Darknet platform for child porn: Investigators arrest 337 users
A playground for pedophiles, perverts and criminals: this is how US justice describes a platform for child pornography that has now been excavated.
South Korean National and Hundreds of Others Charged Worldwide in the Takedown of the Largest Darknet Child Pornography Website, Which was Funded by Bitcoin
Dozens of Minor Victims Who Were Being Actively Abused by the Users of the Site Rescued
Jong Woo Son, 23, a South Korean national, was indicted by a federal grand jury in the District of Columbia for his operation of Welcome To Video, the largest child sexual exploitation market by volume of content. The nine-count indictment was unsealed today along with a parallel civil forfeiture action. Son has also been charged and convicted in South Korea and is currently in custody serving his sentence in South Korea. An additional 337 site users residing in Alabama, Arkansas, California, Connecticut, Florida, Georgia, Kansas, Louisiana, Maryland, Massachusetts, Nebraska, New Jersey, New York, North Carolina, Ohio, Oregon, Pennsylvania, Rhode Island, South Carolina, Texas, Utah, Virginia, Washington State and Washington, D.C. as well as the United Kingdom, South Korea, Germany, Saudi Arabia, the United Arab Emirates, the Czech Republic, Canada, Ireland, Spain, Brazil and Australia have been arrested and charged.
Assistant Attorney General Brian A. Benczkowski of the Justice Departmentβs Criminal Division, U.S. Attorney Jessie K. Liu for the District of Columbia, Chief Don Fort of IRS Criminal Investigation (IRS-CI) and Acting Executive Associate Director Alysa Erichs of U.S. Immigration and Customs Enforcement (ICE)βs Homeland Security Investigations (HSI), made the announcement.
βDarknet sites that profit from the sexual exploitation of children are among the most vile and reprehensible forms of criminal behavior,β said Assistant Attorney General Brian A. Benczkowski of the Justice Departmentβs Criminal Division. βThis Administration will not allow child predators to use lawless online spaces as a shield. Todayβs announcement demonstrates that the Department of Justice remains firmly committed to working closely with our partners in South Korea and around the world to rescue child victims and bring to justice the perpetrators of these abhorrent crimes.β
βChildren around the world are safer because of the actions taken by U.S. and foreign law enforcement to prosecute this case and recover funds for victims,β said U.S. Attorney Jessie K. Liu. βWe will continue to pursue such criminals on and off the darknet in the United States and abroad, to ensure they receive the punishment their terrible crimes deserve.β
ππΌ Read more:
https://www.justice.gov/opa/pr/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child
ππΌ Read as well:
https://www.nbcnews.com/news/amp/ncna1066511
#darknet #platform #pedo #takedown #southkorea
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
A playground for pedophiles, perverts and criminals: this is how US justice describes a platform for child pornography that has now been excavated.
South Korean National and Hundreds of Others Charged Worldwide in the Takedown of the Largest Darknet Child Pornography Website, Which was Funded by Bitcoin
Dozens of Minor Victims Who Were Being Actively Abused by the Users of the Site Rescued
Jong Woo Son, 23, a South Korean national, was indicted by a federal grand jury in the District of Columbia for his operation of Welcome To Video, the largest child sexual exploitation market by volume of content. The nine-count indictment was unsealed today along with a parallel civil forfeiture action. Son has also been charged and convicted in South Korea and is currently in custody serving his sentence in South Korea. An additional 337 site users residing in Alabama, Arkansas, California, Connecticut, Florida, Georgia, Kansas, Louisiana, Maryland, Massachusetts, Nebraska, New Jersey, New York, North Carolina, Ohio, Oregon, Pennsylvania, Rhode Island, South Carolina, Texas, Utah, Virginia, Washington State and Washington, D.C. as well as the United Kingdom, South Korea, Germany, Saudi Arabia, the United Arab Emirates, the Czech Republic, Canada, Ireland, Spain, Brazil and Australia have been arrested and charged.
Assistant Attorney General Brian A. Benczkowski of the Justice Departmentβs Criminal Division, U.S. Attorney Jessie K. Liu for the District of Columbia, Chief Don Fort of IRS Criminal Investigation (IRS-CI) and Acting Executive Associate Director Alysa Erichs of U.S. Immigration and Customs Enforcement (ICE)βs Homeland Security Investigations (HSI), made the announcement.
βDarknet sites that profit from the sexual exploitation of children are among the most vile and reprehensible forms of criminal behavior,β said Assistant Attorney General Brian A. Benczkowski of the Justice Departmentβs Criminal Division. βThis Administration will not allow child predators to use lawless online spaces as a shield. Todayβs announcement demonstrates that the Department of Justice remains firmly committed to working closely with our partners in South Korea and around the world to rescue child victims and bring to justice the perpetrators of these abhorrent crimes.β
βChildren around the world are safer because of the actions taken by U.S. and foreign law enforcement to prosecute this case and recover funds for victims,β said U.S. Attorney Jessie K. Liu. βWe will continue to pursue such criminals on and off the darknet in the United States and abroad, to ensure they receive the punishment their terrible crimes deserve.β
ππΌ Read more:
https://www.justice.gov/opa/pr/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child
ππΌ Read as well:
https://www.nbcnews.com/news/amp/ncna1066511
#darknet #platform #pedo #takedown #southkorea
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Kentucky is in Syria (and other anomalies of MSM geography) β #PropagandaWatch
Did you know that #Kentucky is in #Syria? Or that #Tripoli is in #India? Or that #Caracas is in #Singapore? No? Then you must not be paying enough attention in #MSM Geography 101, class. Better hit the books!
πΊ https://www.corbettreport.com/kentucky-is-in-syria-and-other-anomalies-of-msm-geography-propagandawatch/
#corbettreport #PropagandaWatch #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Did you know that #Kentucky is in #Syria? Or that #Tripoli is in #India? Or that #Caracas is in #Singapore? No? Then you must not be paying enough attention in #MSM Geography 101, class. Better hit the books!
πΊ https://www.corbettreport.com/kentucky-is-in-syria-and-other-anomalies-of-msm-geography-propagandawatch/
#corbettreport #PropagandaWatch #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Share-Online service offline since 16 October 2019 hours
Investigations by GVU lead to concerted action against largest hosters of illegal media content in Germany - Focus on Public Prosecutor's Office and Police search residential and business premises in Germany, France and the Netherlands - GVU accompanied entire proceedings
Berlin/Cologne, 17.10.2019 It has been clear since yesterday that even filehosters are not unassailable. On Wednesday, 16 October 2019 at around 2 p.m., the Internet offering of Share-Online.biz, the largest file hosting service aimed at the German-speaking market, was shut down by cyber crimes specialists from the Cologne public prosecutor's office and the Aachen police headquarters. This unprecedented procedure was initiated by GVU, whose employees filed a criminal complaint against the operators of the service as early as 2017 and have been continuously supporting the authorities ever since. Where previously all criminal and civil law approaches of various actors seemed to run nowhere, GVU was now able to achieve a groundbreaking success for its members and the creative industries as a whole.
In Germany, residential and business premises were searched in several federal states, and further raids took place in France and a Dutch computer centre. Extensive evidence was secured. The allegation against three defendants aged 40, 48 and 54 is that they have assisted the commercial exploitation of copyrighted works in a large number of cases. At Share-Online.biz, millions of files were hosted on several hundred servers and between six and ten million visitors visited the site every month. In 2017, a single service provider commissioned by GVU sent more than eight million deletion requests to the operators of Share-online.biz as part of the GVU takedown project to have unlicensed content removed. The service appeared to be cooperative, but all content was available again shortly after the supposed deletion. The GVU was able to make the findings and data gained from the takedown project directly available to the lead public prosecutor's office in order to substantiate the accusation of aiding and abetting commercial copyright infringement. In addition, the state investigators were proactively supported by GVU staff through specific analyses and precisely documented test downloads.
ππΌ Read more:
https://gvu.de/gvu-bringt-share-online-biz-zu-fall/4106
ππΌ Read as well:
https://tarnkappe.info/goodbye-share-online-biz-razzia-in-mehreren-laendern/
#filehoster #ShareOnline #police #gvu #bust #germany #france #netherlands
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Investigations by GVU lead to concerted action against largest hosters of illegal media content in Germany - Focus on Public Prosecutor's Office and Police search residential and business premises in Germany, France and the Netherlands - GVU accompanied entire proceedings
Berlin/Cologne, 17.10.2019 It has been clear since yesterday that even filehosters are not unassailable. On Wednesday, 16 October 2019 at around 2 p.m., the Internet offering of Share-Online.biz, the largest file hosting service aimed at the German-speaking market, was shut down by cyber crimes specialists from the Cologne public prosecutor's office and the Aachen police headquarters. This unprecedented procedure was initiated by GVU, whose employees filed a criminal complaint against the operators of the service as early as 2017 and have been continuously supporting the authorities ever since. Where previously all criminal and civil law approaches of various actors seemed to run nowhere, GVU was now able to achieve a groundbreaking success for its members and the creative industries as a whole.
In Germany, residential and business premises were searched in several federal states, and further raids took place in France and a Dutch computer centre. Extensive evidence was secured. The allegation against three defendants aged 40, 48 and 54 is that they have assisted the commercial exploitation of copyrighted works in a large number of cases. At Share-Online.biz, millions of files were hosted on several hundred servers and between six and ten million visitors visited the site every month. In 2017, a single service provider commissioned by GVU sent more than eight million deletion requests to the operators of Share-online.biz as part of the GVU takedown project to have unlicensed content removed. The service appeared to be cooperative, but all content was available again shortly after the supposed deletion. The GVU was able to make the findings and data gained from the takedown project directly available to the lead public prosecutor's office in order to substantiate the accusation of aiding and abetting commercial copyright infringement. In addition, the state investigators were proactively supported by GVU staff through specific analyses and precisely documented test downloads.
ππΌ Read more:
https://gvu.de/gvu-bringt-share-online-biz-zu-fall/4106
ππΌ Read as well:
https://tarnkappe.info/goodbye-share-online-biz-razzia-in-mehreren-laendern/
#filehoster #ShareOnline #police #gvu #bust #germany #france #netherlands
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
InviZible Pro - Android application for Internet privacy and security
Protect your device from dangerous sites, get rid of annoying ads, get access to blocked resources in your country
InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the Internet. This application is designed for Android devices with Root access .
Just press a three buttons in InviZible Pro , and you turn from a simple user to an invisible one, which is very difficult to find, block, impose on you unnecessary products and services in the form of ubiquitous advertising.
ππΌ Read more:
https://github.com/Gedsh/InviZible
#android #app #InviZible #DNSCrypt #Tor #Purple #I2P #security #privacy #GitHub
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Protect your device from dangerous sites, get rid of annoying ads, get access to blocked resources in your country
InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the Internet. This application is designed for Android devices with Root access .
Just press a three buttons in InviZible Pro , and you turn from a simple user to an invisible one, which is very difficult to find, block, impose on you unnecessary products and services in the form of ubiquitous advertising.
ππΌ Read more:
https://github.com/Gedsh/InviZible
#android #app #InviZible #DNSCrypt #Tor #Purple #I2P #security #privacy #GitHub
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Mind-reading technology is everyone's next big security nightmare
While the hardware can be made as secure as possible, turning our thoughts into a digital form will put them at risk just like any other data.
Technology allowing our thoughts and feelings to be translated into a digital form β and shared β is already a reality. Brain computer interfaces (BCI) allow us to connect our minds to computers for some limited purposes, and big tech companies including Facebook and many startups want to make this technology commonplace.
ππΌ Read more:
https://www.zdnet.com/article/is-mind-reading-tech-your-next-big-security-nightmare-yes-but-not-in-the-way-you-might-expect/
#MindReading #BCI #technology #security #risk #nightmare
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
While the hardware can be made as secure as possible, turning our thoughts into a digital form will put them at risk just like any other data.
Technology allowing our thoughts and feelings to be translated into a digital form β and shared β is already a reality. Brain computer interfaces (BCI) allow us to connect our minds to computers for some limited purposes, and big tech companies including Facebook and many startups want to make this technology commonplace.
ππΌ Read more:
https://www.zdnet.com/article/is-mind-reading-tech-your-next-big-security-nightmare-yes-but-not-in-the-way-you-might-expect/
#MindReading #BCI #technology #security #risk #nightmare
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
A_74_48037_AdvanceUneditedVersion.docx
77.4 KB
World stumbling zombie-like into a digital welfare dystopia, warns UN human rights expert
NEW YORK (17 October 2019) β A UN human rights expert has expressed concerns about the emergence of the "digital welfare state", saying that all too often the real motives behind such programs are to slash welfare spending, set up intrusive government surveillance systems and generate profits for private corporate interests.
"As humankind moves, perhaps inexorably, towards the digital welfare future it needs to alter course significantly and rapidly to avoid stumbling zombie-like into a digital welfare dystopia,".
ππΌ PDF:
https://www.ohchr.org/Documents/Issues/Poverty/A_74_48037_AdvanceUneditedVersion.docx
ππΌ Read more:
https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=25156&LangID=E
#pdf #report #dystopia #digital #welfare #humanrights
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
NEW YORK (17 October 2019) β A UN human rights expert has expressed concerns about the emergence of the "digital welfare state", saying that all too often the real motives behind such programs are to slash welfare spending, set up intrusive government surveillance systems and generate profits for private corporate interests.
"As humankind moves, perhaps inexorably, towards the digital welfare future it needs to alter course significantly and rapidly to avoid stumbling zombie-like into a digital welfare dystopia,".
ππΌ PDF:
https://www.ohchr.org/Documents/Issues/Poverty/A_74_48037_AdvanceUneditedVersion.docx
ππΌ Read more:
https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=25156&LangID=E
#pdf #report #dystopia #digital #welfare #humanrights
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
The Global Expansion of AI Surveillance
A growing number of states are deploying advanced AI surveillance tools to monitor, track, and surveil citizens. Carnegieβs new index explores how different countries are going about this.
Artificial intelligence (AI) technology is rapidly proliferating around the world. Startling developments keep emerging, from the onset of deepfake videos that blur the line between truth and falsehood, to advanced algorithms that can beat the best players in the world in multiplayer poker. Businesses harness AI capabilities to improve analytic processing; city officials tap AI to monitor traffic congestion and oversee smart energy metering. Yet a growing number of states are deploying advanced AI surveillance tools to monitor, track, and surveil citizens to accomplish a range of policy objectivesβsome lawful, others that violate human rights, and many of which fall into a murky middle ground.
ππΌ Read more:
https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847
ππΌ PDF:
https://carnegieendowment.org/files/AI_Global_Surveillance_Index1.pdf
#global #surveillance #ai #index #pdf #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
A growing number of states are deploying advanced AI surveillance tools to monitor, track, and surveil citizens. Carnegieβs new index explores how different countries are going about this.
Artificial intelligence (AI) technology is rapidly proliferating around the world. Startling developments keep emerging, from the onset of deepfake videos that blur the line between truth and falsehood, to advanced algorithms that can beat the best players in the world in multiplayer poker. Businesses harness AI capabilities to improve analytic processing; city officials tap AI to monitor traffic congestion and oversee smart energy metering. Yet a growing number of states are deploying advanced AI surveillance tools to monitor, track, and surveil citizens to accomplish a range of policy objectivesβsome lawful, others that violate human rights, and many of which fall into a murky middle ground.
ππΌ Read more:
https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847
ππΌ PDF:
https://carnegieendowment.org/files/AI_Global_Surveillance_Index1.pdf
#global #surveillance #ai #index #pdf #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Samsung: Anyone's thumbprint can unlock Galaxy S10 phone
A flaw that means any fingerprint can unlock a Galaxy S10 phone has been acknowledged by Samsung.
It promised a software patch that would fix the problem.
The issue was spotted by a British woman whose husband was able to unlock her phone with his thumbprint when it was stored in a cheap case.
When the S10 was launched, in March, Samsung described the fingerprint authentication system as "revolutionary".
Air gap
The scanner sends ultrasounds to detect 3D ridges of fingerprints in order to recognise users.
Samsung said it was "aware of the case of S10's malfunctioning fingerprint recognition and will soon issue a software patch".
South Korea's online-only KaKao Bank told customers to switch off the fingerprint-recognition option to log in to its services until the issue was fixed.
Previous reports suggested some screen protectors were incompatible with Samsung's reader because they left a small air gap that interfered with the scanning.
Thumb print
The British couple who discovered the security issue told the Sun newspaper it was a "real concern".
After buying a Β£2.70 gel screen protector on eBay, Lisa Neilson registered her right thumbprint and then found her left thumbprint, which was not registered, could also unlock the phone.
She then asked her husband to try and both his thumbs also unlocked it.
And when the screen protector was added to another relative's phone, the same thing happened.
https://www.bbc.com/news/technology-50080586
#phone #bug #samsung #thumbprint #unlock #galaxy #S10
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
A flaw that means any fingerprint can unlock a Galaxy S10 phone has been acknowledged by Samsung.
It promised a software patch that would fix the problem.
The issue was spotted by a British woman whose husband was able to unlock her phone with his thumbprint when it was stored in a cheap case.
When the S10 was launched, in March, Samsung described the fingerprint authentication system as "revolutionary".
Air gap
The scanner sends ultrasounds to detect 3D ridges of fingerprints in order to recognise users.
Samsung said it was "aware of the case of S10's malfunctioning fingerprint recognition and will soon issue a software patch".
South Korea's online-only KaKao Bank told customers to switch off the fingerprint-recognition option to log in to its services until the issue was fixed.
Previous reports suggested some screen protectors were incompatible with Samsung's reader because they left a small air gap that interfered with the scanning.
Thumb print
The British couple who discovered the security issue told the Sun newspaper it was a "real concern".
After buying a Β£2.70 gel screen protector on eBay, Lisa Neilson registered her right thumbprint and then found her left thumbprint, which was not registered, could also unlock the phone.
She then asked her husband to try and both his thumbs also unlocked it.
And when the screen protector was added to another relative's phone, the same thing happened.
https://www.bbc.com/news/technology-50080586
#phone #bug #samsung #thumbprint #unlock #galaxy #S10
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Tinder
Are you spending hours of your day swiping left and right on Tinder? Itβs normal as the app was created to be addictive by activating dopamine in your brain with every swipe drawing you in further.
πΊ #Dopamine - #Tinder #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Are you spending hours of your day swiping left and right on Tinder? Itβs normal as the app was created to be addictive by activating dopamine in your brain with every swipe drawing you in further.
πΊ #Dopamine - #Tinder #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Facebook
Facebook is addictive. Taking advantage of our basic human instinct to socialise, the social network harvests unimaginably large amounts of personal data while never quite fulfilling our thirst for social validation.
πΊ #Dopamine - #Facebook #DeleteFacebook #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Facebook is addictive. Taking advantage of our basic human instinct to socialise, the social network harvests unimaginably large amounts of personal data while never quite fulfilling our thirst for social validation.
πΊ #Dopamine - #Facebook #DeleteFacebook #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Candy Crush
Are you wasting hours on Candy Crush when you really should be working? Appealing to our inner sense of order, the video game that millions play on their smartphones is built to draw you in with some clever sales techniques.
πΊ #Dopamine - #CandyCrush #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Are you wasting hours on Candy Crush when you really should be working? Appealing to our inner sense of order, the video game that millions play on their smartphones is built to draw you in with some clever sales techniques.
πΊ #Dopamine - #CandyCrush #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Instagram
Is Instagram irresistible for you? The app was made that way to appeal to your basic need for social validation.
πΊ #Dopamine - #Instagram #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Is Instagram irresistible for you? The app was made that way to appeal to your basic need for social validation.
πΊ #Dopamine - #Instagram #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - YouTube
With sophisticated algorithms using deep learning, Youtube offers users irresistible video recommendations that become ever more sensationalist or even conspiratorial.
πΊ #Dopamine - #YouTube #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
With sophisticated algorithms using deep learning, Youtube offers users irresistible video recommendations that become ever more sensationalist or even conspiratorial.
πΊ #Dopamine - #YouTube #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Snapchat
Snapchat is so much fun you canβt stop yourself from getting addicted. Using the universal concept of giving and receiving gifts to keep us interacting, the messaging app gnaws its way into our lives.
πΊ #Dopamine - #Snapchat #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Snapchat is so much fun you canβt stop yourself from getting addicted. Using the universal concept of giving and receiving gifts to keep us interacting, the messaging app gnaws its way into our lives.
πΊ #Dopamine - #Snapchat #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Uber
Youβve made a decision to become an Uber driver hoping to make some money and be your own boss. But with Uber's clever use of nudge theory, the reality isnβt quite what you hoped for.
πΊ #Dopamine - #Uber #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Youβve made a decision to become an Uber driver hoping to make some money and be your own boss. But with Uber's clever use of nudge theory, the reality isnβt quite what you hoped for.
πΊ #Dopamine - #Uber #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Twitter
Do you constantly check twitter on your smartphone for the latest tweets? Preying on our fear of missing out (fomo), Twitter has harnessed our natural anxiety to makeβ¦. a lot of money.
πΊ #Dopamine - #Twitter #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Do you constantly check twitter on your smartphone for the latest tweets? Preying on our fear of missing out (fomo), Twitter has harnessed our natural anxiety to makeβ¦. a lot of money.
πΊ #Dopamine - #Twitter #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
"Dopamine": Miniseries about the addiction mechanisms of Tinder, Facebook and Co.
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
πΊ Dopamine - Tinder
πΊ Dopamine - Facebook
πΊ Dopamine - Candy Crush
πΊ Dopamine - Instagram
πΊ Dopamine - YouTube
πΊ Dopamine - Snapchat
πΊ Dopamine - Uber
πΊ Dopamine - Twitter
π‘ Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?
#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
πΊ Dopamine - Tinder
πΊ Dopamine - Facebook
πΊ Dopamine - Candy Crush
πΊ Dopamine - Instagram
πΊ Dopamine - YouTube
πΊ Dopamine - Snapchat
πΊ Dopamine - Uber
πΊ Dopamine - Twitter
π‘ Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?
#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
APT41 compromised company behind TeamViewer - which enabled them to access *any* system with TeamViewer installed ππ
https://nitter.net/cglyer/status/1182413194360508419
#APT41 #TeamViewer #hacked #breach #alert #warning
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
https://nitter.net/cglyer/status/1182413194360508419
#APT41 #TeamViewer #hacked #breach #alert #warning
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Google chief: I'd disclose smart speakers before guests enter my home
It's an admission that appears to have caught Google's devices chief by surprise.
After being challenged as to whether homeowners should tell guests smart devices - such as a Google Nest speaker or Amazon Echo display - are in use before they enter the building, he concludes that the answer is indeed yes.
"Gosh, I haven't thought about this before in quite this way," Rick Osterloh begins.
"It's quite important for all these technologies to think about all users... we have to consider all stakeholders that might be in proximity."
And then he commits.
"Does the owner of a home need to disclose to a guest? I would and do when someone enters into my home, and it's probably something that the products themselves should try to indicate."
To be fair to Google, it hasn't completely ignored matters of 21st Century privacy etiquette until now.
As Mr Osterloh points out, its Nest cameras shine an LED light when they are in record mode, which cannot be overridden.
But the idea of having to run around a home unplugging or at least restricting the capabilities of all its voice- and camera-equipped kit if a visitor objects is quite the ask.
ππΌ Read more:
https://www.bbc.com/news/technology-50048144
#DeleteGoogle #smart #speakers #privacy
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
It's an admission that appears to have caught Google's devices chief by surprise.
After being challenged as to whether homeowners should tell guests smart devices - such as a Google Nest speaker or Amazon Echo display - are in use before they enter the building, he concludes that the answer is indeed yes.
"Gosh, I haven't thought about this before in quite this way," Rick Osterloh begins.
"It's quite important for all these technologies to think about all users... we have to consider all stakeholders that might be in proximity."
And then he commits.
"Does the owner of a home need to disclose to a guest? I would and do when someone enters into my home, and it's probably something that the products themselves should try to indicate."
To be fair to Google, it hasn't completely ignored matters of 21st Century privacy etiquette until now.
As Mr Osterloh points out, its Nest cameras shine an LED light when they are in record mode, which cannot be overridden.
But the idea of having to run around a home unplugging or at least restricting the capabilities of all its voice- and camera-equipped kit if a visitor objects is quite the ask.
ππΌ Read more:
https://www.bbc.com/news/technology-50048144
#DeleteGoogle #smart #speakers #privacy
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping
Smart Spies Hack 1: Requesting the userβs password through a simple backend change
It is possible to ask for sensitive data such as the userβs password from any voice app. To create a password phishing Skill/Action, a hacker could follow the following steps:
πΊ https://srlabs.de/bites/smart-spies/
#SmartSpies #alexa #google #vishing #eavesdropping #PoC #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Smart Spies Hack 1: Requesting the userβs password through a simple backend change
It is possible to ask for sensitive data such as the userβs password from any voice app. To create a password phishing Skill/Action, a hacker could follow the following steps:
πΊ https://srlabs.de/bites/smart-spies/
#SmartSpies #alexa #google #vishing #eavesdropping #PoC #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping
Smart Spies Hack 2: Faking the stop Intent allows eavesdropping on users
We were able to listen in on conversations after a user believes to have stopped our voice app. To accomplish this, we use a slightly different strategy for each of the voice speaker platforms.
πΊ https://srlabs.de/bites/smart-spies/
#SmartSpies #alexa #google #vishing #eavesdropping #PoC #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Smart Spies Hack 2: Faking the stop Intent allows eavesdropping on users
We were able to listen in on conversations after a user believes to have stopped our voice app. To accomplish this, we use a slightly different strategy for each of the voice speaker platforms.
πΊ https://srlabs.de/bites/smart-spies/
#SmartSpies #alexa #google #vishing #eavesdropping #PoC #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN