felix_acmmm21_faketagger.pdf
4 MB
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking
The system, entitled FakeTagger, uses an encoder/decoder process to embed visually indiscernible ID information into images at a low enough level that the injected information will be interpreted as essential facial characteristic data, and therefore passed through abstraction processes intact, in the same way, for instance, as eye or mouth data.
https://www.unite.ai/identifying-deepfake-data-sources-with-ai-based-tagging-faketagger/
https://xujuefei.com/felix_acmmm21_faketagger.pdf
#faketagger #deepfake #tracking #tagging #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The system, entitled FakeTagger, uses an encoder/decoder process to embed visually indiscernible ID information into images at a low enough level that the injected information will be interpreted as essential facial characteristic data, and therefore passed through abstraction processes intact, in the same way, for instance, as eye or mouth data.
https://www.unite.ai/identifying-deepfake-data-sources-with-ai-based-tagging-faketagger/
https://xujuefei.com/felix_acmmm21_faketagger.pdf
#faketagger #deepfake #tracking #tagging #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
PwnedPiper vulnerabilities impact 80% of major hospitals in North America
Details have been published today about a collection of nine vulnerabilities known as PwnedPiper that impact a common type of medical equipment that’s installed in roughly 80% of all major hospitals in North America.
The TransLogic Pneumatic Tube Systems (PTS), from Swisslog Healthcare, is a complex system that uses compressed air to move medical supplies (lab samples, medicine, blood products, etc.) using tubes that connect different departments inside large hospitals.
Installed in more than 3,000 hospitals, TransLogic systems effectively work as the blood vessels of modern hospitals as they allow the movement of sensitive medical material while keeping nurses free to provide patient care.
In research published today, IoT security firm Armis said it discovered nine vulnerabilities in the Nexus Control Panel, the software that doctors and nurses use to control how medical material moves between hospital sections.
“These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital,” the Armis team said today.
“This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information,” the company added.
While the vulnerabilities can be exploited only if an attacker can connect or has a foothold on the hospital’s internal network, the PwndPiper issues were deemed extremely severe due to the prevalence of TransLogic devices across North America and how easy they could be weaponized to impact a hospital’s ability to provide proper medical care.
The issues —listed at the bottom of this article— were discovered in May and reported to Swisslog Healthcare, Armis said.
“A software update for all but one of the vulnerabilities has been developed, and specific mitigation strategies for the remaining vulnerability are available for customers,” a Swisslog Healthcare spokesperson told The Record in an email.
The company has released today version 7.2.5.7 of the Nexus Control Panel, along with a blog post with additional information for its customers. It also said the issue is primarily restricted to hospitals in North America, where most of these tube systems are installed, and that a patch for the ninth issue is expected later this year.
https://therecord.media/pwnedpiper-vulnerabilities-impact-80-of-major-hospitals-in-north-america/
#PwnedPiper #vulnerabilities #hospitals #usa #swisslog
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Details have been published today about a collection of nine vulnerabilities known as PwnedPiper that impact a common type of medical equipment that’s installed in roughly 80% of all major hospitals in North America.
The TransLogic Pneumatic Tube Systems (PTS), from Swisslog Healthcare, is a complex system that uses compressed air to move medical supplies (lab samples, medicine, blood products, etc.) using tubes that connect different departments inside large hospitals.
Installed in more than 3,000 hospitals, TransLogic systems effectively work as the blood vessels of modern hospitals as they allow the movement of sensitive medical material while keeping nurses free to provide patient care.
In research published today, IoT security firm Armis said it discovered nine vulnerabilities in the Nexus Control Panel, the software that doctors and nurses use to control how medical material moves between hospital sections.
“These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital,” the Armis team said today.
“This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information,” the company added.
While the vulnerabilities can be exploited only if an attacker can connect or has a foothold on the hospital’s internal network, the PwndPiper issues were deemed extremely severe due to the prevalence of TransLogic devices across North America and how easy they could be weaponized to impact a hospital’s ability to provide proper medical care.
The issues —listed at the bottom of this article— were discovered in May and reported to Swisslog Healthcare, Armis said.
“A software update for all but one of the vulnerabilities has been developed, and specific mitigation strategies for the remaining vulnerability are available for customers,” a Swisslog Healthcare spokesperson told The Record in an email.
The company has released today version 7.2.5.7 of the Nexus Control Panel, along with a blog post with additional information for its customers. It also said the issue is primarily restricted to hospitals in North America, where most of these tube systems are installed, and that a patch for the ninth issue is expected later this year.
https://therecord.media/pwnedpiper-vulnerabilities-impact-80-of-major-hospitals-in-north-america/
#PwnedPiper #vulnerabilities #hospitals #usa #swisslog
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
ProtonMail: User data for the USA thanks to good cooperation with authorities
ProtonMail, which claims to be a "secure e-mail service from Switzerland," supplies user data to security authorities. User data also goes to law enforcement agencies in the USA, as a current case shows.
The proceedings concern threats against, among others, the well-known immunologist Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family.
As the U.S. Department of Justice writes, the defendant used "an email account from a provider of secure, encrypted email services based in Switzerland."
According to the corresponding affidavit, this email service was ProtonMail. The relevant emails end accordingly with "Sent with ProtonMail Secure Email".
On the basis of data from ProtonMail, which was sent to the USA by way of legal assistance, it emerged that the defendant had used several user accounts at ProtonMail.
According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail as well as other online services.
https://steigerlegal.ch/2021/08/02/protonmail-daten-usa/
https://www.justice.gov/usao-md/press-release/file/1416926/download
#protonmail #usa #doj #userdata #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
ProtonMail, which claims to be a "secure e-mail service from Switzerland," supplies user data to security authorities. User data also goes to law enforcement agencies in the USA, as a current case shows.
The proceedings concern threats against, among others, the well-known immunologist Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family.
As the U.S. Department of Justice writes, the defendant used "an email account from a provider of secure, encrypted email services based in Switzerland."
According to the corresponding affidavit, this email service was ProtonMail. The relevant emails end accordingly with "Sent with ProtonMail Secure Email".
On the basis of data from ProtonMail, which was sent to the USA by way of legal assistance, it emerged that the defendant had used several user accounts at ProtonMail.
According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail as well as other online services.
https://steigerlegal.ch/2021/08/02/protonmail-daten-usa/
https://www.justice.gov/usao-md/press-release/file/1416926/download
#protonmail #usa #doj #userdata #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Steiger Legal
ProtonMail: Nutzerdaten für die USA dank Rechtshilfe und guter Zusammenarbeit mit Behörden – Steiger Legal
ProtonMail, nach eigenen Angaben ein «sicherer E-Mail-Dienst aus der Schweiz», liefert Nutzerdaten an Sicherheitsbehörden. Nutzerdaten gehen auch an Strafverfolgungsbehörden in den USA, wie ein aktuelles Verfahren zeigt. Das Verfahren betrifft …
Shares slide after China brands online games 'electronic drugs'
Shares in two of China's biggest online gaming firms have slipped after a state media outlet called them "electronic drugs".
Tencent and NetEase shares fell more than 10% in early Hong Kong trade before regaining some of those losses.
Investors are increasingly concerned about Beijing cracking down on firms.
In recent months authorities have announced a series of measures to tighten their grip on technology and private education companies.
An article published by the state-run Economic Information Daily said many teenagers had become addicted to online gaming and it was having a negative impact on them. The news outlet is affiliated with the official Xinhua news agency.
The article cited Tencent's hugely popular game Honor of Kings, saying students were playing it for up to eight hours a day, and asked for more curbs on the industry.
"No industry, no sport, can be allowed to develop in a way that will destroy a generation," it said before going on to liken online games to "spiritual opium".
Tencent has said it would introduce measures to reduce children's access to and time spent on its Honor of Kings game. The company also said it plans to eventually roll out the policy to all of its games.`
The recovery in share prices came as Economic Information Daily deleted the article from its account on the Wechat social media platform.
Tencent also saw its shares fall last week after being ordered to end exclusive music licensing deals with record labels around the world.
The move was aimed at tackling the technology giant's dominance of online music streaming in the country - it currently controls more than 80% of China's exclusive music streaming rights after an acquisition in 2016.
Tencent is only one of a number of Chinese companies listed in the US, Hong Kong and mainland China to see shares fall sharply this year as Beijing clamps down on the country's technology and education industries.
Last week saw shares in Chinese online tutoring firms slump after they were stripped of the ability to make a profit from teaching core subjects in China.
The new guidelines also restricted foreign investment in the industry.
https://www.bbc.com/news/business-58066659
#china #online #gaming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Shares in two of China's biggest online gaming firms have slipped after a state media outlet called them "electronic drugs".
Tencent and NetEase shares fell more than 10% in early Hong Kong trade before regaining some of those losses.
Investors are increasingly concerned about Beijing cracking down on firms.
In recent months authorities have announced a series of measures to tighten their grip on technology and private education companies.
An article published by the state-run Economic Information Daily said many teenagers had become addicted to online gaming and it was having a negative impact on them. The news outlet is affiliated with the official Xinhua news agency.
The article cited Tencent's hugely popular game Honor of Kings, saying students were playing it for up to eight hours a day, and asked for more curbs on the industry.
"No industry, no sport, can be allowed to develop in a way that will destroy a generation," it said before going on to liken online games to "spiritual opium".
Tencent has said it would introduce measures to reduce children's access to and time spent on its Honor of Kings game. The company also said it plans to eventually roll out the policy to all of its games.`
The recovery in share prices came as Economic Information Daily deleted the article from its account on the Wechat social media platform.
Tencent also saw its shares fall last week after being ordered to end exclusive music licensing deals with record labels around the world.
The move was aimed at tackling the technology giant's dominance of online music streaming in the country - it currently controls more than 80% of China's exclusive music streaming rights after an acquisition in 2016.
Tencent is only one of a number of Chinese companies listed in the US, Hong Kong and mainland China to see shares fall sharply this year as Beijing clamps down on the country's technology and education industries.
Last week saw shares in Chinese online tutoring firms slump after they were stripped of the ability to make a profit from teaching core subjects in China.
The new guidelines also restricted foreign investment in the industry.
https://www.bbc.com/news/business-58066659
#china #online #gaming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BBC News
Shares slide after China brands online games 'electronic drugs'
In recent months Beijing has cracked down on China's technology and private education industries.
Blizzard Entertainment president steps down after workplace protests.
Activision Blizzard, the video game maker, said on Tuesday that the president of its Blizzard Entertainment studio was stepping down immediately, as the company grapples with the fallout from allegations of workplace harassment and discrimination.
Activision, known for Call of Duty and other popular gaming franchises, has been under pressure following a lawsuit filed on July 20 by the state of California. The lawsuit accused the company of fostering a “frat boy workplace culture” in which men joked about rape and women were routinely harassed and paid less than their male colleagues.
Many of the misconduct accusations in the lawsuit focused on the Blizzard division, with which Activision merged through a 2008 deal with Vivendi Games.
The departing executive, J. Allen Brack, will be replaced by two Blizzard executives, Jen Oneal and Mike Ybarra, who will be co-leaders of the studio, Activision said in a statement. Mr. Brack was mentioned in the lawsuit as an executive who had failed to take “effective remedial measures” when sexual harassment and discrimination complaints were brought to him.
Bobby Kotick, Activision’s chief executive, initially stumbled in his response to the lawsuit but has since moved aggressively to contain employee discontent. Activision was at first dismissive of the allegations, and more than 1,500 employees last week staged a walkout to protest the response and to urge executives to take the issues seriously.
On the eve of the walkout, Mr. Kotick apologized and said Activision would improve its culture and hire the law firm WilmerHale to review the company’s policies. “I am sorry that we did not provide the right empathy and understanding,” he told employees at the time. Activision is set to report earnings later on Tuesday, when Mr. Kotick is expected to speak.
https://www.nytimes.com/2021/08/03/business/blizzard-entertainment-activision.html
#blizzard
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Activision Blizzard, the video game maker, said on Tuesday that the president of its Blizzard Entertainment studio was stepping down immediately, as the company grapples with the fallout from allegations of workplace harassment and discrimination.
Activision, known for Call of Duty and other popular gaming franchises, has been under pressure following a lawsuit filed on July 20 by the state of California. The lawsuit accused the company of fostering a “frat boy workplace culture” in which men joked about rape and women were routinely harassed and paid less than their male colleagues.
Many of the misconduct accusations in the lawsuit focused on the Blizzard division, with which Activision merged through a 2008 deal with Vivendi Games.
The departing executive, J. Allen Brack, will be replaced by two Blizzard executives, Jen Oneal and Mike Ybarra, who will be co-leaders of the studio, Activision said in a statement. Mr. Brack was mentioned in the lawsuit as an executive who had failed to take “effective remedial measures” when sexual harassment and discrimination complaints were brought to him.
Bobby Kotick, Activision’s chief executive, initially stumbled in his response to the lawsuit but has since moved aggressively to contain employee discontent. Activision was at first dismissive of the allegations, and more than 1,500 employees last week staged a walkout to protest the response and to urge executives to take the issues seriously.
On the eve of the walkout, Mr. Kotick apologized and said Activision would improve its culture and hire the law firm WilmerHale to review the company’s policies. “I am sorry that we did not provide the right empathy and understanding,” he told employees at the time. Activision is set to report earnings later on Tuesday, when Mr. Kotick is expected to speak.
https://www.nytimes.com/2021/08/03/business/blizzard-entertainment-activision.html
#blizzard
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
NY Times
Blizzard Entertainment president steps down after workplace protests.
The video game studio’s parent company, Activision Blizzard, has been accused of fostering a “frat boy workplace culture.”
GIFCT-TAWG-2021.pdf
1.1 MB
Gap analysis and recommendations for deploying technical solutions to tackle the terrorist use of the Internet
https://cdn-132.bayfiles.com/H187o3Acu0/c92ca5dd-1628020715/GIFCT-TAWG-2021.pdf
#analysis #terrorists #internet #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://cdn-132.bayfiles.com/H187o3Acu0/c92ca5dd-1628020715/GIFCT-TAWG-2021.pdf
#analysis #terrorists #internet #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Your Facebook Account Was Hacked. Getting Help May Take Weeks — Or $299
Angela McNamara's first hint that her Facebook account had been hacked was an early-morning email warning that someone was trying to log into her account.
"If this is not you, don't worry, we're keeping your account safe," she recalls the email from Facebook saying. But her relief only lasted a minute, when another email arrived, saying her password had been changed. Then another, notifying her that a two-factor authentication — an extra layer of security — had been set up for her account.
"And then from there I'm just like, 'OK, it is gone,' " said McNamara, who lives outside Toronto. She tried Facebook's automated process to recover her account: getting a backup code, resetting her password. But nothing worked.
https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299
#facebook #hacked #DeleteFacebook
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Angela McNamara's first hint that her Facebook account had been hacked was an early-morning email warning that someone was trying to log into her account.
"If this is not you, don't worry, we're keeping your account safe," she recalls the email from Facebook saying. But her relief only lasted a minute, when another email arrived, saying her password had been changed. Then another, notifying her that a two-factor authentication — an extra layer of security — had been set up for her account.
"And then from there I'm just like, 'OK, it is gone,' " said McNamara, who lives outside Toronto. She tried Facebook's automated process to recover her account: getting a backup code, resetting her password. But nothing worked.
https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299
#facebook #hacked #DeleteFacebook
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
RF_28_July_2021_-_E.pdf
602.2 KB
United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes
Russia has put forward a draft convention to the United Nations ostensibly to fight cyber-crime.
The proposal, titled "United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes," [PDF] calls for member states to develop domestic laws to punish a far broader set of offenses than current international rules recognize.
https://www.theregister.com/2021/08/03/russia_cybercrime_laws/
https://www.kommersant.ru/docs/2021/RF_28_July_2021_-_E.pdf
#russia #un #cybercrime #backdoors #censorship #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Russia has put forward a draft convention to the United Nations ostensibly to fight cyber-crime.
The proposal, titled "United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes," [PDF] calls for member states to develop domestic laws to punish a far broader set of offenses than current international rules recognize.
https://www.theregister.com/2021/08/03/russia_cybercrime_laws/
https://www.kommersant.ru/docs/2021/RF_28_July_2021_-_E.pdf
#russia #un #cybercrime #backdoors #censorship #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
2108.01077.pdf
12.4 MB
‘Master Faces’ That Can Bypass Over 40% Of Facial ID Authentication Systems
Researchers from Israel have developed a neural network capable of generating ‘master’ faces – facial images that are each capable of impersonating multiple IDs. The work suggests that it’s possible to generate such ‘master keys’ for more than 40% of the population using only 9 faces synthesized by the StyleGAN Generative Adversarial Network (GAN), via three leading face recognition systems.
The paper is a collaboration between the Blavatnik School of Computer Science and the school of Electrical Engineering, both at Tel Aviv.
https://www.unite.ai/master-faces-that-can-bypass-over-40-of-facial-id-authentication-systems/
https://arxiv.org/pdf/2108.01077.pdf
#bypass #facial #id #authentication #GAN #StyleGAN #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Researchers from Israel have developed a neural network capable of generating ‘master’ faces – facial images that are each capable of impersonating multiple IDs. The work suggests that it’s possible to generate such ‘master keys’ for more than 40% of the population using only 9 faces synthesized by the StyleGAN Generative Adversarial Network (GAN), via three leading face recognition systems.
The paper is a collaboration between the Blavatnik School of Computer Science and the school of Electrical Engineering, both at Tel Aviv.
https://www.unite.ai/master-faces-that-can-bypass-over-40-of-facial-id-authentication-systems/
https://arxiv.org/pdf/2108.01077.pdf
#bypass #facial #id #authentication #GAN #StyleGAN #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
98: Zero Day Brokers
Darknet Diaries - EP 98: Zero Day Brokers
Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it.
https://darknetdiaries.com/episode/98/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it.
https://darknetdiaries.com/episode/98/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Apple plans to scan US iPhones for child abuse imagery
Security researchers raise alarm over potential surveillance of personal devices
Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices.
Apple detailed its proposed system — known as “neuralMatch” — to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicised more widely as soon as this week, they said.
The automated system would proactively alert a team of human reviewers if it believes illegal imagery is detected, who would then contact law enforcement if the material can be verified. The scheme will initially roll out only in the US.
Apple declined to comment.
(Paywall)
https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f
#usa #apple #iphones #childabuse #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Security researchers raise alarm over potential surveillance of personal devices
Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices.
Apple detailed its proposed system — known as “neuralMatch” — to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicised more widely as soon as this week, they said.
The automated system would proactively alert a team of human reviewers if it believes illegal imagery is detected, who would then contact law enforcement if the material can be verified. The scheme will initially roll out only in the US.
Apple declined to comment.
(Paywall)
https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f
#usa #apple #iphones #childabuse #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Ft
Subscribe to read | Financial Times
News, analysis and comment from the Financial Times, the worldʼs leading global business publication
Operating Systems: Timeline and Family Tree
Includes over 830 operating systems so far
In this post you'll find a family tree and timeline of operating systems. I have tried to include all operating systems, no matter how old or obscure. Of course, a complete list is virtually impossible, as there is no way to catalogue all the tiny hobby and embedded systems that may exist somewhere.
Please also note that I only included a few selected Linux/BSD/Solaris distributions (it is arguable whether these should count as an OS on their own or not).
Currently, the family tree includes between 800 and 900 different operating systems. Tip: use Ctrl+F (Cmd+F on Mac) to search for a system.
https://eylenburg.github.io/os_familytree.htm
#os #familytree
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Includes over 830 operating systems so far
In this post you'll find a family tree and timeline of operating systems. I have tried to include all operating systems, no matter how old or obscure. Of course, a complete list is virtually impossible, as there is no way to catalogue all the tiny hobby and embedded systems that may exist somewhere.
Please also note that I only included a few selected Linux/BSD/Solaris distributions (it is arguable whether these should count as an OS on their own or not).
Currently, the family tree includes between 800 and 900 different operating systems. Tip: use Ctrl+F (Cmd+F on Mac) to search for a system.
https://eylenburg.github.io/os_familytree.htm
#os #familytree
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
eylenburg.github.io
Operating Systems: Timeline and Family Tree
The Intolerance Network
Today, 5th August 2021, WikiLeaks publishes "The Intolerance Network" over 17,000 documents from internationally active right wing campaigning organisations HazteOir and CitizenGO. The documents date from 2001 to 2017 and cover the founding of CitizenGO and early activities of both organisations. The documents are from their internal systems and cover things like: spreadsheets of donors and members, strategy and planning documents, letters, financial charts and legal and training documents.
HazteOir was first founded in 2001 in Spain to campaign for right wing values, in 2013 it founded CitizenGO to spread its work beyond Spanish speaking countries. This dataset includes the founding of CitizenGo, and documents from HazteOir organising, along with US based The Howard Center for Family, Religion and Society, the 2012 World Congress for Families (WCF) in Madrid. The WCF brings together right wing organisations that promote opposition to LGBTQI+ and reproductive rights, it has been labeled as a hate group by the Southern Poverty Law Center and a 2014 Human Rights Campaign report stated "The World Congress of Families (WCF) is one of the most influential American organizations involved in the export of hate".
Tying all these organisations together is Ignacio Arsuaga, founder of HazteOir and on the board of CitizenGo and was awarded the 2013 WCF "Man of the Year Award". The WCF President, Brian Brown - an American campaigner against LGBTQI+ rights, is also on the board of CitizenGo. Both HazteOir and CitizenGo are part of a larger global network of right wing organisations that work together to push their values in grassroots and political spheres.
CitizenGo partners to push campaigns with a number of organisations, for example it ran a petition with the Population Research Institute "Abortion is NOT a Human Right!". They work to mobilize grassroot support, and are keen to stress this is their base, however it is clear through the dataset that they aim to raise large funds and influence policy at a high level. A 2019 undercover investigation by OpenDemocracy confirmed ties between Spanish HazteOir and CitizenGo with right wing political parties across Europe in Spain, Italy and Hungary. There have also been reports regarding ties to El Yunque, a secret militant Mexican Group, a tie which HazteOir has tried to rid itself of.
https://nitter.snopyta.org/YourAnonOnline/status/1423594689249386497
https://wikileaks.org/intolerancenetwork/press-release
#CitizenGo #spain #italy #hungary #intolerancenetwork #WCF #HazteOir #OpenDemocracy #hatespeach #wikileaks
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Today, 5th August 2021, WikiLeaks publishes "The Intolerance Network" over 17,000 documents from internationally active right wing campaigning organisations HazteOir and CitizenGO. The documents date from 2001 to 2017 and cover the founding of CitizenGO and early activities of both organisations. The documents are from their internal systems and cover things like: spreadsheets of donors and members, strategy and planning documents, letters, financial charts and legal and training documents.
HazteOir was first founded in 2001 in Spain to campaign for right wing values, in 2013 it founded CitizenGO to spread its work beyond Spanish speaking countries. This dataset includes the founding of CitizenGo, and documents from HazteOir organising, along with US based The Howard Center for Family, Religion and Society, the 2012 World Congress for Families (WCF) in Madrid. The WCF brings together right wing organisations that promote opposition to LGBTQI+ and reproductive rights, it has been labeled as a hate group by the Southern Poverty Law Center and a 2014 Human Rights Campaign report stated "The World Congress of Families (WCF) is one of the most influential American organizations involved in the export of hate".
Tying all these organisations together is Ignacio Arsuaga, founder of HazteOir and on the board of CitizenGo and was awarded the 2013 WCF "Man of the Year Award". The WCF President, Brian Brown - an American campaigner against LGBTQI+ rights, is also on the board of CitizenGo. Both HazteOir and CitizenGo are part of a larger global network of right wing organisations that work together to push their values in grassroots and political spheres.
CitizenGo partners to push campaigns with a number of organisations, for example it ran a petition with the Population Research Institute "Abortion is NOT a Human Right!". They work to mobilize grassroot support, and are keen to stress this is their base, however it is clear through the dataset that they aim to raise large funds and influence policy at a high level. A 2019 undercover investigation by OpenDemocracy confirmed ties between Spanish HazteOir and CitizenGo with right wing political parties across Europe in Spain, Italy and Hungary. There have also been reports regarding ties to El Yunque, a secret militant Mexican Group, a tie which HazteOir has tried to rid itself of.
https://nitter.snopyta.org/YourAnonOnline/status/1423594689249386497
https://wikileaks.org/intolerancenetwork/press-release
#CitizenGo #spain #italy #hungary #intolerancenetwork #WCF #HazteOir #OpenDemocracy #hatespeach #wikileaks
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Nitter
Anonymous News 🌐 (@YourAnonOnline)
#Anonymous #WikiLeaks demuestra que grandes empresas y fortunas españolas apoyaron el lanzamiento del partido de ultraderecha Vox
Esther Koplowitz (FCC) el fallecido Isidoro Álvarez (El Corte Inglés)o Juan Miguel Villar-Mir (OHL) financiaron el nacimiento…
Esther Koplowitz (FCC) el fallecido Isidoro Álvarez (El Corte Inglés)o Juan Miguel Villar-Mir (OHL) financiaron el nacimiento…
Media is too big
VIEW IN TELEGRAM
Capture Wi-Fi Passwords From Smartphones with a Half-Handshake Attack
In this episode, we show how hackers can abuse convenience features of Wi-Fi to extract passwords from nearby smartphones belonging to Wi-Fi networks they've connected to in the past.
https://www.youtube.com/watch?v=5guDKTc6Hak
#hak5 #video #wifi #passwords #smartphones
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
In this episode, we show how hackers can abuse convenience features of Wi-Fi to extract passwords from nearby smartphones belonging to Wi-Fi networks they've connected to in the past.
https://www.youtube.com/watch?v=5guDKTc6Hak
#hak5 #video #wifi #passwords #smartphones
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
"Incognito Mode is not a great method of ensuring privacy, because it's still very easy to track what you're doing online."
Yep. Want real browsing privacy and tracking protection?
It's possible with Tor Browser. 👉🏽 https://torproject.org/download.
https://nitter.pussthecat.org/torproject/status/1423688216184426496
via Twitter
💡 Read as well:
Your Google and Safari Incognito mode is EXPOSING you online – here’s how
https://www.the-sun.com/tech/3410416/google-chrome-incognito-mode-safari-exposing-data-online/
#online #privacy #tor
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Yep. Want real browsing privacy and tracking protection?
It's possible with Tor Browser. 👉🏽 https://torproject.org/download.
https://nitter.pussthecat.org/torproject/status/1423688216184426496
via Twitter
💡 Read as well:
Your Google and Safari Incognito mode is EXPOSING you online – here’s how
https://www.the-sun.com/tech/3410416/google-chrome-incognito-mode-safari-exposing-data-online/
#online #privacy #tor
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
www.torproject.org
The Tor Project | Privacy & Freedom Online
Defend yourself against tracking and surveillance. Circumvent censorship.
Connect-app (CDU) Version: 3.8 - Cross Site Scripting
app: connect-app (cdu) (version: 3.8)
cross-site scripting in the registration form name variables. Remote attackers can inject js payloads as name variables to exploit the frontend in the profile view and potentially execute in the backend via the preview. Uncertainty in validating object names in outbound emails, causing the context to be validated insecurely. This allows reflected execution in the message body of the email where the name variable is visible. You can see in the main validation how the developers have tried to parse and encode the content with backslashes and other characters. In this way, the type of validation can easily be bypassed by using simple frames with a source that points to a external link.
We have tested this in the portal where the code is executed, we have tested it in the outgoing service emails that insert the name variably in the email body, and we have also tested the stored content that was submitted via the API. All contents was transmitted insecurely and can be manipulated to trigger simple cross-site scripting payloads, hijack user session credentials or manipulate outbound emails with reflected malicious content on the application side.
We decided to bring the issue directly to the public after the CDU opened a court case to criminalise a German hacker following a Whitehat report. Normally we wanted to report the vulnerabilities directly via Responsible Disclosure, but were deterred by incidents mentioned above. These did not stop us but we therefore chose another way to make noise.
👉🏽 ref: https://www.golem.de/news/connect-app-cdu-verklagt-offenbar-hackerin-nach-melden-von-luecken-2108-158647.html
👉🏽 ref: https://www.golem.de/news/connect-app-cdu-nimmt-wahlkampf-app-nach-datenleck-offline-2105-156471.html
greetz to cdu
by team smackback
https://seclists.org/fulldisclosure/2021/Aug/4
#cdu #germany #disclosure
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
app: connect-app (cdu) (version: 3.8)
cross-site scripting in the registration form name variables. Remote attackers can inject js payloads as name variables to exploit the frontend in the profile view and potentially execute in the backend via the preview. Uncertainty in validating object names in outbound emails, causing the context to be validated insecurely. This allows reflected execution in the message body of the email where the name variable is visible. You can see in the main validation how the developers have tried to parse and encode the content with backslashes and other characters. In this way, the type of validation can easily be bypassed by using simple frames with a source that points to a external link.
We have tested this in the portal where the code is executed, we have tested it in the outgoing service emails that insert the name variably in the email body, and we have also tested the stored content that was submitted via the API. All contents was transmitted insecurely and can be manipulated to trigger simple cross-site scripting payloads, hijack user session credentials or manipulate outbound emails with reflected malicious content on the application side.
We decided to bring the issue directly to the public after the CDU opened a court case to criminalise a German hacker following a Whitehat report. Normally we wanted to report the vulnerabilities directly via Responsible Disclosure, but were deterred by incidents mentioned above. These did not stop us but we therefore chose another way to make noise.
👉🏽 ref: https://www.golem.de/news/connect-app-cdu-verklagt-offenbar-hackerin-nach-melden-von-luecken-2108-158647.html
👉🏽 ref: https://www.golem.de/news/connect-app-cdu-nimmt-wahlkampf-app-nach-datenleck-offline-2105-156471.html
greetz to cdu
by team smackback
https://seclists.org/fulldisclosure/2021/Aug/4
#cdu #germany #disclosure
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
www.golem.de
Connect-App: CDU zeigt offenbar Hackerin nach Melden von Lücken an - Golem.de
Nach dem Auffinden einer Lücke in einer CDU-App zeigt die Partei nun die Finderin an. Der CCC will deshalb keine Lücken mehr an die CDU melden.
No matter how well-intentioned, @Apple is rolling out mass surveillance to the entire world with this. Make no mistake: if they can scan for kiddie porn today, they can scan for anything tomorrow.
They turned a trillion dollars of devices into iNarcs—*without asking.*
https://nitter.pussthecat.org/Snowden/status/1423469854347169798
via Twitter
#usa #apple #iphones #childabuse #surveillance #snowden
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
They turned a trillion dollars of devices into iNarcs—*without asking.*
https://nitter.pussthecat.org/Snowden/status/1423469854347169798
via Twitter
#usa #apple #iphones #childabuse #surveillance #snowden
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
How to keep your smartphone safe from spying
This post discusses four personas, the technical threats to them and their information via their smartphone, and some theory on how to defend against an increasingly capable and focused threat actors.
If you find yourself matching one of these personas, following the recommendations below may serve you well if you feel that is proportionate to your individual threat profile.
If you provide IT or cybersecurity services to other people who may fit these personas, double check that what you offer and how you offer it is proportionate to the threats you’re helping to protect them from. Hopefully you have all of our recommendations covered!
💡 This is definitely not an exhaustive guide and is developed based on article(s) linked and our combined years working in technology and cyber security.
👉🏽 Greg, your average internet user using a modern smartphone for online banking, internet browsing and social media
👉🏽 Jane, an IT consultant, worried about keeping their client/organisational information safe
👉🏽 Emma, a management consultant who travels regularly for work. Emma’s company works with governments and large financial institutions
👉🏽 Roberto, an investigative journalist working on a big negative story about a nation state and it’s top leadership
The capability of threat actors and the probability of targeting varies enormously from indiscriminate sms/email phishing through to individual targeting using commercial spyware such as NSO Group’s Pegasus, ‘zero day’ exploits and physical tampering of the device. The level of effort and complexity rapidly increases, as do the inconveniences of trying to deter, defend and limit the impact of such attacks.
https://joelgsamuel.medium.com/how-to-keep-your-smartphone-safe-from-spying-d7d50fbed817
#smartphone #security
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
This post discusses four personas, the technical threats to them and their information via their smartphone, and some theory on how to defend against an increasingly capable and focused threat actors.
If you find yourself matching one of these personas, following the recommendations below may serve you well if you feel that is proportionate to your individual threat profile.
If you provide IT or cybersecurity services to other people who may fit these personas, double check that what you offer and how you offer it is proportionate to the threats you’re helping to protect them from. Hopefully you have all of our recommendations covered!
💡 This is definitely not an exhaustive guide and is developed based on article(s) linked and our combined years working in technology and cyber security.
👉🏽 Greg, your average internet user using a modern smartphone for online banking, internet browsing and social media
👉🏽 Jane, an IT consultant, worried about keeping their client/organisational information safe
👉🏽 Emma, a management consultant who travels regularly for work. Emma’s company works with governments and large financial institutions
👉🏽 Roberto, an investigative journalist working on a big negative story about a nation state and it’s top leadership
The capability of threat actors and the probability of targeting varies enormously from indiscriminate sms/email phishing through to individual targeting using commercial spyware such as NSO Group’s Pegasus, ‘zero day’ exploits and physical tampering of the device. The level of effort and complexity rapidly increases, as do the inconveniences of trying to deter, defend and limit the impact of such attacks.
https://joelgsamuel.medium.com/how-to-keep-your-smartphone-safe-from-spying-d7d50fbed817
#smartphone #security
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Medium
How to keep your smartphone safe from spying
How should the average person, IT professional, travelling consultant or investigative journalist keep their smartphones cyber safe?
NixNet - Away from prying eyes…
We host a variety of services that are available for anyone to use free of charge. Below is a list with descriptions of each.
NixNet is a network of websites and services hosted by the pseudonymous Amolith (me) and a close friend of his, Manton. The main reason we run these sites is because we like to be in control of our own data where feasible. The easiest way to accomplish that is to host the services we use. We make them public and maintain them simply because we want to; the Linux and FLOSS community has completely changed ours lives and we feel like this is a small way we can do our part and give back.
https://nixnet.services/
#nixnet
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
We host a variety of services that are available for anyone to use free of charge. Below is a list with descriptions of each.
NixNet is a network of websites and services hosted by the pseudonymous Amolith (me) and a close friend of his, Manton. The main reason we run these sites is because we like to be in control of our own data where feasible. The easiest way to accomplish that is to host the services we use. We make them public and maintain them simply because we want to; the Linux and FLOSS community has completely changed ours lives and we feel like this is a small way we can do our part and give back.
https://nixnet.services/
#nixnet
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
NixNet
A network of websites and services hosted by Amolith available for anyone to use free of charge.
One Bad Apple
My in-box has been flooded over the last few days about Apple's CSAM announcement. Everyone seems to want my opinion since I've been deep into photo analysis technologies and the reporting of child exploitation materials. In this blog entry, I'm going to go over what Apple announced, existing technologies, and the impact to end users. Moreover, I'm going to call out some of Apple's questionable claims.
💡 Disclaimer: I'm not an attorney and this is not legal advice. This blog entry includes my non-attorney understanding of these laws.
The Announcement:
In an announcement titled "Expanded Protections for Children", Apple explains their focus on preventing child exploitation.
The article starts with Apple pointing out that the spread of Child Sexual Abuse Material (CSAM) is a problem. I agree, it is a problem. At my FotoForensics service, I typically submit a few CSAM reports (or "CP" -- photo of child pornography) per day to the National Center for Missing and Exploited Children (NCMEC). (It's actually written into Federal law: 18 U.S.C. § 2258A. Only NMCEC can receive CP reports, and 18 USC § 2258A(e) makes it a felony for a service provider to fail to report CP.) I don't permit porn or nudity on my site because sites that permit that kind of content attract CP. By banning users and blocking content, I currently keep porn to about 2-3% of the uploaded content, and CP at less than 0.06%.
According to NCMEC, I submitted 608 reports to NCMEC in 2019, and 523 reports in 2020. In those same years, Apple submitted 205 and 265 reports (respectively). It isn't that Apple doesn't receive more picture than my service, or that they don't have more CP that I receive. Rather, it's that they don't seem to notice and therefore, don't report.
Apple's devices rename pictures in a way that is very distinct. (Filename ballistics spots it really well.) Based on the number of reports that I've submitted to NCMEC, where the image appears to have touched Apple's devices or services, I think that Apple has a very large CP/CSAM problem.
[Revised; thanks CW!] Apple's iCloud service encrypts all data, but Apple has the decryption keys and can use them if there is a warrant. However, nothing in the iCloud terms of service grants Apple access to your pictures for use in research projects, such as developing a CSAM scanner. (Apple can deploy new beta features, but Apple cannot arbitrarily use your data.) In effect, they don't have access to your content for testing their CSAM system.
If Apple wants to crack down on CSAM, then they have to do it on your Apple device. This is what Apple announced: Beginning with iOS 15, Apple will be deploying a CSAM scanner that will run on your device. If it encounters any CSAM content, it will send the file to Apple for confirmation and then they will report it to NCMEC. (Apple wrote in their announcement that their staff "manually reviews each report to confirm there is a match". They cannot manually review it unless they have a copy.)
While I understand the reason for Apple's proposed CSAM solution, there are some serious problems with their implementation.
https://www.hackerfactor.com/blog/index.php?/archives/929-One-Bad-Apple.html
#usa #apple #iphones #childabuse #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
My in-box has been flooded over the last few days about Apple's CSAM announcement. Everyone seems to want my opinion since I've been deep into photo analysis technologies and the reporting of child exploitation materials. In this blog entry, I'm going to go over what Apple announced, existing technologies, and the impact to end users. Moreover, I'm going to call out some of Apple's questionable claims.
💡 Disclaimer: I'm not an attorney and this is not legal advice. This blog entry includes my non-attorney understanding of these laws.
The Announcement:
In an announcement titled "Expanded Protections for Children", Apple explains their focus on preventing child exploitation.
The article starts with Apple pointing out that the spread of Child Sexual Abuse Material (CSAM) is a problem. I agree, it is a problem. At my FotoForensics service, I typically submit a few CSAM reports (or "CP" -- photo of child pornography) per day to the National Center for Missing and Exploited Children (NCMEC). (It's actually written into Federal law: 18 U.S.C. § 2258A. Only NMCEC can receive CP reports, and 18 USC § 2258A(e) makes it a felony for a service provider to fail to report CP.) I don't permit porn or nudity on my site because sites that permit that kind of content attract CP. By banning users and blocking content, I currently keep porn to about 2-3% of the uploaded content, and CP at less than 0.06%.
According to NCMEC, I submitted 608 reports to NCMEC in 2019, and 523 reports in 2020. In those same years, Apple submitted 205 and 265 reports (respectively). It isn't that Apple doesn't receive more picture than my service, or that they don't have more CP that I receive. Rather, it's that they don't seem to notice and therefore, don't report.
Apple's devices rename pictures in a way that is very distinct. (Filename ballistics spots it really well.) Based on the number of reports that I've submitted to NCMEC, where the image appears to have touched Apple's devices or services, I think that Apple has a very large CP/CSAM problem.
[Revised; thanks CW!] Apple's iCloud service encrypts all data, but Apple has the decryption keys and can use them if there is a warrant. However, nothing in the iCloud terms of service grants Apple access to your pictures for use in research projects, such as developing a CSAM scanner. (Apple can deploy new beta features, but Apple cannot arbitrarily use your data.) In effect, they don't have access to your content for testing their CSAM system.
If Apple wants to crack down on CSAM, then they have to do it on your Apple device. This is what Apple announced: Beginning with iOS 15, Apple will be deploying a CSAM scanner that will run on your device. If it encounters any CSAM content, it will send the file to Apple for confirmation and then they will report it to NCMEC. (Apple wrote in their announcement that their staff "manually reviews each report to confirm there is a match". They cannot manually review it unless they have a copy.)
While I understand the reason for Apple's proposed CSAM solution, there are some serious problems with their implementation.
https://www.hackerfactor.com/blog/index.php?/archives/929-One-Bad-Apple.html
#usa #apple #iphones #childabuse #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The Pirate Bay Switches to a Brand New V3 Onion Domain
The Pirate Bay has moved to a new onion domain as the old one will cease to be supported by the official Tor client in a few weeks. The new v3 domain is more secure and the TPB-team encourages users to make the switch. Bookmarking the domain may be wise as well, as v3 onion domains have 56 characters.
When The Pirate Bay first came online during the summer of 2003, its main point of access was thepiratebay.org.
Since then the site has burnt through more than a dozen domains, trying to evade seizures or other legal threats.
The torrent site eventually returned to the .org domain which remains the official home today. While there are hundreds of Pirate Bay proxies online, none of these are operated by the TPB-team.
https://torrentfreak.com/the-pirate-bay-switches-to-a-brand-new-v3-onion-domain-210809/
#piratebay #onion #tor
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The Pirate Bay has moved to a new onion domain as the old one will cease to be supported by the official Tor client in a few weeks. The new v3 domain is more secure and the TPB-team encourages users to make the switch. Bookmarking the domain may be wise as well, as v3 onion domains have 56 characters.
When The Pirate Bay first came online during the summer of 2003, its main point of access was thepiratebay.org.
Since then the site has burnt through more than a dozen domains, trying to evade seizures or other legal threats.
The torrent site eventually returned to the .org domain which remains the official home today. While there are hundreds of Pirate Bay proxies online, none of these are operated by the TPB-team.
https://torrentfreak.com/the-pirate-bay-switches-to-a-brand-new-v3-onion-domain-210809/
#piratebay #onion #tor
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
The Pirate Bay Switches to a Brand New V3 Onion Domain * TorrentFreak
The Pirate Bay has moved to a new onion domain as the old one will cease to be supported by the Tor browser in a few weeks.