Sony Wins Pirate Site Blocking Order Against DNS-Resolver Quad9 (Updated)
Sony Music has obtained an injunction that requires the freely available DNS-resolver Quad9 to block a popular pirate site. The order, issued by the District Court in Hamburg, Germany, is the first of its kind. The Quad9 foundation has already announced that it will protest the judgment, which could have far-reaching consequences.
Copyright holders have made serious work of website blocking in Germany.
A few months ago a voluntary agreement was announced with the country’s largest ISPs, which agreed to block pirate sites after a verification process.
This is a major win for rightsholders, but one that can be easily defeated. The Internet providers use relatively simple DNS blockades which can be circumvented by switching to third-party DNS resolvers such as Google, Cloudflare or Quad9, which are all free to use. However, that loophole may not last forever.
Last week Sony Music obtained an injunction at the District Court of Hamburg which requires the Swiss DNS-resolver Quad9 to block access to a site that’s frequently used to host pirated music. While the site remains unnamed, the consequences could be far-reaching.
The Hamburg court found that the DNS service is not eligible for the liability protections that other third-party intermediaries such as ISPs and domain registrars typically enjoy. And if Quad9 fails to comply with the injunction, it will have to pay a fine of 250,000 euros per ‘infringing’ DNS query plus potentially two years in prison.
One of the arguments that Sony brought up in court was that Quad9 already blocks various problematic sites voluntarily. In fact, the DNS-resolver promotes threat blocking as a feature.
https://torrentfreak.com/sony-wins-pirate-site-blocking-order-against-dns-resolver-quad9-210621/
#sony #copyright #pirate #site #blocking #dns #resolver #quad9 #cannapower
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Sony Music has obtained an injunction that requires the freely available DNS-resolver Quad9 to block a popular pirate site. The order, issued by the District Court in Hamburg, Germany, is the first of its kind. The Quad9 foundation has already announced that it will protest the judgment, which could have far-reaching consequences.
Copyright holders have made serious work of website blocking in Germany.
A few months ago a voluntary agreement was announced with the country’s largest ISPs, which agreed to block pirate sites after a verification process.
This is a major win for rightsholders, but one that can be easily defeated. The Internet providers use relatively simple DNS blockades which can be circumvented by switching to third-party DNS resolvers such as Google, Cloudflare or Quad9, which are all free to use. However, that loophole may not last forever.
Last week Sony Music obtained an injunction at the District Court of Hamburg which requires the Swiss DNS-resolver Quad9 to block access to a site that’s frequently used to host pirated music. While the site remains unnamed, the consequences could be far-reaching.
The Hamburg court found that the DNS service is not eligible for the liability protections that other third-party intermediaries such as ISPs and domain registrars typically enjoy. And if Quad9 fails to comply with the injunction, it will have to pay a fine of 250,000 euros per ‘infringing’ DNS query plus potentially two years in prison.
One of the arguments that Sony brought up in court was that Quad9 already blocks various problematic sites voluntarily. In fact, the DNS-resolver promotes threat blocking as a feature.
https://torrentfreak.com/sony-wins-pirate-site-blocking-order-against-dns-resolver-quad9-210621/
#sony #copyright #pirate #site #blocking #dns #resolver #quad9 #cannapower
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
Sony Wins Pirate Site Blocking Order Against DNS-Resolver Quad9 (Updated) * TorrentFreak
Sony Music has obtained an injunction that requires the freely available DNS-resolver Quad9 to block a popular pirate site.
Media is too big
VIEW IN TELEGRAM
Anonymous hacker arrested after fleeing 10 years
The US Department of Justice reports a blow against Anonymous. After almost a decade on the run, Christopher Doyon, known as Commander X of the Anonymous hacker group, was arrested on June 11 in Mexico and immediately deported to the United States. He had to appear there in a US federal court last Tuesday.
Doyon considers his deportation from Mexico to the USA to be unlawful: “Please tell the world that I was illegally transferred from Mexico, where I had political asylum and where I was a humanitarian refugee. I was taken out of the country under cover of darkness” he says in a recording his sister Amy Beth Doyon posted on social media. She also asks the Mexican President Andrés Manuel López Obrador to campaign for the release of her brother.
https://marijuanapy.com/anonymous-hackers-arrested-after-fleeing-10-years/
#anonymous #arrested #usa #mexico #commanderX
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
The US Department of Justice reports a blow against Anonymous. After almost a decade on the run, Christopher Doyon, known as Commander X of the Anonymous hacker group, was arrested on June 11 in Mexico and immediately deported to the United States. He had to appear there in a US federal court last Tuesday.
Doyon considers his deportation from Mexico to the USA to be unlawful: “Please tell the world that I was illegally transferred from Mexico, where I had political asylum and where I was a humanitarian refugee. I was taken out of the country under cover of darkness” he says in a recording his sister Amy Beth Doyon posted on social media. She also asks the Mexican President Andrés Manuel López Obrador to campaign for the release of her brother.
https://marijuanapy.com/anonymous-hackers-arrested-after-fleeing-10-years/
#anonymous #arrested #usa #mexico #commanderX
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Edward Snowden: The Most Dangerous Censorship
Invisible but present, and far from the eyes of the public
At the height of the events in Poland, just at the time when the trade union Solidarnosc was being outlawed, I received a letter stamped NIE CENZUROWANO. What exactly did these words mean? They were probably supposed to indicate that the country from which it came was free of censorship.
But it could also mean that letters not bearing this stamp were censored, a token of the selective nature of this office, which apparently mistrusts certain citizens while trusting others. It could naturally also mean that all letters bearing this stamp actually did pass through the censor's hand. At any rate, this symbolic and ambiguous stamp gives a profound insight into the nature of censorship, which on the one hand wants to establish its rightfulness, while at the same time attempting to camouflage its very existence.
For, while censorship considers itself a historical necessity and an institution destined to defend public order and the ruling political party, it does not like to admit that it is there. It sees itself as a temporary evil, to be applied during a state of war. Censorship, then, is only a transitory measure which will be scrapped as soon as all those people who write letters, books, etc are politically mature and responsible, thus exonerating the State and its representatives from having to act as guardians of their citizens.
https://edwardsnowden.substack.com/p/on-censorship-pt-1
#snowden #censorship
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Invisible but present, and far from the eyes of the public
At the height of the events in Poland, just at the time when the trade union Solidarnosc was being outlawed, I received a letter stamped NIE CENZUROWANO. What exactly did these words mean? They were probably supposed to indicate that the country from which it came was free of censorship.
But it could also mean that letters not bearing this stamp were censored, a token of the selective nature of this office, which apparently mistrusts certain citizens while trusting others. It could naturally also mean that all letters bearing this stamp actually did pass through the censor's hand. At any rate, this symbolic and ambiguous stamp gives a profound insight into the nature of censorship, which on the one hand wants to establish its rightfulness, while at the same time attempting to camouflage its very existence.
For, while censorship considers itself a historical necessity and an institution destined to defend public order and the ruling political party, it does not like to admit that it is there. It sees itself as a temporary evil, to be applied during a state of war. Censorship, then, is only a transitory measure which will be scrapped as soon as all those people who write letters, books, etc are politically mature and responsible, thus exonerating the State and its representatives from having to act as guardians of their citizens.
https://edwardsnowden.substack.com/p/on-censorship-pt-1
#snowden #censorship
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Continuing Ed — with Edward Snowden
The Most Dangerous Censorship
Invisible but present, and far from the eyes of the public
Even creepier COVID tracking: Google silently pushed app to users’ phones [Updated]
Massachusetts launched a COVID tracking app, and uh, it was automatically installed?!
Over the weekend, Google and the state of Massachusetts managed to make creepy COVID tracking apps even creepier by automatically installing them on people's Android phones. Numerous reports on Reddit, Hacker News, and in-app reviews claim that "MassNotify," Massachusetts' COVID tracking app, silently installed on their Android device without user consent.
https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/
#google #covid #tracking
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Massachusetts launched a COVID tracking app, and uh, it was automatically installed?!
Over the weekend, Google and the state of Massachusetts managed to make creepy COVID tracking apps even creepier by automatically installing them on people's Android phones. Numerous reports on Reddit, Hacker News, and in-app reviews claim that "MassNotify," Massachusetts' COVID tracking app, silently installed on their Android device without user consent.
https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/
#google #covid #tracking
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Ars Technica
Even creepier COVID tracking: Google silently pushed app to users’ phones [Updated]
Massachusetts launched a COVID tracking app, and uh, it was automatically installed?!
95: Jon & Brian's Big Adventure
Darknet Diaries - EP 95: Jon & Brian's Big Adventure
Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’re paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of how they prepare and execute a mission like this. But even with all the preparation, something still goes terribly wrong.
https://darknetdiaries.com/episode/95/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’re paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of how they prepare and execute a mission like this. But even with all the preparation, something still goes terribly wrong.
https://darknetdiaries.com/episode/95/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Russian security chief says Moscow will cooperate with U.S. against hackers
MOSCOW, June 23 (Reuters) - Russia will work with the United States to locate cyber criminals, the head of the FSB security service said on Wednesday, a week after the countries' leaders agreed to step up cooperation in certain areas.
FSB chief Alexander Bortnikov said the security agency would follow agreements reached by presidents Vladimir Putin and Joe Biden in discussions about cybersecurity issues at a summit last week in Switzerland, their first face-to-face meeting since Biden took office in January.
"We will work together (on locating hackers) and hope for reciprocity," the RIA news agency quoted Bortnikov as saying at a security conference in Moscow.
Another senior official said Moscow was awaiting an answer from Washington on holding consultations about cybersecurity issues, TASS news agency reported.
https://www.reuters.com/technology/russian-security-chief-says-moscow-will-cooperate-with-us-against-hackers-report-2021-06-23/
#russia #usa #cooperate #hacker #cyberattack
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
MOSCOW, June 23 (Reuters) - Russia will work with the United States to locate cyber criminals, the head of the FSB security service said on Wednesday, a week after the countries' leaders agreed to step up cooperation in certain areas.
FSB chief Alexander Bortnikov said the security agency would follow agreements reached by presidents Vladimir Putin and Joe Biden in discussions about cybersecurity issues at a summit last week in Switzerland, their first face-to-face meeting since Biden took office in January.
"We will work together (on locating hackers) and hope for reciprocity," the RIA news agency quoted Bortnikov as saying at a security conference in Moscow.
Another senior official said Moscow was awaiting an answer from Washington on holding consultations about cybersecurity issues, TASS news agency reported.
https://www.reuters.com/technology/russian-security-chief-says-moscow-will-cooperate-with-us-against-hackers-report-2021-06-23/
#russia #usa #cooperate #hacker #cyberattack
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Reuters
Russian security chief says Moscow will work with U.S. to find hackers
Russia will work with the United States to track down cyber criminals, the head of the FSB security service said on Wednesday, a week after U.S. President Joe Biden and Russian President Vladimir Putin agreed to increase cooperation in certain areas.
Video Game Preservation
An archive of commercial video game source code.
https://github.com/videogamepreservation
#videogames #preservation #archive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
An archive of commercial video game source code.
https://github.com/videogamepreservation
#videogames #preservation #archive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
Video Game Preservation
An archive of commercial video game source code. Video Game Preservation has 116 repositories available. Follow their code on GitHub.
South African Brothers Vanish, and So Does $3.6 Billion in Bitcoin
A Cape Town law firm hired by investors says they can’t locate the brothers and has reported the matter to the Hawks, an elite unit of the national police force. It’s also told crypto exchanges across the globe should any attempt be made to convert the digital coins.
Following a surge in Bitcoin’s value in the past year, the disappearance of about 69,000 coins -- worth more than $4 billion at their April peak -- would represent the biggest-ever dollar loss in a cryptocurrency scam. The incident could spur regulators’ efforts to impose order on the market amid rising cases of fraud.
The first signs of trouble came in April, as Bitcoin was rocketing to a record. Africrypt Chief Operating Officer Ameer Cajee, the elder brother, informed clients that the company was the victim of a hack. He asked them not to report the incident to lawyers and authorities, as it would slow down the recovery process of the missing funds.
https://www.bloomberg.com/news/articles/2021-06-23/s-african-brothers-vanish-and-so-does-3-6-billion-in-bitcoin
#cryptocurrency #investment #scam #africrypt
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A Cape Town law firm hired by investors says they can’t locate the brothers and has reported the matter to the Hawks, an elite unit of the national police force. It’s also told crypto exchanges across the globe should any attempt be made to convert the digital coins.
Following a surge in Bitcoin’s value in the past year, the disappearance of about 69,000 coins -- worth more than $4 billion at their April peak -- would represent the biggest-ever dollar loss in a cryptocurrency scam. The incident could spur regulators’ efforts to impose order on the market amid rising cases of fraud.
The first signs of trouble came in April, as Bitcoin was rocketing to a record. Africrypt Chief Operating Officer Ameer Cajee, the elder brother, informed clients that the company was the victim of a hack. He asked them not to report the incident to lawyers and authorities, as it would slow down the recovery process of the missing funds.
https://www.bloomberg.com/news/articles/2021-06-23/s-african-brothers-vanish-and-so-does-3-6-billion-in-bitcoin
#cryptocurrency #investment #scam #africrypt
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Bloomberg.com
South African Brothers Vanish, and So Does $3.6 Billion in Bitcoin
A pair of South African brothers have vanished, along with Bitcoin worth $3.6 billion from their cryptocurrency investment platform.
John McAfee dead: Antivirus software mogul found dead in Barcelona prison
John McAfee, the founder of McAfee antivirus, has been found dead in a Barcelona prison this afternoon.
It comes after the Spanish High Court authorised the extradition of McAfee to the United States where he faces tax evasion charges, a court document released on Wednesday showed.
McAfee, 75, who was arrested at Barcelona airport in October 2020, said during an extradition hearing this month that the accusations against him were politically motivated.
He linked the charges filed by the Internal Revenue Service to his failed bid to run as a Libertarian Party candidate in the 2020 US presidential election, a second such attempt.
The Spanish prosecutor, Carlos Bautista, said McAfee was just a tax dodger and dismissed the accusation of a political motivation, insisting the Libertarian Party rarely gains more than 1 percent of votes in U.S. elections.
US federal prosecutors unsealed an indictment in October against McAfee over charges that he evaded taxes and willfully failed to file returns.
That came shortly after the U.S. Securities and Exchange Commission said it had brought civil charges against McAfee, alleging he made over $23.1million in undisclosed income from false and misleading cryptocurrency recommendations.
The Spanish court authorised the extradition but only to face charges related to his tax returns for 2016, 2017 and 2018 as the prosecution had asked.
https://www.express.co.uk/news/world/1453763/John-McAfee-dead-suicide-Barcelona-prison-spain-tax-evasion-probe
https://www.vilaweb.cat/noticies/john-mcafee-suicidi-barcelona-can-brians-extradicio/
https://digismak.com/john-mcafee-the-creator-of-the-antivirus-found-dead-in-brians-2-prison-after-the-an-ordered-his-extradition/
https://www.euroweeklynews.com/2021/06/23/breaking-news-antivirus-creator-john-mcafee-found-dead-in-catalan-prison-cell/
#macafee #suicide #barcelona #prison
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
John McAfee, the founder of McAfee antivirus, has been found dead in a Barcelona prison this afternoon.
It comes after the Spanish High Court authorised the extradition of McAfee to the United States where he faces tax evasion charges, a court document released on Wednesday showed.
McAfee, 75, who was arrested at Barcelona airport in October 2020, said during an extradition hearing this month that the accusations against him were politically motivated.
He linked the charges filed by the Internal Revenue Service to his failed bid to run as a Libertarian Party candidate in the 2020 US presidential election, a second such attempt.
The Spanish prosecutor, Carlos Bautista, said McAfee was just a tax dodger and dismissed the accusation of a political motivation, insisting the Libertarian Party rarely gains more than 1 percent of votes in U.S. elections.
US federal prosecutors unsealed an indictment in October against McAfee over charges that he evaded taxes and willfully failed to file returns.
That came shortly after the U.S. Securities and Exchange Commission said it had brought civil charges against McAfee, alleging he made over $23.1million in undisclosed income from false and misleading cryptocurrency recommendations.
The Spanish court authorised the extradition but only to face charges related to his tax returns for 2016, 2017 and 2018 as the prosecution had asked.
https://www.express.co.uk/news/world/1453763/John-McAfee-dead-suicide-Barcelona-prison-spain-tax-evasion-probe
https://www.vilaweb.cat/noticies/john-mcafee-suicidi-barcelona-can-brians-extradicio/
https://digismak.com/john-mcafee-the-creator-of-the-antivirus-found-dead-in-brians-2-prison-after-the-an-ordered-his-extradition/
https://www.euroweeklynews.com/2021/06/23/breaking-news-antivirus-creator-john-mcafee-found-dead-in-catalan-prison-cell/
#macafee #suicide #barcelona #prison
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Express.co.uk
John McAfee dead: Antivirus software mogul found dead in Barcelona prison
JOHN McAfee, the founder of McAfee antivirus, has been found dead in a Barcelona prison this afternoon.
Google turned me into a serial killer
As I was scrolling through my inbox today, I stumbled upon an e-mail from a former colleague of mine who wanted to inform me that a Google search of my name yields a picture of me linked to a Wikipedia article about a serial killer who happens to have the same name as mine.
https://hristo-georgiev.com/google-turned-me-into-a-serial-killer
#google #DeleteGoogle
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
As I was scrolling through my inbox today, I stumbled upon an e-mail from a former colleague of mine who wanted to inform me that a Google search of my name yields a picture of me linked to a Wikipedia article about a serial killer who happens to have the same name as mine.
https://hristo-georgiev.com/google-turned-me-into-a-serial-killer
#google #DeleteGoogle
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Hristo-Georgiev
Google turned me into a serial killer · Hristo Georgiev
Hristo Georgiev's Website
Update: Warp-Plus-Cloudflare - A project for getting unlimited GB on Warp+ (
WARP+ uses Cloudflare’s virtual private backbone, known as Argo, to achieve higher speeds and ensure your connection is encrypted across the long haul of the Internet. Read more.
https://github.com/ALIILAPRO/warp-plus-cloudflare
#cloudflare #warp #script #tool
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://1.1.1.1/ )WARP+ uses Cloudflare’s virtual private backbone, known as Argo, to achieve higher speeds and ensure your connection is encrypted across the long haul of the Internet. Read more.
https://github.com/ALIILAPRO/warp-plus-cloudflare
#cloudflare #warp #script #tool
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
ALIILAPRO/warp-plus-cloudflare
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ ) - ALIILAPRO/warp-plus-cloudflare
Elcomsoft Breaks the Latest Version of VeraCrypt
Elcomsoft updates Elcomsoft Forensic Disk Decryptor, the company’s all-in-one tool for accessing encrypted disks and containers. In this update, the tool adds support for the latest versions of VeraCrypt, enabling experts to extract on-the-fly encryption keys from the computer’s RAM to instantly mount or decrypt VeraCrypt-protected disks without running password attacks and bypassing the associated complexity altogether.
Recent versions of VeraCrypt are using a newer, stronger way to keep on-the-fly encryption keys in the computer’s RAM. Elcomsoft Forensic Disk Decryptor 2.18 can now extract these on-the-fly encryption keys from the computer’s RAM for the latest versions of VeraCrypt.
https://www.elcomsoft.com/press_releases/efdd_20210603.html
#elcomsoft #forensic #veracrypt
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Elcomsoft updates Elcomsoft Forensic Disk Decryptor, the company’s all-in-one tool for accessing encrypted disks and containers. In this update, the tool adds support for the latest versions of VeraCrypt, enabling experts to extract on-the-fly encryption keys from the computer’s RAM to instantly mount or decrypt VeraCrypt-protected disks without running password attacks and bypassing the associated complexity altogether.
Recent versions of VeraCrypt are using a newer, stronger way to keep on-the-fly encryption keys in the computer’s RAM. Elcomsoft Forensic Disk Decryptor 2.18 can now extract these on-the-fly encryption keys from the computer’s RAM for the latest versions of VeraCrypt.
https://www.elcomsoft.com/press_releases/efdd_20210603.html
#elcomsoft #forensic #veracrypt
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Elcomsoft
Elcomsoft Breaks the Latest Version of VeraCrypt | Elcomsoft Co.Ltd.
3 June, 2021 Elcomsoft Breaks the Latest Version of VeraCrypt Elcomsoft updates Elcomsoft Forensic Disk Decryptor, the company’s all-in-one tool for accessing encrypted disks and containers. In this update, the tool adds support for the latest versions of…
Mozilla: Take control over your data with Rally, a novel privacy-first data sharing platform
Mozilla teams up with Princeton University researchers to enable crowdsourced science for public good; collaborates with research groups at Princeton, Stanford on upcoming studies.
Your data is valuable. But for too long, online services have pilfered, swapped, and exploited your data without your awareness. Privacy violations and filter bubbles are all consequences of a surveillance data economy. But what if, instead of companies taking your data without giving you a say, you could select who gets access to your data and put it to work for public good?
Today, we’re announcing the Mozilla Rally platform. Built for the browser with privacy and transparency at its core, Rally puts users in control of their data and empowers them to contribute their browsing data to crowdfund projects for a better Internet and a better society. At Mozilla, we’re working on building a better internet, one that puts people first, respects their privacy and gives them power over their online experience. We’ve been a leader in privacy features that help you control your data by blocking trackers. But, being “data-empowered” also requires the ability to choose who you want to access your data.
https://blog.mozilla.org/en/mozilla/take-control-over-your-data-with-rally-a-novel-privacy-first-data-sharing-platform/
#mozilla #privacy #rally #data #sharing
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Mozilla teams up with Princeton University researchers to enable crowdsourced science for public good; collaborates with research groups at Princeton, Stanford on upcoming studies.
Your data is valuable. But for too long, online services have pilfered, swapped, and exploited your data without your awareness. Privacy violations and filter bubbles are all consequences of a surveillance data economy. But what if, instead of companies taking your data without giving you a say, you could select who gets access to your data and put it to work for public good?
Today, we’re announcing the Mozilla Rally platform. Built for the browser with privacy and transparency at its core, Rally puts users in control of their data and empowers them to contribute their browsing data to crowdfund projects for a better Internet and a better society. At Mozilla, we’re working on building a better internet, one that puts people first, respects their privacy and gives them power over their online experience. We’ve been a leader in privacy features that help you control your data by blocking trackers. But, being “data-empowered” also requires the ability to choose who you want to access your data.
https://blog.mozilla.org/en/mozilla/take-control-over-your-data-with-rally-a-novel-privacy-first-data-sharing-platform/
#mozilla #privacy #rally #data #sharing
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
blog.mozilla.org
Take control over your data with Rally, a novel privacy-first data sharing platform | The Mozilla Blog
Mozilla teams up with Princeton University researchers to enable crowdsourced science for public good; collaborates with research groups at Princeton, Stan
Key witness in Assange case admits to lies in indictment
A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder.
A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder. The witness, who has a documented history with sociopathy and has received several convictions for sexual abuse of minors and wide-ranging financial fraud, made the admission in a newly published interview in Stundin where he also confessed to having continued his crime spree whilst working with the Department of Justice and FBI and receiving a promise of immunity from prosecution.
The man in question, Sigurdur Ingi Thordarson, was recruited by US authorities to build a case against Assange after misleading them to believe he was previously a close associate of his. In fact he had volunteered on a limited basis to raise money for Wikileaks in 2010 but was found to have used that opportunity to embezzle more than $50,000 from the organization. Julian Assange was visiting Thordarson’s home country of Iceland around this time due to his work with Icelandic media and members of parliament in preparing the Icelandic Modern Media Initiative, a press freedom project that produced a parliamentary resolution supporting whistleblowers and investigative journalism.
The United States is currently seeking Assange’s extradition from the United Kingdom in order to try him for espionage relating to the release of leaked classified documents. If convicted, he could face up to 175 years in prison. The indictment has sparked fears for press freedoms in the United States and beyond and prompted strong statements in support of Assange from Amnesty International, Reporters without borders, the editorial staff of the Washington Post and many others.
US officials presented an updated version of an indictment against him to a Magistrate court in London last summer. The veracity of the information contained therein is now directly contradicted by the main witness, whose testimony it is based on.
https://stundin.is/grein/13627/
#assange #wikileaks #usa #uk #extradition #indictment
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder.
A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder. The witness, who has a documented history with sociopathy and has received several convictions for sexual abuse of minors and wide-ranging financial fraud, made the admission in a newly published interview in Stundin where he also confessed to having continued his crime spree whilst working with the Department of Justice and FBI and receiving a promise of immunity from prosecution.
The man in question, Sigurdur Ingi Thordarson, was recruited by US authorities to build a case against Assange after misleading them to believe he was previously a close associate of his. In fact he had volunteered on a limited basis to raise money for Wikileaks in 2010 but was found to have used that opportunity to embezzle more than $50,000 from the organization. Julian Assange was visiting Thordarson’s home country of Iceland around this time due to his work with Icelandic media and members of parliament in preparing the Icelandic Modern Media Initiative, a press freedom project that produced a parliamentary resolution supporting whistleblowers and investigative journalism.
The United States is currently seeking Assange’s extradition from the United Kingdom in order to try him for espionage relating to the release of leaked classified documents. If convicted, he could face up to 175 years in prison. The indictment has sparked fears for press freedoms in the United States and beyond and prompted strong statements in support of Assange from Amnesty International, Reporters without borders, the editorial staff of the Washington Post and many others.
US officials presented an updated version of an indictment against him to a Magistrate court in London last summer. The veracity of the information contained therein is now directly contradicted by the main witness, whose testimony it is based on.
https://stundin.is/grein/13627/
#assange #wikileaks #usa #uk #extradition #indictment
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Heimildin
Key witness in Assange case admits to lies in indictment
A major witness in the United States’ Department of Justice case against Julian Assange has admitted to fabricating key accusations in the indictment against the Wikileaks founder.
Media is too big
VIEW IN TELEGRAM
Whistleblowers, The State, and Surveillance with Journalist Barrett Brown
Journalist Barrett Brown will be joining us to discuss the state, digital media, and FBI surveillance, The Intercept, Glenn Greenwald, and other issues related to political struggle.
https://www.youtube.com/watch?v=MBeMZ4UFMaM
#whistleblower #fbi #surveillance #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Journalist Barrett Brown will be joining us to discuss the state, digital media, and FBI surveillance, The Intercept, Glenn Greenwald, and other issues related to political struggle.
https://www.youtube.com/watch?v=MBeMZ4UFMaM
#whistleblower #fbi #surveillance #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Craig Wright was granted default judgement against Cobra
Now Cobra will have to remove all references to the Bitcoin whitepaper from bitcoin.org in the UK. The Judge criticized Cobra for not defending himself, despite his multiple emails to the court begging to adjourn the decision until after the COPA ruling.
He also highlighted that Cobra was unwilling to defend himself in front of the court, yet was still sitting in the aisles of the MS teams group as "Cobra" the anon. The judge actually pointed out that the defendant, who refused to defend himself in front of the court, was sitting right there in the aisles.
Cobra now has to pay £35,000 to the court. In addition to adhering to it's judgment.
https://www.reddit.com/r/bitcoincashSV/comments/o9ivuw/craig_wright_was_granted_default_judgement/
#bitcoin #whitepaper #wright #cobra #uk #copa
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Now Cobra will have to remove all references to the Bitcoin whitepaper from bitcoin.org in the UK. The Judge criticized Cobra for not defending himself, despite his multiple emails to the court begging to adjourn the decision until after the COPA ruling.
He also highlighted that Cobra was unwilling to defend himself in front of the court, yet was still sitting in the aisles of the MS teams group as "Cobra" the anon. The judge actually pointed out that the defendant, who refused to defend himself in front of the court, was sitting right there in the aisles.
Cobra now has to pay £35,000 to the court. In addition to adhering to it's judgment.
https://www.reddit.com/r/bitcoincashSV/comments/o9ivuw/craig_wright_was_granted_default_judgement/
#bitcoin #whitepaper #wright #cobra #uk #copa
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
reddit
Craig Wright was granted default judgement against Cobra.
Now Cobra will have to remove all references to the Bitcoin whitepaper from bitcoin.org in the UK. The Judge criticized Cobra for not defending...
2106.14851.pdf
1.5 MB
Data Poisoning Won't Save You From Facial Recognition
Data poisoning has been proposed as a compelling defense against facial recognition models trained on Web-scraped pictures. By perturbing the images they post online, users can fool models into misclassifying future (unperturbed) pictures.
We demonstrate that this strategy provides a false sense of security, as it ignores an inherent asymmetry between the parties: users' pictures are perturbed once and for all before being published (at which point they are scraped) and must thereafter fool all future models -- including models trained adaptively against the users' past attacks, or models that use technologies discovered after the attack.
https://arxiv.org/abs/2106.14851
#facial #recognition #defense #data #poisoning #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Data poisoning has been proposed as a compelling defense against facial recognition models trained on Web-scraped pictures. By perturbing the images they post online, users can fool models into misclassifying future (unperturbed) pictures.
We demonstrate that this strategy provides a false sense of security, as it ignores an inherent asymmetry between the parties: users' pictures are perturbed once and for all before being published (at which point they are scraped) and must thereafter fool all future models -- including models trained adaptively against the users' past attacks, or models that use technologies discovered after the attack.
https://arxiv.org/abs/2106.14851
#facial #recognition #defense #data #poisoning #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
DoubleVPN servers, logs, and account info seized by law enforcement
Law enforcement has seized the servers and customer logs for DoubleVPN, a double-encryption service commonly used by threat actors to evade detection while performing malicious activities.
DoubleVPN is a Russian-based VPN service that double-encrypts data sent through their service.
Servers and data seized by law enforcement
The doublevpn.com [archive.org] website was seized today by law enforcement, who stated that they gained access to the servers for DoubleVPN and took personal information, logs, and statistics for the service's customers.
"On 29th of June 2021, law enforcement took down DoubleVPN. Law enforcement gained access to the servers of DoubleVPN and seized personal information, logs and statistics kept by DoubleVPN about all of its customers. DoubleVPN’s owners failed to provide the services they promised," says the now-seized doublevpn.com website.
"International law enforcement continues to work collectively against facilitators of cybercrime, wherever and however it is committed. The investigation regarding customer data of this network will continue."
https://www.bleepingcomputer.com/news/security/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement/
#doublevpn #seized #police
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Law enforcement has seized the servers and customer logs for DoubleVPN, a double-encryption service commonly used by threat actors to evade detection while performing malicious activities.
DoubleVPN is a Russian-based VPN service that double-encrypts data sent through their service.
Servers and data seized by law enforcement
The doublevpn.com [archive.org] website was seized today by law enforcement, who stated that they gained access to the servers for DoubleVPN and took personal information, logs, and statistics for the service's customers.
"On 29th of June 2021, law enforcement took down DoubleVPN. Law enforcement gained access to the servers of DoubleVPN and seized personal information, logs and statistics kept by DoubleVPN about all of its customers. DoubleVPN’s owners failed to provide the services they promised," says the now-seized doublevpn.com website.
"International law enforcement continues to work collectively against facilitators of cybercrime, wherever and however it is committed. The investigation regarding customer data of this network will continue."
https://www.bleepingcomputer.com/news/security/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement/
#doublevpn #seized #police
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BleepingComputer
DoubleVPN servers, logs, and account info seized by law enforcement
An international law enforcement operation has seized the servers, data, and customer logs for DoubleVPN, a double-encryption service commonly used by threat actors to evade detection while performing malicious activities.
Court Orders YouTube Rippers to Log and Share Data with Record Labels
A Virginia District Court has ordered the Russian operator of two popular YouTube rippers to keep extensive logs of user activity and hand these over to the major record labels. The order was requested by the labels, which argue that FLVTO.biz and 2conv.com facilitate massive copyright infringement in the United States and abroad.
The major record labels believe that YouTube rippers are the most significant piracy threat on the Internet.
https://torrentfreak.com/court-orders-youtube-rippers-to-log-and-share-user-data-210629/
#youtube #piracy #rippers #copyright #userdata
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A Virginia District Court has ordered the Russian operator of two popular YouTube rippers to keep extensive logs of user activity and hand these over to the major record labels. The order was requested by the labels, which argue that FLVTO.biz and 2conv.com facilitate massive copyright infringement in the United States and abroad.
The major record labels believe that YouTube rippers are the most significant piracy threat on the Internet.
https://torrentfreak.com/court-orders-youtube-rippers-to-log-and-share-user-data-210629/
#youtube #piracy #rippers #copyright #userdata
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
Court Orders YouTube Rippers to Log and Share Data with Record Labels * TorrentFreak
A Virginia court has ordered two popular YouTube rippers to keep extensive logs of user activity and hand these to the major record labels.
iodéOS – does the data saving Android operating system fulfill its promise?
We took a close look at iodéOS, which is based on LineageOS. Can the privacy friendly operating system fulfill its promises? Read our test!
As already mentioned, iodéOS is an Android operating system based on LineageOS with a special focus on privacy. The manufacturer claims that the user can use the full comfort of Android without being spied on by Google and other data octopuses all the way. At least that is what the founder of iodé, Antoine Maurino, promises us.
The increasingly frequent data scandals at Google or Facebook, to name just the two most important ones, usually seem „far away„. But more and more people seem to be slowly realizing that they, too, are a small but important part of this constantly expanding data collection.
Most of the time, it starts out small. An app here, another one there. And then, before you know it, you have countless apps installed on your Android phone.
But all these apps have one thing in common. That’s right, they collect data. Your data! And mostly behind your back. Did you know that Google alone requests location information and other data from your Android smartphone 340 times in a 24-hour period?
https://tarnkappe.info/iodeos-does-the-data-saving-android-operating-system-fulfill-its-promise/
#android #iodéOS #DeleteGoogle #aurora #microG
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
We took a close look at iodéOS, which is based on LineageOS. Can the privacy friendly operating system fulfill its promises? Read our test!
As already mentioned, iodéOS is an Android operating system based on LineageOS with a special focus on privacy. The manufacturer claims that the user can use the full comfort of Android without being spied on by Google and other data octopuses all the way. At least that is what the founder of iodé, Antoine Maurino, promises us.
The increasingly frequent data scandals at Google or Facebook, to name just the two most important ones, usually seem „far away„. But more and more people seem to be slowly realizing that they, too, are a small but important part of this constantly expanding data collection.
Most of the time, it starts out small. An app here, another one there. And then, before you know it, you have countless apps installed on your Android phone.
But all these apps have one thing in common. That’s right, they collect data. Your data! And mostly behind your back. Did you know that Google alone requests location information and other data from your Android smartphone 340 times in a 24-hour period?
https://tarnkappe.info/iodeos-does-the-data-saving-android-operating-system-fulfill-its-promise/
#android #iodéOS #DeleteGoogle #aurora #microG
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Tarnkappe.info
iodéOS - does the data saving Android operating system fulfill its promise?
We took a close look at iodéOS, which is based on LineageOS. Can the privacy friendly operating system fulfill its promises? Read our test!
PokeBeach Hacked, Next Steps for the Site
PokeBeach was hacked on Monday. All files were deleted. We have been assessing the situation for the last 72 hours. I have barely slept.
No user data was stolen or compromised.
The hacking was a professional job conducted by an overseas team who wanted to hold the website hostage for monetary gain. The team gained access to the site through an exploit in a popular piece of software we use, which we updated a week prior. We can’t go into too many details because we are currently exploring our legal options.
The team first reverse-engineered our backup script to delete all of our offsite backups. This wasn’t noticed until it was too late. They also attempted to modify PokeBeach’s article program so that new subscribers would be referred to their Paypal account. This was instantly reported to Paypal, who worked with us to confirm no new accounts were affected.
As we locked them out of the web server, they issued a command to wipe it clean. We discovered they were in the process of downloading it so they could offer it back to us for payment. It’s also why they deleted our backups.
Later we received a message from an individual who suggested I should mail him my cards from this tweet if I want some of my files back. He disappeared after I ignored him.
The hackers never had access to our databases. No news stories, forum posts, or user accounts have been affected. However, the last few years of media files are gone. This includes news story images, forum attachments, and similar. We are currently trying to find local backups and use recovery software, but the outlook is grim. Our web host Linode even kindly pooled its team together to help with our recovery efforts.
https://www.pokebeach.com/2021/07/pokebeach-hacked-next-steps-for-the-site
#pokebeach #hacked
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
PokeBeach was hacked on Monday. All files were deleted. We have been assessing the situation for the last 72 hours. I have barely slept.
No user data was stolen or compromised.
The hacking was a professional job conducted by an overseas team who wanted to hold the website hostage for monetary gain. The team gained access to the site through an exploit in a popular piece of software we use, which we updated a week prior. We can’t go into too many details because we are currently exploring our legal options.
The team first reverse-engineered our backup script to delete all of our offsite backups. This wasn’t noticed until it was too late. They also attempted to modify PokeBeach’s article program so that new subscribers would be referred to their Paypal account. This was instantly reported to Paypal, who worked with us to confirm no new accounts were affected.
As we locked them out of the web server, they issued a command to wipe it clean. We discovered they were in the process of downloading it so they could offer it back to us for payment. It’s also why they deleted our backups.
Later we received a message from an individual who suggested I should mail him my cards from this tweet if I want some of my files back. He disappeared after I ignored him.
The hackers never had access to our databases. No news stories, forum posts, or user accounts have been affected. However, the last few years of media files are gone. This includes news story images, forum attachments, and similar. We are currently trying to find local backups and use recovery software, but the outlook is grim. Our web host Linode even kindly pooled its team together to help with our recovery efforts.
https://www.pokebeach.com/2021/07/pokebeach-hacked-next-steps-for-the-site
#pokebeach #hacked
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv