BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Dismantling Big Tech: A User's Manual
Dismantling Big Tech: A Userโ€™s Manual

Congress, the Federal Trade Commission, the Department of Justice and state governments across the U.S. are investigating the tech giants for anti-competitive behavior. This week on #Decrypted, #Bloomberg Technologyโ€™s Eric Newcomer walks us through those #investigations, and outlines how a #Democratic president may take it even further in 2021.

๐Ÿ“ป https://www.bloomberg.com/news/audio/2019-10-09/dismantling-big-tech-a-user-s-manual-podcast

#BigTech #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Got YouTube Regrets? - Thousands do!

.....(....)

Letโ€™s send a message to YouTube that they need to recommend responsibly...

No regrets!

https://foundation.mozilla.org/en/campaigns/youtube-regrets/

#YouTube #Google #DeleteGoogle #NoRegrets #Mozilla
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Digital dystopia: how algorithms punish the poor

In an exclusive global series, the Guardian lays bare the tech revolution transforming the welfare system worldwide โ€“ while penalising the most vulnerable

All around the world, from small-town Illinois in the US to Rochdale in England, from Perth, Australia, to Dumka in northern India, a revolution is under way in how governments treat the poor.

You canโ€™t see it happening, and may have heard nothing about it. Itโ€™s being planned by engineers and coders behind closed doors, in secure government locations far from public view.

Only mathematicians and computer scientists fully understand the sea change, powered as it is by artificial intelligence (AI), predictive algorithms, risk modeling and biometrics. But if you are one of the millions of vulnerable people at the receiving end of the radical reshaping of welfare benefits, you know it is real and that its consequences can be serious โ€“ even deadly.

The Guardian has spent the past three months investigating how billions are being poured into AI innovations that are explosively recasting how low-income people interact with the state. Together, our reporters in the US, Britain, India and Australia have explored what amounts to the birth of the digital welfare state.

Their dispatches reveal how unemployment benefits, child support, housing and food subsidies and much more are being scrambled online. Vast sums are being spent by governments across the industrialized and developing worlds on automating poverty and in the process, turning the needs of vulnerable citizens into numbers, replacing the judgment of human caseworkers with the cold, bloodless decision-making of machines.

At its most forbidding, Guardian reporters paint a picture of a 21st-century Dickensian dystopia that is taking shape with breakneck speed. The American political scientist Virginia Eubanks has a phrase for it: โ€œThe digital poorhouse.โ€

๐Ÿ‘‰๐Ÿผ Read more:
https://www.theguardian.com/technology/2019/oct/14/automating-poverty-algorithms-punish-poor

#digital #distopia #algorithms #welfare #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
2,500 More MS-DOS Games Playable at the Archive

Another few thousand DOS Games are playable at the Internet Archive! Since our initial announcement in 2015, weโ€™ve added occasional new games here and there to the collection, but this will be our biggest update yet, ranging from tiny recent independent productions to long-forgotten big-name releases from decades ago.

๐Ÿ‘‰๐Ÿผ Software Library: MS-DOS Games
Software for MS-DOS machines that represent entertainment and games. The collection includes action, strategy, adventure and other unique genres of game and entertainment software. Through the use of the EM-DOSBOX in-browser emulator, these programs are bootable and playable. Please be aware this browser-based emulation is still in beta - contact Jason Scott, Software Curator, if there are issues or questions. Thanks to eXo for contributions and assistance with this archive.

https://archive.org/details/softwarelibrary_msdos_games?and%5B%5D=emulator_start%3A%2Aiafix%2A&sin=&sort=-publicdate

#games #dos #emulator #software #library #free
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
DeepFake Audio Detection

With the popularity and capabilities of audio deep fakes on the rise, creating defenses against deep fakes used for malicious intent is becoming more important than ever.

We built a fake audio detection model with Foundations Atlas, for anyone to use. If you'd like to read more about why we decided to build this, click here.

Here are two examples of short audio clips in ./data/example_clips/ folder. One of them is real and the other is fake.

This repository provides the code for a fake audio detection model built using Foundations Atlas. It also includes a pre-trained model and inference code, which you can test on any of your own audio files.

๐Ÿ‘‰๐Ÿผ GitHub:
https://github.com/dessa-public/fake-voice-detection

๐Ÿ‘‰๐Ÿผ Detecting Audio Deepfakes With AI
Why We Built A Detector For Audio Deepfakes, And How You Can Too
https://medium.com/dessa-news/detecting-audio-deepfakes-f2edfd8e2b35

#deepfake #voice #detection #audio
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Meet Americaโ€™s newest military giant: Amazon

The Pentagonโ€™s controversial $10bn JEDI cloud computing deal is one of the most lucrative defense contracts ever. Amazonโ€™s in pole position to winโ€”and its move into the military has been a long time coming.

In July, when President Donald Trump was in the Oval Office with the Dutch prime minister, he took a few moments to answer questions from reporters. His comments, in typical fashion, covered disparate subjectsโ€”from job creation to the โ€œsquadโ€ of congresswomen he attacks regularly to sanctions against Turkey. Then a reporter asked him about an obscure Pentagon contract called JEDI, and whether he planned to intervene in it.

โ€œWhich one is that?โ€ Trump asked. โ€œThe Amazon?โ€

๐Ÿ‘‰๐Ÿผ Read more:
https://www.technologyreview.com/s/614487/meet-americas-newest-military-giant-amazon/

#USA #DeleteAmazon #amazon #military
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Facebook should ban campaign ads. End the lies.

Permitting falsehood in political advertising would work if we had a model democracy, but we donโ€™t. Not only are candidates dishonest, but voters arenโ€™t educated, and the media isnโ€™t objective. And now, hyperlinks turn lies into donations and donations into louder lies. The checks donโ€™t balance. What we face is a self-reinforcing disinformation dystopia.

Thatโ€™s why if Facebook, Twitter, Snapchat and YouTube donโ€™t want to be the arbiters of truth in campaign ads, they should stop selling them. If they canโ€™t be distributed safely, they shouldnโ€™t be distributed at all.

No one wants historically untrustworthy social networks becoming the honesty police, deciding whatโ€™s factual enough to fly. But the alternative of allowing deception to run rampant is unacceptable. Until voter-elected officials can implement reasonable policies to preserve truth in campaign ads, the tech giants should go a step further and refuse to run them.

This problem came to a head recently when Facebook formalized its policy of allowing politicians to lie in ads and refusing to send their claims to third-party fact-checkers. โ€œWe donโ€™t believe, however, that itโ€™s an appropriate role for us to referee political debates and prevent a politicianโ€™s speech from reaching its audience and being subject to public debate and scrutiny,โ€ Facebookโ€™s VP of Policy Nick Clegg wrote.

The Trump campaign was already running ads with false claims about Democrats trying to repeal the Second Amendment and weeks-long scams about a โ€œmidnight deadlineโ€ for a contest to win the one-millionth MAGA hat.

After the announcement, Trumpโ€™s campaign began running ads smearing potential opponent Joe Biden with widely debunked claims about his relationship with Ukraine. Facebook, YouTube and Twitter refused to remove the ad when asked by Biden.

In response to the policy, Elizabeth Warren is running ads claiming Facebook CEO Mark Zuckerberg endorses Trump because itโ€™s allowing his campaign lies. Sheโ€™s continued to press Facebook on the issue, stating โ€œyou can be in the disinformation-for-profit business, or you can hold yourself to some standards.โ€

๐Ÿ‘‰๐Ÿผ Read more:
https://techcrunch.com/2019/10/13/ban-facebook-campaign-ads/

#DeleteFacebook #ads #lies #advertising #political #disinformation #dystopia #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Without encryption, we will lose all privacy. This is our new battleground

The US, UK and Australia are taking on Facebook in a bid to undermine the only method that protects our personal information

More Info - HERE

#deletefacebook #FacebookDigitalGangsters #deleteinstagram #deletewhatsapp
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
โ€œBriansClubโ€ Hack Rescues 26M Stolen Cards

โ€œBriansClub,โ€ one of the largest underground stores for buying stolen credit card data, has itself been hacked. The data stolen from BriansClub encompasses more than 26 million credit and debit card records taken from hacked online and brick-and-mortar retailers over the past four years, including almost eight million records uploaded to the shop in 2019 alone.

Last month, KrebsOnSecurity was contacted by a source who shared a plain text file containing what was claimed to be the full database of cards for sale both currently and historically through BriansClub[.]at, a thriving fraud bazaar named after this author. Imitating my site, likeness and namesake, BriansClub even dubiously claims a copyright with a reference at the bottom of each page: โ€œยฉ 2019 Crabs on Security.โ€

Multiple people who reviewed the database shared by my source confirmed that the same credit card records also could be found in a more redacted form simply by searching the BriansClub Web site with a valid, properly-funded account.

All of the card data stolen from BriansClub was shared with multiple sources who work closely with financial institutions to identify and monitor or reissue cards that show up for sale in the cybercrime underground.

The leaked data shows that in 2015, BriansClub added just 1.7 million card records for sale. But business would pick up in each of the years that followed: In 2016, BriansClub uploaded 2.89 million stolen cards; 2017 saw some 4.9 million cards added; 2018 brought in 9.2 million more.

Between January and August 2019 (when this database snapshot was apparently taken), BriansClub added roughly 7.6 million cards.

Most of whatโ€™s on offer at BriansClub are โ€œdumps,โ€ strings of ones and zeros that โ€” when encoded onto anything with a magnetic stripe the size of a credit card โ€” can be used by thieves to purchase electronics, gift cards and other high-priced items at big box stores.

As shown in the table below (taken from this story), many federal hacking prosecutions involving stolen credit cards will for sentencing purposes value each stolen card record at $500, which is intended to represent the average loss per compromised cardholder.

๐Ÿ‘‰๐Ÿผ Read more:
https://krebsonsecurity.com/

#hacker #hackback #BrainsClub #KrebsOnSecurity
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Darknet platform for child porn: Investigators arrest 337 users

A playground for pedophiles, perverts and criminals: this is how US justice describes a platform for child pornography that has now been excavated.

South Korean National and Hundreds of Others Charged Worldwide in the Takedown of the Largest Darknet Child Pornography Website, Which was Funded by Bitcoin

Dozens of Minor Victims Who Were Being Actively Abused by the Users of the Site Rescued

Jong Woo Son, 23, a South Korean national, was indicted by a federal grand jury in the District of Columbia for his operation of Welcome To Video, the largest child sexual exploitation market by volume of content. The nine-count indictment was unsealed today along with a parallel civil forfeiture action. Son has also been charged and convicted in South Korea and is currently in custody serving his sentence in South Korea. An additional 337 site users residing in Alabama, Arkansas, California, Connecticut, Florida, Georgia, Kansas, Louisiana, Maryland, Massachusetts, Nebraska, New Jersey, New York, North Carolina, Ohio, Oregon, Pennsylvania, Rhode Island, South Carolina, Texas, Utah, Virginia, Washington State and Washington, D.C. as well as the United Kingdom, South Korea, Germany, Saudi Arabia, the United Arab Emirates, the Czech Republic, Canada, Ireland, Spain, Brazil and Australia have been arrested and charged.

Assistant Attorney General Brian A. Benczkowski of the Justice Departmentโ€™s Criminal Division, U.S. Attorney Jessie K. Liu for the District of Columbia, Chief Don Fort of IRS Criminal Investigation (IRS-CI) and Acting Executive Associate Director Alysa Erichs of U.S. Immigration and Customs Enforcement (ICE)โ€™s Homeland Security Investigations (HSI), made the announcement.

โ€œDarknet sites that profit from the sexual exploitation of children are among the most vile and reprehensible forms of criminal behavior,โ€ said Assistant Attorney General Brian A. Benczkowski of the Justice Departmentโ€™s Criminal Division. โ€œThis Administration will not allow child predators to use lawless online spaces as a shield. Todayโ€™s announcement demonstrates that the Department of Justice remains firmly committed to working closely with our partners in South Korea and around the world to rescue child victims and bring to justice the perpetrators of these abhorrent crimes.โ€

โ€œChildren around the world are safer because of the actions taken by U.S. and foreign law enforcement to prosecute this case and recover funds for victims,โ€ said U.S. Attorney Jessie K. Liu. โ€œWe will continue to pursue such criminals on and off the darknet in the United States and abroad, to ensure they receive the punishment their terrible crimes deserve.โ€

๐Ÿ‘‰๐Ÿผ Read more:
https://www.justice.gov/opa/pr/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child

๐Ÿ‘‰๐Ÿผ Read as well:
https://www.nbcnews.com/news/amp/ncna1066511

#darknet #platform #pedo #takedown #southkorea
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Kentucky is in Syria (and other anomalies of MSM geography) โ€“ #PropagandaWatch

Did you know that #Kentucky is in #Syria? Or that #Tripoli is in #India? Or that #Caracas is in #Singapore? No? Then you must not be paying enough attention in #MSM Geography 101, class. Better hit the books!

๐Ÿ“บ https://www.corbettreport.com/kentucky-is-in-syria-and-other-anomalies-of-msm-geography-propagandawatch/

#corbettreport #PropagandaWatch #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Share-Online service offline since 16 October 2019 hours

Investigations by GVU lead to concerted action against largest hosters of illegal media content in Germany - Focus on Public Prosecutor's Office and Police search residential and business premises in Germany, France and the Netherlands - GVU accompanied entire proceedings

Berlin/Cologne, 17.10.2019 It has been clear since yesterday that even filehosters are not unassailable. On Wednesday, 16 October 2019 at around 2 p.m., the Internet offering of Share-Online.biz, the largest file hosting service aimed at the German-speaking market, was shut down by cyber crimes specialists from the Cologne public prosecutor's office and the Aachen police headquarters. This unprecedented procedure was initiated by GVU, whose employees filed a criminal complaint against the operators of the service as early as 2017 and have been continuously supporting the authorities ever since. Where previously all criminal and civil law approaches of various actors seemed to run nowhere, GVU was now able to achieve a groundbreaking success for its members and the creative industries as a whole.

In Germany, residential and business premises were searched in several federal states, and further raids took place in France and a Dutch computer centre. Extensive evidence was secured. The allegation against three defendants aged 40, 48 and 54 is that they have assisted the commercial exploitation of copyrighted works in a large number of cases. At Share-Online.biz, millions of files were hosted on several hundred servers and between six and ten million visitors visited the site every month. In 2017, a single service provider commissioned by GVU sent more than eight million deletion requests to the operators of Share-online.biz as part of the GVU takedown project to have unlicensed content removed. The service appeared to be cooperative, but all content was available again shortly after the supposed deletion. The GVU was able to make the findings and data gained from the takedown project directly available to the lead public prosecutor's office in order to substantiate the accusation of aiding and abetting commercial copyright infringement. In addition, the state investigators were proactively supported by GVU staff through specific analyses and precisely documented test downloads.

๐Ÿ‘‰๐Ÿผ Read more:
https://gvu.de/gvu-bringt-share-online-biz-zu-fall/4106

๐Ÿ‘‰๐Ÿผ Read as well:
https://tarnkappe.info/goodbye-share-online-biz-razzia-in-mehreren-laendern/

#filehoster #ShareOnline #police #gvu #bust #germany #france #netherlands
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
InviZible Pro - Android application for Internet privacy and security

Protect your device from dangerous sites, get rid of annoying ads, get access to blocked resources in your country

InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the Internet. This application is designed for Android devices with Root access .

Just press a three buttons in InviZible Pro , and you turn from a simple user to an invisible one, which is very difficult to find, block, impose on you unnecessary products and services in the form of ubiquitous advertising.

๐Ÿ‘‰๐Ÿผ Read more:
https://github.com/Gedsh/InviZible

#android #app #InviZible #DNSCrypt #Tor #Purple #I2P #security #privacy #GitHub
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Mind-reading technology is everyone's next big security nightmare

While the hardware can be made as secure as possible, turning our thoughts into a digital form will put them at risk just like any other data.

Technology allowing our thoughts and feelings to be translated into a digital form โ€“ and shared โ€“ is already a reality. Brain computer interfaces (BCI) allow us to connect our minds to computers for some limited purposes, and big tech companies including Facebook and many startups want to make this technology commonplace.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.zdnet.com/article/is-mind-reading-tech-your-next-big-security-nightmare-yes-but-not-in-the-way-you-might-expect/

#MindReading #BCI #technology #security #risk #nightmare
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
A_74_48037_AdvanceUneditedVersion.docx
77.4 KB
World stumbling zombie-like into a digital welfare dystopia, warns UN human rights expert

NEW YORK (17 October 2019) โ€“ A UN human rights expert has expressed concerns about the emergence of the "digital welfare state", saying that all too often the real motives behind such programs are to slash welfare spending, set up intrusive government surveillance systems and generate profits for private corporate interests.

"As humankind moves, perhaps inexorably, towards the digital welfare future it needs to alter course significantly and rapidly to avoid stumbling zombie-like into a digital welfare dystopia,".

๐Ÿ‘‰๐Ÿผ PDF:
https://www.ohchr.org/Documents/Issues/Poverty/A_74_48037_AdvanceUneditedVersion.docx

๐Ÿ‘‰๐Ÿผ Read more:
https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=25156&LangID=E

#pdf #report #dystopia #digital #welfare #humanrights
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
The Global Expansion of AI Surveillance

A growing number of states are deploying advanced AI surveillance tools to monitor, track, and surveil citizens. Carnegieโ€™s new index explores how different countries are going about this.

Artificial intelligence (AI) technology is rapidly proliferating around the world. Startling developments keep emerging, from the onset of deepfake videos that blur the line between truth and falsehood, to advanced algorithms that can beat the best players in the world in multiplayer poker. Businesses harness AI capabilities to improve analytic processing; city officials tap AI to monitor traffic congestion and oversee smart energy metering. Yet a growing number of states are deploying advanced AI surveillance tools to monitor, track, and surveil citizens to accomplish a range of policy objectivesโ€”some lawful, others that violate human rights, and many of which fall into a murky middle ground.

๐Ÿ‘‰๐Ÿผ Read more:
https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847

๐Ÿ‘‰๐Ÿผ PDF:
https://carnegieendowment.org/files/AI_Global_Surveillance_Index1.pdf

#global #surveillance #ai #index #pdf #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Samsung: Anyone's thumbprint can unlock Galaxy S10 phone

A flaw that means any fingerprint can unlock a Galaxy S10 phone has been acknowledged by Samsung.

It promised a software patch that would fix the problem.

The issue was spotted by a British woman whose husband was able to unlock her phone with his thumbprint when it was stored in a cheap case.

When the S10 was launched, in March, Samsung described the fingerprint authentication system as "revolutionary".

Air gap

The scanner sends ultrasounds to detect 3D ridges of fingerprints in order to recognise users.

Samsung said it was "aware of the case of S10's malfunctioning fingerprint recognition and will soon issue a software patch".

South Korea's online-only KaKao Bank told customers to switch off the fingerprint-recognition option to log in to its services until the issue was fixed.

Previous reports suggested some screen protectors were incompatible with Samsung's reader because they left a small air gap that interfered with the scanning.

Thumb print

The British couple who discovered the security issue told the Sun newspaper it was a "real concern".

After buying a ยฃ2.70 gel screen protector on eBay, Lisa Neilson registered her right thumbprint and then found her left thumbprint, which was not registered, could also unlock the phone.

She then asked her husband to try and both his thumbs also unlocked it.

And when the screen protector was added to another relative's phone, the same thing happened.

https://www.bbc.com/news/technology-50080586

#phone #bug #samsung #thumbprint #unlock #galaxy #S10
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Tinder

Are you spending hours of your day swiping left and right on Tinder? Itโ€™s normal as the app was created to be addictive by activating dopamine in your brain with every swipe drawing you in further.

๐Ÿ“บ #Dopamine - #Tinder #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Facebook

Facebook is addictive. Taking advantage of our basic human instinct to socialise, the social network harvests unimaginably large amounts of personal data while never quite fulfilling our thirst for social validation.

๐Ÿ“บ #Dopamine - #Facebook #DeleteFacebook #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Candy Crush

Are you wasting hours on Candy Crush when you really should be working? Appealing to our inner sense of order, the video game that millions play on their smartphones is built to draw you in with some clever sales techniques.

๐Ÿ“บ #Dopamine - #CandyCrush #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Instagram

Is Instagram irresistible for you? The app was made that way to appeal to your basic need for social validation.

๐Ÿ“บ #Dopamine - #Instagram #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN