BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
👉🏼 Latest viruses and malware threats
👉🏼 Latest patches, tips and tricks
👉🏼 Threats to security/privacy/democracy on the Internet

👉🏼 Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
The last search engine

Gigablast is the only non-Big Tech search engine in the U.S. that still crawls the web.

Big Tech is censoring Gigablast from indexing the "public" web.

💡 Cloudflare, Google, Bing Destroying the Infrastructure of the Free Web
https://www.gigablast.com/blog.html#anti

https://www.gigablast.com/

#gigablast #search #engine #cloudflare #google #bing #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
China steps up online controls with new rule for bloggers

TAIPEI, Taiwan (AP) —
Ma Xiaolin frequently wrote about current affairs on one of China’s leading microblogging sites, where he has 2 million followers. But recently, he said in a post, the Weibo site called and asked him not to post original content on topics ranging from politics to economic and military issues.

“As an international affairs researcher and a columnist, it looks like I can only go the route of entertainment, food and beverage now,” the international relations professor wrote on Jan. 31.

Ma, who often posted on developments in the Mideast, is one of many popular influencers working within the constraints of China’s heavily censored web who is finding that their space to speak is shrinking even further with the latest policy changes and a clean-up campaign run by the country’s powerful censors. He declined an interview request.

Beginning next week, the Cyberspace Administration of China will require bloggers and influencers to have a government-approved credential before they can publish on a wide range of subjects. Some fear that only state media and official propaganda accounts will get permission. While permits have been needed since at least 2017 to write about topics such as political and military affairs, enforcement has not been widespread. The new rules expand that requirement to health, economics, education and judicial matters.

“The regulators want to control the entire procedure of information production,” said Titus Chen, an expert in Chinese social media policy at National Sun Yat-Sen University in Taiwan.

https://apnews.com/article/taiwan-china-coronavirus-pandemic-blogging-50170ca73ed1f25ae769723e86c4d169

#china #blogging #microblogging #rules #netpolitics #thinkabout #why
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
LibreOffice team say they are working on a WebAssembly port

Developers hope to deliver a working example in the next few months.

Developers are reportedly getting close to bringing LibreOffice, the popular open source alternative to Microsoft Office, to the web browser using WebAssembly (WASM).

The project already offers LibreOffice Online as a collaborative, web-based version of LibreOffice. However, you can only really use it through its Collabora Online commercial variant.

Even as the Documentation Foundation (TDF), which helps develop and maintain LibreOffice, claims that it “is not planning to develop and fund a cloud solution similar to existing products from Google and Microsoft,” the developers of the WASM port hope to deliver a working demo by summer 2021.

https://www.techradar.com/news/libreoffice-team-say-they-are-working-on-a-webassembly-port

#libreoffice #opensource #webassembly #wasm #tdf
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
85: Cam the Carder
Darknetdiaries - EP 85: Cam the Carder

This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder.

https://darknetdiaries.com/episode/85/

#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙
@cRyPtHoN_INFOSEC_EN
🎙
@cRyPtHoN_INFOSEC_DE
🎙
@BlackBox_Archiv
🎙
@NoGoolag
Behind the scenes of CityBee customer data leak

Introduction

All of this is obviously for educational and informative purpose. And I do not support any sort of crime either.

All of the information below comes from the researcher himself from his interview and some of my own tests obviously. :D

Well what even is CityBee you may ask?
It is a car, bike and scooter rental service in Lithuania.

And oh yes they store some data (can tell that just by looking at their homepage).

https://kernal.eu/posts/citybee-leak/

#citybee #lithuania #data #leak
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
When did "privacy issues" start to mean "too much privacy"?

Clubhouse draws the ire of journalists

I understand that every social media platform has to deal with misinformation, but I was surprised by the harassment and privacy issues the subtitle referred to.

My understanding of Clubhouse was that it was for pseudo-private conversations. Unless the app is leaking out information, I can’t imagine privacy to be an issue.

The NY Times article has one brief mention about privacy:

"This month, German and Italian regulators publicly questioned whether Clubhouse’s data practices complied with European data protection laws. And China blocked the app after political conversations popped up on it outside the country’s tight internet controls."

In another article linked to by the NY Times article provides more clarity regarding privacy:

"On Clubhouse, however, there are no screenshots. There is no way to drag up old Clubhouse posts years later like a user might do on Twitter. There is no way to record conversations—meaning there is no way to prove that someone said anything controversial at all. There’s no path to accountability. Users on Clubhouse know, or at least believe, that they can openly speak their mind with zero repercussions. Platforms like Twitter and Facebook have implemented robust moderation programs in recent years, a move that has been both praised and criticized by many."

This sounds like a feature, not a bug. Just between you and me, I don’t record any of my Zoom calls with friends. Just don’t mention it to any journalists.

https://mleverything.substack.com/p/when-did-privacy-issues-start-to

https://datenschutz-hamburg.de/assets/pdf/2021-02-02-press-release-clubhouse.pdf

#clubhouse #privacy
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Dogecoin Has a Top Dog Worth $2.1 Billion

A single digital address appears to have accumulated holdings in dogecoin, the cryptocurrency that was started as a joke

The dogecoin market has a pack leader.

Records show that a person, or entity, owns about 28% of all of the cryptocurrency in circulation—a stake worth about $2.1 billion at current prices. The holder’s identity isn’t known, which is common in the opaque world of digital currencies.

It is hard to tell what to make of this giant position in what has long been a small and niche corner of the cryptocurrency world.

Dogecoin was created in 2013 as a satirical homage to bitcoin. Its developers were riffing off the meme of a Shiba Inu dog with bad spelling habits. It wasn’t designed to be used as a form of payment, or as anything except a joke. At the start of 2021, a dogecoin was worth about half a cent, even as bitcoin prices had surged to nearly $30,000.

https://telegra.ph/Dogecoin-Has-a-Top-Dog-Worth-21-Billion-02-17

via www.wsj.com

#dogecoin #cryptocurrency
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Facebook's Australian news ban also blocked links to weather, government services, poetry, and Facebook itself

Australians woke up on Thursday morning to find their news feeds, post history, and favourite news outlets' pages scrubbed of all links to ... well, news.

Facebook followed through on its threat to ban the sharing of news links by and to Australian users, as the country's government moves closer to forcing big tech companies to pay to link media outlets' content.

The proposed news media bargaining code would see tech giants like Google and Facebook having to pay media companies for content that appears on their platforms. While Google initially threatened to pull out of Australia over the law, which has bipartisan support, it instead struck deals with dozens of platforms to pay them for content via its News Showcase. Facebook, in contrast, has chosen to take its bat and ball and go home like a big sulky baby.

But the ban's not just affecting local, national, and international news outlets.

It's also affected government websites like the Bureau of Meteorology, state governments, and health agencies; satirical news sites, like the Onion-esque larrikin "local news" The Betoota Advocate; organisations like the Australian Council of Trade Unions; and even literary journals.

https://mashable.com/article/facebook-news-ban-australia-effects

#DeleteFacebook #facebook #australia #newsban
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Forwarded from NoGoolag
Reminder that there's a Nogoolag group and that you're missing most of the discussions if you're just commenting on the channel

Join: https://t.iss.one/joinchat/RfYPt67LSOB3BO6S
Facebook Takes Down Myanmar Military's Page

"In line with our global policies, we've removed the Tatmadaw True News Information Team Page from Facebook for repeated violations of our Community Standards prohibiting incitement of violence and coordinating harm," a Facebook representative said in a statement.

A Facebook page run by the Myanmar junta's "True News" information service was kicked off the platform Sunday after the tech giant accused it of inciting violence.

Security forces in the country have steadily increased violence against a massive and largely peaceful civil disobedience campaign demanding the return of deposed civilian leader Aung San Suu Kyi.

The Nobel laureate was taken into custody along with her top political allies at the start of the month, but the new regime has insisted it took power lawfully.

It has used Facebook to claim Suu Kyi's landslide election victory last November was tainted by voter fraud and issue stark warnings to the protest movement -- which is demanding that the army relinquish power.

A spokesperson for the platform said the Tatmadaw True News Information Team page was removed for "repeated violations of our Community Standards prohibiting incitement of violence and coordinating harm".

https://www.ndtv.com/world-news/myanmar-crisis-facebook-takes-down-main-page-of-myanmar-military-2375164

#fb #DeleteFacebook #myanmar #military #violence
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Parents alerted to NurseryCam security breach

A webcam system that lets parents drop in and watch their children while at nursery school has written to families to tell them of a data breach.

NurseryCam said it did not believe the incident had involved any youngsters or staff being watched without their permission, but had shut down its server as a precautionary measure.

The Guildford-based company told the BBC its service was used by about 40 nurseries across the UK.

It said it had also notified the ICO.

Under UK rules, the Information Commissioner's Office must be told of a breach if it has "significant impact" within 24 hours.

NurseryCam said it first became aware of the incident shortly after 17:00GMT on Friday.

It added the service would remain suspended until a security fix was in place.

https://www.bbc.com/news/technology-56141093

#security #data #breach #webcam #uk
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Social Analyzer

Social Analyzer - API, CLI & Web App for analyzing & finding a person's profile across +300 social media websites. It includes different string analysis and detection modules, you can choose which combination of modules to use during the investigation process.

The detection modules utilize a rating mechanism based on different detection techniques, which produces a rate value that starts from 0 to 100 (No-Maybe-Yes). This module intended to have less false positive and it's documented in this Wiki link

The analysis and extracted social media information from this OSINT tool could help in investigating profiles related to suspicious or malicious activities such as cyberbullying, cybergrooming, cyberstalking, and spreading misinformation.

This project is "currently used by some law enforcement agencies in countries where resources are limited".

https://github.com/qeeqbox/social-analyzer

#social #analyzer #qeeqbox #socialmedia #tool
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
6 | Life Support
Carbonite | Midroll | Spoke Media
Equifax Data Breach: Is Privacy Dead

The final episode of Breach Season 2 features an in-depth conversation with long-time Gartner Security and Privacy analyst Avivah Litan. Litan contends that privacy has been dead since the early ‘00s and the only way to restore it is widespread consumer protest. She explains how our personal information is compiled into massive data warehouses, who uses it, and for what purposes.

Breach podcast - S2 Episode 6
https://www.carbonite.com/podcasts/breach/s02e06-equifax-data-breach

#breach #podcast #equifax #privacy
🎙@cRyPtHoN_INFOSEC_FR
🎙
@cRyPtHoN_INFOSEC_EN
🎙
@cRyPtHoN_INFOSEC_DE
🎙
@BlackBox_Archiv
🎙
@NoGoolag
Kim Dotcom, United States & NZ Supreme Court All Agree to Court of Appeal Referral

Following a rare moment of agreement, requests from Kim Dotcom and the United States government to refer the extradition case back to the Court of Appeal have been approved by the Supreme Court. The decision marks a split among the Megaupload defendants, after a request from Mathias Ortmann, Finn Batato, and Bram van der Kolk to have the matter heard by a faster route was denied.

Ever since the Megaupload raids in 2012, the US Government has been trying to extradite Megaupload founder Kim Dotcom and former colleagues Mathias Ortmann, Bram van der Kolk, and Finn Batato to face a laundry list of offenses underpinned by allegations of mass copyright infringement.

Under New Zealand’s Extradition Act 1999, the US needed to show that the alleged crimes would result in a trial in New Zealand if those offenses had been committed there – i.e they are offenses in both countries. Several lower courts in New Zealand found that to be the case but the matter ultimately ended up at the Supreme Court.

https://torrentfreak.com/kim-dotcom-united-states-nz-supreme-court-all-agree-to-court-of-appeal-referral-210222/

#kim #dotcom #usa #nzl
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's operating system

Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.

https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os

#RedStarOS #northkorea #ccc #32c3 #video
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Whistleblowers: Software Bug Keeping Hundreds Of Inmates In Arizona Prisons Beyond Release Dates

According to Arizona Department of Corrections whistleblowers, hundreds of incarcerated people who should be eligible for release are being held in prison because the inmate management software cannot interpret current sentencing laws.

KJZZ is not naming the whistleblowers because they fear retaliation. The employees said they have been raising the issue internally for more than a year, but prison administrators have not acted to fix the software bug. The sources said Chief Information Officer Holly Greene and Deputy Director Joe Profiri have been aware of the problem since 2019.

The Arizona Department of Corrections confirmed there is a problem with the software.

As of 2019, the department had spent more than $24 million contracting with IT company Business & Decision, North America to build and maintain the software program, known as ACIS, that is used to manage the inmate population in state prisons.

One of the software modules within ACIS, designed to calculate release dates for inmates, is presently unable to account for an amendment to state law that was passed in 2019.

https://kjzz.org/content/1660988/whistleblowers-software-bug-keeping-hundreds-inmates-arizona-prisons-beyond-release

#whistleblowers #usa #software #bug #prisons #inmates #arizona
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Tracking Russian Hackers

In this parallel reality, where spies, paranoid and discreet geeks compete for territory, the film tells an invisible war, where viruses are terrifying weapons and information a key issue. A war that can destabilize our world, touch all of us and where Russia advances its pawns with determination. Russian hackers have been on the front page of Western media. In the United States, they are accused of interfering in the 2016 presidential campaign by hacking emails from the American Democratic Party. In Kiev, Ukraine, cyberattacks wreak havok. The culprits are designated: Russia and its mercenaries, hackers. But who are they really?

https://www.youtube.com/watch?v=23WU6XOFpGA

#russian #hackers #video
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Confessions of a Hacker known as Kingpin - Joe Grand Story

Explore Joe Grand’s life journey as a hardware hacker. Known as Kingpin, his curiosity has been manipulating electronic devices since the 1980s. Learn more about his hacker lifestyle and get a glimpse inside Joe’s mind as he explains how hacking, technology and engineering fuels his passion.

https://www.youtube.com/watch?v=5bcbmef4I3I

#kingpin #hackers #hacking #video
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day

There is a theory which states that if anyone will ever manage to steal and use nation-grade cyber tools, any network would become untrusted, and the world would become a very dangerous place to live in.

There is another theory which states that this has already happened.

What would you say if we told you that a foreign group managed to steal an American nuclear submarine? That would definitely be a bad thing, and would quickly reach every headline.

However, for cyber weapons – although their impact could be just as devastating – it`s usually a different story.

Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email. They are also very obscure, and their mere existence is a closely guarded secret. That is exactly why, as opposed to a nuclear submarine, stealing a cyber-weapon can easily go under the radar and become a fact known only to a selected few.

The implications of such a scenario can be devastating, as the world have already experienced with the case of the Shadow Brokers leak, in which a mysterious group have decided to publicly publish a wide range of cyber weapons allegedly developed by the Tailored Access Operations (TAO) unit of the NSA – also referred to as the ‘Equation Group’.
The Shadow Brokers leak lead to some of the biggest cyber outbreaks in history – the most famous of which was the WannaCry attack causing hundreds of millions of dollars in damages to organizations across the globe – and which its implications are still relevant even 3 years after it happened.

The Shadow brokers leak however, just gave us a taste of some of the possible implications such a cyber-theft can cause. Many important questions still remain – could this have also happened before? And if so, who is behind it and what did they use it for?

Our recent research aims to shed more light on this topic, and reveal conclusive evidence that such a leak did actually take place years before the Shadow Brokers leak, resulting in US developed cyber tools reaching the hands of a Chinese group which repurposed them in order to attack US targets.

https://research.checkpoint.com/2021/the-story-of-jian/

#research #jian #apt31 #shadowbrokers #leak
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
WOKA-Cola: Anti-White Racism Leaked From Coca-Cola

Here are just a few of the allegedly leaked information from the Coca-Cola training video:

‼️ How to be less white?

“Be less oppressive, be less arrogant, be less certain, be less defensive, be less ignorant, be more humble, listen, believe, break with apathy, break with white solidarity”

https://www.youtube.com/watch?v=u603q7mSWlw

#CocaCola #racism #leaked #information #training #video #thinkabout #why
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Powerhouse VPN products can be abused for large-scale DDoS attacks

Around 1,500 Powerhouse VPN servers are exposed online and ready to be abused by DDoS groups.

Botnet operators are abusing VPN servers from VPN provider Powerhouse Management as a way to bounce and amplify junk traffic part of DDoS attacks.

This new DDoS vector has been discovered and documented by a security researcher who goes online as Phenomite, who shared his findings with ZDNet last week.

The researcher said the root cause of this new DDoS vector is a yet-to-be-identified service that runs on UDP port 20811 on Powerhouse VPN servers.

Phenomite says that attackers can ping this port with a one-byte request, and the service will often respond with packets that are up to 40 times the size of the original packet.

Since these packets are UDP-based, they can also be modified to contain an incorrect return IP address. This means that an attacker can send a single-byte UDP packet to a Powerhouse VPN server, which then amplifies it and sends it to the IP address of a victim of a DDoS attack —in what security researchers call a reflected/amplified DDoS attack.

https://www.zdnet.com/article/powerhouse-vpn-products-can-be-abused-for-large-scale-ddos-attacks/

#powerhouse #vpn #abuse #ddos #attacks
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag