New encryption law to force australian citizens to hand over computer passwords and mobile pins - or face $60,000 or five years in prison
https://www.dailymail.co.uk/news/article-6213007/Police-want-mobile-laptop-passwords-jailed-refusing.html
#australia #gov
https://www.dailymail.co.uk/news/article-6213007/Police-want-mobile-laptop-passwords-jailed-refusing.html
#australia #gov
Mail Online
Now the police want your passwords – and you could be fined $60,000 or put in prison for five years if you refuse
You could face up to five years' in jail for refusing to give authorities your computer password or phone pin under changes to the law before Australia's Parliament.
ESET has discovered first UEFI rootkit in the wild.
https://www.techspot.com/news/76651-eset-has-discovered-first-uefi-rootkit-wild.html
#linux
https://www.techspot.com/news/76651-eset-has-discovered-first-uefi-rootkit-wild.html
#linux
TechSpot
ESET has discovered the first UEFI rootkit in the wild
Security researchers over at ESET have shown that UEFI rootkits are no longer a theoretical topic for discussion at conferences. Advanced persistent threat group Sednit, otherwise known as Fancy Bear, Strontium, Sofacy, among other names, has found a way…
Chinese police are stopping people randomly and forcing them to install spyware on their phones
https://security.stackexchange.com/questions/194353/police-forcing-me-to-install-jingwang-spyware-app-how-to-minimize-impact
https://en.wikipedia.org/wiki/Jingwang_Weishi
https://www.opentech.fund/news/app-targeting-uyghur-population-censors-content-lacks-basic-security
https://mashable.com/2017/07/21/china-spyware-xinjiang
#china #spyware #gov
https://security.stackexchange.com/questions/194353/police-forcing-me-to-install-jingwang-spyware-app-how-to-minimize-impact
https://en.wikipedia.org/wiki/Jingwang_Weishi
https://www.opentech.fund/news/app-targeting-uyghur-population-censors-content-lacks-basic-security
https://mashable.com/2017/07/21/china-spyware-xinjiang
#china #spyware #gov
Information Security Stack Exchange
Police forcing me to install Jingwang spyware app, how to minimize impact?
Chinese police are forcing whole cities to install an Android spyware app Jingwang Weishi. They are stopping people in the street and detaining those who refuse to install it.
Knowing that I may be
Knowing that I may be
Mobile Websites Can Tap Into Your Phone's Sensors Without Asking
https://www.wired.com/story/mobile-websites-can-tap-into-your-phones-sensors-without-asking
https://sensor-js.xyz
#sensors #web
https://www.wired.com/story/mobile-websites-can-tap-into-your-phones-sensors-without-asking
https://sensor-js.xyz
#sensors #web
WIRED
Mobile Websites Can Tap Into Your Phone's Sensors Without Asking
Mobile apps need explicit permission to access your smartphone's motion and light sensors. Mobile websites? Not so much.
MicroG pack installer v2.0
(This is the simple classic version that installs in system)
Included Packages
- Latest MicroG Services Core
- Latest MicroG Services Framework Proxy
- Latest Deja Vu Location Service
- Latest Local GSM Location Service
- Latest Local Wi-Fi Location Service
- Latest Mozilla Unified NLP Backend
- Latest Nominatim NLP Backend
- Google Calendar Sync Adapter
- Google Contacts Sync Adapter
- Google Keyboard Support
- Google Maps Support
- Latest Google Play Store
- OTA auto backup/restore script
- SafetyNet support
- etc
Notes
- MicroG GMS app compiled using NoGooLag APK Keystore, with some mods, A FORK!
#microg #installer #mgp
📡 @NoGoolag
(This is the simple classic version that installs in system)
Included Packages
- Latest MicroG Services Core
- Latest MicroG Services Framework Proxy
- Latest Deja Vu Location Service
- Latest Local GSM Location Service
- Latest Local Wi-Fi Location Service
- Latest Mozilla Unified NLP Backend
- Latest Nominatim NLP Backend
- Google Calendar Sync Adapter
- Google Contacts Sync Adapter
- Google Keyboard Support
- Google Maps Support
- Latest Google Play Store
- OTA auto backup/restore script
- SafetyNet support
- etc
Notes
- MicroG GMS app compiled using NoGooLag APK Keystore, with some mods, A FORK!
#microg #installer #mgp
📡 @NoGoolag
The problem with mobile phones
https://ssd.eff.org/en/module/problem-mobile-phones
Mobile phones were not designed for privacy and security. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance risks—especially location tracking.
#problem #tracking #location #why #eff
https://ssd.eff.org/en/module/problem-mobile-phones
Mobile phones were not designed for privacy and security. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance risks—especially location tracking.
#problem #tracking #location #why #eff
Surveillance Self-Defense
The Problem with Mobile Phones
Mobile phones have become ubiquitous and basic communications tools—now used not only for phone calls, but also for accessing the Internet, sending text messages, and documenting the world.
Tim Berners-Lee tells us his radical new plan to upend the World Wide Web
With an ambitious decentralized platform, the father of the web hopes it’s game on for corporate tech giants like Facebook and Google
https://www.fastcompany.com/90243936/exclusive-tim-berners-lee-tells-us-his-radical-new-plan-to-upend-the-world-wide-web
With an ambitious decentralized platform, the father of the web hopes it’s game on for corporate tech giants like Facebook and Google
https://www.fastcompany.com/90243936/exclusive-tim-berners-lee-tells-us-his-radical-new-plan-to-upend-the-world-wide-web
Fast Company
Exclusive: Tim Berners-Lee tells us his radical new plan to upend the World Wide Web
With an ambitious decentralized platform, the father of the web hopes it’s game on for corporate tech giants like Facebook and Google.
https://t.iss.one/durov/92
Some tech media reported that the Telegram Desktop app wasn’t secure because it “leaked IP addresses” when used to accept a voice call.
The reality is much less sensational – Telegram Desktop was at least as secure as other encrypted VoIP apps even before we improved it by adding an option to disable peer-to-peer calls. As for Telegram calls on mobile, they were always more secure than the competition, because they had this setting since day one.
During a peer-to-peer (P2P) call, voice traffic flows directly from one participant of a call to the other without relying on an intermediary server. P2P routing allows to achieve higher quality calls with lower latency, so the current industry standard is to have P2P switched on by default.
However, there’s a catch: by definition, both devices participating in a P2P call have to know the IP addresses of each other. So if you make or accept a call, the person on the other side may in theory learn your IP address.
That’s why, unlike WhatsApp or Viber, Telegram always gave its users the ability to switch off P2P calls and relay them through a Telegram server. Moreover, in most countries we switched off P2P by default.
Telegram Desktop, which is used in less than 0.01% of Telegram calls, was the only platform where this setting was missing. Thanks to a researcher who pointed that out, we made the Telegram Desktop experience consistent with the rest of our apps.
However, it is important to put this into perspective and realize that this is about one Telegram app (Telegram Desktop) being somewhat less secure than other Telegram apps (e.g. Telegram for iOS or Android). If you compare Telegram with other popular messaging services our there, unfortunately, they are not even close to our standards.
Using the terminology from the flashy headlines, WhatsApp, Viber and the rest have been “leaking your IP address” in 100% of calls. They are still doing this, and you can't opt out. The only way to stop this is to have all your friends switch to Telegram.
#telegram
Some tech media reported that the Telegram Desktop app wasn’t secure because it “leaked IP addresses” when used to accept a voice call.
The reality is much less sensational – Telegram Desktop was at least as secure as other encrypted VoIP apps even before we improved it by adding an option to disable peer-to-peer calls. As for Telegram calls on mobile, they were always more secure than the competition, because they had this setting since day one.
During a peer-to-peer (P2P) call, voice traffic flows directly from one participant of a call to the other without relying on an intermediary server. P2P routing allows to achieve higher quality calls with lower latency, so the current industry standard is to have P2P switched on by default.
However, there’s a catch: by definition, both devices participating in a P2P call have to know the IP addresses of each other. So if you make or accept a call, the person on the other side may in theory learn your IP address.
That’s why, unlike WhatsApp or Viber, Telegram always gave its users the ability to switch off P2P calls and relay them through a Telegram server. Moreover, in most countries we switched off P2P by default.
Telegram Desktop, which is used in less than 0.01% of Telegram calls, was the only platform where this setting was missing. Thanks to a researcher who pointed that out, we made the Telegram Desktop experience consistent with the rest of our apps.
However, it is important to put this into perspective and realize that this is about one Telegram app (Telegram Desktop) being somewhat less secure than other Telegram apps (e.g. Telegram for iOS or Android). If you compare Telegram with other popular messaging services our there, unfortunately, they are not even close to our standards.
Using the terminology from the flashy headlines, WhatsApp, Viber and the rest have been “leaking your IP address” in 100% of calls. They are still doing this, and you can't opt out. The only way to stop this is to have all your friends switch to Telegram.
#telegram
New Zealand Government now issuing a $5000 customs fine to those who refuse to be subject to a digital search
https://www.radionz.co.nz/news/national/367642/travellers-refusing-digital-search-now-face-5000-customs-fine
#nz #newzealand #australia
https://www.radionz.co.nz/news/national/367642/travellers-refusing-digital-search-now-face-5000-customs-fine
#nz #newzealand #australia
RNZ
Travellers refusing digital search now face $5000 Customs fine
Travellers who refuse to hand over their phone or laptop passwords to Customs officials can now be slapped with a hefty fine.
Forwarded from MARKW Update [Redmi 4 Prime] (JIM)
NEW FEATURE ON MIUI GLOBAL STABLE :3
READ N LEARN
Source : Secret Group
READ N LEARN
Source : Secret Group
Forwarded from Deleted Account
Signature Spoofing Checker (Test the signature spoofing capability of your OS) - https://f-droid.org/app/lanchon.sigspoof.checker
f-droid.org
Signature Spoofing Checker | F-Droid - Free and Open Source Android App Repository
© 2010-2020 F-Droid Limited and Contributors
Forwarded from cRyPtHoN™ INFOSEC (antuketot76™)
GeekTyrant
Video Shows That Google Is Always Listening If You're Using a Microphone and Have It Open
I'm getting an odd sense of deja vu like I've revealed this on the site before, but since it's in the news again, I might as well recall the story. While it's just now coming out that people suspect Google is listening to them when they have it open and a…
Forwarded from cRyPtHoN™ INFOSEC
Google Inbox emails can be spoofed to fake the recipient
https://www.xda-developers.com/google-inbox-spoofing-vulnerability/
https://www.xda-developers.com/google-inbox-spoofing-vulnerability/
xda-developers
Google Inbox emails can be spoofed to fake the recipient
A Google Inbox spoofing issue has been discovered which could let an attacker fake the email recipients through a cleverly constructed mailto link.