Mubadala, Abu Dhabi Catalyst Partners invest $150 million in social media platform Telegram
ABU DHABI, 23rd March, 2021 (WAM) -- Mubadala Investment Company, the Abu Dhabi-based sovereign investor, has invested US$75 million in 5-year pre-IPO convertible bonds of Telegram, an operator of the self-named security-focused social media platform, with Abu Dhabi Catalyst Partners investing a further US$75 million.
The strategic partnership between the companies is also expected to create new collaboration opportunities and thereby further advance Abu Dhabi’s ecosystem of innovative and tech-enabled companies.
Launched in 2013 by brothers Pavel and Nikolai Durov as a secure messaging app utilising end-to-end encryption, Telegram evolved into a fully-fledged social media platform and has its global headquarters in the UAE. It has become one of the 10 most downloaded apps in the world with over 500 million monthly active users.
Faris Sohail Faris Al Mazrui, Head of Mubadala’s Russia and CIS Investment Programme, said, "We recognise and admire Pavel's vision for the company and the team’s execution in building an exceptional product and company. His unwavering focus on user experience and privacy, and how it is central to every business decision he makes, is one of the keys to Telegram's popularity and success. Telegram's user base has reached a critical mass that places it amongst global tech giants.
"We believe that Telegram is well-positioned for an inflection point that will transform it into a leading global technology company. The company represents a very promising investment opportunity for Mubadala and will sit well within our wider portfolio of pioneering companies looking to transform their respective industries. Our investment in Telegram establishes a strategic partnership for us to further strengthen Abu Dhabi's technology ecosystem as well as bring new levels of tech skills and talent to the capital."
Pavel Durov, Founder and CEO of Telegram, added, "We are honoured by the US$150 million investment into Telegram from Mubadala and Abu Dubai Catalyst Partners. We look forward to developing this strategic partnership to continue our growth in the MENA region and globally."
https://www.wam.ae/en/details/1395302920777
#abudhabi #investment #telegram #durov
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
ABU DHABI, 23rd March, 2021 (WAM) -- Mubadala Investment Company, the Abu Dhabi-based sovereign investor, has invested US$75 million in 5-year pre-IPO convertible bonds of Telegram, an operator of the self-named security-focused social media platform, with Abu Dhabi Catalyst Partners investing a further US$75 million.
The strategic partnership between the companies is also expected to create new collaboration opportunities and thereby further advance Abu Dhabi’s ecosystem of innovative and tech-enabled companies.
Launched in 2013 by brothers Pavel and Nikolai Durov as a secure messaging app utilising end-to-end encryption, Telegram evolved into a fully-fledged social media platform and has its global headquarters in the UAE. It has become one of the 10 most downloaded apps in the world with over 500 million monthly active users.
Faris Sohail Faris Al Mazrui, Head of Mubadala’s Russia and CIS Investment Programme, said, "We recognise and admire Pavel's vision for the company and the team’s execution in building an exceptional product and company. His unwavering focus on user experience and privacy, and how it is central to every business decision he makes, is one of the keys to Telegram's popularity and success. Telegram's user base has reached a critical mass that places it amongst global tech giants.
"We believe that Telegram is well-positioned for an inflection point that will transform it into a leading global technology company. The company represents a very promising investment opportunity for Mubadala and will sit well within our wider portfolio of pioneering companies looking to transform their respective industries. Our investment in Telegram establishes a strategic partnership for us to further strengthen Abu Dhabi's technology ecosystem as well as bring new levels of tech skills and talent to the capital."
Pavel Durov, Founder and CEO of Telegram, added, "We are honoured by the US$150 million investment into Telegram from Mubadala and Abu Dubai Catalyst Partners. We look forward to developing this strategic partnership to continue our growth in the MENA region and globally."
https://www.wam.ae/en/details/1395302920777
#abudhabi #investment #telegram #durov
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
www.wam.ae
Mubadala, Abu Dhabi Catalyst Partners invest $150 million in social media platform Telegram
Mubadala Investment Company, the Abu Dhabi-based sovereign investor, has invested US$75 million in 5-year pre-IPO convertible bonds of Telegram, an operator of the self-named security-focused social media platform, with Abu Dhabi Catalyst Partners investing…
Media is too big
VIEW IN TELEGRAM
Redefining longevity: Android 9 now available for Fairphone 2
It all started with a spark of inspired optimism: We can change the electronics industry for the better, by becoming a part of it. Setting new standards and reshaping an entire industry was going to take serious, long-term commitment.
This year is a milestone for us, and you, as it marks 5 years of continuous support of the Fairphone 2. It is also one of the few Android smartphones sold in that year (2015), to still receive continued software support. It might not seem like a big deal, but trust us, it is. This is the only smartphone to receive an upgrade to Android 9 and we had to build the operating system without any support from chip-maker Qualcomm.
https://www.fairphone.com/en/2021/03/25/android9-fairphone2/
#fairphone #smartphone #update #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
It all started with a spark of inspired optimism: We can change the electronics industry for the better, by becoming a part of it. Setting new standards and reshaping an entire industry was going to take serious, long-term commitment.
This year is a milestone for us, and you, as it marks 5 years of continuous support of the Fairphone 2. It is also one of the few Android smartphones sold in that year (2015), to still receive continued software support. It might not seem like a big deal, but trust us, it is. This is the only smartphone to receive an upgrade to Android 9 and we had to build the operating system without any support from chip-maker Qualcomm.
https://www.fairphone.com/en/2021/03/25/android9-fairphone2/
#fairphone #smartphone #update #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Endless OS
Computing is one of the greatest revolutions in human history. Yet, it remains out of reach for half the planet. We created Endless OS – a free and robust computing solution – so people everywhere have access to relevant information and technology.
Our goal at the Endless OS Foundation is to build a global platform for digital literacy.
https://endlessos.com/
#endlessos #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Computing is one of the greatest revolutions in human history. Yet, it remains out of reach for half the planet. We created Endless OS – a free and robust computing solution – so people everywhere have access to relevant information and technology.
Our goal at the Endless OS Foundation is to build a global platform for digital literacy.
https://endlessos.com/
#endlessos #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Red Hat statement about Richard Stallman’s return to the Free Software Foundation board
Red Hat is a long-time donor and contributor to projects stewarded by the Free Software Foundation (FSF), with hundreds of contributors and millions of lines of code contributed. Considering the circumstances of Richard Stallman’s original resignation in 2019, Red Hat was appalled to learn that he had rejoined the FSF board of directors. As a result, we are immediately suspending all Red Hat funding of the FSF and any FSF-hosted events. In addition, many Red Hat contributors have told us they no longer plan to participate in FSF-led or backed events, and we stand behind them.
In 2019, we called on the FSF board to use the opportunity created by Stallman’s departure to transition to a more diverse, inclusive board membership. The FSF took only limited steps in this direction. Richard Stallman’s return has reopened wounds we had hoped would slowly heal after his departure. We believe that in order to regain the confidence of the broader free software community, the FSF should make fundamental and lasting changes to its governance.
On Wednesday, the FSF board of directors committed to a series of changes related to organizational governance and the appointment of members to its board of directors. However, we have no reason to believe that the most recent FSF board statement signals any meaningful commitment to positive change. We look forward to working with the FSF and others to enable the FSF to once again become an effective and trusted advocacy organization in line with its chartered non-profit mission.
https://www.redhat.com/en/blog/red-hat-statement-about-richard-stallmans-return-free-software-foundation-board
💡 most recent FSF board statement
https://www.fsf.org/news/preliminary-board-statement-on-fsf-governance
#stallman #rms #fsf #openletter #redhat #statement
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Red Hat is a long-time donor and contributor to projects stewarded by the Free Software Foundation (FSF), with hundreds of contributors and millions of lines of code contributed. Considering the circumstances of Richard Stallman’s original resignation in 2019, Red Hat was appalled to learn that he had rejoined the FSF board of directors. As a result, we are immediately suspending all Red Hat funding of the FSF and any FSF-hosted events. In addition, many Red Hat contributors have told us they no longer plan to participate in FSF-led or backed events, and we stand behind them.
In 2019, we called on the FSF board to use the opportunity created by Stallman’s departure to transition to a more diverse, inclusive board membership. The FSF took only limited steps in this direction. Richard Stallman’s return has reopened wounds we had hoped would slowly heal after his departure. We believe that in order to regain the confidence of the broader free software community, the FSF should make fundamental and lasting changes to its governance.
On Wednesday, the FSF board of directors committed to a series of changes related to organizational governance and the appointment of members to its board of directors. However, we have no reason to believe that the most recent FSF board statement signals any meaningful commitment to positive change. We look forward to working with the FSF and others to enable the FSF to once again become an effective and trusted advocacy organization in line with its chartered non-profit mission.
https://www.redhat.com/en/blog/red-hat-statement-about-richard-stallmans-return-free-software-foundation-board
💡 most recent FSF board statement
https://www.fsf.org/news/preliminary-board-statement-on-fsf-governance
#stallman #rms #fsf #openletter #redhat #statement
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Redhat
Red Hat statement about Richard Stallman’s return to the Free Software Foundation board
Red Hat is a long-time donor and contributor to projects stewarded by the Free Software Foundation (FSF), with hundreds of contributors and millions of lines of code contributed. Considering the circumstances of Richard Stallman’s original resignation in…
New Advanced Android Malware Posing as “System Update”
Another week, and another major mobile security risk. A few weeks ago, Zimperium zLabs researchers disclosed unsecured cloud configurations exposing information in thousands of legitimate iOS and Android apps (you can read more about it in our blog). This week, zLabs is warning Android users about a sophisticated new malicious app.
The new malware disguises itself as a System Update application, and is stealing data, messages, images and taking control of Android phones. Once in control, hackers can record audio and phone calls, take photos, review browser history, access WhatsApp messages, and more (a complete list is below).
https://blog.zimperium.com/new-advanced-android-malware-posing-as-system-update/
#android #malware #alert
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Another week, and another major mobile security risk. A few weeks ago, Zimperium zLabs researchers disclosed unsecured cloud configurations exposing information in thousands of legitimate iOS and Android apps (you can read more about it in our blog). This week, zLabs is warning Android users about a sophisticated new malicious app.
The new malware disguises itself as a System Update application, and is stealing data, messages, images and taking control of Android phones. Once in control, hackers can record audio and phone calls, take photos, review browser history, access WhatsApp messages, and more (a complete list is below).
https://blog.zimperium.com/new-advanced-android-malware-posing-as-system-update/
#android #malware #alert
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Zimperium
New Advanced Android Malware Posing as “System Update" - Zimperium
Another week, and another major mobile security risk. A few weeks ago, Zimperium zLabs researchers disclosed unsecured cloud configurations exposing
The internet – the Scene’s friend or foe?
Does the internet make the things inside the Scene easier or not? Does it support or kill everything? Sane of Monk tries to find the answer.
Written by Sane a.k.a. sAner / Monk
Don’t we all sometimes think about the glorious past of the Amiga Scene? The glorious past when there was no Facebook, no YouTube, no Instagram, no Twitter, no LinkedIn. When Sceners were said to be so much more productive as they are now in the era of the internet. When the vast majority of the Sceners were said to be eager to be creative instead of what they supposedly are now: lazy consumers of the hard work of just a few. Is this idea something that is real or it this idea stuck in our head, but based on dreams? Based on good memories. Based on false memories, because we glorify the past?
https://tarnkappe.info/the-internet-the-scenes-friend-or-foe/
#internet #GoodOldTimes #amiga
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Does the internet make the things inside the Scene easier or not? Does it support or kill everything? Sane of Monk tries to find the answer.
Written by Sane a.k.a. sAner / Monk
Don’t we all sometimes think about the glorious past of the Amiga Scene? The glorious past when there was no Facebook, no YouTube, no Instagram, no Twitter, no LinkedIn. When Sceners were said to be so much more productive as they are now in the era of the internet. When the vast majority of the Sceners were said to be eager to be creative instead of what they supposedly are now: lazy consumers of the hard work of just a few. Is this idea something that is real or it this idea stuck in our head, but based on dreams? Based on good memories. Based on false memories, because we glorify the past?
https://tarnkappe.info/the-internet-the-scenes-friend-or-foe/
#internet #GoodOldTimes #amiga
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Tarnkappe.info
The internet - the Scene's friend or foe?
Does the internet make the things inside the Scene easier or not? Does it support or kill everything? Sane of Monk tries to find the answer.
UK education charity Harris Federation struck by ransomware attack
The Harris Foundation, a U.K. education charity organization that runs 50 schools has been struck by a ransomware attack that has seen its systems taken offline.
The ransomware attack hit the foundation on Saturday and according to the U.K. press today put “nearly 40,000 pupils at risk.”
The form of ransomware and whether data was stolen was not disclosed. The Harris Foundation described the attack as being “highly sophisticated” that “will have a significant impact on our academies.” Along with hiring a cybersecurity firm, the foundation has also alerted and is working with authorities, specifically the U.K. National Crime Agency and the U.K. National Cyber Security Center.
The schools run by the foundation remain open although their email and telephone systems remain offline as a precautionary measure.
“We know that some families will have important individual concerns around data and that in these cases you will want to know more about the nature of the attack,” the Harris Foundation said in a statement. “Because we do not want to risk providing incorrect information, we will communicate further once we have clarity and liaise as appropriate with the Information Commissioner’s Office.”
The attack targeting the Harris Foundation came after the U.K. National Cyber Security Center issued a warning on March 23 that the education sector was being targeted by ransomware attacks.
https://siliconangle.com/2021/03/30/uk-education-charity-harris-federation-struck-ransomware-attack/
#ransomware #attack #uk #education #charity #harris
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The Harris Foundation, a U.K. education charity organization that runs 50 schools has been struck by a ransomware attack that has seen its systems taken offline.
The ransomware attack hit the foundation on Saturday and according to the U.K. press today put “nearly 40,000 pupils at risk.”
The form of ransomware and whether data was stolen was not disclosed. The Harris Foundation described the attack as being “highly sophisticated” that “will have a significant impact on our academies.” Along with hiring a cybersecurity firm, the foundation has also alerted and is working with authorities, specifically the U.K. National Crime Agency and the U.K. National Cyber Security Center.
The schools run by the foundation remain open although their email and telephone systems remain offline as a precautionary measure.
“We know that some families will have important individual concerns around data and that in these cases you will want to know more about the nature of the attack,” the Harris Foundation said in a statement. “Because we do not want to risk providing incorrect information, we will communicate further once we have clarity and liaise as appropriate with the Information Commissioner’s Office.”
The attack targeting the Harris Foundation came after the U.K. National Cyber Security Center issued a warning on March 23 that the education sector was being targeted by ransomware attacks.
https://siliconangle.com/2021/03/30/uk-education-charity-harris-federation-struck-ransomware-attack/
#ransomware #attack #uk #education #charity #harris
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
SiliconANGLE
UK education charity Harris Federation struck by ransomware attack
The Harris Foundation, a U.K. education charity organization that runs 50 schools has been struck by a ransomware attack that has seen its systems taken offline.The ransomware attack hit the found
Ransomware group targets Universities of Maryland, California in new data leaks
This follows similar extortion attempts impacting two other US universities this month.
The Clop ransomware group has posted financial documents and passport information allegedly belonging to the University of Maryland and the University of California online.
On March 29, the threat actors began publishing screenshots of data allegedly stolen from the US educational institutes.
These screenshots, including records that allegedly belong to the University of Maryland (UMD), show a federal tax document, requests for tuition remission paperwork, an application for the Board of Nursing, passports, and tax summary documents.
The leaked data snapshots exposed sensitive information points including the photos and names of individuals, home addresses, Social Security numbers, immigration status, dates of birth, and passport numbers.
Sensitive information has been redacted in the screenshots below.
https://www.zdnet.com/article/ransomware-group-targets-universities-of-maryland-california-in-new-data-leaks/
#ransomware #data #leak #universities #maryland #california #usa
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
This follows similar extortion attempts impacting two other US universities this month.
The Clop ransomware group has posted financial documents and passport information allegedly belonging to the University of Maryland and the University of California online.
On March 29, the threat actors began publishing screenshots of data allegedly stolen from the US educational institutes.
These screenshots, including records that allegedly belong to the University of Maryland (UMD), show a federal tax document, requests for tuition remission paperwork, an application for the Board of Nursing, passports, and tax summary documents.
The leaked data snapshots exposed sensitive information points including the photos and names of individuals, home addresses, Social Security numbers, immigration status, dates of birth, and passport numbers.
Sensitive information has been redacted in the screenshots below.
https://www.zdnet.com/article/ransomware-group-targets-universities-of-maryland-california-in-new-data-leaks/
#ransomware #data #leak #universities #maryland #california #usa
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
ZDNet
Ransomware group targets universities in Maryland, California in new data leaks
Updated: This follows similar extortion attempts impacting two other US universities this month.
Ban Surveillance Advertising
As leaders across a broad range of issues and industries, we are united in our concern for the safety of our communities and the health of democracy. Social media giants are eroding our consensus reality and threatening public safety in service of a toxic, extractive business model. That’s why we’re joining forces in an effort to ban surveillance advertising.
Surveillance advertising – the core profit-driver for gatekeepers like Facebook and Google, as well as adtech middlemen – is the practice of extensively tracking and profiling individuals and groups, and then microtargeting ads at them based on their behavioral history, relationships, and identity.
These dominant firms curate the content each person sees on their platforms using those dossiers – not just the ads, but newsfeeds, recommendations, trends, and so forth – to keep each user hooked, so they can be served more ads and mined for more data.
Big Tech platforms amplify hate, illegal activities, and conspiracism – and feed users increasingly extreme content – because that’s what generates the most engagement and profit. Their own algorithmic tools have boosted everything from white supremacist groups and Holocaust denialism to COVID-19 hoaxes, counterfeit opioids and fake cancer cures. Echo chambers, radicalization, and viral lies are features of these platforms, not bugs—central to the business model.
And surveillance advertising is further damaging the information ecosystem by starving the traditional news industry, especially local journalism. Facebook and Google’s monopoly power and data harvesting practices have given them an unfair advantage, allowing them to dominate the digital advertising market, siphoning up revenue that once kept local newspapers afloat. So while Big Tech CEOs get richer, journalists get laid off.
https://www.bansurveillanceadvertising.com/coalition-letter
#ban #surveillance #advertising #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
As leaders across a broad range of issues and industries, we are united in our concern for the safety of our communities and the health of democracy. Social media giants are eroding our consensus reality and threatening public safety in service of a toxic, extractive business model. That’s why we’re joining forces in an effort to ban surveillance advertising.
Surveillance advertising – the core profit-driver for gatekeepers like Facebook and Google, as well as adtech middlemen – is the practice of extensively tracking and profiling individuals and groups, and then microtargeting ads at them based on their behavioral history, relationships, and identity.
These dominant firms curate the content each person sees on their platforms using those dossiers – not just the ads, but newsfeeds, recommendations, trends, and so forth – to keep each user hooked, so they can be served more ads and mined for more data.
Big Tech platforms amplify hate, illegal activities, and conspiracism – and feed users increasingly extreme content – because that’s what generates the most engagement and profit. Their own algorithmic tools have boosted everything from white supremacist groups and Holocaust denialism to COVID-19 hoaxes, counterfeit opioids and fake cancer cures. Echo chambers, radicalization, and viral lies are features of these platforms, not bugs—central to the business model.
And surveillance advertising is further damaging the information ecosystem by starving the traditional news industry, especially local journalism. Facebook and Google’s monopoly power and data harvesting practices have given them an unfair advantage, allowing them to dominate the digital advertising market, siphoning up revenue that once kept local newspapers afloat. So while Big Tech CEOs get richer, journalists get laid off.
https://www.bansurveillanceadvertising.com/coalition-letter
#ban #surveillance #advertising #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Bansurveillanceadvertising
Coalition Letter
Leaders across a broad range of issues and industries are united in our concern for the safety of our communities and the health of democracy.
We’re all digital idiots
Our children seem to be the prime targets of digital overload, according to Michel Desmurget, research director at Lyon’s Institut des Sciences Cognitives. But what about adults, asks Desmurget in his latest book, La Fabrique du Crétin Digital?
It’s a question that’s worth asking, especially when it comes to the workplace. Why? Because homo sapiens’ craving for social relations and group life (which progressively shaped the society and organizations we know today) now seem to be turning against us. The most noticeable symptom is probably FOMO, our fear of missing out on information or being excluded (even temporarily) from a group that is engaged in discussion. This feeling of exclusion turn into an almost morbid fear, leading to a need to be constantly connected to social networks.
Of course, this dependence on networks is not necessarily pathological. Nevertheless, regardless of how connected we are, it’s interesting to ask ourselves questions about our own digital use. This is worthwhile because it means we can avoid a situation in which our digital tools — which are supposed to bring us wealth, joy, and greater efficiency — become synonymous with stress and hassle.
https://business-digest.eu/were-all-digital-idiots/?lang=en
#digital #idiots #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Our children seem to be the prime targets of digital overload, according to Michel Desmurget, research director at Lyon’s Institut des Sciences Cognitives. But what about adults, asks Desmurget in his latest book, La Fabrique du Crétin Digital?
It’s a question that’s worth asking, especially when it comes to the workplace. Why? Because homo sapiens’ craving for social relations and group life (which progressively shaped the society and organizations we know today) now seem to be turning against us. The most noticeable symptom is probably FOMO, our fear of missing out on information or being excluded (even temporarily) from a group that is engaged in discussion. This feeling of exclusion turn into an almost morbid fear, leading to a need to be constantly connected to social networks.
Of course, this dependence on networks is not necessarily pathological. Nevertheless, regardless of how connected we are, it’s interesting to ask ourselves questions about our own digital use. This is worthwhile because it means we can avoid a situation in which our digital tools — which are supposed to bring us wealth, joy, and greater efficiency — become synonymous with stress and hassle.
https://business-digest.eu/were-all-digital-idiots/?lang=en
#digital #idiots #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Business-Digest
We’re all digital idiots - Business-Digest
Our children seem to be the prime targets of digital overload, according to Michel Desmurget, research director at Lyon’s Institut des Sciences Cognitives. But what about adults, asks Desmurget in his latest book, La Fabrique du Crétin Digital?
Police bust 'world's biggest' video-game-cheat operation
A collaborative effort between Chinese police and gaming giant Tencent has led to the closure of what police say is the biggest ever video-game-cheat operation.
The gang designed and sold cheats to popular video games, including Overwatch and Call of Duty Mobile.
Roughly $76m (£55m) in revenue was made by the organisation which charged a subscription fee to clients.
Police seized assets worth $46m, including several luxury cars.
The operation was called "Chicken Drumstick", and had a website selling to "hundreds of countries and regions", local media reported.
Subscription prices for users began at around $10 a day, and up to $200 a month.
https://www.bbc.com/news/technology-56579449
#bust #police #video #game #cheats #ChickenDrumstick
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
A collaborative effort between Chinese police and gaming giant Tencent has led to the closure of what police say is the biggest ever video-game-cheat operation.
The gang designed and sold cheats to popular video games, including Overwatch and Call of Duty Mobile.
Roughly $76m (£55m) in revenue was made by the organisation which charged a subscription fee to clients.
Police seized assets worth $46m, including several luxury cars.
The operation was called "Chicken Drumstick", and had a website selling to "hundreds of countries and regions", local media reported.
Subscription prices for users began at around $10 a day, and up to $200 a month.
https://www.bbc.com/news/technology-56579449
#bust #police #video #game #cheats #ChickenDrumstick
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Bbc
Police bust 'world's biggest' video-game-cheat operation
Chinese police seize a collection of luxury sports cars in the raid.
Google Is Testing Its Controversial New Ad Targeting Tech in Millions of Browsers. Here’s What We Know.
Today, Google launched an “origin trial” of Federated Learning of Cohorts (aka FLoC), its experimental new technology for targeting ads. A switch has silently been flipped in millions of instances of Google Chrome: those browsers will begin sorting their users into groups based on behavior, then sharing group labels with third-party trackers and advertisers around the web. A random set of users have been selected for the trial, and they can currently only opt out by disabling third-party cookies.
Although Google announced this was coming, the company has been sparse with details about the trial until now. We’ve pored over blog posts, mailing lists, draft web standards, and Chromium’s source code to figure out exactly what’s going on.
EFF has already written that FLoC is a terrible idea. Google’s launch of this trial—without notice to the individuals who will be part of the test, much less their consent—is a concrete breach of user trust in service of a technology that should not exist.
Below we describe how this trial will work, and some of the most important technical details we’ve learned so far.
https://www.eff.org/deeplinks/2021/03/google-testing-its-controversial-new-ad-targeting-tech-millions-browsers-heres
#google #FLoC #chrome #browser #ad #targeting #tracking #cookies #DeleteGoogle #thinkabout
📡 @nogoolag @blackbox_archiv
Today, Google launched an “origin trial” of Federated Learning of Cohorts (aka FLoC), its experimental new technology for targeting ads. A switch has silently been flipped in millions of instances of Google Chrome: those browsers will begin sorting their users into groups based on behavior, then sharing group labels with third-party trackers and advertisers around the web. A random set of users have been selected for the trial, and they can currently only opt out by disabling third-party cookies.
Although Google announced this was coming, the company has been sparse with details about the trial until now. We’ve pored over blog posts, mailing lists, draft web standards, and Chromium’s source code to figure out exactly what’s going on.
EFF has already written that FLoC is a terrible idea. Google’s launch of this trial—without notice to the individuals who will be part of the test, much less their consent—is a concrete breach of user trust in service of a technology that should not exist.
Below we describe how this trial will work, and some of the most important technical details we’ve learned so far.
https://www.eff.org/deeplinks/2021/03/google-testing-its-controversial-new-ad-targeting-tech-millions-browsers-heres
#google #FLoC #chrome #browser #ad #targeting #tracking #cookies #DeleteGoogle #thinkabout
📡 @nogoolag @blackbox_archiv
Electronic Frontier Foundation
Google Is Testing Its Controversial New Ad Targeting Tech in Millions of Browsers. Here’s What We Know.
Update, April 9, 2021 : We've launched Am I FLoCed, a new site that will tell you whether your Chrome browser has been turned into a guinea pig for Federated Learning of Cohorts or FLoC, Google’s
What the hell is happening with Android One?
Google's once-pivotal program for exceptional yet affordable Android phones seems to be fading — and maybe for good reason.
Not long ago, a low-profile program called Android One looked like it could be just the one-two punch Android needed.
Android One, like lots of Google initiatives, has had a long and winding history with plenty of twists and turns. When Android One first came into the picture in 2014, it was described as an effort to "make high-quality smartphones accessible to as many people as possible." The focus was squarely on bringing affordable phones with exceptional experiences to emerging markets — places like Pakistan and India, where it could be "hard for people" to "get their hands on a high-quality smartphone," as Google put it at the time.
But that was just the start of Google's Android One ambitions. Three years later, in 2017, Google expanded the program with the launch of Android One phones in places like Japan, Taiwan, and eventually the United States. The company changed its description of the effort from that original small-scale focus to the much broader vision of a "collaboration between Google and [its] partners to deliver a software experience designed by Google," with a guarantee of reasonably timely ongoing operating system updates and an experience that'd be free from all the bloat and shenanigans baked into so many Android products.
https://telegra.ph/What-the-hell-is-happening-with-Android-One-03-31-2
via www.computerworld.com
#google #android1 #thinkabout
📡 @nogoolag @blackbox_archiv
Google's once-pivotal program for exceptional yet affordable Android phones seems to be fading — and maybe for good reason.
Not long ago, a low-profile program called Android One looked like it could be just the one-two punch Android needed.
Android One, like lots of Google initiatives, has had a long and winding history with plenty of twists and turns. When Android One first came into the picture in 2014, it was described as an effort to "make high-quality smartphones accessible to as many people as possible." The focus was squarely on bringing affordable phones with exceptional experiences to emerging markets — places like Pakistan and India, where it could be "hard for people" to "get their hands on a high-quality smartphone," as Google put it at the time.
But that was just the start of Google's Android One ambitions. Three years later, in 2017, Google expanded the program with the launch of Android One phones in places like Japan, Taiwan, and eventually the United States. The company changed its description of the effort from that original small-scale focus to the much broader vision of a "collaboration between Google and [its] partners to deliver a software experience designed by Google," with a guarantee of reasonably timely ongoing operating system updates and an experience that'd be free from all the bloat and shenanigans baked into so many Android products.
https://telegra.ph/What-the-hell-is-happening-with-Android-One-03-31-2
via www.computerworld.com
#google #android1 #thinkabout
📡 @nogoolag @blackbox_archiv
Telegraph
What the hell is happening with Android One?
Not long ago, a low-profile program called Android One looked like it could be just the one-two punch Android needed. Android One, like lots of Google initiatives, has had a long and winding history with plenty of twists and turns. When Android One first…
apple_google.pdf
1.4 MB
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google
We find that even when minimally configured and the handset is idle both iOS and Google Android share data with Apple/Google on average every 4.5 mins.
‼️ The phone IMEI, hardware serial number, SIM serial number and IMSI, handsetphone number etc are shared with Apple and Google. Both iOS and Google Android transmit telemetry, despite the user explicitly opting out of this.
💡 When a SIM is inserted both iOS and Google Android send details to Apple/Google. iOS sends the MAC addresses of nearby devices, e.g. other handsets and the home gateway, to Apple together with their GPS location. Currently there are few, if any, realistic options for preventing this data sharing.
https://www.scss.tcd.ie/doug.leith/apple_google.pdf
#apple #google #study #telemetry #data #mobilephones #pdf
📡 @nogoolag @blackbox_archiv
We find that even when minimally configured and the handset is idle both iOS and Google Android share data with Apple/Google on average every 4.5 mins.
‼️ The phone IMEI, hardware serial number, SIM serial number and IMSI, handsetphone number etc are shared with Apple and Google. Both iOS and Google Android transmit telemetry, despite the user explicitly opting out of this.
💡 When a SIM is inserted both iOS and Google Android send details to Apple/Google. iOS sends the MAC addresses of nearby devices, e.g. other handsets and the home gateway, to Apple together with their GPS location. Currently there are few, if any, realistic options for preventing this data sharing.
https://www.scss.tcd.ie/doug.leith/apple_google.pdf
#apple #google #study #telemetry #data #mobilephones #pdf
📡 @nogoolag @blackbox_archiv
88: Victor
Darknet Diaries - EP 88: Victor
Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.
https://darknetdiaries.com/episode/88/
https://nitter.pussthecat.org/0xDUDE
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.
https://darknetdiaries.com/episode/88/
https://nitter.pussthecat.org/0xDUDE
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
Joint Statement by Commissioner Reynders and Yoon Jong In, Chairperson of the Personal Information Protection Commission of the Republic of Korea
In their call today, Commissioner for Justice Didier Reynders and Chairperson of the Personal Information Protection Commission Yoon Jong In welcomed the successful conclusion of the adequacy talks between the European Union and the Republic of Korea.
The adequacy dialogue confirmed the high degree of convergence between the European Union and the Republic of Korea in the area of data protection, which increased further with the recent entry into force of the new Personal Information Protection Act in the Republic of Korea and the strengthening of the powers of the Personal Information Protection Commission.
Building on these similarities, which ensure the continuity of protection for the exchange of personal data, an adequacy finding will enable free and safe data flows from the EU to the Republic of Korea.
By covering both commercial operators and the public sector, such an adequacy finding will not only support business operators transferring personal data as part of their commercial operations, but also facilitate regulatory cooperation, to the benefit of both sides.
It will also complement the EU-Republic of Korea Free Trade Agreement and boost cooperation between the EU and the Republic of Korea as leading digital powers.
https://ec.europa.eu/commission/presscorner/detail/en/statement_21_1506
#statement #eu #korea #data #flows
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
In their call today, Commissioner for Justice Didier Reynders and Chairperson of the Personal Information Protection Commission Yoon Jong In welcomed the successful conclusion of the adequacy talks between the European Union and the Republic of Korea.
The adequacy dialogue confirmed the high degree of convergence between the European Union and the Republic of Korea in the area of data protection, which increased further with the recent entry into force of the new Personal Information Protection Act in the Republic of Korea and the strengthening of the powers of the Personal Information Protection Commission.
Building on these similarities, which ensure the continuity of protection for the exchange of personal data, an adequacy finding will enable free and safe data flows from the EU to the Republic of Korea.
By covering both commercial operators and the public sector, such an adequacy finding will not only support business operators transferring personal data as part of their commercial operations, but also facilitate regulatory cooperation, to the benefit of both sides.
It will also complement the EU-Republic of Korea Free Trade Agreement and boost cooperation between the EU and the Republic of Korea as leading digital powers.
https://ec.europa.eu/commission/presscorner/detail/en/statement_21_1506
#statement #eu #korea #data #flows
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
European Commission - European Commission
Press corner
Highlights, press releases and speeches
Microsoft wins $21.9 billion contract with U.S. Army to supply augmented reality headsets
(Reuters) - Microsoft Corp on Wednesday said it has won a deal to sell the U.S. Army augmented reality headsets based on its HoloLens product and backed by Azure cloud computing services.
Citing a Microsoft spokesperson, CNBC reported that the contract could be worth up to $21.88 billion over 10 years.
https://www.reuters.com/article/us-microsoft-army/microsoft-wins-21-9-billion-contract-with-u-s-army-to-supply-augmented-reality-headsets-idUSKBN2BN36B
#usa #microsoft #army #contract #augmented #reality
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
(Reuters) - Microsoft Corp on Wednesday said it has won a deal to sell the U.S. Army augmented reality headsets based on its HoloLens product and backed by Azure cloud computing services.
Citing a Microsoft spokesperson, CNBC reported that the contract could be worth up to $21.88 billion over 10 years.
https://www.reuters.com/article/us-microsoft-army/microsoft-wins-21-9-billion-contract-with-u-s-army-to-supply-augmented-reality-headsets-idUSKBN2BN36B
#usa #microsoft #army #contract #augmented #reality
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Reuters
Microsoft wins $21.9 billion contract with U.S. Army to supply augmented reality headsets
(Reuters) -Microsoft Corp on Wednesday said it has won a deal to sell the U.S. Army augmented reality headsets based on its HoloLens product and backed by Azure cloud computing services.
PHP releases on hold
As announced on the php.internals mailing list, a pair of malicious commits were made in the PHP source code repository over the weekend. These commits were immediately noticed and reverted, and thus never reached end users. The investigation into the root cause and exact scope of the compromise is still ongoing, therefore releases will be put on hold for two weeks assuming no further issues are discovered.
Thank you for bearing with us while we endeavor to ensure that PHP is a stable and reliable platform for web development.
https://www.php.net/archive/2021.php#2021-03-30-1
#php #malicious #commits #sourcecode #repository
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
As announced on the php.internals mailing list, a pair of malicious commits were made in the PHP source code repository over the weekend. These commits were immediately noticed and reverted, and thus never reached end users. The investigation into the root cause and exact scope of the compromise is still ongoing, therefore releases will be put on hold for two weeks assuming no further issues are discovered.
Thank you for bearing with us while we endeavor to ensure that PHP is a stable and reliable platform for web development.
https://www.php.net/archive/2021.php#2021-03-30-1
#php #malicious #commits #sourcecode #repository
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Tracing Paper
Color printers mark printouts with barely visible codes that are used to track down currency counterfeiters, as well as everyone else.
In 2017, when a National Security Agency (NSA) whistleblower wanted to extract classified government documents from her work computer, she sought refuge in the printed page. Maybe she thought physical paper would be safer from digital surveillance than an email. So she printed the documents at her office and then mailed them to The Intercept, which broke the news with the headline, “Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election” on June 5th, 2017 at 3:44 p.m. eastern time. A few hours later, the US Department of Justice officially announced their arrest of Reality Winner, a former US Air Force officer and NSA contractor.
What happened? The Intercept contacted the NSA on May 30th asking them to verify the documents. But by sending the scanned images that included each page’s wrinkles and folds, as opposed to retyping the information, the journalists shared more than they intended to: they sent the NSA the pale yellow tracking dots that are embedded in every piece of paper that is printed by a color laser printer. The dots form rectangular grids of rows and columns, with each dot’s position corresponding to the value of a date, time, or printer model.
Together, the rows and columns constitute a machine-readable bitmap known as a machine identification code (MIC). MIC grids repeat across the page so that even if only a shred of a page is recovered, the MIC on that shred can still be decoded and traced. While neither the Justice Department’s nor the FBI’s statements about Winner’s arrest mentioned MICs, security experts strongly suggested that they played a role in helping the agencies identify her and, at the very least, corroborated other evidence linking Winner to the leak.
https://logicmag.io/security/tracing-paper/
#tracing #paper #printers #digital #surveillance
📡 @nogoolag @blackbox_archiv
Color printers mark printouts with barely visible codes that are used to track down currency counterfeiters, as well as everyone else.
In 2017, when a National Security Agency (NSA) whistleblower wanted to extract classified government documents from her work computer, she sought refuge in the printed page. Maybe she thought physical paper would be safer from digital surveillance than an email. So she printed the documents at her office and then mailed them to The Intercept, which broke the news with the headline, “Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election” on June 5th, 2017 at 3:44 p.m. eastern time. A few hours later, the US Department of Justice officially announced their arrest of Reality Winner, a former US Air Force officer and NSA contractor.
What happened? The Intercept contacted the NSA on May 30th asking them to verify the documents. But by sending the scanned images that included each page’s wrinkles and folds, as opposed to retyping the information, the journalists shared more than they intended to: they sent the NSA the pale yellow tracking dots that are embedded in every piece of paper that is printed by a color laser printer. The dots form rectangular grids of rows and columns, with each dot’s position corresponding to the value of a date, time, or printer model.
Together, the rows and columns constitute a machine-readable bitmap known as a machine identification code (MIC). MIC grids repeat across the page so that even if only a shred of a page is recovered, the MIC on that shred can still be decoded and traced. While neither the Justice Department’s nor the FBI’s statements about Winner’s arrest mentioned MICs, security experts strongly suggested that they played a role in helping the agencies identify her and, at the very least, corroborated other evidence linking Winner to the leak.
https://logicmag.io/security/tracing-paper/
#tracing #paper #printers #digital #surveillance
📡 @nogoolag @blackbox_archiv
Logic(s) Magazine
Tracing Paper
A brief history of the secret plan to track every printed page.
California Suspended ‘Copyright Troll’ Malibu Media’s Corporate Status
California's Franchise Tax Board has suspended the corporate status of adult entertainment company Malibu Media. The Los Angeles company, which is known for suing alleged BitTorrent pirates, failed to meet its tax obligations. In light of this development, an accused file-sharer now wants the company's CEO Colette Pelissier to be added to a pending countersuit.
Just two years ago, Malibu Media was one of the most active ‘copyright trolls’ in the United States.
The Los Angeles-based company behind the ‘X-Art’ adult movies filed thousands of lawsuits targeting Internet subscribers whose accounts were allegedly used to share Malibu’s films via BitTorrent.
Then, seemingly out of nowhere, the lawsuits stopped. For more than a year there haven’t been any new John Doe complaints. In fact, the only notable case dates back to January 2020, when Malibu’s former law firm sued the company over breach of contract and unpaid bills.
This doesn’t mean that all outstanding “John Doe” cases have been resolved. At the time of writing, there are a few still pending. This includes one where Malibu Media has to defend itself against a counterclaim of abuse of process, among other things.
https://torrentfreak.com/california-has-suspended-copyright-troll-malibu-medias-corporate-status-210330/
#usa #california #malibu #copyright #troll
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
California's Franchise Tax Board has suspended the corporate status of adult entertainment company Malibu Media. The Los Angeles company, which is known for suing alleged BitTorrent pirates, failed to meet its tax obligations. In light of this development, an accused file-sharer now wants the company's CEO Colette Pelissier to be added to a pending countersuit.
Just two years ago, Malibu Media was one of the most active ‘copyright trolls’ in the United States.
The Los Angeles-based company behind the ‘X-Art’ adult movies filed thousands of lawsuits targeting Internet subscribers whose accounts were allegedly used to share Malibu’s films via BitTorrent.
Then, seemingly out of nowhere, the lawsuits stopped. For more than a year there haven’t been any new John Doe complaints. In fact, the only notable case dates back to January 2020, when Malibu’s former law firm sued the company over breach of contract and unpaid bills.
This doesn’t mean that all outstanding “John Doe” cases have been resolved. At the time of writing, there are a few still pending. This includes one where Malibu Media has to defend itself against a counterclaim of abuse of process, among other things.
https://torrentfreak.com/california-has-suspended-copyright-troll-malibu-medias-corporate-status-210330/
#usa #california #malibu #copyright #troll
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Torrentfreak
California Suspended 'Copyright Troll' Malibu Media's Corporate Status * TorrentFreak
California's Franchise Tax Board has suspended the corporate status of adult entertainment and 'copyright troll' company Malibu Media.
I Now Own the Coinhive Domain. Here's How I'm Fighting Cryptojacking and Doing Good Things with Content Security Policies.
If you've landed on this page because you saw a strange message on a completely different website then followed a link to here, drop a note to the site owner and let them know what happened. If, on the other hand, you're on this page because you're interested in reading about the illicit use of cryptomining on compromised websites and how through fortuitous circumstances, I now own coinhive.com and am doing something useful with it, read on.
You know how people don't like ads? Yeah, me either (at least not the spammy tracky ones that invade both your privacy and your bandwidth), but I also like free content on the web and therein lies the rub; how do content producers monetise their work if they can't put ads on pages? Well naturally, you "Monetize Your Business with Your Users' CPU Power" which was Coinhives's modus operandi. That's a link to the last snapshotted version on archive.org because if you go to coinhive.com today, you'll see nothing. The website is dead. However, it's now owned by me and it's just sitting there doing pretty much nothing other than serving a little bit of JavaScript. I'll come back to that shortly, let's return to the business model of Coinhive:
So, instead of serving ads you put a JavaScript based cryptominer on your victi... sorry - visitors - browsers then whilst they're sitting there reading your content, you're harvesting Monero coin on their machine. They're paying for the CPU cycles to put money into your pocket - ingenious! But there were two massive problems with this and the first one is probably obvious: it's a sleazy business model that (usually unknowingly) exploits people's electricity bills for the personal gain of the site operator. It might only be exploiting them a little bit (how much power can an in-browser JS cryptominer really draw?), but it still feels super shady. The second problem is that due to the anonymous nature of cryptocurrency, every hacker and their dog wanted to put Coinhive on any sites they were able to run their own arbitrary JavaScript on.
https://www.troyhunt.com/i-now-own-the-coinhive-domain-heres-how-im-fighting-cryptojacking-and-doing-good-things-with-content-security-policies/
#coinhive #cryptojacking
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
If you've landed on this page because you saw a strange message on a completely different website then followed a link to here, drop a note to the site owner and let them know what happened. If, on the other hand, you're on this page because you're interested in reading about the illicit use of cryptomining on compromised websites and how through fortuitous circumstances, I now own coinhive.com and am doing something useful with it, read on.
You know how people don't like ads? Yeah, me either (at least not the spammy tracky ones that invade both your privacy and your bandwidth), but I also like free content on the web and therein lies the rub; how do content producers monetise their work if they can't put ads on pages? Well naturally, you "Monetize Your Business with Your Users' CPU Power" which was Coinhives's modus operandi. That's a link to the last snapshotted version on archive.org because if you go to coinhive.com today, you'll see nothing. The website is dead. However, it's now owned by me and it's just sitting there doing pretty much nothing other than serving a little bit of JavaScript. I'll come back to that shortly, let's return to the business model of Coinhive:
So, instead of serving ads you put a JavaScript based cryptominer on your victi... sorry - visitors - browsers then whilst they're sitting there reading your content, you're harvesting Monero coin on their machine. They're paying for the CPU cycles to put money into your pocket - ingenious! But there were two massive problems with this and the first one is probably obvious: it's a sleazy business model that (usually unknowingly) exploits people's electricity bills for the personal gain of the site operator. It might only be exploiting them a little bit (how much power can an in-browser JS cryptominer really draw?), but it still feels super shady. The second problem is that due to the anonymous nature of cryptocurrency, every hacker and their dog wanted to put Coinhive on any sites they were able to run their own arbitrary JavaScript on.
https://www.troyhunt.com/i-now-own-the-coinhive-domain-heres-how-im-fighting-cryptojacking-and-doing-good-things-with-content-security-policies/
#coinhive #cryptojacking
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Troy Hunt
I Now Own the Coinhive Domain. Here's How I'm Fighting Cryptojacking and Doing Good Things with Content Security Policies.
If you've landed on this page because you saw a strange message on a completely different website then followed a link to here, drop a note to the site owner and let them know what happened. If, on the other hand, you're on this page because you're interested…