NoGoolag
4.76K subscribers
21.1K photos
11.9K videos
809 files
20.9K links
Live free!

📡 @NoGoolag

FAQ:
https://t.iss.one/NoGoolag/169

★Group:
https://t.iss.one/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSRET
Download Telegram
'THE GOOD CENSOR': Leaked Google Briefing Admits Abandonment of Free Speech for 'Safety And Civility'
https://bit.ly/2yBQPxh

r/conspiracy - 'THE GOOD CENSOR': Leaked Google Briefing Admits Abandonment of Free Speech for 'Safety And Civility'
5 votes and 4 comments so far on Reddit
Google Hardens Android Kernel

Google this week revealed that Android’s kernel is becoming more resilient to code reuse attacks, courtesy of implemented support for LLVM’s Control Flow Integrity (CFI).
read more (https://www.securityweek.com/google-hardens-android-kernel)
This media is not supported in your browser
VIEW IN TELEGRAM
Credit to Marc Al Hames
Forwarded from cRyPtHoN INFOSEC
Forwarded from cRyPtHoN INFOSEC
Google faces mounting pressure from Congress over Google+ privacy flaw
WTF, Google not disclose to public about their finding vulnerability in Google+ API 😡😡😡
Facebook originally estimated that up to 50 million users had their information exposed, but that number has since dropped down to around 30 million. Of that number, 15 million users had their name and contact info (phone number and/or email) compromised while another 14 million lost that and their gender, Facebook username, location, language, relationship status, hometown, religion, current area of residence, birthdate, devices used to access Facebook, work, education, and more.

For the remaining 1 million, Facebook says that no information was compromised.

This attack did not affect Facebook Messenger, Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, any third-party apps, or developer/advertising accounts.
Forwarded from cRyPtHoN INFOSEC
👁‍🗨webkay👁‍🗨
This is a demonstration of all the data your browser knows about you. All this data can be accessed by any website without asking you for any permission.
Most of the data points are educated guesses and not considered to be accurate.
HERE (https://webkay.robinlinus.com/)

👁‍🗨Panopticlick👁‍🗨
When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.
HERE (https://panopticlick.eff.org/)
Forwarded from cRyPtHoN INFOSEC
Third-party developers abusing Microsoft Apps store & publish fake Google Photos App under the Google LLC name but it is originally an Ad clicker which is running in the back round of the windows system. It’s a completely malicious app that performs various unwanted actvities once installed on the victim’s machine. It Seems developers managed to […]
The post Hackers Abuse Microsoft Store & Publish Fake Google Photos App under Google LLC Name (https://gbhackers.com/fake-google-photos-app/)
Tech Giants Concerned About Australia's Encryption Laws

Cyber law changes proposed in Australia specifically state that companies will not be required to implement encryption backdoors, but tech giants are still concerned that the current form of the legislation is too vague and leaves a lot of room for interpretation.
read more (https://www.securityweek.com/tech-giants-concerned-about-australias-encryption-laws)
Some tech media reported that the Telegram Desktop app wasn’t secure because it “leaked IP addresses” when used to accept a voice call.

The reality is much less sensational – Telegram Desktop was at least as secure as other encrypted VoIP apps even before we improved it by adding an option to disable peer-to-peer calls. As for Telegram calls on mobile, they were always more secure than the competition, because they had this setting since day one.

During a peer-to-peer (P2P) call, voice traffic flows directly from one participant of a call to the other without relying on an intermediary server. P2P routing allows to achieve higher quality calls with lower latency, so the current industry standard is to have P2P switched on by default.

However, there’s a catch: by definition, both devices participating in a P2P call have to know the IP addresses of each other. So if you make or accept a call, the person on the other side may in theory learn your IP address.

That’s why, unlike WhatsApp or Viber, Telegram always gave its users the ability to switch off P2P calls and relay them through a Telegram server. Moreover, in most countries we switched off P2P by default.

Telegram Desktop, which is used in less than 0.01% of Telegram calls, was the only platform where this setting was missing. Thanks to a researcher who pointed that out, we made the Telegram Desktop experience consistent with the rest of our apps.

However, it is important to put this into perspective and realize that this is about one Telegram app (Telegram Desktop) being somewhat less secure than other Telegram apps (e.g. Telegram for iOS or Android). If you compare Telegram with other popular messaging services out there, unfortunately, they are not even close to our standards.

Using the terminology from the flashy headlines, WhatsApp, Viber and the rest have been “leaking your IP address” in 100% of calls. They are still doing this, and you can't opt out. The only way to stop this is to have all your friends switch to Telegram.