Media is too big
VIEW IN TELEGRAM
Corona World Order
Some are suggesting that the current crisis is the end of globalization, or that it will wipe out the New World Order altogether . . . but they are wrong. In fact, this crisis is the globalists’ dream, and what we are witnessing is the birth of a totalitarian control grid the likes of which could scarcely have been imagined before this pandemic panic kicked off. Welcome to the Corona World Order.
📺 Watch this video on BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/corona-world-order/
#corbettreport #coronavirus #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Some are suggesting that the current crisis is the end of globalization, or that it will wipe out the New World Order altogether . . . but they are wrong. In fact, this crisis is the globalists’ dream, and what we are witnessing is the birth of a totalitarian control grid the likes of which could scarcely have been imagined before this pandemic panic kicked off. Welcome to the Corona World Order.
📺 Watch this video on BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/corona-world-order/
#corbettreport #coronavirus #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Reasons not to use the Discord communications system
The Discord communications system requires running a nonfree client program. That alone is reason to refuse to use it.
❗️ The program reportedly collects lots of data about users.
❗️ The developer denies the claim that Discord reports which processes are running on the user's machine. I have no way of determining the facts about this specific point. Whether it collects those particular data is a minor detail; I mention it only to avoid appearing to assert a criticism that might not be true.
❗️ For the same reason, I mention that selling personal data is not the sole way that the company makes money.
❗️ I don't think that question how it makes money really matters. What matters, ethically, is what the software does to users.
❗️ The developers' motives for making it do those things are pertinent to understanding the situation but should not affect our moral judgment of mistreatment of users.
❗️ One user quit using Discord because it demanded she fill out a Google reCAPTCHA, apparently because she was connecting through Tor.
❗️ Google CAPTCHAs didn't work for me, because they required running nonfree Javascript code.
❗️ Discord insists on tracking users. If a user connects through a VPN, Discord demands that user provide a phone number.
❗️ Discord locks accounts that don't have associated phone numbers. When an account is locked, also called "deactivated", the user is not allowed to make real use of it until person adds a phone number.
Discord may demand to talk with you by phone if it decides you are suspicious — for instance, if you contact it via Tor.
❗️ If I understand right, if you use Discord regularly via Tor you would need to carry that phone with you all the time. A burner phone, one what you possess only for a short time, would not be allowed to do the job.
❗️ Thus, whoever uses Discord gets tracked either by the Discord server (and anyone looking at where the packets are coming from) or by the phone.
❗️ Users report that Discord shut off their accounts and won't tell them why.
The Discord web site also offers application nonfree programs. You shouldn't use them, naturally, but they are a separate issue from using the communications system itself.
💡 Reasons not to use the Discord communications system
https://stallman.org/discord.html
#stallman #discord
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The Discord communications system requires running a nonfree client program. That alone is reason to refuse to use it.
❗️ The program reportedly collects lots of data about users.
❗️ The developer denies the claim that Discord reports which processes are running on the user's machine. I have no way of determining the facts about this specific point. Whether it collects those particular data is a minor detail; I mention it only to avoid appearing to assert a criticism that might not be true.
❗️ For the same reason, I mention that selling personal data is not the sole way that the company makes money.
❗️ I don't think that question how it makes money really matters. What matters, ethically, is what the software does to users.
❗️ The developers' motives for making it do those things are pertinent to understanding the situation but should not affect our moral judgment of mistreatment of users.
❗️ One user quit using Discord because it demanded she fill out a Google reCAPTCHA, apparently because she was connecting through Tor.
❗️ Google CAPTCHAs didn't work for me, because they required running nonfree Javascript code.
❗️ Discord insists on tracking users. If a user connects through a VPN, Discord demands that user provide a phone number.
❗️ Discord locks accounts that don't have associated phone numbers. When an account is locked, also called "deactivated", the user is not allowed to make real use of it until person adds a phone number.
Discord may demand to talk with you by phone if it decides you are suspicious — for instance, if you contact it via Tor.
❗️ If I understand right, if you use Discord regularly via Tor you would need to carry that phone with you all the time. A burner phone, one what you possess only for a short time, would not be allowed to do the job.
❗️ Thus, whoever uses Discord gets tracked either by the Discord server (and anyone looking at where the packets are coming from) or by the phone.
❗️ Users report that Discord shut off their accounts and won't tell them why.
The Discord web site also offers application nonfree programs. You shouldn't use them, naturally, but they are a separate issue from using the communications system itself.
💡 Reasons not to use the Discord communications system
https://stallman.org/discord.html
#stallman #discord
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Interview with Edward Snowden (Vice) - 11 april 2020
https://vid.lelux.fi/videos/watch/dddf5797-d013-4cd7-9766-578ef76a3efa
#snowden #interview #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
https://vid.lelux.fi/videos/watch/dddf5797-d013-4cd7-9766-578ef76a3efa
#snowden #interview #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Simulating Cyberattacks on Nuclear Command and Control
During the height of the Cold War, the biggest fear involved the possibility of mutually assured destruction (MAD) from nuclear warfare. However, in today’s digital world, we find that military and strategic systems are under constant siege from cyber attacks. Within the nuclear realm, the threat of cyber attacks is relatively high due to advanced persistent threats (APTs) from both nation state adversaries as well as non-state actors. The subject paper and corresponding podcast explores the utilization of simulation technology to evaluate cyber attack scenarios on a nuclear command and control (NC2) facility.
https://www.csiac.org/podcast/simulating-cyberattacks-on-nuclear-command-and-control/
#military #cyberattack #simulation #NC2 #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
During the height of the Cold War, the biggest fear involved the possibility of mutually assured destruction (MAD) from nuclear warfare. However, in today’s digital world, we find that military and strategic systems are under constant siege from cyber attacks. Within the nuclear realm, the threat of cyber attacks is relatively high due to advanced persistent threats (APTs) from both nation state adversaries as well as non-state actors. The subject paper and corresponding podcast explores the utilization of simulation technology to evaluate cyber attack scenarios on a nuclear command and control (NC2) facility.
https://www.csiac.org/podcast/simulating-cyberattacks-on-nuclear-command-and-control/
#military #cyberattack #simulation #NC2 #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Palantir - UK government using confidential patient data in coronavirus response
Documents seen by Guardian show tech firms using information to build ‘Covid-19 datastore’
Technology firms are processing large volumes of confidential UK patient information in a data-mining operation that is part of the government’s response to the coronavirus outbreak, according to documents seen by the Guardian.
Palantir, the US big data firm founded by the rightwing billionaire Peter Thiel, is working with Faculty, a British artificial intelligence startup, to consolidate government databases and help ministers and officials respond to the pandemic.
Data is also being used by Faculty to build predictive computer models around the Covid-19 outbreak. One NHS document suggests that, two weeks ago, Faculty considered running a computer simulation to assess the impact of a policy of “targeted herd immunity”. Lawyers for Faculty said the proposed herd immunity simulation never took place.
NHSX, the digital transformation arm of the National Health Service that has contracted the tech companies to help build the “Covid-19 datastore”, said the technology would give ministers and officials “real-time information about health services, showing where demand is rising and where critical equipment needs to be deployed”.
“The companies involved do not control the data and are not permitted to use or share it for their own purposes,” a spokesperson said. Faculty’s lawyers said the firm only had access to aggregated or anonymised data via NHS systems.
The government had previously said it would use Faculty and Palantir in a Covid-19 data project. But the full scope of that operation, and the sensitive nature of patient-level data being used, is revealed in the documents seen by the Guardian.
👉🏼 Read more:
https://www.theguardian.com/world/2020/apr/12/uk-government-using-confidential-patient-data-in-coronavirus-response
#palantir #thiel #BigData #uk #coronavirus #datastore
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Documents seen by Guardian show tech firms using information to build ‘Covid-19 datastore’
Technology firms are processing large volumes of confidential UK patient information in a data-mining operation that is part of the government’s response to the coronavirus outbreak, according to documents seen by the Guardian.
Palantir, the US big data firm founded by the rightwing billionaire Peter Thiel, is working with Faculty, a British artificial intelligence startup, to consolidate government databases and help ministers and officials respond to the pandemic.
Data is also being used by Faculty to build predictive computer models around the Covid-19 outbreak. One NHS document suggests that, two weeks ago, Faculty considered running a computer simulation to assess the impact of a policy of “targeted herd immunity”. Lawyers for Faculty said the proposed herd immunity simulation never took place.
NHSX, the digital transformation arm of the National Health Service that has contracted the tech companies to help build the “Covid-19 datastore”, said the technology would give ministers and officials “real-time information about health services, showing where demand is rising and where critical equipment needs to be deployed”.
“The companies involved do not control the data and are not permitted to use or share it for their own purposes,” a spokesperson said. Faculty’s lawyers said the firm only had access to aggregated or anonymised data via NHS systems.
The government had previously said it would use Faculty and Palantir in a Covid-19 data project. But the full scope of that operation, and the sensitive nature of patient-level data being used, is revealed in the documents seen by the Guardian.
👉🏼 Read more:
https://www.theguardian.com/world/2020/apr/12/uk-government-using-confidential-patient-data-in-coronavirus-response
#palantir #thiel #BigData #uk #coronavirus #datastore
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Want to dodge AI’s prying eyes?
Here’s how, and how not, to evade facial recognition.
Around the world, governments and corporations are rolling out technology that scans faces for unique features and allows them to identify individuals based on that. As facial recognition technology spreads, it seems there’s no hiding from it. Or is there?
We teamed up with a photographer and a makeup artist to try to camouflage POLITICO’s AI correspondent, Janosch Delcker, from the all-seeing eyes of a facial recognition system, with disguises ranging from an old-school balaclava to makeup designed to distort his key facial features. Then we used a free version of Amazon Web Services’ facial recognition software, Rekognition, to compare the photos to a reference.
👉🏼 Read more:
https://www.politico.eu/article/how-to-evade-ai-facial-recognition-surveillance/
#facial #recognition #surveillance
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Here’s how, and how not, to evade facial recognition.
Around the world, governments and corporations are rolling out technology that scans faces for unique features and allows them to identify individuals based on that. As facial recognition technology spreads, it seems there’s no hiding from it. Or is there?
We teamed up with a photographer and a makeup artist to try to camouflage POLITICO’s AI correspondent, Janosch Delcker, from the all-seeing eyes of a facial recognition system, with disguises ranging from an old-school balaclava to makeup designed to distort his key facial features. Then we used a free version of Amazon Web Services’ facial recognition software, Rekognition, to compare the photos to a reference.
👉🏼 Read more:
https://www.politico.eu/article/how-to-evade-ai-facial-recognition-surveillance/
#facial #recognition #surveillance
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Drones take Italians' temperature and issue fines
The hovering drone emits a mechanical buzz reminiscent of a wasp and shouts down instructions in a tinny voice.
"Attention! You are in a prohibited area. Get out immediately," commands the drone, about the size of a loaf of bread.
A heat sensor takes the offender's temperature and sends the information to a drone operator, who stares at a thermal map on his hand-held screen -- shining orange and purple blobs.
"Violations of the regulations result in administrative and criminal penalties," the drone says.
Italy's coronavirus epicentre in the northern province of Bergamo, in Lombardy region, has had enough of people spreading COVID-19.
"Once a person's temperature is read by the drone, you must still stop that person and measure their temperature with a normal thermometer," Matteo Copia, police commander in Treviolo, near Bergamo, told AFP.
"But drones are useful for controlling the territory."
👉🏼 Read more:
https://www.france24.com/en/20200410-drones-take-italians-temperature-and-issue-fines
#italy #police #drones #coronavirus
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The hovering drone emits a mechanical buzz reminiscent of a wasp and shouts down instructions in a tinny voice.
"Attention! You are in a prohibited area. Get out immediately," commands the drone, about the size of a loaf of bread.
A heat sensor takes the offender's temperature and sends the information to a drone operator, who stares at a thermal map on his hand-held screen -- shining orange and purple blobs.
"Violations of the regulations result in administrative and criminal penalties," the drone says.
Italy's coronavirus epicentre in the northern province of Bergamo, in Lombardy region, has had enough of people spreading COVID-19.
"Once a person's temperature is read by the drone, you must still stop that person and measure their temperature with a normal thermometer," Matteo Copia, police commander in Treviolo, near Bergamo, told AFP.
"But drones are useful for controlling the territory."
👉🏼 Read more:
https://www.france24.com/en/20200410-drones-take-italians-temperature-and-issue-fines
#italy #police #drones #coronavirus
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Over 500,000 Zoom accounts sold on hacker forums, the dark web
Over 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free.
These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. The successful logins are then compiled into lists that are sold to other hackers.
Some of these Zoom accounts are offered for free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others are sold for less than a penny each.
Cybersecurity intelligence firm Cyble told BleepingComputer that around April 1st, 2020, they began to see free Zoom accounts being posted on hacker forums to gain an increased reputation in the hacker community.
👉🏼 Read more:
https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/
#zoom #leak #hacker #hacked #breach
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Over 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free.
These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. The successful logins are then compiled into lists that are sold to other hackers.
Some of these Zoom accounts are offered for free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others are sold for less than a penny each.
Cybersecurity intelligence firm Cyble told BleepingComputer that around April 1st, 2020, they began to see free Zoom accounts being posted on hacker forums to gain an increased reputation in the hacker community.
👉🏼 Read more:
https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/
#zoom #leak #hacker #hacked #breach
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Hackers bring multi-boot support to newer iPhones and iPads
Apple makes it easy to upgrade an iPhone or iPad to a new version of iOS and often boasts about the high-percentages of users running the latest version of the operating system.
A few things the company doesn’t make easy? Downgrading to an earlier version of iOS, installing an alternate operating system, or dual-booting. Or multi-booting, actually, since it’s possible to load more than two operating systems.
But folks have been finding unofficial ways to do those things for years. In March we learned about a project to bring Android to the iPhone 7 and iPhone 7+. Now a team of developers have released a guide for dual-booting multiple operating systems on iPhones and iPads with 64-bit processors.
So far the guide is designed to let you run multiple versions of iOS. But theoretically it could open the door to dual-booting Linux and/or Android on an iPhone or iPad.
💡 Dual Booting 64 Bit devices
https://dualbootfun.github.io/dualboot/
https://liliputing.com/2020/04/hackers-bring-multi-boot-support-to-newer-iphones-and-ipads.html
#multiboot #iphones #ipads #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Apple makes it easy to upgrade an iPhone or iPad to a new version of iOS and often boasts about the high-percentages of users running the latest version of the operating system.
A few things the company doesn’t make easy? Downgrading to an earlier version of iOS, installing an alternate operating system, or dual-booting. Or multi-booting, actually, since it’s possible to load more than two operating systems.
But folks have been finding unofficial ways to do those things for years. In March we learned about a project to bring Android to the iPhone 7 and iPhone 7+. Now a team of developers have released a guide for dual-booting multiple operating systems on iPhones and iPads with 64-bit processors.
So far the guide is designed to let you run multiple versions of iOS. But theoretically it could open the door to dual-booting Linux and/or Android on an iPhone or iPad.
💡 Dual Booting 64 Bit devices
https://dualbootfun.github.io/dualboot/
https://liliputing.com/2020/04/hackers-bring-multi-boot-support-to-newer-iphones-and-ipads.html
#multiboot #iphones #ipads #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
49 New Google Chrome Extensions Caught Hijacking Cryptocurrency Wallets
Discovering Fake Browser Extensions That Target Users of Ledger, Trezor, MEW, Metamask, and More
Using a familiar phishing method to target new brands.
The 49 browser add-ons, potentially the work of Russian threat actors, were identified (find the list here) by researchers from MyCrypto and PhishFort.
"Essentially, the extensions are phishing for secrets — mnemonic phrases, private keys, and keystore files," explained Harry Denley, director of security at MyCrypto. "Once the user has entered them, the extension sends an HTTP POST request to its backend, where the bad actors receive the secrets and empty the accounts."
Motivation and Purpose
We keep an eye on the type of attacks that come to cryptocurrency users on a daily basis and often write about our findings to help educate the community. We’ve seen various types of attacks on users, ranging from simple trust-trading scams to SIM hijacking to compromising and stealing funds from exchange accounts.
Google has ousted 49 Chrome browser extensions from its Web Store that masqueraded as cryptocurrency wallets but contained malicious code to siphon off sensitive information and empty the digital currencies.
👉🏼 Read more:
https://medium.com/mycrypto/discovering-fake-browser-extensions-that-target-users-of-ledger-trezor-mew-metamask-and-more-e281a2b80ff9
https://thehackernews.com/2020/04/chrome-cryptocurrency-extensions.html
#hijacking #cryptocurrency #wallets #google #chrome #browser #extensions
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Discovering Fake Browser Extensions That Target Users of Ledger, Trezor, MEW, Metamask, and More
Using a familiar phishing method to target new brands.
The 49 browser add-ons, potentially the work of Russian threat actors, were identified (find the list here) by researchers from MyCrypto and PhishFort.
"Essentially, the extensions are phishing for secrets — mnemonic phrases, private keys, and keystore files," explained Harry Denley, director of security at MyCrypto. "Once the user has entered them, the extension sends an HTTP POST request to its backend, where the bad actors receive the secrets and empty the accounts."
Motivation and Purpose
We keep an eye on the type of attacks that come to cryptocurrency users on a daily basis and often write about our findings to help educate the community. We’ve seen various types of attacks on users, ranging from simple trust-trading scams to SIM hijacking to compromising and stealing funds from exchange accounts.
Google has ousted 49 Chrome browser extensions from its Web Store that masqueraded as cryptocurrency wallets but contained malicious code to siphon off sensitive information and empty the digital currencies.
👉🏼 Read more:
https://medium.com/mycrypto/discovering-fake-browser-extensions-that-target-users-of-ledger-trezor-mew-metamask-and-more-e281a2b80ff9
https://thehackernews.com/2020/04/chrome-cryptocurrency-extensions.html
#hijacking #cryptocurrency #wallets #google #chrome #browser #extensions
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
U.S. judge blocks Twitter's bid to reveal government surveillance requests
Twitter Inc will not be able to reveal surveillance requests it received from the U.S. government after a federal judge accepted government arguments that this was likely to harm national security after a near six-year long legal battle.
The social media company had sued the U.S. Department of Justice in 2014 to be allowed to reveal, as part of its “Draft Transparency Report”, the surveillance requests it received. It argued its free-speech rights were being violated by not being allowed to reveal the details.
U.S. District Judge Yvonne Gonzalez Rogers granted the government’s request to dismiss Twitter’s lawsuit in an eleven page order filed in the U.S. District Court for Northern California.
The judge ruled on Friday that granting Twitter’s request “would be likely to lead to grave or imminent harm to the national security.”
“The Government’s motion for summary judgment is GRANTED and Twitter’s motion for summary judgment is DENIED,” the judge said in her order.
Twitter had sued the Justice Department in its battle with federal agencies as the internet industry’s self-described champion of free speech seeking the right to reveal the extent of U.S. government surveillance.
👉🏼 Read more:
https://www.reuters.com/article/us-usa-twitter-lawsuit/u-s-judge-blocks-twitters-bid-to-reveal-government-surveillance-requests-idUSKBN2200CS
#Twitter #USA #lawsuit #goverment #surveillance
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Twitter Inc will not be able to reveal surveillance requests it received from the U.S. government after a federal judge accepted government arguments that this was likely to harm national security after a near six-year long legal battle.
The social media company had sued the U.S. Department of Justice in 2014 to be allowed to reveal, as part of its “Draft Transparency Report”, the surveillance requests it received. It argued its free-speech rights were being violated by not being allowed to reveal the details.
U.S. District Judge Yvonne Gonzalez Rogers granted the government’s request to dismiss Twitter’s lawsuit in an eleven page order filed in the U.S. District Court for Northern California.
The judge ruled on Friday that granting Twitter’s request “would be likely to lead to grave or imminent harm to the national security.”
“The Government’s motion for summary judgment is GRANTED and Twitter’s motion for summary judgment is DENIED,” the judge said in her order.
Twitter had sued the Justice Department in its battle with federal agencies as the internet industry’s self-described champion of free speech seeking the right to reveal the extent of U.S. government surveillance.
👉🏼 Read more:
https://www.reuters.com/article/us-usa-twitter-lawsuit/u-s-judge-blocks-twitters-bid-to-reveal-government-surveillance-requests-idUSKBN2200CS
#Twitter #USA #lawsuit #goverment #surveillance
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Access data of the World Health Organization - Bill-Gates Foundation - Wuhan Institute of Virology hacked ... 👀
‼️ World Health Organization
https://archive.is/JIJ2b
‼️ Bill-Gates Foundation
archive.is/j6sgo
‼️ Wuhan Institute of Virology
https://archive.is/UtQGz#selection-247.0-247.59
#hacked #WHO #BillGates #Wuhan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
‼️ World Health Organization
https://archive.is/JIJ2b
‼️ Bill-Gates Foundation
archive.is/j6sgo
‼️ Wuhan Institute of Virology
https://archive.is/UtQGz#selection-247.0-247.59
#hacked #WHO #BillGates #Wuhan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
PrivacyBreacher
An app built to showcase the privacy issues in Android operating system
PrivacyBreacher is an Android app built as a proof of concept for a research article describing the privacy issues in Android. This app can access the following information from your phone without requesting any permissions:
‼️ Figure out at what time your phone screen turned on/off.
‼️ Figure out at what time you plugged in or removed your phone charger and wired headphones.
‼️ Figure out at what time you switched on/off your phone (i.e., it captures the device uptime and ACTION_SHUTDOWN broadcasts).
‼️ Access most of your device related information like your phone model, manufacturer etc.
‼️ Keep track of your WiFi/Mobile data usage.
‼️ Get a list of all the apps installed on your phone.
‼️ Construct a 3D visualization of your body movements.
💡 Research Article:
https://github.com/databurn-in/Android-Privacy-Issues
👉🏼 PrivacyBreacher:
https://github.com/databurn-in/PrivacyBreacher
#PrivacyBreacher #Android #App #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
An app built to showcase the privacy issues in Android operating system
PrivacyBreacher is an Android app built as a proof of concept for a research article describing the privacy issues in Android. This app can access the following information from your phone without requesting any permissions:
‼️ Figure out at what time your phone screen turned on/off.
‼️ Figure out at what time you plugged in or removed your phone charger and wired headphones.
‼️ Figure out at what time you switched on/off your phone (i.e., it captures the device uptime and ACTION_SHUTDOWN broadcasts).
‼️ Access most of your device related information like your phone model, manufacturer etc.
‼️ Keep track of your WiFi/Mobile data usage.
‼️ Get a list of all the apps installed on your phone.
‼️ Construct a 3D visualization of your body movements.
💡 Research Article:
https://github.com/databurn-in/Android-Privacy-Issues
👉🏼 PrivacyBreacher:
https://github.com/databurn-in/PrivacyBreacher
#PrivacyBreacher #Android #App #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
How Facebook Figures Out Everyone You've Ever Met
‼️ Behind the Facebook profile you’ve built for yourself is another one, a shadow profile, built from the inboxes and smartphones of other Facebook users.
👉🏼 Read more:
https://gizmodo.com/how-facebook-figures-out-everyone-youve-ever-met-1819822691
#DeleteFacebook
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
‼️ Behind the Facebook profile you’ve built for yourself is another one, a shadow profile, built from the inboxes and smartphones of other Facebook users.
👉🏼 Read more:
https://gizmodo.com/how-facebook-figures-out-everyone-youve-ever-met-1819822691
#DeleteFacebook
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Neo-Nazis Are Spreading a List of Emails and Passwords for Gates Foundation and WHO Employees
SITE Intelligence, a private terrorism watchdog based in the U.S., first spotted the data dump and then its migration to a Telegram channel with over 5,000 followers and links to neo-Nazi terrorist organizations Atomwaffen Division and The Base, both of which have been under an extreme, nationwide FBI crackdown in recent months
Access data of the World Health Organization - Bill-Gates Foundation - Wuhan Institute of Virology hacked
👉🏼 https://t.iss.one/BlackBox_Archiv/847
👉🏼 Read more:
https://www.vice.com/en_us/article/akwxzp/neo-nazis-are-spreading-a-list-of-emails-and-passwords-for-gates-foundation-and-who-employees
#hacked #WHO #BillGates #Wuhan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
SITE Intelligence, a private terrorism watchdog based in the U.S., first spotted the data dump and then its migration to a Telegram channel with over 5,000 followers and links to neo-Nazi terrorist organizations Atomwaffen Division and The Base, both of which have been under an extreme, nationwide FBI crackdown in recent months
Access data of the World Health Organization - Bill-Gates Foundation - Wuhan Institute of Virology hacked
👉🏼 https://t.iss.one/BlackBox_Archiv/847
👉🏼 Read more:
https://www.vice.com/en_us/article/akwxzp/neo-nazis-are-spreading-a-list-of-emails-and-passwords-for-gates-foundation-and-who-employees
#hacked #WHO #BillGates #Wuhan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Bill Gates ID2020 Exposed
UPDATE: USAHACKERS Twitter and Facebook accounts have been suspended without Notice! We are trying to recover them.
While the Christian militia going by the name κατέχον did hack Gates Foundation servers and Marina Abramovic, we were the ones who leaked all the data from this initial hack.
What we uncovered from the data obtained from κατέχον’s hack is what compelled us to hack the World Health Organization, the Center for Disease Control, the National Institute of Health and the World Bank , and leak their data too. What we uncovered is pertinent right now as it is about the Covid-19 pandemic.
Included in our leaks are emails and passwords from the Wuhan Institute of Virology. We obtained the data much earlier, but we are still not sure who hacked the Institute. The κατέχον activists told us they did not hack the institute and were not aware it had been hacked. So for now, the hack on the Institute remains a mystery.
Due to the amount of information and files that can be obtained from our leaks, we hope that by making the leaks public, we will be able to crowdsource enough people to go through the numerous emails and files to uncover more pertinent information.
💡 Here are the archives:
WHO
— https://archive.is/JIJ2b
World Bank
— https://archive.is/0XJEL
Wuhan Virology Institute
— https://archive.is/UtQGz
US CDC
— https://archive.is/lyApN
NIH
— https://archive.is/WkHpk
Gates Foundation
— https://archive.is/j6sgo
👉🏼 Read more:
https://usahackers.com/2020/04/21/bill-gates-id2020-exposed/
#hacked #WHO #BillGates #Wuhan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
UPDATE: USAHACKERS Twitter and Facebook accounts have been suspended without Notice! We are trying to recover them.
While the Christian militia going by the name κατέχον did hack Gates Foundation servers and Marina Abramovic, we were the ones who leaked all the data from this initial hack.
What we uncovered from the data obtained from κατέχον’s hack is what compelled us to hack the World Health Organization, the Center for Disease Control, the National Institute of Health and the World Bank , and leak their data too. What we uncovered is pertinent right now as it is about the Covid-19 pandemic.
Included in our leaks are emails and passwords from the Wuhan Institute of Virology. We obtained the data much earlier, but we are still not sure who hacked the Institute. The κατέχον activists told us they did not hack the institute and were not aware it had been hacked. So for now, the hack on the Institute remains a mystery.
Due to the amount of information and files that can be obtained from our leaks, we hope that by making the leaks public, we will be able to crowdsource enough people to go through the numerous emails and files to uncover more pertinent information.
💡 Here are the archives:
WHO
— https://archive.is/JIJ2b
World Bank
— https://archive.is/0XJEL
Wuhan Virology Institute
— https://archive.is/UtQGz
US CDC
— https://archive.is/lyApN
NIH
— https://archive.is/WkHpk
Gates Foundation
— https://archive.is/j6sgo
👉🏼 Read more:
https://usahackers.com/2020/04/21/bill-gates-id2020-exposed/
#hacked #WHO #BillGates #Wuhan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Is Cloudflare safe yet? No.
Cloudflare is one of the Content Delivery Networks on the Internet. It’s responsible for serving at least 10% websites, while also providing VPN and DNS resolver services.
Unfortunately, there are many issues with Cloudflare's services, which could have an impact on the stability and safety of the internet as a whole. There have been some major internet disruptions as a result.
💡 How is Cloudflare harmful?
Cloudflare is trying to centralize the internet
The internet was built upon foundations of decentralization. In a traditional scenario, many internet services are provided by completely different subjects.
👀 Cloudflare is:
‼️ Providing domain registration services
‼️ Providing DNS nameservers
‼️ Providing DNS resolvers
‼️ Proxing and decrypting website traffic
‼️ Providing NTP services
‼️ Providing VPN services
You might wonder, how exactly is this harmful? There are two main concerns - robustness and privacy.
Cloudflare's outages are impacting more and more services. Trusting a single company to do everything right and to have a 100% stability and availability is never a good idea. They actively discourage combining the use of their services with services of other companies as well.
For example, if you register a domain with Cloudflare, you cannot use your own nameservers unless you pay for a Business or an Enterprise plan.
Having vast amounts of data at their disposal, Cloudflare can aggregate information from all of their various services to accurately pinpoint individual users as well.
👉🏼 Read more:
https://iscloudflaresafeyet.com
#Cloudflare #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Cloudflare is one of the Content Delivery Networks on the Internet. It’s responsible for serving at least 10% websites, while also providing VPN and DNS resolver services.
Unfortunately, there are many issues with Cloudflare's services, which could have an impact on the stability and safety of the internet as a whole. There have been some major internet disruptions as a result.
💡 How is Cloudflare harmful?
Cloudflare is trying to centralize the internet
The internet was built upon foundations of decentralization. In a traditional scenario, many internet services are provided by completely different subjects.
👀 Cloudflare is:
‼️ Providing domain registration services
‼️ Providing DNS nameservers
‼️ Providing DNS resolvers
‼️ Proxing and decrypting website traffic
‼️ Providing NTP services
‼️ Providing VPN services
You might wonder, how exactly is this harmful? There are two main concerns - robustness and privacy.
Cloudflare's outages are impacting more and more services. Trusting a single company to do everything right and to have a 100% stability and availability is never a good idea. They actively discourage combining the use of their services with services of other companies as well.
For example, if you register a domain with Cloudflare, you cannot use your own nameservers unless you pay for a Business or an Enterprise plan.
Having vast amounts of data at their disposal, Cloudflare can aggregate information from all of their various services to accurately pinpoint individual users as well.
👉🏼 Read more:
https://iscloudflaresafeyet.com
#Cloudflare #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Google Just Gave Millions Of Users A Reason To Quit Chrome, Windows 10
Google is always improving Chrome and it recently issued a brilliant (if long overdue) upgrade. That said, there have also been some recent controversial changes, security problems and data concerns and now Google has detailed a serious new problem in Chrome which cannot be fixed. The result is users may find themselves forced to choose between Windows 10 and Chrome.
💡Edit: James Forshaw has clarified that Firefox is impacted the same way because it uses the Chromium sandbox which Mozilla confirms. The result is Forshaw's research exposes a vulnerability for the sandbox of all major browsers to updates in Windows 10. I have followed this up with Firefox, Opera, Brave and Microsoft and will update when I have more information.
In a fascinating post titled ‘You Won't Believe what this One Line Change Did to the Chrome Sandbox’, Google’s Project Zero researcher James Forshaw revealed that Chrome is entirely reliant on the code of Windows 10 to stay secure. Moreover, Forshaw explains a new Windows 10 update recently broke through Chrome’s security with just a single line of misplaced code. Given Windows 10’s appalling recent update record, that’s not reassuring for either browser or platform.
https://googleprojectzero.blogspot.com/2020/04/you-wont-believe-what-this-one-line.html
👉🏼 Read more:
https://www.forbes.com/sites/gordonkelly/2020/04/23/google-chrome-critical-security-exploit-windows-10-upgrade-warning-update-chrome-browser/
#exploit #windows #chrome #firefox #browser #sandbox
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Google is always improving Chrome and it recently issued a brilliant (if long overdue) upgrade. That said, there have also been some recent controversial changes, security problems and data concerns and now Google has detailed a serious new problem in Chrome which cannot be fixed. The result is users may find themselves forced to choose between Windows 10 and Chrome.
💡Edit: James Forshaw has clarified that Firefox is impacted the same way because it uses the Chromium sandbox which Mozilla confirms. The result is Forshaw's research exposes a vulnerability for the sandbox of all major browsers to updates in Windows 10. I have followed this up with Firefox, Opera, Brave and Microsoft and will update when I have more information.
In a fascinating post titled ‘You Won't Believe what this One Line Change Did to the Chrome Sandbox’, Google’s Project Zero researcher James Forshaw revealed that Chrome is entirely reliant on the code of Windows 10 to stay secure. Moreover, Forshaw explains a new Windows 10 update recently broke through Chrome’s security with just a single line of misplaced code. Given Windows 10’s appalling recent update record, that’s not reassuring for either browser or platform.
https://googleprojectzero.blogspot.com/2020/04/you-wont-believe-what-this-one-line.html
👉🏼 Read more:
https://www.forbes.com/sites/gordonkelly/2020/04/23/google-chrome-critical-security-exploit-windows-10-upgrade-warning-update-chrome-browser/
#exploit #windows #chrome #firefox #browser #sandbox
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Analyzing Analytics (Featuring: The FBI)
Recently while conducting some research, I found myself down the path of Google Analytics ID’s as well as other analytics services. I was investigating ways to not only identify varying analytics code in sites, but to correlate them with other sites that may be linked to the same owner. Please note before further reading: I make some guesses about what I find, though that’s contrary to the concept of analysis, and I am not presuming to know definitively why I am seeing what I am seeing in this specific case study. It’s all just very curious to me. Dive in and take a look for yourself!
👉🏼 Read more:
https://exploits.run/analytics-analysis-fbi/
#FBI #analytics #analysis
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Recently while conducting some research, I found myself down the path of Google Analytics ID’s as well as other analytics services. I was investigating ways to not only identify varying analytics code in sites, but to correlate them with other sites that may be linked to the same owner. Please note before further reading: I make some guesses about what I find, though that’s contrary to the concept of analysis, and I am not presuming to know definitively why I am seeing what I am seeing in this specific case study. It’s all just very curious to me. Dive in and take a look for yourself!
👉🏼 Read more:
https://exploits.run/analytics-analysis-fbi/
#FBI #analytics #analysis
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Techno-Tyranny: How The US National Security State Is Using Coronavirus To Fulfill An Orwellian Vision
Last year, a government commission called for the US to adopt an AI-driven mass surveillance system far beyond that used in any other country in order to ensure American hegemony in artificial intelligence. Now, many of the “obstacles” they had cited as preventing its implementation are rapidly being removed under the guise of combating the coronavirus crisis.
Last year, a U.S. government body dedicated to examining how artificial intelligence can “address the national security and defense needs of the United States” discussed in detail the “structural” changes that the American economy and society must undergo in order to ensure a technological advantage over China, according to a recent document acquired through a FOIA request. This document suggests that the U.S. follow China’s lead and even surpass them in many aspects related to AI-driven technologies, particularly their use of mass surveillance. This perspective clearly clashes with the public rhetoric of prominent U.S. government officials and politicians on China, who have labeled the Chinese government’s technology investments and export of its surveillance systems and other technologies as a major “threat” to Americans’ “way of life.”
In addition, many of the steps for the implementation of such a program in the U.S., as laid out in this newly available document, are currently being promoted and implemented as part of the government’s response to the current coronavirus (Covid-19) crisis. This likely due to the fact that many members of this same body have considerable overlap with the taskforces and advisors currently guiding the government’s plans to “re-open the economy” and efforts to use technology to respond to the current crisis.
👉🏼 Read more:
https://www.thelastamericanvagabond.com/top-news/techno-tyranny-how-us-national-security-state-using-coronavirus-fulfill-orwellian-vision/
#USA #National #Security #State #coronavirus #orwell #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Last year, a government commission called for the US to adopt an AI-driven mass surveillance system far beyond that used in any other country in order to ensure American hegemony in artificial intelligence. Now, many of the “obstacles” they had cited as preventing its implementation are rapidly being removed under the guise of combating the coronavirus crisis.
Last year, a U.S. government body dedicated to examining how artificial intelligence can “address the national security and defense needs of the United States” discussed in detail the “structural” changes that the American economy and society must undergo in order to ensure a technological advantage over China, according to a recent document acquired through a FOIA request. This document suggests that the U.S. follow China’s lead and even surpass them in many aspects related to AI-driven technologies, particularly their use of mass surveillance. This perspective clearly clashes with the public rhetoric of prominent U.S. government officials and politicians on China, who have labeled the Chinese government’s technology investments and export of its surveillance systems and other technologies as a major “threat” to Americans’ “way of life.”
In addition, many of the steps for the implementation of such a program in the U.S., as laid out in this newly available document, are currently being promoted and implemented as part of the government’s response to the current coronavirus (Covid-19) crisis. This likely due to the fact that many members of this same body have considerable overlap with the taskforces and advisors currently guiding the government’s plans to “re-open the economy” and efforts to use technology to respond to the current crisis.
👉🏼 Read more:
https://www.thelastamericanvagabond.com/top-news/techno-tyranny-how-us-national-security-state-using-coronavirus-fulfill-orwellian-vision/
#USA #National #Security #State #coronavirus #orwell #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN