How to bypass the Windows 11 TPM 2.0 requirement
Microsoft now requires a computer to have a TPM 2.0 module to install Windows 11. However, new Registry entries have been discovered that allow you to bypass the TPM requirement and minimum memory and secure boot requirements.
With Windows 11, Microsoft added new minimum system requirements that all devices need to have a TPM 2.0 security processor to power some of the operating system's security features.
"The following Windows features require TPM 2.0: Measured Boot, Device Encryption, WD System Guard, Device Health Attestation, Windows Hello/Hello for Business, TPM Platform Crypto Provider Key Storage, SecureBIO, DRTM, vTPM in Hyper-V," Microsoft told BleepingComputer.
For most people running CPUs created in the past 5-6 years, a firmware-based TPM (fTPM) is built into the CPU and can be enabled in the BIOS.
To enable the fTPM, simply boot your computer into the BIOS and enable the Intel Platform Trust Technology (Intel PTT) or the AMD Platform Security Processor, depending on your CPU.
For those who do not have this feature, you may be able to install a discrete TPM 2.0 processor on the motherboard. However, if your processor is old enough that it does not have one built-in fTPM, your motherboard's module will likely be TPM 1.2, which is not compatible with Windows 11.
This requirement is frustrating for users running Windows 10 on older equipment, as now they are being forced to purchase new hardware to install Windows 11.
Furthermore, as Microsoft has stated in documentation that OEMs can get permission to disable the TPM requirement in Windows 11 for their devices, the question becomes: Do you really need a TPM 2.0 processor to use Windows 11?
https://www.bleepingcomputer.com/news/microsoft/how-to-bypass-the-windows-11-tpm-20-requirement/
#microsoft #windows #tpm
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Microsoft now requires a computer to have a TPM 2.0 module to install Windows 11. However, new Registry entries have been discovered that allow you to bypass the TPM requirement and minimum memory and secure boot requirements.
With Windows 11, Microsoft added new minimum system requirements that all devices need to have a TPM 2.0 security processor to power some of the operating system's security features.
"The following Windows features require TPM 2.0: Measured Boot, Device Encryption, WD System Guard, Device Health Attestation, Windows Hello/Hello for Business, TPM Platform Crypto Provider Key Storage, SecureBIO, DRTM, vTPM in Hyper-V," Microsoft told BleepingComputer.
For most people running CPUs created in the past 5-6 years, a firmware-based TPM (fTPM) is built into the CPU and can be enabled in the BIOS.
To enable the fTPM, simply boot your computer into the BIOS and enable the Intel Platform Trust Technology (Intel PTT) or the AMD Platform Security Processor, depending on your CPU.
For those who do not have this feature, you may be able to install a discrete TPM 2.0 processor on the motherboard. However, if your processor is old enough that it does not have one built-in fTPM, your motherboard's module will likely be TPM 1.2, which is not compatible with Windows 11.
This requirement is frustrating for users running Windows 10 on older equipment, as now they are being forced to purchase new hardware to install Windows 11.
Furthermore, as Microsoft has stated in documentation that OEMs can get permission to disable the TPM requirement in Windows 11 for their devices, the question becomes: Do you really need a TPM 2.0 processor to use Windows 11?
https://www.bleepingcomputer.com/news/microsoft/how-to-bypass-the-windows-11-tpm-20-requirement/
#microsoft #windows #tpm
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BleepingComputer
How to bypass the Windows 11 TPM 2.0 requirement
Microsoft now requires a computer to have a TPM 2.0 module to install Windows 11. However, new Registry entries have been discovered that allow you to bypass the TPM requirement and minimum memory and secure boot requirements.
REvil ransomware executes supply chain attack via malicious Kaseya update
The REvil ransomware gang appears to have gained access to the infrastructure of Kaseya, a provider of remote management solutions, and is using a malicious update for the VSA software to deploy ransomware to companies across the world.
The incident first came to light earlier today in a Reddit section dedicated to managed service providers (MSPs), companies that provide remote IT services to smaller businesses lacking an IT department and which are usually Kaseya’s primary customers.
MSPs use Kaseya’s VSA platform to manage and deploy software updates to customer networks or access remote systems to troubleshoot a customer’s IT problems; however, this very same functionality can be abused by threat actors who manage to gain access to an MSP’s VSA platform.
While at the time of writing, it is unclear how widespread the incident is, security firm Huntress Labs is reporting that at least four MSPs have been hit so far.
According to security firm Sophos, MSPs appear to be getting infected with ransomware via a malicious update to Kaseya VSA on-prem servers.
"We are monitoring a REvil 'supply chain' attack outbreak, which seems to stem from a malicious Kaseya update. REvil binary C:Windowsmpsvc.dll is side-loaded into a legit Microsoft Defender copy, copied into C:WindowsMsMpEng.exe to run the encryption from a legit process."
https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/
#revil #ransomware #kaseya
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The REvil ransomware gang appears to have gained access to the infrastructure of Kaseya, a provider of remote management solutions, and is using a malicious update for the VSA software to deploy ransomware to companies across the world.
The incident first came to light earlier today in a Reddit section dedicated to managed service providers (MSPs), companies that provide remote IT services to smaller businesses lacking an IT department and which are usually Kaseya’s primary customers.
MSPs use Kaseya’s VSA platform to manage and deploy software updates to customer networks or access remote systems to troubleshoot a customer’s IT problems; however, this very same functionality can be abused by threat actors who manage to gain access to an MSP’s VSA platform.
While at the time of writing, it is unclear how widespread the incident is, security firm Huntress Labs is reporting that at least four MSPs have been hit so far.
According to security firm Sophos, MSPs appear to be getting infected with ransomware via a malicious update to Kaseya VSA on-prem servers.
"We are monitoring a REvil 'supply chain' attack outbreak, which seems to stem from a malicious Kaseya update. REvil binary C:Windowsmpsvc.dll is side-loaded into a legit Microsoft Defender copy, copied into C:WindowsMsMpEng.exe to run the encryption from a legit process."
https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/
#revil #ransomware #kaseya
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
therecord.media
REvil ransomware gang executes supply chain attack via malicious Kaseya update
The REvil ransomware gang appears to have gained access to the infrastructure of Kaseya, a provider of remote management solutions, and is using a malicious update for the VSA software to deploy ransomware to companies across the world.
Not Disclosing That a Photo Was Retouched is Now Illegal in Norway
Norway has recently passed legislation that makes it illegal for photos that feature any kind of retouching without disclosing the edits posted by celebrities and influencers as part of a pushback against unrealistic beauty standards and a rise in body dysmorphic disorder.
The law comes as an amendment to the country’s 2009 Marketing Act that makes it illegal for influencers to share retouched photos of their bodies in promotional posts on social media without disclosing that the image has been edited. The law passed with a considerable majority of 72 to 15 votes and requires advertisements featuring a person with any edits to a body’s size, shape, or skin to be marked with a standardized label designed by the government.
“Advertisements” encompasses celebrities and influencers, as the term is for anyone who receives payment or other benefits as the result of a post on social media. The specific platforms called out were Facebook, Instagram, Snapchat, TikTok, and Twitter. Violators of the law are subject to fines that can escalate in scale and lead to — in extreme cases — imprisonment.
https://petapixel.com/2021/07/02/not-disclosing-that-a-photo-was-retouched-is-now-illegal-in-norway/
#norway #photos #disclosing #influencer
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Norway has recently passed legislation that makes it illegal for photos that feature any kind of retouching without disclosing the edits posted by celebrities and influencers as part of a pushback against unrealistic beauty standards and a rise in body dysmorphic disorder.
The law comes as an amendment to the country’s 2009 Marketing Act that makes it illegal for influencers to share retouched photos of their bodies in promotional posts on social media without disclosing that the image has been edited. The law passed with a considerable majority of 72 to 15 votes and requires advertisements featuring a person with any edits to a body’s size, shape, or skin to be marked with a standardized label designed by the government.
“Advertisements” encompasses celebrities and influencers, as the term is for anyone who receives payment or other benefits as the result of a post on social media. The specific platforms called out were Facebook, Instagram, Snapchat, TikTok, and Twitter. Violators of the law are subject to fines that can escalate in scale and lead to — in extreme cases — imprisonment.
https://petapixel.com/2021/07/02/not-disclosing-that-a-photo-was-retouched-is-now-illegal-in-norway/
#norway #photos #disclosing #influencer
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Peta Pixel
Not Disclosing That a Photo Was Retouched is Now Illegal in Norway
Norway has recently passed legislation that makes it illegal for photos that feature any kind of retouching without disclosing the edits posted by celebrities and influencers as part of a pushback against unrealistic beauty standards and a rise in body dysmorphic…
Media is too big
VIEW IN TELEGRAM
Build a Hackable Router with a $5 ESP32
If you're looking for a data-connected router for use as a Wi-Fi hacking punching bag, you can set one up for as little as $5. We'll use an ESP32 to create a Wi-Fi network and sniff traffic to discover logins, all using a low-cost microcontroller. This project is also useful for connecting IoT devices, making Wi-Fi honeypots, extending the range of a network.
https://www.youtube.com/watch?v=41Lymi6rXA8
#hak5 #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
If you're looking for a data-connected router for use as a Wi-Fi hacking punching bag, you can set one up for as little as $5. We'll use an ESP32 to create a Wi-Fi network and sniff traffic to discover logins, all using a low-cost microcontroller. This project is also useful for connecting IoT devices, making Wi-Fi honeypots, extending the range of a network.
https://www.youtube.com/watch?v=41Lymi6rXA8
#hak5 #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Binance Deploys Crypto Monitoring 'Traveler' System to Comply With FATF Travel Rule
Binance announced yesterday it deployed Ciphertrace’s Traveler system as part of its compliance efforts. Traveler is the first system designed for exchanges to comply with the Travel Rule proposed by the Financial Action Task Force. The exchange would be among the first wave of exchanges implementing this automatic Travel Rule compliance system.
Binance Implements Ciphertrace’s Traveler Protocol in Its Trading Platform
Binance, one of the largest cryptocurrency exchanges in the market, announced the implementation of Traveler, a system that will help them comply with the Travel Rule established by the Financial Action Task Force (FATF). Ciphertrace, a blockchain analytics startup, created Traveler as a third-party compliance platform.
Ciphertrace claims Traveler automatizes the process of complying with FATFs mandate, automatically making connections and identifying different VASPs (Virtual Asset Service Providers). Therefore, exchanges simplify their due diligence burden by implementing it.
https://news.bitcoin.com/binance-deploys-crypto-monitoring-traveler-system-to-comply-with-fatf-travel-rule/
#binance #crypto #monitoring #traveler #system #fatf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Binance announced yesterday it deployed Ciphertrace’s Traveler system as part of its compliance efforts. Traveler is the first system designed for exchanges to comply with the Travel Rule proposed by the Financial Action Task Force. The exchange would be among the first wave of exchanges implementing this automatic Travel Rule compliance system.
Binance Implements Ciphertrace’s Traveler Protocol in Its Trading Platform
Binance, one of the largest cryptocurrency exchanges in the market, announced the implementation of Traveler, a system that will help them comply with the Travel Rule established by the Financial Action Task Force (FATF). Ciphertrace, a blockchain analytics startup, created Traveler as a third-party compliance platform.
Ciphertrace claims Traveler automatizes the process of complying with FATFs mandate, automatically making connections and identifying different VASPs (Virtual Asset Service Providers). Therefore, exchanges simplify their due diligence burden by implementing it.
https://news.bitcoin.com/binance-deploys-crypto-monitoring-traveler-system-to-comply-with-fatf-travel-rule/
#binance #crypto #monitoring #traveler #system #fatf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Bitcoin News
Binance Deploys Crypto Monitoring 'Traveler' System to Comply With FATF Travel Rule
Binance announced yesterday it deployed Ciphertrace's Traveler system as part of its efforts to comply with FATF's travel rule.
US companies hit by 'colossal' cyber-attack
About 200 US businesses have been hit by a "colossal" ransomware attack, according to a cyber-security firm.
Huntress Labs said the hack targeted Florida-based IT company Kaseya before spreading through corporate networks that use its software.
Kaseya said in a statement on its own website that it was investigating a "potential attack".
Huntress Labs said it believed the Russia-linked REvil ransomware gang was responsible.
The US Cybersecurity and Infrastructure Agency, a federal agency, said in a statement that it was taking action to address the attack.
The cyber-breach emerged on Friday afternoon as companies across the US were clocking off for the long Independence Day weekend.
The two big things that are keeping cyber-security professionals up at night lately are ransomware attacks and supply chain attacks. This latest incident combines both nightmares into one big Independence Holiday weekend-ruining event for hundreds of US IT teams.
Ransomware is the scourge of the internet. Multiple organised criminal gangs are constantly attempting to gain access to computer networks to hold them hostage. The rate of attack is relentless but it can take a lot of time and effort on the criminals part to successfully hijack one victim's computer system.
In this latest incident the hackers showed that by going after the software supplier of multiple organisations they can pop dozens, perhaps hundreds of victims in one go. We've seen horrendous supply chain attacks in the past but this one has the potential to be the biggest incident involving ransomware yet.
It shows that ransomware gangs are thinking creatively about how to have the most impact possible and command the biggest ransom possible.
https://www.bbc.co.uk/news/world-us-canada-57703836
#kaseya #ransomware #revil #attack #usa #cybersecurity
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
About 200 US businesses have been hit by a "colossal" ransomware attack, according to a cyber-security firm.
Huntress Labs said the hack targeted Florida-based IT company Kaseya before spreading through corporate networks that use its software.
Kaseya said in a statement on its own website that it was investigating a "potential attack".
Huntress Labs said it believed the Russia-linked REvil ransomware gang was responsible.
The US Cybersecurity and Infrastructure Agency, a federal agency, said in a statement that it was taking action to address the attack.
The cyber-breach emerged on Friday afternoon as companies across the US were clocking off for the long Independence Day weekend.
The two big things that are keeping cyber-security professionals up at night lately are ransomware attacks and supply chain attacks. This latest incident combines both nightmares into one big Independence Holiday weekend-ruining event for hundreds of US IT teams.
Ransomware is the scourge of the internet. Multiple organised criminal gangs are constantly attempting to gain access to computer networks to hold them hostage. The rate of attack is relentless but it can take a lot of time and effort on the criminals part to successfully hijack one victim's computer system.
In this latest incident the hackers showed that by going after the software supplier of multiple organisations they can pop dozens, perhaps hundreds of victims in one go. We've seen horrendous supply chain attacks in the past but this one has the potential to be the biggest incident involving ransomware yet.
It shows that ransomware gangs are thinking creatively about how to have the most impact possible and command the biggest ransom possible.
https://www.bbc.co.uk/news/world-us-canada-57703836
#kaseya #ransomware #revil #attack #usa #cybersecurity
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BBC News
US companies hit by 'colossal' cyber-attack
A cyber-security firm says it believes the Russia-linked REvil ransomware gang is responsible.
Media is too big
VIEW IN TELEGRAM
Digital Violence: How the NSO Group Enables State Terror
The data for the project is based on fifteen months of open source research that extracted data from hundreds of pages of documents as well as interviews. The Platform offers the most comprehensive database to date (containing over a thousand data points) of the reported infections of the phones using Pegasus.
https://forensic-architecture.org/investigation/digital-violence-how-the-nso-group-enables-state-terror
#digital #violence #nso #pegasus #surveillance #state #terror
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
The data for the project is based on fifteen months of open source research that extracted data from hundreds of pages of documents as well as interviews. The Platform offers the most comprehensive database to date (containing over a thousand data points) of the reported infections of the phones using Pegasus.
https://forensic-architecture.org/investigation/digital-violence-how-the-nso-group-enables-state-terror
#digital #violence #nso #pegasus #surveillance #state #terror
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
If you use Audacity, the new owners just updated the terms of service so they can collect data on you, including for very open-ended "legal enforcement"; and then sell it to "potential buyers" all without your consent.
https://nitter.pussthecat.org/KrashHash/status/1411725491581587457
via Twitter
https://appleinsider.com/articles/21/07/04/open-source-audacity-deemed-spyware-over-data-collection-changes
#audacity
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://nitter.pussthecat.org/KrashHash/status/1411725491581587457
via Twitter
https://appleinsider.com/articles/21/07/04/open-source-audacity-deemed-spyware-over-data-collection-changes
#audacity
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Nitter
elle (@KrashHash)
PSA: If you use Audacity, the new owners just updated the terms of service so they can collect data on you, including for very open-ended "legal enforcement"; and then sell it to "potential buyers" all without your consent
96: The Police Station Incident
Darknet Diaries - EP 96: The Police Station Incident
Nicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and Secret Service agent. In this episode she tells a story which involves all of these roles.
https://darknetdiaries.com/episode/96/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Nicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and Secret Service agent. In this episode she tells a story which involves all of these roles.
https://darknetdiaries.com/episode/96/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Israel Just Used Fully AI Controlled Drone Swarms in a World First
The system is fed with data from satellites, other reconnaissance drones, aerial vehicles, and intel collected by the ground unit.
In July 2019, unidentified drones swarmed the US Navy destroyers, triggering an alert. In May of 2021, Israel allowed the use of drone swarms to locate, identify, and attack Hamas militants, in what is likely the first-ever use of drone swarms in combat.
Last month, we had reported that Israel deployed a semi-autonomous robot during the recent Gaza conflict. Carrying a machine gun, this robot named Jaguar, was capable of driving to a designated location, returning fire, and even self-destructing when compromised. However, the robot needed a human operator to initiate the firing from the machine gun.
A fully autonomous drone swarm is a different level of technology altogether. It is a networked entity that is not controlled by human operators at all. Operated by artificial intelligence (AI), it can continue its mission, even if loses some drones during its mission. The machine learning system is fed with data sourced from satellites, other reconnaissance drones, and aerial vehicles, as well as intel collected by ground units.
https://telegra.ph/Israel-Just-Used-Fully-AI-Controlled-Drone-Swarms-in-a-World-First-07-06
via interestingengineering.com
#israel #ai #drones
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The system is fed with data from satellites, other reconnaissance drones, aerial vehicles, and intel collected by the ground unit.
In July 2019, unidentified drones swarmed the US Navy destroyers, triggering an alert. In May of 2021, Israel allowed the use of drone swarms to locate, identify, and attack Hamas militants, in what is likely the first-ever use of drone swarms in combat.
Last month, we had reported that Israel deployed a semi-autonomous robot during the recent Gaza conflict. Carrying a machine gun, this robot named Jaguar, was capable of driving to a designated location, returning fire, and even self-destructing when compromised. However, the robot needed a human operator to initiate the firing from the machine gun.
A fully autonomous drone swarm is a different level of technology altogether. It is a networked entity that is not controlled by human operators at all. Operated by artificial intelligence (AI), it can continue its mission, even if loses some drones during its mission. The machine learning system is fed with data sourced from satellites, other reconnaissance drones, and aerial vehicles, as well as intel collected by ground units.
https://telegra.ph/Israel-Just-Used-Fully-AI-Controlled-Drone-Swarms-in-a-World-First-07-06
via interestingengineering.com
#israel #ai #drones
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Telegraph
Israel Just Used Fully AI Controlled Drone Swarms in a World First
In July 2019, unidentified drones swarmed the US Navy destroyers, triggering an alert. In May of 2021, Israel allowed the use of drone swarms to locate, identify, and attack Hamas militants, in what is likely the first-ever use of drone swarms in combat.…
Cryptocurrency fraud: Brazil's 'Bitcoin King' arrested for allegedly embezzling $300 million
Cláudio Oliveira, a self-proclaimed 'King of Bitcoin', allegedly skimmed the amount from a large number of investors.
Brazil's federal police has arrested Cláudio Oliveira, the president of the Bitcoin Banco Group, for allegedly embezzling 1.5 billion Brazilian reais (about $300 million) through a cryptocurrency scheme, Coindesk reported.
Oliveira, the self-proclaimed 'King of Bitcoin', allegedly skimmed the amount from a large number of investors.
In 2019, the group had reported that 7,000 Bitcoins had gone missing and reportedly applied for judicial recovery -- a special arrangement under the Brazilian law to reorganise its finances -- in a bid to pay its creditors and avoid bankruptcy.
However, at the beginning of 2020, it was found that the group was not complying with the obligations determined at the time of the decree of judicial reorganisation and, to promote its activities and attract new customers, it continued to offer the public collective investment contracts without registration with the market regulator.
Subsequently, the police formed a task force comprising 90 officers and launched 'Operation Daemon' to nab the accused and to further investigate bankruptcy crimes, embezzlement, money laundering and criminal organization, Brazil's federal police said in a press release.
https://telegra.ph/Cryptocurrency-Fraud-Brazils-Bitcoin-King-Arrested-For-Allegedly-Embezzling-300-Million-07-06
via www.moneycontrol.com
#brazil #bitcoin #bbg #skimming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Cláudio Oliveira, a self-proclaimed 'King of Bitcoin', allegedly skimmed the amount from a large number of investors.
Brazil's federal police has arrested Cláudio Oliveira, the president of the Bitcoin Banco Group, for allegedly embezzling 1.5 billion Brazilian reais (about $300 million) through a cryptocurrency scheme, Coindesk reported.
Oliveira, the self-proclaimed 'King of Bitcoin', allegedly skimmed the amount from a large number of investors.
In 2019, the group had reported that 7,000 Bitcoins had gone missing and reportedly applied for judicial recovery -- a special arrangement under the Brazilian law to reorganise its finances -- in a bid to pay its creditors and avoid bankruptcy.
However, at the beginning of 2020, it was found that the group was not complying with the obligations determined at the time of the decree of judicial reorganisation and, to promote its activities and attract new customers, it continued to offer the public collective investment contracts without registration with the market regulator.
Subsequently, the police formed a task force comprising 90 officers and launched 'Operation Daemon' to nab the accused and to further investigate bankruptcy crimes, embezzlement, money laundering and criminal organization, Brazil's federal police said in a press release.
https://telegra.ph/Cryptocurrency-Fraud-Brazils-Bitcoin-King-Arrested-For-Allegedly-Embezzling-300-Million-07-06
via www.moneycontrol.com
#brazil #bitcoin #bbg #skimming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Telegraph
Cryptocurrency Fraud: Brazil's 'Bitcoin King' Arrested For Allegedly Embezzling $300 Million
Bitcoin (Image: Reuters) Brazil's federal police has arrested Cláudio Oliveira, the president of the Bitcoin Banco Group, for allegedly embezzling 1.5 billion Brazilian reais (about $300 million) through a cryptocurrency scheme, Coindesk reported. Oliveira…
Media is too big
VIEW IN TELEGRAM
Methods To Block Program Backdoors/Privacy Violations (Audacity Privacy Policy Example)
You can do this for ALL non internet needing programs to maximize privacy/security. We cover many ways we can restrict ALL non internet using programs from sending your IP address/backdoors (reverse shells?) and then use Audacity's new Privacy Policy and data sharing potential as an example: You should do this with All non internet programs to protect security + privacy.
https://devtube.dev-wiki.de/videos/watch/25321ef1-8663-43c9-926a-678df26c6d5e
https://www.buymeacoffee.com/politictech/block-program-backdoors-privacy-violations-related-ex-use-audacity-your-data-may-now-be-shared
#privacy #security #backdoors #audacity #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
You can do this for ALL non internet needing programs to maximize privacy/security. We cover many ways we can restrict ALL non internet using programs from sending your IP address/backdoors (reverse shells?) and then use Audacity's new Privacy Policy and data sharing potential as an example: You should do this with All non internet programs to protect security + privacy.
https://devtube.dev-wiki.de/videos/watch/25321ef1-8663-43c9-926a-678df26c6d5e
https://www.buymeacoffee.com/politictech/block-program-backdoors-privacy-violations-related-ex-use-audacity-your-data-may-now-be-shared
#privacy #security #backdoors #audacity #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
NOTHING TO HIDE documentary (Eng, 2017)
NOTHING TO HIDE (2017) deals with the acceptance of mass surveillance through the "I have nothing to hide" narrative. “Eye-opening” (Forbes) “Fascinating” (Les Inrocks).
Support the Creative Commons Non Derivative Non Commercial licence of the film: leetchi.com/c/project-nothing-to-hide allowing the film to be online for free.
💡 More info about Nothing to Hide and its sequel Disappear:
https://deepdocs.eu
https://invidious.fdn.fr/watch?v=M3mQu9YQesk
#snowden #NothingToHide #documentation
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
NOTHING TO HIDE (2017) deals with the acceptance of mass surveillance through the "I have nothing to hide" narrative. “Eye-opening” (Forbes) “Fascinating” (Les Inrocks).
Support the Creative Commons Non Derivative Non Commercial licence of the film: leetchi.com/c/project-nothing-to-hide allowing the film to be online for free.
💡 More info about Nothing to Hide and its sequel Disappear:
https://deepdocs.eu
https://invidious.fdn.fr/watch?v=M3mQu9YQesk
#snowden #NothingToHide #documentation
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
BREAKING: Binance suspends euro bank transfers amid regulatory heat
As of 8 am UTC on Wednesday, Binance users will no longer be able to make euro deposits through their bank. However, they can still fund their accounts with credit cards and debit cards.
Regulatory constraints facing Binance have forced the popular cryptocurrency exchange to temporarily halt bank transfers denominated in euros, according to an email sent to its customers on Tuesday.
Specifically, euro deposits via the Single Europe Payments Area, or SEPA, have been put on hold indefinitely due to circumstances beyond the exchange’s control, Binance said in the email:
“Due to events beyond our control, we are temporarily suspending EUR deposits via SEPA Bank Transfers from 8 am UTC on July 7, 2021.”
https://cointelegraph.com/news/breaking-binance-suspends-euro-bank-transfers-amid-regulatory-heat
#binance #euro #bank #transfers #regulation
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
As of 8 am UTC on Wednesday, Binance users will no longer be able to make euro deposits through their bank. However, they can still fund their accounts with credit cards and debit cards.
Regulatory constraints facing Binance have forced the popular cryptocurrency exchange to temporarily halt bank transfers denominated in euros, according to an email sent to its customers on Tuesday.
Specifically, euro deposits via the Single Europe Payments Area, or SEPA, have been put on hold indefinitely due to circumstances beyond the exchange’s control, Binance said in the email:
“Due to events beyond our control, we are temporarily suspending EUR deposits via SEPA Bank Transfers from 8 am UTC on July 7, 2021.”
https://cointelegraph.com/news/breaking-binance-suspends-euro-bank-transfers-amid-regulatory-heat
#binance #euro #bank #transfers #regulation
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Cointelegraph
BREAKING: Binance suspends euro bank transfers amid regulatory heat
The regulatory backlash facing Binance intensified this week, prompting the exchange to suspend all bank transfers via SEPA.
Kaspersky Password Manager: All your passwords are belong to us
tl;dr: The password generator included in Kaspersky Password Manager had several problems. The most critical one is that it used a PRNG not suited for cryptographic purposes. Its single source of entropy was the current time. All the passwords it created could be bruteforced in seconds. This article explains how to securely generate passwords, why Kaspersky Password Manager failed, and how to exploit this flaw. It also provides a proof of concept to test if your version is vulnerable.
💡 The product has been updated and its newest versions aren’t affected by this issue.
Introduction
Two years ago, we looked at Kaspersky Password Manager (KPM), a password manager developed by Kaspersky. Kaspersky Password Manager is a product that securely stores passwords and documents into an encrypted vault, protected by a password. This vault is protected with a master password, so, as with other password managers, users have to remember a single password to use and manage all their passwords. Product is available for various operating systems (Windows, macOS, Android, iOS, Web…) Encrypted data can then be automatically synchronized between all your devices, always protected by your master password.
The main functionality of KPM is password management. One key point with password managers is that, contrary to humans, these tools are good to generate random, strong passwords. To generate secure passwords, Kaspersky Password Manager must rely on a secure password generation mechanism. We will first see an example of a good password generation method, to explain after why the method used by Kaspersky was flawed, and how we exploited it. As we will see, passwords generated by this tool can be bruteforced in seconds.
After a bit less than two years, this vulnerability has been patched on all versions of KPM. Vulnerability has been assigned CVE-2020-27020.
https://donjon.ledger.com/kaspersky-password-manager/
#kaspersky #password #manager #vulnerability
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
tl;dr: The password generator included in Kaspersky Password Manager had several problems. The most critical one is that it used a PRNG not suited for cryptographic purposes. Its single source of entropy was the current time. All the passwords it created could be bruteforced in seconds. This article explains how to securely generate passwords, why Kaspersky Password Manager failed, and how to exploit this flaw. It also provides a proof of concept to test if your version is vulnerable.
💡 The product has been updated and its newest versions aren’t affected by this issue.
Introduction
Two years ago, we looked at Kaspersky Password Manager (KPM), a password manager developed by Kaspersky. Kaspersky Password Manager is a product that securely stores passwords and documents into an encrypted vault, protected by a password. This vault is protected with a master password, so, as with other password managers, users have to remember a single password to use and manage all their passwords. Product is available for various operating systems (Windows, macOS, Android, iOS, Web…) Encrypted data can then be automatically synchronized between all your devices, always protected by your master password.
The main functionality of KPM is password management. One key point with password managers is that, contrary to humans, these tools are good to generate random, strong passwords. To generate secure passwords, Kaspersky Password Manager must rely on a secure password generation mechanism. We will first see an example of a good password generation method, to explain after why the method used by Kaspersky was flawed, and how we exploited it. As we will see, passwords generated by this tool can be bruteforced in seconds.
After a bit less than two years, this vulnerability has been patched on all versions of KPM. Vulnerability has been assigned CVE-2020-27020.
https://donjon.ledger.com/kaspersky-password-manager/
#kaspersky #password #manager #vulnerability
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Ledger
Kaspersky Password Manager: All your passwords belong to us | Ledger
The password generator included in Kaspersky Password Manager had several problems. The most critical one is that it used a PRNG not suited for cryptographic purposes. Its single source of entropy was the current time. All the passwords it created could be…
ACE/MPA Seize Dozens Of Pirate Streaming Domains, Demand Data on Dozens More
The Alliance for Creativity and Entertainment and partners the MPA have seized dozens of pirate-streaming related domains. In addition, the anti-piracy giants are demanding information that will allow them to identify the operators of dozens more pirate streaming sites, including the massive Streamtape.com and others involved in the supply of IPTV packages.
The past decade has seen an explosion of illegal streaming sites offering the latest movies and TV shows but despite enforcement efforts in many shapes and sizes, the flood seems never ending.
At the forefront of combating this threat is the Alliance For Creativity and Entertainment (ACE), the world’s largest anti-piracy coalition featuring dozens of the planet’s richest and most powerful entertainment industry groups.
The Motion Picture Association is deeply embedded within ACE and together these groups have shut down a large number of illegal platforms and targeted release groups plus other closely aligned entities.
https://torrentfreak.com/ace-mpa-seize-dozens-of-pirate-streaming-domains-demand-data-on-dozens-more-210706/
#ace #mpa #seized #pirate #domains
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The Alliance for Creativity and Entertainment and partners the MPA have seized dozens of pirate-streaming related domains. In addition, the anti-piracy giants are demanding information that will allow them to identify the operators of dozens more pirate streaming sites, including the massive Streamtape.com and others involved in the supply of IPTV packages.
The past decade has seen an explosion of illegal streaming sites offering the latest movies and TV shows but despite enforcement efforts in many shapes and sizes, the flood seems never ending.
At the forefront of combating this threat is the Alliance For Creativity and Entertainment (ACE), the world’s largest anti-piracy coalition featuring dozens of the planet’s richest and most powerful entertainment industry groups.
The Motion Picture Association is deeply embedded within ACE and together these groups have shut down a large number of illegal platforms and targeted release groups plus other closely aligned entities.
https://torrentfreak.com/ace-mpa-seize-dozens-of-pirate-streaming-domains-demand-data-on-dozens-more-210706/
#ace #mpa #seized #pirate #domains
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
ACE/MPA Seize Dozens Of Pirate Streaming Domains, Demand Data on Dozens More * TorrentFreak
ACE and the MPA have seized the domains of dozens of pirate streaming sites. They are also attempting to identify the operators of dozens more.
Russian lawmakers prepare legal amendment to confiscate crypto
Russia’s prosecutor general, Igor Krasnov, says new crypto regulations are needed to combat corruption as — in his view — digital assets are often used to facilitate crime.
Russian lawmakers are working on new legislation that would allow the government to confiscate cryptocurrencies, according to a senior official.
Russian Prosecutor General Igor Krasnov claimed that the government is now developing a set of amendments to the country’s criminal code to allow authorities to seize crypto obtained from illegal activity, local news agency TASS reported.
Speaking at a conference of prosecutors’ offices of European countries on Wednesday, Krasnov stressed that cryptocurrencies like Bitcoin (BTC) have been increasingly used for corruption and bribery. The official said that cryptocurrency is also a tool for laundering embezzled budget funds.
“The criminal usage of cryptocurrencies poses a serious challenge in our country,” Krasnov said. He claimed that Russia’s adopted crypto law “On Digital Financial Assets” (DFA) has played a crucial role in tackling this problem, but new criminal code amendments would bring additional protection. “This would allow the application of restrictive measures and confiscation of virtual assets,” Krasnov stated.
According to some local industry experts, no amount of legislation would make it possible for the government to actually seize crypto assets. Nikita Soshnikov, a former senior lawyer at Deloitte CIS and director of Alfacash, told Cointelegraph that it is “obvious that digital assets kept in wallets would be impossible to confiscate like any other type of assets.” “However, there is already one landmark case where FSB officers were found guilty for accepting bribes, and the court formally seized 0.1 and 4.70235 BTC as state revenue,” he noted.
https://cointelegraph.com/news/russian-lawmakers-prepare-legal-amendment-to-confiscate-crypto
#russia #lawmakers #crypto #regulations
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Russia’s prosecutor general, Igor Krasnov, says new crypto regulations are needed to combat corruption as — in his view — digital assets are often used to facilitate crime.
Russian lawmakers are working on new legislation that would allow the government to confiscate cryptocurrencies, according to a senior official.
Russian Prosecutor General Igor Krasnov claimed that the government is now developing a set of amendments to the country’s criminal code to allow authorities to seize crypto obtained from illegal activity, local news agency TASS reported.
Speaking at a conference of prosecutors’ offices of European countries on Wednesday, Krasnov stressed that cryptocurrencies like Bitcoin (BTC) have been increasingly used for corruption and bribery. The official said that cryptocurrency is also a tool for laundering embezzled budget funds.
“The criminal usage of cryptocurrencies poses a serious challenge in our country,” Krasnov said. He claimed that Russia’s adopted crypto law “On Digital Financial Assets” (DFA) has played a crucial role in tackling this problem, but new criminal code amendments would bring additional protection. “This would allow the application of restrictive measures and confiscation of virtual assets,” Krasnov stated.
According to some local industry experts, no amount of legislation would make it possible for the government to actually seize crypto assets. Nikita Soshnikov, a former senior lawyer at Deloitte CIS and director of Alfacash, told Cointelegraph that it is “obvious that digital assets kept in wallets would be impossible to confiscate like any other type of assets.” “However, there is already one landmark case where FSB officers were found guilty for accepting bribes, and the court formally seized 0.1 and 4.70235 BTC as state revenue,” he noted.
https://cointelegraph.com/news/russian-lawmakers-prepare-legal-amendment-to-confiscate-crypto
#russia #lawmakers #crypto #regulations
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Cointelegraph
Russian lawmakers prepare legal amendment to confiscate crypto
Krasnov’s efforts to fight crypto-enabled corruption in Russia come months after United States President Joe Biden's administration sanctioned him for prosecuting Russian opposition leader Alexei Navalny.
Invites are live on https://cock.li!
Each user has been granted 5 invites, except for accounts over 3 years old which have 15. Invites will be replenished from time to time.
You can create your invites at https://cock.li/invites . Have fun!
https://nitter.pussthecat.org/gexcolo/status/1412682754224017414
via Twitter
#vincent #cockli #email #invites
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Each user has been granted 5 invites, except for accounts over 3 years old which have 15. Invites will be replenished from time to time.
You can create your invites at https://cock.li/invites . Have fun!
https://nitter.pussthecat.org/gexcolo/status/1412682754224017414
via Twitter
#vincent #cockli #email #invites
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Nitter
Vincent Canfield (@gexcolo)
Invites are live on https://cock.li! Each user has been granted 5 invites, except for accounts over 3 years old which have 15. Invites will be replenished from time to time.
You can create your invites at https://cock.li/invites . Have fun!
You can create your invites at https://cock.li/invites . Have fun!
EDRI_RISE_REPORT.pdf
3.7 MB
Shocking extent of biometric surveillance in Europe
A network of civil rights organizations has studied biometric surveillance systems in Germany, the Netherlands and Poland. The study concludes that the systems are often used unlawfully.
https://edri.org/wp-content/uploads/2021/07/EDRI_RISE_REPORT.pdf
#eu #biometric #surveillance #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A network of civil rights organizations has studied biometric surveillance systems in Germany, the Netherlands and Poland. The study concludes that the systems are often used unlawfully.
https://edri.org/wp-content/uploads/2021/07/EDRI_RISE_REPORT.pdf
#eu #biometric #surveillance #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
PrintNightmare Hits Windows, REvil Kaseya Ransomware Hits Businesses Worldwide - ThreatWire
3 Vulnerabilities were Found In Netgear Routers, Ransomware Hits Businesses Worldwide, and PrintNightmare Leads to remote code execution attacks! All that coming up now on ThreatWire.
https://www.youtube.com/watch?v=iCGuqW7NL9U
#threatwire #hak5 #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
3 Vulnerabilities were Found In Netgear Routers, Ransomware Hits Businesses Worldwide, and PrintNightmare Leads to remote code execution attacks! All that coming up now on ThreatWire.
https://www.youtube.com/watch?v=iCGuqW7NL9U
#threatwire #hak5 #video
📽@cRyPtHoN_INFOSEC_FR
📽@cRyPtHoN_INFOSEC_EN
📽@cRyPtHoN_INFOSEC_DE
📽@BlackBox_Archiv
Movie Companies Want U.S. Internet Provider ‘Frontier’ to Block Pirate Sites
A group of independent movie companies want to hold Internet provider Frontier Communications liable for pirating subscribers. In addition to damages, the filmmakers request a site-blocking order, targeting The Pirate Bay, YTS, RARBG, and many others. As a bonus, the movie companies note that the most prolific pirates can be sued directly too.
Over the past two decades, online piracy has proven a massive challenge for the entertainment industries.
It’s a global issue that’s hard to contain, but Hollywood and the major U.S. record labels are at the forefront of this battle.
One of the key strategies they’ve employed in recent years is website blocking. US companies have traveled to courts all over the world to have ISP blockades put in place, with quite a bit of success.
Interestingly, however, site blocking is noticeably absent in the United States, which harbors the most pirates of any country in the world. This can, in part, be explained by legislative backlashes and legal uncertainty. But it’s noteworthy nonetheless.
In recent years, the tide slowly started to turn, with major copyright groups strengthening their calls for blockades. However, the first move in court now comes from a group of smaller movie companies, including Millenium Media and Voltage Pictures, which have built up an impressive anti-piracy track record in recent years.
https://torrentfreak.com/movie-companies-want-u-s-internet-provider-frontier-to-block-pirate-sites-210707/
#usa #isp #block #pirate #sites
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A group of independent movie companies want to hold Internet provider Frontier Communications liable for pirating subscribers. In addition to damages, the filmmakers request a site-blocking order, targeting The Pirate Bay, YTS, RARBG, and many others. As a bonus, the movie companies note that the most prolific pirates can be sued directly too.
Over the past two decades, online piracy has proven a massive challenge for the entertainment industries.
It’s a global issue that’s hard to contain, but Hollywood and the major U.S. record labels are at the forefront of this battle.
One of the key strategies they’ve employed in recent years is website blocking. US companies have traveled to courts all over the world to have ISP blockades put in place, with quite a bit of success.
Interestingly, however, site blocking is noticeably absent in the United States, which harbors the most pirates of any country in the world. This can, in part, be explained by legislative backlashes and legal uncertainty. But it’s noteworthy nonetheless.
In recent years, the tide slowly started to turn, with major copyright groups strengthening their calls for blockades. However, the first move in court now comes from a group of smaller movie companies, including Millenium Media and Voltage Pictures, which have built up an impressive anti-piracy track record in recent years.
https://torrentfreak.com/movie-companies-want-u-s-internet-provider-frontier-to-block-pirate-sites-210707/
#usa #isp #block #pirate #sites
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
Movie Companies Want U.S. Internet Provider 'Frontier' to Block Pirate Sites * TorrentFreak
Several movie companies want Internet provider Frontier to block pirate sites such as The Pirate Bay, YTS, Rarbg, and many others.