Media is too big
VIEW IN TELEGRAM
Law Enforcement Guide To Satanic Cults (1994)
A dated documentary into the oft-overlooked risk of Satanic cults and demonic activity for police and law enforcement officers.
#documentary #video #police #guide #90s
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
A dated documentary into the oft-overlooked risk of Satanic cults and demonic activity for police and law enforcement officers.
#documentary #video #police #guide #90s
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
β£οΈ CoronaVirus-Outbreak-App β£οΈ
The main purpose of this application was to help people have all the stats about CoronaVirus at a glance, on their android smartphones.
This application has all the premium features activated, including an ad-free experience, so you can fully enjoy it.
βοΈPlease Note:
Although the app is linked to GitHub, it is not FOSS.
https://github.com/TheWCKD/CoronaVirus-Outbreak-App/blob/master/README.md
ππΌ Download from MEGA.NZ (v1.1.1)
ππΌ Download from GOOGLE DRIVE (v1.1.1)
#Corona #app
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
The main purpose of this application was to help people have all the stats about CoronaVirus at a glance, on their android smartphones.
This application has all the premium features activated, including an ad-free experience, so you can fully enjoy it.
βοΈPlease Note:
Although the app is linked to GitHub, it is not FOSS.
https://github.com/TheWCKD/CoronaVirus-Outbreak-App/blob/master/README.md
ππΌ Download from MEGA.NZ (v1.1.1)
ππΌ Download from GOOGLE DRIVE (v1.1.1)
#Corona #app
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Forwarded from Privacy Today
β οΈ PSA: To all German users, starting from tomorrow (2020-03-22), Telekom and Telefonica providers will hand over your phone's movement data to the government and other authorities. This is happening behind our backs using the COVID-19 situation as a cover-up! Telekom has already transferred 5GB of movement data to a Government institute (RKI) on Tuesday.
Click on the following link to start the opt-out process if you're a customer of Telekom:
π https://www.optout-service.telekom-dienste.de/public/anmeldung.jsp
Telekom claims to anonymize mobile data, which is then passed on to the Telekom subsidiary Motionlogic GmbH in aggregate form. They are also grabbing data related to the age group (by 10 year increments), gender and the first 4 digits of your postcode. After inputting your details, you will receive a 4-digit code via SMS.
Click on the following link to start the opt-out process if you're a customer of Telefonica:
π https://www.telefonica.de/dap/selbst-entscheiden
Telefonica is also claiming the same as Telekom, as in they anonymize the data and will only use it for analysis afterwards. The procedure is the same as above, you enter your details and receive a one-time password via SMS.
If you're a Vodafone user, you probably need to go into the app π± and disable everything. They have about 20 telemetry functions. Web login doesn't work with Vodafone prepaid SIMs, unless you manually request a password for it from their customer service.
Make sure to opt-out NOW before this goes into effect tomorrow!
--- Austria ---
Same phenomenon is also happening right now in Austria. The government currently receives - "anonymously" - the movement data of its customers from the domestic mobile operator A1. A1 claims its approach is GDPR-compliant. A1 also emphasized that the data could not be used to draw any conclusions about the individual cell phone user and that each cell phone is assigned a number that is automatically generated randomly for tracking. All these numbers are freshly assigned every 24 hours.
--- Italy ---
Italy, the European country hit worst by COVID-19 until now, has also requested aggregated data from the providers to track the movement of people, in order to try and contain the spread of the virus. The vice president of the region of Lombardy said more than 40% of people have moved further than 200-300 metres from their houses, based on data provided by the telecom providers.
--- Other countries ---
Following the grave situation of COVID-19, other countries are also expected to take the same steps related to the aggregation of customer movement data.
βοΈ While public health might be more important than movement tracking in the current situation, this can set dangerous precedent and open the way for these institutions to normalize similar behaviour and process these data points in the future for malicious purposes.
π€ What do you as a citizen think? Do you trust these institutions to be benevolent with the data/power they possess?
βΉοΈ Sources:
https://orf.at/stories/3158211/
https://netzpolitik.org/2020/unverhofftes-datengeschenk/
https://www.borsaitaliana.it/borsa/notizie/radiocor/economia/dettaglio/coronavirus-fsala-lombardia-40-persone-esce-da-casa-non-va-bene-nRC_17032020_1836_602124871.html
π‘
Click on the following link to start the opt-out process if you're a customer of Telekom:
π https://www.optout-service.telekom-dienste.de/public/anmeldung.jsp
Telekom claims to anonymize mobile data, which is then passed on to the Telekom subsidiary Motionlogic GmbH in aggregate form. They are also grabbing data related to the age group (by 10 year increments), gender and the first 4 digits of your postcode. After inputting your details, you will receive a 4-digit code via SMS.
Click on the following link to start the opt-out process if you're a customer of Telefonica:
π https://www.telefonica.de/dap/selbst-entscheiden
Telefonica is also claiming the same as Telekom, as in they anonymize the data and will only use it for analysis afterwards. The procedure is the same as above, you enter your details and receive a one-time password via SMS.
If you're a Vodafone user, you probably need to go into the app π± and disable everything. They have about 20 telemetry functions. Web login doesn't work with Vodafone prepaid SIMs, unless you manually request a password for it from their customer service.
Make sure to opt-out NOW before this goes into effect tomorrow!
--- Austria ---
Same phenomenon is also happening right now in Austria. The government currently receives - "anonymously" - the movement data of its customers from the domestic mobile operator A1. A1 claims its approach is GDPR-compliant. A1 also emphasized that the data could not be used to draw any conclusions about the individual cell phone user and that each cell phone is assigned a number that is automatically generated randomly for tracking. All these numbers are freshly assigned every 24 hours.
--- Italy ---
Italy, the European country hit worst by COVID-19 until now, has also requested aggregated data from the providers to track the movement of people, in order to try and contain the spread of the virus. The vice president of the region of Lombardy said more than 40% of people have moved further than 200-300 metres from their houses, based on data provided by the telecom providers.
--- Other countries ---
Following the grave situation of COVID-19, other countries are also expected to take the same steps related to the aggregation of customer movement data.
βοΈ While public health might be more important than movement tracking in the current situation, this can set dangerous precedent and open the way for these institutions to normalize similar behaviour and process these data points in the future for malicious purposes.
π€ What do you as a citizen think? Do you trust these institutions to be benevolent with the data/power they possess?
βΉοΈ Sources:
https://orf.at/stories/3158211/
https://netzpolitik.org/2020/unverhofftes-datengeschenk/
https://www.borsaitaliana.it/borsa/notizie/radiocor/economia/dettaglio/coronavirus-fsala-lombardia-40-persone-esce-da-casa-non-va-bene-nRC_17032020_1836_602124871.html
π‘
Snowden warns: The surveillance states weβre creating now will outlast the coronavirus
Temporary security measures can soon become permanent
Governments around the world are using high-tech surveillance measures to combat the coronavirus outbreak. But are they worth it?
Edward Snowden doesnβt think so.
The former CIA contractor, whose leaks exposed the scale of spying programs in the US, warns that once this tech is taken out of the box, it will be hard to put it back.
βWhen we see emergency measures passed, particularly today, they tend to be sticky,β Snowden said in an interview with the Copenhagen International Documentary Film Festival.
ππΌ Read more:
https://thenextweb.com/neural/2020/03/25/snowden-warns-the-surveillance-states-were-creating-now-will-outlast-the-coronavirus/
#surveillance #coronavirus
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Temporary security measures can soon become permanent
Governments around the world are using high-tech surveillance measures to combat the coronavirus outbreak. But are they worth it?
Edward Snowden doesnβt think so.
The former CIA contractor, whose leaks exposed the scale of spying programs in the US, warns that once this tech is taken out of the box, it will be hard to put it back.
βWhen we see emergency measures passed, particularly today, they tend to be sticky,β Snowden said in an interview with the Copenhagen International Documentary Film Festival.
"The emergency tends to be expanded. Then the authorities become comfortable with some new power. They start to like it."
Supporters of the draconian measures argue that normal rules are not enough during a pandemic and that the long-term risks can be addressed once the outbreak is contained. But a brief suspension of civil liberties can quickly be extended.ππΌ Read more:
https://thenextweb.com/neural/2020/03/25/snowden-warns-the-surveillance-states-were-creating-now-will-outlast-the-coronavirus/
#surveillance #coronavirus
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Zoom iOS App Sends Data to Facebook Even if You Donβt Have a Facebook Account
Zoom's privacy policy isn't explicit about the data transfer to Facebook at all.
As people work and socialize from home, video conferencing software Zoom has exploded in popularity. What the company and its privacy policy don't make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don't have a Facebook account, according to a Motherboard analysis of the app.
This sort of data transfer is not uncommon, especially for Facebook; plenty of apps use Facebook's software development kits (SDK) as a means to implement features into their apps more easily, which also has the effect of sending information to Facebook. But Zoom users may not be aware it is happening, nor understand that when they use one product, they may be providing data to another service altogether.
"That's shocking. There is nothing in the privacy policy that addresses that," Pat Walshe, an activist from Privacy Matters who has analyzed Zoom's privacy policy, said in a Twitter direct message.
Upon downloading and opening the app, Zoom connects to Facebook's Graph API, according to Motherboard's analysis of the app's network activity. The Graph API is the main way developers get data in or out of Facebook.
ππΌ Read more:
https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account
#zoom #iOS #privacy #Facebook #DeleteFacebook
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Zoom's privacy policy isn't explicit about the data transfer to Facebook at all.
As people work and socialize from home, video conferencing software Zoom has exploded in popularity. What the company and its privacy policy don't make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don't have a Facebook account, according to a Motherboard analysis of the app.
This sort of data transfer is not uncommon, especially for Facebook; plenty of apps use Facebook's software development kits (SDK) as a means to implement features into their apps more easily, which also has the effect of sending information to Facebook. But Zoom users may not be aware it is happening, nor understand that when they use one product, they may be providing data to another service altogether.
"That's shocking. There is nothing in the privacy policy that addresses that," Pat Walshe, an activist from Privacy Matters who has analyzed Zoom's privacy policy, said in a Twitter direct message.
Upon downloading and opening the app, Zoom connects to Facebook's Graph API, according to Motherboard's analysis of the app's network activity. The Graph API is the main way developers get data in or out of Facebook.
ππΌ Read more:
https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account
#zoom #iOS #privacy #Facebook #DeleteFacebook
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Corona crisis: EU evaluates contact blocks with mobile phone data
COVID-19 - Mobile phone location datas - Q&A
https://audiovisual.ec.europa.eu/en/video/I-187513
#coronavirus #privacy #eu
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
COVID-19 - Mobile phone location datas - Q&A
https://audiovisual.ec.europa.eu/en/video/I-187513
#coronavirus #privacy #eu
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
42 million Iranian βTelegramβ user IDs and phone numbers leaked online
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
42 million records from a third-party version of messaging app Telegram used in Iran was exposed on the web without any authentication required to access it. Comparitech worked with security researcher Bob Diachenko to uncover and report the exposure, which included usernames and phone numbers, among other data.
The data was posted by a group called βHunting systemβ (translated from Farsi) on an Elasticsearch cluster that required no password nor any other authentication to access. It was removed after Diachenko reported the incident to the hosting provider on March 25.
Telegram says the data came from an unofficial βforkβ of Telegram, a version of the app unaffiliated with the company. Telegram is an open-source app, allowing third parties to make their own versions of it. Because the official Telegram app is frequently blocked in Iran, many users flock to unofficial versions.
A Telegram spokesperson told Comparitech, βWe can confirm that the data seems to have originated from third-party forks extracting user contacts. Unfortunately, despite our warnings, people in Iran are still using unverified apps. Telegram apps are open source, so itβs important to use our official apps that support verifiable builds.β
ππΌ Read more:
https://www.comparitech.com/blog/information-security/iranian-telegram-accounts-leaked/
#leak #Iran #telegram
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
42 million records from a third-party version of messaging app Telegram used in Iran was exposed on the web without any authentication required to access it. Comparitech worked with security researcher Bob Diachenko to uncover and report the exposure, which included usernames and phone numbers, among other data.
The data was posted by a group called βHunting systemβ (translated from Farsi) on an Elasticsearch cluster that required no password nor any other authentication to access. It was removed after Diachenko reported the incident to the hosting provider on March 25.
Telegram says the data came from an unofficial βforkβ of Telegram, a version of the app unaffiliated with the company. Telegram is an open-source app, allowing third parties to make their own versions of it. Because the official Telegram app is frequently blocked in Iran, many users flock to unofficial versions.
A Telegram spokesperson told Comparitech, βWe can confirm that the data seems to have originated from third-party forks extracting user contacts. Unfortunately, despite our warnings, people in Iran are still using unverified apps. Telegram apps are open source, so itβs important to use our official apps that support verifiable builds.β
ππΌ Read more:
https://www.comparitech.com/blog/information-security/iranian-telegram-accounts-leaked/
#leak #Iran #telegram
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Mozilla shares telemetry data on the corona crisis
The Firefox manufacturer wants to support research into the coronavirus pandemic with this
The browser manufacturer Mozilla has recorded a significant increase in the number of its daily users of Firefox on the desktop in the past days and weeks. The company attributes this increase to the corona crisis and the associated measures for so-called social or physical distancing. Mozilla is therefore now releasing this data for research, as the company announces in its data blog.
ππΌ Read more:
https://blog.mozilla.org/data/2020/03/30/opening-data-to-understand-social-distancing/
https://www.golem.de/news/social-distancing-mozilla-teilt-telemetrie-daten-zur-coronakrise-2003-147610.html
#mozilla #firefox #browser #telemetry #coronavirus
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
The Firefox manufacturer wants to support research into the coronavirus pandemic with this
The browser manufacturer Mozilla has recorded a significant increase in the number of its daily users of Firefox on the desktop in the past days and weeks. The company attributes this increase to the corona crisis and the associated measures for so-called social or physical distancing. Mozilla is therefore now releasing this data for research, as the company announces in its data blog.
ππΌ Read more:
https://blog.mozilla.org/data/2020/03/30/opening-data-to-understand-social-distancing/
https://www.golem.de/news/social-distancing-mozilla-teilt-telemetrie-daten-zur-coronakrise-2003-147610.html
#mozilla #firefox #browser #telemetry #coronavirus
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
βDictatorships often start in the face of a threatβ: UN privacy chief warns against long-lasting theft of freedoms amid coronavirus surveillance
Strict surveillance measures adopted to monitor citizens during coronavirus lockdowns could result in the long-lasting theft of personal freedoms, the United Nationsβ privacy chief has warned.
βDictatorships and authoritarian societies often start in the face of a threat,β Joseph Cannataci, the UN special rapporteur on the right to privacy told the Thomson Reuters Foundation.
βThat is why it is important to be vigilant today and not give away all our freedomsβ.
The coronavirus pandemic has led governments to declare themselves essentially on a war footing β with many politicians referencing an βinvisibleβ enemy or attacker.
At the advice of health experts, even countries regarded as the worldβs most liberal democracies have enforced quarantine measures thought unthinkable mere weeks ago.
ππ½ Read more:
https://www.independent.co.uk/news/world/coronavirus-lockdown-surveillance-tracking-dictatorship-authoritarian-united-nations-privacy-a9438561.html
#surveillance #dictatorship #coronavirus #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Strict surveillance measures adopted to monitor citizens during coronavirus lockdowns could result in the long-lasting theft of personal freedoms, the United Nationsβ privacy chief has warned.
βDictatorships and authoritarian societies often start in the face of a threat,β Joseph Cannataci, the UN special rapporteur on the right to privacy told the Thomson Reuters Foundation.
βThat is why it is important to be vigilant today and not give away all our freedomsβ.
The coronavirus pandemic has led governments to declare themselves essentially on a war footing β with many politicians referencing an βinvisibleβ enemy or attacker.
At the advice of health experts, even countries regarded as the worldβs most liberal democracies have enforced quarantine measures thought unthinkable mere weeks ago.
ππ½ Read more:
https://www.independent.co.uk/news/world/coronavirus-lockdown-surveillance-tracking-dictatorship-authoritarian-united-nations-privacy-a9438561.html
#surveillance #dictatorship #coronavirus #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Chaos Colloquium #1 - Dr. Roland van Rijswijk-Deij on DNS privacy and security
Post-Snowden, privacy became a prime focus of the IETF, and let to the improvement of a number of Internet protocols. Among these protocols is the Domain Name System, which maps human readable names to machine readable addresses.
The original DNS protocol communicates mostly in plain text over UDP, making it highly susceptible to eavesdropping. Since knowing what names a person queries for is highly revealing about their Internet surfing behaviour, the IETF decided to address the privacy shortcomings of the DNS. Initially, this led to the standardisation of DNS-over-TLS (DoT), and more recently, the standardisation of DNS-over-HTTPS (DoH).
https://media.ccc.de/v/chaoscolloquium-1-dns-privacy-security
#ccc #Colloquium #DNS #privacy #security #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Post-Snowden, privacy became a prime focus of the IETF, and let to the improvement of a number of Internet protocols. Among these protocols is the Domain Name System, which maps human readable names to machine readable addresses.
The original DNS protocol communicates mostly in plain text over UDP, making it highly susceptible to eavesdropping. Since knowing what names a person queries for is highly revealing about their Internet surfing behaviour, the IETF decided to address the privacy shortcomings of the DNS. Initially, this led to the standardisation of DNS-over-TLS (DoT), and more recently, the standardisation of DNS-over-HTTPS (DoH).
https://media.ccc.de/v/chaoscolloquium-1-dns-privacy-security
#ccc #Colloquium #DNS #privacy #security #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
What is Pastejacking? | Exploiting machine using pastejacking
What is Pastejacking?
Nearly all browsers allow websites to run commands on the usersβ computers. This feature can allow malicious websites to take over your computersβ clipboard. That is, when you copy something and paste it to your clipboard, the website can run one or more commands using your browser. The method can be used to change the Clipboard contents. While it may not be much dangerous if you are just copying to Notepad or Word etc. , it could be a problem for your computer if you paste something directly to the Command Prompt.
https://invidio.us/watch?v=4KNKGLS0nx0&feature=youtu.be&local=true
https://www.thewindowsclub.com/what-is-pastejacking
#pastejacking #exploiting #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
What is Pastejacking?
Nearly all browsers allow websites to run commands on the usersβ computers. This feature can allow malicious websites to take over your computersβ clipboard. That is, when you copy something and paste it to your clipboard, the website can run one or more commands using your browser. The method can be used to change the Clipboard contents. While it may not be much dangerous if you are just copying to Notepad or Word etc. , it could be a problem for your computer if you paste something directly to the Command Prompt.
https://invidio.us/watch?v=4KNKGLS0nx0&feature=youtu.be&local=true
https://www.thewindowsclub.com/what-is-pastejacking
#pastejacking #exploiting #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Crypto money for watching commercials: That's what's behind the Microsoft idea
Microsoft has patented a new approach for cryptomining. According to this approach, users are to be rewarded with digital currency, for example, for watching advertisements.
Mining crypto-currencies requires powerful hardware and requires a corresponding amount of energy. No wonder that professional miners join together to form large pools or farms and operate in countries where electricity is cheap. For private users it is usually not very lucrative to mine. This could change if Microsoft were to put its patent-pending cryptomining solution into practice.
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
https://t3n.de/news/kryptogeld-werbung-microsoft-1269724/
#crypto #microsoft #mining #advertising #patent
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Microsoft has patented a new approach for cryptomining. According to this approach, users are to be rewarded with digital currency, for example, for watching advertisements.
Mining crypto-currencies requires powerful hardware and requires a corresponding amount of energy. No wonder that professional miners join together to form large pools or farms and operate in countries where electricity is cheap. For private users it is usually not very lucrative to mine. This could change if Microsoft were to put its patent-pending cryptomining solution into practice.
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
https://t3n.de/news/kryptogeld-werbung-microsoft-1269724/
#crypto #microsoft #mining #advertising #patent
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
The Far-Right Helped Create The World's Most Powerful Facial Recognition Technology
Clearview AI, which has alarmed privacy experts, hired several far-right employees, a HuffPost investigation found.
Advanced facial recognition technology poses a mortal threat to privacy. It could grant the government, corporations and even average citizens the ability to capture a photo of anybody and, with a few keystrokes, uncover all kinds of personal details. So when The New York Times published an exposΓ© about a shadowy facial recognition firm called Clearview AI in January, it seemed like the worst nightmare of privacy advocates had arrived.
Clearview is the most powerful form of facial recognition technology ever created, according to the Times. With more than 3 billion photos scraped surreptitiously from social media profiles and websites, its image database is almost seven times the size of the FBIβs. Its mobile app can match names to faces with a tap of a touchscreen. The technology is already being integrated into augmented reality glasses so people can identify almost anyone they look at.
Clearview has contracts with Immigration and Customs Enforcement and the U.S. Attorneyβs Office for the Southern District of New York, BuzzFeed reported earlier this year, and FBI agents, members of Customs and Border Protection, and hundreds of police officers at departments nationwide are among its users.
With the coronavirus pandemic increasingly throwing the country into chaos and President Donald Trump moving to expand domestic surveillance powers β in theory, to better map disease spread β Clearview has sought deeper inroads into government infrastructure and is now in discussions with state agencies to use its technology to track infected people, according to The Wall Street Journal.
Read more:
https://www.huffpost.com/entry/clearview-ai-facial-recognition-alt-right_n_5e7d028bc5b6cb08a92a5c48
https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
#clearview #facial #recognition #technology #privacy #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Clearview AI, which has alarmed privacy experts, hired several far-right employees, a HuffPost investigation found.
Advanced facial recognition technology poses a mortal threat to privacy. It could grant the government, corporations and even average citizens the ability to capture a photo of anybody and, with a few keystrokes, uncover all kinds of personal details. So when The New York Times published an exposΓ© about a shadowy facial recognition firm called Clearview AI in January, it seemed like the worst nightmare of privacy advocates had arrived.
Clearview is the most powerful form of facial recognition technology ever created, according to the Times. With more than 3 billion photos scraped surreptitiously from social media profiles and websites, its image database is almost seven times the size of the FBIβs. Its mobile app can match names to faces with a tap of a touchscreen. The technology is already being integrated into augmented reality glasses so people can identify almost anyone they look at.
Clearview has contracts with Immigration and Customs Enforcement and the U.S. Attorneyβs Office for the Southern District of New York, BuzzFeed reported earlier this year, and FBI agents, members of Customs and Border Protection, and hundreds of police officers at departments nationwide are among its users.
With the coronavirus pandemic increasingly throwing the country into chaos and President Donald Trump moving to expand domestic surveillance powers β in theory, to better map disease spread β Clearview has sought deeper inroads into government infrastructure and is now in discussions with state agencies to use its technology to track infected people, according to The Wall Street Journal.
Read more:
https://www.huffpost.com/entry/clearview-ai-facial-recognition-alt-right_n_5e7d028bc5b6cb08a92a5c48
https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
#clearview #facial #recognition #technology #privacy #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Your car is stealing your data. Hereβs how ... π
We all know that social media apps collect our data to sell to advertisers. You web browser and websites use algorithms to tailor content and advertisements to you. But is you car doing that too? Join Nolan as he explores the sketchy world of automotive data collection. The answer may surprise you.
https://invidio.us/watch?v=SpbpD0qDSho
#data #collection #privacy #surveillance #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
We all know that social media apps collect our data to sell to advertisers. You web browser and websites use algorithms to tailor content and advertisements to you. But is you car doing that too? Join Nolan as he explores the sketchy world of automotive data collection. The answer may surprise you.
https://invidio.us/watch?v=SpbpD0qDSho
#data #collection #privacy #surveillance #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Madaidan's insecurities
This website contains a lot of information on certain security-related topics and aims to dispell common misinformation. I was requested by various people to create a website with all my opinions so here it is.
ππΌ Android
ππΌ Linux
ππΌ Linux Phones
ππΌ Firefox and Chromium Security
ππΌ OpenBSD
ππΌ VPNs
ππΌ About
https://madaidans-insecurities.github.io/
#madaidan #insecurities #information #android #linux #ff #chrome #bsd #vpn #thinkabout
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
This website contains a lot of information on certain security-related topics and aims to dispell common misinformation. I was requested by various people to create a website with all my opinions so here it is.
ππΌ Android
ππΌ Linux
ππΌ Linux Phones
ππΌ Firefox and Chromium Security
ππΌ OpenBSD
ππΌ VPNs
ππΌ About
https://madaidans-insecurities.github.io/
#madaidan #insecurities #information #android #linux #ff #chrome #bsd #vpn #thinkabout
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Ransomware scumbags leak Boeing, Lockheed Martin, SpaceX documents after contractor refuses to pay
Anti-mortar system specs, legal paperwork, payment forms, and more, dumped online from infected PCs
Internal confidential documents belonging to some of the largest aerospace companies in the world have been stolen from an industrial contractor and leaked online.
The data was pilfered and dumped on the internet by the criminals behind the DoppelPaymer Windows ransomware, in retaliation for an unpaid extortion demand. The sensitive documents include details of Lockheed-Martin-designed military equipment β such as the specifications for an antenna in an anti-mortar defense system β according to a Register source who alerted us to the blueprints.
Other documents in the cache include billing and payment forms, supplier information, data analysis reports, and legal paperwork. There are also documents outlining SpaceX's manufacturing partner program.
The files were siphoned from Visser Precision by the DoppelPaymer crew, which infected the contractor's PCs and scrambled its files. When the company failed to pay the ransom by their March deadline, the gang β which tends to demand hundreds of thousands to millions of dollars to restore encrypted files β uploaded a selection of the documents to a website that remains online and publicly accessible.
ππΌ Read more:
https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/
#ransomware #leak #DoppelPaymer
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Anti-mortar system specs, legal paperwork, payment forms, and more, dumped online from infected PCs
Internal confidential documents belonging to some of the largest aerospace companies in the world have been stolen from an industrial contractor and leaked online.
The data was pilfered and dumped on the internet by the criminals behind the DoppelPaymer Windows ransomware, in retaliation for an unpaid extortion demand. The sensitive documents include details of Lockheed-Martin-designed military equipment β such as the specifications for an antenna in an anti-mortar defense system β according to a Register source who alerted us to the blueprints.
Other documents in the cache include billing and payment forms, supplier information, data analysis reports, and legal paperwork. There are also documents outlining SpaceX's manufacturing partner program.
The files were siphoned from Visser Precision by the DoppelPaymer crew, which infected the contractor's PCs and scrambled its files. When the company failed to pay the ransom by their March deadline, the gang β which tends to demand hundreds of thousands to millions of dollars to restore encrypted files β uploaded a selection of the documents to a website that remains online and publicly accessible.
ππΌ Read more:
https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/
#ransomware #leak #DoppelPaymer
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
"Dopamine": Miniseries about the addiction mechanisms of Tinder, Facebook and Co. (RePost)
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
πΊ Dopamine - Tinder
πΊ Dopamine - Facebook
πΊ Dopamine - Candy Crush
πΊ Dopamine - Instagram
πΊ Dopamine - YouTube
πΊ Dopamine - Snapchat
πΊ Dopamine - Uber
πΊ Dopamine - Twitter
π‘ Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?
#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
πΊ Dopamine - Tinder
πΊ Dopamine - Facebook
πΊ Dopamine - Candy Crush
πΊ Dopamine - Instagram
πΊ Dopamine - YouTube
πΊ Dopamine - Snapchat
πΊ Dopamine - Uber
πΊ Dopamine - Twitter
π‘ Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?
#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π‘@FLOSSb0xIN
Apple, Google team up to track Coronavirus spread as some official Govt apps are already doing it
Apple and Google announced Friday an unusual collaboration to leverage smartphone technology to help trace and contain the spread of coronavirus.
The collaboration will open up their mobile operating systems to allow for the creation of advanced βcontact-tracingβ apps, which will run on iPhones and Android phones alike.
So how will Bluetooth tracing work on Android and iOS phones ?
Both Apple and Google have put out details on the Bluetooth technical specifications and how this technology will work with contact tracing. The technology will work on both Android and iOS.
First, the user will have to give explicit and clear permission that they are opting-in for this kind of contact tracing, according to the companies. Exactly how this permission will be taken is not clear, but it could be within the app they use.
If this is at the software level, pushing out the iOS update will be easier given most phones are on the latest version and Apple has tighter control over the ecosystem. But in the fragmented Android universe, it is not clear how this update will reach all smartphones.
ππΌ Read more:
https://telegra.ph/Apple-Google-team-up-to-track-coronavirus-spread-as-already-some-official-Govt-apps-doing-04-11
#apple #google #coronavirus #tracking #privacy
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Apple and Google announced Friday an unusual collaboration to leverage smartphone technology to help trace and contain the spread of coronavirus.
The collaboration will open up their mobile operating systems to allow for the creation of advanced βcontact-tracingβ apps, which will run on iPhones and Android phones alike.
So how will Bluetooth tracing work on Android and iOS phones ?
Both Apple and Google have put out details on the Bluetooth technical specifications and how this technology will work with contact tracing. The technology will work on both Android and iOS.
First, the user will have to give explicit and clear permission that they are opting-in for this kind of contact tracing, according to the companies. Exactly how this permission will be taken is not clear, but it could be within the app they use.
If this is at the software level, pushing out the iOS update will be easier given most phones are on the latest version and Apple has tighter control over the ecosystem. But in the fragmented Android universe, it is not clear how this update will reach all smartphones.
ππΌ Read more:
https://telegra.ph/Apple-Google-team-up-to-track-coronavirus-spread-as-already-some-official-Govt-apps-doing-04-11
#apple #google #coronavirus #tracking #privacy
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Zuckerberg's personal security costs Facebook millions of dollars
Facebook reports rising costs for Mark Zuckerberg's bodyguards and private jets.
Facebook has spent more than $23 million in 2019 on personal security and flights in private jets of its CEO Mark Zuckerberg. This is the result of a mandatory disclosure of the company to the US Securities and Exchange Commission (SEC).
In 2018, Facebook paid about $20 million for these purposes; in 2017, it paid $9.1 million. Zuckerberg's annual salary remains $1. Expenditures include "$10.46 million related to personal security for Zuckerberg at home and travel.
An additional $10 million was required to protect Zuckerberg and his family. For comparison, Facebook spent $9.95 million on personal protection in 2018 and $7.5 million in 2017.
π‘ https://www.sec.gov/Archives/edgar/data/1326801/000132680120000037/facebook2020definitiveprox.htm#sF199B9027C8357DCA91270FD24840CBA
#DeleteFacebook #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Facebook reports rising costs for Mark Zuckerberg's bodyguards and private jets.
Facebook has spent more than $23 million in 2019 on personal security and flights in private jets of its CEO Mark Zuckerberg. This is the result of a mandatory disclosure of the company to the US Securities and Exchange Commission (SEC).
In 2018, Facebook paid about $20 million for these purposes; in 2017, it paid $9.1 million. Zuckerberg's annual salary remains $1. Expenditures include "$10.46 million related to personal security for Zuckerberg at home and travel.
An additional $10 million was required to protect Zuckerberg and his family. For comparison, Facebook spent $9.95 million on personal protection in 2018 and $7.5 million in 2017.
π‘ https://www.sec.gov/Archives/edgar/data/1326801/000132680120000037/facebook2020definitiveprox.htm#sF199B9027C8357DCA91270FD24840CBA
#DeleteFacebook #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Corona World Order
Some are suggesting that the current crisis is the end of globalization, or that it will wipe out the New World Order altogether . . . but they are wrong. In fact, this crisis is the globalistsβ dream, and what we are witnessing is the birth of a totalitarian control grid the likes of which could scarcely have been imagined before this pandemic panic kicked off. Welcome to the Corona World Order.
πΊ Watch this video on BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/corona-world-order/
#corbettreport #coronavirus #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN
Some are suggesting that the current crisis is the end of globalization, or that it will wipe out the New World Order altogether . . . but they are wrong. In fact, this crisis is the globalistsβ dream, and what we are witnessing is the birth of a totalitarian control grid the likes of which could scarcely have been imagined before this pandemic panic kicked off. Welcome to the Corona World Order.
πΊ Watch this video on BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/corona-world-order/
#corbettreport #coronavirus #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@FLOSSb0xIN