Facebook says it will ignore emergency data collection ban issued in Germany over WhatApp rules
Privacy watchdog is calling on GDPR regulators to enforce an EU-wide ban
A hot potato: Germany has banned Facebook from collecting data on WhatsApp users within its borders. The Hamburg Data Protection and Freedom of Information (HmbBfDI) commission claims that the app's new data collection policies and Facebook's heavy-handed efforts to get users to accept them violate the General Data Protection Regulation (GDPR).
Johannes Caspar, the commissioner of the HmbBfDI, indicated in a press release that Facebook has a history of user-privacy abuse, pointing to the Cambridge Analytica scandal and the recent leak of 500 million records. More urgently, Caspar fears that WhatsApp's less than transparent advertising policies will influence German elections coming up in September.
"The data protection scandals of the last few years from 'Cambridge Analytica' to the data leak that recently became known, which affected more than 500 million Facebook users, show the extent and the dangers of massive profiling," said Caspar. "This affects not only privacy but also the possibility of using profiles to influence voter decisions in order to manipulate democratic decisions. In view of the nearly 60 million WhatsApp users with a view to the upcoming federal elections in Germany in September 2021, the risk is all the more concrete, as these will arouse desires after influencing the opinion-forming of Facebook's advertisers."
https://www.techspot.com/news/89639-facebook-ignore-emergency-data-collection-ban-issued-germany.html
#whatsapp #DeleteWhatsApp #user #data #facebook #DeleteFacebook #gdpr #eu #germany
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Privacy watchdog is calling on GDPR regulators to enforce an EU-wide ban
A hot potato: Germany has banned Facebook from collecting data on WhatsApp users within its borders. The Hamburg Data Protection and Freedom of Information (HmbBfDI) commission claims that the app's new data collection policies and Facebook's heavy-handed efforts to get users to accept them violate the General Data Protection Regulation (GDPR).
Johannes Caspar, the commissioner of the HmbBfDI, indicated in a press release that Facebook has a history of user-privacy abuse, pointing to the Cambridge Analytica scandal and the recent leak of 500 million records. More urgently, Caspar fears that WhatsApp's less than transparent advertising policies will influence German elections coming up in September.
"The data protection scandals of the last few years from 'Cambridge Analytica' to the data leak that recently became known, which affected more than 500 million Facebook users, show the extent and the dangers of massive profiling," said Caspar. "This affects not only privacy but also the possibility of using profiles to influence voter decisions in order to manipulate democratic decisions. In view of the nearly 60 million WhatsApp users with a view to the upcoming federal elections in Germany in September 2021, the risk is all the more concrete, as these will arouse desires after influencing the opinion-forming of Facebook's advertisers."
https://www.techspot.com/news/89639-facebook-ignore-emergency-data-collection-ban-issued-germany.html
#whatsapp #DeleteWhatsApp #user #data #facebook #DeleteFacebook #gdpr #eu #germany
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
TechSpot
Germany issues emergency data collection ban against Facebook over WhatsApp rules [Updated]
Update (05/13/21): A WhatsApp spokesman reached out to TechSpot to clarify that the Hamburg DPA order does not impact the WhatsApp update as the DPA is raising...
92: The Pirate Bay
Darknet Diaries - Ep 92: The Pirate Bay
The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn’t store any of the copyrighted material. It just points the user to where you can download it from. So for a while The Pirate Bay has been the largest places you can find pirated movies, music, games, and apps. But this site first came up 2003. And is still up and operation now, 18 years later! You would think someone would shut this place down by now. How does the biggest source for copyrighted material stay up and online for that long? Listen to this episode to find out.
https://darknetdiaries.com/episode/92/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn’t store any of the copyrighted material. It just points the user to where you can download it from. So for a while The Pirate Bay has been the largest places you can find pirated movies, music, games, and apps. But this site first came up 2003. And is still up and operation now, 18 years later! You would think someone would shut this place down by now. How does the biggest source for copyrighted material stay up and online for that long? Listen to this episode to find out.
https://darknetdiaries.com/episode/92/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Ransomware crooks post cops’ psych evaluations after talks with DC police stall
Babuk demands $4 million, Metropolitan Police Department offers $100,000.
A ransomware gang that hacked the District of Columbia’s Metropolitan Police Department (MPD) in April posted personnel records on Tuesday that revealed highly sensitive details for almost two dozen officers, including the results of psychological assessments and polygraph tests; driver's license images; fingerprints; social security numbers; dates of birth; and residential, financial, and marriage histories.
The data, included in a 161MB download from a website on the dark web, was made available after negotiations broke down between members of the Babuk ransomware group and MPD officials, according to screenshots purporting to be chat transcripts between the two organizations. After earlier threatening to leak the names of confidential informants to crime gangs, the operators agreed to remove the data while they carried out the now-aborted negotiations, the transcripts showed.
https://arstechnica.com/gadgets/2021/05/ransomware-crooks-post-cops-psych-evaluations-after-talks-with-dc-police-stall/
#ransomware #babuk #usa #dc #police
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Babuk demands $4 million, Metropolitan Police Department offers $100,000.
A ransomware gang that hacked the District of Columbia’s Metropolitan Police Department (MPD) in April posted personnel records on Tuesday that revealed highly sensitive details for almost two dozen officers, including the results of psychological assessments and polygraph tests; driver's license images; fingerprints; social security numbers; dates of birth; and residential, financial, and marriage histories.
The data, included in a 161MB download from a website on the dark web, was made available after negotiations broke down between members of the Babuk ransomware group and MPD officials, according to screenshots purporting to be chat transcripts between the two organizations. After earlier threatening to leak the names of confidential informants to crime gangs, the operators agreed to remove the data while they carried out the now-aborted negotiations, the transcripts showed.
https://arstechnica.com/gadgets/2021/05/ransomware-crooks-post-cops-psych-evaluations-after-talks-with-dc-police-stall/
#ransomware #babuk #usa #dc #police
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Ars Technica
Ransomware crooks post cops’ psych evaluations after talks with DC police stall
Babuk demands $4 million, Metropolitan Police Department offers $100,000.
Brave — Stealing your cookies remotely
Brave for Android had a vulnerability that allowed a malicious web page to steal your cookies remotely. The vulnerability was reported through HackerOne and took 5 months to fix.
Introduction
During my research with Android applications, I found a few vulnerabilities in some of the most used browsers. When researching Brave, I noticed that it was using a Content Provider that was exposing all files from the public directory as well as its private files.
https://infosecwriteups.com/brave-stealing-your-cookies-remotely-1e09d1184675
#brave #browser #android #cookies #vulnerability
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Brave for Android had a vulnerability that allowed a malicious web page to steal your cookies remotely. The vulnerability was reported through HackerOne and took 5 months to fix.
Introduction
During my research with Android applications, I found a few vulnerabilities in some of the most used browsers. When researching Brave, I noticed that it was using a Content Provider that was exposing all files from the public directory as well as its private files.
https://infosecwriteups.com/brave-stealing-your-cookies-remotely-1e09d1184675
#brave #browser #android #cookies #vulnerability
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Medium
Brave — Stealing your cookies remotely
Brave for Android had a vulnerability that allowed a malicious webpage to steal your cookies remotely.
Media is too big
VIEW IN TELEGRAM
FragAttacks: Demonstration of Flaws in WPA2/3
This is not a "hacking" tutorial but a demonstration about academic IT security research. Made by Mathy Vanhoef of New York University and KU Leuven.
https://www.youtube.com/watch?v=88YZ4061tYw
💡 read as well: Collection of novel security vulnerabilities that affect Wi-Fi devices
https://t.iss.one/BlackBox_Archiv/2189
#fragattacks #wifi #security #vulnerabilities #exploit #educational #poc #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
This is not a "hacking" tutorial but a demonstration about academic IT security research. Made by Mathy Vanhoef of New York University and KU Leuven.
https://www.youtube.com/watch?v=88YZ4061tYw
💡 read as well: Collection of novel security vulnerabilities that affect Wi-Fi devices
https://t.iss.one/BlackBox_Archiv/2189
#fragattacks #wifi #security #vulnerabilities #exploit #educational #poc #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Determining The Extent Of Video Surveillance Through Google Street View Data
Google Street View’s continuous coverage of the world’s thoroughfares represents possibly the most complete, consistent and coherent visual record of global society, with the exception of countries that impose bans on the search giant’s roving data-gathering vehicles.
As a revenue-delivering contributor to Google Maps’ infrastructure, the Google Street View panopticon is a rich data seam for machine learning analysis. Besides its propensity to unwittingly capture criminal acts, it has been used to estimate regional income from car quality in Google Street View images, evaluate greenery in urban environments, identify utility poles, classify buildings and estimate the demographic make-up of US neighborhoods, among many other initiatives.
Google Street View’s continuous coverage of the world’s thoroughfares represents possibly the most complete, consistent and coherent visual record of global society, with the exception of countries that impose bans on the search giant’s roving data-gathering vehicles.
As a revenue-delivering contributor to Google Maps’ infrastructure, the Google Street View panopticon is a rich data seam for machine learning analysis. Besides its propensity to unwittingly capture criminal acts, it has been used to estimate regional income from car quality in Google Street View images, evaluate greenery in urban environments, identify utility poles, classify buildings and estimate the demographic make-up of US neighborhoods, among many other initiatives.
Limited Statistics On Surveillance Camera Diffusion In The United States
Despite wide usage of Google Maps’ data for socially aware machine learning initiatives, there are very few Street View-based datasets that include labeled examples of surveillance cameras. The Mapillary Vistas dataset is among the small number available that offer this functionality, though it includes less than 20 labeled public video cameras in the United States.
Much of the video surveillance infrastructure in the US only intersects the State when authorities demand corroborating footage after local incidents that may have been recorded. Beyond zoning regulations, and in the context of permissive privacy laws that do little to address private surveillance of public spaces, there is no federal administrative framework that can provide hard statistics on the number of public-facing cameras in the US.
Anecdotal data and limited surveys contend that video camera diffusion in the US may be on a par with China, but it’s not easy to prove.
https://www.unite.ai/determining-the-extent-of-video-surveillance-through-google-street-view-data/
#usa #video #surveillance #google #streetview
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Google Street View’s continuous coverage of the world’s thoroughfares represents possibly the most complete, consistent and coherent visual record of global society, with the exception of countries that impose bans on the search giant’s roving data-gathering vehicles.
As a revenue-delivering contributor to Google Maps’ infrastructure, the Google Street View panopticon is a rich data seam for machine learning analysis. Besides its propensity to unwittingly capture criminal acts, it has been used to estimate regional income from car quality in Google Street View images, evaluate greenery in urban environments, identify utility poles, classify buildings and estimate the demographic make-up of US neighborhoods, among many other initiatives.
Google Street View’s continuous coverage of the world’s thoroughfares represents possibly the most complete, consistent and coherent visual record of global society, with the exception of countries that impose bans on the search giant’s roving data-gathering vehicles.
As a revenue-delivering contributor to Google Maps’ infrastructure, the Google Street View panopticon is a rich data seam for machine learning analysis. Besides its propensity to unwittingly capture criminal acts, it has been used to estimate regional income from car quality in Google Street View images, evaluate greenery in urban environments, identify utility poles, classify buildings and estimate the demographic make-up of US neighborhoods, among many other initiatives.
Limited Statistics On Surveillance Camera Diffusion In The United States
Despite wide usage of Google Maps’ data for socially aware machine learning initiatives, there are very few Street View-based datasets that include labeled examples of surveillance cameras. The Mapillary Vistas dataset is among the small number available that offer this functionality, though it includes less than 20 labeled public video cameras in the United States.
Much of the video surveillance infrastructure in the US only intersects the State when authorities demand corroborating footage after local incidents that may have been recorded. Beyond zoning regulations, and in the context of permissive privacy laws that do little to address private surveillance of public spaces, there is no federal administrative framework that can provide hard statistics on the number of public-facing cameras in the US.
Anecdotal data and limited surveys contend that video camera diffusion in the US may be on a par with China, but it’s not easy to prove.
https://www.unite.ai/determining-the-extent-of-video-surveillance-through-google-street-view-data/
#usa #video #surveillance #google #streetview
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Unite.AI
Determining the Extent of Video Surveillance Through Google Street View Data - Unite.AI
Google Street View's continuous coverage of the world's thoroughfares represents possibly the most complete, consistent and coherent visual record of global society, with the exception of countries that impose bans on the search giant's roving data-gathering…
WhatsApp breaks App Store guidelines by limiting functionality for users who do not accept new privacy policy
Facebook’s WhatsApp has announced that users that don’t accept a new set of terms and conditions will be barred from certain features of the messaging app.
This move goes against Apple’s App Store policies, which explicitly state that such behavior is strictly prohibited.
If WhatsApp implements the announced changes, the app could be removed from the App Store.
WhatsApp’s controversial new privacy policy, which goes into effect on May 15th, 2021, will limit functionality on the app — such as the access to the contact/chat list and the primary screen of the app if users do not accept the privacy policy. If the user continues to refuse accepting, they will eventually lose access to calls, and will no longer receive notifications, rendering the app practically useless.
💡 Quoting the App Store guideline 3.2.2 (vi):
"Apps should allow a user to get what they’ve paid for without performing additional tasks, such as posting on social media, uploading contacts, checking in to the app a certain number of times, etc. Apps should not require users to rate the app, review the app, watch videos, download other apps, tap on advertisements, enable tracking, or take other similar actions in order to access functionality, content, use the app, or receive monetary or other compensation, including but not limited to gift cards and codes."
Therefore, WhatsApp’s actions are not allowed under the App Store guidelines, which could result in the removal of the app from the App Store, or termination of their developer account, according to Apple’s policies.
https://applescoop.org/story/whatsapp-breaks-app-store-guidelines-by-limiting-functionality-for-users-who-do-not-accept-new-privacy-policy
#apple #appstore #whatsapp #DeleteWhatsApp
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Facebook’s WhatsApp has announced that users that don’t accept a new set of terms and conditions will be barred from certain features of the messaging app.
This move goes against Apple’s App Store policies, which explicitly state that such behavior is strictly prohibited.
If WhatsApp implements the announced changes, the app could be removed from the App Store.
WhatsApp’s controversial new privacy policy, which goes into effect on May 15th, 2021, will limit functionality on the app — such as the access to the contact/chat list and the primary screen of the app if users do not accept the privacy policy. If the user continues to refuse accepting, they will eventually lose access to calls, and will no longer receive notifications, rendering the app practically useless.
💡 Quoting the App Store guideline 3.2.2 (vi):
"Apps should allow a user to get what they’ve paid for without performing additional tasks, such as posting on social media, uploading contacts, checking in to the app a certain number of times, etc. Apps should not require users to rate the app, review the app, watch videos, download other apps, tap on advertisements, enable tracking, or take other similar actions in order to access functionality, content, use the app, or receive monetary or other compensation, including but not limited to gift cards and codes."
Therefore, WhatsApp’s actions are not allowed under the App Store guidelines, which could result in the removal of the app from the App Store, or termination of their developer account, according to Apple’s policies.
https://applescoop.org/story/whatsapp-breaks-app-store-guidelines-by-limiting-functionality-for-users-who-do-not-accept-new-privacy-policy
#apple #appstore #whatsapp #DeleteWhatsApp
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
This media is not supported in your browser
VIEW IN TELEGRAM
Using a gaming mouse as a microphone
I wrote a small utility to read and amplify mouse movements, and the Logitech G502 Lightspeed mouse is so sensitive (25600 DPI) that it can sense sound, if loud enough. This is a quick demo.
👉🏼 Github repository of the utility is at
https://github.com/ortegaalfredo/mousemic
https://www.youtube.com/watch?v=ExfrCdW-Xwk
#gaming #mouse #microphone #sound #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
I wrote a small utility to read and amplify mouse movements, and the Logitech G502 Lightspeed mouse is so sensitive (25600 DPI) that it can sense sound, if loud enough. This is a quick demo.
👉🏼 Github repository of the utility is at
https://github.com/ortegaalfredo/mousemic
https://www.youtube.com/watch?v=ExfrCdW-Xwk
#gaming #mouse #microphone #sound #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
2105.02124.pdf
378.2 KB
Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine
https://arxiv.org/pdf/2105.02124.pdf
💡Computation - Finite and infinite Machines (Marvin L. Minsky)
https://regmedia.co.uk/2021/05/10/mit_minsky_paper.pdf
#arbitrary #code #execution #universal #turing #machine #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://arxiv.org/pdf/2105.02124.pdf
💡Computation - Finite and infinite Machines (Marvin L. Minsky)
https://regmedia.co.uk/2021/05/10/mit_minsky_paper.pdf
#arbitrary #code #execution #universal #turing #machine #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Disney Patents Blockchain-Based Movie Distribution System to Stop Pirates
As a prime content producer, Disney has a vested interest in keeping pirates at bay. The entertainment company is involved in various enforcement initiatives and a few days ago, added a new anti-piracy patent to its arsenal. With a blockchain-based distribution system, Disney hopes to make it harder for pirates to intercept films being distributed to movie theaters.
Disney is one of the best known brands in the world and the owner of an impressive collection of movies and TV shows.
New and old releases earn the company a healthy stream of revenue, both in movie theaters and through its own movie streaming service Disney+.
While there is plenty of competition from other movie studios, Disney’s single biggest threat appears to be piracy. To tackle this issue, Disney’s in-house anti-piracy team works around the clock, and the company takes part in the ACE coalition as well.
Disney’s Blockchain Anti-Piracy Patent
Through these anti-piracy efforts, Disney has helped to take down dozens of piracy sites and services. However, the media giant is also trying to be more proactive. A newly awarded patent proposes a blockchain-based media distribution system that aims to prevent early piracy leaks.
The patent in question, titled “Blockchain configuration for secure content delivery,” focuses on the distribution of content to movie theaters. This is a vulnerable process where pirates with the right connections can make copies during or after delivery.
https://torrentfreak.com/disney-patents-blockchain-based-movie-distribution-system-to-stop-pirates-210512/
💡 https://torrentfreak.com/images/disney-blockchain.pdf
#disney #blockchain #movie #pirates #antipiracy #patent #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
As a prime content producer, Disney has a vested interest in keeping pirates at bay. The entertainment company is involved in various enforcement initiatives and a few days ago, added a new anti-piracy patent to its arsenal. With a blockchain-based distribution system, Disney hopes to make it harder for pirates to intercept films being distributed to movie theaters.
Disney is one of the best known brands in the world and the owner of an impressive collection of movies and TV shows.
New and old releases earn the company a healthy stream of revenue, both in movie theaters and through its own movie streaming service Disney+.
While there is plenty of competition from other movie studios, Disney’s single biggest threat appears to be piracy. To tackle this issue, Disney’s in-house anti-piracy team works around the clock, and the company takes part in the ACE coalition as well.
Disney’s Blockchain Anti-Piracy Patent
Through these anti-piracy efforts, Disney has helped to take down dozens of piracy sites and services. However, the media giant is also trying to be more proactive. A newly awarded patent proposes a blockchain-based media distribution system that aims to prevent early piracy leaks.
The patent in question, titled “Blockchain configuration for secure content delivery,” focuses on the distribution of content to movie theaters. This is a vulnerable process where pirates with the right connections can make copies during or after delivery.
https://torrentfreak.com/disney-patents-blockchain-based-movie-distribution-system-to-stop-pirates-210512/
💡 https://torrentfreak.com/images/disney-blockchain.pdf
#disney #blockchain #movie #pirates #antipiracy #patent #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
Disney Patents Blockchain-Based Movie Distribution System to Stop Pirates * TorrentFreak
Disney has patented a blockchain-based system that makes it harder for pirates to intercept films being distributed to movie theaters.
DOS Gaming In Docker
Its been three decades since the height of the DOS era, and look how far we’ve come! A machine that used to cost $2,000 can be emulated - down to the processor! — in our web browsers while also checking email or watching a YouTube video. However, amidst these advancements, our old software falls by the wayside and stops working. Games are especially prone to this, since they often relied on incompatible tricks to eke out every ounce of performance from these old machines.
Many projects have sprung up to help preserve this heritage. DOSBox provides a modern, compatible environment for old games (and other software), while projects like the Internet Archive provide a massive library of DOS games, freely available to play in your browser. In my experience, they play pretty well!
However, I still miss those less-connected days of the early 90’s. I remember the thrill of riding my bike to the store to pick up a shareware copy of whatever game was available for $1. I then held a physical disk, with the game on it, ready to install on the nearest accessible computer. The self-contained nature of it all was magical. Nowadays, many web pages are bigger than the shareware games I used to buy.
This got me thinking: “Floppies can be imaged. That sounds kind of like a Docker image. I wonder… could I make DOS shareware Docker images?”
Turns out you can!
https://earthly.dev/blog/dos-gaming-in-docker/
#dos #gaming #docker
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Its been three decades since the height of the DOS era, and look how far we’ve come! A machine that used to cost $2,000 can be emulated - down to the processor! — in our web browsers while also checking email or watching a YouTube video. However, amidst these advancements, our old software falls by the wayside and stops working. Games are especially prone to this, since they often relied on incompatible tricks to eke out every ounce of performance from these old machines.
Many projects have sprung up to help preserve this heritage. DOSBox provides a modern, compatible environment for old games (and other software), while projects like the Internet Archive provide a massive library of DOS games, freely available to play in your browser. In my experience, they play pretty well!
However, I still miss those less-connected days of the early 90’s. I remember the thrill of riding my bike to the store to pick up a shareware copy of whatever game was available for $1. I then held a physical disk, with the game on it, ready to install on the nearest accessible computer. The self-contained nature of it all was magical. Nowadays, many web pages are bigger than the shareware games I used to buy.
This got me thinking: “Floppies can be imaged. That sounds kind of like a Docker image. I wonder… could I make DOS shareware Docker images?”
Turns out you can!
https://earthly.dev/blog/dos-gaming-in-docker/
#dos #gaming #docker
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Earthly Blog
DOS Gaming In Docker
Learn how to play classic DOS games in your web browser using Docker! This tutorial shows you how to create a Docker container with JS-DOS and a sh...
This media is not supported in your browser
VIEW IN TELEGRAM
Dreaming at Dusk
More than 15 years ago, Tor onion services were brought to digital life. An ecosystem of onions has been blooming ever since.
To commemorate this landmark in the history of privacy, we collaborated with @ixshells to create a one-of-a-kind digital artifact: a generative art piece derived using the private key of the very first onion service, duskgytldkxiuqc6.onion.
This auction benefits the Tor Project, the nonprofit protecting your human right to privacy.
https://foundation.app/torproject/dreaming-at-dusk-35855
#tor #project #network #onion #services #artifact
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
More than 15 years ago, Tor onion services were brought to digital life. An ecosystem of onions has been blooming ever since.
To commemorate this landmark in the history of privacy, we collaborated with @ixshells to create a one-of-a-kind digital artifact: a generative art piece derived using the private key of the very first onion service, duskgytldkxiuqc6.onion.
This auction benefits the Tor Project, the nonprofit protecting your human right to privacy.
https://foundation.app/torproject/dreaming-at-dusk-35855
#tor #project #network #onion #services #artifact
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom
(Bloomberg) -- Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack, underscoring the immense pressure faced by the Georgia-based operator to get gasoline and jet fuel flowing again to major cities along the Eastern Seaboard, those people said.Once they received the payment, the hackers provided the operator with a decrypting tool to restore its disabled computer network. The tool was so slow that the company continued using its own backups to help restore the system, one of the people familiar with the company’s efforts said.
A representative from Colonial declined to comment.
https://telegra.ph/Colonial-Pipeline-Paid-Hackers-Nearly-5-Million-in-Ransom-05-13
via finance.yahoo.com
💡 read as well:
https://www.nytimes.com/2021/05/13/technology/colonial-pipeline-ransom.html
#colonial #pipeline #hack #ransomware #darkside #cyberattacks
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
(Bloomberg) -- Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack, underscoring the immense pressure faced by the Georgia-based operator to get gasoline and jet fuel flowing again to major cities along the Eastern Seaboard, those people said.Once they received the payment, the hackers provided the operator with a decrypting tool to restore its disabled computer network. The tool was so slow that the company continued using its own backups to help restore the system, one of the people familiar with the company’s efforts said.
A representative from Colonial declined to comment.
https://telegra.ph/Colonial-Pipeline-Paid-Hackers-Nearly-5-Million-in-Ransom-05-13
via finance.yahoo.com
💡 read as well:
https://www.nytimes.com/2021/05/13/technology/colonial-pipeline-ransom.html
#colonial #pipeline #hack #ransomware #darkside #cyberattacks
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Telegraph
Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom
TipRanks Investing is all about profits, and part of generating profits is knowing when to start the game. The old adage says to buy low and sell high, and while it’s tempting just to discount cliches like that, they’ve passed into common currency because…
Exploiting custom protocol handlers for cross-browser tracking in Tor, Safari, Chrome and Firefox
In this article we introduce a scheme flooding vulnerability, explain how the exploit works across four major desktop browsers and show why it's a threat to anonymous browsing.
In our research into anti-fraud techniques, we have discovered a vulnerability that allows websites to identify users reliably across different desktop browsers and link their identities together. The desktop versions of Tor Browser, Safari, Chrome, and Firefox are all affected.
We will be referring to this vulnerability as scheme flooding, as it uses custom URL schemes as an attack vector. The vulnerability uses information about installed apps on your computer in order to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
💡 Test the vulnerability on our live demo site. (Works on desktop browsers only.)
https://schemeflood.com/
‼️ Why does this matter?
The scheme flooding vulnerability allows for third party tracking across different browsers and thus is a violation of privacy.
https://fingerprintjs.com/blog/external-protocol-flooding/
#browser #tracking #vulnerability #fingerprinting #tor #safari #chrome #firefox
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
In this article we introduce a scheme flooding vulnerability, explain how the exploit works across four major desktop browsers and show why it's a threat to anonymous browsing.
In our research into anti-fraud techniques, we have discovered a vulnerability that allows websites to identify users reliably across different desktop browsers and link their identities together. The desktop versions of Tor Browser, Safari, Chrome, and Firefox are all affected.
We will be referring to this vulnerability as scheme flooding, as it uses custom URL schemes as an attack vector. The vulnerability uses information about installed apps on your computer in order to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
💡 Test the vulnerability on our live demo site. (Works on desktop browsers only.)
https://schemeflood.com/
‼️ Why does this matter?
The scheme flooding vulnerability allows for third party tracking across different browsers and thus is a violation of privacy.
https://fingerprintjs.com/blog/external-protocol-flooding/
#browser #tracking #vulnerability #fingerprinting #tor #safari #chrome #firefox
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Fingerprint
Cross-browser tracking vulnerability in Tor, Safari, Chrome, and Firefox
Unveiling a scheme flooding vulnerability across major browsers. Learn how it threatens anonymous browsing.
Irish healthcare service targeted by "significant ransomware attack"
Ireland's health care service (HSE) announced on Friday that it has shut down its IT systems due to a "significant ransomware attack."
"There is a significant ransomware attack on HSE IT systems. We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us to fully assess the situation with our own security partners, HSE said on Twitter.
It added that the attack and decision to shut down its IT infrastructure had no impact on COVID-19 vaccinations or the dispatch of ambulances nationally.
Ransomware is a form of malware — malicious software — that encrypts a victim's files with the attacker demanding payment to unlock the data.
But some medical appointments were being cancelled on Friday morning with Dublin's Rotunda Hospital — which provides maternal care — announcing on Twitter that "due to a serious IT issue all outpatient visits are cancelled today — unless you are at 36 weeks pregnant or later." Paediatrics appointments were not affected.
https://www.euronews.com/2021/05/14/irish-healthcare-service-targeted-by-significant-ransomware-attack
#irland #ransomware #attack #healthcare
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Ireland's health care service (HSE) announced on Friday that it has shut down its IT systems due to a "significant ransomware attack."
"There is a significant ransomware attack on HSE IT systems. We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us to fully assess the situation with our own security partners, HSE said on Twitter.
It added that the attack and decision to shut down its IT infrastructure had no impact on COVID-19 vaccinations or the dispatch of ambulances nationally.
Ransomware is a form of malware — malicious software — that encrypts a victim's files with the attacker demanding payment to unlock the data.
But some medical appointments were being cancelled on Friday morning with Dublin's Rotunda Hospital — which provides maternal care — announcing on Twitter that "due to a serious IT issue all outpatient visits are cancelled today — unless you are at 36 weeks pregnant or later." Paediatrics appointments were not affected.
https://www.euronews.com/2021/05/14/irish-healthcare-service-targeted-by-significant-ransomware-attack
#irland #ransomware #attack #healthcare
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
euronews
Irish healthcare service targeted by 'significant ransomware attack'
Ireland's Health Service Executive said on Friday that it has shut down its IT systems as a precaution.
FBI Has Gained Access to Sci-Hub Founder’s Apple Account, Email Claims
Sci-Hub founder Alexandra Elbakyan reports that she has received a worrying email, ostensibly from Apple, revealing that law enforcement has demanded and gained access to her account data. The email indicates an FBI investigation although the precise nature of any inquiry remains unclear.
As the world’s leading distributor of millions of otherwise ‘paywalled’ research papers, Sci-Hub is often described as “The Pirate Bay of Science”.
At the same time as being loved by many academics and students, Sci-Hub has become public enemy #1 in publishing circles, with the major academic publishers doing everything in their power to shut the platform down, hinder access to it, and prevent its operator from communicating with the world.
A large proportion of that action has taken place via various lawsuits, including one currently pending in India, but other platforms have taken action too. In the UK, for example, a new blocking injunction was quietly passed early this year at the behest of Elsevier and Springer Nature and, in January, it was revealed that Twitter had suspended the official Sci-Hub account.
https://torrentfreak.com/fbi-has-gained-access-to-sci-hub-founders-apple-account-email-claims-210513/
#fbi #scihub #apple #account
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Sci-Hub founder Alexandra Elbakyan reports that she has received a worrying email, ostensibly from Apple, revealing that law enforcement has demanded and gained access to her account data. The email indicates an FBI investigation although the precise nature of any inquiry remains unclear.
As the world’s leading distributor of millions of otherwise ‘paywalled’ research papers, Sci-Hub is often described as “The Pirate Bay of Science”.
At the same time as being loved by many academics and students, Sci-Hub has become public enemy #1 in publishing circles, with the major academic publishers doing everything in their power to shut the platform down, hinder access to it, and prevent its operator from communicating with the world.
A large proportion of that action has taken place via various lawsuits, including one currently pending in India, but other platforms have taken action too. In the UK, for example, a new blocking injunction was quietly passed early this year at the behest of Elsevier and Springer Nature and, in January, it was revealed that Twitter had suspended the official Sci-Hub account.
https://torrentfreak.com/fbi-has-gained-access-to-sci-hub-founders-apple-account-email-claims-210513/
#fbi #scihub #apple #account
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
FBI Has Gained Access to Sci-Hub Founder's Apple Account, Email Claims * TorrentFreak
Sci-Hub founder Alexandra Elbakyan says she has received an email, ostensibly from Apple, indicating the FBI has gained access to her account.
Popular Russian hacking forum XSS bans all ransomware topics
One of the most popular Russian-speaking hacker forums, XSS, has banned all topics promoting ransomware to prevent unwanted attention.
XSS is a Russian-speaking hacking forum created to share knowledge about exploits, vulnerabilities, malware, and network penetration.
With the rise of ransomware, Ransomware-as-a-Service (RaaS) gangs, such as REvil, LockBit, DarkSide, Netwalker, Nefilim, have increasingly been using the forum to enlist new affiliates/partners to their operation.
After DarkSide encrypted Colonial Pipeline and disrupted the U.S. fuel pipeline's operation, law enforcement and security researchers have been increasingly scrutinizing the ransomware gang and sites that promote it.
In a forum post discovered by Advanced Intel's Yelisey Boguslavskiy, the owner of the XSS hacking forum, known as 'Admin,' posted today that forum topics promoting ransomware are no longer allowed at the site.
https://www.bleepingcomputer.com/news/security/popular-russian-hacking-forum-xss-bans-all-ransomware-topics/
#ransomware #xxs #russian #hacking #forum
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
One of the most popular Russian-speaking hacker forums, XSS, has banned all topics promoting ransomware to prevent unwanted attention.
XSS is a Russian-speaking hacking forum created to share knowledge about exploits, vulnerabilities, malware, and network penetration.
With the rise of ransomware, Ransomware-as-a-Service (RaaS) gangs, such as REvil, LockBit, DarkSide, Netwalker, Nefilim, have increasingly been using the forum to enlist new affiliates/partners to their operation.
After DarkSide encrypted Colonial Pipeline and disrupted the U.S. fuel pipeline's operation, law enforcement and security researchers have been increasingly scrutinizing the ransomware gang and sites that promote it.
In a forum post discovered by Advanced Intel's Yelisey Boguslavskiy, the owner of the XSS hacking forum, known as 'Admin,' posted today that forum topics promoting ransomware are no longer allowed at the site.
https://www.bleepingcomputer.com/news/security/popular-russian-hacking-forum-xss-bans-all-ransomware-topics/
#ransomware #xxs #russian #hacking #forum
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BleepingComputer
Popular Russian hacking forum XSS bans all ransomware topics
One of the most popular Russian-speaking hacker forums, XSS, has banned all topics promoting ransomware to prevent unwanted attention.
Facebook Loses Bid to Block Ruling on EU-U.S. Data Flows (Updated May 14, 2021)
Social-media company failed to block a privacy decision that could suspend its ability to send data about European users to U.S. computer servers
Facebook Inc. FB 2.42% lost a bid to block a European Union privacy decision that could suspend its ability to send data about European users to computer servers in the U.S., opening a pathway toward a precedent-setting interruption of its data flows.
Ireland’s High Court dismissed Friday all of Facebook’s procedural complaints about a preliminary decision on data flows that it received in August from Ireland’s Data Protection Commission. It rejected Facebook’s claims that the regulator had given it too little time to respond or issued a judgment prematurely.
The preliminary decision, which the court stayed in September pending its decision, could, if finalized, force the social-media company to suspend sending personal information about EU users to Facebook’s servers in the U.S.
To comply, Facebook would likely have to re-engineer its service to silo off most data it collects from European users, or stop serving them entirely, at least temporarily. In a securities filing this year, Facebook said that applying the regulator’s decision would “materially and adversely affect our business, financial condition and results of operations.”
While Friday’s court decision is a procedural one, the underlying questions are central to trans-Atlantic trade and the digital economy. Legal experts say the logic in Ireland’s provisional order could apply to other large tech companies that are subject to U.S. surveillance laws, such as cloud services and email providers—potentially leading to widespread disruption of trans-Atlantic data flows.
Ireland’s Data Protection Commission still needs to finalize its draft decision ordering a suspension of data transfers and submit it to other EU privacy regulators for approval before it becomes effective. That process could take months, before counting any further court challenges.
https://telegra.ph/Facebook-Loses-Bid-to-Block-Ruling-on-EU-US-Data-Flows-05-14
via www.wsj.com
#facebook #DeleteFacebook #eu #usa #dataflows
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Social-media company failed to block a privacy decision that could suspend its ability to send data about European users to U.S. computer servers
Facebook Inc. FB 2.42% lost a bid to block a European Union privacy decision that could suspend its ability to send data about European users to computer servers in the U.S., opening a pathway toward a precedent-setting interruption of its data flows.
Ireland’s High Court dismissed Friday all of Facebook’s procedural complaints about a preliminary decision on data flows that it received in August from Ireland’s Data Protection Commission. It rejected Facebook’s claims that the regulator had given it too little time to respond or issued a judgment prematurely.
The preliminary decision, which the court stayed in September pending its decision, could, if finalized, force the social-media company to suspend sending personal information about EU users to Facebook’s servers in the U.S.
To comply, Facebook would likely have to re-engineer its service to silo off most data it collects from European users, or stop serving them entirely, at least temporarily. In a securities filing this year, Facebook said that applying the regulator’s decision would “materially and adversely affect our business, financial condition and results of operations.”
While Friday’s court decision is a procedural one, the underlying questions are central to trans-Atlantic trade and the digital economy. Legal experts say the logic in Ireland’s provisional order could apply to other large tech companies that are subject to U.S. surveillance laws, such as cloud services and email providers—potentially leading to widespread disruption of trans-Atlantic data flows.
Ireland’s Data Protection Commission still needs to finalize its draft decision ordering a suspension of data transfers and submit it to other EU privacy regulators for approval before it becomes effective. That process could take months, before counting any further court challenges.
https://telegra.ph/Facebook-Loses-Bid-to-Block-Ruling-on-EU-US-Data-Flows-05-14
via www.wsj.com
#facebook #DeleteFacebook #eu #usa #dataflows
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Telegraph
Facebook Loses Bid to Block Ruling on EU-U.S. Data Flows
Facebook Inc. FB 2.37% lost a bid to block a European Union privacy decision that could suspend its ability to send data about European users to computer servers in the U.S., opening a pathway toward a precedent-setting interruption of its data flows. Ireland’s…
DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized
The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.
“Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.
https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/
#darkside #ransomware #servers #bitcoin #seized
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.
“Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.
https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/
#darkside #ransomware #servers #bitcoin #seized
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Unstoppable Domains and Brave to Provide Millions of Users Access to the Decentralized Web
More than 30,000 decentralized websites and 700,000 blockchain domain names are now accessible by Brave users
SAN FRANCISCO — May 13, 2021 — Blockchain domain name provider Unstoppable Domains today announced a collaboration with privacy-oriented web browser Brave that enables native browser support for the crypto domain name company. With the latest Brave browser update, Brave users on desktop and Android platforms have access to 30,000 decentralized websites and 700,000 blockchain domain names registered with Unstoppable Domains.
“We are excited to work with Unstoppable Domains to enable decentralized DNS to a wider audience. At Brave, we see Web3 as a stepping stone to the future of digital ownership and decentralization,” said Brian Bondy, co-founder and CTO of Brave. “Unstoppable Domains was a natural fit for us, giving our users access to the decentralized web with the ability to visit any .crypto domain name. From registering .crypto domains to hosting an NFT art gallery, to sending and receiving crypto, the possibilities are limitless for Brave users.”
Launched in 2018, Unstoppable Domains provides .crypto and other top-level domain names to users with no renewal fees. When a user claims a domain, it is minted as an NFT on the Ethereum blockchain, granting the user full ownership and control. These .crypto domain names can point to content hosted on the Web, IPFS, or to cryptocurrency addresses, making it easy to send and receive over 70 different cryptocurrencies across 40+ cryptocurrency wallets and exchanges, including Coinbase Wallet, Litewallet, OKEx and MyEtherWallet.
“We’re on a mission to onboard three billion people to the decentralized web, and Brave is bringing us millions of people closer to that goal. We see Web3 as the future of the internet, where everyone has ownership and control of their own content,” said Matthew Gould, Co-Founder and CEO of Unstoppable Domains. “Brave’s integration with Unstoppable Domains means easy access to the decentralized internet without the hassle of browser extensions or custom DNS settings.”
Through this integration, the Brave browser is supporting a decentralized network not part of the traditional Domain Name Service (DNS), which is increasingly susceptible to hijacking, denial-of-service attacks, and phishing attacks. Unstoppable Domains allows users to build and host decentralized websites for a variety of use cases, including creating NFT galleries, video, and file sharing.
https://brave.com/unstoppable-domains/
#brave #browser #unstoppable #domains
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
More than 30,000 decentralized websites and 700,000 blockchain domain names are now accessible by Brave users
SAN FRANCISCO — May 13, 2021 — Blockchain domain name provider Unstoppable Domains today announced a collaboration with privacy-oriented web browser Brave that enables native browser support for the crypto domain name company. With the latest Brave browser update, Brave users on desktop and Android platforms have access to 30,000 decentralized websites and 700,000 blockchain domain names registered with Unstoppable Domains.
“We are excited to work with Unstoppable Domains to enable decentralized DNS to a wider audience. At Brave, we see Web3 as a stepping stone to the future of digital ownership and decentralization,” said Brian Bondy, co-founder and CTO of Brave. “Unstoppable Domains was a natural fit for us, giving our users access to the decentralized web with the ability to visit any .crypto domain name. From registering .crypto domains to hosting an NFT art gallery, to sending and receiving crypto, the possibilities are limitless for Brave users.”
Launched in 2018, Unstoppable Domains provides .crypto and other top-level domain names to users with no renewal fees. When a user claims a domain, it is minted as an NFT on the Ethereum blockchain, granting the user full ownership and control. These .crypto domain names can point to content hosted on the Web, IPFS, or to cryptocurrency addresses, making it easy to send and receive over 70 different cryptocurrencies across 40+ cryptocurrency wallets and exchanges, including Coinbase Wallet, Litewallet, OKEx and MyEtherWallet.
“We’re on a mission to onboard three billion people to the decentralized web, and Brave is bringing us millions of people closer to that goal. We see Web3 as the future of the internet, where everyone has ownership and control of their own content,” said Matthew Gould, Co-Founder and CEO of Unstoppable Domains. “Brave’s integration with Unstoppable Domains means easy access to the decentralized internet without the hassle of browser extensions or custom DNS settings.”
Through this integration, the Brave browser is supporting a decentralized network not part of the traditional Domain Name Service (DNS), which is increasingly susceptible to hijacking, denial-of-service attacks, and phishing attacks. Unstoppable Domains allows users to build and host decentralized websites for a variety of use cases, including creating NFT galleries, video, and file sharing.
https://brave.com/unstoppable-domains/
#brave #browser #unstoppable #domains
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Brave
Unstoppable Domains and Brave to Provide Millions of Users Access to the Decentralized Web | Brave
Blockchain domain name provider Unstoppable Domains today announced a collaboration with privacy-oriented web browser Brave that enables native browser support for the crypto domain name company.
Media is too big
VIEW IN TELEGRAM
Getting Started with Qubes OS
Qubes is "a reasonably secure operating system" designed to help take advantage of security by compartmentalization by running virtual machines on a Xen hypervisor to isolate your activities. This OS is great for those concerned with security, and privacy given the Whonix integration out of the box. In this video we'll look at how to install and get started using Qubes.
https://www.youtube.com/watch?v=FOdn2pZN9zw
#qubesOS #qubes #guide #video #hakbyte
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Qubes is "a reasonably secure operating system" designed to help take advantage of security by compartmentalization by running virtual machines on a Xen hypervisor to isolate your activities. This OS is great for those concerned with security, and privacy given the Whonix integration out of the box. In this video we'll look at how to install and get started using Qubes.
https://www.youtube.com/watch?v=FOdn2pZN9zw
#qubesOS #qubes #guide #video #hakbyte
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv