93: Kik
Darknet Diaries - EP 93: Kik
Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.
https://darknetdiaries.com/episode/93/
#truecrime #darknetdiaries #podcast
๐@cRyPtHoN_INFOSEC_FR
๐@cRyPtHoN_INFOSEC_EN
๐@cRyPtHoN_INFOSEC_DE
๐@BlackBox_Archiv
Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik.
https://darknetdiaries.com/episode/93/
#truecrime #darknetdiaries #podcast
๐@cRyPtHoN_INFOSEC_FR
๐@cRyPtHoN_INFOSEC_EN
๐@cRyPtHoN_INFOSEC_DE
๐@BlackBox_Archiv
Mark zuckerberg is the antichrist of hacking because Facebook allows false logic
Since hacking is the process of strengthening logic (i.e. code) which corresponds to an objective reality (i.e. the program or software), mark zuckerberg is the antichrist of hacking since Facebook actively promotes false logic and does not ban it.
Hacking is the process of stronger logic overcoming weakness in another logic, leading the overall strengthening of logic, programming code being logic that corresponds to an objective reality (i.e. the program or software). Thus, hacking values logic that corresponds to objective reality versus false logic which is subjective and does not correspond to objective reality. Since Facebook allows for, defends and promotes false logic that does not correspond objective reality (i.e. propaganda, misinformation, etc.), it is going against the spirit of hacking and its purpose of creating stronger logic that corresponds to an objective reality.
Since Facebook is the biggest vehicle in the world for spreading false logic, and since mark zuckerberg is it's ceo, this means he is in effect the antichrist of hacking i.e. the person who is most responsible for spreading false logic, the antithesis of hacking.
https://www.reddit.com/r/facebook/comments/nkrqm4/since_hacking_is_the_process_of_strengthening/
#discussion #opinion #facebook #DeleteFacebook #zuckerberg
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Since hacking is the process of strengthening logic (i.e. code) which corresponds to an objective reality (i.e. the program or software), mark zuckerberg is the antichrist of hacking since Facebook actively promotes false logic and does not ban it.
Hacking is the process of stronger logic overcoming weakness in another logic, leading the overall strengthening of logic, programming code being logic that corresponds to an objective reality (i.e. the program or software). Thus, hacking values logic that corresponds to objective reality versus false logic which is subjective and does not correspond to objective reality. Since Facebook allows for, defends and promotes false logic that does not correspond objective reality (i.e. propaganda, misinformation, etc.), it is going against the spirit of hacking and its purpose of creating stronger logic that corresponds to an objective reality.
Since Facebook is the biggest vehicle in the world for spreading false logic, and since mark zuckerberg is it's ceo, this means he is in effect the antichrist of hacking i.e. the person who is most responsible for spreading false logic, the antithesis of hacking.
https://www.reddit.com/r/facebook/comments/nkrqm4/since_hacking_is_the_process_of_strengthening/
#discussion #opinion #facebook #DeleteFacebook #zuckerberg
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
reddit
Since hacking is the process of strengthening logic (i.e. code)...
A sub for news about the social media site Facebook.
Media is too big
VIEW IN TELEGRAM
Facebook Whistleblowers LEAK DOCS Detailing Effort to Secretly Censor Vax Concerns on Global Scale
Whistleblowers from inside Facebook say that the social network is censoring skeptics of the COVID-19 vaccine by demoting user comments by way of an algorithm that calculates a 'vaccine hesitancy score,' Project Veritas claims.
James O'Keefe, the head of Project Veritas, claimed on Fox News that two anonymous Facebook employees leaked documents showing that the company was testing a 'beta' version of the algorithm to target anti-vaxxers.
The documents purport to show that the beta version was being tested on 1.5 per cent of some 3.8 billion users of Facebook and its subsidiary, Instagram, around the world.
https://www.dailymail.co.uk/news/article-9615409/Facebook-tried-censor-posts-vaccine-hesitancy-according-leaked-documents.html
#facebook #DeleteFacebook #censoring #vaccine #hesitancy #leak #documents #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Whistleblowers from inside Facebook say that the social network is censoring skeptics of the COVID-19 vaccine by demoting user comments by way of an algorithm that calculates a 'vaccine hesitancy score,' Project Veritas claims.
James O'Keefe, the head of Project Veritas, claimed on Fox News that two anonymous Facebook employees leaked documents showing that the company was testing a 'beta' version of the algorithm to target anti-vaxxers.
The documents purport to show that the beta version was being tested on 1.5 per cent of some 3.8 billion users of Facebook and its subsidiary, Instagram, around the world.
https://www.dailymail.co.uk/news/article-9615409/Facebook-tried-censor-posts-vaccine-hesitancy-according-leaked-documents.html
#facebook #DeleteFacebook #censoring #vaccine #hesitancy #leak #documents #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Why Facebook, Twitter, Instagram could be banned in India from tomorrow?
If these social media platforms fail to accept govt guidelines, they risk losing status as social media platforms and protections as intermediaries. Government can also take action against them as per the law of the land for not following the rules
Social media giants like Facebook, Twitter, WhatsApp and Instagram may face ban in India if they fail to comply with the new intermediary guidelines for social media platforms. The three-month deadline given by the Ministry of Electronics & Information Technology (MEITy) to accept these guidelines ends today i.e. May 25 but none of the giants have so far accepted the new regulations. The rules will be effective from tomorrow despite these companies seeking a total six-month delay in their implementation.
Homegrown social media platform Koo, which is the Indian version of Twitter, is the only platform that has so far accepted the Centre's intermediary guidelines.
If any of these social media platforms fail to accept these guidelines, they risk losing status as social media platforms and protections as intermediaries. The government can also take action against them as per the law of the land for not following the rules, a government official said.
Meanwhile, Facebook has indicated that it'll comply with the IT rules. "We aim to comply with the provisions of the IT rules and continue to discuss a few of the issues which need more engagement with the government. According to the IT rules, we are working to implement operational processes and improve efficiencies. Facebook remains committed to people's ability to freely and safely express themselves on our platform," an official spokesperson of the company said in a statement.
https://www.businesstoday.in/technology/news/why-facebook-twitter-instagram-could-be-banned-in-india-from-tomorrow/story/439972.html
#facebook #DeleteFacebook #twitter #instagram #india #banned
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
If these social media platforms fail to accept govt guidelines, they risk losing status as social media platforms and protections as intermediaries. Government can also take action against them as per the law of the land for not following the rules
Social media giants like Facebook, Twitter, WhatsApp and Instagram may face ban in India if they fail to comply with the new intermediary guidelines for social media platforms. The three-month deadline given by the Ministry of Electronics & Information Technology (MEITy) to accept these guidelines ends today i.e. May 25 but none of the giants have so far accepted the new regulations. The rules will be effective from tomorrow despite these companies seeking a total six-month delay in their implementation.
Homegrown social media platform Koo, which is the Indian version of Twitter, is the only platform that has so far accepted the Centre's intermediary guidelines.
If any of these social media platforms fail to accept these guidelines, they risk losing status as social media platforms and protections as intermediaries. The government can also take action against them as per the law of the land for not following the rules, a government official said.
Meanwhile, Facebook has indicated that it'll comply with the IT rules. "We aim to comply with the provisions of the IT rules and continue to discuss a few of the issues which need more engagement with the government. According to the IT rules, we are working to implement operational processes and improve efficiencies. Facebook remains committed to people's ability to freely and safely express themselves on our platform," an official spokesperson of the company said in a statement.
https://www.businesstoday.in/technology/news/why-facebook-twitter-instagram-could-be-banned-in-india-from-tomorrow/story/439972.html
#facebook #DeleteFacebook #twitter #instagram #india #banned
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Business Today
Why Facebook, Twitter, Instagram could be banned in India from tomorrow?
If these social media platforms fail to accept govt guidelines, they risk losing status as social media platforms and protections as intermediaries. Government can also take action against them as per the law of the land for not following the rules
Media is too big
VIEW IN TELEGRAM
We know what you did during lockdown
We gave up our privacy to fight Covid-19, can we get it back? An FT film starring Lydia West and Arthur Darvill in collaboration with Sonia Friedman Productions and supported by Luminate. An interrogation scene explores how Covid-19 has exposed the tension between the need for data to track and trace, and the right to privacy and justice.
https://www.youtube.com/watch?v=4WTpO9y2Dh4
#algorithm #BigData #dataprivacy #privacy #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
We gave up our privacy to fight Covid-19, can we get it back? An FT film starring Lydia West and Arthur Darvill in collaboration with Sonia Friedman Productions and supported by Luminate. An interrogation scene explores how Covid-19 has exposed the tension between the need for data to track and trace, and the right to privacy and justice.
https://www.youtube.com/watch?v=4WTpO9y2Dh4
#algorithm #BigData #dataprivacy #privacy #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Proceeding against Google based on new rules for large digital players (Section 19a GWB) โ Bundeskartellamt examines Google's significance for competition across markets and its data processing terms
Date of issue: 25.05.2021
The Bundeskartellamt has today initiated two proceedings against Google Germany GmbH, Hamburg, Google Ireland Ltd., Dublin, Ireland, and Alphabet Inc., Mountain View, USA, based on the new competition law provisions applicable to large digital companies. In the past months, the authority has already commenced investigations against Facebook (see press release of 28 January 2021) and Amazon (see press release of 18 May 2021) based on this new competition law tool.
In January 2021, the 10th amendment to the German Competition Act (GWB Digitalisation Act) came into force. A key new provision (Section 19a GWB) enables the authority to intervene earlier and more effectively, in particular against the practices of large digital companies. In a two-step procedure, the Bundeskartellamt can prohibit companies which are of paramount significance for competition across markets from engaging in anti-competitive practices.
Today, the Bundeskartellamt has initiated a proceeding to determine whether the company is of paramount significance across markets.
Andreas Mundt, President of the Bundeskartellamt: "โAn ecosystem which extends across various markets may be an indication that a company holds such a market position. It is often very difficult for other companies to challenge this position of power. Due to the large number of digital services offered by Google, such as the Google search engine, YouTube, Google Maps, the Android operating system or the Chrome browser, the company could be considered to be of paramount significance for competition across markets.โ"
In a second proceeding based on this general classification also initiated today, the Bundeskartellamt will undertake an in-depth analysis of Googleโs data processing terms.
Andreas Mundt: "โGoogleโs business model relies to a very large extent on processing data relating to its users. Due to its established access to data relevant for competition, Google enjoys a strategic advantage. We will therefore take a close look at the companyโs data processing terms. A key question in this context is whether consumers wishing to use Googleโs services have sufficient choice as to how Google will use their data.โ"
https://www.bundeskartellamt.de/SharedDocs/Meldung/EN/Pressemitteilungen/2021/25_05_2021_Google_19a.html
#germany #bundeskartellamt #google #DeleteGoogle #data #processing
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Date of issue: 25.05.2021
The Bundeskartellamt has today initiated two proceedings against Google Germany GmbH, Hamburg, Google Ireland Ltd., Dublin, Ireland, and Alphabet Inc., Mountain View, USA, based on the new competition law provisions applicable to large digital companies. In the past months, the authority has already commenced investigations against Facebook (see press release of 28 January 2021) and Amazon (see press release of 18 May 2021) based on this new competition law tool.
In January 2021, the 10th amendment to the German Competition Act (GWB Digitalisation Act) came into force. A key new provision (Section 19a GWB) enables the authority to intervene earlier and more effectively, in particular against the practices of large digital companies. In a two-step procedure, the Bundeskartellamt can prohibit companies which are of paramount significance for competition across markets from engaging in anti-competitive practices.
Today, the Bundeskartellamt has initiated a proceeding to determine whether the company is of paramount significance across markets.
Andreas Mundt, President of the Bundeskartellamt: "โAn ecosystem which extends across various markets may be an indication that a company holds such a market position. It is often very difficult for other companies to challenge this position of power. Due to the large number of digital services offered by Google, such as the Google search engine, YouTube, Google Maps, the Android operating system or the Chrome browser, the company could be considered to be of paramount significance for competition across markets.โ"
In a second proceeding based on this general classification also initiated today, the Bundeskartellamt will undertake an in-depth analysis of Googleโs data processing terms.
Andreas Mundt: "โGoogleโs business model relies to a very large extent on processing data relating to its users. Due to its established access to data relevant for competition, Google enjoys a strategic advantage. We will therefore take a close look at the companyโs data processing terms. A key question in this context is whether consumers wishing to use Googleโs services have sufficient choice as to how Google will use their data.โ"
https://www.bundeskartellamt.de/SharedDocs/Meldung/EN/Pressemitteilungen/2021/25_05_2021_Google_19a.html
#germany #bundeskartellamt #google #DeleteGoogle #data #processing
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Apple, Fedex and the cookie apocalypse
Weโre now a couple of weeks into Appleโs latest iOS privacy move. If you want to track users between apps and the web, or from an ad through the app store to an install, then you need to ask permission and Apple has deliberately framed the question such that almost no-one will say yes. On some reports, CPMs are already down by half.
We could spend a lot of time arguing about the rights and wrongs of privacy and Appleโs framing and steering and use of its market dominance, but itโs probably more useful to suggest that all Apple has really done is implement the EU and Californiaโs cookie laws, โbut in appsโ, and in an especially aggressive way. Step up another level, and this reflects a pretty broad shift in attitudes towards privacy in general and the huge inverted pyramid of complexity and nonsense of third party ad tracking in particular. Chrome and Safari are turning third party cookies off anyway. The cookie apocalypse is upon us and the tracking model of the last 25 years is going away.
What happens next? No-one in advertising quite knows. There are dozens of different projects for new โprivateโ ways to track users across different sites with different identity or logged-in models, but the most interesting remains Googleโs FLoC, in which the browser analyses your behaviour and puts you into (mostly) anonymous, interest-based cohorts. The publisher can ask for a cohort and show you ads, but your actual activity never leaves your device. Apple does more or less the same thing on iOS in its News and Stocks apps, except that Apple also serves the ads and displays the content, so the underlying publishers see nothing at all (except a wire transfer). I think itโs very likely that Apple is looking at offering this in third-party apps and in Safari as well (I wrote about that here). So, Apple and Google want to move the tracking from the server to the client, and to one company with one point for the user to control instead of disaggregation across hundreds of publishers and ad-tech companies.
Thereโs a bunch of reasons why this might not work, not least that no-one except Google and Apple want Google and Apple to have that much control over publishing and advertising. But itโs also worth stepping up another level again, and asking what advertisers are trying to do, anyway. People say โprivacyโ so often that one can lose sight of the fact that advertisers donโt care who you are - they just want to show ads to people that might be interested in them, and not to show ads to people who wonโt be interested. They donโt want to โviolate your privacyโ - they want to show diaper ads to parents, car ads to people who want a car and watch ads to rich people.
https://www.ben-evans.com/benedictevans/2021/5/25/apple-fedex-and-the-cookie-apocalypse
#apple #fedex #cookies #apocalypse #adtech #user #tracking #privacy
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Weโre now a couple of weeks into Appleโs latest iOS privacy move. If you want to track users between apps and the web, or from an ad through the app store to an install, then you need to ask permission and Apple has deliberately framed the question such that almost no-one will say yes. On some reports, CPMs are already down by half.
We could spend a lot of time arguing about the rights and wrongs of privacy and Appleโs framing and steering and use of its market dominance, but itโs probably more useful to suggest that all Apple has really done is implement the EU and Californiaโs cookie laws, โbut in appsโ, and in an especially aggressive way. Step up another level, and this reflects a pretty broad shift in attitudes towards privacy in general and the huge inverted pyramid of complexity and nonsense of third party ad tracking in particular. Chrome and Safari are turning third party cookies off anyway. The cookie apocalypse is upon us and the tracking model of the last 25 years is going away.
What happens next? No-one in advertising quite knows. There are dozens of different projects for new โprivateโ ways to track users across different sites with different identity or logged-in models, but the most interesting remains Googleโs FLoC, in which the browser analyses your behaviour and puts you into (mostly) anonymous, interest-based cohorts. The publisher can ask for a cohort and show you ads, but your actual activity never leaves your device. Apple does more or less the same thing on iOS in its News and Stocks apps, except that Apple also serves the ads and displays the content, so the underlying publishers see nothing at all (except a wire transfer). I think itโs very likely that Apple is looking at offering this in third-party apps and in Safari as well (I wrote about that here). So, Apple and Google want to move the tracking from the server to the client, and to one company with one point for the user to control instead of disaggregation across hundreds of publishers and ad-tech companies.
Thereโs a bunch of reasons why this might not work, not least that no-one except Google and Apple want Google and Apple to have that much control over publishing and advertising. But itโs also worth stepping up another level again, and asking what advertisers are trying to do, anyway. People say โprivacyโ so often that one can lose sight of the fact that advertisers donโt care who you are - they just want to show ads to people that might be interested in them, and not to show ads to people who wonโt be interested. They donโt want to โviolate your privacyโ - they want to show diaper ads to parents, car ads to people who want a car and watch ads to rich people.
https://www.ben-evans.com/benedictevans/2021/5/25/apple-fedex-and-the-cookie-apocalypse
#apple #fedex #cookies #apocalypse #adtech #user #tracking #privacy
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Benedict Evans
Apple, Fedex and the cookie apocalypse โ Benedict Evans
As cookie-based ads go away, does the targeting move from the cloud to the client, or from the reader to the content? Does this make the strong stronger? Or does the money go to Fedex instead?
Comcast Subscriber Receives DMCA Notice for Downloading Ubuntu
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an anti-piracy company alleging that by torrenting an OS ISO released by Ubuntu itself, he breached copyright law.
Two decades ago, the BitTorrent protocol revolutionized peer-to-peer (P2P) file-sharing. The content-agnostic system allowed people to efficiently share and download even the largest files and soon grew to become the dominant method of transfer for millions of file-sharers.
Over the years, people have shared all kinds of content using torrents and it quickly became associated with mass copyright infringement of movies, TV shows, music and everything in between. However, BitTorrent is also used to distribute large volumes of data with the blessing of rightsholders, with the sharing of Linux distros a prime example.
Indeed, large companies such as Ubuntu owner Canonical actively encourage the distribution of their packages via BitTorrent, even going as far as operating their own tracker. This is effectively a green light for users to obtain Ubuntu using BitTorrent and is universally considered to be entirely safe. However, a development yesterday caused mass confusion when a user was accused of copyright infringement via a notice from his ISP.
Anti-Piracy Firm Sends DMCA Notice Against Comcast User
Posting to Redditโs /r/linux sub-Reddit, a forum with more than 656K subscribers, โNateNate60โ reported the unthinkable. After downloading an official Ubuntu ISO package (filename ubuntu-20.04.2.0-desktop-amd64.iso) he says he received a notice from Comcastโs Infinity claiming that heโd been reported for copyright infringement.
โWe have received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over your Xfinity Internet service,โ the posted notice reads.
NateNate60 wisely redacted the notice to remove the โIncident Numberโ and the precise time of the alleged infringement to protect his privacy but the clam was reported filed with Comcast on May 24, 2021.
https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/
#comcast #dmca #ubuntu #torrent #download
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by an anti-piracy company alleging that by torrenting an OS ISO released by Ubuntu itself, he breached copyright law.
Two decades ago, the BitTorrent protocol revolutionized peer-to-peer (P2P) file-sharing. The content-agnostic system allowed people to efficiently share and download even the largest files and soon grew to become the dominant method of transfer for millions of file-sharers.
Over the years, people have shared all kinds of content using torrents and it quickly became associated with mass copyright infringement of movies, TV shows, music and everything in between. However, BitTorrent is also used to distribute large volumes of data with the blessing of rightsholders, with the sharing of Linux distros a prime example.
Indeed, large companies such as Ubuntu owner Canonical actively encourage the distribution of their packages via BitTorrent, even going as far as operating their own tracker. This is effectively a green light for users to obtain Ubuntu using BitTorrent and is universally considered to be entirely safe. However, a development yesterday caused mass confusion when a user was accused of copyright infringement via a notice from his ISP.
Anti-Piracy Firm Sends DMCA Notice Against Comcast User
Posting to Redditโs /r/linux sub-Reddit, a forum with more than 656K subscribers, โNateNate60โ reported the unthinkable. After downloading an official Ubuntu ISO package (filename ubuntu-20.04.2.0-desktop-amd64.iso) he says he received a notice from Comcastโs Infinity claiming that heโd been reported for copyright infringement.
โWe have received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over your Xfinity Internet service,โ the posted notice reads.
NateNate60 wisely redacted the notice to remove the โIncident Numberโ and the precise time of the alleged infringement to protect his privacy but the clam was reported filed with Comcast on May 24, 2021.
https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/
#comcast #dmca #ubuntu #torrent #download
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Torrentfreak
Comcast Subscriber Receives DMCA Notice for Downloading Ubuntu * TorrentFreak
Every day, people who download and share pirated content receive DMCA notices via their ISPs, warning them to cease and desist their infringing behavior. While the majority of these notices are accurate, one Ubuntu user says he has just been targeted by anโฆ
WhatsApp sues Indian government over โmass surveillanceโ internet laws
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
WhatsApp has sued the Indian government over new internet laws which the company says will โseverely undermineโ the privacy of their users.
The new IT laws, which have been called oppressive and draconian, give the Indian government greater power to monitor online activity, including on encrypted apps like WhatsApp and Signal. They were passed in February but were due to come into effect on Wednesday.
Under the laws, encryption โ which keeps communications on the app private and inaccessible to outside parties โ would have to be removed from WhatsApp in India and messages would have to be put into a โtraceableโ database. The government would then be able to identify and take action against the sender if any content was ruled โunlawfulโ.
A lawyer for WhatsApp told the Delhi high court: โA government that chooses to mandate traceability is effectively mandating a new form of mass surveillance.
In order to trace even one message, services would have to trace every message. There is no way to predict which message Indian government would want to investigate in the future.โ
https://www.theguardian.com/world/2021/may/26/whatsapp-sues-indian-government-over-mass-surveillance-internet-laws
#whatsapp #DeleteWhatsapp #india #gov #surveillance
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
WhatsApp has sued the Indian government over new internet laws which the company says will โseverely undermineโ the privacy of their users.
The new IT laws, which have been called oppressive and draconian, give the Indian government greater power to monitor online activity, including on encrypted apps like WhatsApp and Signal. They were passed in February but were due to come into effect on Wednesday.
Under the laws, encryption โ which keeps communications on the app private and inaccessible to outside parties โ would have to be removed from WhatsApp in India and messages would have to be put into a โtraceableโ database. The government would then be able to identify and take action against the sender if any content was ruled โunlawfulโ.
A lawyer for WhatsApp told the Delhi high court: โA government that chooses to mandate traceability is effectively mandating a new form of mass surveillance.
In order to trace even one message, services would have to trace every message. There is no way to predict which message Indian government would want to investigate in the future.โ
https://www.theguardian.com/world/2021/may/26/whatsapp-sues-indian-government-over-mass-surveillance-internet-laws
#whatsapp #DeleteWhatsapp #india #gov #surveillance
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
the Guardian
WhatsApp sues Indian government over โmass surveillanceโ internet laws
Lawsuit says controversial new laws are unconstitutional and violate the right to the preservation of privacy
Media is too big
VIEW IN TELEGRAM
Edward Snowden Hails Court Ruling as Progress on Acknowledging 'Devastation' of Mass Surveillance
Former National Security Agency contractor Edward Snowden hailed a new ruling out of a European court on intelligence-gathering practices, emphasizing "how far we've come" on acknowledging the "devastating consequences" of mass surveillance.
"It is hard to overemphasize how far we've come from the pre-2013 world when even the highest judicial authorities are beginning to acknowledge the devastating consequence of two decades' mass surveillance," Snowden tweeted in response to the Grand Chamber of the European Court of Human Rights' recent decision.
https://telegra.ph/Edward-Snowden-hails-court-ruling-as-progress-on-acknowledging-devastation-of-mass-surveillance-05-26
via www.newsweek.com
#snowden #surveillance #consequences #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Former National Security Agency contractor Edward Snowden hailed a new ruling out of a European court on intelligence-gathering practices, emphasizing "how far we've come" on acknowledging the "devastating consequences" of mass surveillance.
"It is hard to overemphasize how far we've come from the pre-2013 world when even the highest judicial authorities are beginning to acknowledge the devastating consequence of two decades' mass surveillance," Snowden tweeted in response to the Grand Chamber of the European Court of Human Rights' recent decision.
https://telegra.ph/Edward-Snowden-hails-court-ruling-as-progress-on-acknowledging-devastation-of-mass-surveillance-05-26
via www.newsweek.com
#snowden #surveillance #consequences #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
A hacktivist has scraped a wealth of data from the crime and neighborhood watch app Citizen and posted it on a dark web site, Motherboard has learned. The data includes a huge amount of data related to 1.7 million "incidents"โevents that Citizen informs users about concerning crime or perceived crime in their areaโsuch as the GPS coordinates of where the incident took place, its update history, a clip of the police radio that the incident relates to, and associated images.
On their dark web site, called "The Concerned Citizen's Citizen Hack," the hacker writes "Fuck snitches, fuck Citizen, fuck Andrew Frame and remember, kids: Cops are not your friends." Andrew Frame is the CEO of Citizen; Frame was responsible for putting a $30,000 bounty for information that would lead to the arrest of a person the company mistakenly suspected of starting a recent wildfire, The Verge reported.
Much of this information would ordinarily be available to users as part of the normal functioning of the Citizen app. But with the hacker scraping it en masse and releasing it as a series of files to download, the data is qualitatively different from what the Citizen app offers, and allows journalists and researchers to gain greater insight into the use and spread of the app around the country. The scrape is somewhat similar to other recent mass collections and redistributions of public information, such as the Parler scrape that occurred after the January 6 insurrection at the U.S. Capitol.
"It's like a full log of police activity in multiple U.S. cities," the hacker, who said they affiliate themselves with the hacking collective Anonymous, told Motherboard. Citizen incidents are often (but not always) linked to police activity; Citizen produces its own summaries of events by listening to police scanners and pushing alerts about them to Citizen users. Users can also contribute their own videos.
https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web
#hacker #acktivist #scrape #citizen #app #data #darknetlive
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
A hacktivist has scraped a wealth of data from the crime and neighborhood watch app Citizen and posted it on a dark web site, Motherboard has learned. The data includes a huge amount of data related to 1.7 million "incidents"โevents that Citizen informs users about concerning crime or perceived crime in their areaโsuch as the GPS coordinates of where the incident took place, its update history, a clip of the police radio that the incident relates to, and associated images.
On their dark web site, called "The Concerned Citizen's Citizen Hack," the hacker writes "Fuck snitches, fuck Citizen, fuck Andrew Frame and remember, kids: Cops are not your friends." Andrew Frame is the CEO of Citizen; Frame was responsible for putting a $30,000 bounty for information that would lead to the arrest of a person the company mistakenly suspected of starting a recent wildfire, The Verge reported.
Much of this information would ordinarily be available to users as part of the normal functioning of the Citizen app. But with the hacker scraping it en masse and releasing it as a series of files to download, the data is qualitatively different from what the Citizen app offers, and allows journalists and researchers to gain greater insight into the use and spread of the app around the country. The scrape is somewhat similar to other recent mass collections and redistributions of public information, such as the Parler scrape that occurred after the January 6 insurrection at the U.S. Capitol.
"It's like a full log of police activity in multiple U.S. cities," the hacker, who said they affiliate themselves with the hacking collective Anonymous, told Motherboard. Citizen incidents are often (but not always) linked to police activity; Citizen produces its own summaries of events by listening to police scanners and pushing alerts about them to Citizen users. Users can also contribute their own videos.
https://www.vice.com/en/article/pkbg89/hacker-hacktivist-citizen-app-scrape-dark-web
#hacker #acktivist #scrape #citizen #app #data #darknetlive
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Vice
Hacktivist Posts Massive Scrape of Crime App Citizen to Dark Web
The cache includes data on 1.7 million incidents, giving insight into the scale of Citizen around the country.
Apple v Epic CourtExhibits - All the Apple vs Epic court files OCRโed
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
๐๐ผ Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
#epic #apple #courtfiles
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
๐๐ผ Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
#epic #apple #courtfiles
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Apple v Epic CourtExhibits.zip
1.5 GB
Apple v Epic CourtExhibits - All the Apple vs Epic court files OCRโed
๐๐ผ Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
#epic #apple #courtfiles #download
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐๐ผ Download:
https://www.dropbox.com/sh/62uoiig3mg74bds/AAAwA2GK7m_jqZRDnLmK6mvha?dl=0
https://nitter.pussthecat.org/rjonesy/status/1397591446048448514
via Twitter
#epic #apple #courtfiles #download
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Flashpoint_Chainalysis_Hydra_Crypto_Cybercrime_Research.pdf
5 MB
Flashpoint and Chainalysis Investigate Cryptocurrency Cybercrime on Russian Dark Market โHydraโ
Since Hydraโs launch in 2016, cryptocurrency activity conducted through the illicit marketplace has skyrocketed: growing from $9.4 million in 2016 to $1.37 billion in 2020.
When profits from illicit sales leave Hydra seller accounts, the money trails go dark. Sellers use veiled, in-region financial operators to convert their withdrawals into Russian fiat currencies and obfuscate further steps in the financial chain.
https://go.flashpoint-intel.com/docs/chainalysis-hydra-cryptocurrency-cybercrime
#chainalysis #cryptocurrency #hydra #cybercrime #research #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Since Hydraโs launch in 2016, cryptocurrency activity conducted through the illicit marketplace has skyrocketed: growing from $9.4 million in 2016 to $1.37 billion in 2020.
When profits from illicit sales leave Hydra seller accounts, the money trails go dark. Sellers use veiled, in-region financial operators to convert their withdrawals into Russian fiat currencies and obfuscate further steps in the financial chain.
https://go.flashpoint-intel.com/docs/chainalysis-hydra-cryptocurrency-cybercrime
#chainalysis #cryptocurrency #hydra #cybercrime #research #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Japanese government agencies suffer data breaches after Fujitsu hack
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool.
Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
It is not yet clear if this breach occurred because of a vulnerability exploit, or a targeted supply-chain attack, and an investigation is ongoing.
Attackers accessed at least 76,000 email addresses
Yesterday, the Ministry of Land, Infrastructure, Transport and Tourism and the National Cyber โโSecurity Center (NISC) of Japan announced that attackers were able to obtain inside information via Fujitsu's information-sharing tool.
Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
Fujitsu's ProjectWEB enables companies and organizations to exchange information internally, with project managers and stakeholders, for example.
https://www.bleepingcomputer.com/news/security/japanese-government-agencies-suffer-data-breaches-after-fujitsu-hack/
#japanese #gov #data #breach #fujitsu #attack
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool.
Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
It is not yet clear if this breach occurred because of a vulnerability exploit, or a targeted supply-chain attack, and an investigation is ongoing.
Attackers accessed at least 76,000 email addresses
Yesterday, the Ministry of Land, Infrastructure, Transport and Tourism and the National Cyber โโSecurity Center (NISC) of Japan announced that attackers were able to obtain inside information via Fujitsu's information-sharing tool.
Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
Fujitsu's ProjectWEB enables companies and organizations to exchange information internally, with project managers and stakeholders, for example.
https://www.bleepingcomputer.com/news/security/japanese-government-agencies-suffer-data-breaches-after-fujitsu-hack/
#japanese #gov #data #breach #fujitsu #attack
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
BleepingComputer
Japanese government agencies suffer data breaches after Fujitsu hack
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool. Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
Media is too big
VIEW IN TELEGRAM
Cyber Crime, How Bad Can it Be?
In this episode we take a look at just how bad a cyber attack on a small business or individual could be as well as the things you can do to protect yourself from such an attack.
https://www.youtube.com/watch?v=GzTE5rm4SDo
#hak5 #cybercrime #cyberattack #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
In this episode we take a look at just how bad a cyber attack on a small business or individual could be as well as the things you can do to protect yourself from such an attack.
https://www.youtube.com/watch?v=GzTE5rm4SDo
#hak5 #cybercrime #cyberattack #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
New TeamNewPipe/NewPipe release: v0.21.3 (stable)
### New
- Allow installation on external storage #6037
- Added debug option to disable media tunneling #6288
### Improved
- Remove extra newlines in strings #6274
- [PeerTube] Added workaround for HLS streams #6307
- Persistent backup/import location #6319
### Fixed
- Only show 'download has started' toast when download is started #6139
- Do not set reCaptcha cookie when there is no cookie stored #5997
- Dismiss previous snackbars when deleting downloads #5671
- [Player] Improve cache performance by fixing
- [Player] Fixed player not automatically playing #6266
- [Player] Fixed stuttering on Lineage OS by downgrading ExoPlayer to 2.12 #6294
- Fixed trying to delete object not in list #6127
- Fix ErrorActivity actionbar back button not working #6312
- Make some minor changes #6308
### Development
- Replaced if/else with switch in ErrorActivity #6109
- Use Animator.addListener() extension. #6152
- Fix some warnings #6189
- Update actions/setup-java to v2 #6079
https://github.com/TeamNewPipe/NewPipe/releases/tag/v0.21.3
๐ก ๐๐ผ NewPipe's GitHub releases
https://t.iss.one/newpipe_releases
#newpipe #update
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
### New
- Allow installation on external storage #6037
- Added debug option to disable media tunneling #6288
### Improved
- Remove extra newlines in strings #6274
- [PeerTube] Added workaround for HLS streams #6307
- Persistent backup/import location #6319
### Fixed
- Only show 'download has started' toast when download is started #6139
- Do not set reCaptcha cookie when there is no cookie stored #5997
- Dismiss previous snackbars when deleting downloads #5671
- [Player] Improve cache performance by fixing
fragmentSize is below the minimum warning #6238 - [Player] Fixed player not automatically playing #6266
- [Player] Fixed stuttering on Lineage OS by downgrading ExoPlayer to 2.12 #6294
- Fixed trying to delete object not in list #6127
- Fix ErrorActivity actionbar back button not working #6312
- Make some minor changes #6308
### Development
- Replaced if/else with switch in ErrorActivity #6109
- Use Animator.addListener() extension. #6152
- Fix some warnings #6189
- Update actions/setup-java to v2 #6079
https://github.com/TeamNewPipe/NewPipe/releases/tag/v0.21.3
๐ก ๐๐ผ NewPipe's GitHub releases
https://t.iss.one/newpipe_releases
#newpipe #update
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
GitHub
Release v0.21.3 ยท TeamNewPipe/NewPipe
โก๏ธ Blog post for this release
New
Allow installation on external storage #6037
Added debug option to disable media tunneling #6288
Improved
Remove extra newlines in strings #6274
[PeerTube] Add...
New
Allow installation on external storage #6037
Added debug option to disable media tunneling #6288
Improved
Remove extra newlines in strings #6274
[PeerTube] Add...
Media is too big
VIEW IN TELEGRAM
Boss of ATM Skimming Syndicate Arrested in Mexico
Florian โThe Sharkโ Tudor, the alleged ringleader of a prolific ATM skimming gang that siphoned hundreds of millions of dollars from bank accounts of tourists visiting Mexico over the last eight years, was arrested in Mexico City on Thursday in response to an extradition warrant from a Romanian court.
Tudor, a native of Craiova, Romania, moved to Mexico to set up Top Life Servicios, an ATM servicing company which managed a fleet of relatively new ATMs based in Mexico branded as Intacash.
https://krebsonsecurity.com/2021/05/boss-of-atm-skimming-syndicate-arrested-in-mexico/
๐ก The Riviera Maya Gang: Cash, Crime, Killing
https://www.youtube.com/watch?v=O9jf-RtpPXM
#atm #skimming #syndicate #tudor #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Florian โThe Sharkโ Tudor, the alleged ringleader of a prolific ATM skimming gang that siphoned hundreds of millions of dollars from bank accounts of tourists visiting Mexico over the last eight years, was arrested in Mexico City on Thursday in response to an extradition warrant from a Romanian court.
Tudor, a native of Craiova, Romania, moved to Mexico to set up Top Life Servicios, an ATM servicing company which managed a fleet of relatively new ATMs based in Mexico branded as Intacash.
https://krebsonsecurity.com/2021/05/boss-of-atm-skimming-syndicate-arrested-in-mexico/
๐ก The Riviera Maya Gang: Cash, Crime, Killing
https://www.youtube.com/watch?v=O9jf-RtpPXM
#atm #skimming #syndicate #tudor #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
More than half of Europeans want to replace lawmakers with AI, study says
Researchers at IE University's Center for the Governance of Change asked 2,769 people from 11 countries worldwide how they would feel about reducing the number of national parliamentarians in their country and giving those seats to an AI that would have access to their data.
The results, published Thursday, showed that despite AI's clear and obvious limitations, 51% of Europeans said they were in favor of such a move.
Outside Europe, some 75% of people surveyed in China supported the idea of replacing parliamentarians with AI, while 60% of American respondents opposed it.
https://www.cnbc.com/2021/05/27/europeans-want-to-replace-lawmakers-with-ai.html
#wtf #eu #lawmakers #ai #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Researchers at IE University's Center for the Governance of Change asked 2,769 people from 11 countries worldwide how they would feel about reducing the number of national parliamentarians in their country and giving those seats to an AI that would have access to their data.
The results, published Thursday, showed that despite AI's clear and obvious limitations, 51% of Europeans said they were in favor of such a move.
Outside Europe, some 75% of people surveyed in China supported the idea of replacing parliamentarians with AI, while 60% of American respondents opposed it.
https://www.cnbc.com/2021/05/27/europeans-want-to-replace-lawmakers-with-ai.html
#wtf #eu #lawmakers #ai #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
CNBC
More than half of Europeans want to replace lawmakers with AI, study says
A study from IE University has found that most Europeans would like to see some of their members of parliament replaced by algorithms.
US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps
For US soldiers tasked with the custody of nuclear weapons in Europe, the stakes are high. Security protocols are lengthy, detailed and need to be known by heart. To simplify this process, some service members have been using publicly visible flashcard learning apps โ inadvertently revealing a multitude of sensitive security protocols about US nuclear weapons and the bases at which they are stored.
While the presence of US nuclear weapons in Europe has long been detailed by various leaked documents, photos and statements by retired officials, their specific locations are officially still a secret with governments neither confirming nor denying their presence.
As many campaigners and parliamentarians in some European nations see it, this ambiguity has often hampered open and democratic debate about the rights and wrongs of hosting nuclear weapons.
However, the flashcards studied by soldiers tasked with guarding these devices reveal not just the bases, but even identify the exact shelters with โhotโ vaults that likely contain nuclear weapons.
They also detail intricate security details and protocols such as the positions of cameras, the frequency of patrols around the vaults, secret duress words that signal when a guard is being threatened and the unique identifiers that a restricted area badge needs to have.
https://www.bellingcat.com/news/2021/05/28/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps/
#bellingcat #usa #soldiers #expose #nuclear #waepons #secrets #flashcard #apps
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
For US soldiers tasked with the custody of nuclear weapons in Europe, the stakes are high. Security protocols are lengthy, detailed and need to be known by heart. To simplify this process, some service members have been using publicly visible flashcard learning apps โ inadvertently revealing a multitude of sensitive security protocols about US nuclear weapons and the bases at which they are stored.
While the presence of US nuclear weapons in Europe has long been detailed by various leaked documents, photos and statements by retired officials, their specific locations are officially still a secret with governments neither confirming nor denying their presence.
As many campaigners and parliamentarians in some European nations see it, this ambiguity has often hampered open and democratic debate about the rights and wrongs of hosting nuclear weapons.
However, the flashcards studied by soldiers tasked with guarding these devices reveal not just the bases, but even identify the exact shelters with โhotโ vaults that likely contain nuclear weapons.
They also detail intricate security details and protocols such as the positions of cameras, the frequency of patrols around the vaults, secret duress words that signal when a guard is being threatened and the unique identifiers that a restricted area badge needs to have.
https://www.bellingcat.com/news/2021/05/28/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps/
#bellingcat #usa #soldiers #expose #nuclear #waepons #secrets #flashcard #apps
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
bellingcat
US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps - bellingcat
Online study aids used by US soldiers contained detailed information about base security and the location of nuclear devices in Europe.
This media is not supported in your browser
VIEW IN TELEGRAM
The Robot Smiled Back
Columbia Engineering researchers use AI to teach robots to make appropriate reactive human facial expressions, an ability that could build trust between humans and their robotic co-workers and care-givers.
https://www.youtube.com/watch?v=1vBLI-q04kM
https://telegra.ph/The-Robot-Smiled-Back-05-28
via www.newswise.com
#research #robots #ai #facial #expressions #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
Columbia Engineering researchers use AI to teach robots to make appropriate reactive human facial expressions, an ability that could build trust between humans and their robotic co-workers and care-givers.
https://www.youtube.com/watch?v=1vBLI-q04kM
https://telegra.ph/The-Robot-Smiled-Back-05-28
via www.newswise.com
#research #robots #ai #facial #expressions #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv