BlackBox (Security) Archiv
4.09K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Media is too big
VIEW IN TELEGRAM
Confessions of a Hacker known as Kingpin - Joe Grand Story

Explore Joe Grandโ€™s life journey as a hardware hacker. Known as Kingpin, his curiosity has been manipulating electronic devices since the 1980s. Learn more about his hacker lifestyle and get a glimpse inside Joeโ€™s mind as he explains how hacking, technology and engineering fuels his passion.

https://www.youtube.com/watch?v=5bcbmef4I3I

#kingpin #hackers #hacking #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
The Story of Jian โ€“ How APT31 Stole and Used an Unknown Equation Group 0-Day

There is a theory which states that if anyone will ever manage to steal and use nation-grade cyber tools, any network would become untrusted, and the world would become a very dangerous place to live in.

There is another theory which states that this has already happened.

What would you say if we told you that a foreign group managed to steal an American nuclear submarine? That would definitely be a bad thing, and would quickly reach every headline.

However, for cyber weapons โ€“ although their impact could be just as devastating โ€“ it`s usually a different story.

Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email. They are also very obscure, and their mere existence is a closely guarded secret. That is exactly why, as opposed to a nuclear submarine, stealing a cyber-weapon can easily go under the radar and become a fact known only to a selected few.

The implications of such a scenario can be devastating, as the world have already experienced with the case of the Shadow Brokers leak, in which a mysterious group have decided to publicly publish a wide range of cyber weapons allegedly developed by the Tailored Access Operations (TAO) unit of the NSA โ€“ also referred to as the โ€˜Equation Groupโ€™.
The Shadow Brokers leak lead to some of the biggest cyber outbreaks in history โ€“ the most famous of which was the WannaCry attack causing hundreds of millions of dollars in damages to organizations across the globe โ€“ and which its implications are still relevant even 3 years after it happened.

The Shadow brokers leak however, just gave us a taste of some of the possible implications such a cyber-theft can cause. Many important questions still remain โ€“ could this have also happened before? And if so, who is behind it and what did they use it for?

Our recent research aims to shed more light on this topic, and reveal conclusive evidence that such a leak did actually take place years before the Shadow Brokers leak, resulting in US developed cyber tools reaching the hands of a Chinese group which repurposed them in order to attack US targets.

https://research.checkpoint.com/2021/the-story-of-jian/

#research #jian #apt31 #shadowbrokers #leak
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
WOKA-Cola: Anti-White Racism Leaked From Coca-Cola

Here are just a few of the allegedly leaked information from the Coca-Cola training video:

โ€ผ๏ธ How to be less white?

โ€œBe less oppressive, be less arrogant, be less certain, be less defensive, be less ignorant, be more humble, listen, believe, break with apathy, break with white solidarityโ€

https://www.youtube.com/watch?v=u603q7mSWlw

#CocaCola #racism #leaked #information #training #video #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Powerhouse VPN products can be abused for large-scale DDoS attacks

Around 1,500 Powerhouse VPN servers are exposed online and ready to be abused by DDoS groups.

Botnet operators are abusing VPN servers from VPN provider Powerhouse Management as a way to bounce and amplify junk traffic part of DDoS attacks.

This new DDoS vector has been discovered and documented by a security researcher who goes online as Phenomite, who shared his findings with ZDNet last week.

The researcher said the root cause of this new DDoS vector is a yet-to-be-identified service that runs on UDP port 20811 on Powerhouse VPN servers.

Phenomite says that attackers can ping this port with a one-byte request, and the service will often respond with packets that are up to 40 times the size of the original packet.

Since these packets are UDP-based, they can also be modified to contain an incorrect return IP address. This means that an attacker can send a single-byte UDP packet to a Powerhouse VPN server, which then amplifies it and sends it to the IP address of a victim of a DDoS attack โ€”in what security researchers call a reflected/amplified DDoS attack.

https://www.zdnet.com/article/powerhouse-vpn-products-can-be-abused-for-large-scale-ddos-attacks/

#powerhouse #vpn #abuse #ddos #attacks
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Ban sale of Grand Theft Auto, other violent video games, state rep says

With carjackings rising, Rep. Marcus Evans wants to prohibit the sale of violent video games promoting criminal activity. Also Monday, Operation Safe Pump announced its gas station guards program will expand to south suburban Olympia Fields.

With carjackings on the rise in Chicago and elsewhere, a South Side Democratic state representative has introduced a bill that would ban the sale of Grand Theft Auto and other violent video games.

Rep. Marcus Evans Jr. wants to amend a 2012 law preventing some video games from being sold to minors. Friday, he filed HB3531, which would amend that law to ban the sale to anyone of video games depicting โ€œpsychological harm,โ€ including โ€œmotor vehicle theft with a driver or passenger present.โ€

Evans had been contacted in January by Early Walker, who started Operation Safe Pump to prevent carjackings at gas stations and shopping centers. Safe Pump positions security guards from the Kates Detective and Security Agency in areas with high numbers of carjackings.

โ€œThe bill would prohibit the sale of some of these games that promote the activities that weโ€™re suffering from in our communities.โ€ Evans said.

Walker said he reached out to several state legislators to ban the video game after noticing similarities in local incidents of carjackings and actions players can make in the video game.

โ€œI feel like this game has become a huge issue in this spectrum,โ€ Walker said. โ€œWhen you compare the two, you see harsh similarities as it relates to these carjackings.โ€

https://chicago.suntimes.com/news/2021/2/22/22295471/grand-theft-auto-illinois-ban-violent-video-games-carjackings-evans-operation-safe-pump

#gta #usa #illinois #carjacking #chicago #ban #prohibit #videogame #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Twitter executive for Middle East is British Army 'psyops' soldier

Part-time officer has worked on 'behavioural change' projects in the region

The senior Twitter executive with editorial responsibility for the Middle East is also a part-time officer in the British Armyโ€™s psychological warfare unit, Middle East Eye has established.

Gordon MacMillan, who joined the social media company's UK office six years ago, has for several years also served with the 77th Brigade, a unit formed in 2015 to develop โ€œnon-lethalโ€ ways of waging war.

The 77th Brigade uses social media platforms such as Twitter, Instagram and Facebook, as well as podcasts, data analysis and audience research to conduct what the head of the UK military, General Nick Carter, describes as โ€œinformation warfareโ€.

Carter says the 77th Brigade is giving the British military โ€œthe capability to compete in the war of narratives at the tactical levelโ€ and to shape perceptions of conflict. Some soldiers who have served with the unit say they have been engaged in operations intended to change the behaviour of target audiences.

What exactly MacMillan is doing with the unit is difficult to determine, however: he has declined to answer any questions about his role, as has Twitter and the UKโ€™s Ministry of Defence (MoD).

https://www.middleeasteye.net/news/twitter-executive-also-part-time-officer-uk-army-psychological-warfare-unit

#twitter #executive #uk #army #psychological #warfare #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
This browser extension shows what the Internet would look like without Big Tech

A web without Google, Facebook, Microsoft, or Amazon

The Economic Security Project is trying to make a point about big tech monopolies by releasing a browser plugin that will block any sites that reach out to IP addresses owned by Google, Facebook, Microsoft, or Amazon. The extension is called Big Tech Detective, and after using the internet with it for a day (or, more accurately, trying and failing to use), Iโ€™d say it drives home the point that itโ€™s almost impossible to avoid these companies on the modern web, even if you try.

https://www.theverge.com/2021/2/24/22297686/browser-extension-blocks-sites-using-google-facebook-microsoft-amazon

๐Ÿ’ก https://bigtechdetective.net/

#DeleteGoogle #delete #microsoft #amazon #browser #plugin #extension #tool
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
โ€˜Millions of peopleโ€™s data is at riskโ€™ โ€” Amazon insiders sound alarm over security

Whistleblowers say they were forced out after flagging problems with e-commerce giantโ€™s data security and compliance.

YOUR ORDER HISTORY. Your credit card information. Even your intimate health data.

Amazon is amassing an empire of data as the online retailer ventures into ever more areas of our lives. But the company's efforts to protect the information it collects are inadequate, according to insiders who warn the company's security shortfalls expose users' information to potential breaches, theft and exploitation.

The warnings about privacy and compliance failures at Amazon come from three former high-level information security employees โ€” one EU-based and two from the U.S. โ€” who told POLITICO they had repeatedly tried to alert senior leadership in the company's Seattle HQ, only to be sidelined, dismissed or pushed out of the company in what they saw as professional retaliation.

The EU-based employee is fighting dismissal from Amazon through European courts. All three spoke on condition of anonymity out of concern they could face retaliation or difficulties in the job market for discussing the details of non-public legal proceedings.

Put together, their accounts paint a picture of a corporate culture at Amazon that they say prioritizes growth over other factors, such as the security of customers' information, compliance with rules designed to safeguard that data and the careers of employees the company hired specifically to flag problems.

โ€œImagine if a company the size of Amazon had a breach? The issue is millions of people's personal identifiable information is at risk,โ€ the first former U.S.-based information-security employee said.

https://www.politico.eu/article/data-at-risk-amazon-security-threat/

#amazon #DeleteAmazon #data #security #risk #threat #yourdata #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Chinese cyberspies targeted Tibetans with a malicious Firefox add-on

The Chinese hacking group used the malicious add-on to collect Gmail and Firefox data from their victims.

Chinese state-sponsored hackers have gone after Tibetan organizations across the world using a malicious Firefox add-on that was configured to steal Gmail and Firefox browser data and then download malware on infected systems.

The attacks, discovered by cybersecurity firm Proofpoint this month, have been linked to a group the company tracks under the codename of TA413.

https://www.zdnet.com/article/chinese-cyberspies-targeted-tibetans-with-a-malicious-firefox-add-on/

#china #cyberspies #tibetans #malicious #firefox #addon
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
One of the biggest Android VPNs hacked? Data of 21 million users from 3 Android VPNs put for sale online

A user on a popular hacker forum is selling three databases that purportedly contain user credentials and device data stolen from three different Android VPN services โ€“ SuperVPN, GeckoVPN, and ChatVPN โ€“ with 21 million user records being sold in total.

The VPN services whose data has been allegedly exfiltrated by the hacker are SuperVPN, which is considered as one of the most popular (and dangerous) VPNs on Google Play with 100,000,000+ installs on the Play store, as well as GeckoVPN (10,000,000+ installs) and ChatVPN (50,000+ installs).

The forum user is selling deeply sensitive device data and login credentials โ€“ email addresses and randomly generated strings used as passwords โ€“ of more than 21 million VPN users for an undisclosed sum.

We reached out to SuperVPN, GeckoVPN, and ChatVPN and asked the providers if they could confirm that the leak was genuine but we have received no responses at the time of writing this report.

๐Ÿ’ก What was leaked?

The author of the forum post is selling three archives, two of which allegedly contain a variety of data apparently collected by the providers from more than 21,000,000 SuperVPN, GeckoVPN, and ChatVPN users, including:

โŒ Email addresses

โŒ Usernames

โŒ Full names

โŒ Country names

โŒ Randomly generated password strings

โŒ Payment-related data

โŒ Premium member status and its expiration date

https://cybernews.com/security/one-of-the-biggest-android-vpns-hacked-data-of-21-million-users-from-3-android-vpns-put-for-sale-online/

#android #vpn #SuperVPN #GeckoVPN #ChatVPN #hacked #leak #exposed
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
This media is not supported in your browser
VIEW IN TELEGRAM
Deep Nostalgia uses video reenactment technology to animate faces in still photos

Those family photos hung on the wall might soon take on a new life.

The genealogy platform MyHeritage released a feature that animates faces in still photos using video reenactment technology.

The feature, called Deep Nostalgia, produces a realistic depiction of how a person could have moved and looked if they were captured on video.

https://eu.usatoday.com/story/tech/2021/02/25/deep-nostalgia-technology-animates-faces-still-photos/6814516002/

#deep #nostalgia #technology #video #reenactment #MyHeritage
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Amazon rainforest plots sold via Facebook Marketplace ads

Parts of Brazil's Amazon rainforest are being illegally sold on Facebook, the BBC has discovered.

The protected areas include national forests and land reserved for indigenous peoples.

Some of the plots listed via Facebook's classified ads service are as large as 1,000 football pitches.

Facebook said it was "ready to work with local authorities", but indicated it would not take independent action of its own to halt the trade.

"Our commerce policies require buyers and sellers to comply with laws and regulations," the Californian tech firm added.

The leader of one of the indigenous communities affected has urged the tech firm to do more.

And campaigners have claimed the country's government is unwilling to halt the sales.

"The land invaders feel very empowered to the point that they are not ashamed of going on Facebook to make illegal land deals," said Ivaneide Bandeira, head of environmental NGO Kanindรฉ.

https://www.bbc.com/news/technology-56168844

#DeleteFacebook #facebook #marketplace #amazon #rainforest #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
A judge has accepted a $650 million settlement of a privacy lawsuit filed against Facebook over facial picture marking.

A federal judge has accepted a $650 million deal between Facebook and users who sued the company over the tagging feature

The deal was a "landmark result," according to US Judge James Donato of the Northern District of California, who described it as "one of the largest-ever from a privacy lawsuit." According to the complaint, at least $345 would be paid to around 1.6 million individuals who entered the action.

"Overall, the settlement is a major win for consumers in the hotly contested area of digital privacy," wrote Judge Donato. "The standing issue makes this settlement all the more valuable because Facebook and other big tech companies continue to fight the proposition that a statutory privacy violation is a genuine harm."

In Illinois, a class-action lawsuit was first filed in 2015. Users claimed that Facebook had defied the state's Biometric Identity Protection Act, which forbids private organizations from collecting, storing, or using biometric identification or information without advance notice and written consent.

According to the complaint, beginning in June 2011, Facebook created and stored a face design for Illinois users as part of a feature to facilitate tagging - or marking - individuals in images.

The settlement order said, "The class members alleged that Facebook collected and stored their biometric data - namely digital scans of their faces - without prior notice or consent"

https://blog.newspen.in/2021/02/a-judge-has-accepted-650-million.html

#DeleteFacebook #facebook #privacy #lawsuit
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Youtube Employing Favicon Tracking Method

It comes to no surprise to me, that it seems Youtube/Google has been making use of favicon tracking.

After taking a quick look in my favicon database, this is what shows up.

https://www.reddit.com/r/privacy/comments/lvgx54/youtube_employing_favicon_tracking_method/

#privacy #youtube #google #DeleteGoogle #favicon #tracking
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Setup for testing Android app vulnerabilities

In the previous article I documented my approach for reverse engineering an Android game. But getting my hands on the code is only one part of security research. Once a potential issue is identified, I need to verify that it is actually exploitable. So there is no way around messing with an actual live app. Ideally that has to happen in a controlled environment with emulated hardware. As before, this is mostly me writing things down for my future self, but it might come useful for other people as well.

๐Ÿ’ก Contents

โœ…
Choosing a virtualization approach

โœ… Setting up Android SDK

โœ… Minimal proof of concept Android app

โœ… Adding debugging output to the target application

https://palant.info/2021/02/22/setup-for-testing-android-app-vulnerabilities/

#setup #testing #android #app #vulnerabilities #guide
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Full-Report-Digital-1.pdf
13.9 MB
Final Report - National Security Commission on Artificial Intelligence

Americans have not yet grappled with just how profoundly the artificial intelligence (AI) revolution will impact our economy, national security, and welfare. Much remains to be learned about the power and limits of AI technologies. Nevertheless, big decisions need to be made now to accelerate AI innovation to benefit the United States and to defend against the malign uses of AI.

https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf

#national #security #commission #artificial #intelligence #report #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Google patches actively exploited Chrome browser zero-day vulnerability

Upgrading your Chrome build as quickly as possible is recommended.

Google has warned of reports that a zero-day vulnerability in the Chrome browser is being actively exploited in the wild.

The vulnerability, tracked as CVE-2021-21166, was reported by Alison Huffman from the Microsoft Browser Vulnerability Research team on February 11 and is described as an "object lifecycle issue in audio."

Google has labeled the vulnerability as a "high" severity security flaw and has fixed the issue in the latest Chrome release.

Alongside CVE-2021-21166, Huffman also recently reported another high-severity bug, CVE-2021-21165, another object lifestyle issue in audio problem, and CVE-2021-21163, an insufficient data validation issue in Reader Mode.

The tech giant has not revealed further details concerning how CVE-2021-21166 is being exploited, or by whom.

Google's announcement, published on Tuesday, also marked the release of Chrome 89 to the stable desktop channel for Windows, Mac, and Linux machines, which is currently rolling out. Users should upgrade to Chrome 89.0.4389.72 once available.

https://www.zdnet.com/article/google-patches-actively-exploited-chrome-browser-zero-day-vulnerability/

#google #chrome #zeroday #vulnerability
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
How to turn off the ANDROID TRACKING SERVICES [ROOT required]

Let's start:

๐Ÿ‘‰๐Ÿผ Download Termux from Google Playstore and install and open it.

Install Packages:

pkg install aapt jq tsu curl -y

( Asks for root privileges, allow this โ—๏ธ๐Ÿ‘‡๐Ÿฝ)

cd /data/data/com.termux/files/usr/bin
cp -R aapt /system/xbin/aapt
cp -R jq /system/xbin/jq
cp -R curl /system/xbin/curl
chmod +x /system/xbin/aapt
chmod +x /system/xbin/jq
chmod +x /system/xbin/curl

๐Ÿ‘‰๐Ÿผ Download the script from here:
https://drive.google.com/drive/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE

๐Ÿ’ก (Please always use the latest version)

๐Ÿ‘‰๐Ÿผ
Unpack to ๐Ÿ‘‰๐Ÿผ /sdcard and then enter the following command...:

termux-setup-storage (grant permission)

๐Ÿ‘‰๐Ÿผ Then enter:
 cd /sdcard

(with root) ๐Ÿ‘‡๐Ÿฝ

tsu

bash DisableTrackers.sh sys (Add โ—๏ธ)

After that, just reboot your device and the job is done.

#root #android #tracking #services #guide
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Google says once third-party cookies are toast, Chrome won't help ad networks track individuals around the web

Notes an 'erosion of trust' โ€“ gee, wonder who could be responsible for that...

Google says it will not come up with new ways to track individual netizens as they browse the web once Chrome phases out third-party cookies, commonly used for loosely observing people's online activities.

In effect, the browser will not provide ad networks โ€“ and Google runs a very large one โ€“ alternative identifiers that can be used to follow individuals around the web, though it's not clear exactly how this will impact Google, which already has a variety of ways to shadow internet users.

Early last year, Google announced a plan to kill off third-party cookies, often used to associate you with the websites you visit so that adverts tailored to your interests can be shown on pages. Google made the move after other major browser makers decided to block third-party cookies by default because the little scraps of data can be abused to subvert privacy, and after regulators made it clear they had concerns about ad tech giants Google and Facebook.

Google aims to replace third-party cookies with its Privacy Sandbox, an umbrella term for a set of proposals from Google and other ad tech firms, to allow behavioral ad targeting to continue without individualized tracking identifiers.

Instead, the ad goliath intends to target broad groups of netizens defined by a common interest โ€“ eg, jazz fans โ€“ through a system called FLoC (Federated Learning of Cohorts), and at narrower groups defined by past interest-based interaction, through a scheme called FLEDGE (First "Locally-Executed Decision over Groups.")

Google plans to start testing FLoC-based cohorts publicly via origin trials in next month's release of Chrome and to make testing available for advertisers in Q2.

The idea has alarmed the ad industry, which isn't keen to give up the ability to track people and has proposed alternatives like a new identifier based on data like email addresses, normally classified as personal information.

https://www.theregister.com/2021/03/03/google_internet_tracking_pledge/

#google #DeleteGoogle #internet #tracking #advertising #cookies #chrome #browser #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Indiaโ€™s new intermediary liability and digital media regulations will harm the open internet

Last week, in a sudden move that will have disastrous consequences for the open internet, the Indian government notified a new regime for intermediary liability and digital media regulation. Intermediary liability (or โ€œsafe harborโ€) protections have been fundamental to growth and innovation on the internet as an open and secure medium of communication and commerce.

By expanding the โ€œdue diligenceโ€ obligations that intermediaries will have to follow to avail safe harbor, these rules will harm end to end encryption, substantially increase surveillance, promote automated filtering and prompt a fragmentation of the internet that would harm users while failing to empower Indians. While many of the most onerous provisions only apply to โ€œsignificant social media intermediariesโ€ (a new classification scheme), the ripple effects of these provisions will have a devastating impact on freedom of expression, privacy and security.

As we explain below, the current rules are not fit-for-purpose and will have a series of unintended consequences on the health of the internet as a whole:

https://blog.mozilla.org/netpolicy/2021/03/02/indias-new-intermediary-liability-and-digital-media-regulations-will-harm-the-open-internet/

#india #digital #media #regulations #blog #mozilla #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Top 21 Data Mining Tools - What is data mining?

Data mining is a world itself, which is why it can easily get very confusing. There is an incredible number of data mining tools available in the market. However, while some might be more suitable for handling data mining in Big Data, others stand out for their data visualization features.

As is explained in this article, data mining is about discovering patterns in data and predict trends and behaviours. Simply put, it is the process of converting vasts sets of data into relevant information. There is not much use in having massive amounts of data if we do not actually know what it means.

๐Ÿ’ก Table of contents

1 ..
What is data mining?
1.2 The Steps of Data Mining Process?
1.3 The difference between data mining and data warehouse

2 .. Data Mining Tools
2.1 R vs Python
2.2 Integrated data mining tools for statistical analysis
2.3 Open-source data mining solutions
2.4 Data mining tools for Big Data
2.5 Small scale solutions for data mining
2.6 Cloud solutions for data mining
2.7 Data Mining tools for neural networks
2.8 Data mining tools for data visualization

3 .. Conclusion

https://www.imaginarycloud.com/blog/data-mining-tools/

#data #mining #bigdata #tools #knowhow
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag