summer that highlighted the service's popularity with malware operators.
Mozilla is shutting down two of its legacy products, Firefox Send and Firefox Notes, the company announced today.
"Both services are being decommissioned and will no longer be a part of our product family," a Mozilla spokesperson told ZDNet this week.
Firefox Send
Of the two, the most beloved was Firefox Send, a free file-sharing service, and one of the few that supported sharing files in encrypted formats.
Launched in March 2019, the service gained a dedicated fanbase but Send was taken offline earlier this summer after ZDNet reported on its constant abuse by malware groups.
At the time, Mozilla said that Send's shutdown was temporary and promised to find a way to curb the service's abuse in malware operations. But weeks later, things changed after Mozilla leadership laid off more than 250 employees as part of an effort to re-focus its business on commercial products.
Now, most of the staff that was supposed to re-engineer Send has been let go, and the ones who are still there are now working on commercial products, such as Mozilla VPN, Firefox Monitor, and Firefox Private Network.
Firefox Notes
The same reasons are also valid for Firefox Notes. Launched as a way to save and sync encrypted notes between Firefox browsers, the service was available as an Android app and browser extension.
๐ ๐๐ผ https://www.zdnet.com/article/mozilla-shuts-down-firefox-send-and-firefox-notes-services
#ff #firefox #mozilla #browser #notes #send
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNet
Mozilla shuts down Firefox Send and Firefox Notes services
Mozilla will shut down Send for good after a ZDNet report over the summer that highlighted the service's popularity with malware operators.
Toward a Technological Cage for the Masses
For about two decades, beginning roughly in 1995, the average resident of the developed nations was given a gift, an unprecedented opportunity for free speech. This opportunity was made possible by the personal computer and the ability it provided to access an open, relatively unregulated Internet. Never before had the common man or woman had opportunities to express his or her views to large audiences unhindered by gatekeepers--whether they be newspaper editors, book editors, television programming directors, judges, or other government officials. The fact that this situation lasted as long as it did is astounding. But now, the natural order of things is returning. Now, the brief window of free speech is closing, and it is closing quickly.
Not only is the Internet being increasingly regulated and sectioned off into separate Internets for each country, but the personal computer itself is being hobbled. We are told that our computers are being stripped of their functionality because they are just too insecure and too complicated for the average "normal" or "normie" to deal with. After all, the problem could not possibly be that the Windows operating system is an insecure piece of junk, reminiscent of a 40-year-old family minivan held together with chewing gum and bailing wire. It could not be that more money can be made by locking down the personal computer and moving most, or all, of its processing into the cloud, were giant companies, rather than the owner of the computer, will decide what software can run on it. Where a monthly fee can be charged for its use.
The truth is that companies and governments are in a secret war with general-purpose computing. The reason for the war is that companies want to protect their copyrighted intellectual property, and governments want to control their citizens.
๐ ๐๐ผ https://cheapskatesguide.org/articles/techno-cage.html/
#technological #cage #internet #gatekeepers #doctorow #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
For about two decades, beginning roughly in 1995, the average resident of the developed nations was given a gift, an unprecedented opportunity for free speech. This opportunity was made possible by the personal computer and the ability it provided to access an open, relatively unregulated Internet. Never before had the common man or woman had opportunities to express his or her views to large audiences unhindered by gatekeepers--whether they be newspaper editors, book editors, television programming directors, judges, or other government officials. The fact that this situation lasted as long as it did is astounding. But now, the natural order of things is returning. Now, the brief window of free speech is closing, and it is closing quickly.
Not only is the Internet being increasingly regulated and sectioned off into separate Internets for each country, but the personal computer itself is being hobbled. We are told that our computers are being stripped of their functionality because they are just too insecure and too complicated for the average "normal" or "normie" to deal with. After all, the problem could not possibly be that the Windows operating system is an insecure piece of junk, reminiscent of a 40-year-old family minivan held together with chewing gum and bailing wire. It could not be that more money can be made by locking down the personal computer and moving most, or all, of its processing into the cloud, were giant companies, rather than the owner of the computer, will decide what software can run on it. Where a monthly fee can be charged for its use.
The truth is that companies and governments are in a secret war with general-purpose computing. The reason for the war is that companies want to protect their copyrighted intellectual property, and governments want to control their citizens.
๐ ๐๐ผ https://cheapskatesguide.org/articles/techno-cage.html/
#technological #cage #internet #gatekeepers #doctorow #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
GitHub
28c3-doctorow/transcript.md at master ยท jwise/28c3-doctorow
Transcription of Cory Doctorow's keynote from 28C3. - jwise/28c3-doctorow
Disneyโs Mulan Crushes All Competition on Pirate Sites
Disney's Mulan is a smash hit on pirate sites, where millions of people streamed and downloaded pirate copies of the film over the past week and a half. For days on end, the film has been pirated many times more than the competition, which is a rare sight. This 'success' is the result of a volatile mix of steep costs, low availability, and high-quality pirate alternatives.
Online movie piracy has plagued Hollywood for roughly two decades now. Despite numerous enforcement efforts, the problem only appears to get worse.
Ten years ago, the threat mostly came from torrent sites which proved to be a hurdle for the impatient or tech illiterates. Today, there are hundreds of streaming sites and apps that rival Netflix, Disney, and other legal platforms.
We canโt say that the movie industry hasnโt changed. Responding to rampant piracy figures, movies have appeared online more swiftly after their theatrical release. During the current pandemic, several prominent titles even premiered online. However, that appears to have had little impact.
The release of Mulan illustrates this perfectly. After several delays, the film skipped the box office in most countries. Instead, it was released on Disney+ where viewers had to pay an extra fee to see it. The exact price differs per region but in the US itโs roughly $30 on top of the regular subscription.
Thatโs a steep price or a bargain, depending on who you ask. Disney would argue that two box-office tickets plus drinks and popcorn would cost more. And youโll save on gas too. Then again, compared to the dozens of other titles you can watch on Disney+ for the regular monthly subscription fee, itโs quite expensive.
Without arguing over whoโs right or wrong, the online premiere of Mulan had a major side-effect. For days on end, itโs been the most pirated movie, crushing all competition by a wide margin.
Over the past several days, weโve collected various samples of download figures from public torrent trackers with help from I Know. We donโt like to publish hard numbers as itโs impossible to capture all downloads perfectly. However, itโs clear that Mulan was downloaded millions of times through torrent sites alone.
๐ ๐๐ผ https://torrentfreak.com/disneys-mulan-crushes-all-competition-on-pirate-sites-200917/
#disney #mulan #pirates
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Disney's Mulan is a smash hit on pirate sites, where millions of people streamed and downloaded pirate copies of the film over the past week and a half. For days on end, the film has been pirated many times more than the competition, which is a rare sight. This 'success' is the result of a volatile mix of steep costs, low availability, and high-quality pirate alternatives.
Online movie piracy has plagued Hollywood for roughly two decades now. Despite numerous enforcement efforts, the problem only appears to get worse.
Ten years ago, the threat mostly came from torrent sites which proved to be a hurdle for the impatient or tech illiterates. Today, there are hundreds of streaming sites and apps that rival Netflix, Disney, and other legal platforms.
We canโt say that the movie industry hasnโt changed. Responding to rampant piracy figures, movies have appeared online more swiftly after their theatrical release. During the current pandemic, several prominent titles even premiered online. However, that appears to have had little impact.
The release of Mulan illustrates this perfectly. After several delays, the film skipped the box office in most countries. Instead, it was released on Disney+ where viewers had to pay an extra fee to see it. The exact price differs per region but in the US itโs roughly $30 on top of the regular subscription.
Thatโs a steep price or a bargain, depending on who you ask. Disney would argue that two box-office tickets plus drinks and popcorn would cost more. And youโll save on gas too. Then again, compared to the dozens of other titles you can watch on Disney+ for the regular monthly subscription fee, itโs quite expensive.
Without arguing over whoโs right or wrong, the online premiere of Mulan had a major side-effect. For days on end, itโs been the most pirated movie, crushing all competition by a wide margin.
Over the past several days, weโve collected various samples of download figures from public torrent trackers with help from I Know. We donโt like to publish hard numbers as itโs impossible to capture all downloads perfectly. However, itโs clear that Mulan was downloaded millions of times through torrent sites alone.
๐ ๐๐ผ https://torrentfreak.com/disneys-mulan-crushes-all-competition-on-pirate-sites-200917/
#disney #mulan #pirates
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Torrentfreak
Disney's Mulan Crushes All Competition on Pirate Sites * TorrentFreak
Disney's Mulan is a smash hit on pirate sites, where millions of people streamed and downloaded pirate copies of the film over the past week and a half. For days on end, the film has been pirated many times more than the competition, which is a rare sight.โฆ
At the age of 22 I was sentenced to a very long prison term for computer fraud
I used the time in prison to reflect on my life and my person.
After my imprisonment I let the deeds speak for themselves. I graduated in business informatics, built up a great social circle, found a great employer and went through a great personal development (for me) - today I am where I always wanted to be in my life. I am a free person.
๐ ๐๐ผ ๐ฉ๐ช Emre Ates - the prison diary:
https://hafttagebuch.de/
#emre #prison #diary #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
I used the time in prison to reflect on my life and my person.
After my imprisonment I let the deeds speak for themselves. I graduated in business informatics, built up a great social circle, found a great employer and went through a great personal development (for me) - today I am where I always wanted to be in my life. I am a free person.
๐ ๐๐ผ ๐ฉ๐ช Emre Ates - the prison diary:
https://hafttagebuch.de/
#emre #prison #diary #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag