Major German shopping site leaks customer data
A publicly-listed multinational retailer with millions of dollars in annual revenues was discovered to be operating a completely unsecured server, thereby publicly exposing private data belonging to around 700,000 of its customers.
Our Security team, led by Anurag Sen, discovered a vulnerable and unsecured server containing more than 6 terabytes of data operated by German company windeln.de.
Our team detected the breach on 13 June 2020 and estimates that the server vulnerability was exposed on the Internet on 11 June 2020.
The ElasticSearch server and its vulnerability were discovered during a routine check of IP addresses on particular ports. Our team found that the server was completely unsecured and publicly exposed without a password โ meaning that anyone in possession of the serverโs IP address could access the entire database.
We tried to reach out to Windeln.de, but nobody ever got back to us. We then contacted the German CERT, so they could inform the company about the data leak. A few days later, the server got secured.
๐ ๐๐ผ https://www.safetydetectives.com/blog/windeln-leak-report/
#windeln #germany #vulnerability #leak #data #dataleak #customers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A publicly-listed multinational retailer with millions of dollars in annual revenues was discovered to be operating a completely unsecured server, thereby publicly exposing private data belonging to around 700,000 of its customers.
Our Security team, led by Anurag Sen, discovered a vulnerable and unsecured server containing more than 6 terabytes of data operated by German company windeln.de.
Our team detected the breach on 13 June 2020 and estimates that the server vulnerability was exposed on the Internet on 11 June 2020.
The ElasticSearch server and its vulnerability were discovered during a routine check of IP addresses on particular ports. Our team found that the server was completely unsecured and publicly exposed without a password โ meaning that anyone in possession of the serverโs IP address could access the entire database.
We tried to reach out to Windeln.de, but nobody ever got back to us. We then contacted the German CERT, so they could inform the company about the data leak. A few days later, the server got secured.
๐ ๐๐ผ https://www.safetydetectives.com/blog/windeln-leak-report/
#windeln #germany #vulnerability #leak #data #dataleak #customers
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
SafetyDetectives
Major German shopping site leaks customer data
A publicly-listed multinational retailer with millions of dollars in annual revenues was discovered to be operating a completely unsecured server, thereby publi
Cyber security alert issued following rising attacks on UK academia
The NCSC has issued an alert to the academic sector following a spate of online attacks against UK schools, colleges and universities.
The National Cyber Security Centre, a part of GCHQ, is supporting establishments to keep criminals out of their networks after a spike in ransomware attacks.
The rise in attacks was recorded in August as cyber criminals turn their attention to a sector focused on the return of students.
Cyber security experts have today (Thursday) stepped up support for UK schools, colleges, and universities following a spate of online attacks with the potential to de-rail their preparations for the new term.
The National Cyber Security Centre (NCSC) issued an alert to the sector containing a number of steps they can take to keep cyber criminals out of their networks, following a recent spike in ransomware attacks.
The NCSC dealt with several ransomware attacks against education establishments in August, which caused varying levels of disruption, depending on the level of security establishments had in place.
Ransomware attacks typically involve the encryption of an organisationโs data by cyber criminals, who then demand money in exchange for its recovery.
With institutions either welcoming pupils and students back for a new term, or preparing to do so, the NCSCโs alert urges them to take immediate steps such as ensuring data is backed up and also stored on copies offline.
They are also urged to read the NCSCโs newly-updated guidance on mitigating malware and ransomware attacks, and to develop an incident response plan which they regularly test.
๐ ๐๐ผ https://www.ncsc.gov.uk/news/alert-issued-following-rising-attacks-on-uk-academia
#alert #NCSC #cyber #security #uk #academia #ransomware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The NCSC has issued an alert to the academic sector following a spate of online attacks against UK schools, colleges and universities.
The National Cyber Security Centre, a part of GCHQ, is supporting establishments to keep criminals out of their networks after a spike in ransomware attacks.
The rise in attacks was recorded in August as cyber criminals turn their attention to a sector focused on the return of students.
Cyber security experts have today (Thursday) stepped up support for UK schools, colleges, and universities following a spate of online attacks with the potential to de-rail their preparations for the new term.
The National Cyber Security Centre (NCSC) issued an alert to the sector containing a number of steps they can take to keep cyber criminals out of their networks, following a recent spike in ransomware attacks.
The NCSC dealt with several ransomware attacks against education establishments in August, which caused varying levels of disruption, depending on the level of security establishments had in place.
Ransomware attacks typically involve the encryption of an organisationโs data by cyber criminals, who then demand money in exchange for its recovery.
With institutions either welcoming pupils and students back for a new term, or preparing to do so, the NCSCโs alert urges them to take immediate steps such as ensuring data is backed up and also stored on copies offline.
They are also urged to read the NCSCโs newly-updated guidance on mitigating malware and ransomware attacks, and to develop an incident response plan which they regularly test.
๐ ๐๐ผ https://www.ncsc.gov.uk/news/alert-issued-following-rising-attacks-on-uk-academia
#alert #NCSC #cyber #security #uk #academia #ransomware
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
www.ncsc.gov.uk
Cyber security alert issued following rising attacks on UK academia
The NCSC has issued an alert to the academic sector following a spate of online attacks against UK schools, colleges and universities.
Mozilla shuts down Firefox Send and Firefox Notes services
Mozilla will shut down Send for good after a ZDNet report over the summer that highlighted the service's popularity with malware operators.
Mozilla is shutting down two of its legacy products, Firefox Send and Firefox Notes, the company announced today.
"Both services are being decommissioned and will no longer be a part of our product family," a Mozilla spokesperson told ZDNet this week.
Firefox Send
Of the two, the most beloved was Firefox Send, a free file-sharing service, and one of the few that supported sharing files in encrypted formats.
Launched in March 2019, the service gained a dedicated fanbase but Send was taken offline earlier this summer after ZDNet reported on its constant abuse by malware groups.
At the time, Mozilla said that Send's shutdown was temporary and promised to find a way to curb the service's abuse in malware operations. But weeks later, things changed after Mozilla leadership laid off more than 250 employees as part of an effort to re-focus its business on commercial products.
Now, most of the staff that was supposed to re-engineer Send has been let go, and the ones who are still there are now working on commercial products, such as Mozilla VPN, Firefox Monitor, and Firefox Private Network.
Firefox Notes
The same reasons are also valid for Firefox Notes. Launched as a way to save and sync encrypted notes between Firefox browsers, the service was available as an Android app and browser extension.
๐ ๐๐ผ https://www.zdnet.com/article/mozilla-shuts-down-firefox-send-and-firefox-notes-services
#ff #firefox #mozilla #browser #notes #send
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Mozilla will shut down Send for good after a ZDNet report over the summer that highlighted the service's popularity with malware operators.
Mozilla is shutting down two of its legacy products, Firefox Send and Firefox Notes, the company announced today.
"Both services are being decommissioned and will no longer be a part of our product family," a Mozilla spokesperson told ZDNet this week.
Firefox Send
Of the two, the most beloved was Firefox Send, a free file-sharing service, and one of the few that supported sharing files in encrypted formats.
Launched in March 2019, the service gained a dedicated fanbase but Send was taken offline earlier this summer after ZDNet reported on its constant abuse by malware groups.
At the time, Mozilla said that Send's shutdown was temporary and promised to find a way to curb the service's abuse in malware operations. But weeks later, things changed after Mozilla leadership laid off more than 250 employees as part of an effort to re-focus its business on commercial products.
Now, most of the staff that was supposed to re-engineer Send has been let go, and the ones who are still there are now working on commercial products, such as Mozilla VPN, Firefox Monitor, and Firefox Private Network.
Firefox Notes
The same reasons are also valid for Firefox Notes. Launched as a way to save and sync encrypted notes between Firefox browsers, the service was available as an Android app and browser extension.
๐ ๐๐ผ https://www.zdnet.com/article/mozilla-shuts-down-firefox-send-and-firefox-notes-services
#ff #firefox #mozilla #browser #notes #send
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNet
Mozilla shuts down Firefox Send and Firefox Notes services
Mozilla will shut down Send for good after a ZDNet report over the summer that highlighted the service's popularity with malware operators.
Toward a Technological Cage for the Masses
For about two decades, beginning roughly in 1995, the average resident of the developed nations was given a gift, an unprecedented opportunity for free speech. This opportunity was made possible by the personal computer and the ability it provided to access an open, relatively unregulated Internet. Never before had the common man or woman had opportunities to express his or her views to large audiences unhindered by gatekeepers--whether they be newspaper editors, book editors, television programming directors, judges, or other government officials. The fact that this situation lasted as long as it did is astounding. But now, the natural order of things is returning. Now, the brief window of free speech is closing, and it is closing quickly.
Not only is the Internet being increasingly regulated and sectioned off into separate Internets for each country, but the personal computer itself is being hobbled. We are told that our computers are being stripped of their functionality because they are just too insecure and too complicated for the average "normal" or "normie" to deal with. After all, the problem could not possibly be that the Windows operating system is an insecure piece of junk, reminiscent of a 40-year-old family minivan held together with chewing gum and bailing wire. It could not be that more money can be made by locking down the personal computer and moving most, or all, of its processing into the cloud, were giant companies, rather than the owner of the computer, will decide what software can run on it. Where a monthly fee can be charged for its use.
The truth is that companies and governments are in a secret war with general-purpose computing. The reason for the war is that companies want to protect their copyrighted intellectual property, and governments want to control their citizens.
๐ ๐๐ผ https://cheapskatesguide.org/articles/techno-cage.html/
#technological #cage #internet #gatekeepers #doctorow #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
For about two decades, beginning roughly in 1995, the average resident of the developed nations was given a gift, an unprecedented opportunity for free speech. This opportunity was made possible by the personal computer and the ability it provided to access an open, relatively unregulated Internet. Never before had the common man or woman had opportunities to express his or her views to large audiences unhindered by gatekeepers--whether they be newspaper editors, book editors, television programming directors, judges, or other government officials. The fact that this situation lasted as long as it did is astounding. But now, the natural order of things is returning. Now, the brief window of free speech is closing, and it is closing quickly.
Not only is the Internet being increasingly regulated and sectioned off into separate Internets for each country, but the personal computer itself is being hobbled. We are told that our computers are being stripped of their functionality because they are just too insecure and too complicated for the average "normal" or "normie" to deal with. After all, the problem could not possibly be that the Windows operating system is an insecure piece of junk, reminiscent of a 40-year-old family minivan held together with chewing gum and bailing wire. It could not be that more money can be made by locking down the personal computer and moving most, or all, of its processing into the cloud, were giant companies, rather than the owner of the computer, will decide what software can run on it. Where a monthly fee can be charged for its use.
The truth is that companies and governments are in a secret war with general-purpose computing. The reason for the war is that companies want to protect their copyrighted intellectual property, and governments want to control their citizens.
๐ ๐๐ผ https://cheapskatesguide.org/articles/techno-cage.html/
#technological #cage #internet #gatekeepers #doctorow #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
GitHub
28c3-doctorow/transcript.md at master ยท jwise/28c3-doctorow
Transcription of Cory Doctorow's keynote from 28C3. - jwise/28c3-doctorow
Disneyโs Mulan Crushes All Competition on Pirate Sites
Disney's Mulan is a smash hit on pirate sites, where millions of people streamed and downloaded pirate copies of the film over the past week and a half. For days on end, the film has been pirated many times more than the competition, which is a rare sight. This 'success' is the result of a volatile mix of steep costs, low availability, and high-quality pirate alternatives.
Online movie piracy has plagued Hollywood for roughly two decades now. Despite numerous enforcement efforts, the problem only appears to get worse.
Ten years ago, the threat mostly came from torrent sites which proved to be a hurdle for the impatient or tech illiterates. Today, there are hundreds of streaming sites and apps that rival Netflix, Disney, and other legal platforms.
We canโt say that the movie industry hasnโt changed. Responding to rampant piracy figures, movies have appeared online more swiftly after their theatrical release. During the current pandemic, several prominent titles even premiered online. However, that appears to have had little impact.
The release of Mulan illustrates this perfectly. After several delays, the film skipped the box office in most countries. Instead, it was released on Disney+ where viewers had to pay an extra fee to see it. The exact price differs per region but in the US itโs roughly $30 on top of the regular subscription.
Thatโs a steep price or a bargain, depending on who you ask. Disney would argue that two box-office tickets plus drinks and popcorn would cost more. And youโll save on gas too. Then again, compared to the dozens of other titles you can watch on Disney+ for the regular monthly subscription fee, itโs quite expensive.
Without arguing over whoโs right or wrong, the online premiere of Mulan had a major side-effect. For days on end, itโs been the most pirated movie, crushing all competition by a wide margin.
Over the past several days, weโve collected various samples of download figures from public torrent trackers with help from I Know. We donโt like to publish hard numbers as itโs impossible to capture all downloads perfectly. However, itโs clear that Mulan was downloaded millions of times through torrent sites alone.
๐ ๐๐ผ https://torrentfreak.com/disneys-mulan-crushes-all-competition-on-pirate-sites-200917/
#disney #mulan #pirates
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Disney's Mulan is a smash hit on pirate sites, where millions of people streamed and downloaded pirate copies of the film over the past week and a half. For days on end, the film has been pirated many times more than the competition, which is a rare sight. This 'success' is the result of a volatile mix of steep costs, low availability, and high-quality pirate alternatives.
Online movie piracy has plagued Hollywood for roughly two decades now. Despite numerous enforcement efforts, the problem only appears to get worse.
Ten years ago, the threat mostly came from torrent sites which proved to be a hurdle for the impatient or tech illiterates. Today, there are hundreds of streaming sites and apps that rival Netflix, Disney, and other legal platforms.
We canโt say that the movie industry hasnโt changed. Responding to rampant piracy figures, movies have appeared online more swiftly after their theatrical release. During the current pandemic, several prominent titles even premiered online. However, that appears to have had little impact.
The release of Mulan illustrates this perfectly. After several delays, the film skipped the box office in most countries. Instead, it was released on Disney+ where viewers had to pay an extra fee to see it. The exact price differs per region but in the US itโs roughly $30 on top of the regular subscription.
Thatโs a steep price or a bargain, depending on who you ask. Disney would argue that two box-office tickets plus drinks and popcorn would cost more. And youโll save on gas too. Then again, compared to the dozens of other titles you can watch on Disney+ for the regular monthly subscription fee, itโs quite expensive.
Without arguing over whoโs right or wrong, the online premiere of Mulan had a major side-effect. For days on end, itโs been the most pirated movie, crushing all competition by a wide margin.
Over the past several days, weโve collected various samples of download figures from public torrent trackers with help from I Know. We donโt like to publish hard numbers as itโs impossible to capture all downloads perfectly. However, itโs clear that Mulan was downloaded millions of times through torrent sites alone.
๐ ๐๐ผ https://torrentfreak.com/disneys-mulan-crushes-all-competition-on-pirate-sites-200917/
#disney #mulan #pirates
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Torrentfreak
Disney's Mulan Crushes All Competition on Pirate Sites * TorrentFreak
Disney's Mulan is a smash hit on pirate sites, where millions of people streamed and downloaded pirate copies of the film over the past week and a half. For days on end, the film has been pirated many times more than the competition, which is a rare sight.โฆ
At the age of 22 I was sentenced to a very long prison term for computer fraud
I used the time in prison to reflect on my life and my person.
After my imprisonment I let the deeds speak for themselves. I graduated in business informatics, built up a great social circle, found a great employer and went through a great personal development (for me) - today I am where I always wanted to be in my life. I am a free person.
๐ ๐๐ผ ๐ฉ๐ช Emre Ates - the prison diary:
https://hafttagebuch.de/
#emre #prison #diary #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
I used the time in prison to reflect on my life and my person.
After my imprisonment I let the deeds speak for themselves. I graduated in business informatics, built up a great social circle, found a great employer and went through a great personal development (for me) - today I am where I always wanted to be in my life. I am a free person.
๐ ๐๐ผ ๐ฉ๐ช Emre Ates - the prison diary:
https://hafttagebuch.de/
#emre #prison #diary #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Breaking: USA bans WeChat and TikTok from the Google Play Store and Apple App Store
Starting from September 20, 2020
The US Commerce Department has announced prohibitions banning people in the US from downloading TikTok and WeChat in reponse to a pair of executive orders signed by US President Donald Trump in August.
In a press release on the matter, the US Department of Commerce noted: โThe Chinese Communist Party (CCP) has demonstrated the means and motives to use these apps to threaten the national security, foreign policy, and the economy of the U.S. Todayโs announced prohibitions, when combined, protect users in the U.S. by eliminating access to these applications and significantly reducing their functionality.โ
Speaking on the matter, US Department of Commerce Secretary, Wilbur Ross, was quoted saying, โTodayโs actions prove once again that President Trump will do everything in his power to guarantee our national security and protect Americans from the threads of the Chinese Communist PartyโฆAt the Presidentโs direction, we have taken significant action to combat Chinaโs malicious collection of American citizensโ personal data, while promoting our national values, democratic rules-based norms, and aggressive enforcement of U.S. laws and regulations.โ
The new prohibitions on TikTok and WeChat will go into effect on September 20th, 2020. As part of the new directive, the following transactions are prohibited:
1. Any provision of service to distribute or maintain the WeChat or TikTok mobile applications, constituent code, or application updates through an online mobile application store in the U.S.
2. Any provision of services through the WeChat mobile application for the purpose of transferring funds or processing payments within the U.S.
๐ ๐๐ผ https://www.xda-developers.com/usa-bans-wechat-tiktok-google-play-store-apple-app-store/
#usa #ban #tiktok #wechat #DeleteTikTok #bytedance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Starting from September 20, 2020
The US Commerce Department has announced prohibitions banning people in the US from downloading TikTok and WeChat in reponse to a pair of executive orders signed by US President Donald Trump in August.
In a press release on the matter, the US Department of Commerce noted: โThe Chinese Communist Party (CCP) has demonstrated the means and motives to use these apps to threaten the national security, foreign policy, and the economy of the U.S. Todayโs announced prohibitions, when combined, protect users in the U.S. by eliminating access to these applications and significantly reducing their functionality.โ
Speaking on the matter, US Department of Commerce Secretary, Wilbur Ross, was quoted saying, โTodayโs actions prove once again that President Trump will do everything in his power to guarantee our national security and protect Americans from the threads of the Chinese Communist PartyโฆAt the Presidentโs direction, we have taken significant action to combat Chinaโs malicious collection of American citizensโ personal data, while promoting our national values, democratic rules-based norms, and aggressive enforcement of U.S. laws and regulations.โ
The new prohibitions on TikTok and WeChat will go into effect on September 20th, 2020. As part of the new directive, the following transactions are prohibited:
1. Any provision of service to distribute or maintain the WeChat or TikTok mobile applications, constituent code, or application updates through an online mobile application store in the U.S.
2. Any provision of services through the WeChat mobile application for the purpose of transferring funds or processing payments within the U.S.
๐ ๐๐ผ https://www.xda-developers.com/usa-bans-wechat-tiktok-google-play-store-apple-app-store/
#usa #ban #tiktok #wechat #DeleteTikTok #bytedance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
XDA Developers
[Update: Temp. relief] USA bans WeChat and TikTok from the Google Play Store and Apple App Store
The US Department of Commerce has announced prohibitions on transactions related to WeChat and TikTok, effectively removing the apps from distribution.
Cloudflare and Internet Archive team up to make sure websites never fully go offline
Websites that use Cloudflare Always Online can have their URLs automatically archived with Wayback Machine.
Cloudflare and Internet Archive have joined forces to archive more of the public web, touting it would make the web more reliable.
As part of this joint effort, websites that use Cloudflare's Always Online service will be able to allow the web infrastructure company to share their hostname and URLs with Internet Archive's Wayback Machine so their website can be automatically archived.
When a site is down, Cloudflare will then be able to retrieve the most recently archived version from Internet Archive so that a site's content can be accessed by users.
"The Internet Archive's Wayback Machine has an impressive infrastructure that can archive the web at scale," Cloudflare CEO and co-founder Matthew Prince said.
"By working together, we can take another step toward making the internet more resilient by stopping server issues for our customers and in turn from interrupting businesses and users online."
According to Internet Archive, more than 468 billion web pages are available via the Wayback Machine to date.
"We archive URLs that are identified via a variety of different methods, such as 'crawling' from lists of millions of sites, as submitted by users via the Wayback Machine's 'Save Page Now' feature, added to Wikipedia articles, referenced in Tweets, and based on a number of other 'signals' and sources, such multiple feeds of 'news' stories. An additional source of URLs we will preserve now originates from customers of Cloudflare's Always Online service," Wayback Machine director Mark Graham wrote in a blog post.
๐ ๐๐ผ https://blog.archive.org/2020/09/17/internet-archive-partners-with-cloudflare-to-help-make-the-web-more-useful-and-reliable/
๐ ๐๐ผ https://www.zdnet.com/article/cloudflare-and-internet-archive-team-up-to-make-sure-websites-never-fully-go-offline
#cloudflare #internet #archive #wayback
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Websites that use Cloudflare Always Online can have their URLs automatically archived with Wayback Machine.
Cloudflare and Internet Archive have joined forces to archive more of the public web, touting it would make the web more reliable.
As part of this joint effort, websites that use Cloudflare's Always Online service will be able to allow the web infrastructure company to share their hostname and URLs with Internet Archive's Wayback Machine so their website can be automatically archived.
When a site is down, Cloudflare will then be able to retrieve the most recently archived version from Internet Archive so that a site's content can be accessed by users.
"The Internet Archive's Wayback Machine has an impressive infrastructure that can archive the web at scale," Cloudflare CEO and co-founder Matthew Prince said.
"By working together, we can take another step toward making the internet more resilient by stopping server issues for our customers and in turn from interrupting businesses and users online."
According to Internet Archive, more than 468 billion web pages are available via the Wayback Machine to date.
"We archive URLs that are identified via a variety of different methods, such as 'crawling' from lists of millions of sites, as submitted by users via the Wayback Machine's 'Save Page Now' feature, added to Wikipedia articles, referenced in Tweets, and based on a number of other 'signals' and sources, such multiple feeds of 'news' stories. An additional source of URLs we will preserve now originates from customers of Cloudflare's Always Online service," Wayback Machine director Mark Graham wrote in a blog post.
๐ ๐๐ผ https://blog.archive.org/2020/09/17/internet-archive-partners-with-cloudflare-to-help-make-the-web-more-useful-and-reliable/
๐ ๐๐ผ https://www.zdnet.com/article/cloudflare-and-internet-archive-team-up-to-make-sure-websites-never-fully-go-offline
#cloudflare #internet #archive #wayback
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
74: Mikko
Darknetdiaries - Ep 74: Mikko
Poker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers have understood this for a while and sometimes hack the other players to get an edge. And that small edge can result in millions of dollars in winnings.
This episode contains a story from Mikko Hypponen of F-Secure. We also interview Mikko to know more about him and the history of malware.
๐ง ๐๐ผ https://darknetdiaries.com/episode/74/
#darknetdiaries #truecrime #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Poker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers have understood this for a while and sometimes hack the other players to get an edge. And that small edge can result in millions of dollars in winnings.
This episode contains a story from Mikko Hypponen of F-Secure. We also interview Mikko to know more about him and the history of malware.
๐ง ๐๐ผ https://darknetdiaries.com/episode/74/
#darknetdiaries #truecrime #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Facebook Accused of Watching Instagram Users Through Cameras
Facebook Inc. is again being sued for allegedly spying on Instagram users, this time through the unauthorized use of their mobile phone cameras.
The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone cameras even when they werenโt actively being used.
Facebook denied the reports and blamed a bug, which it said it was correcting, for triggering what it described as false notifications that Instagram was accessing iPhone cameras.
In the complaint filed Thursday in federal court in San Francisco, New Jersey Instagram user Brittany Conditi contends the appโs use of the camera is intentional and done for the purpose of collecting โlucrative and valuable data on its users that it would not otherwise have access to.โ
By โobtaining extremely private and intimate personal data on their users, including in the privacy of their own homes,โ Instagram and Facebook are able to collect โvaluable insights and market research,โ according to the complaint.
Facebook declined to comment.
๐ ๐๐ผ https://www.bloomberg.com/news/articles/2020-09-18/facebook-accused-of-watching-instagram-users-through-cameras
#fb #DeleteFacebook #instagram #accused #spy #privacy #surveillance #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Facebook Inc. is again being sued for allegedly spying on Instagram users, this time through the unauthorized use of their mobile phone cameras.
The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone cameras even when they werenโt actively being used.
Facebook denied the reports and blamed a bug, which it said it was correcting, for triggering what it described as false notifications that Instagram was accessing iPhone cameras.
In the complaint filed Thursday in federal court in San Francisco, New Jersey Instagram user Brittany Conditi contends the appโs use of the camera is intentional and done for the purpose of collecting โlucrative and valuable data on its users that it would not otherwise have access to.โ
By โobtaining extremely private and intimate personal data on their users, including in the privacy of their own homes,โ Instagram and Facebook are able to collect โvaluable insights and market research,โ according to the complaint.
Facebook declined to comment.
๐ ๐๐ผ https://www.bloomberg.com/news/articles/2020-09-18/facebook-accused-of-watching-instagram-users-through-cameras
#fb #DeleteFacebook #instagram #accused #spy #privacy #surveillance #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Bloomberg.com
Facebook Accused of Watching Instagram Users Through Cameras
Facebook Inc. is again being sued for allegedly spying on Instagram users, this time through the unauthorized use of their mobile phone cameras.The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone camerasโฆ
Mozilla wants to understand your weird YouTube recommendations
The organization has announced a new tool to gather the data that YouTube is refusing to share.
From cute cat videos to sourdough bread recipes: sometimes, it feels like the algorithm behind YouTube's "Up Next" section knows the user better than the user knows themselves.
Often, that same algorithm leads the viewer down a rabbit hole. How many times have you spent countless hours clicking through the next suggested video, each time promising yourself that this one would be the last one?
The scenario gets thorny when the system somehow steers the user towards conspiracy theory videos and other forms of extreme content, as some have complained.
To get an idea of how often this happens and how, the non-profit Mozilla Foundation has launched a new browser extension that lets users take action when they are recommended videos on YouTube that they then wish they hadn't ended up watching.
Dubbed the RegretsReporter extension, it provides a tool to report what Mozilla calls "YouTube Regrets" โ this one video that messes up the recommendation system and leads the viewer down a bizarre path.
๐ ๐๐ผ https://foundation.mozilla.org/en/blog/mozilla-crowdsourcing-research-youtube-recommendations/
๐ ๐๐ผ https://www.zdnet.com/article/mozilla-wants-to-understand-your-weird-youtube-recommendations
#mozilla #youtube #recommendations #research #RegretsReporter #firefox #extension
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The organization has announced a new tool to gather the data that YouTube is refusing to share.
From cute cat videos to sourdough bread recipes: sometimes, it feels like the algorithm behind YouTube's "Up Next" section knows the user better than the user knows themselves.
Often, that same algorithm leads the viewer down a rabbit hole. How many times have you spent countless hours clicking through the next suggested video, each time promising yourself that this one would be the last one?
The scenario gets thorny when the system somehow steers the user towards conspiracy theory videos and other forms of extreme content, as some have complained.
To get an idea of how often this happens and how, the non-profit Mozilla Foundation has launched a new browser extension that lets users take action when they are recommended videos on YouTube that they then wish they hadn't ended up watching.
Dubbed the RegretsReporter extension, it provides a tool to report what Mozilla calls "YouTube Regrets" โ this one video that messes up the recommendation system and leads the viewer down a bizarre path.
๐ ๐๐ผ https://foundation.mozilla.org/en/blog/mozilla-crowdsourcing-research-youtube-recommendations/
๐ ๐๐ผ https://www.zdnet.com/article/mozilla-wants-to-understand-your-weird-youtube-recommendations
#mozilla #youtube #recommendations #research #RegretsReporter #firefox #extension
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Mozilla Foundation
Mozilla is Crowdsourcing Research into YouTube Recommendations
Mozillaโs blog features guides to making your online life better, stories from the movement, and critical analysis of issues around internet health.
Rampant Kitten โ An Iranian Espionage Campaign
Introduction
Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, our investigation allowed us to connect the different campaigns and attribute them to the same attackers.
๐ก Among the different attack vectors we found were:
๐๐ผ Four variants of Windows infostealers intended to steal the victimโs personal documents as well as access to their Telegram Desktop and KeePass account information
๐๐ผ Android backdoor that extracts two-factor authentication codes from SMS messages, records the phoneโs voice surroundings and more
๐๐ผ Telegram phishing pages, distributed using fake Telegram service accounts
๐ก The above tools and methods appear to be mainly used against Iranian minorities, anti-regime organizations and resistance movements such as:
๐๐ผ Association of Families of Camp Ashraf and Liberty Residents (AFALR)
๐๐ผ Azerbaijan National Resistance Organization
๐๐ผ Balochistan people
๐ ๐๐ผ https://research.checkpoint.com/2020/rampant-kitten-an-iranian-espionage-campaign/
๐ ๐๐ผ https://www.zdnet.com/article/iranian-hacker-group-developed-android-malware-to-steal-2fa-sms-codes
#iranian #hacker #rampantkitten #android #malware #espionage #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Introduction
Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, our investigation allowed us to connect the different campaigns and attribute them to the same attackers.
๐ก Among the different attack vectors we found were:
๐๐ผ Four variants of Windows infostealers intended to steal the victimโs personal documents as well as access to their Telegram Desktop and KeePass account information
๐๐ผ Android backdoor that extracts two-factor authentication codes from SMS messages, records the phoneโs voice surroundings and more
๐๐ผ Telegram phishing pages, distributed using fake Telegram service accounts
๐ก The above tools and methods appear to be mainly used against Iranian minorities, anti-regime organizations and resistance movements such as:
๐๐ผ Association of Families of Camp Ashraf and Liberty Residents (AFALR)
๐๐ผ Azerbaijan National Resistance Organization
๐๐ผ Balochistan people
๐ ๐๐ผ https://research.checkpoint.com/2020/rampant-kitten-an-iranian-espionage-campaign/
๐ ๐๐ผ https://www.zdnet.com/article/iranian-hacker-group-developed-android-malware-to-steal-2fa-sms-codes
#iranian #hacker #rampantkitten #android #malware #espionage #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Check Point Research
Rampant Kitten - An Iranian Espionage Campaign - Check Point Research
Introduction Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchersโฆ
Backdoors and other vulnerabilities in HiSilicon based hardware video encoders
Update 2020-09-17: Huawei issued a statement saying that none of the vulnerabilities have been introduced by HiSilicon chips and SDK packages. I will update this article as more information comes in.
This article discloses critical vulnerabilities in IPTV/H.264/H.265 video encoders based on HiSilicon hi3520d hardware. The vulnerabilities exist in the application software running on these devices. All vulnerabilities are exploitable remotely and can lead to sensitive information exposure, denial of service, and remote code execution resulting in full takeover of the device. With multiple vendors affected, and no complete fixes at the time of the publication, these encoders should only be used on fully trusted networks behind firewalls. I hope that my detailed write-up serves as a guide for more security research in the IoT world.
๐ ๐๐ผ https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/
๐ ๐๐ผ ๐ฉ๐ช https://www.heise.de/news/Backdoors-in-Video-Encodern-auf-Huawei-Chips-entdeckt-Ursprung-unbekannt-4905641.html
#hisilicon #hardware #video #encoder #vulnerabilities #huawei #chips #backdoors
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Update 2020-09-17: Huawei issued a statement saying that none of the vulnerabilities have been introduced by HiSilicon chips and SDK packages. I will update this article as more information comes in.
This article discloses critical vulnerabilities in IPTV/H.264/H.265 video encoders based on HiSilicon hi3520d hardware. The vulnerabilities exist in the application software running on these devices. All vulnerabilities are exploitable remotely and can lead to sensitive information exposure, denial of service, and remote code execution resulting in full takeover of the device. With multiple vendors affected, and no complete fixes at the time of the publication, these encoders should only be used on fully trusted networks behind firewalls. I hope that my detailed write-up serves as a guide for more security research in the IoT world.
๐ ๐๐ผ https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/
๐ ๐๐ผ ๐ฉ๐ช https://www.heise.de/news/Backdoors-in-Video-Encodern-auf-Huawei-Chips-entdeckt-Ursprung-unbekannt-4905641.html
#hisilicon #hardware #video #encoder #vulnerabilities #huawei #chips #backdoors
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
huawei
Security Notice โ Statement on the Media Reports About the Suspected Security Issues in HiSilicon Video Surveillance Chips
Get this - there is a Bitcoin wallet with 69,000 Bitcoins ($693,207,618) that is being passed around between hackers/crackers for the past 2 years for the purpose of cracking the password, no success so far.
๐ ๐๐ผ https://twitter.com/UnderTheBreach/status/1303316723186139136
#wallet #bitcoin #breach #hack #whynot
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ ๐๐ผ https://twitter.com/UnderTheBreach/status/1303316723186139136
#wallet #bitcoin #breach #hack #whynot
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Exploitation of LAN vulnerability found in Firefox for Android (PoC)
I tested this PoC exploit on 3 devices on same wifi, it worked pretty well.
I was able to open custom URL on every smartphone using vulnerable Firefox (68.11.0 and below)
๐ ๐๐ผ https://twitter.com/LukasStefanko/status/1307013106615418883
๐ ๐๐ผ Firefox for Android LAN-Based Intent Triggering:
https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/red-team-tech-notes/-/tree/master/firefox-android-2020
#android #security #exploit #firefox #LAN #vulnerability #poc
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
I tested this PoC exploit on 3 devices on same wifi, it worked pretty well.
I was able to open custom URL on every smartphone using vulnerable Firefox (68.11.0 and below)
๐ ๐๐ผ https://twitter.com/LukasStefanko/status/1307013106615418883
๐ ๐๐ผ Firefox for Android LAN-Based Intent Triggering:
https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/red-team-tech-notes/-/tree/master/firefox-android-2020
#android #security #exploit #firefox #LAN #vulnerability #poc
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A Threat Actor is selling several databases from various companies worldwide including 3 from the Financial sector:
- Indonesia ๐ฎ๐ฉ - 2,9 million records
- Mexico ๐ฒ๐ฝ - 4,7 million records
- USA ๐บ๐ธ - 2,2 million records
๐ ๐๐ผ The Threat Actor shared samples for each DB.
https://nitter.net/Bank_Security/status/1306964926041403393
#hacker #hack #breach #database #worldwide #indonesia #uk #mexico #usa #india #thailand
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
- Indonesia ๐ฎ๐ฉ - 2,9 million records
- Mexico ๐ฒ๐ฝ - 4,7 million records
- USA ๐บ๐ธ - 2,2 million records
๐ ๐๐ผ The Threat Actor shared samples for each DB.
https://nitter.net/Bank_Security/status/1306964926041403393
#hacker #hack #breach #database #worldwide #indonesia #uk #mexico #usa #india #thailand
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
We Are All Algorithms Now - Is that what's really destroying the legitimacy of our democracy?
Iโve never felt this way about an election before. For my entire adult life, campaigns could be exhilarating, tedious, crowded with incident or laden with foreboding, but you always felt that, at some point, there would be a resolution. The votes would be counted; the exit polls parsed; a decision made; and both sides would respect it. The one time that didnโt happen โ in 2000 โ I felt for the first time an inkling of what I feel in every part of my psyche now: a sense that the system itself was buckling.
๐๐ผ ..(..)...
And the reason this dystopian scenario is so credible is not just the fault of these political actors. Itโs ours too โ thanks to the impact of social media. I think weโve under-estimated just how deep the psychological damage has been in the Trump era โ rewiring the minds of everyone, including your faithful correspondent, in ways that make democratic discourse harder and harder and harder to model. The new Netflix documentary, The Social Dilemma, is, for that reason, a true must-watch. It doesnโt say anything shockingly new, but it persuasively weaves together a whole bunch of points to reveal just how deeply and thoroughly fucked we are. Seriously, take a look.
๐๐ผ ..(..)..
For #Facebook and #Google and #Instagram and #Twitter, the business goal quickly became maximizing and monetizing human attention via #addictive #dopamine hits. Attention, they meticulously found, is correlated with emotional intensity, outrage, shock and provocation. Give artificial intelligence this simple knowledge about what distracts and compels humans, let the algorithms do their work, and the profits snowball. The cumulative effect โ and itโs always in the same incendiary direction โ is mass detachment from reality, and immersion in tribal fever.
๐ ๐๐ผ https://andrewsullivan.substack.com/p/we-are-all-algorithms-now
๐๐๐ผ "Dopamine": Miniseries about the addiction mechanisms of Tinder, Facebook and Co. ๐๐ผ
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
๐บ ๐๐ผ https://t.iss.one/BlackBox_Archiv/833 ๐๐ผ ๐บ
#surveillance #capitalism #SocialDilemma #dystopian #democracy #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Iโve never felt this way about an election before. For my entire adult life, campaigns could be exhilarating, tedious, crowded with incident or laden with foreboding, but you always felt that, at some point, there would be a resolution. The votes would be counted; the exit polls parsed; a decision made; and both sides would respect it. The one time that didnโt happen โ in 2000 โ I felt for the first time an inkling of what I feel in every part of my psyche now: a sense that the system itself was buckling.
๐๐ผ ..(..)...
And the reason this dystopian scenario is so credible is not just the fault of these political actors. Itโs ours too โ thanks to the impact of social media. I think weโve under-estimated just how deep the psychological damage has been in the Trump era โ rewiring the minds of everyone, including your faithful correspondent, in ways that make democratic discourse harder and harder and harder to model. The new Netflix documentary, The Social Dilemma, is, for that reason, a true must-watch. It doesnโt say anything shockingly new, but it persuasively weaves together a whole bunch of points to reveal just how deeply and thoroughly fucked we are. Seriously, take a look.
๐๐ผ ..(..)..
For #Facebook and #Google and #Instagram and #Twitter, the business goal quickly became maximizing and monetizing human attention via #addictive #dopamine hits. Attention, they meticulously found, is correlated with emotional intensity, outrage, shock and provocation. Give artificial intelligence this simple knowledge about what distracts and compels humans, let the algorithms do their work, and the profits snowball. The cumulative effect โ and itโs always in the same incendiary direction โ is mass detachment from reality, and immersion in tribal fever.
๐ ๐๐ผ https://andrewsullivan.substack.com/p/we-are-all-algorithms-now
๐๐๐ผ "Dopamine": Miniseries about the addiction mechanisms of Tinder, Facebook and Co. ๐๐ผ
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
๐บ ๐๐ผ https://t.iss.one/BlackBox_Archiv/833 ๐๐ผ ๐บ
#surveillance #capitalism #SocialDilemma #dystopian #democracy #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Telegram
BlackBox (Security) Archiv
The Social Dilemma
Why the algorithms of #TikTok are possibly optimized more for screentime and less for suicide removal is explained very clearly in the new Netflix documentary "The Social Dilemma". Director Jeff Orlowski has put all the ethics big shotsโฆ
Why the algorithms of #TikTok are possibly optimized more for screentime and less for suicide removal is explained very clearly in the new Netflix documentary "The Social Dilemma". Director Jeff Orlowski has put all the ethics big shotsโฆ
Media is too big
VIEW IN TELEGRAM
Surveilling the surveillers - About military RF communication surveillance and other activist art & technology projects
This talk will present relevant works in this field and will draw connections between critical art and regulatory power, warfare, surveillance, electronic waste, electronic self-defense and the re-appropriation of architectural and technological artifacts in militant ways.
๐ก ๐๐ผ ๐ฉ๐ช ๐ฌ๐ง ๐ซ๐ท These file here contains multiple languages.
https://media.ccc.de/v/33c3-7978-surveilling_the_surveillers#t=70
#surveilling #surveillers #33c3 #ccc #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
This talk will present relevant works in this field and will draw connections between critical art and regulatory power, warfare, surveillance, electronic waste, electronic self-defense and the re-appropriation of architectural and technological artifacts in militant ways.
๐ก ๐๐ผ ๐ฉ๐ช ๐ฌ๐ง ๐ซ๐ท These file here contains multiple languages.
https://media.ccc.de/v/33c3-7978-surveilling_the_surveillers#t=70
#surveilling #surveillers #33c3 #ccc #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Bitwarden leaks passwords to other subdomains
Today I was on a domain that should only be available via BasicAuth. Then I was really scared when I did not have to login. Even in incognito mode the page was visible without login. Is my BasicAuth broken? Turns out: No, but @Bitwarden has automatically logged in for me.
๐ ๐๐ผ https://nitter.net/RitzmannMarkus/status/1307614248835731456
#bitwarden #leak #password #subdomains
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Today I was on a domain that should only be available via BasicAuth. Then I was really scared when I did not have to login. Even in incognito mode the page was visible without login. Is my BasicAuth broken? Turns out: No, but @Bitwarden has automatically logged in for me.
๐ ๐๐ผ https://nitter.net/RitzmannMarkus/status/1307614248835731456
#bitwarden #leak #password #subdomains
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Nitter
Markus Ritzmann (@RitzmannMarkus)
Today I was on a domain that should only be available via BasicAuth. Then I was really scared when I did not have to login. Even in incognito mode the page was visible without login. Is my BasicAuth broken? Turns out: No, but @Bitwarden has automaticallyโฆ
This media is not supported in your browser
VIEW IN TELEGRAM
How money is laundered through New York banks
An ICIJ investigation reveals the role of global banks in industrial-scale money laundering โ and the bloodshed and suffering that flow in its wake.
The FinCEN Files show trillions in tainted dollars flow freely through major banks, swamping a broken enforcement system.
๐บ ๐๐ผ https://www.icij.org/investigations/fincen-files/
#investigation #FinCEN #money #laundering #video #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
An ICIJ investigation reveals the role of global banks in industrial-scale money laundering โ and the bloodshed and suffering that flow in its wake.
The FinCEN Files show trillions in tainted dollars flow freely through major banks, swamping a broken enforcement system.
๐บ ๐๐ผ https://www.icij.org/investigations/fincen-files/
#investigation #FinCEN #money #laundering #video #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Fair Code vs Open Source, Which Wins The Future?
Fair code is a new software development model which aims to replace the long-ruling open source model. Fair code authors argue that open source software lack a critical point in terms of commercial usage of the software, and hence, introduced their initiative to fix it.
What is Fair Code?
When developers release their software as open source, they are also giving a by-definition right to every company in the world to commercially use their software without having to obtain a license or share some profits with them. And this caused some problems in the open source world few years ago. For example, Amazon took the MongoDB source code (An open source database system), changed its name and then provided it as a SaaS (Software-as-a-Service) on its AWS platform, and then charged people money to use it. MongoDB developers were angered since they literally got nothing back from Amazon although they are the original creators of 100% of the code.
๐ ๐๐ผ https://fosspost.org/fair-code-open-source/
#foss #faircode #OpenSource #future #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Fair code is a new software development model which aims to replace the long-ruling open source model. Fair code authors argue that open source software lack a critical point in terms of commercial usage of the software, and hence, introduced their initiative to fix it.
What is Fair Code?
When developers release their software as open source, they are also giving a by-definition right to every company in the world to commercially use their software without having to obtain a license or share some profits with them. And this caused some problems in the open source world few years ago. For example, Amazon took the MongoDB source code (An open source database system), changed its name and then provided it as a SaaS (Software-as-a-Service) on its AWS platform, and then charged people money to use it. MongoDB developers were angered since they literally got nothing back from Amazon although they are the original creators of 100% of the code.
๐ ๐๐ผ https://fosspost.org/fair-code-open-source/
#foss #faircode #OpenSource #future #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
FOSS Post
Fair Code Vs Open Source, Which Wins The Future?
Fair code is a new software development model which aims to replace the long-ruling open source model. Fair code authors argue that open source software lack