Media is too big
VIEW IN TELEGRAM
Corona crisis: EU evaluates contact blocks with mobile phone data
COVID-19 - Mobile phone location datas - Q&A
https://audiovisual.ec.europa.eu/en/video/I-187513
#coronavirus #privacy #eu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
COVID-19 - Mobile phone location datas - Q&A
https://audiovisual.ec.europa.eu/en/video/I-187513
#coronavirus #privacy #eu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
42 million Iranian “Telegram” user IDs and phone numbers leaked online
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
42 million records from a third-party version of messaging app Telegram used in Iran was exposed on the web without any authentication required to access it. Comparitech worked with security researcher Bob Diachenko to uncover and report the exposure, which included usernames and phone numbers, among other data.
The data was posted by a group called “Hunting system” (translated from Farsi) on an Elasticsearch cluster that required no password nor any other authentication to access. It was removed after Diachenko reported the incident to the hosting provider on March 25.
Telegram says the data came from an unofficial “fork” of Telegram, a version of the app unaffiliated with the company. Telegram is an open-source app, allowing third parties to make their own versions of it. Because the official Telegram app is frequently blocked in Iran, many users flock to unofficial versions.
A Telegram spokesperson told Comparitech, “We can confirm that the data seems to have originated from third-party forks extracting user contacts. Unfortunately, despite our warnings, people in Iran are still using unverified apps. Telegram apps are open source, so it’s important to use our official apps that support verifiable builds.”
👉🏼 Read more:
https://www.comparitech.com/blog/information-security/iranian-telegram-accounts-leaked/
#leak #Iran #telegram
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
42 million records from a third-party version of messaging app Telegram used in Iran was exposed on the web without any authentication required to access it. Comparitech worked with security researcher Bob Diachenko to uncover and report the exposure, which included usernames and phone numbers, among other data.
The data was posted by a group called “Hunting system” (translated from Farsi) on an Elasticsearch cluster that required no password nor any other authentication to access. It was removed after Diachenko reported the incident to the hosting provider on March 25.
Telegram says the data came from an unofficial “fork” of Telegram, a version of the app unaffiliated with the company. Telegram is an open-source app, allowing third parties to make their own versions of it. Because the official Telegram app is frequently blocked in Iran, many users flock to unofficial versions.
A Telegram spokesperson told Comparitech, “We can confirm that the data seems to have originated from third-party forks extracting user contacts. Unfortunately, despite our warnings, people in Iran are still using unverified apps. Telegram apps are open source, so it’s important to use our official apps that support verifiable builds.”
👉🏼 Read more:
https://www.comparitech.com/blog/information-security/iranian-telegram-accounts-leaked/
#leak #Iran #telegram
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Mozilla shares telemetry data on the corona crisis
The Firefox manufacturer wants to support research into the coronavirus pandemic with this
The browser manufacturer Mozilla has recorded a significant increase in the number of its daily users of Firefox on the desktop in the past days and weeks. The company attributes this increase to the corona crisis and the associated measures for so-called social or physical distancing. Mozilla is therefore now releasing this data for research, as the company announces in its data blog.
👉🏼 Read more:
https://blog.mozilla.org/data/2020/03/30/opening-data-to-understand-social-distancing/
https://www.golem.de/news/social-distancing-mozilla-teilt-telemetrie-daten-zur-coronakrise-2003-147610.html
#mozilla #firefox #browser #telemetry #coronavirus
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The Firefox manufacturer wants to support research into the coronavirus pandemic with this
The browser manufacturer Mozilla has recorded a significant increase in the number of its daily users of Firefox on the desktop in the past days and weeks. The company attributes this increase to the corona crisis and the associated measures for so-called social or physical distancing. Mozilla is therefore now releasing this data for research, as the company announces in its data blog.
👉🏼 Read more:
https://blog.mozilla.org/data/2020/03/30/opening-data-to-understand-social-distancing/
https://www.golem.de/news/social-distancing-mozilla-teilt-telemetrie-daten-zur-coronakrise-2003-147610.html
#mozilla #firefox #browser #telemetry #coronavirus
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
‘Dictatorships often start in the face of a threat’: UN privacy chief warns against long-lasting theft of freedoms amid coronavirus surveillance
Strict surveillance measures adopted to monitor citizens during coronavirus lockdowns could result in the long-lasting theft of personal freedoms, the United Nations’ privacy chief has warned.
“Dictatorships and authoritarian societies often start in the face of a threat,” Joseph Cannataci, the UN special rapporteur on the right to privacy told the Thomson Reuters Foundation.
“That is why it is important to be vigilant today and not give away all our freedoms”.
The coronavirus pandemic has led governments to declare themselves essentially on a war footing – with many politicians referencing an “invisible” enemy or attacker.
At the advice of health experts, even countries regarded as the world’s most liberal democracies have enforced quarantine measures thought unthinkable mere weeks ago.
👉🏽 Read more:
https://www.independent.co.uk/news/world/coronavirus-lockdown-surveillance-tracking-dictatorship-authoritarian-united-nations-privacy-a9438561.html
#surveillance #dictatorship #coronavirus #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Strict surveillance measures adopted to monitor citizens during coronavirus lockdowns could result in the long-lasting theft of personal freedoms, the United Nations’ privacy chief has warned.
“Dictatorships and authoritarian societies often start in the face of a threat,” Joseph Cannataci, the UN special rapporteur on the right to privacy told the Thomson Reuters Foundation.
“That is why it is important to be vigilant today and not give away all our freedoms”.
The coronavirus pandemic has led governments to declare themselves essentially on a war footing – with many politicians referencing an “invisible” enemy or attacker.
At the advice of health experts, even countries regarded as the world’s most liberal democracies have enforced quarantine measures thought unthinkable mere weeks ago.
👉🏽 Read more:
https://www.independent.co.uk/news/world/coronavirus-lockdown-surveillance-tracking-dictatorship-authoritarian-united-nations-privacy-a9438561.html
#surveillance #dictatorship #coronavirus #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Chaos Colloquium #1 - Dr. Roland van Rijswijk-Deij on DNS privacy and security
Post-Snowden, privacy became a prime focus of the IETF, and let to the improvement of a number of Internet protocols. Among these protocols is the Domain Name System, which maps human readable names to machine readable addresses.
The original DNS protocol communicates mostly in plain text over UDP, making it highly susceptible to eavesdropping. Since knowing what names a person queries for is highly revealing about their Internet surfing behaviour, the IETF decided to address the privacy shortcomings of the DNS. Initially, this led to the standardisation of DNS-over-TLS (DoT), and more recently, the standardisation of DNS-over-HTTPS (DoH).
https://media.ccc.de/v/chaoscolloquium-1-dns-privacy-security
#ccc #Colloquium #DNS #privacy #security #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Post-Snowden, privacy became a prime focus of the IETF, and let to the improvement of a number of Internet protocols. Among these protocols is the Domain Name System, which maps human readable names to machine readable addresses.
The original DNS protocol communicates mostly in plain text over UDP, making it highly susceptible to eavesdropping. Since knowing what names a person queries for is highly revealing about their Internet surfing behaviour, the IETF decided to address the privacy shortcomings of the DNS. Initially, this led to the standardisation of DNS-over-TLS (DoT), and more recently, the standardisation of DNS-over-HTTPS (DoH).
https://media.ccc.de/v/chaoscolloquium-1-dns-privacy-security
#ccc #Colloquium #DNS #privacy #security #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
What is Pastejacking? | Exploiting machine using pastejacking
What is Pastejacking?
Nearly all browsers allow websites to run commands on the users’ computers. This feature can allow malicious websites to take over your computers’ clipboard. That is, when you copy something and paste it to your clipboard, the website can run one or more commands using your browser. The method can be used to change the Clipboard contents. While it may not be much dangerous if you are just copying to Notepad or Word etc. , it could be a problem for your computer if you paste something directly to the Command Prompt.
https://invidio.us/watch?v=4KNKGLS0nx0&feature=youtu.be&local=true
https://www.thewindowsclub.com/what-is-pastejacking
#pastejacking #exploiting #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
What is Pastejacking?
Nearly all browsers allow websites to run commands on the users’ computers. This feature can allow malicious websites to take over your computers’ clipboard. That is, when you copy something and paste it to your clipboard, the website can run one or more commands using your browser. The method can be used to change the Clipboard contents. While it may not be much dangerous if you are just copying to Notepad or Word etc. , it could be a problem for your computer if you paste something directly to the Command Prompt.
https://invidio.us/watch?v=4KNKGLS0nx0&feature=youtu.be&local=true
https://www.thewindowsclub.com/what-is-pastejacking
#pastejacking #exploiting #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Crypto money for watching commercials: That's what's behind the Microsoft idea
Microsoft has patented a new approach for cryptomining. According to this approach, users are to be rewarded with digital currency, for example, for watching advertisements.
Mining crypto-currencies requires powerful hardware and requires a corresponding amount of energy. No wonder that professional miners join together to form large pools or farms and operate in countries where electricity is cheap. For private users it is usually not very lucrative to mine. This could change if Microsoft were to put its patent-pending cryptomining solution into practice.
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
https://t3n.de/news/kryptogeld-werbung-microsoft-1269724/
#crypto #microsoft #mining #advertising #patent
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Microsoft has patented a new approach for cryptomining. According to this approach, users are to be rewarded with digital currency, for example, for watching advertisements.
Mining crypto-currencies requires powerful hardware and requires a corresponding amount of energy. No wonder that professional miners join together to form large pools or farms and operate in countries where electricity is cheap. For private users it is usually not very lucrative to mine. This could change if Microsoft were to put its patent-pending cryptomining solution into practice.
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
https://t3n.de/news/kryptogeld-werbung-microsoft-1269724/
#crypto #microsoft #mining #advertising #patent
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The Far-Right Helped Create The World's Most Powerful Facial Recognition Technology
Clearview AI, which has alarmed privacy experts, hired several far-right employees, a HuffPost investigation found.
Advanced facial recognition technology poses a mortal threat to privacy. It could grant the government, corporations and even average citizens the ability to capture a photo of anybody and, with a few keystrokes, uncover all kinds of personal details. So when The New York Times published an exposé about a shadowy facial recognition firm called Clearview AI in January, it seemed like the worst nightmare of privacy advocates had arrived.
Clearview is the most powerful form of facial recognition technology ever created, according to the Times. With more than 3 billion photos scraped surreptitiously from social media profiles and websites, its image database is almost seven times the size of the FBI’s. Its mobile app can match names to faces with a tap of a touchscreen. The technology is already being integrated into augmented reality glasses so people can identify almost anyone they look at.
Clearview has contracts with Immigration and Customs Enforcement and the U.S. Attorney’s Office for the Southern District of New York, BuzzFeed reported earlier this year, and FBI agents, members of Customs and Border Protection, and hundreds of police officers at departments nationwide are among its users.
With the coronavirus pandemic increasingly throwing the country into chaos and President Donald Trump moving to expand domestic surveillance powers ― in theory, to better map disease spread ― Clearview has sought deeper inroads into government infrastructure and is now in discussions with state agencies to use its technology to track infected people, according to The Wall Street Journal.
Read more:
https://www.huffpost.com/entry/clearview-ai-facial-recognition-alt-right_n_5e7d028bc5b6cb08a92a5c48
https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
#clearview #facial #recognition #technology #privacy #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Clearview AI, which has alarmed privacy experts, hired several far-right employees, a HuffPost investigation found.
Advanced facial recognition technology poses a mortal threat to privacy. It could grant the government, corporations and even average citizens the ability to capture a photo of anybody and, with a few keystrokes, uncover all kinds of personal details. So when The New York Times published an exposé about a shadowy facial recognition firm called Clearview AI in January, it seemed like the worst nightmare of privacy advocates had arrived.
Clearview is the most powerful form of facial recognition technology ever created, according to the Times. With more than 3 billion photos scraped surreptitiously from social media profiles and websites, its image database is almost seven times the size of the FBI’s. Its mobile app can match names to faces with a tap of a touchscreen. The technology is already being integrated into augmented reality glasses so people can identify almost anyone they look at.
Clearview has contracts with Immigration and Customs Enforcement and the U.S. Attorney’s Office for the Southern District of New York, BuzzFeed reported earlier this year, and FBI agents, members of Customs and Border Protection, and hundreds of police officers at departments nationwide are among its users.
With the coronavirus pandemic increasingly throwing the country into chaos and President Donald Trump moving to expand domestic surveillance powers ― in theory, to better map disease spread ― Clearview has sought deeper inroads into government infrastructure and is now in discussions with state agencies to use its technology to track infected people, according to The Wall Street Journal.
Read more:
https://www.huffpost.com/entry/clearview-ai-facial-recognition-alt-right_n_5e7d028bc5b6cb08a92a5c48
https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
#clearview #facial #recognition #technology #privacy #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Your car is stealing your data. Here’s how ... 👀
We all know that social media apps collect our data to sell to advertisers. You web browser and websites use algorithms to tailor content and advertisements to you. But is you car doing that too? Join Nolan as he explores the sketchy world of automotive data collection. The answer may surprise you.
https://invidio.us/watch?v=SpbpD0qDSho
#data #collection #privacy #surveillance #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
We all know that social media apps collect our data to sell to advertisers. You web browser and websites use algorithms to tailor content and advertisements to you. But is you car doing that too? Join Nolan as he explores the sketchy world of automotive data collection. The answer may surprise you.
https://invidio.us/watch?v=SpbpD0qDSho
#data #collection #privacy #surveillance #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Madaidan's insecurities
This website contains a lot of information on certain security-related topics and aims to dispell common misinformation. I was requested by various people to create a website with all my opinions so here it is.
👉🏼 Android
👉🏼 Linux
👉🏼 Linux Phones
👉🏼 Firefox and Chromium Security
👉🏼 OpenBSD
👉🏼 VPNs
👉🏼 About
https://madaidans-insecurities.github.io/
#madaidan #insecurities #information #android #linux #ff #chrome #bsd #vpn #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
This website contains a lot of information on certain security-related topics and aims to dispell common misinformation. I was requested by various people to create a website with all my opinions so here it is.
👉🏼 Android
👉🏼 Linux
👉🏼 Linux Phones
👉🏼 Firefox and Chromium Security
👉🏼 OpenBSD
👉🏼 VPNs
👉🏼 About
https://madaidans-insecurities.github.io/
#madaidan #insecurities #information #android #linux #ff #chrome #bsd #vpn #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Ransomware scumbags leak Boeing, Lockheed Martin, SpaceX documents after contractor refuses to pay
Anti-mortar system specs, legal paperwork, payment forms, and more, dumped online from infected PCs
Internal confidential documents belonging to some of the largest aerospace companies in the world have been stolen from an industrial contractor and leaked online.
The data was pilfered and dumped on the internet by the criminals behind the DoppelPaymer Windows ransomware, in retaliation for an unpaid extortion demand. The sensitive documents include details of Lockheed-Martin-designed military equipment – such as the specifications for an antenna in an anti-mortar defense system – according to a Register source who alerted us to the blueprints.
Other documents in the cache include billing and payment forms, supplier information, data analysis reports, and legal paperwork. There are also documents outlining SpaceX's manufacturing partner program.
The files were siphoned from Visser Precision by the DoppelPaymer crew, which infected the contractor's PCs and scrambled its files. When the company failed to pay the ransom by their March deadline, the gang – which tends to demand hundreds of thousands to millions of dollars to restore encrypted files – uploaded a selection of the documents to a website that remains online and publicly accessible.
👉🏼 Read more:
https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/
#ransomware #leak #DoppelPaymer
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Anti-mortar system specs, legal paperwork, payment forms, and more, dumped online from infected PCs
Internal confidential documents belonging to some of the largest aerospace companies in the world have been stolen from an industrial contractor and leaked online.
The data was pilfered and dumped on the internet by the criminals behind the DoppelPaymer Windows ransomware, in retaliation for an unpaid extortion demand. The sensitive documents include details of Lockheed-Martin-designed military equipment – such as the specifications for an antenna in an anti-mortar defense system – according to a Register source who alerted us to the blueprints.
Other documents in the cache include billing and payment forms, supplier information, data analysis reports, and legal paperwork. There are also documents outlining SpaceX's manufacturing partner program.
The files were siphoned from Visser Precision by the DoppelPaymer crew, which infected the contractor's PCs and scrambled its files. When the company failed to pay the ransom by their March deadline, the gang – which tends to demand hundreds of thousands to millions of dollars to restore encrypted files – uploaded a selection of the documents to a website that remains online and publicly accessible.
👉🏼 Read more:
https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/
#ransomware #leak #DoppelPaymer
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
"Dopamine": Miniseries about the addiction mechanisms of Tinder, Facebook and Co. (RePost)
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
📺 Dopamine - Tinder
📺 Dopamine - Facebook
📺 Dopamine - Candy Crush
📺 Dopamine - Instagram
📺 Dopamine - YouTube
📺 Dopamine - Snapchat
📺 Dopamine - Uber
📺 Dopamine - Twitter
💡 Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?
#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
"They'll do anything to make you an addict," they say about #Tinder, #Facebook, #CandyCrush, #Instagram, #YouTube, #Snapchat, #Uber and #Twitter in the miniseries of #Arte. Eight episodes explain in detail which mechanisms are triggered in our brain to keep us engaged
📺 Dopamine - Tinder
📺 Dopamine - Facebook
📺 Dopamine - Candy Crush
📺 Dopamine - Instagram
📺 Dopamine - YouTube
📺 Dopamine - Snapchat
📺 Dopamine - Uber
📺 Dopamine - Twitter
💡 Actually, we have known this for a long time:
Candy Crush, Tinder, Facebook and others are above all one thing - time wasters. Nevertheless, it's extremely difficult for us to leave the #Smartphone on the shelf and not check out what's new every few minutes. Especially since what is then presented to us as news only rarely has news value or really gets us ahead. Nevertheless, we check out pages and pages of Aunt Monika's pictures from Paris, swear to complete "only one more level" at Candy Crush, let ourselves be carried away by the autoplay function into ever more abstruse depths of Youtube and simply can't get enough of cute cat photos on Instagram. What's wrong with us?
#Tinder #Facebook #CandyCrush #Instagram #YouTube #Snapchat #Uber #Twitter #Dopamine #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Apple, Google team up to track Coronavirus spread as some official Govt apps are already doing it
Apple and Google announced Friday an unusual collaboration to leverage smartphone technology to help trace and contain the spread of coronavirus.
The collaboration will open up their mobile operating systems to allow for the creation of advanced “contact-tracing” apps, which will run on iPhones and Android phones alike.
So how will Bluetooth tracing work on Android and iOS phones ?
Both Apple and Google have put out details on the Bluetooth technical specifications and how this technology will work with contact tracing. The technology will work on both Android and iOS.
First, the user will have to give explicit and clear permission that they are opting-in for this kind of contact tracing, according to the companies. Exactly how this permission will be taken is not clear, but it could be within the app they use.
If this is at the software level, pushing out the iOS update will be easier given most phones are on the latest version and Apple has tighter control over the ecosystem. But in the fragmented Android universe, it is not clear how this update will reach all smartphones.
👉🏼 Read more:
https://telegra.ph/Apple-Google-team-up-to-track-coronavirus-spread-as-already-some-official-Govt-apps-doing-04-11
#apple #google #coronavirus #tracking #privacy
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Apple and Google announced Friday an unusual collaboration to leverage smartphone technology to help trace and contain the spread of coronavirus.
The collaboration will open up their mobile operating systems to allow for the creation of advanced “contact-tracing” apps, which will run on iPhones and Android phones alike.
So how will Bluetooth tracing work on Android and iOS phones ?
Both Apple and Google have put out details on the Bluetooth technical specifications and how this technology will work with contact tracing. The technology will work on both Android and iOS.
First, the user will have to give explicit and clear permission that they are opting-in for this kind of contact tracing, according to the companies. Exactly how this permission will be taken is not clear, but it could be within the app they use.
If this is at the software level, pushing out the iOS update will be easier given most phones are on the latest version and Apple has tighter control over the ecosystem. But in the fragmented Android universe, it is not clear how this update will reach all smartphones.
👉🏼 Read more:
https://telegra.ph/Apple-Google-team-up-to-track-coronavirus-spread-as-already-some-official-Govt-apps-doing-04-11
#apple #google #coronavirus #tracking #privacy
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Zuckerberg's personal security costs Facebook millions of dollars
Facebook reports rising costs for Mark Zuckerberg's bodyguards and private jets.
Facebook has spent more than $23 million in 2019 on personal security and flights in private jets of its CEO Mark Zuckerberg. This is the result of a mandatory disclosure of the company to the US Securities and Exchange Commission (SEC).
In 2018, Facebook paid about $20 million for these purposes; in 2017, it paid $9.1 million. Zuckerberg's annual salary remains $1. Expenditures include "$10.46 million related to personal security for Zuckerberg at home and travel.
An additional $10 million was required to protect Zuckerberg and his family. For comparison, Facebook spent $9.95 million on personal protection in 2018 and $7.5 million in 2017.
💡 https://www.sec.gov/Archives/edgar/data/1326801/000132680120000037/facebook2020definitiveprox.htm#sF199B9027C8357DCA91270FD24840CBA
#DeleteFacebook #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Facebook reports rising costs for Mark Zuckerberg's bodyguards and private jets.
Facebook has spent more than $23 million in 2019 on personal security and flights in private jets of its CEO Mark Zuckerberg. This is the result of a mandatory disclosure of the company to the US Securities and Exchange Commission (SEC).
In 2018, Facebook paid about $20 million for these purposes; in 2017, it paid $9.1 million. Zuckerberg's annual salary remains $1. Expenditures include "$10.46 million related to personal security for Zuckerberg at home and travel.
An additional $10 million was required to protect Zuckerberg and his family. For comparison, Facebook spent $9.95 million on personal protection in 2018 and $7.5 million in 2017.
💡 https://www.sec.gov/Archives/edgar/data/1326801/000132680120000037/facebook2020definitiveprox.htm#sF199B9027C8357DCA91270FD24840CBA
#DeleteFacebook #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Corona World Order
Some are suggesting that the current crisis is the end of globalization, or that it will wipe out the New World Order altogether . . . but they are wrong. In fact, this crisis is the globalists’ dream, and what we are witnessing is the birth of a totalitarian control grid the likes of which could scarcely have been imagined before this pandemic panic kicked off. Welcome to the Corona World Order.
📺 Watch this video on BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/corona-world-order/
#corbettreport #coronavirus #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Some are suggesting that the current crisis is the end of globalization, or that it will wipe out the New World Order altogether . . . but they are wrong. In fact, this crisis is the globalists’ dream, and what we are witnessing is the birth of a totalitarian control grid the likes of which could scarcely have been imagined before this pandemic panic kicked off. Welcome to the Corona World Order.
📺 Watch this video on BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/corona-world-order/
#corbettreport #coronavirus #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Reasons not to use the Discord communications system
The Discord communications system requires running a nonfree client program. That alone is reason to refuse to use it.
❗️ The program reportedly collects lots of data about users.
❗️ The developer denies the claim that Discord reports which processes are running on the user's machine. I have no way of determining the facts about this specific point. Whether it collects those particular data is a minor detail; I mention it only to avoid appearing to assert a criticism that might not be true.
❗️ For the same reason, I mention that selling personal data is not the sole way that the company makes money.
❗️ I don't think that question how it makes money really matters. What matters, ethically, is what the software does to users.
❗️ The developers' motives for making it do those things are pertinent to understanding the situation but should not affect our moral judgment of mistreatment of users.
❗️ One user quit using Discord because it demanded she fill out a Google reCAPTCHA, apparently because she was connecting through Tor.
❗️ Google CAPTCHAs didn't work for me, because they required running nonfree Javascript code.
❗️ Discord insists on tracking users. If a user connects through a VPN, Discord demands that user provide a phone number.
❗️ Discord locks accounts that don't have associated phone numbers. When an account is locked, also called "deactivated", the user is not allowed to make real use of it until person adds a phone number.
Discord may demand to talk with you by phone if it decides you are suspicious — for instance, if you contact it via Tor.
❗️ If I understand right, if you use Discord regularly via Tor you would need to carry that phone with you all the time. A burner phone, one what you possess only for a short time, would not be allowed to do the job.
❗️ Thus, whoever uses Discord gets tracked either by the Discord server (and anyone looking at where the packets are coming from) or by the phone.
❗️ Users report that Discord shut off their accounts and won't tell them why.
The Discord web site also offers application nonfree programs. You shouldn't use them, naturally, but they are a separate issue from using the communications system itself.
💡 Reasons not to use the Discord communications system
https://stallman.org/discord.html
#stallman #discord
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The Discord communications system requires running a nonfree client program. That alone is reason to refuse to use it.
❗️ The program reportedly collects lots of data about users.
❗️ The developer denies the claim that Discord reports which processes are running on the user's machine. I have no way of determining the facts about this specific point. Whether it collects those particular data is a minor detail; I mention it only to avoid appearing to assert a criticism that might not be true.
❗️ For the same reason, I mention that selling personal data is not the sole way that the company makes money.
❗️ I don't think that question how it makes money really matters. What matters, ethically, is what the software does to users.
❗️ The developers' motives for making it do those things are pertinent to understanding the situation but should not affect our moral judgment of mistreatment of users.
❗️ One user quit using Discord because it demanded she fill out a Google reCAPTCHA, apparently because she was connecting through Tor.
❗️ Google CAPTCHAs didn't work for me, because they required running nonfree Javascript code.
❗️ Discord insists on tracking users. If a user connects through a VPN, Discord demands that user provide a phone number.
❗️ Discord locks accounts that don't have associated phone numbers. When an account is locked, also called "deactivated", the user is not allowed to make real use of it until person adds a phone number.
Discord may demand to talk with you by phone if it decides you are suspicious — for instance, if you contact it via Tor.
❗️ If I understand right, if you use Discord regularly via Tor you would need to carry that phone with you all the time. A burner phone, one what you possess only for a short time, would not be allowed to do the job.
❗️ Thus, whoever uses Discord gets tracked either by the Discord server (and anyone looking at where the packets are coming from) or by the phone.
❗️ Users report that Discord shut off their accounts and won't tell them why.
The Discord web site also offers application nonfree programs. You shouldn't use them, naturally, but they are a separate issue from using the communications system itself.
💡 Reasons not to use the Discord communications system
https://stallman.org/discord.html
#stallman #discord
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Interview with Edward Snowden (Vice) - 11 april 2020
https://vid.lelux.fi/videos/watch/dddf5797-d013-4cd7-9766-578ef76a3efa
#snowden #interview #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
https://vid.lelux.fi/videos/watch/dddf5797-d013-4cd7-9766-578ef76a3efa
#snowden #interview #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Simulating Cyberattacks on Nuclear Command and Control
During the height of the Cold War, the biggest fear involved the possibility of mutually assured destruction (MAD) from nuclear warfare. However, in today’s digital world, we find that military and strategic systems are under constant siege from cyber attacks. Within the nuclear realm, the threat of cyber attacks is relatively high due to advanced persistent threats (APTs) from both nation state adversaries as well as non-state actors. The subject paper and corresponding podcast explores the utilization of simulation technology to evaluate cyber attack scenarios on a nuclear command and control (NC2) facility.
https://www.csiac.org/podcast/simulating-cyberattacks-on-nuclear-command-and-control/
#military #cyberattack #simulation #NC2 #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
During the height of the Cold War, the biggest fear involved the possibility of mutually assured destruction (MAD) from nuclear warfare. However, in today’s digital world, we find that military and strategic systems are under constant siege from cyber attacks. Within the nuclear realm, the threat of cyber attacks is relatively high due to advanced persistent threats (APTs) from both nation state adversaries as well as non-state actors. The subject paper and corresponding podcast explores the utilization of simulation technology to evaluate cyber attack scenarios on a nuclear command and control (NC2) facility.
https://www.csiac.org/podcast/simulating-cyberattacks-on-nuclear-command-and-control/
#military #cyberattack #simulation #NC2 #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Palantir - UK government using confidential patient data in coronavirus response
Documents seen by Guardian show tech firms using information to build ‘Covid-19 datastore’
Technology firms are processing large volumes of confidential UK patient information in a data-mining operation that is part of the government’s response to the coronavirus outbreak, according to documents seen by the Guardian.
Palantir, the US big data firm founded by the rightwing billionaire Peter Thiel, is working with Faculty, a British artificial intelligence startup, to consolidate government databases and help ministers and officials respond to the pandemic.
Data is also being used by Faculty to build predictive computer models around the Covid-19 outbreak. One NHS document suggests that, two weeks ago, Faculty considered running a computer simulation to assess the impact of a policy of “targeted herd immunity”. Lawyers for Faculty said the proposed herd immunity simulation never took place.
NHSX, the digital transformation arm of the National Health Service that has contracted the tech companies to help build the “Covid-19 datastore”, said the technology would give ministers and officials “real-time information about health services, showing where demand is rising and where critical equipment needs to be deployed”.
“The companies involved do not control the data and are not permitted to use or share it for their own purposes,” a spokesperson said. Faculty’s lawyers said the firm only had access to aggregated or anonymised data via NHS systems.
The government had previously said it would use Faculty and Palantir in a Covid-19 data project. But the full scope of that operation, and the sensitive nature of patient-level data being used, is revealed in the documents seen by the Guardian.
👉🏼 Read more:
https://www.theguardian.com/world/2020/apr/12/uk-government-using-confidential-patient-data-in-coronavirus-response
#palantir #thiel #BigData #uk #coronavirus #datastore
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Documents seen by Guardian show tech firms using information to build ‘Covid-19 datastore’
Technology firms are processing large volumes of confidential UK patient information in a data-mining operation that is part of the government’s response to the coronavirus outbreak, according to documents seen by the Guardian.
Palantir, the US big data firm founded by the rightwing billionaire Peter Thiel, is working with Faculty, a British artificial intelligence startup, to consolidate government databases and help ministers and officials respond to the pandemic.
Data is also being used by Faculty to build predictive computer models around the Covid-19 outbreak. One NHS document suggests that, two weeks ago, Faculty considered running a computer simulation to assess the impact of a policy of “targeted herd immunity”. Lawyers for Faculty said the proposed herd immunity simulation never took place.
NHSX, the digital transformation arm of the National Health Service that has contracted the tech companies to help build the “Covid-19 datastore”, said the technology would give ministers and officials “real-time information about health services, showing where demand is rising and where critical equipment needs to be deployed”.
“The companies involved do not control the data and are not permitted to use or share it for their own purposes,” a spokesperson said. Faculty’s lawyers said the firm only had access to aggregated or anonymised data via NHS systems.
The government had previously said it would use Faculty and Palantir in a Covid-19 data project. But the full scope of that operation, and the sensitive nature of patient-level data being used, is revealed in the documents seen by the Guardian.
👉🏼 Read more:
https://www.theguardian.com/world/2020/apr/12/uk-government-using-confidential-patient-data-in-coronavirus-response
#palantir #thiel #BigData #uk #coronavirus #datastore
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Want to dodge AI’s prying eyes?
Here’s how, and how not, to evade facial recognition.
Around the world, governments and corporations are rolling out technology that scans faces for unique features and allows them to identify individuals based on that. As facial recognition technology spreads, it seems there’s no hiding from it. Or is there?
We teamed up with a photographer and a makeup artist to try to camouflage POLITICO’s AI correspondent, Janosch Delcker, from the all-seeing eyes of a facial recognition system, with disguises ranging from an old-school balaclava to makeup designed to distort his key facial features. Then we used a free version of Amazon Web Services’ facial recognition software, Rekognition, to compare the photos to a reference.
👉🏼 Read more:
https://www.politico.eu/article/how-to-evade-ai-facial-recognition-surveillance/
#facial #recognition #surveillance
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Here’s how, and how not, to evade facial recognition.
Around the world, governments and corporations are rolling out technology that scans faces for unique features and allows them to identify individuals based on that. As facial recognition technology spreads, it seems there’s no hiding from it. Or is there?
We teamed up with a photographer and a makeup artist to try to camouflage POLITICO’s AI correspondent, Janosch Delcker, from the all-seeing eyes of a facial recognition system, with disguises ranging from an old-school balaclava to makeup designed to distort his key facial features. Then we used a free version of Amazon Web Services’ facial recognition software, Rekognition, to compare the photos to a reference.
👉🏼 Read more:
https://www.politico.eu/article/how-to-evade-ai-facial-recognition-surveillance/
#facial #recognition #surveillance
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN