BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
👉🏼 Latest viruses and malware threats
👉🏼 Latest patches, tips and tricks
👉🏼 Threats to security/privacy/democracy on the Internet

👉🏼 Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
WeChat users in the US say the app is censoring their messages about Hong Kong

#Chinese #Americans who use the Chinese app #WeChat say they are being #censored for writing #messages in support of #HongKong.

WeChat is ubiquitous in China, so for Chinese Americans with family there it is a major blow to be kicked off the app.

This is the latest in a pattern of Chinese #censorship extending into the #US.

Chinese American users of the messaging app WeChat are finding their messages containing political criticism of China — particularly those aimed at the protests in Hong Kong — are being censored, The Verge reports.

In one instance an American information security analyst named Bin Xie had his account taken down after writing "The pro-China candidates totally lost," referring to Hong Kong's recent election in which pro-democracy candidates gained huge ground against pro-China candidates.

"If you have censorship in China, fine," he told The Verge. "But in this country? I'm a Republican, but on WeChat I suffer the same as Democrats — we are all censored."

Xie then joined a WhatsApp group full of Chinese Americans who had similarly been kicked off WeChat for expressing political views.

For Chinese Americans with family in China, being kicked off WeChat is a major problem. The WeChat app is more or less ubiquitous in China, where it covers a broad range of uses. It acts as a messaging app, a dominant payment platform, a social network, and a platform for accomplishing everyday tasks like paying utility bills and booking doctor's appointments. WeChat and its rival Alipay's payment systems have become so everyday that even street vendors and buskers use QR codes rather than accept cash.

👉🏼 Read more:
https://www.businessinsider.com/us-wechat-users-censored-messages-hong-kong-china-2019-11

👉🏼 Read more:
https://www.theverge.com/2019/11/25/20976964/chinese-americans-censorship-wechat-hong-kong-elections-tiktok

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
'Suspension won't silence me': Teen speaks out after embedding message about Xinjiang Uyghurs in TikTok make-up vid

A teenager who spoke out about the plight of #Uyghurs in #Xinjiang has challenged the #Chinese-owned social media app #TikTok over its decision to block her from posting new content. #video

📺 https://www.hongkongfp.com/2019/11/27/suspension-wont-silence-teen-speaks-embedding-message-xinjiang-uyghurs-tiktok-make-vid/

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Pavel Durov must make a statement to the New York District Court

According to an order of judge P. Kevin Castel, Pavel #Durov, the founder and CEO of #Telegram, will testify before a New York district court in January. The #US regulatory authority #SEC stopped the issue of the #Gram #Token almost at the last minute with its temporary injunction. The defendants have already responded with their complaint in court. A total of three Telegram executives have to endure an interrogation.

The United States Securities and Exchange Commission (SEC) stopped the launch of the Telegram Open Network (#TON) and the issue of the Token Gram. TON Issuer Inc. and the operating company of Telegram are now trying to defend themselves legally.

Soon to be headquartered in Switzerland?

According to local media reports, the operating company is planning to move to the #Swiss town of #Zug in the near future. The company plans to gradually relocate its headquarters and research and development to #Switzerland. The #Libra Association, which wants to publish the #crypto #currency for #Facebook, has also opted for Switzerland as its headquarters. The financial supervisory authority Finma has already confirmed that it is in negotiations with Telegram. However, the authority paused its negotiations after the SEC's injunction became known.

👉🏼 Read more:
https://tarnkappe.info/pavel-durov-muss-vor-new-yorker-bezirksgericht-eine-aussage-machen/

👉🏼 Read more:
https://www.luzernerzeitung.ch/wirtschaft/chat-app-telegram-will-nach-zug-ziehen-das-sagt-platzhirsch-threema-dazu-ld.1168724

👉🏼 Read more:
https://www.bitcoininsider.org/article/78628/telegram-founder-pavel-durov-give-deposition-gram-token-case

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Stop complaining about us! - TikTok’s Criticism and Competition Guidelines

Those who complained about the video platform got demoted. We publish excerpts from the moderation rules of #TikTok. They show that not only political content made the video #platform nervous. The naming of #competitors and #criticism of the company were also punished.

„I think TikTok is stupid because it #censors content.“ Until recently, such a sentence in a TikTok video could lead to a situation where it would never reach a large audience. The same was true for clips that contained a screenshot from a #WhatsApp chat. Until at least September of this year, the video platform was demoting content that criticized the company or when somebody mentioned the name of a direct competitor of TikTok. This is documented by the moderation rules that netzpolitik.org was able to see.

For this #research netzpolitik.org spoke with a #source at TikTok, as well as examining moderation criteria and communications. In the article „TikTok: Cheerfulness and censorship“ we examined the moderation processes and the political implications of information control on the Chinese video platform. Now we focus on how the company has dealt with criticism and how it deals with its competitors (PDF). 👉🏼 https://cdn.netzpolitik.org/wp-upload/2019/11/TikTok-Competitors-Attack-on-TikTok.pdf

Criticism of TikTok was unwelcome

One of the rules netzpolitik.org was able to see was „content depicting an attack on TikTok“. It said that „constructive criticism“ and „feedback“ were allowed. For content „attacking, condemning or criticizing TikTok“, the moderators were advised to mark the videos as „Not Recommend“. A classification of „Not Recommend“ greatly limits the possible viewership of a video. It then no longer appears in the algorithmically selected „For You“ feed, which the user sees when opening the app.

👉🏼 Read more:
https://netzpolitik.org/2019/complaints-and-competition-throttling-the-tiktok-feed/

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
China due to introduce face scans for mobile users

People in China are now required to have their faces scanned when registering new mobile phone services, as the authorities seek to verify the identities of the country's hundreds of millions of internet users.

The #regulation, announced in September, was due to come into effect on Sunday.
The #government says it wants to "protect the legitimate rights and interest of #citizens in #cyberspace".
#China already uses #facial #recognition #technology to #survey its #population.

It is a world leader in such technologies, but their intensifying use across the country in recent years has sparked debate.

What are the new rules?

When signing up for new mobile or mobile data contracts, people are already required to show their national identification card (as required in many countries) and have their photos taken.

But now, they will also have their faces scanned in order to verify that they are a genuine match for the ID provided.

China has for years been trying to enforce rules to ensure that everyone using the internet does so under their "real-name" identities.

In 2017, for example, new rules required internet platforms to verify a user's true identity before letting them post online content.

The new regulation for telecom operators was framed by the Ministry of Industry and Information Technology as a way to "strengthen" this system and ensure that the government can identify all mobile phone users. Most Chinese internet users access the web via their phones.

👉🏼 Read more:
https://www.bbc.com/news/world-asia-china-50587098

👉🏼 Read as well:
https://gizmodo.com/chinese-citizens-will-have-to-scan-their-faces-to-get-i-1838936778

#surveillance #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
30 506 internet domain names shut down for intellectual property infringement

Law enforcement #authorities from 18 #EU Member States1 and third parties in a joint investigation with #Europol and the US National Intellectual Property Rights Coordination Centre 2, facilitated by #Eurojust and #INTERPOL, have #seized over 30 506 #domain names that distributed #counterfeit and #pirated items over the internet during operation #IOSX. These included counterfeit #pharmaceuticals and pirated #movies, illegal #television #streaming, #music, #software, #electronics, and other bogus products.

3 arrests and 26 000 luxury products seized

During the investigation, officials arrested 3 suspects, seized 26 000 luxury products (clothes, perfumes), 363 litres of alcoholic beverages, and many hardware devices. They identified and froze more than €150 000 in several bank accounts and online payment platforms.

Europol ’s Intellectual Property Crime Coordinated Coalition (IPC³) supported the investigation on the ground by deploying experts with a mobile office. Europol officers carried out real-time information exchange and cross-checks of the data gathered during the course of the action against Europol’s databases. In addition, #IPC3 experts organised several online investigation techniques training courses in intellectual property infringements in 2019 with law enforcement authorities all over #Europe.

👉🏼 Read more:
https://www.europol.europa.eu/newsroom/news/30-506-internet-domain-names-shut-down-for-intellectual-property-infringement

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
TikTok curbed reach for people with disabilities

Leaked documents reveal how TikTok hid videos of people with disabilities. Queer and fat users were also pushed out of view. The Chinese company says the rules were meant to protect vulnerable users.

#TikTok, the fast-growing social network from #China, has used unusual measures to protect supposedly vulnerable users. The #platform instructed its moderators to mark #videos of people with #disabilities and limit their reach. #Queer and #fat people also ended up on a list of „special users“ whose videos were regarded as a #bullying risk by default and capped in their reach – regardless of the content.

#Documents obtained by netzpolitik.org detail TikTok’s moderation #guidelines. In addition we spoke with a source at TikTok who has knowledge of content moderation policies at the video-sharing platform.

The new #revelations show how #ByteDance, the #Beijing-based Chinese #technology company behind TikTok, deals with #bullying on its platform – and the controversial measures it took against it.

Previously, we examined how TikTok limits reach for political content and how its moderation policies work. We also looked at how the service deals with criticism and competition.

Vulnerable only visible in home country

The relevant section in the moderation rules is called „Imagery depicting a subject highly vulnerable to #cyberbullying“. In the explanations it says that this covers users who are „susceptible to #harassment or cyberbullying based on their physical or mental condition“.

According to the memo, mobbing has negative consequences for those affected. Therefore, videos of such users should always be considered as a risk and their reach on the platform should be limited.

TikTok uses its moderation toolbox to limit the visibility of such users. Moderators were instructed to mark people with disabilities as „Risk 4“. This means that a video is only visible in the country where it was uploaded.

For people with an actual or assumed disability, this means that instead of reaching a global audience of one billion, their videos reached a maximum of 5.5 million people. These are the user numbers TikTok currently has in Germany and globally, according to AdAge magazine.

👉🏼 Read more:
https://netzpolitik.org/2019/discrimination-tiktok-curbed-reach-for-people-with-disabilities/

👉🏼 Read as well:
https://t.iss.one/BlackBox_Archiv/739

#why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Spanish Congress approves "digital decree" The "gag law" to control the Internet?

The Permanent #Commission of the #Congress has approved with the favorable votes of #PSOE, #PP and #Citizens, the Royal Decree-Law 14/2019 of October 31, of urgent measures for the #digital #administration. A tremendously controversial #rule, unprecedented in #Spanish #democracy and that is raising blisters in all areas, as some #lawyers and #activists believe that it is an unconstitutional rule that violates fundamental rights.

The so-called "#digitaldecree" will allow the #Government to assume (temporarily) the direct management of electronic communications networks and services in certain exceptional cases that may affect public order, public security and national security. In practice, the Government will be able to cut off communications and networks such as the Internet in all or part of the territory without a prior court order, alleging an alteration of 'public order'.

The approval entails the adaptation of section 6 of article 4 of the General Telecommunications Law, the wording of which will literally read as follows: "The Government, on an exceptional and transitory basis, may agree to the assumption by the General State Administration of the direct management or intervention of electronic communications networks and services in certain exceptional cases that may affect public order, public security and national security. This exceptional power [...] may affect any infrastructure, associated resource or element or level of the network or service that is necessary to preserve or restore public order, public security and national security.

👉🏼 Read more:
https://www.muycomputer.com/2019/11/28/decretazo-digital-control-internet/

#spain #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveilled

Cities around the world are scaling up their use of surveillance cameras and facial recognition systems – but which ones are watching their citizens most closely?

Qiu Rui, a #policeman in #Chongqing, was on duty this summer when he received an #alert from a #facial #recognition system at a local square. There was a high probability a man caught on camera was a suspect in a 2002 murder case, the system told him.

The city’s #surveillance #system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers. Three days later the police captured the man, who eventually admitted that he was the suspect.

Cases such as this, where facial recognition systems are used to help local police crack crime cases, are not unusual in the south-west #China city, which recently ranked first in an #analysis of the world’s most surveilled cities compiled by the UK-based technology research firm Comparitech. With 2.58m cameras covering 15.35 million people – equal to one camera for every six residents – Chongqing has more surveillance cameras than any other city in the world for its population, beating even Beijing, Shanghai and tech hub Shenzhen.

👉🏼 Read more:
https://www.theguardian.com/cities/2019/dec/02/big-brother-is-watching-chinese-city-with-26m-cameras-is-worlds-most-heavily-surveilled

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
A decade of hacking: The most notable cyber-security events of the 2010s

The 2010s decade is drawing to a close and ZDNet is looking back at the most important cyber-security events that have taken place during the past ten years.

Over the past decade, we've seen it all. We've had monstrous #data #breaches, years of prolific #hacktivism, plenty of nation-state #cyber-#espionage operations, almost non-stop financially-motivated #cybercrime, and destructive #malware that has rendered systems unusable.

Below is a summary of the most important events of the 2010s, ordered by year. We didn't necessarily look at the biggest breaches or the most extensive hacking operations but instead focused on hacks and techniques that gave birth to a new cyber-security trend or were a paradigm shift in how experts looked at the entire field of cyber-security.

From the #Stuxnet attacks of 2010 to #China's extensive #mass-#surveillance of the #Uyghur #minority, we selected the most relevant events and explained why they were important.

👉🏼 Read more:
https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
China Uses DNA to Map Faces, With Help From the West

Beijing’s pursuit of control over a Muslim ethnic group pushes the rules of science and raises questions about consent.

TUMXUK, #China — In a dusty city in the #Xinjiang region on China’s western frontier, the #authorities are testing the #rules of #science.

With a million or more #ethnic #Uighurs and others from predominantly #Muslim #minority groups swept up in detentions across Xinjiang, officials in Tumxuk have gathered blood samples from hundreds of Uighurs — part of a mass #DNA collection effort dogged by questions about consent and how the data will be used.

In #Tumxuk, at least, there is a partial answer: Chinese #scientists are trying to find a way to use a DNA sample to create an image of a person’s face.

The #technology, which is also being developed in the #UnitedStates and elsewhere, is in the early stages of #development and can produce rough pictures good enough only to narrow a #manhunt or perhaps eliminate #suspects. But given the crackdown in Xinjiang, experts on ethics in science worry that China is building a #tool that could be used to justify and intensify #racial #profiling and other state #discrimination against Uighurs.

In the long term, experts say, it may even be possible for the Communist government to feed images produced from a DNA sample into the mass surveillance and facial recognition systems that it is building, tightening its grip on society by improving its ability to track dissidents and protesters as well as criminals.

Some of this research is taking place in labs run by China’s Ministry of Public Security, and at least two Chinese scientists working with the ministry on the technology have received funding from respected institutions in Europe. International scientific journals have published their findings without examining the origin of the DNA used in the studies or vetting the ethical questions raised by collecting such samples in Xinjiang.

In papers, the Chinese scientists said they followed norms set by international associations of scientists, which would require that the men in Tumxuk (pronounced TUM-shook) gave their blood willingly. But in Xinjiang, many people have no choice. The government collects samples under the veneer of a mandatory health checkup program, according to Uighurs who have fled the country. Those placed in internment camps — two of which are in Tumxuk — also have little choice.

👉🏼 Read more:
https://www.nytimes.com/2019/12/03/business/china-dna-uighurs-xinjiang.html

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
FBI warns about snoopy smart TVs spying on you

An FBI branch office warns smart TV users that they can be gateways for hackers to come into your home. Meanwhile, the smart TV OEMs are already spying on you

A recent #FBI #report warned #smart #TV users that #hackers can also take control of your unsecured TV. "At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently #cyberstalk you," explained the FBI.

The risk isn't new. A few years ago, smart TVs from #LG, #Samsung, and #Vizio were #spying and #reporting on your viewing habits to their #manufacturers.

Today, the FBI is warning that "TV manufacturers and #app #developers may be listening and watching you." It added, "[A] television can also be a gateway for hackers to come into your home. A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the #backdoor through your #router."

That's true, but while there have been relatively few cases of hackers invading homes via their smart TVs, it's only a matter of time until they're watching and listening to you.

👉🏼 Read more:
https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
The iPhone 11 Pro’s Location Data Puzzler

One of the more curious behaviors of Apple’s new #iPhone 11 Pro is that it intermittently seeks the user’s location information even when all #applications and #system services on the phone are individually set to never request this data. #Apple says this is by design, but that response seems at odds with the company’s own #privacy #policy.

The privacy policy available from the iPhone’s #Location #Services screen says, “If Location Services is on, your iPhone will periodically send the geo-tagged locations of nearby Wi-Fi hotspots and cell towers (where supported by a device) in an anonymous and encrypted form to Apple, to be used for augmenting this #crowd-sourced #database of Wi-Fi hotspot and cell tower locations.”

The #policy explains users can disable all location services entirely with one swipe (by navigating to Settings > Privacy > Location Services, then switching “Location Services” to “off”). When one does this, the location services indicator — a small diagonal upward arrow to the left of the battery icon — no longer appears unless Location Services is re-enabled.

The policy continues: “You can also disable location-based system services by tapping on System Services and turning off each location-based system service.” But apparently there are some system services on this model (and possibly other iPhone 11 models) which request location data and cannot be disabled by users without completely turning off location services, as the arrow icon still appears periodically even after individually disabling all system services that use location.

On Nov. 13, #KrebsOnSecurity contacted Apple to report this as a possible privacy bug in the new iPhone Pro and/or in #iOS 13.x, sharing a #video showing how the device still seeks the user’s location when each app and system service is set to “never” request location information (but with the main Location Data service still turned on).

👉🏼 Video:
https://youtu.be/37_3hd_SK24

👉🏼 Read more:
https://krebsonsecurity.com/2019/12/the-iphone-11-pros-location-data-puzzler/

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Two malicious Python libraries caught stealing SSH and GPG keys

One library was available for only two days, but the second was live for nearly a year.

The #Python #security #team removed two #trojanized #Python #libraries from #PyPI (Python Package Index) that were caught #stealing #SSH and #GPG keys from the projects of infected developers.

The two libraries were created by the same #developer and mimicked other more popular libraries -- using a technique called #typosquatting to register similarly-looking names.

The first is "python3-dateutil," which imitated the popular "dateutil" library. The second is "jeIlyfish" (the first L is an I), which mimicked the "jellyfish" library.

The two malicious clones were discovered on Sunday, December 1, by German software developer Lukas Martini. Both libraries were removed on the same day after Martini notified dateutil developers and the PyPI security team.

While the python3-dateutil was created and uploaded on PyPI two days before, on November 29, the jeIlyfish library had been available for nearly a year, since December 11, 2018.

👉🏼 Read more:
https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
You can hack anything - you just shouldn't get caught - #OpSec for data travellers

In this introductory talk we give an overview of the #risks of the #hacking #hobby: doors that are broken in, house searches and high legal fees obscure the enjoyment of free hacking.

Here it is worthwhile for the #hacking offspring to learn from the mistakes of others. We give classic examples of mistakes in #operational #security so that you don't have to make them.

📺 🇬🇧 🇫🇷 🇩🇪
https://media.ccc.de/v/35c3-9716-du_kannst_alles_hacken_du_darfst_dich_nur_nicht_erwischen_lassen

#video #CCC #Linus
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Kashmiris Are Disappearing From WhatsApp

Kashmiris enduring their region's ongoing internet blackout are losing their WhatsApp accounts because of the platform's policy on inactive accounts.

On Wednesday, #Kashmiris began #disappearing from #WhatsApp — and no one initially knew why. #Citizens of the disputed geographical territory, whose autonomy the #Indian #government revoked in August, abruptly and inexplicably began departing WhatsApp groups in which they had long participated, leaving behind only a “[Phone number] left” message.

It's been four months since India’s government shut down Kashmir’s internet services, cutting off the region from the rest of the world. Because of this, some observers suspected that the Kashmiris who disappeared from their WhatsApp #groups this week did not do so on their own and may not even know anything has changed.

In a comment provided after this story's publication, a spokesperson for #Facebook, which owns WhatsApp, said the disappearances were the result of the messaging app's policy on inactive accounts.

"To maintain security and limit data retention, WhatsApp accounts generally expire after 120 days of inactivity," they wrote. "When that happens, those accounts automatically exit their WhatsApp groups. People will need to be re-added to groups upon regaining access to the Internet and joining WhatsApp again."

The spokesperson did not respond to questions from BuzzFeed News about how many Kashmiris were affected. Those whose profiles have expired will have to re-register on WhatsApp and recreate their profiles on the platform.

👉🏼 Read more:
https://www.buzzfeednews.com/article/pranavdixit/hundreds-of-kashmiris-are-disappearing-from-their-whatsapp

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
FBI Puts $5 Million Bounty On Russian Hackers Behind Dridex Banking Malware

The #UnitedStates Department of Justice today disclosed the identities of two #Russian #hackers and charged them for developing and distributing the #Dridex #banking #Trojan using which the duo stole more than $100 million over a period of 10 years.

Maksim Yakubets, the leader of 'Evil Corp' hacking group, and his co-conspirator Igor Turashev primarily distributed Dridex — also known as 'Bugat' and 'Cridex' — through multi-million email campaigns and targeted numerous organizations around the world.

👉🏼 Read more:
https://thehackernews.com/2019/12/dridex-russian-hackers-wanted-by-fbi.html


📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Congratulations, YouTube... Now Show Your Work

Earlier this week, #YouTube finally acknowledged their #recommendation #engine suggests harmful content. It’s a small step in the right direction, but YouTube still has a long history of dismissing independent #researchers. We created a #timeline to prove it.

Over the past year and some, it’s been like clockwork.

First: a news story emerges about YouTube’s recommendation engine harming users. Take your pick: The #algorithm has radicalized young adults in the U.S., sowed division in #Brazil, spread state-sponsored #propaganda in #HongKong, and more.

Then: YouTube responds. But not by admitting fault or detailing a solution. Instead, the company issues a statement diffusing blame, criticising the research methodologies used to investigate their recommendations, and vaguely promising that they’re working on it.

In a blog post earlier this week, YouTube acknowledged that their recommendation engine has been suggesting borderline content to users and posted a timeline showing that they’ve dedicated significant resources towards fixing this problem for several years. What they fail to acknowledge is how they have been evading and dismissing journalists and academics who have been highlighting this problem for years. Further, there is still a glaring absence of publicly verifiable data that supports YouTube’s claims that they are fixing the problem.

That’s why today, #Mozilla is publishing an #inventory of YouTube’s responses to external #research into their recommendation engine. Our timeline chronicles 14 responses — all evasive or dismissive — issued over the span of 22 months. You can find them below, in reverse chronological order.

💡 We noticed a few trends across these statements:

‼️
YouTube often claims it’s addressing the issue by tweaking its algorithm, but provides almost no detail into what, exactly, those tweaks are

‼️ YouTube claims to have data that disproves independent research — but, refuses to share that data

‼️ YouTube dismisses independent research into this topic as misguided or anecdotal, but refuses to allow third-party access to its data in order to confirm this

👉🏼 Read more:
https://foundation.mozilla.org/en/blog/congratulations-youtube-now-show-your-work/

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Privacy Analysis of Tiktok’s App and Website (#PoC)

I did a detailed privacy check of the Tiktok app and website. Tiktok commits multiple breaches of law, trust, transparency and data protection.

Here are all technical and legal details. You can read a less technical article about it at the Süddeutsche Zeitung (german).

This is my setup: I used #mitmproxy to route all #app #traffic for #analysis. See in this #video how device information, usage time and watched videos are sent to #Appsflyer and #Facebook.

Hard to believe that this is covered by „legitimate interest“ and transparency: Entered search terms are sent to Facebook...

👉🏼 Read more:
https://rufposten.de/blog/2019/12/05/privacy-analysis-of-tiktoks-app-and-website/

#TikTok #PoC
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Conservative government giving NHS data to Amazon for free, documents reveal

US company will be able to access all ‘healthcare information, including without limitation symptoms, causes, and definitions’

#NHS #data on the #health of the #population is being handed over to #Amazon at no charge under a controversial deal between the #USA giant and the #Department of Health and Social Care.

While individual patient data is not being given to the company, a copy of the December 2018 contract between Amazon and the #DHSC reveals the company will be able to profit from its access to a range of NHS information.

Health secretary Matt #Hancock hailed the deal with Amazon in July as a way to help give patients better medical advice using #technology such as #Alexa, which uses Amazon’s #algorithm to answer key question.

Campaigners from #Privacy International obtained a copy of the contract using freedom of information laws. The full contract reveals the deal goes far beyond medical advice for use by Alexa.

It states the company will be able to access all “healthcare information, including without limitation symptoms, causes, and definitions, and all related copyrightable content, data, information and other materials”, the DHSC has.

The contract allows Amazon to use this data in a number of ways – not just providing advice to UK users.

👉🏼 Read more:
https://www.independent.co.uk/news/health/amazon-nhs-data-access-uk-government-contract-a9237901.html

#DeleteAmazon #UK #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN
Banned recording reveals: China ambassador threatened Faroese leader at secret meeting

China's ambassador to Denmark threatened the Faroese prime minister by indicating that a trade agreement would be dropped if the autonomous Danish archipelago does not sign a 5G contract with technology giant Huawei, Berlingske can now reveal.

#China ambassador to #Denmark, Mr. Feng Tie, made overt #threats to prominent members of the #Faroese #government in order to secure a strategically important contract for the #Chinese telecoms giant #Huawei, by indicating that the Chinese government would drop a free trade agreement with the Faroe Islands if the company did not get the contract.

This appears from an #audio #recording which was subsequently banned from publication, #Berlingske can now reveal.

The recording marks the first instance where the Chinese government has linked access to China's huge market to Huawei being awarded contracts for #5G #networks in #Europe. Huawei has publicly stated that it is a private company with no ties to the Chinese state.

For the past seven days, the Faroese government has sought to keep the recording a secret by getting an injunction to prevent the Faroese TV station Kringvarp Føroya from publishing its content. Kringvarp Føroya had planned to reveal the recording in a Faroese news broadcast Monday a week ago.

But as Berlingske can now reveal, the audio clip clearly indicates how the Chinese top #diplomat used the meeting to unequivocally tie the Huawei contract to wider trade interests, which would particularly affect the Faroe Islands' large and growing exports of salmon to China.

👉🏼 Read more:
https://www.berlingske.dk/internationalt/banned-recording-reveals-china-ambassador-threatened-faroese-leader

📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@FLOSSb0xIN