Anime4You - illegal streaming portal is down forever
The portal Anime4you is gone from the internet for good. The operator has taken the site offline without warning due to private problems.
Nothing more is coming under the domain anime4you.one. There is now no way for users to somehow back up their anime because of the lack of advance notice. According to a moderator, all data has been deleted. Private reasons should have brought the operator to it. Everyone has to carry his baggage. And everyone reacts differently to the course of his life, the moderator commented on the behavior of the operator. For the Admin stood at least recently firmly that it would like to continue no longer. Many a fellow operator would have liked to take over the project together with the old data, which is now probably no longer possible.
https://tarnkappe.info/anime4you-illegales-streaming-portal-ist-down-forever/
#anime4you #streaming #down
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The portal Anime4you is gone from the internet for good. The operator has taken the site offline without warning due to private problems.
Nothing more is coming under the domain anime4you.one. There is now no way for users to somehow back up their anime because of the lack of advance notice. According to a moderator, all data has been deleted. Private reasons should have brought the operator to it. Everyone has to carry his baggage. And everyone reacts differently to the course of his life, the moderator commented on the behavior of the operator. For the Admin stood at least recently firmly that it would like to continue no longer. Many a fellow operator would have liked to take over the project together with the old data, which is now probably no longer possible.
https://tarnkappe.info/anime4you-illegales-streaming-portal-ist-down-forever/
#anime4you #streaming #down
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Tarnkappe.info
Anime4You - illegales Streaming-Portal ist down forever
Das Portal Anime4you ist endgültig weg vom Fenster. Der Betreiber hat die Seite wegen privater Probleme ohne Vorwarnung vom Netz genommen.
Firefox 85 Cracks Down on Supercookies
Trackers and adtech companies have long abused browser features to follow people around the web. Since 2018, we have been dedicated to reducing the number of ways our users can be tracked. As a first line of defense, we’ve blocked cookies from known trackers and scripts from known fingerprinting companies.
In Firefox 85, we’re introducing a fundamental change in the browser’s network architecture to make all of our users safer: we now partition network connections and caches by the website being visited. Trackers can abuse caches to create supercookies and can use connection identifiers to track users. But by isolating caches and network connections to the website they were created on, we make them useless for cross-site tracking.
💡 How does partitioning network state prevent cross-site tracking?
Like all web browsers, Firefox shares some internal resources between websites to reduce overhead. Firefox’s image cache is a good example: if the same image is embedded on multiple websites, Firefox will load the image from the network during a visit to the first website and on subsequent websites would traditionally load the image from the browser’s local image cache (rather than reloading from the network). Similarly, Firefox would reuse a single network connection when loading resources from the same party embedded on multiple websites. These techniques are intended to save a user bandwidth and time.
Unfortunately, some trackers have found ways to abuse these shared resources to follow users around the web. In the case of Firefox’s image cache, a tracker can create a supercookie by “encoding” an identifier for the user in a cached image on one website, and then “retrieving” that identifier on a different website by embedding the same image. To prevent this possibility, Firefox 85 uses a different image cache for every website a user visits. That means we still load cached images when a user revisits the same site, but we don’t share those caches across sites.
In fact, there are many different caches trackers can abuse to build supercookies. Firefox 85 partitions all of the following caches by the top-level site being visited: HTTP cache, image cache, favicon cache, HSTS cache, OCSP cache, style sheet cache, font cache, DNS cache, HTTP Authentication cache, Alt-Svc cache, and TLS certificate cache.
To further protect users from connection-based tracking, Firefox 85 also partitions pooled connections, prefetch connections, preconnect connections, speculative connections, and TLS session identifiers.
https://blog.mozilla.org/security/2021/01/26/supercookie-protections/
#mozilla #firefox #tracker #fingerprinting #supercookies #protection
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Trackers and adtech companies have long abused browser features to follow people around the web. Since 2018, we have been dedicated to reducing the number of ways our users can be tracked. As a first line of defense, we’ve blocked cookies from known trackers and scripts from known fingerprinting companies.
In Firefox 85, we’re introducing a fundamental change in the browser’s network architecture to make all of our users safer: we now partition network connections and caches by the website being visited. Trackers can abuse caches to create supercookies and can use connection identifiers to track users. But by isolating caches and network connections to the website they were created on, we make them useless for cross-site tracking.
💡 How does partitioning network state prevent cross-site tracking?
Like all web browsers, Firefox shares some internal resources between websites to reduce overhead. Firefox’s image cache is a good example: if the same image is embedded on multiple websites, Firefox will load the image from the network during a visit to the first website and on subsequent websites would traditionally load the image from the browser’s local image cache (rather than reloading from the network). Similarly, Firefox would reuse a single network connection when loading resources from the same party embedded on multiple websites. These techniques are intended to save a user bandwidth and time.
Unfortunately, some trackers have found ways to abuse these shared resources to follow users around the web. In the case of Firefox’s image cache, a tracker can create a supercookie by “encoding” an identifier for the user in a cached image on one website, and then “retrieving” that identifier on a different website by embedding the same image. To prevent this possibility, Firefox 85 uses a different image cache for every website a user visits. That means we still load cached images when a user revisits the same site, but we don’t share those caches across sites.
In fact, there are many different caches trackers can abuse to build supercookies. Firefox 85 partitions all of the following caches by the top-level site being visited: HTTP cache, image cache, favicon cache, HSTS cache, OCSP cache, style sheet cache, font cache, DNS cache, HTTP Authentication cache, Alt-Svc cache, and TLS certificate cache.
To further protect users from connection-based tracking, Firefox 85 also partitions pooled connections, prefetch connections, preconnect connections, speculative connections, and TLS session identifiers.
https://blog.mozilla.org/security/2021/01/26/supercookie-protections/
#mozilla #firefox #tracker #fingerprinting #supercookies #protection
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Mozilla Security Blog
Firefox 85 Cracks Down on Supercookies
Trackers and adtech companies have long abused browser features to follow people around the web. Since 2018, we have been dedicated to reducing the number of ways our users can ...
Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen
The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you. Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious—and then call the human police on them. Police robots may not be able to hurt people like armed predator drones used in combat—yet—but as history shows, calling the police on someone can prove equally deadly.
Long before the 1987 movie Robocop, even before Karel Čapek invented the word robot in 1920, police have been trying to find ways to be everywhere at once. Widespread security cameras are one solution—but even a blanket of CCTV cameras couldn’t follow a suspect into every nook of public space. Thus, the vision of a police robot continued as a dream, until now. Whether they look like Boston Dynamics’ robodogs or Knightscope’s rolling pickles, robots are coming to a street, shopping mall, or grocery store near you.
The Orwellian menace of snitch robots might not be immediately apparent. Robots are fun. They dance. You can take selfies with them. This is by design. Both police departments and the companies that sell these robots know that their greatest contributions aren’t just surveillance, but also goodwill. In one brochure Knightscope sent to University of California-Hastings, a law school in the center of San Francisco, the company advertises their robot’s activity in a Los Angeles shopping district called The Bloc. It’s unclear if the robot stopped any robberies, but it did garner over 100,000 social media impressions and 426 comments. Knightscope claims the robot’s 193 million overall media impressions was worth over $5.8 million. The Bloc held a naming contest for the robot, and said it has a “cool factor” missing from traditional beat cops and security guards.
https://www.eff.org/deeplinks/2021/01/police-robots-are-not-selfie-opportunity-theyre-privacy-disaster-waiting-happen
#police #robots #privacy #disaster #eff #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you. Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious—and then call the human police on them. Police robots may not be able to hurt people like armed predator drones used in combat—yet—but as history shows, calling the police on someone can prove equally deadly.
Long before the 1987 movie Robocop, even before Karel Čapek invented the word robot in 1920, police have been trying to find ways to be everywhere at once. Widespread security cameras are one solution—but even a blanket of CCTV cameras couldn’t follow a suspect into every nook of public space. Thus, the vision of a police robot continued as a dream, until now. Whether they look like Boston Dynamics’ robodogs or Knightscope’s rolling pickles, robots are coming to a street, shopping mall, or grocery store near you.
The Orwellian menace of snitch robots might not be immediately apparent. Robots are fun. They dance. You can take selfies with them. This is by design. Both police departments and the companies that sell these robots know that their greatest contributions aren’t just surveillance, but also goodwill. In one brochure Knightscope sent to University of California-Hastings, a law school in the center of San Francisco, the company advertises their robot’s activity in a Los Angeles shopping district called The Bloc. It’s unclear if the robot stopped any robberies, but it did garner over 100,000 social media impressions and 426 comments. Knightscope claims the robot’s 193 million overall media impressions was worth over $5.8 million. The Bloc held a naming contest for the robot, and said it has a “cool factor” missing from traditional beat cops and security guards.
https://www.eff.org/deeplinks/2021/01/police-robots-are-not-selfie-opportunity-theyre-privacy-disaster-waiting-happen
#police #robots #privacy #disaster #eff #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Electronic Frontier Foundation
Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen
The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you.
Four security vendors disclose SolarWinds-related incidents
Mimecast, Palo Alto Networks, Qualys, and Fidelis confirmed this week they were also targeted during the SolarWinds supply chain attack.
As most experts predicted last month, the fallout from the #SolarWinds supply chain attack is getting bigger as time passes by, and companies had the time to audit internal networks and #DNS logs.
This week, four new cyber-security vendors — #Mimecast, #PaloAltoNetworks, #Qualys, and #Fidelis — have added their names to the list of companies that have installed trojanized versions of the SolarWinds Orion app.
https://www.zdnet.com/article/four-security-vendors-disclose-solarwinds-related-incidents/
#security #vendors #disclose #incidents
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Mimecast, Palo Alto Networks, Qualys, and Fidelis confirmed this week they were also targeted during the SolarWinds supply chain attack.
As most experts predicted last month, the fallout from the #SolarWinds supply chain attack is getting bigger as time passes by, and companies had the time to audit internal networks and #DNS logs.
This week, four new cyber-security vendors — #Mimecast, #PaloAltoNetworks, #Qualys, and #Fidelis — have added their names to the list of companies that have installed trojanized versions of the SolarWinds Orion app.
https://www.zdnet.com/article/four-security-vendors-disclose-solarwinds-related-incidents/
#security #vendors #disclose #incidents
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
ZDNET
Four security vendors disclose SolarWinds-related incidents
Mimecast, Palo Alto Networks, Qualys, and Fidelis confirmed this week they were also targeted during the SolarWinds supply chain attack.
Error 404: The Internet Broke
A strange outage is impacting internet users in the Northeast U.S. It’s not entirely clear what is going on, but it sure is annoying.
Around noon on Tuesday, outage reports began pouring in, according to DownDetector, which tracks online service outages. But it’s not limited to one company; users reported issues with #Comcast, #Google, #Zoom, #YouTube, #Slack, #Amazon Web Services, and many others. (AWS’s own status page indicates that its services are operating normally, for what it’s worth.)
While the cause (or causes) remains unconfirmed, a cut Verizon fiber optic cable in Brooklyn, New York, may be the culprit. Verizon’s customer support confirmed on Twitter that one of its cables had been severed, and customers said they received notice of the outage via email.
Not all services, nor all users, appeared to be affected equally. Even among the New York-based Gizmodo staff, the problem seems just... weird. One editor could access Slack fine, but Google services were down. Others experienced slower response times while still being able to access all services they attempted to use.
At the time of writing, several services, including Google and Zoom, appear to be coming back online. Others remain inaccessible for some users.
https://gizmodo.com/error-404-the-internet-broke-1846134526
https://www.washingtonpost.com/technology/2021/01/26/internet-outage-east-coast/
#outage #internet #usa
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A strange outage is impacting internet users in the Northeast U.S. It’s not entirely clear what is going on, but it sure is annoying.
Around noon on Tuesday, outage reports began pouring in, according to DownDetector, which tracks online service outages. But it’s not limited to one company; users reported issues with #Comcast, #Google, #Zoom, #YouTube, #Slack, #Amazon Web Services, and many others. (AWS’s own status page indicates that its services are operating normally, for what it’s worth.)
While the cause (or causes) remains unconfirmed, a cut Verizon fiber optic cable in Brooklyn, New York, may be the culprit. Verizon’s customer support confirmed on Twitter that one of its cables had been severed, and customers said they received notice of the outage via email.
Not all services, nor all users, appeared to be affected equally. Even among the New York-based Gizmodo staff, the problem seems just... weird. One editor could access Slack fine, but Google services were down. Others experienced slower response times while still being able to access all services they attempted to use.
At the time of writing, several services, including Google and Zoom, appear to be coming back online. Others remain inaccessible for some users.
https://gizmodo.com/error-404-the-internet-broke-1846134526
https://www.washingtonpost.com/technology/2021/01/26/internet-outage-east-coast/
#outage #internet #usa
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Gizmodo
Error 404: The Internet Broke
Around noon on Tuesday, outage reports began pouring in, according to DownDetector, which tracks online service outages. But it’s not limited to one company; users reported outages for Comcast, Google, Zoom, YouTube, Slack, Amazon Web Services, and others.
The 4th Annual Fake News Awards.mp3
19.9 MB
The 4th Annual Fake News Awards!
From the palatial living room studios of The Corbett Report it’s the 4th Annual Fake News Awards. The boldest lies. The stupidest propaganda. The ugliest presstitution. Join James as he debunks the lies and shames the liars behind the biggest fake news stories of 2020. Who will take the Dino for the worst fake news story of the year?
https://www.corbettreport.com/fakenews4/
#corbettreport #fakenews #awards #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
From the palatial living room studios of The Corbett Report it’s the 4th Annual Fake News Awards. The boldest lies. The stupidest propaganda. The ugliest presstitution. Join James as he debunks the lies and shames the liars behind the biggest fake news stories of 2020. Who will take the Dino for the worst fake news story of the year?
https://www.corbettreport.com/fakenews4/
#corbettreport #fakenews #awards #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
Media is too big
VIEW IN TELEGRAM
Cyber Security In 7 Minutes | What Is Cyber Security: How It Works?
This short animated video on Cyber Security will explain what is Cyber Security, why Cyber Security, how Cyber Security works, who is a Cyber Security expert, what are different types of Cyberattacks with examples. You will get to know the types of hackers and the motives behind their attacks and understand how an organization works to secure their data from hackers.
https://www.youtube.com/watch?v=inWWhr5tnEA
#cybersecurity #cyberattacks #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
This short animated video on Cyber Security will explain what is Cyber Security, why Cyber Security, how Cyber Security works, who is a Cyber Security expert, what are different types of Cyberattacks with examples. You will get to know the types of hackers and the motives behind their attacks and understand how an organization works to secure their data from hackers.
https://www.youtube.com/watch?v=inWWhr5tnEA
#cybersecurity #cyberattacks #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Horcrux Encrypted Messaging
"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?
https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging
#rc3 #ccc #horcrux #encrypted #messaging #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?
https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging
#rc3 #ccc #horcrux #encrypted #messaging #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Qualys Security Advisory
Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
👉🏼 Summary
👉🏼 Analysis
👉🏼 Exploitation
👉🏼 Acknowledgments
👉🏼 Timeline
https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
#qualys #security #advisory
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
👉🏼 Summary
👉🏼 Analysis
👉🏼 Exploitation
👉🏼 Acknowledgments
👉🏼 Timeline
https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
#qualys #security #advisory
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
GME: Or, why we shouldn't underestimate “4chan with a Bloomberg terminal”
Step 0: Citadel pays Robinhood for order flow. Citadel gets to see RH's orders a few milliseconds before they're filled. Citadel may choose to front-run some of those trades.
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening in the open.
https://nitter.net/toxic/status/1353890766800621569
#gme #4chan #bloomberg #wallstreet #citadel #robinhood #trades #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Step 0: Citadel pays Robinhood for order flow. Citadel gets to see RH's orders a few milliseconds before they're filled. Citadel may choose to front-run some of those trades.
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening in the open.
https://nitter.net/toxic/status/1353890766800621569
#gme #4chan #bloomberg #wallstreet #citadel #robinhood #trades #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Nitter
Toxic (@toxic)
Step 0: Citadel pays Robinhood for order flow. Citadel gets to see RH's orders a few milliseconds before they're filled. Citadel may choose to front-run some of those trades.
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening…
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening…
Google employees around the world have formed a new international union alliance called Alpha Global
Google employees have banded together to form an international union alliance, weeks after the formation of the minority Alphabet Workers Union in the US.
This new international entity, called Alpha Global, has been formed with the UNI Global Union, a movement representing more than 20 million workers worldwide, and which is active in 10 countries, including the US, Germany, Sweden, and the UK.
It isn't clear how many temporary or contract workers with Google have joined Alpha Global, and it is likely to be a small fraction of the company's workforce at this stage. The Verge, which first reported the new union alliance, reports that the new entity won't have any legal bargaining power with Google.
Similarly in the US, the Alphabet Workers Union is a minority union meaning it cannot bargain with management and is not recognized by the US National Labor Relations board. It has more than 600 members, out of Google's estimated 130,000 contractors and temp workers.
Still, the emergence of Alpha Global indicates that white-collar workers at big tech firms are looking to cement an emerging wave of organization.
In a joint statement published on Monday, Alpha Global's officials said: "[Many] Alphabet workers have started on a path to unionization and collective bargaining. Workers are building democratic organizations to represent their interests, to struggle collectively, to create a structural counterbalance to corporate power, and to build a movement of tech workers across the industry."
https://www.businessinsider.com/google-union-technology-alphabet-workers-alpha-global-2021-1
#google #DeleteGoogle #alphabet #workers #union #global #AlphaGlobal #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Google employees have banded together to form an international union alliance, weeks after the formation of the minority Alphabet Workers Union in the US.
This new international entity, called Alpha Global, has been formed with the UNI Global Union, a movement representing more than 20 million workers worldwide, and which is active in 10 countries, including the US, Germany, Sweden, and the UK.
It isn't clear how many temporary or contract workers with Google have joined Alpha Global, and it is likely to be a small fraction of the company's workforce at this stage. The Verge, which first reported the new union alliance, reports that the new entity won't have any legal bargaining power with Google.
Similarly in the US, the Alphabet Workers Union is a minority union meaning it cannot bargain with management and is not recognized by the US National Labor Relations board. It has more than 600 members, out of Google's estimated 130,000 contractors and temp workers.
Still, the emergence of Alpha Global indicates that white-collar workers at big tech firms are looking to cement an emerging wave of organization.
In a joint statement published on Monday, Alpha Global's officials said: "[Many] Alphabet workers have started on a path to unionization and collective bargaining. Workers are building democratic organizations to represent their interests, to struggle collectively, to create a structural counterbalance to corporate power, and to build a movement of tech workers across the industry."
https://www.businessinsider.com/google-union-technology-alphabet-workers-alpha-global-2021-1
#google #DeleteGoogle #alphabet #workers #union #global #AlphaGlobal #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Business Insider
Google employees around the world have formed a new international union alliance called Alpha Global
Officials accused Google of "suppressing speech and cracking down on worker organizing while consolidating monopolistic power."
Cryptocurrency Trader Charged In Manhattan Federal Court With Fraudulent Scheme Involving Over $5 Million
AUDREY STRAUSS, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a Complaint in Manhattan federal court charging JEREMY SPENCE, a/k/a “Coin Signals,” a cryptocurrency trader who solicited funds for various cryptocurrency funds that he operated, with commodities fraud and wire fraud offenses. As alleged, SPENCE took cryptocurrency worth over $5 million from more than 170 individual investors after making false representations in connection with these cryptocurrency funds. SPENCE was arrested this morning in Rhode Island and will be presented later today before Magistrate Judge Patricia A. Sullivan in the U.S. District Court for the District of Rhode Island.
Manhattan U.S. Attorney Audrey Strauss said: “Jeremy Spence, a/k/a, ‘Coin Signals,’ allegedly lured investors to his cryptocurrency investment scam by touting returns of up to 148%. Spence’s investments not only failed to reach his audacious claims, they consistently lost money, leaving a $5 million void in his clients’ crypto accounts. Spence’s alleged conduct should strongly signal would-be investors to thoroughly educate themselves in the cryptocurrency ecosystem before falling prey to investment scams promising huge returns for small investments that are indeed too good to be true.”
FBI Assistant Director-in-Charge Sweeney said: “As alleged, Jeremy Spence misrepresented the success of his investment platform in order to entice people to send money his way. Because his trading was less than profitable and significantly less successful than he represented to investors, he used money from new investors to pay off others in order to keep his plan moving—a typical marker of a Ponzi scheme. Whether investing with cash, shares, or virtual currency, our advice to investors always remains the same—exercise due diligence, and when something just doesn’t seem right, report suspicious activity to the authorities.”
https://telegra.ph/Cryptocurrency-Trader-Charged-In-Manhattan-Federal-Court-With-Fraudulent-Scheme-Involving-Over-5-Million-01-27
via www.justice.gov
#cryptocurrency #trader #manhattan #usa #fbi #fraud #coin #signals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
AUDREY STRAUSS, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a Complaint in Manhattan federal court charging JEREMY SPENCE, a/k/a “Coin Signals,” a cryptocurrency trader who solicited funds for various cryptocurrency funds that he operated, with commodities fraud and wire fraud offenses. As alleged, SPENCE took cryptocurrency worth over $5 million from more than 170 individual investors after making false representations in connection with these cryptocurrency funds. SPENCE was arrested this morning in Rhode Island and will be presented later today before Magistrate Judge Patricia A. Sullivan in the U.S. District Court for the District of Rhode Island.
Manhattan U.S. Attorney Audrey Strauss said: “Jeremy Spence, a/k/a, ‘Coin Signals,’ allegedly lured investors to his cryptocurrency investment scam by touting returns of up to 148%. Spence’s investments not only failed to reach his audacious claims, they consistently lost money, leaving a $5 million void in his clients’ crypto accounts. Spence’s alleged conduct should strongly signal would-be investors to thoroughly educate themselves in the cryptocurrency ecosystem before falling prey to investment scams promising huge returns for small investments that are indeed too good to be true.”
FBI Assistant Director-in-Charge Sweeney said: “As alleged, Jeremy Spence misrepresented the success of his investment platform in order to entice people to send money his way. Because his trading was less than profitable and significantly less successful than he represented to investors, he used money from new investors to pay off others in order to keep his plan moving—a typical marker of a Ponzi scheme. Whether investing with cash, shares, or virtual currency, our advice to investors always remains the same—exercise due diligence, and when something just doesn’t seem right, report suspicious activity to the authorities.”
https://telegra.ph/Cryptocurrency-Trader-Charged-In-Manhattan-Federal-Court-With-Fraudulent-Scheme-Involving-Over-5-Million-01-27
via www.justice.gov
#cryptocurrency #trader #manhattan #usa #fbi #fraud #coin #signals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Telegraph
Cryptocurrency Trader Charged In Manhattan Federal Court With Fraudulent Scheme Involving Over $5 Million
AUDREY STRAUSS, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a…
What’s The Deal With Chromium On Linux? Google At Odds With Package Maintainers
Linux users are more likely than most to be familiar with Chromium, Google’s the free and open source web project that serves as the basis for their wildly popular Chrome. Since the project’s inception over a decade ago, users have been able to compile the BSD licensed code into a browser that’s almost the same as the closed-source Chrome. As such, most distributions offer their own package for the browser and some even include it in the base install. Unfortunately, that may be changing soon.
A post made earlier this month to the official Chromium Blog explained that an audit had determined “third-party Chromium based browsers” were using APIs that were intended only for Google’s internal use. In response, any browser attempting to access features such as Chrome Sync with an unofficial API key would be prevented from doing so after March 15th.
To the average Chromium user, this doesn’t sound like much of a problem. In fact, you might even assume it doesn’t apply to you. The language used in the post makes it sound like Google is referring to browsers which are spun off of the Chromium codebase, and at least in part, they are. But the search giant is also using this opportunity to codify their belief that the only official Chromium builds are the ones that they provide themselves. With that simple change, anyone using a distribution-specific build of Chromium just became persona non grata.
Unhappy with the idea of giving users a semi-functional browser, the Chromium maintainers for several distributions such as Arch Linux and Fedora have said they’re considering pulling the package from their respective repositories altogether. With a Google representative confirming the change is coming regardless of community feedback, it seems likely more distributions will follow suit.
https://hackaday.com/2021/01/26/whats-the-deal-with-chromium-on-linux-google-at-odds-with-package-maintainers/
#chromium #google #linux #chrome #browser #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Linux users are more likely than most to be familiar with Chromium, Google’s the free and open source web project that serves as the basis for their wildly popular Chrome. Since the project’s inception over a decade ago, users have been able to compile the BSD licensed code into a browser that’s almost the same as the closed-source Chrome. As such, most distributions offer their own package for the browser and some even include it in the base install. Unfortunately, that may be changing soon.
A post made earlier this month to the official Chromium Blog explained that an audit had determined “third-party Chromium based browsers” were using APIs that were intended only for Google’s internal use. In response, any browser attempting to access features such as Chrome Sync with an unofficial API key would be prevented from doing so after March 15th.
To the average Chromium user, this doesn’t sound like much of a problem. In fact, you might even assume it doesn’t apply to you. The language used in the post makes it sound like Google is referring to browsers which are spun off of the Chromium codebase, and at least in part, they are. But the search giant is also using this opportunity to codify their belief that the only official Chromium builds are the ones that they provide themselves. With that simple change, anyone using a distribution-specific build of Chromium just became persona non grata.
Unhappy with the idea of giving users a semi-functional browser, the Chromium maintainers for several distributions such as Arch Linux and Fedora have said they’re considering pulling the package from their respective repositories altogether. With a Google representative confirming the change is coming regardless of community feedback, it seems likely more distributions will follow suit.
https://hackaday.com/2021/01/26/whats-the-deal-with-chromium-on-linux-google-at-odds-with-package-maintainers/
#chromium #google #linux #chrome #browser #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Hackaday
What’s The Deal With Chromium On Linux? Google At Odds With Package Maintainers
Linux users are more likely than most to be familiar with Chromium, Google’s the free and open source web project that serves as the basis for their wildly popular Chrome. Since the project&#…
Help us kick Bezos in the dick - Boss Baby Bezos is at it again!
Amazon opened a union busting website for people to report workers unions.
So lets do the world a favor and waste Jeff´s time, money and live energy (i hope) by spamming his website with bogus reports.
Eat shit, Jeff.
https://www.reddit.com/r/ABoringDystopia/comments/kzckus/amazons_antiunion_doitwithoutdues_website_is/
Page where the submittion form is:
https://www.doitwithoutdues.com/contact
#DeleteAmazon #DickPunchBezos #amazon #unionbusting #union #pleaseshare #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Amazon opened a union busting website for people to report workers unions.
So lets do the world a favor and waste Jeff´s time, money and live energy (i hope) by spamming his website with bogus reports.
Eat shit, Jeff.
https://www.reddit.com/r/ABoringDystopia/comments/kzckus/amazons_antiunion_doitwithoutdues_website_is/
Page where the submittion form is:
https://www.doitwithoutdues.com/contact
#DeleteAmazon #DickPunchBezos #amazon #unionbusting #union #pleaseshare #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
OnePlus co-founder Carl Pei’s next company is literally called Nothing
Its first ‘smart devices’ will release in the first half of this year.
Carl Pei, the OnePlus co-founder who parted ways with the company last year, has announced the name of his next venture: Nothing. It describes itself as a “London based consumer technology company” and counts the likes of iPod inventor Tony Fadell, Twitch co-founder Kevin Lin, Reddit CEO Steve Huffman, and YouTuber Casey Neistat as investors. It plans to release its first “smart devices” in the first half of this year.
“Nothing’s mission is to remove barriers between people and technology to create a seamless digital future,” says Pei, Nothing’s founder and CEO, in a press release. “We believe that the best technology is beautiful, yet natural and intuitive to use. When sufficiently advanced, it should fade into the background and feel like nothing.”
https://www.theverge.com/2021/1/27/22250653/nothing-brand-oneplus-carl-pei-announcement-consumer-technology-smart-devices
#nothing #oneplus #pei #announcement #smart #devices
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Its first ‘smart devices’ will release in the first half of this year.
Carl Pei, the OnePlus co-founder who parted ways with the company last year, has announced the name of his next venture: Nothing. It describes itself as a “London based consumer technology company” and counts the likes of iPod inventor Tony Fadell, Twitch co-founder Kevin Lin, Reddit CEO Steve Huffman, and YouTuber Casey Neistat as investors. It plans to release its first “smart devices” in the first half of this year.
“Nothing’s mission is to remove barriers between people and technology to create a seamless digital future,” says Pei, Nothing’s founder and CEO, in a press release. “We believe that the best technology is beautiful, yet natural and intuitive to use. When sufficiently advanced, it should fade into the background and feel like nothing.”
https://www.theverge.com/2021/1/27/22250653/nothing-brand-oneplus-carl-pei-announcement-consumer-technology-smart-devices
#nothing #oneplus #pei #announcement #smart #devices
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Verge
OnePlus co-founder Carl Pei’s next company is literally called Nothing
Here goes Nothing.
Malware "Emotet" dismantled
German investigators have taken over and smashed the infrastructure of the "Emotet" malware, which is considered the most dangerous in the world. The software had also attacked the IT infrastructure of government agencies and hospitals.
German investigators have taken over and smashed the infrastructure of the "Emotet" malware, which is considered the world's most dangerous. This was achieved on Tuesday as part of an internationally concerted action, the BKA announced.
"Emotet" had caused considerable damage to the Berlin Court of Appeal, the Fürth Clinic and the Frankfurt am Main city administration, among others - and also to tens of thousands of private individuals.
https://www.tagesschau.de/wirtschaft/emotet-bka-101.html
https://www.reuters.com/article/us-global-cyber-takedown-idUSKBN29W1Q0
https://krebsonsecurity.com/2021/01/international-action-targets-emotet-crimeware/
#malware #emotet #bka #germany #busted #takedown
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
German investigators have taken over and smashed the infrastructure of the "Emotet" malware, which is considered the most dangerous in the world. The software had also attacked the IT infrastructure of government agencies and hospitals.
German investigators have taken over and smashed the infrastructure of the "Emotet" malware, which is considered the world's most dangerous. This was achieved on Tuesday as part of an internationally concerted action, the BKA announced.
"Emotet" had caused considerable damage to the Berlin Court of Appeal, the Fürth Clinic and the Frankfurt am Main city administration, among others - and also to tens of thousands of private individuals.
https://www.tagesschau.de/wirtschaft/emotet-bka-101.html
https://www.reuters.com/article/us-global-cyber-takedown-idUSKBN29W1Q0
https://krebsonsecurity.com/2021/01/international-action-targets-emotet-crimeware/
#malware #emotet #bka #germany #busted #takedown
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
tagesschau
Schadsoftware "Emotet" zerschlagen
Deutsche Ermittler haben die Infrastruktur der weltweit als am gefährlichsten geltenden Schadsoftware "Emotet" übernommen und zerschlagen. Die Software hatte auch die IT-Infrastruktur von Behörden und Kliniken angegriffen.
Netwalker ransomware dark web sites seized by law enforcement
The dark web websites associated with the Netwalker ransomware operation have been seized by law enforcement from the USA and Bulgaria.
Netwalker is a Ransomware-as-a-Service (RaaS) operation that began operating in late 2019, where affiliates are enlisted to distribute the ransomware and infect victims in return for a 60-75% share of ransom payments.
This ransomware operation proved to be very profitable for the threat actors, with an August report estimating that they generated $25 million in just five months.
Today, the Netwalker ransomware Tor payment and data leak sites were seized by law enforcement and now display a seizure notice from the FBI and Bulgarian law enforcement.
https://www.bleepingcomputer.com/news/security/netwalker-ransomware-dark-web-sites-seized-by-law-enforcement/
#netwalker #ransomware #darkweb #takedown
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The dark web websites associated with the Netwalker ransomware operation have been seized by law enforcement from the USA and Bulgaria.
Netwalker is a Ransomware-as-a-Service (RaaS) operation that began operating in late 2019, where affiliates are enlisted to distribute the ransomware and infect victims in return for a 60-75% share of ransom payments.
This ransomware operation proved to be very profitable for the threat actors, with an August report estimating that they generated $25 million in just five months.
Today, the Netwalker ransomware Tor payment and data leak sites were seized by law enforcement and now display a seizure notice from the FBI and Bulgarian law enforcement.
https://www.bleepingcomputer.com/news/security/netwalker-ransomware-dark-web-sites-seized-by-law-enforcement/
#netwalker #ransomware #darkweb #takedown
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Authorities plan to mass-uninstall Emotet from infected hosts on March 25, 2021
The world's largest malware botnet will become extinct by April after today's coordinated takedown and planned clean-up operations.
Law enforcement officials in the Netherlands are in the process of delivering an Emotet update that will remove the malware from all infected computers on March 25, 2021, ZDNet has learned today.
The update was made possible after law enforcement agencies from across eight countries orchestrated a coordinated takedown this week to seize servers and arrest individuals behind Emotet, considered today's largest malware botnet.
While servers were located across multiple countries, Dutch officials said that two of three of Emotet's primary command and control (C&C) servers were located inside its borders.
https://www.zdnet.com/article/authorities-plan-to-mass-uninstall-emotet-from-infected-hosts-on-march-25-2021/
#malware #botnet #emotet #bka #europol #busted #takedown
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The world's largest malware botnet will become extinct by April after today's coordinated takedown and planned clean-up operations.
Law enforcement officials in the Netherlands are in the process of delivering an Emotet update that will remove the malware from all infected computers on March 25, 2021, ZDNet has learned today.
The update was made possible after law enforcement agencies from across eight countries orchestrated a coordinated takedown this week to seize servers and arrest individuals behind Emotet, considered today's largest malware botnet.
While servers were located across multiple countries, Dutch officials said that two of three of Emotet's primary command and control (C&C) servers were located inside its borders.
https://www.zdnet.com/article/authorities-plan-to-mass-uninstall-emotet-from-infected-hosts-on-march-25-2021/
#malware #botnet #emotet #bka #europol #busted #takedown
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
ZDNET
Authorities plan to mass-uninstall Emotet from infected hosts on April 25, 2021
The world's largest malware botnet will become extinct by April after today's coordinated takedown and planned clean-up operations.
Telegram 7.4 now allows import of WhatsApp chats (and others)
Telegram has a nice feature for users who want to switch from WhatsApp to Telegram, for example. With the new version 7.4, which is currently being distributed for iOS, you can quickly import messages from WhatsApp into Telegram. We have tested this and it works perfectly, at least for text messages.
In WhatsApp, you go to a chat and click on the contact at the top, which takes you to the contact info - where you will probably also find the item "Export chat". This can be done with or without media. This ensures that the chat can be exported - but if you select Telegram and the person in question as the storage location, the chat is imported from WhatsApp into Telegram.
What we noticed: Media is not displayed, only the file names. Text chats, on the other hand, are correctly ported from WhatsApp to Telegram. That could certainly help one or the other. And if not, you can export the chat and save it as a ZIP file locally - the archive will then contain the text file and the media. Telegram also mentions Line and Kakao Talk as possible export messengers in the changelog.
https://stadt-bremerhaven.de/telegram-7-4-erlaubt-import-von-whatsapp-chats-und-weiteren/
#telegram #tg #whatsapp #DeleteWhatsapp #messenger #importieren #chats
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Telegram has a nice feature for users who want to switch from WhatsApp to Telegram, for example. With the new version 7.4, which is currently being distributed for iOS, you can quickly import messages from WhatsApp into Telegram. We have tested this and it works perfectly, at least for text messages.
In WhatsApp, you go to a chat and click on the contact at the top, which takes you to the contact info - where you will probably also find the item "Export chat". This can be done with or without media. This ensures that the chat can be exported - but if you select Telegram and the person in question as the storage location, the chat is imported from WhatsApp into Telegram.
What we noticed: Media is not displayed, only the file names. Text chats, on the other hand, are correctly ported from WhatsApp to Telegram. That could certainly help one or the other. And if not, you can export the chat and save it as a ZIP file locally - the archive will then contain the text file and the media. Telegram also mentions Line and Kakao Talk as possible export messengers in the changelog.
https://stadt-bremerhaven.de/telegram-7-4-erlaubt-import-von-whatsapp-chats-und-weiteren/
#telegram #tg #whatsapp #DeleteWhatsapp #messenger #importieren #chats
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
stadt-bremerhaven.de
Telegram 7.4 erlaubt Import von WhatsApp-Chats (und weiteren)
(Update: Mittlerweile ist 7.4.1 veröffentlicht worden - ohne die neue Exportfunktion, die ist wohl noch nicht fertig) Da haut Telegram aber ...
Media is too big
VIEW IN TELEGRAM
Emotet - Takedown
What the fuck is this week? Lazarus Group targeting researchers, iPhone exploits, Chrome 0days, sudo 0days, and now Emotet is taken down? Holy christ...
https://nitter.net/vxunderground/status/1354411600367808518#m
#malware #botnet #emotet #bka #europol #busted #takedown #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
What the fuck is this week? Lazarus Group targeting researchers, iPhone exploits, Chrome 0days, sudo 0days, and now Emotet is taken down? Holy christ...
https://nitter.net/vxunderground/status/1354411600367808518#m
#malware #botnet #emotet #bka #europol #busted #takedown #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Julian Assange Doc 5thEstate
The strange world of Julian Assange by CBCs Fifth-Estate program. Quite good, actually.
https://vid.lelux.fi/videos/watch/0b07c37b-ae2c-43e1-afc6-28cf1b416b15
#assange #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The strange world of Julian Assange by CBCs Fifth-Estate program. Quite good, actually.
https://vid.lelux.fi/videos/watch/0b07c37b-ae2c-43e1-afc6-28cf1b416b15
#assange #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag