Facial recognition, fake identities and digital surveillance tools: Inside the post office's covert internet operations program
The post office’s law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies. Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software, according to interviews and documents reviewed by Yahoo News.
Among the tools used by the analysts is Clearview AI, a facial recognition software that scrapes images off public websites, a practice that has raised the ire of privacy advocates. The U.S. Postal Inspection Service uses Clearview’s facial recognition database of over 3 billion images “to help identify unknown targets in an investigation or locate additional social media accounts for known individuals,” according to materials reviewed by Yahoo News.
https://telegra.ph/Facial-recognition-fake-identities-and-digital-surveillance-tools-Inside-the-post-offices-covert-internet-operations-program-05-20
via www.aol.com
#facial #recognition #digital #surveillance #post #office #internet #usa
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The post office’s law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies. Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software, according to interviews and documents reviewed by Yahoo News.
Among the tools used by the analysts is Clearview AI, a facial recognition software that scrapes images off public websites, a practice that has raised the ire of privacy advocates. The U.S. Postal Inspection Service uses Clearview’s facial recognition database of over 3 billion images “to help identify unknown targets in an investigation or locate additional social media accounts for known individuals,” according to materials reviewed by Yahoo News.
https://telegra.ph/Facial-recognition-fake-identities-and-digital-surveillance-tools-Inside-the-post-offices-covert-internet-operations-program-05-20
via www.aol.com
#facial #recognition #digital #surveillance #post #office #internet #usa
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Telegraph
Facial recognition, fake identities and digital surveillance tools: Inside the post office's covert internet operations program
The post office’s law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies.…
Media is too big
VIEW IN TELEGRAM
Can a Spreadsheet Really Destroy Your Computer?
Can opening the wrong document really destroy your computer? We explore what could happen if a malicious office macro is lurking a document you open.
https://www.youtube.com/watch?v=_1CqDcqcWGs
#spreadsheet #macros #malicious #hak5 #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Can opening the wrong document really destroy your computer? We explore what could happen if a malicious office macro is lurking a document you open.
https://www.youtube.com/watch?v=_1CqDcqcWGs
#spreadsheet #macros #malicious #hak5 #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Now Your Car is a Cybersecurity Risk, Too
💡 Cybersecurity in the auto industry is much more complex than smartphones and PCs for two main reasons:
👉🏼 The dozens of ECUs in each vehicle connected via multiple electronic buses with different speeds and characteristics, and
👉🏼 the multiple potential in-car and remote access points such as OBDII, USB and SD ports, keyless entry, Bluetooth and Wi-Fi, embedded modem, sensors, infotainment or smartphone apps and the multiple connections via telematics and other cloud systems that access car systems.
https://www.eetimes.com/now-your-car-is-a-cybersecurity-risk-too/
#cybersecurity #cyberattacks #cars
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
💡 Cybersecurity in the auto industry is much more complex than smartphones and PCs for two main reasons:
👉🏼 The dozens of ECUs in each vehicle connected via multiple electronic buses with different speeds and characteristics, and
👉🏼 the multiple potential in-car and remote access points such as OBDII, USB and SD ports, keyless entry, Bluetooth and Wi-Fi, embedded modem, sensors, infotainment or smartphone apps and the multiple connections via telematics and other cloud systems that access car systems.
https://www.eetimes.com/now-your-car-is-a-cybersecurity-risk-too/
#cybersecurity #cyberattacks #cars
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Inside the Bubble at Facebook
This is part 1 in my Truth Distortion Field series.
In March 2018, BuzzFeed published a leaked Facebook memo about their “growth at all costs” mentality, igniting a firestorm about Facebook’s long-standing attitude towards challenges like fake news, filter bubbles, and state actors.
As in any media frenzy, unfair criticisms were voiced — but at the core of the debate was a truth that has had Facebook employees thinking more deeply than ever before about the implications of their company's products.
This wake-up call has been nearly a decade in the making. For the last several years, I’ve tried to understand why certain Facebook executives have been mistaken for so long about the negative impacts of their product and how the truth distortion field at any large company can overtly — and more often, subtly — distort how employees think.
https://www.nemil.com/tdf/part1-employees.html
#facebook #DeleteFacebook #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
This is part 1 in my Truth Distortion Field series.
In March 2018, BuzzFeed published a leaked Facebook memo about their “growth at all costs” mentality, igniting a firestorm about Facebook’s long-standing attitude towards challenges like fake news, filter bubbles, and state actors.
As in any media frenzy, unfair criticisms were voiced — but at the core of the debate was a truth that has had Facebook employees thinking more deeply than ever before about the implications of their company's products.
This wake-up call has been nearly a decade in the making. For the last several years, I’ve tried to understand why certain Facebook executives have been mistaken for so long about the negative impacts of their product and how the truth distortion field at any large company can overtly — and more often, subtly — distort how employees think.
https://www.nemil.com/tdf/part1-employees.html
#facebook #DeleteFacebook #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Facebook Still ‘Secretly’ Tracks Your iPhone—This Is How To Stop It
So, this isn’t good. Your iPhone settings enable you to tell Facebook you don’t want your location tracked. It’s clear and non-ambiguous. Why then, if you tell Facebook “never” to access your location, is the data harvesting giant doing exactly that?
...(...)
Despite me telling my iPhone “never” to allow Facebook access to my location, despite me checking Facebook online to confirm it knows “location history for mobile devices” is set to “off.” Facebook continues to exploit a loophole, harvesting photo location tags and IP addresses, all of which it will, in its own words, “collect and process.”
I took a photo with my iPhone and then uploaded that to my Facebook account. I used Facebook’s app on my iPhone, the same app that has been told “never” to access my location, the same account that knows I have this switched off. But Facebook still collects the location tag from that photo, along with my IP address.
My iPhone adds GPS tags to photos—useful to sort and find images. I can use the share function in Apple Photos to strip location data as I send, and most messengers strip this data, but in Facebook’s app, when I upload a photo, the data is sent as well.
Facebook and Instagram do in fact strip the metadata, the so-called EXIF information, from photos that are saved to their platforms. You can see this, because if you save a photo from Instagram or your Facebook albums onto your phone, there will be no location information. That has been replaced with Facebook’s own codes.
And so, you might assume that Facebook has deleted this data. Wrong. If you go to your Facebook privacy settings and select “your Facebook information,” you can download a copy of the data it holds. If you select “photos and videos,” you will see the data that Facebook saved from the images you uploaded.
In the case of this specific photo, the one just uploaded from my iPhone, that data includes a very precise location and my “upload IP address.” Facebook doesn’t need any more than that. If I type those lat/long co-ordinates into Google Maps, I get an exact match to my location, and Google’s Street View shows me the front of my house. As you can imagine, this is not the kind of privacy I had in mind.
https://www.forbes.com/sites/zakdoffman/2021/05/22/apple-user-warning-how-to-stop-facebook-secretly-tracking-your-iphone-ipad/
#facebook #DeleteFacebook #iphone #apple #privacy #data
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
So, this isn’t good. Your iPhone settings enable you to tell Facebook you don’t want your location tracked. It’s clear and non-ambiguous. Why then, if you tell Facebook “never” to access your location, is the data harvesting giant doing exactly that?
...(...)
Despite me telling my iPhone “never” to allow Facebook access to my location, despite me checking Facebook online to confirm it knows “location history for mobile devices” is set to “off.” Facebook continues to exploit a loophole, harvesting photo location tags and IP addresses, all of which it will, in its own words, “collect and process.”
I took a photo with my iPhone and then uploaded that to my Facebook account. I used Facebook’s app on my iPhone, the same app that has been told “never” to access my location, the same account that knows I have this switched off. But Facebook still collects the location tag from that photo, along with my IP address.
My iPhone adds GPS tags to photos—useful to sort and find images. I can use the share function in Apple Photos to strip location data as I send, and most messengers strip this data, but in Facebook’s app, when I upload a photo, the data is sent as well.
Facebook and Instagram do in fact strip the metadata, the so-called EXIF information, from photos that are saved to their platforms. You can see this, because if you save a photo from Instagram or your Facebook albums onto your phone, there will be no location information. That has been replaced with Facebook’s own codes.
And so, you might assume that Facebook has deleted this data. Wrong. If you go to your Facebook privacy settings and select “your Facebook information,” you can download a copy of the data it holds. If you select “photos and videos,” you will see the data that Facebook saved from the images you uploaded.
In the case of this specific photo, the one just uploaded from my iPhone, that data includes a very precise location and my “upload IP address.” Facebook doesn’t need any more than that. If I type those lat/long co-ordinates into Google Maps, I get an exact match to my location, and Google’s Street View shows me the front of my house. As you can imagine, this is not the kind of privacy I had in mind.
https://www.forbes.com/sites/zakdoffman/2021/05/22/apple-user-warning-how-to-stop-facebook-secretly-tracking-your-iphone-ipad/
#facebook #DeleteFacebook #iphone #apple #privacy #data
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Forbes
Facebook Tracks Your iPhone Location—This Is How To Stop It
If you think Facebook can no longer track your iPhone, then you're wrong...
Federal Court of Justice (Germany): Secure e-mail service Tutanota must allow surveillance
On its tour of courts, e-mail service provider Tutao has arrived at the Federal Supreme Court.
Tutao GmbH must comply with a ruling by the BGH's investigating judge and allow the monitoring of two e-mail addresses. This is according to a decision of the 3rd Criminal Senate of the Federal Court of Justice dated April 28, 2021, which is available to heise online (2 BJs 366/19-9 VS-NfD). The complaint of Tutao GmbH is admissible, but unfounded.
The order of telecommunications surveillance and recording objected to by Tutao is lawful, the decision states. It does not matter whether the company provides telecommunications services within the meaning of Section 3 No. 24 TKG, i.e. services that consist entirely or predominantly of the transmission of signals via telecommunications networks.
According to Paragraph 100a, Section 1, Sentence 1 of the German Code of Criminal Procedure, telecommunications must be monitored and recorded under certain circumstances, the Criminal Senate further explains. According to paragraph 4 of the same section, every telecommunications service provider must allow courts, public prosecutors' offices and the police to conduct surveillance.
https://justice.digital/2021/05/22/federal-court-of-justice-tutanota-secure-e-mail-service-must-enable-surveillance/
https://www.heise.de/news/Bundesgerichtshof-Sicherer-E-Mail-Dienst-Tutanota-muss-Ueberwachung-ermoeglichen-6051834.html
#tutanota #email #surveillance #germany
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
On its tour of courts, e-mail service provider Tutao has arrived at the Federal Supreme Court.
Tutao GmbH must comply with a ruling by the BGH's investigating judge and allow the monitoring of two e-mail addresses. This is according to a decision of the 3rd Criminal Senate of the Federal Court of Justice dated April 28, 2021, which is available to heise online (2 BJs 366/19-9 VS-NfD). The complaint of Tutao GmbH is admissible, but unfounded.
The order of telecommunications surveillance and recording objected to by Tutao is lawful, the decision states. It does not matter whether the company provides telecommunications services within the meaning of Section 3 No. 24 TKG, i.e. services that consist entirely or predominantly of the transmission of signals via telecommunications networks.
According to Paragraph 100a, Section 1, Sentence 1 of the German Code of Criminal Procedure, telecommunications must be monitored and recorded under certain circumstances, the Criminal Senate further explains. According to paragraph 4 of the same section, every telecommunications service provider must allow courts, public prosecutors' offices and the police to conduct surveillance.
https://justice.digital/2021/05/22/federal-court-of-justice-tutanota-secure-e-mail-service-must-enable-surveillance/
https://www.heise.de/news/Bundesgerichtshof-Sicherer-E-Mail-Dienst-Tutanota-muss-Ueberwachung-ermoeglichen-6051834.html
#tutanota #email #surveillance #germany
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
heise online
Bundesgerichtshof: Sicherer E-Mail-Dienst Tutanota muss Überwachung ermöglichen
Auf seiner Tournee durch Gerichte ist der E-Mail-Dienstleister Tutao beim Bundesgerichtshof angekommen.
If Apple is the only organisation capable of defending our privacy, it really is time to worry
A giant private company is doing the work governments should be doing on regulation of user data. That’s not a good thing
A few weeks ago, Apple dropped its long-promised bombshell on the data-tracking industry. The latest version (14.5) of iOS – the operating system of the iPhone – included a provision that required app users explicitly to confirm that they wished to be tracked across the internet in their online activities. At the heart of the switch is a code known as “the identifier for advertisers” or IDFA. It turns out that every iPhone comes with one of these identifiers, the object of which is to provide hucksters with aggregate data about the user’s interests. For years, iPhone users had had the option to switch it off by digging into the privacy settings of their devices, but, because they’re human, very few had bothered to do that.
From 14.5 onwards, however, they couldn’t avoid making a decision and you didn’t have to be a Nobel laureate to guess that most iPhone users would opt out. Which explains why those who profit from the data-tracking racket had for months been going apeshit about Apple’s perfidy. Some of the defensive PR mounted on their behalf, for example Facebook’s weeping about the impact on small, defenceless businesses, defied parody. Other counteroffensives included attacks on Apple’s monopolistic control over its App store and charges of rank hypocrisy – that changes in version 14.5 were not motivated by Apple’s concerns for users’ privacy but by its own plans to enter the advertising business. And so on.
It will be a while until we know for sure whether the apocalyptic fears of the data-trackers were accurate. It takes time for most iPhone users to install operating system updates and so these are still relatively early days. But the first figures are promising. One data analytics company, for example, has found that in the early weeks the daily opt-out rate for American users has been about 94%. This is much higher than surveys conducted in the run-up to the change had suggested – one had estimated an opt-out rate closer to 60%.
If the opt-out rate is as high as we’ve seen so far, then it’s bad news for the data-tracking racket, which the Financial Times estimates to be a $350bn industry, and good news for humanity.
https://www.theguardian.com/commentisfree/2021/may/22/if-apple-is-the-only-organisation-capable-of-defending-our-privacy-it-really-is-time-to-worry
#opinion #apple #privacy
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A giant private company is doing the work governments should be doing on regulation of user data. That’s not a good thing
A few weeks ago, Apple dropped its long-promised bombshell on the data-tracking industry. The latest version (14.5) of iOS – the operating system of the iPhone – included a provision that required app users explicitly to confirm that they wished to be tracked across the internet in their online activities. At the heart of the switch is a code known as “the identifier for advertisers” or IDFA. It turns out that every iPhone comes with one of these identifiers, the object of which is to provide hucksters with aggregate data about the user’s interests. For years, iPhone users had had the option to switch it off by digging into the privacy settings of their devices, but, because they’re human, very few had bothered to do that.
From 14.5 onwards, however, they couldn’t avoid making a decision and you didn’t have to be a Nobel laureate to guess that most iPhone users would opt out. Which explains why those who profit from the data-tracking racket had for months been going apeshit about Apple’s perfidy. Some of the defensive PR mounted on their behalf, for example Facebook’s weeping about the impact on small, defenceless businesses, defied parody. Other counteroffensives included attacks on Apple’s monopolistic control over its App store and charges of rank hypocrisy – that changes in version 14.5 were not motivated by Apple’s concerns for users’ privacy but by its own plans to enter the advertising business. And so on.
It will be a while until we know for sure whether the apocalyptic fears of the data-trackers were accurate. It takes time for most iPhone users to install operating system updates and so these are still relatively early days. But the first figures are promising. One data analytics company, for example, has found that in the early weeks the daily opt-out rate for American users has been about 94%. This is much higher than surveys conducted in the run-up to the change had suggested – one had estimated an opt-out rate closer to 60%.
If the opt-out rate is as high as we’ve seen so far, then it’s bad news for the data-tracking racket, which the Financial Times estimates to be a $350bn industry, and good news for humanity.
https://www.theguardian.com/commentisfree/2021/may/22/if-apple-is-the-only-organisation-capable-of-defending-our-privacy-it-really-is-time-to-worry
#opinion #apple #privacy
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
the Guardian
If Apple is the only outfit capable of defending our privacy, it really is time to worry | John Naughton
A giant private company is doing the work governments should be doing on regulation of user data. That’s not a good thing
Columbia Engineering Team Builds First Hacker-resistant Cloud Software System
As the first system to guarantee the security of virtual machines in the cloud, SeKVM could transform how cloud services are designed, developed, deployed, and trusted
New York, NY—May 24, 2021—Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety and security of the data of its millions of customers is essential. This is true for large and small organizations alike. But up to now, there has been no way to guarantee that a software system is secure from bugs, hackers, and vulnerabilities.
Columbia Engineering researchers may have solved this security issue. They have developed SeKVM, the first system that guarantees--through a mathematical proof--the security of virtual machines in the cloud. In a new paper to be presented on May 26, 2021, at the 42nd IEEE Symposium on Security & Privacy, the researchers hope to lay the foundation for future innovations in system software verification, leading to a new generation of cyber-resilient system software.
SeKVM is the first formally verified system for cloud computing. Formal verification is a critical step as it is the process of proving that software is mathematically correct, that the program’s code works as it should, and there are no hidden security bugs to worry about.
“This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure,” said Jason Nieh, professor of computer science and co-director of the Software Systems Laboratory. “This means that users’ data are correctly managed by software running in the cloud and are safe from security bugs and hackers.”
The construction of correct and secure system software has been one of the grand challenges of computing. Nieh has worked on different aspects of software systems since joining Columbia Engineering in 1999. When Ronghui Gu, the Tang Family Assistant Professor of Computer Science and an expert in formal verification, joined the computer science department in 2018, he and Nieh decided to collaborate on exploring formal verification of software systems.
Their research has garnered major interest: both researchers won an Amazon Research Award, multiple grants from the National Science Foundation, as well as a multi-million dollar Defense Advanced Research Projects Agency (DARPA) contract to further development of the SeKVM project. In addition, Nieh was awarded a Guggenheim Fellowship for this work.
https://www.engineering.columbia.edu/press-release/first-hacker-resistant-cloud-software-system
#hacker #resistant #cloud #software #system
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
As the first system to guarantee the security of virtual machines in the cloud, SeKVM could transform how cloud services are designed, developed, deployed, and trusted
New York, NY—May 24, 2021—Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety and security of the data of its millions of customers is essential. This is true for large and small organizations alike. But up to now, there has been no way to guarantee that a software system is secure from bugs, hackers, and vulnerabilities.
Columbia Engineering researchers may have solved this security issue. They have developed SeKVM, the first system that guarantees--through a mathematical proof--the security of virtual machines in the cloud. In a new paper to be presented on May 26, 2021, at the 42nd IEEE Symposium on Security & Privacy, the researchers hope to lay the foundation for future innovations in system software verification, leading to a new generation of cyber-resilient system software.
SeKVM is the first formally verified system for cloud computing. Formal verification is a critical step as it is the process of proving that software is mathematically correct, that the program’s code works as it should, and there are no hidden security bugs to worry about.
“This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure,” said Jason Nieh, professor of computer science and co-director of the Software Systems Laboratory. “This means that users’ data are correctly managed by software running in the cloud and are safe from security bugs and hackers.”
The construction of correct and secure system software has been one of the grand challenges of computing. Nieh has worked on different aspects of software systems since joining Columbia Engineering in 1999. When Ronghui Gu, the Tang Family Assistant Professor of Computer Science and an expert in formal verification, joined the computer science department in 2018, he and Nieh decided to collaborate on exploring formal verification of software systems.
Their research has garnered major interest: both researchers won an Amazon Research Award, multiple grants from the National Science Foundation, as well as a multi-million dollar Defense Advanced Research Projects Agency (DARPA) contract to further development of the SeKVM project. In addition, Nieh was awarded a Guggenheim Fellowship for this work.
https://www.engineering.columbia.edu/press-release/first-hacker-resistant-cloud-software-system
#hacker #resistant #cloud #software #system
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Columbia Engineering
Columbia Engineering Team Builds First Hacker-resistant Cloud Software System
As the first system to guarantee the security of virtual machines in the cloud, SeKVM could transform how cloud services are designed, developed, deployed, and trusted.
Is 5G Opening Security Holes in the Internet of Things?
Market research company Research and Markets, looking at the intersection of the Internet of Things (IoT) and the increasingly popular fifth-generation cellular broadband technology 5G, said, "The global 5G IoT market size is expected to reach USD$11.35 billion by 2027."
The 5G technology and IoT devices are inextricably linked. According to the U.S. Government Accountability Office (GAO) report 5G Wireless Capabilities and Challenges for an Evolving Network, IoT devices are primary consumers of 5G networks.
In the 5G IoT market, IoT devices will multiply exponentially as 5G wireless connectivity enhances their capabilities. Smart factories in industry 4.0, for example, will leverage 5G and an abundance of industrial IoT to increase data visualization and enhance productivity while turning away from wired solutions, according to NetworkWorld .
Yet criminal hackers stand to benefit, too. With 5G wireless, sprawling IoT networks, and the flood of IoT device communications that follow, IoT becomes more vulnerable. As with all infant technologies, we hardly have an inkling about 5G wireless security flaws alone, and IoT is no less subject to attack as vendors trade native security capabilities for swift time-to-market.
Their combined shortcomings will open IoT to many more exploits.
https://cacm.acm.org/news/252849-is-5g-opening-security-holes-in-the-internet-of-things/fulltext
#5g #security #iot #exploits
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Market research company Research and Markets, looking at the intersection of the Internet of Things (IoT) and the increasingly popular fifth-generation cellular broadband technology 5G, said, "The global 5G IoT market size is expected to reach USD$11.35 billion by 2027."
The 5G technology and IoT devices are inextricably linked. According to the U.S. Government Accountability Office (GAO) report 5G Wireless Capabilities and Challenges for an Evolving Network, IoT devices are primary consumers of 5G networks.
In the 5G IoT market, IoT devices will multiply exponentially as 5G wireless connectivity enhances their capabilities. Smart factories in industry 4.0, for example, will leverage 5G and an abundance of industrial IoT to increase data visualization and enhance productivity while turning away from wired solutions, according to NetworkWorld .
Yet criminal hackers stand to benefit, too. With 5G wireless, sprawling IoT networks, and the flood of IoT device communications that follow, IoT becomes more vulnerable. As with all infant technologies, we hardly have an inkling about 5G wireless security flaws alone, and IoT is no less subject to attack as vendors trade native security capabilities for swift time-to-market.
Their combined shortcomings will open IoT to many more exploits.
https://cacm.acm.org/news/252849-is-5g-opening-security-holes-in-the-internet-of-things/fulltext
#5g #security #iot #exploits
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
cacm.acm.org
Is 5G Opening Security Holes in the Internet of Things?
The new 5G networks increase hacker access to the Internet of Things.
93: Kik
Darknet Diaries - EP 93: Kik
Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.
https://darknetdiaries.com/episode/93/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.
https://darknetdiaries.com/episode/93/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Mark zuckerberg is the antichrist of hacking because Facebook allows false logic
Since hacking is the process of strengthening logic (i.e. code) which corresponds to an objective reality (i.e. the program or software), mark zuckerberg is the antichrist of hacking since Facebook actively promotes false logic and does not ban it.
Hacking is the process of stronger logic overcoming weakness in another logic, leading the overall strengthening of logic, programming code being logic that corresponds to an objective reality (i.e. the program or software). Thus, hacking values logic that corresponds to objective reality versus false logic which is subjective and does not correspond to objective reality. Since Facebook allows for, defends and promotes false logic that does not correspond objective reality (i.e. propaganda, misinformation, etc.), it is going against the spirit of hacking and its purpose of creating stronger logic that corresponds to an objective reality.
Since Facebook is the biggest vehicle in the world for spreading false logic, and since mark zuckerberg is it's ceo, this means he is in effect the antichrist of hacking i.e. the person who is most responsible for spreading false logic, the antithesis of hacking.
https://www.reddit.com/r/facebook/comments/nkrqm4/since_hacking_is_the_process_of_strengthening/
#discussion #opinion #facebook #DeleteFacebook #zuckerberg
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Since hacking is the process of strengthening logic (i.e. code) which corresponds to an objective reality (i.e. the program or software), mark zuckerberg is the antichrist of hacking since Facebook actively promotes false logic and does not ban it.
Hacking is the process of stronger logic overcoming weakness in another logic, leading the overall strengthening of logic, programming code being logic that corresponds to an objective reality (i.e. the program or software). Thus, hacking values logic that corresponds to objective reality versus false logic which is subjective and does not correspond to objective reality. Since Facebook allows for, defends and promotes false logic that does not correspond objective reality (i.e. propaganda, misinformation, etc.), it is going against the spirit of hacking and its purpose of creating stronger logic that corresponds to an objective reality.
Since Facebook is the biggest vehicle in the world for spreading false logic, and since mark zuckerberg is it's ceo, this means he is in effect the antichrist of hacking i.e. the person who is most responsible for spreading false logic, the antithesis of hacking.
https://www.reddit.com/r/facebook/comments/nkrqm4/since_hacking_is_the_process_of_strengthening/
#discussion #opinion #facebook #DeleteFacebook #zuckerberg
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
reddit
Since hacking is the process of strengthening logic (i.e. code)...
A sub for news about the social media site Facebook.
Media is too big
VIEW IN TELEGRAM
Facebook Whistleblowers LEAK DOCS Detailing Effort to Secretly Censor Vax Concerns on Global Scale
Whistleblowers from inside Facebook say that the social network is censoring skeptics of the COVID-19 vaccine by demoting user comments by way of an algorithm that calculates a 'vaccine hesitancy score,' Project Veritas claims.
James O'Keefe, the head of Project Veritas, claimed on Fox News that two anonymous Facebook employees leaked documents showing that the company was testing a 'beta' version of the algorithm to target anti-vaxxers.
The documents purport to show that the beta version was being tested on 1.5 per cent of some 3.8 billion users of Facebook and its subsidiary, Instagram, around the world.
https://www.dailymail.co.uk/news/article-9615409/Facebook-tried-censor-posts-vaccine-hesitancy-according-leaked-documents.html
#facebook #DeleteFacebook #censoring #vaccine #hesitancy #leak #documents #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Whistleblowers from inside Facebook say that the social network is censoring skeptics of the COVID-19 vaccine by demoting user comments by way of an algorithm that calculates a 'vaccine hesitancy score,' Project Veritas claims.
James O'Keefe, the head of Project Veritas, claimed on Fox News that two anonymous Facebook employees leaked documents showing that the company was testing a 'beta' version of the algorithm to target anti-vaxxers.
The documents purport to show that the beta version was being tested on 1.5 per cent of some 3.8 billion users of Facebook and its subsidiary, Instagram, around the world.
https://www.dailymail.co.uk/news/article-9615409/Facebook-tried-censor-posts-vaccine-hesitancy-according-leaked-documents.html
#facebook #DeleteFacebook #censoring #vaccine #hesitancy #leak #documents #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Why Facebook, Twitter, Instagram could be banned in India from tomorrow?
If these social media platforms fail to accept govt guidelines, they risk losing status as social media platforms and protections as intermediaries. Government can also take action against them as per the law of the land for not following the rules
Social media giants like Facebook, Twitter, WhatsApp and Instagram may face ban in India if they fail to comply with the new intermediary guidelines for social media platforms. The three-month deadline given by the Ministry of Electronics & Information Technology (MEITy) to accept these guidelines ends today i.e. May 25 but none of the giants have so far accepted the new regulations. The rules will be effective from tomorrow despite these companies seeking a total six-month delay in their implementation.
Homegrown social media platform Koo, which is the Indian version of Twitter, is the only platform that has so far accepted the Centre's intermediary guidelines.
If any of these social media platforms fail to accept these guidelines, they risk losing status as social media platforms and protections as intermediaries. The government can also take action against them as per the law of the land for not following the rules, a government official said.
Meanwhile, Facebook has indicated that it'll comply with the IT rules. "We aim to comply with the provisions of the IT rules and continue to discuss a few of the issues which need more engagement with the government. According to the IT rules, we are working to implement operational processes and improve efficiencies. Facebook remains committed to people's ability to freely and safely express themselves on our platform," an official spokesperson of the company said in a statement.
https://www.businesstoday.in/technology/news/why-facebook-twitter-instagram-could-be-banned-in-india-from-tomorrow/story/439972.html
#facebook #DeleteFacebook #twitter #instagram #india #banned
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
If these social media platforms fail to accept govt guidelines, they risk losing status as social media platforms and protections as intermediaries. Government can also take action against them as per the law of the land for not following the rules
Social media giants like Facebook, Twitter, WhatsApp and Instagram may face ban in India if they fail to comply with the new intermediary guidelines for social media platforms. The three-month deadline given by the Ministry of Electronics & Information Technology (MEITy) to accept these guidelines ends today i.e. May 25 but none of the giants have so far accepted the new regulations. The rules will be effective from tomorrow despite these companies seeking a total six-month delay in their implementation.
Homegrown social media platform Koo, which is the Indian version of Twitter, is the only platform that has so far accepted the Centre's intermediary guidelines.
If any of these social media platforms fail to accept these guidelines, they risk losing status as social media platforms and protections as intermediaries. The government can also take action against them as per the law of the land for not following the rules, a government official said.
Meanwhile, Facebook has indicated that it'll comply with the IT rules. "We aim to comply with the provisions of the IT rules and continue to discuss a few of the issues which need more engagement with the government. According to the IT rules, we are working to implement operational processes and improve efficiencies. Facebook remains committed to people's ability to freely and safely express themselves on our platform," an official spokesperson of the company said in a statement.
https://www.businesstoday.in/technology/news/why-facebook-twitter-instagram-could-be-banned-in-india-from-tomorrow/story/439972.html
#facebook #DeleteFacebook #twitter #instagram #india #banned
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Business Today
Why Facebook, Twitter, Instagram could be banned in India from tomorrow?
If these social media platforms fail to accept govt guidelines, they risk losing status as social media platforms and protections as intermediaries. Government can also take action against them as per the law of the land for not following the rules
Media is too big
VIEW IN TELEGRAM
We know what you did during lockdown
We gave up our privacy to fight Covid-19, can we get it back? An FT film starring Lydia West and Arthur Darvill in collaboration with Sonia Friedman Productions and supported by Luminate. An interrogation scene explores how Covid-19 has exposed the tension between the need for data to track and trace, and the right to privacy and justice.
https://www.youtube.com/watch?v=4WTpO9y2Dh4
#algorithm #BigData #dataprivacy #privacy #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
We gave up our privacy to fight Covid-19, can we get it back? An FT film starring Lydia West and Arthur Darvill in collaboration with Sonia Friedman Productions and supported by Luminate. An interrogation scene explores how Covid-19 has exposed the tension between the need for data to track and trace, and the right to privacy and justice.
https://www.youtube.com/watch?v=4WTpO9y2Dh4
#algorithm #BigData #dataprivacy #privacy #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Proceeding against Google based on new rules for large digital players (Section 19a GWB) – Bundeskartellamt examines Google's significance for competition across markets and its data processing terms
Date of issue: 25.05.2021
The Bundeskartellamt has today initiated two proceedings against Google Germany GmbH, Hamburg, Google Ireland Ltd., Dublin, Ireland, and Alphabet Inc., Mountain View, USA, based on the new competition law provisions applicable to large digital companies. In the past months, the authority has already commenced investigations against Facebook (see press release of 28 January 2021) and Amazon (see press release of 18 May 2021) based on this new competition law tool.
In January 2021, the 10th amendment to the German Competition Act (GWB Digitalisation Act) came into force. A key new provision (Section 19a GWB) enables the authority to intervene earlier and more effectively, in particular against the practices of large digital companies. In a two-step procedure, the Bundeskartellamt can prohibit companies which are of paramount significance for competition across markets from engaging in anti-competitive practices.
Today, the Bundeskartellamt has initiated a proceeding to determine whether the company is of paramount significance across markets.
Andreas Mundt, President of the Bundeskartellamt: "“An ecosystem which extends across various markets may be an indication that a company holds such a market position. It is often very difficult for other companies to challenge this position of power. Due to the large number of digital services offered by Google, such as the Google search engine, YouTube, Google Maps, the Android operating system or the Chrome browser, the company could be considered to be of paramount significance for competition across markets.”"
In a second proceeding based on this general classification also initiated today, the Bundeskartellamt will undertake an in-depth analysis of Google’s data processing terms.
Andreas Mundt: "“Google’s business model relies to a very large extent on processing data relating to its users. Due to its established access to data relevant for competition, Google enjoys a strategic advantage. We will therefore take a close look at the company’s data processing terms. A key question in this context is whether consumers wishing to use Google’s services have sufficient choice as to how Google will use their data.”"
https://www.bundeskartellamt.de/SharedDocs/Meldung/EN/Pressemitteilungen/2021/25_05_2021_Google_19a.html
#germany #bundeskartellamt #google #DeleteGoogle #data #processing
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Date of issue: 25.05.2021
The Bundeskartellamt has today initiated two proceedings against Google Germany GmbH, Hamburg, Google Ireland Ltd., Dublin, Ireland, and Alphabet Inc., Mountain View, USA, based on the new competition law provisions applicable to large digital companies. In the past months, the authority has already commenced investigations against Facebook (see press release of 28 January 2021) and Amazon (see press release of 18 May 2021) based on this new competition law tool.
In January 2021, the 10th amendment to the German Competition Act (GWB Digitalisation Act) came into force. A key new provision (Section 19a GWB) enables the authority to intervene earlier and more effectively, in particular against the practices of large digital companies. In a two-step procedure, the Bundeskartellamt can prohibit companies which are of paramount significance for competition across markets from engaging in anti-competitive practices.
Today, the Bundeskartellamt has initiated a proceeding to determine whether the company is of paramount significance across markets.
Andreas Mundt, President of the Bundeskartellamt: "“An ecosystem which extends across various markets may be an indication that a company holds such a market position. It is often very difficult for other companies to challenge this position of power. Due to the large number of digital services offered by Google, such as the Google search engine, YouTube, Google Maps, the Android operating system or the Chrome browser, the company could be considered to be of paramount significance for competition across markets.”"
In a second proceeding based on this general classification also initiated today, the Bundeskartellamt will undertake an in-depth analysis of Google’s data processing terms.
Andreas Mundt: "“Google’s business model relies to a very large extent on processing data relating to its users. Due to its established access to data relevant for competition, Google enjoys a strategic advantage. We will therefore take a close look at the company’s data processing terms. A key question in this context is whether consumers wishing to use Google’s services have sufficient choice as to how Google will use their data.”"
https://www.bundeskartellamt.de/SharedDocs/Meldung/EN/Pressemitteilungen/2021/25_05_2021_Google_19a.html
#germany #bundeskartellamt #google #DeleteGoogle #data #processing
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Apple, Fedex and the cookie apocalypse
We’re now a couple of weeks into Apple’s latest iOS privacy move. If you want to track users between apps and the web, or from an ad through the app store to an install, then you need to ask permission and Apple has deliberately framed the question such that almost no-one will say yes. On some reports, CPMs are already down by half.
We could spend a lot of time arguing about the rights and wrongs of privacy and Apple’s framing and steering and use of its market dominance, but it’s probably more useful to suggest that all Apple has really done is implement the EU and California’s cookie laws, ‘but in apps’, and in an especially aggressive way. Step up another level, and this reflects a pretty broad shift in attitudes towards privacy in general and the huge inverted pyramid of complexity and nonsense of third party ad tracking in particular. Chrome and Safari are turning third party cookies off anyway. The cookie apocalypse is upon us and the tracking model of the last 25 years is going away.
What happens next? No-one in advertising quite knows. There are dozens of different projects for new ‘private’ ways to track users across different sites with different identity or logged-in models, but the most interesting remains Google’s FLoC, in which the browser analyses your behaviour and puts you into (mostly) anonymous, interest-based cohorts. The publisher can ask for a cohort and show you ads, but your actual activity never leaves your device. Apple does more or less the same thing on iOS in its News and Stocks apps, except that Apple also serves the ads and displays the content, so the underlying publishers see nothing at all (except a wire transfer). I think it’s very likely that Apple is looking at offering this in third-party apps and in Safari as well (I wrote about that here). So, Apple and Google want to move the tracking from the server to the client, and to one company with one point for the user to control instead of disaggregation across hundreds of publishers and ad-tech companies.
There’s a bunch of reasons why this might not work, not least that no-one except Google and Apple want Google and Apple to have that much control over publishing and advertising. But it’s also worth stepping up another level again, and asking what advertisers are trying to do, anyway. People say ‘privacy’ so often that one can lose sight of the fact that advertisers don’t care who you are - they just want to show ads to people that might be interested in them, and not to show ads to people who won’t be interested. They don’t want to ‘violate your privacy’ - they want to show diaper ads to parents, car ads to people who want a car and watch ads to rich people.
https://www.ben-evans.com/benedictevans/2021/5/25/apple-fedex-and-the-cookie-apocalypse
#apple #fedex #cookies #apocalypse #adtech #user #tracking #privacy
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
We’re now a couple of weeks into Apple’s latest iOS privacy move. If you want to track users between apps and the web, or from an ad through the app store to an install, then you need to ask permission and Apple has deliberately framed the question such that almost no-one will say yes. On some reports, CPMs are already down by half.
We could spend a lot of time arguing about the rights and wrongs of privacy and Apple’s framing and steering and use of its market dominance, but it’s probably more useful to suggest that all Apple has really done is implement the EU and California’s cookie laws, ‘but in apps’, and in an especially aggressive way. Step up another level, and this reflects a pretty broad shift in attitudes towards privacy in general and the huge inverted pyramid of complexity and nonsense of third party ad tracking in particular. Chrome and Safari are turning third party cookies off anyway. The cookie apocalypse is upon us and the tracking model of the last 25 years is going away.
What happens next? No-one in advertising quite knows. There are dozens of different projects for new ‘private’ ways to track users across different sites with different identity or logged-in models, but the most interesting remains Google’s FLoC, in which the browser analyses your behaviour and puts you into (mostly) anonymous, interest-based cohorts. The publisher can ask for a cohort and show you ads, but your actual activity never leaves your device. Apple does more or less the same thing on iOS in its News and Stocks apps, except that Apple also serves the ads and displays the content, so the underlying publishers see nothing at all (except a wire transfer). I think it’s very likely that Apple is looking at offering this in third-party apps and in Safari as well (I wrote about that here). So, Apple and Google want to move the tracking from the server to the client, and to one company with one point for the user to control instead of disaggregation across hundreds of publishers and ad-tech companies.
There’s a bunch of reasons why this might not work, not least that no-one except Google and Apple want Google and Apple to have that much control over publishing and advertising. But it’s also worth stepping up another level again, and asking what advertisers are trying to do, anyway. People say ‘privacy’ so often that one can lose sight of the fact that advertisers don’t care who you are - they just want to show ads to people that might be interested in them, and not to show ads to people who won’t be interested. They don’t want to ‘violate your privacy’ - they want to show diaper ads to parents, car ads to people who want a car and watch ads to rich people.
https://www.ben-evans.com/benedictevans/2021/5/25/apple-fedex-and-the-cookie-apocalypse
#apple #fedex #cookies #apocalypse #adtech #user #tracking #privacy
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Benedict Evans
Apple, Fedex and the cookie apocalypse — Benedict Evans
As cookie-based ads go away, does the targeting move from the cloud to the client, or from the reader to the content? Does this make the strong stronger? Or does the money go to Fedex instead?
Comcast Subscriber Receives DMCA Notice for Downloading Ubuntu
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an anti-piracy company alleging that by torrenting an OS ISO released by Ubuntu itself, he breached copyright law.
Two decades ago, the BitTorrent protocol revolutionized peer-to-peer (P2P) file-sharing. The content-agnostic system allowed people to efficiently share and download even the largest files and soon grew to become the dominant method of transfer for millions of file-sharers.
Over the years, people have shared all kinds of content using torrents and it quickly became associated with mass copyright infringement of movies, TV shows, music and everything in between. However, BitTorrent is also used to distribute large volumes of data with the blessing of rightsholders, with the sharing of Linux distros a prime example.
Indeed, large companies such as Ubuntu owner Canonical actively encourage the distribution of their packages via BitTorrent, even going as far as operating their own tracker. This is effectively a green light for users to obtain Ubuntu using BitTorrent and is universally considered to be entirely safe. However, a development yesterday caused mass confusion when a user was accused of copyright infringement via a notice from his ISP.
Anti-Piracy Firm Sends DMCA Notice Against Comcast User
Posting to Reddit’s /r/linux sub-Reddit, a forum with more than 656K subscribers, ‘NateNate60’ reported the unthinkable. After downloading an official Ubuntu ISO package (filename ubuntu-20.04.2.0-desktop-amd64.iso) he says he received a notice from Comcast’s Infinity claiming that he’d been reported for copyright infringement.
“We have received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over your Xfinity Internet service,” the posted notice reads.
NateNate60 wisely redacted the notice to remove the ‘Incident Number’ and the precise time of the alleged infringement to protect his privacy but the clam was reported filed with Comcast on May 24, 2021.
https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/
#comcast #dmca #ubuntu #torrent #download
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an anti-piracy company alleging that by torrenting an OS ISO released by Ubuntu itself, he breached copyright law.
Two decades ago, the BitTorrent protocol revolutionized peer-to-peer (P2P) file-sharing. The content-agnostic system allowed people to efficiently share and download even the largest files and soon grew to become the dominant method of transfer for millions of file-sharers.
Over the years, people have shared all kinds of content using torrents and it quickly became associated with mass copyright infringement of movies, TV shows, music and everything in between. However, BitTorrent is also used to distribute large volumes of data with the blessing of rightsholders, with the sharing of Linux distros a prime example.
Indeed, large companies such as Ubuntu owner Canonical actively encourage the distribution of their packages via BitTorrent, even going as far as operating their own tracker. This is effectively a green light for users to obtain Ubuntu using BitTorrent and is universally considered to be entirely safe. However, a development yesterday caused mass confusion when a user was accused of copyright infringement via a notice from his ISP.
Anti-Piracy Firm Sends DMCA Notice Against Comcast User
Posting to Reddit’s /r/linux sub-Reddit, a forum with more than 656K subscribers, ‘NateNate60’ reported the unthinkable. After downloading an official Ubuntu ISO package (filename ubuntu-20.04.2.0-desktop-amd64.iso) he says he received a notice from Comcast’s Infinity claiming that he’d been reported for copyright infringement.
“We have received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over your Xfinity Internet service,” the posted notice reads.
NateNate60 wisely redacted the notice to remove the ‘Incident Number’ and the precise time of the alleged infringement to protect his privacy but the clam was reported filed with Comcast on May 24, 2021.
https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/
#comcast #dmca #ubuntu #torrent #download
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
Comcast Subscriber Receives DMCA Notice for Downloading Ubuntu * TorrentFreak
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an…
WhatsApp sues Indian government over ‘mass surveillance’ internet laws
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
WhatsApp has sued the Indian government over new internet laws which the company says will “severely undermine” the privacy of their users.
The new IT laws, which have been called oppressive and draconian, give the Indian government greater power to monitor online activity, including on encrypted apps like WhatsApp and Signal. They were passed in February but were due to come into effect on Wednesday.
Under the laws, encryption – which keeps communications on the app private and inaccessible to outside parties – would have to be removed from WhatsApp in India and messages would have to be put into a “traceable” database. The government would then be able to identify and take action against the sender if any content was ruled “unlawful”.
A lawyer for WhatsApp told the Delhi high court: “A government that chooses to mandate traceability is effectively mandating a new form of mass surveillance.
In order to trace even one message, services would have to trace every message. There is no way to predict which message Indian government would want to investigate in the future.”
https://www.theguardian.com/world/2021/may/26/whatsapp-sues-indian-government-over-mass-surveillance-internet-laws
#whatsapp #DeleteWhatsapp #india #gov #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
WhatsApp has sued the Indian government over new internet laws which the company says will “severely undermine” the privacy of their users.
The new IT laws, which have been called oppressive and draconian, give the Indian government greater power to monitor online activity, including on encrypted apps like WhatsApp and Signal. They were passed in February but were due to come into effect on Wednesday.
Under the laws, encryption – which keeps communications on the app private and inaccessible to outside parties – would have to be removed from WhatsApp in India and messages would have to be put into a “traceable” database. The government would then be able to identify and take action against the sender if any content was ruled “unlawful”.
A lawyer for WhatsApp told the Delhi high court: “A government that chooses to mandate traceability is effectively mandating a new form of mass surveillance.
In order to trace even one message, services would have to trace every message. There is no way to predict which message Indian government would want to investigate in the future.”
https://www.theguardian.com/world/2021/may/26/whatsapp-sues-indian-government-over-mass-surveillance-internet-laws
#whatsapp #DeleteWhatsapp #india #gov #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
the Guardian
WhatsApp sues Indian government over ‘mass surveillance’ internet laws
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
Media is too big
VIEW IN TELEGRAM
Edward Snowden Hails Court Ruling as Progress on Acknowledging 'Devastation' of Mass Surveillance
Former National Security Agency contractor Edward Snowden hailed a new ruling out of a European court on intelligence-gathering practices, emphasizing "how far we've come" on acknowledging the "devastating consequences" of mass surveillance.
"It is hard to overemphasize how far we've come from the pre-2013 world when even the highest judicial authorities are beginning to acknowledge the devastating consequence of two decades' mass surveillance," Snowden tweeted in response to the Grand Chamber of the European Court of Human Rights' recent decision.
https://telegra.ph/Edward-Snowden-hails-court-ruling-as-progress-on-acknowledging-devastation-of-mass-surveillance-05-26
via www.newsweek.com
#snowden #surveillance #consequences #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Former National Security Agency contractor Edward Snowden hailed a new ruling out of a European court on intelligence-gathering practices, emphasizing "how far we've come" on acknowledging the "devastating consequences" of mass surveillance.
"It is hard to overemphasize how far we've come from the pre-2013 world when even the highest judicial authorities are beginning to acknowledge the devastating consequence of two decades' mass surveillance," Snowden tweeted in response to the Grand Chamber of the European Court of Human Rights' recent decision.
https://telegra.ph/Edward-Snowden-hails-court-ruling-as-progress-on-acknowledging-devastation-of-mass-surveillance-05-26
via www.newsweek.com
#snowden #surveillance #consequences #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
A hacktivist has scraped a wealth of data from the crime and neighborhood watch app Citizen and posted it on a dark web site, Motherboard has learned. The data includes a huge amount of data related to 1.7 million "incidents"—events that Citizen informs users about concerning crime or perceived crime in their area—such as the GPS coordinates of where the incident took place, its update history, a clip of the police radio that the incident relates to, and associated images.
On their dark web site, called "The Concerned Citizen's Citizen Hack," the hacker writes "Fuck snitches, fuck Citizen, fuck Andrew Frame and remember, kids: Cops are not your friends." Andrew Frame is the CEO of Citizen; Frame was responsible for putting a $30,000 bounty for information that would lead to the arrest of a person the company mistakenly suspected of starting a recent wildfire, The Verge reported.
Much of this information would ordinarily be available to users as part of the normal functioning of the Citizen app. But with the hacker scraping it en masse and releasing it as a series of files to download, the data is qualitatively different from what the Citizen app offers, and allows journalists and researchers to gain greater insight into the use and spread of the app around the country. The scrape is somewhat similar to other recent mass collections and redistributions of public information, such as the Parler scrape that occurred after the January 6 insurrection at the U.S. Capitol.
"It's like a full log of police activity in multiple U.S. cities," the hacker, who said they affiliate themselves with the hacking collective Anonymous, told Motherboard. Citizen incidents are often (but not always) linked to police activity; Citizen produces its own summaries of events by listening to police scanners and pushing alerts about them to Citizen users. Users can also contribute their own videos.
https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web
#hacker #acktivist #scrape #citizen #app #data #darknetlive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
A hacktivist has scraped a wealth of data from the crime and neighborhood watch app Citizen and posted it on a dark web site, Motherboard has learned. The data includes a huge amount of data related to 1.7 million "incidents"—events that Citizen informs users about concerning crime or perceived crime in their area—such as the GPS coordinates of where the incident took place, its update history, a clip of the police radio that the incident relates to, and associated images.
On their dark web site, called "The Concerned Citizen's Citizen Hack," the hacker writes "Fuck snitches, fuck Citizen, fuck Andrew Frame and remember, kids: Cops are not your friends." Andrew Frame is the CEO of Citizen; Frame was responsible for putting a $30,000 bounty for information that would lead to the arrest of a person the company mistakenly suspected of starting a recent wildfire, The Verge reported.
Much of this information would ordinarily be available to users as part of the normal functioning of the Citizen app. But with the hacker scraping it en masse and releasing it as a series of files to download, the data is qualitatively different from what the Citizen app offers, and allows journalists and researchers to gain greater insight into the use and spread of the app around the country. The scrape is somewhat similar to other recent mass collections and redistributions of public information, such as the Parler scrape that occurred after the January 6 insurrection at the U.S. Capitol.
"It's like a full log of police activity in multiple U.S. cities," the hacker, who said they affiliate themselves with the hacking collective Anonymous, told Motherboard. Citizen incidents are often (but not always) linked to police activity; Citizen produces its own summaries of events by listening to police scanners and pushing alerts about them to Citizen users. Users can also contribute their own videos.
https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web
#hacker #acktivist #scrape #citizen #app #data #darknetlive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Vice
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
Apple v Epic CourtExhibits - All the Apple vs Epic court files OCR’ed
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
👉🏼 Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
#epic #apple #courtfiles
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
👉🏼 Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
#epic #apple #courtfiles
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv