BlackBox (Security) Archiv
4.07K subscribers
183 photos
393 videos
167 files
2.67K links
👉🏼 Latest viruses and malware threats
👉🏼 Latest patches, tips and tricks
👉🏼 Threats to security/privacy/democracy on the Internet

👉🏼 Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Media is too big
VIEW IN TELEGRAM
Saturday Night Live - Jim Carrey & Maya Rudolph As Joe Biden & Alec Baldwin as Donald Trump.

Yeah, I know. Again, this has nothing to do with the actual topic of this channel. But! Somehow I think, every now and then, we need something to smile about.

👀 👉🏼 This parody with star cast should not be missed!
https://www.youtube.com/watch?v=Kxhlf2m0rtY

#trump #biden #usa #parody #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Internet's Own Boy: The Story of Aaron Swartz

The Internet's Own Boy follows the story of programming prodigy and information activist Aaron Swartz. From Swartz's help in the development of the basic internet protocol RSS to his co-founding of Reddit, his fingerprints are all over the internet. But it was Swartz's groundbreaking work in social justice and political organizing combined with his aggressive approach to information access that ensnared him in a two-year legal nightmare. It was a battle that ended with the taking of his own life at the age of 26. Aaron's story touched a nerve with people far beyond the online communities in which he was a celebrity.

📺 👉🏼 https://www.youtube.com/watch?v=M85UvH0TRPc

#swartz #internet #socialjustice #activist #docu #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Google removed 34 malware-infected apps from the Play Store, now you should delete them from your Android phone

The Joker malware steals money from users by subscribing them to the unwanted premium paid subscriptions without their consent. It first simulates interaction with ads without users’ knowledge and then uses the victim’s SMS messages including OTP to initiate payments.

In the period of two months between July and September, Google has removed 34 apps from the Google Play Store because they were inflected by the Joker malware that has been giving Android smartphone users nightmares. The Joker malware is not new but lately has been causing headaches for Android app developers as it is very hard to detect due to the little code it uses. Also, malware like these use a different technique called ‘Dropper’ to bypass Google’s security scan and sneak into the user’s device.

The most recent additions to the list of apps infected by Joker malware were revealed by Zscaler, a cybersecurity firm based in California. Here’s a look at the 34 apps infected by the malware you should remove from your smartphone if not done already.

👀 👉🏼 https://indianexpress.com/article/technology/tech-news-technology/34-apps-joker-malware-infected-android-uninstall-google-play-store-6701973/

#google #playstore #android #joker #malware
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
US official alleges big tech has started giving Hong Kong user data to China under new national security law

A senior US state official has alleged that big tech companies are already handing over Hong Kong user data to Chinese officials, The Guardian reports. Hong Kong has been drastically changed this year by a new national security law which firmly put Hong Kong in China’s vice grip. The official, whose anonymity The Guardian has maintained, explained why we might not have heard anything from tech giants like Facebook and Google:

There is a possibility that things are happening but because of the restrictions put on by the Hong Kong authorities, they [companies] would not be able to divulge this. The company would be told by mainland authorities ‘you will be breaking the [law] if you reveal the fact that I’m asking for this information.’

Facebook and Google declined to comment to The Guardian on the allegations. One Hong Kong activist who now lives abroad, Glacier Kwong, commented:

I don’t want to put it that way but I will. If Google or other technology companies comply with this national security law, it is actually helping indirectly the Hong Kong government, the Chinese government, to oppress or crack down on the civil society.

👀 👉🏼 https://www.privateinternetaccess.com/blog/us-official-alleges-big-tech-has-started-giving-hong-kong-user-data-to-china-under-new-national-security-law/

#hongkong #china #bigtech #userdata #national #security #law #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Sonos is spying on me… (and you)

I recently decided to get a wireless speaker for our Kitchen. Sonos seems like an obvious choice these days. The sound quality and aesthetics were very appealing. So I ordered a Sonos One SL speaker.

In terms of sound quality and looks, I was very pleased. I’m not an audiophile but the sound quality seemed superb and the speaker just looks fantastic. A very clean and unassuming look.

As I later discovered, a dirty beast hides under the cool exterior.

My concerns started to grow almost immediately as I was setting up the new speaker. I downloaded the app, and started the setup process, soon to realize that I need to register with my email just to set up the device on my network… And of course, I had to accept the terms and conditions …. hmmm… ok, I guess.

I was then asked to allow sharing my location as well, which raised another alarm bell. Why does my speaker need my location? I’m not 100% sure, but if I recall, I had to allow it to access my location, or else I couldn’t continue.

Once the device was finally set up, I went through the settings, to explore and see what else is there. I was rather disappointed to find that “Additional usage data” was turned on by default. I live in Europe, and I thought that the EU regulations should prevent this kind of behaviour. They should explicitly ask my permission to track my usage, especially if it isn’t necessary for the device to function.

I could opt-out of it luckily, but it didn’t feel right to me.

👀 👉🏼 What data is Sonos collecting, and why?
https://blog.gingerlime.com/2020/sonos-is-spying-on-me-and-you/

‼️ Digging into the Sonos privacy policy made my hair stand…
https://www.sonos.com/en/legal/privacy

#sonos #privacy #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Hacker Uploads Own Fingerprints To Crime Scene In Dumbest Cyber Attack Ever

Max Heinemeyer, director of threat hunting at Darktrace, thought it would be interesting to look back at the seven years since launching its AI-powered cybersecurity solution. Look back through the lens of some of the weirdest attacks that the AI cyber-brain had identified that is. You know what, he was right. I've been around cybersecurity for 30 years, but Heinemeyer revealed one of the dumbest cyber attacks I've ever encountered.

To be honest, as a 'greybeard' who has spent most of his working life in the cybersecurity space, I've seen some pretty weird hacking stuff go down. There was the time in 2010 that hackers replaced an image of the then Spanish Prime Minister with a picture of Mr. Bean on the EU presidency site. Or how about, in 2012, when an Iranian nuclear facility was reportedly hacked so as to play Thunderstruck by AC/DC at full volume? The Darktrace AI does, however, seem to have a knack of uncovering bizarre, unconventional, and undoubtedly original cyber attacks as they happen. The dumbest, though, has to be the hacker who uploaded their own fingerprints to the scene of the cybercrime.

👀 👉🏼 https://www.forbes.com/sites/daveywinder/2020/10/04/hacker-uploads-own-fingerprints-to-crime-scene-in-dumbest-cyberattack-ever

#cyberattack #hacker #truecrime #fingerprints #dumb
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Internet history can be used for “reidentification” finds study by Mozilla

A recent research paper has reaffirmed that our internet history can be reliably used to identify us. The research was conducted by Sarah Bird, Ilana Segall, and Martin Lopatka from Mozilla and is titled: Replication: Why We Still Can’t Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. The paper was released at the Symposium on Usable Privacy and Security and is a continuation of a 2012 paper that highlighted the same reidentifiability problem.

‼️ Just your internet history can be used to reidentify you on the internet ‼️

Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.

This is especially concerning because internet history is routinely sold by your internet service provider (ISP) and mobile data provider to third party advertising and marketing firms which are demonstrably able to tie a list of sites back to an individual they already have a profile on – even if the ISP claims to be “anonymizing” the data being sold. This is a legally sanctioned activity ever since 2017 when Congress voted to get rid of broadband privacy and allow the monetization of this type of data collection.

This type of “history-based profiling” is undoubtedly being used to build ad profiles on internet users around the world. Previous studies have shown that an IP address usually stays static for about a month – which the researchers noted: “is more than enough time to build reidentifiable browsing profiles.”

👀 👉🏼 (PDF)
https://www.usenix.org/system/files/soups2020-bird.pdf

👀 👉🏼 https://www.cozyit.com/internet-history-can-be-used-for-reidentification-finds-study-by-mozilla/

#mozilla #study #research #internet #history #reidentification #thinkabout #pdf
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
💡 UPDATE💡- KuCoin: Hackers steal 150 million US dollars from Bitcoin stock exchange

A quick update since my last livestream on Sep 30.

After a thorough investigation, we have found the suspects of the 9.26 #KuCoin Security Incident with substantial proof at hand. Law enforcement officials and police are officially involved to take action.

👀 👉🏼 https://nitter.net/lyu_johnny/status/1312359615091277824

#KuCoin #bitcoin #exchange #hacker #hacked #attack
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Stop the EARN IT Bill Before It Breaks Encryption

The House and Senate are both pushing forward with the so-called “EARN IT” Act, a bill that will undermine encryption and free speech online. Attorney General William Barr and the DOJ have demanded for years that messaging services give the government special access to users’ private messages. If EARN IT passes, Barr will likely get his wish—law enforcement agencies will be able to scan every message sent online.

💡 The EARN IT Act (S. 3398) is anti-speech, anti-security, and unnecessary. It could come to the Senate floor this month—we need to tell Congress to reject this dangerous proposal.

👀 👉🏼 https://act.eff.org/action/stop-the-earn-it-bill-before-it-breaks-encryption-a7904e20-2083-4d5e-88ae-44ee5fef7a5d

#eff #earnit #bill #encryption #freespeech #usa #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Breaking News: Computer Anti-Virus Guru John McAfee Arrested in Spain on U.S. Tax Evasion Charges

Millionaire recluse McAfee has been arrested by authorities in Spain and is awaiting extradition to the US.

Computer Anti-Virus developer John Mcafee has been charged with tax evasion by federal prosecutors. They allege McAfee used nominee names to hide cryptocurrency, a yacht, and real estate as part of a conspiracy to evade taxes.

Authorities in Spain have been careful not to mention where Mcafee was detained. Mcafee is notorious for hiding his location and after being arrested over 22 times maybe this time the US justice system have their man.

👀 👉🏼 https://www.euroweeklynews.com/2020/10/05/computer-anti-virus-guru-john-mcafee-arrested-in-spain-on-u-s-tax-evasion-charges/

#mcafee #arrested #spain
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
ADB-Toolkit – A Tool for testing your android device (and hack "pentest" someones android phone)

ADB-Toolkit
is a BASH Script with 28 options and an METASPLOIT Section which has 6 options which is made to do easy penetration testing in Android Device. You can do pretty much anything with this script and test your android device is it safe or not. This script is made with the help of ADB (Android Debug Bridge) it’s a tool which is used for the developers for debugging the android device but as we know everything has it’s two side a good and a bad and I’m not telling you to do bad things but we don’t do illegal things or FBI will find you :D.

👀 👉🏼 https://copycookie.com/adb-toolkit-tool-for-hack-someone-android-phone/

#adb #android #pentest #script #metasploid #tool #thinkabout #knowledge
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Warning about using graphics from Clipartstation.com ‼️

Robert Kneschke charges 450 EUR for a children's drawing

One of our most active users, voluntarily maintains a homepage for a small elementary school. In the course of this he downloaded a children's drawing from clipartstation.com for a vacation article. The site advertises that all kinds of graphics can be used free of charge, so the user thought he had fulfilled his obligations to check the copyright. But the graphic is in truth by Robert Kneschke.

The problem is that the site does not have an imprint. The English language links about privacy and copyright also lead to empty pages. Cloudflare protects the location of the web servers from being discovered. And also the Whois query of the domain Clipartstation.com does not reveal any useful information, not surprisingly. Since everything is anonymous, thanks to GoDaddy, one must unfortunately assume that the operators do not usually take it so closely with copyright law. Whoever uses graphics from there should be prepared for possible disciplinary warnings!

👀 👉🏼 Translated with DeepL:
https://tarnkappe.info/robert-kneschke-verlangt-450-eur-fuer-eine-kinderzeichnung/

#warning #alert #fraud #kneschke #clipartstation #copyright
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Facebook’s latest “groups” disaster will only make it more toxic

Every single time Facebook could improve, it doubles down on causing more harm.

Facebook is pushing yet another set of new features and policies designed to minimize harm in the homestretch to Election Day while also increasing "community" for users. But these features will do nothing to mitigate existing problems—and they will likely cause new, more widespread harms to both users and to society.

The most recent issue is a frustrating set of changes to the way that Facebook handles groups. Last week, Facebook announced yet another new way to "help more people find and connect with communities," by putting those communities in your face whether you want to see them or not. Both the groups tab and your individual newsfeed will promote group content from groups you are not subscribed to in the hope that you will engage with the content and with the group.

These changes are new, small inconveniences piled atop frustrating user-experience decisions that Facebook has been making for more than a decade. But they are the latest example of how Facebook tries to shape every user's experience through black box algorithms—and how this approach harms not only individuals but the world at large. At this point, Facebook is working so hard to ignore expert advice on how to reduce toxicity that it looks like Facebook doesn't want to improve in any meaningful way. Its leadership simply doesn't seem to care how much harm the platform causes as long as the money keeps rolling in.

👀 👉🏼 https://arstechnica.com/tech-policy/2020/10/facebooks-endless-quest-for-engagement-is-dangerous-for-us-all/

#fb #facebook #DeleteFacebook #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
The #Epic @fedilab @k9mail cases have reinforced our strong stance that we must control the distribution channels of #FLOSS and no longer depend on the #PlayStore

A major threat to the adoption of an alternative is that users expect updates to be automatic but #Google made that possible only for the #PlayStore

Code Lutin will invest on @fdroidorg to make software update possible on non-rooted #Android devices thus, allowing people to adopt #FreeSoftware

#MécénatCodeLutin #DeleteGoogle #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Facebook, Twitter take action over Trump's misleading COVID-19 posts

(Reuters) - Facebook Inc and Twitter took action on posts from U.S. President Donald Trump on Tuesday for violating their rules against coronavirus misinformation by suggesting that COVID-19 was just like the flu.

Facebook took the post down but not before it was shared about 26,000 times, data from the company’s metric tool CrowdTangle showed.

“We remove incorrect information about the severity of COVID-19,” a company spokesman told Reuters.

The world’s largest social media company, which exempts politicians from its third-party fact-checking program, has rarely taken action against posts from the Republican U.S. president.

Twitter disabled retweets on a similar tweet from Trump on Tuesday and added a warning label that said it broke its rules on “spreading misleading and potentially harmful information related to COVID-19” but that it might be in the public interest for it to remain accessible.

During the 2019-2020 influenza season, the flu was associated with 22,000 deaths in the United States, according to estimates from the U.S. Centers for Disease Control and Prevention. (bit.ly/30ByG1m)

Since the first case of the novel coronavirus was recorded in the United States at the beginning of this year, more than 210,000 people in the country have died of the disease caused by the virus, the world’s highest death toll.

👀 👉🏼 https://uk.reuters.com/article/uk-twitter-trump/facebook-twitter-take-action-against-misleading-trump-comparison-of-covid-19-to-flu-idUKKBN26R2YQ

#trump #ToddlerTrump #twitter #facebook #corona #misinformation
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Awful AI

Awful AI is a curated list to track current scary usages of AI - hoping to raise awareness to its misuses in society

Artificial intelligence in its current state is unfair, easily susceptible to attacks and notoriously difficult to control. Often, AI systems and predictions amplify existing systematic biases even when the data is balanced. Nevertheless, more and more concerning the uses of AI technology are appearing in the wild. This list aims to track all of them. We hope that Awful AI can be a platform to spur discussion for the development of possible preventive technology (to fight back!).

➡️ Discrimination

➡️ Influencing, disinformation, and fakes

➡️ Surveillance

➡️ Social credit systems

➡️ Misleading platforms, and scams

➡️ Autonomous weapon systems and military

➡️ Awful research

👀 👉🏼 https://github.com/daviddao/awful-ai

#awful #ai #answers #guide #tool #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
US House subcommittee proposes imposing structural requirements on Google, Amazon, and others over anti-trust concerns

A US House of Representatives subcommittee issued a mammoth report urging curbs to the structure of Google, Amazon and other giant tech firms.

👀 👉🏼 pdf
https://fm.cnbc.com/applications/cnbc.com/resources/editorialfiles/2020/10/06/investigation_of_competition_in_digital_markets_majority_staff_report_and_recommendations.pdf

👀 👉🏼 https://www.zdnet.com/article/u-s-house-subcommittee-proposes-imposing-structural-requirements-on-google-amazon-et-al-over-anti-trust-concerns

#usa #report #digital #markets #google #amazon #antitrust #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Leaked: Confidential Amazon memo reveals new software to track unions

The new tool would also track other non-union threats to the company, like crime and weather.

Amazon has long opposed the idea of its warehouse employees forming a union, though much of its anti-union strategies have stayed under wraps. But a confidential Amazon internal memo viewed by Recode reveals how the company is making significant investments in technology to track and counter the threat of unionization.

The 11-page document, dated February 2020, describes Amazon’s plans to spend hundreds of thousands of dollars to better analyze and visualize data on unions around the globe, alongside other non-union “threats” to the company related to factors like crime and weather. Out of 40 or so data points listed in the memo, around half of them were union-related or related to employee issues, like mandatory overtime and safety incidents. The memo requested staffing and funds to purchase software that would specifically help consolidate and visually map data from three different Amazon groups, led by employee relations (which is part of human resources), along with Amazon’s Global Intelligence Unit and Global Intelligence Program.

The new technology system — called the geoSPatial Operating Console, or SPOC — would help the company analyze and visualize at least around 40 different data sets, the memo says. Among them are many related to unions, including “Whole Foods Market Activism/Unionization Efforts,” “union grant money flow patterns,” “and “Presence of Local Union Chapters and Alt Labor Groups.” Additionally, one of the potential use cases for the tool is described in the memo as “The Union Relationship Map,” though no other details are provided.

The memo offers evidence of how Amazon is dedicating significant time and resources to reduce the likelihood of unionization among its front-line workforce, which totaled nearly 1.4 million people across Amazon and Whole Foods from March through September 19, counting every employee who worked for the companies for any period of time.

👀 👉🏼 https://www.vox.com/recode/2020/10/6/21502639/amazon-union-busting-tracking-memo-spoc

#amazon #DeleteAmazon #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
"Do Not Track" Is Back, and This Time It Might Work

California’s privacy law says businesses must respect universal opt-outs. Now the technology finally exists to put that to the test.

What do you call a privacy law that only works if users individually opt out of every site or app they want to stop sharing their data? A piece of paper.

Or you could call it the California Consumer Privacy Act. In theory, the law gives California residents the right to opt out of any business selling their data. In practice, it hasn’t seen much use. Most people don’t go to the trouble of opting out of every website, one at a time. One analysis, by DataGrail, a privacy compliance company, found that there were only 82 “do not sell” requests for every million consumer records over the first six months of the year. A study published last week by Consumer Reports helps explain why: Opting out of everything is a complicated pain in the ass.

Change could be coming, however. The CCPA includes a mechanism for solving the one-by-one problem. The regulations interpreting the law specify that businesses must respect a “global privacy control” sent by a browser or device. The idea is that instead of having to change privacy settings every time you visit a new site or use a new app, you could set your preference once, on your phone or in a browser extension, and be done with it.

When the attorney general issued those regulations, the technology for a global opt-out didn’t exist. As of today, it does. This morning a group of privacy-focused tech companies, nonprofits, and publishers, including The New York Times, the Electronic Frontier Foundation, and the search engine and browser DuckDuckGo, announced the beta launch of a new global privacy control. The idea is to create a technical specification that qualifies as a universal opt-out under the CCPA, so that exercising rights under the law would flip from being hopelessly complex to extremely easy.

“This would provide a key component that’s called for in the California law, which is a simple way for consumers to invoke their right without having to go to each website and find the button,” said Ashkan Soltani, a privacy researcher who helped lead the effort. Soltani has spent as much time as anyone in the trenches of privacy controls. A decade ago, as a technologist at the Federal Trade Commission, he worked to develop the Do Not Track web standard, which was supposed to establish a universal opt-out. That effort was ultimately doomed, however, because companies were under no legal obligation to honor Do Not Track requests, and most chose not to.

The technology, in other words, was too far out in front of the law. But now, with the CCPA, the inverse is true. “The law, for the first time, is kind of ahead of the technology,” said Soltani.

👀 👉🏼 https://www.wired.com/story/global-privacy-control-launches-do-not-track-is-back/

#DoNotTrack #internet #privacy #ccpa #eff #DataGrail
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Take Control Of Your Privacy

Exercising privacy rights more simply is critical to making online privacy accessible to all.

You might have noticed “Do Not Sell” and “Object To Processing” links around the web from companies complying with privacy regulations. Rather than having to click on each of these links individually across many websites, you can exercise your rights in one step via the “Global Privacy Control” (GPC) signal, which is required under the California Consumer Protection Act (CCPA) and Europe’s Global Data Protection Regulation (GDPR).

💡 👉🏼 Get your privacy rights under control:
https://globalprivacycontrol.org/#download

👀 👉🏼 https://globalprivacycontrol.org/

💡 👉🏼 Read as well 👈🏼 💡
https://spreadprivacy.com/announcing-global-privacy-control/

#privacy #control #tool #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Calla

A wrapper library for Jitsi Meet that adds audio spatialization, to be able to create virtual meeting rooms.

PROBLEM

Even when it works, teleconferencing still kind of sucks. Only one person can realistically talk at any one time. This is fine for people giving presentations, but in real meetings, people speak over and around each other, or pair off into smaller subgroups, still being able to overhear the larger group.

SOLUTION

Calla adds a small, RPG-style map to the Jitsi meeting view. It gives you an avatar to walk around the room. Users choose where to sit in relation to other users. Users very close to you are set to full volume. Users a little far away have their volume scaled down accordingly. Users too far away to care about are rendered with zero volume.

Visit the current installation at www.calla.chat.
Enter a room name and user name. Suggest "Calla" for the roomname to meet other people linking from this repo (maybe).
Be careful in picking your room name, if you don't want randos to join. Traffic is low right now, but you never know.
Try to pick a unique user name. A lot of people use "Test" and then there are a bunch of people with the same name running around.
Click "Connect" and wait for the connection to go through.
Movement:
Click on the map to move your avatar to wherever you want. Movement is instantaneous, with a smooth animation over the transition. Your avatar will stop at walls.
Or, use the arrow keys on your keyboard to move.
Click on yourself or Hit the E key to spam emoji into the space as emote reactions.
You can roll your mouse wheel or pinch your touchscreen to zoom in and out of the map view. This is useful for groups of people standing close to each other to see the detail in ther Avatar.
Options:
You can change your Microphone and Speaker device in the Options view. Click the Gear icon (⚙️) in the toolbar.

👀 👉🏼 https://github.com/capnmidnight/Calla

#calla #wrapper #library #Jitsi #Meet #tool
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag