BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Media is too big
VIEW IN TELEGRAM
Dopamine - YouTube

With sophisticated algorithms using deep learning, Youtube offers users irresistible video recommendations that become ever more sensationalist or even conspiratorial.

๐Ÿ“บ #Dopamine - #YouTube #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Snapchat

Snapchat is so much fun you canโ€™t stop yourself from getting addicted. Using the universal concept of giving and receiving gifts to keep us interacting, the messaging app gnaws its way into our lives.

๐Ÿ“บ #Dopamine - #Snapchat #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Uber

Youโ€™ve made a decision to become an Uber driver hoping to make some money and be your own boss. But with Uber's clever use of nudge theory, the reality isnโ€™t quite what you hoped for.

๐Ÿ“บ #Dopamine - #Uber #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dopamine - Twitter

Do you constantly check twitter on your smartphone for the latest tweets? Preying on our fear of missing out (fomo), Twitter has harnessed our natural anxiety to makeโ€ฆ. a lot of money.

๐Ÿ“บ #Dopamine - #Twitter #video #thinkabout

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
"Dopamine": Miniseries about the addiction mechanisms of Tinder, Facebook and Co.

"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged

๐Ÿ“บ Dopamine - Tinder

๐Ÿ“บ Dopamine - Facebook

๐Ÿ“บ Dopamine - Candy Crush

๐Ÿ“บ Dopamine - Instagram

๐Ÿ“บ Dopamine - YouTube

๐Ÿ“บ Dopamine - Snapchat

๐Ÿ“บ Dopamine - Uber

๐Ÿ“บ Dopamine - Twitter

๐Ÿ’ก Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?

#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
APT41 compromised company behind TeamViewer - which enabled them to access *any* system with TeamViewer installed ๐Ÿ‘€๐Ÿ‘€

https://nitter.net/cglyer/status/1182413194360508419

#APT41 #TeamViewer #hacked #breach #alert #warning
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Google chief: I'd disclose smart speakers before guests enter my home

It's an admission that appears to have caught Google's devices chief by surprise.

After being challenged as to whether homeowners should tell guests smart devices - such as a Google Nest speaker or Amazon Echo display - are in use before they enter the building, he concludes that the answer is indeed yes.

"Gosh, I haven't thought about this before in quite this way," Rick Osterloh begins.

"It's quite important for all these technologies to think about all users... we have to consider all stakeholders that might be in proximity."

And then he commits.

"Does the owner of a home need to disclose to a guest? I would and do when someone enters into my home, and it's probably something that the products themselves should try to indicate."

To be fair to Google, it hasn't completely ignored matters of 21st Century privacy etiquette until now.

As Mr Osterloh points out, its Nest cameras shine an LED light when they are in record mode, which cannot be overridden.

But the idea of having to run around a home unplugging or at least restricting the capabilities of all its voice- and camera-equipped kit if a visitor objects is quite the ask.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.bbc.com/news/technology-50048144

#DeleteGoogle #smart #speakers #privacy
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping

Smart Spies Hack 1:
Requesting the userโ€™s password through a simple backend change
It is possible to ask for sensitive data such as the userโ€™s password from any voice app. To create a password phishing Skill/Action, a hacker could follow the following steps:

๐Ÿ“บ https://srlabs.de/bites/smart-spies/

#SmartSpies #alexa #google #vishing #eavesdropping #PoC #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping

Smart Spies Hack 2:
Faking the stop Intent allows eavesdropping on users
We were able to listen in on conversations after a user believes to have stopped our voice app. To accomplish this, we use a slightly different strategy for each of the voice speaker platforms.

๐Ÿ“บ https://srlabs.de/bites/smart-spies/

#SmartSpies #alexa #google #vishing #eavesdropping #PoC #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
NordVPN has been hacked

The VPN provider NordVPN apparently had an incident some time ago in which an attacker had access to the servers and private keys. Three private keys appeared on the network, one of which belonged to an expired HTTPS certificate.

Several cryptographic keys and information about NordVPN configuration files have appeared in a leak. One of the keys matches an older NordVPN website certificate. The vendor has not yet commented on the incident.

The leak appeared in an online discussion. In a now deleted tweet NordVPN wrote: "Nobody can steal your online life (if you use a VPN)". In response, someone sent a link to a text file containing evidence of a VPN provider hack.

https://share.dmca.gripe/hZYMaB8oF96FvArZ.txt

https://mobile.twitter.com/NordVPN/status/1185979592374398976

๐Ÿ‘‰๐Ÿผ More info (german):
https://www.golem.de/news/leak-nordvpn-wurde-gehackt-1910-144528.html

#leak #NordVPN #hack #hacker #hacked
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
RapidVideo Shuts Down Following Legal Pressure from Warner Bros and Netflix

RapidVideo, a popular file-hosting service with millions of users, has thrown in the towel. The site faces legal pressure from lawyers representing the MPA and ACE, including a lawsuit from Warner Bros. and Netflix. Paired with dwindling revenues and a worsening legal climate, maintaining the site is no longer viable, according to the operator.

RapidVideo is a popular file-hosting service that specializes in hosting videos.
Similar to other file-hosting services, it can be used for good and bad. The bad, in this case, is people uploading pirated videos.

Whether the siteโ€™s operators want it or not, thatโ€™s what many of RapidVideoโ€™s users are indeed doing. Two weeks ago this resulted in yet another scathing report from movie industry group MPA, which branded the site as a โ€œnotoriousโ€ piracy haven.

Behind the scenes, the websiteโ€™s operator faces mounting pressure as well. RapidVideo has been targeted by lawyers from the MPA and ACE, two of the most powerful anti-piracy forces, which are demanding far-reaching copyright enforcement measures from the site.

To back up their pressure, two MPA/ACE members, Warner Bros. Entertainment and Netflix, filed a lawsuit in Germany to stop the alleged copyright infringements the site enables. While this case remains ongoing, the siteโ€™s operator decided not to await the verdict and has shut the site down effective immediately.

The millions of users who regularly visit the site currently see nothing more than a 404 error.

๐Ÿ‘‰๐Ÿผ Read more:
https://torrentfreak.com/rapidvideo-shuts-down-following-legal-pressure-from-warner-bros-and-netflix-191021/

#RapidVideo #legalpressure #WarnerBros #Netflix
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
BlackBox (Security) Archiv
NordVPN has been hacked The VPN provider NordVPN apparently had an incident some time ago in which an attacker had access to the servers and private keys. Three private keys appeared on the network, one of which belonged to an expired HTTPS certificate. โ€ฆ
Apparently other VPN providers were also compromised:

Itโ€™s also believed several other VPN providers may have been breached around the same time. Similar records posted online โ€” and seen by TechCrunch โ€” suggest that TorGuard and VikingVPN may have also been compromised, but spokespeople did not return a request for comment.

https://mobile.twitter.com/hexdefined/status/1186106695073726466

https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/

๐Ÿ‘‰๐Ÿผ NordVPN has been hacked:
https://t.iss.one/BlackBox_Archiv/677

#leak #NordVPN #TorGuard #VikingVPN #hack #hacker #hacked
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Avast, NordVPN Breaches Tied to Phantom User Accounts

Antivirus and security giant Avast and virtual private networking (VPN) software provider NordVPN each today disclosed months-long network intrusions that โ€” while otherwise unrelated โ€” shared a common cause: Forgotten or unknown user accounts that granted remote access to internal systems with little more than a password.

Based in the Czech Republic, Avast bills itself as the most popular antivirus vendor on the market, with over 435 million users. In a blog post today, Avast said it detected and addressed a breach lasting between May and October 2019 that appeared to target users of its CCleaner application, a popular Microsoft Windows cleanup and repair utility. https://blog.avast.com/ccleaner-fights-off-cyberespionage-attempt-abiss

Avast said it took CCleaner downloads offline in September to check the integrity of the code and ensure it hadnโ€™t been injected with malware. The company also said it invalidated the certificates used to sign previous versions of the software and pushed out a re-signed clean update of the product via automatic update on October 15. It then disabled and reset all internal user credentials.

โ€œHaving taken all these precautions, we are confident to say that our CCleaner users are protected and unaffected,โ€ Avastโ€™s Jaya Baloo wrote.

This is not the first so-called โ€œsupply chainโ€ attack on Avast: In September 2018, researchers at Cisco Talos and Morphisec disclosed that hackers had compromised the computer cleanup tool for more than a month, leading to some 2.27 million downloads of the corrupt CCleaner version.

Avast said the intrusion began when attackers used stolen credentials for a VPN service that was configured to connect to its internal network, and that the attackers were not challenged with any sort of multi-factor authentication โ€” such as a one-time code generated by a mobile app.

โ€œWe found that the internal network was successfully accessed with compromised credentials through a temporary VPN profile that had erroneously been kept enabled and did not require 2FA,โ€ Baloo wrote.

๐Ÿ‘‰๐Ÿผ Read more:
https://krebsonsecurity.com/2019/10/avast-nordvpn-breaches-tied-to-phantom-user-accounts/#more-49296

#leak #breach #NordVPN #Avast #CCleaner #TorGuard #VikingVPN #hack #hacker #hacked
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Episode 365 - Lies, Damned Lies, and Government Nutrition Advice
The Corbett Report
Lies, Damned Lies, and Government Nutrition Advice

#Nutrition #science is almost always a hot, steaming pile of contradictory nonsense. How much worse, then, that our eating habits and dietary #guidelines are shaped by the #government (and its corporate string-pullers)? Join James for this extra tasty, sugar-free, all organic, non-GMO edition of The #CorbettReport.

๐Ÿ“ป Episode 365 - #corbettreport #podcast
https://www.corbettreport.com/nutrition/

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
30+ civil rights organizations call on elected officials to stop Amazonโ€™s doorbell surveillance partnerships with police

Today, 30+ civil rights organizations signed an open letter sounding the alarm about Amazonโ€™s spreading Ring doorbell partnerships with police. The letter calls on local, state, and federal officials to use their power to investigate Amazon Ringโ€™s business practices, put an end to Amazon-police partnerships, and pass oversight measures to deter such partnerships in the future.

With no oversight and accountability, these partnerships pose a threat to privacy, civil liberties, and democracy. A few of the concerns highlighted by the organizations:

โ“ In the absence of clear civil liberties and rights-protective policies to govern the technologies and the use of surveillance footage, once collected, stored footage can be used by law enforcement to conduct facial recognition searches, target protesters exercising their First Amendment rights, teenagers for minor drug possession, or shared with other agencies like ICE or the FBI.

โ“ Ring technology gives Amazon employees and contractors in the US and Ukraine direct access to customersโ€™ live camera feeds, a literal eye inside their homes and areas surrounding their homes. These live feeds provide surveillance on millions of American familiesโ€“โ€“from a baby in their crib to someone walking their dog to a neighbor playing with young children in their yardโ€“โ€“and other bystanders that donโ€™t know they are being filmed and havenโ€™t given their consent.

โ“ Amazon has not been transparent about plans to integrate facial recognition into Ring cameras. The Information reported Ringโ€™s Ukraine-based research team accessed customerโ€™s surveillance footage to train image recognition software. As facial recognition software has been shown to disproportionately misidentify people of color, women and transgender people, it further compounds existing civil liberties concerns and expands suspected criminality centered in racial profiling and gender bias.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.fightforthefuture.org/news/2019-10-08-new-30-civil-rights-organizations-call-on/

#amazon #DeleteAmazon #ring #surveillance #partnership #police #why #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Ransomware Hits B2B Payments Firm Billtrust

Business-to-business payments provider Billtrust is still recovering from a ransomware attack that began last week. The company said it is in the final stages of bringing all of its systems back online from backups.

With more than 550 employees, Lawrence Township, N.J.-based Billtrust is a cloud-based service that lets customers view invoices, pay, or request bills via email or fax. In an email sent to customers today, Billtrust said it was consulting with law enforcement officials and with an outside security firm to determine the extent of the breach.

โ€œOur standard security and back-up procedures have been and remain instrumental in our ability to execute the ongoing restoration of services,โ€ the email reads. โ€œOut of an abundance of caution, we cannot disclose the precise ransomware strains but will do so as soon as prudently possible.

In an interview with KrebsOnSecurity on Monday evening, Billtrust CEO Steven Pinado said the company became aware of a malware intrusion on Thursday, Oct. 17.

โ€œWeโ€™re aware of the malware and have been able to stop the activity within our systems,โ€ Pinado said. โ€œWe immediately started focusing on control, remediation and protection. The impact of that was several systems were no longer available to our customers. Weโ€™ve been fighting the fight, working on restoring services and also digging into the root cause.โ€

A report from BleepingComputer cites an unnamed source saying the ransomware strain that hit Billtrust was the BitPaymer ransomware, but that information could not be confirmed.

One of Billtrustโ€™s customers has published a day-by-day chronology of the attack and communications from the company here (h/t @gossithedog).

Pinado said Billtrust had restored most of its systems, and that it was in the process now of putting additional security measures in place. He declined to discuss anything related to the ransomware attack, such as whether the company paid a ransom demand in exchange for a key to unlock files scrambled by the malware, although he allowed Billtrust does have cybersecurity insurance for just such occasions.

๐Ÿ‘‰๐Ÿผ Read more:
https://krebsonsecurity.com/2019/10/ransomware-hits-b2b-payments-firm-billtrust/

#ransomware #B2B #billtrust
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
How Autocracy Comes to America: Big Tech and National Security

Today Iโ€™m going to write about a very dangerous theme floating around in military and big tech circles, which is that big American tech monopolies are good for national security and should be weaponized and controlled explicitly by the American national security apparatus.

The relationship between corporate power and global geopolitics frames the historical debate over antitrust, as I discuss in Goliath: The Hundred Year War Between Monopoly Power and Democracy. (Buy it. Yeah, Iโ€™m not going to be subtle.) The argument has been with us since before World War One, and is with us today. Last week, for instance, Mark Zuckerberg gave a speech on free expression, and yesterday he testified to the House Financial Services Committee on the need for Libra. Both times he implied that Facebook was essential to protect us from China.

What is interesting is how certain parts of the national security world may not be so averse to how Zuckerberg thinks, even if they donโ€™t trust him specifically.

And so it is back to that debate we must go.

Incidentally, I was on CNBC yesterday to talk about Zuckerberg, and explain why I think Libra isnโ€™t going to happen and is a โ€œcrazy idea.โ€

National Security Is the Last Resort of Monopoly Scoundrels

In his speech last week and in his testimony yesterday, Mark Zuckerberg put a choice to policymakers. Pick between Facebookโ€™s domination, or Chinaโ€™s. โ€œWhile we debate these issues,โ€ he said, โ€œthe rest of the world isnโ€™t waiting.โ€ He explained this was particularly the case with his new currency Libra. โ€œChina is moving quicklyโ€ on its digital currency, and while Libra could โ€œextend Americaโ€™s financial leadership as well as our democratic values and oversight around the world,โ€ that would only be the case if regulators allowed such innovation. The threat of Chinese dominance was implied.

๐Ÿ‘‰๐Ÿผ Read more:
https://mattstoller.substack.com/p/how-autocracy-comes-to-america-big

#BigTech #USA #military #weaponized #Zuckerberg #security #China #threat #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
Interview with the developer of the Aurora App Store

The Aurora App Store is a good example of how you can do without Google. The basic idea of Open Source played an important role in the development of this Android App. Programmers all over the world should have the opportunity to profit from this open source project or to actively participate in it.

When it comes to the topic โ€žFOSSโ€œ (Free Open Source Software), or Open Source in general, many people still have misunderstandings. Aurora is not any different. But we hope that developer Rahul Patel can explain this to us in this interview.

Aurora OSS: What does โ€žOSSโ€œ mean and why Open Source?

Tarnkappe.info: Why are only Open Source applications allowed? Is it primarily about security? Or rather by principle?

Rahul Patel: Thatโ€™s an interesting question. Aurora OSS (Open Source Software) is, as the name suggests, a small collection of โ€žFOSSโ€œ or Open Source Apps. Why only Open Source? Well, itโ€™s because we wanted to be very transparent about what we were doing right from the start. Everyone should be able to check the code for themselves. What is also important to us is that everyone should have the opportunity to start their own open source project. Or even better, to participate actively in the development and thereby improve the quality of the software.

Tarnkappe.info: And to detect and remove possible bugs. What does that mean explicitly referring to the Aurora-Store or Aurora Droid ?

Rahul Patel: Well, the Aurora App Store is an alternative (open source) client for the Google Play Store. Therefore, like Googleโ€™s Play Store, it includes all types of apps, proprietary and non-proprietary. (Explanation: Proprietary means that only the owner has access to the source code of the program.)

The Aurora Droid, is an alternative (open source) client for F-Droid, so it only supports FOSS apps, which is the main principle of F-Droid.

Internal, malware in apps

Tarnkappe.info: How many people work on Aurora, what do they do in detail?

Rahul Patel: Well, as a developer, Iโ€™m the only one who actually writes the code. But there are several designers who help me with the design of the app interfaces. Not to mention the many supporters who help me with domains, servers and dummy accounts.

๐Ÿ‘‰๐Ÿผ Read more:
https://tarnkappe.info/interview-with-the-developer-of-the-aurora-app-store/

#Aurora #app #store #AppStore #Interview
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
TLDR Digital Safety Checklist

๐Ÿค” Who this guide is for

๐Ÿ’ก
You use the internet on a day-to-day basis โ€“ for work, social media, financial transactions, etc.

๐Ÿ’ก You feel you could be doing more to ensure your digital safety and privacy, but you're also not in immediate danger. (If you are, seek out an expert for a 1:1 consult.)

๐Ÿ’ก You're comfortable with technology. For example, you're comfortable going into the settings section of your computer/smartphone.

๐Ÿ‘€ How this guide works

๐Ÿ’ก
Recommendations have been sorted in ascending levels of difficulty. Start from level one and work your way up!

๐Ÿ’ก I recommend doing everything in levels one, two and three. I did, and I'm only a mildly technically-competent person.

๐Ÿ’ก Then scan the scenarios to see if any of them apply to you. (They assume that you've done everything in levels 1-3.)

๐Ÿ’ก This guide is a living document โ€“ please feel free to submit a pull request or fork your own version of this guide on GitHub.


๐Ÿ•’ Last updated: 23 October 2019


๐Ÿ‘‰๐Ÿผ Read more:
https://hongkonggong.github.io/tldr-digital-security/

๐Ÿ‘‰๐Ÿผ GitHub:
https://github.com/hongkonggong/tldr-digital-security

#digital #safety #checklist #guide
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
New method makes people invisible for face recognition

Researchers from Facebook's AI research team and Tel-Aviv University have developed a new method to fool facial recognition on videosโ€ค

๐Ÿ“บ https://www.youtube.com/watch?v=cCYnBtni7Wg

๐Ÿ’ก New method tricks facial recognition on videos:
https://t3n.de/news/neue-methode-trickst-videos-1213004/

#facial #recognition #facebook #video #DeIdentification
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN
GANimal Demo of Few-Shot Unsupervised Image-to-Image Translation

You've always wondered what your pet's smile would look like on another animal? This AI will show it to you.

๐Ÿ‘‰๐Ÿผ Demo:
https://nvidia-research-mingyuliu.com/ganimal

https://arxiv.org/abs/1905.01723

#GANimal #demo #image #translation
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
๐Ÿ“ก@FLOSSb0xIN