'THE GOOD CENSOR': Leaked Google Briefing Admits Abandonment of Free Speech for 'Safety And Civility'
https://bit.ly/2yBQPxh
r/conspiracy - 'THE GOOD CENSOR': Leaked Google Briefing Admits Abandonment of Free Speech for 'Safety And Civility'
5 votes and 4 comments so far on Reddit
https://bit.ly/2yBQPxh
r/conspiracy - 'THE GOOD CENSOR': Leaked Google Briefing Admits Abandonment of Free Speech for 'Safety And Civility'
5 votes and 4 comments so far on Reddit
Google Ads Begins Recording Some Calls Initiated by Call Extensions
https://bit.ly/2Pm6dEN
https://bit.ly/2Pm6dEN
Search Engine Journal
Google Ads Begins Recording Some Calls Initiated by Call Extensions - Search Engine Journal
Google has started recording a "small percentage" of calls that are initiated by call-only ads or call extensions.
How to Delete Facebook and Instagram From Your Life Forever.
https://nyti.ms/2OXlIGF
https://nyti.ms/2OXlIGF
Nytimes
How to Delete Facebook and Instagram From Your Life Forever
Lost faith in Facebook and Instagram after data leakages, breaches and too much noise? Here’s a guide to breaking up with the social network and its photo-sharing app for good.
Google Hardens Android Kernel
Google this week revealed that Android’s kernel is becoming more resilient to code reuse attacks, courtesy of implemented support for LLVM’s Control Flow Integrity (CFI).
read more (https://www.securityweek.com/google-hardens-android-kernel)
Google this week revealed that Android’s kernel is becoming more resilient to code reuse attacks, courtesy of implemented support for LLVM’s Control Flow Integrity (CFI).
read more (https://www.securityweek.com/google-hardens-android-kernel)
Not All Multifactor Authentication Is Created Equal
https://www.darkreading.com/endpoint/authentication/not-all-multifactor-authentication-is-created-equal/a/d-id/1332991?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Users should be aware of the strengths and weaknesses of the various MFA methods.
https://www.darkreading.com/endpoint/authentication/not-all-multifactor-authentication-is-created-equal/a/d-id/1332991?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Users should be aware of the strengths and weaknesses of the various MFA methods.
Darkreading
Not All Multifactor Authentication Is Created Equal
Users should be aware of the strengths and weaknesses of the various MFA methods.
This media is not supported in your browser
VIEW IN TELEGRAM
Credit to Marc Al Hames
Forwarded from cRyPtHoN™ INFOSEC
Google faces mounting pressure from Congress over Google+ privacy flaw
WTF, Google not disclose to public about their finding vulnerability in Google+ API 😡😡😡
WTF, Google not disclose to public about their finding vulnerability in Google+ API 😡😡😡
Contact details, birth dates, search and location history: What hackers stole from millions of Facebook users | tech | Hindustan Times
https://m.hindustantimes.com/tech/contact-details-birth-dates-search-and-location-history-what-hackers-stole-from-millions-of-facebook-users/story-6lvE770TlyBsqQprNBd2uN.html
https://m.hindustantimes.com/tech/contact-details-birth-dates-search-and-location-history-what-hackers-stole-from-millions-of-facebook-users/story-6lvE770TlyBsqQprNBd2uN.html
Hindustan Times
Personal data stolen in Facebook hack far more intimate than first thought
Facebook was recently hit with a data breach where personal data of 30 million users was affected. Hackers stole information like contact details, birth dates, search and location history.
Why you shouldn't use Facebook to login to other accounts
https://nyti.ms/2A8vLjL
https://nyti.ms/2A8vLjL
Nytimes
Why You Shouldn’t Use Facebook to Log In to Other Sites
Facebook offered a convenient and secure way to sign up for online services. A major hack shows it failed at its one job.
Facebook originally estimated that up to 50 million users had their information exposed, but that number has since dropped down to around 30 million. Of that number, 15 million users had their name and contact info (phone number and/or email) compromised while another 14 million lost that and their gender, Facebook username, location, language, relationship status, hometown, religion, current area of residence, birthdate, devices used to access Facebook, work, education, and more.
For the remaining 1 million, Facebook says that no information was compromised.
This attack did not affect Facebook Messenger, Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, any third-party apps, or developer/advertising accounts.
For the remaining 1 million, Facebook says that no information was compromised.
This attack did not affect Facebook Messenger, Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, any third-party apps, or developer/advertising accounts.
Forwarded from cRyPtHoN™ INFOSEC
👁🗨webkay👁🗨
This is a demonstration of all the data your browser knows about you. All this data can be accessed by any website without asking you for any permission.
Most of the data points are educated guesses and not considered to be accurate.
⏭ HERE (https://webkay.robinlinus.com/)
👁🗨Panopticlick👁🗨
When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.
⏭ HERE (https://panopticlick.eff.org/)
This is a demonstration of all the data your browser knows about you. All this data can be accessed by any website without asking you for any permission.
Most of the data points are educated guesses and not considered to be accurate.
⏭ HERE (https://webkay.robinlinus.com/)
👁🗨Panopticlick👁🗨
When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.
⏭ HERE (https://panopticlick.eff.org/)
Webkay
What your Browser knows about you
See all the data your browser reveals about you by visting a website.
Third-party developers abusing Microsoft Apps store & publish fake Google Photos App under the Google LLC name but it is originally an Ad clicker which is running in the back round of the windows system. It’s a completely malicious app that performs various unwanted actvities once installed on the victim’s machine. It Seems developers managed to […]
The post Hackers Abuse Microsoft Store & Publish Fake Google Photos App under Google LLC Name (https://gbhackers.com/fake-google-photos-app/)
The post Hackers Abuse Microsoft Store & Publish Fake Google Photos App under Google LLC Name (https://gbhackers.com/fake-google-photos-app/)
GBHackers On Security
App Developers Abuse Microsoft Store & Publish Fake Google Photos App
Third-party developers abusing Microsoft Apps store to publish fake Google Photos App under the Google LLC name but it is originally an Ad clicker
Tech Giants Concerned About Australia's Encryption Laws
Cyber law changes proposed in Australia specifically state that companies will not be required to implement encryption backdoors, but tech giants are still concerned that the current form of the legislation is too vague and leaves a lot of room for interpretation.
read more (https://www.securityweek.com/tech-giants-concerned-about-australias-encryption-laws)
Cyber law changes proposed in Australia specifically state that companies will not be required to implement encryption backdoors, but tech giants are still concerned that the current form of the legislation is too vague and leaves a lot of room for interpretation.
read more (https://www.securityweek.com/tech-giants-concerned-about-australias-encryption-laws)
Securityweek
Tech Giants Concerned About Australia's Encryption Laws | SecurityWeek.Com
Apple, Cisco, Mozilla, Kaspersky and others are concerned about Australia's encryption laws, despite the government specifically claiming it will not weaken encryption
Some tech media reported that the Telegram Desktop app wasn’t secure because it “leaked IP addresses” when used to accept a voice call.
The reality is much less sensational – Telegram Desktop was at least as secure as other encrypted VoIP apps even before we improved it by adding an option to disable peer-to-peer calls. As for Telegram calls on mobile, they were always more secure than the competition, because they had this setting since day one.
During a peer-to-peer (P2P) call, voice traffic flows directly from one participant of a call to the other without relying on an intermediary server. P2P routing allows to achieve higher quality calls with lower latency, so the current industry standard is to have P2P switched on by default.
However, there’s a catch: by definition, both devices participating in a P2P call have to know the IP addresses of each other. So if you make or accept a call, the person on the other side may in theory learn your IP address.
That’s why, unlike WhatsApp or Viber, Telegram always gave its users the ability to switch off P2P calls and relay them through a Telegram server. Moreover, in most countries we switched off P2P by default.
Telegram Desktop, which is used in less than 0.01% of Telegram calls, was the only platform where this setting was missing. Thanks to a researcher who pointed that out, we made the Telegram Desktop experience consistent with the rest of our apps.
However, it is important to put this into perspective and realize that this is about one Telegram app (Telegram Desktop) being somewhat less secure than other Telegram apps (e.g. Telegram for iOS or Android). If you compare Telegram with other popular messaging services out there, unfortunately, they are not even close to our standards.
Using the terminology from the flashy headlines, WhatsApp, Viber and the rest have been “leaking your IP address” in 100% of calls. They are still doing this, and you can't opt out. The only way to stop this is to have all your friends switch to Telegram.
The reality is much less sensational – Telegram Desktop was at least as secure as other encrypted VoIP apps even before we improved it by adding an option to disable peer-to-peer calls. As for Telegram calls on mobile, they were always more secure than the competition, because they had this setting since day one.
During a peer-to-peer (P2P) call, voice traffic flows directly from one participant of a call to the other without relying on an intermediary server. P2P routing allows to achieve higher quality calls with lower latency, so the current industry standard is to have P2P switched on by default.
However, there’s a catch: by definition, both devices participating in a P2P call have to know the IP addresses of each other. So if you make or accept a call, the person on the other side may in theory learn your IP address.
That’s why, unlike WhatsApp or Viber, Telegram always gave its users the ability to switch off P2P calls and relay them through a Telegram server. Moreover, in most countries we switched off P2P by default.
Telegram Desktop, which is used in less than 0.01% of Telegram calls, was the only platform where this setting was missing. Thanks to a researcher who pointed that out, we made the Telegram Desktop experience consistent with the rest of our apps.
However, it is important to put this into perspective and realize that this is about one Telegram app (Telegram Desktop) being somewhat less secure than other Telegram apps (e.g. Telegram for iOS or Android). If you compare Telegram with other popular messaging services out there, unfortunately, they are not even close to our standards.
Using the terminology from the flashy headlines, WhatsApp, Viber and the rest have been “leaking your IP address” in 100% of calls. They are still doing this, and you can't opt out. The only way to stop this is to have all your friends switch to Telegram.
Librem 5 general development report (October 15th, 2018)
https://puri.sm/posts/librem-5-general-development-report-october-15th-2018/
#purism #librem
https://puri.sm/posts/librem-5-general-development-report-october-15th-2018/
#purism #librem