personalDNSfilter
Block ads via local VPN connection and custom DNS (optional).
~ Features:
- Open source
- Lightweight (<150 KB approx.)
- Negligible RAM consumption (10 MB approx.)
- Battery friendly
- Inbuilt DNS changer (Can use Custom DNS)
- Hosts blocking
- Domain blocking
- Support manual adding domain for whitelisting & blacklisting
- Inbuilt app filter (Can bypass certain apps from being filtered)
- No privacy mining (Your data is your data)
~ Bonus feature:
- Can act as network logger also (User can see what app is making request)
>Source:
https://github.com/IngoZenz/personaldnsfilter
>XDA:
https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898
>Web:
https://www.zenz-solutions.de/personaldnsfilter/
>Telegram:
https://t.iss.one/pdnsf
#pdnsf #pdf #dns
Block ads via local VPN connection and custom DNS (optional).
~ Features:
- Open source
- Lightweight (<150 KB approx.)
- Negligible RAM consumption (10 MB approx.)
- Battery friendly
- Inbuilt DNS changer (Can use Custom DNS)
- Hosts blocking
- Domain blocking
- Support manual adding domain for whitelisting & blacklisting
- Inbuilt app filter (Can bypass certain apps from being filtered)
- No privacy mining (Your data is your data)
~ Bonus feature:
- Can act as network logger also (User can see what app is making request)
>Source:
https://github.com/IngoZenz/personaldnsfilter
>XDA:
https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898
>Web:
https://www.zenz-solutions.de/personaldnsfilter/
>Telegram:
https://t.iss.one/pdnsf
#pdnsf #pdf #dns
personalHTTPproxy
Use local http proxy for ad blocking (Required APN configuration to work).
~ Features:
- Open source
- Lightweight (<100 KB)
- Negligible RAM consumption (10 MB approx.)
- Battery friendly
- Hosts blocking
- Support wildcard blocking
- Support for whitelisting & blacklisting
- Only intercept http/https connection
- Can act as real http/https proxy (For bypassing blocked websites with ad blocked)
- No privacy mining (Your data is your data)
~ Bonus feature:
- Can act as network logger also (User can see what app is making request)
>Source:
https://github.com/IngoZenz/personalhttpproxy
>XDA:
https://forum.xda-developers.com/android/apps-games/app-personal-httpproxy-android-block-t3339874
>Web:
https://www.zenz-solutions.de/personalhttpproxy/
>Telegram:
https://t.iss.one/pdnsf
#phttpp #php #http #proxy
Use local http proxy for ad blocking (Required APN configuration to work).
~ Features:
- Open source
- Lightweight (<100 KB)
- Negligible RAM consumption (10 MB approx.)
- Battery friendly
- Hosts blocking
- Support wildcard blocking
- Support for whitelisting & blacklisting
- Only intercept http/https connection
- Can act as real http/https proxy (For bypassing blocked websites with ad blocked)
- No privacy mining (Your data is your data)
~ Bonus feature:
- Can act as network logger also (User can see what app is making request)
>Source:
https://github.com/IngoZenz/personalhttpproxy
>XDA:
https://forum.xda-developers.com/android/apps-games/app-personal-httpproxy-android-block-t3339874
>Web:
https://www.zenz-solutions.de/personalhttpproxy/
>Telegram:
https://t.iss.one/pdnsf
#phttpp #php #http #proxy
DOH (DNS Over HTTPS) Server App
New SmokeScreen Version Alpha-1.0 (Build 8):
- The notification doesn't make sounds anymore
- The notification now shows how many entries are cached
- Added logging which collects some debug info for me (only locally on your device, you can send the logs to me by hand)
🔆 🔆
SmokeScreen DNS Changer APP Neue Version Alpha-1.0 (Build 8):
- Die Benachrichtigung erzeugt keine Geräusche mehr.
- Die Benachrichtigung zeigt nun an, wie viele Einträge zwischengespeichert werden.
- Protokollierung hinzugefügt, die einige Debug-Informationen für mich sammelt (nur lokal auf Ihrem Gerät, Sie können die Protokolle von Hand an mich senden).
#smokescreen #Frostnerd #DNSChanger #keweon #keineWerbung #Adblock #Bugreport
Download🔽🔽🔽
📡 BlackBox▪️Security▪️Datenschutz▪️Support
New SmokeScreen Version Alpha-1.0 (Build 8):
- The notification doesn't make sounds anymore
- The notification now shows how many entries are cached
- Added logging which collects some debug info for me (only locally on your device, you can send the logs to me by hand)
🔆 🔆
SmokeScreen DNS Changer APP Neue Version Alpha-1.0 (Build 8):
- Die Benachrichtigung erzeugt keine Geräusche mehr.
- Die Benachrichtigung zeigt nun an, wie viele Einträge zwischengespeichert werden.
- Protokollierung hinzugefügt, die einige Debug-Informationen für mich sammelt (nur lokal auf Ihrem Gerät, Sie können die Protokolle von Hand an mich senden).
#smokescreen #Frostnerd #DNSChanger #keweon #keineWerbung #Adblock #Bugreport
Download🔽🔽🔽
📡 BlackBox▪️Security▪️Datenschutz▪️Support
SmokeScreen DOH (DNS Over HTTPS) Server App
❓What does this app do?
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets -- to receive DNS requests your phone is sending and forwards them to a Dns-over-https server of your choice. It offers a lot of flexibility, is easy to use and doesn't use many resources. Type #doh, #dns or #alpha to get started.
❓ Who is behind it?
The app is being developed by me, Ch4t4r (or Daniel Wolf if you'd like). I'm 21 years old and a software engineer from Germany. I study computer sciences. You might have seen my DnsChanger application: https://play.google.com/store/apps/details?id=com.frostnerd.dnschanger
❓ How Do I get help?
You have multiple choices for receiving help. Either post here in our
I do answer technical questions as well.
❓ Is this App open source?
❓ Which server do you recommend?
I recommend the
#smokescreen #Frostnerd #DNSChanger #keweon #keineWerbung #Adblock #Bugreport #Support
❓What does this app do?
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets -- to receive DNS requests your phone is sending and forwards them to a Dns-over-https server of your choice. It offers a lot of flexibility, is easy to use and doesn't use many resources. Type #doh, #dns or #alpha to get started.
❓ Who is behind it?
The app is being developed by me, Ch4t4r (or Daniel Wolf if you'd like). I'm 21 years old and a software engineer from Germany. I study computer sciences. You might have seen my DnsChanger application: https://play.google.com/store/apps/details?id=com.frostnerd.dnschanger
Source codes to my apps can be accessed here: git.frostnerd.com❓ How Do I get help?
You have multiple choices for receiving help. Either post here in our
TG support group https://t.iss.one/joinchat/I54nRleveRG3xwAa3StNCg , send me a pm, or an E-Mail to [email protected].I do answer technical questions as well.
❓ Is this App open source?
Yes. The source code can be found here: smokescreen.app/source❓ Which server do you recommend?
I recommend the
Keweon Dns-over-https server. This server blocks ads and tracking; keweon.comtelegram group english here: https://t.iss.one/keweontelegram group german here: https://t.iss.one/keweonDE#smokescreen #Frostnerd #DNSChanger #keweon #keineWerbung #Adblock #Bugreport #Support
OpenWPM
OpenWPM is a web privacy measurement framework which makes it easy to collect data for privacy studies on a scale of thousands to millions of websites. OpenWPM is built on top of Firefox, with automation provided by Selenium. It includes several hooks for data collection. Check out the instrumentation section below for more details.
https://github.com/mozilla/OpenWPM
#privacy #cookies #surveillance #firefox
📡@cRyPtHoN_INFOSEC_EN
OpenWPM is a web privacy measurement framework which makes it easy to collect data for privacy studies on a scale of thousands to millions of websites. OpenWPM is built on top of Firefox, with automation provided by Selenium. It includes several hooks for data collection. Check out the instrumentation section below for more details.
https://github.com/mozilla/OpenWPM
#privacy #cookies #surveillance #firefox
📡@cRyPtHoN_INFOSEC_EN
The Indian government passed an order, authorising 10 central agencies to monitor, intercept and decrypt information stored, transmitted and generated on any computer
https://www.cnbctv18.com/economy/government-will-now-monitor-your-computer-through-10-central-agencies-1756701.htm/
Source: Gazette
#india #why #gov
https://www.cnbctv18.com/economy/government-will-now-monitor-your-computer-through-10-central-agencies-1756701.htm/
Source: Gazette
#india #why #gov
cnbctv18.com
Government will now monitor your computer through 10 central agencies
CNBCTV18 is India's leading financial, economic and business information source. The leading platform for business & financial news, BSE/NSE stock market news updates, business news live, IPO Analysis, Mutual Funds Trends, Auto, Infra, Politics news and more…
Literally Just A Big List Of Facebook’s 2018 Scandals
https://www.buzzfeednews.com/article/ryanmac/literally-just-a-big-list-of-facebooks-2018-scandals
#why #fb #facebook #scandals #list #2018
https://www.buzzfeednews.com/article/ryanmac/literally-just-a-big-list-of-facebooks-2018-scandals
#why #fb #facebook #scandals #list #2018
BuzzFeed News
Literally Just A Big List Of Facebook’s 2018 Scandals
Mark Zuckerberg began the year promising that he would fix Facebook. He didn’t, and 2018 has only presented more problems.
Recent hacked documents have revealed an international network of politicians, journalists, academics, researchers and military officers, all engaged in highly deceptive covert propaganda campaigns funded by the British Foreign and Commonwealth Office (FCO), NATO, Facebook and hardline national security institutions.
https://grayzoneproject.com/2018/12/17/inside-the-temple-of-covert-propaganda-the-integrity-initiative-and-the-uks-scandalous-information-war/
https://www.cyberguerrilla.org/blog/operation-integrity-initiative-british-informational-war-against-all-part-2/
#why #nato #fb #facebook #propaganda #uk #press #journalism
https://grayzoneproject.com/2018/12/17/inside-the-temple-of-covert-propaganda-the-integrity-initiative-and-the-uks-scandalous-information-war/
https://www.cyberguerrilla.org/blog/operation-integrity-initiative-british-informational-war-against-all-part-2/
#why #nato #fb #facebook #propaganda #uk #press #journalism
The Grayzone
Inside the temple of covert propaganda: The Integrity Initiative and the UK's scandalous information war - The Grayzone
The Grayzone entered the carefully concealed offices of a covert, British government-backed propaganda mill that is at the center of an international scandal the mainstream media refuses to touch. By Mohamed Elmaazi and Max Blumenthal Recent hacked documents…
End-to-End Encryption
The 2018 debate over the government’s authority to access private encrypted data on digital devices was kicked off in January when the FBO Director Christopher Wray called unbreakable encryption an “urgent public safety issue.” The year will likely also be remembered for a controversial bill passed in Australia, which could give the government there access to data otherwise protected by end-to-end encryption. The year also saw challenges to end-to-end encryption by Russian authorities who ordered secure messaging service Telegram to hand over the encryption keys of 9.5 million active Russian users.
#encryption #privacy #telegram #surveillance
📡@cRyPtHoN_INFOSEC_EN
The 2018 debate over the government’s authority to access private encrypted data on digital devices was kicked off in January when the FBO Director Christopher Wray called unbreakable encryption an “urgent public safety issue.” The year will likely also be remembered for a controversial bill passed in Australia, which could give the government there access to data otherwise protected by end-to-end encryption. The year also saw challenges to end-to-end encryption by Russian authorities who ordered secure messaging service Telegram to hand over the encryption keys of 9.5 million active Russian users.
#encryption #privacy #telegram #surveillance
📡@cRyPtHoN_INFOSEC_EN
Forwarded from cRyPtHoN™ INFOSEC (EN)
NanoDroid v20.4 "Constitution"
What's new?
- Thanks to @ale5000 the Patcher can now detect whether the ROM has native sigspoof support and refuses patching in that case
- likewise for the addon.d, in case a custom ROM gains native sigspoof with an OTA-Update.
- LineageOS for microG since December updates refuses sigspoof to work when the permission is not defined in privapp-permissions, this is now the case (on all ROMs with native sigspoof support)
- The SysTest package now checks whether ROM has native sigspoof support, other (minor) changes
- Some Stock ROMs have a Setup Wizard that's incompatible with microG. In Magisk mode it'll be auto-disabled, for System Mode you need to do this manually, if required (see the Issues section of the documentation).
if you don't know what's that about: ignore this.
- To aid Multi-ROM users the Patcher now appends the ROM name/build id to the name of the services.jar backup
- The Uninstaller is not 100 % in shape for this change, will be fixed with the next release
- Updated and improved the Issues section of the documentation and (hopefully) make the ChangeLog easier to understand for end-users.
- Other changes, usual updates, updated and improved the first post here on XDA
https://forum.xda-developers.com/showpost.php?p=78551476&postcount=5146
Download: https://downloads.nanolx.org/NanoDroid/Stable/
What's new?
- Thanks to @ale5000 the Patcher can now detect whether the ROM has native sigspoof support and refuses patching in that case
- likewise for the addon.d, in case a custom ROM gains native sigspoof with an OTA-Update.
- LineageOS for microG since December updates refuses sigspoof to work when the permission is not defined in privapp-permissions, this is now the case (on all ROMs with native sigspoof support)
- The SysTest package now checks whether ROM has native sigspoof support, other (minor) changes
- Some Stock ROMs have a Setup Wizard that's incompatible with microG. In Magisk mode it'll be auto-disabled, for System Mode you need to do this manually, if required (see the Issues section of the documentation).
if you don't know what's that about: ignore this.
- To aid Multi-ROM users the Patcher now appends the ROM name/build id to the name of the services.jar backup
- The Uninstaller is not 100 % in shape for this change, will be fixed with the next release
- Updated and improved the Issues section of the documentation and (hopefully) make the ChangeLog easier to understand for end-users.
- Other changes, usual updates, updated and improved the first post here on XDA
https://forum.xda-developers.com/showpost.php?p=78551476&postcount=5146
Download: https://downloads.nanolx.org/NanoDroid/Stable/
Xda-Developers
20.4.20181230 "Constitution" - Post #5146
Hi all,right before the new year, version 20.4 hits a Mirror (Universe) near you. Codename for this release is
Forwarded from Deleted Account
Protect yourself from Vishing frauds
Identity. Information. Money.
There's more on the line than just a call.
Know the difference between a genuine call and vishing.
Protect your financial information from being misused.
Forewarned is forearmed.
Simply put, when you know about vishing, you are better prepared to protect yourself from it too.
Vishing is a type of fraud where a person poses as a genuine caller – may be as a bank official or an authority figure – and lures you into sharing your confidential information with him/her. This is then used for identity theft.
Here are a few steps that will help you protect yourself from vishing:
• Do not provide confidential information over the phone. A bank will never ask you for private information like One Time Password, card/account information or text (SMS) messages.
• Do not trust phone numbers, even if the number displayed is that of your bank, as it could be a scam, where a fraudster falsifies the number he/she is calling from in order to make the call appear as genuine
• When you receive a call, ask questions and get as many details as possible
• When in doubt, inform the caller that you will call back on the number. This will help you validate the genuineness of the call.
• Do not respond to any suspicious looking e-mail, automated calls or text messages
• Do not share your personal information on social sites or media. Be discreet when you tweet.
• Ensure that you update your contact details with the Bank to get timely alerts
Identity. Information. Money.
There's more on the line than just a call.
Know the difference between a genuine call and vishing.
Protect your financial information from being misused.
Forewarned is forearmed.
Simply put, when you know about vishing, you are better prepared to protect yourself from it too.
Vishing is a type of fraud where a person poses as a genuine caller – may be as a bank official or an authority figure – and lures you into sharing your confidential information with him/her. This is then used for identity theft.
Here are a few steps that will help you protect yourself from vishing:
• Do not provide confidential information over the phone. A bank will never ask you for private information like One Time Password, card/account information or text (SMS) messages.
• Do not trust phone numbers, even if the number displayed is that of your bank, as it could be a scam, where a fraudster falsifies the number he/she is calling from in order to make the call appear as genuine
• When you receive a call, ask questions and get as many details as possible
• When in doubt, inform the caller that you will call back on the number. This will help you validate the genuineness of the call.
• Do not respond to any suspicious looking e-mail, automated calls or text messages
• Do not share your personal information on social sites or media. Be discreet when you tweet.
• Ensure that you update your contact details with the Bank to get timely alerts
Forwarded from Sunny
Schützen Sie sich vor Vishing-Betrug.
Identität. Informationen. Geld.
Es geht um mehr als nur einen Anruf.
Kennen Sie den Unterschied zwischen einem echten Anruf und Vishing.
Schützen Sie Ihre Finanzdaten vor Missbrauch.
Vorgewarnt ist gewappnet.
Einfach ausgedrückt, wenn du über Vishing Bescheid weißt, bist du besser vorbereitet, dich auch davor zu schützen.
Vishing ist eine Art von Betrug, bei dem sich eine Person als echter Anrufer ausgibt - sei es als Bankbeamter oder Autoritätsperson - und Sie dazu verleitet, Ihre vertraulichen Informationen mit ihm zu teilen. Diese wird dann bei Identitätsdiebstahl verwendet.
Hier sind ein paar Schritte, die Ihnen helfen, sich vor Vishing zu schützen:
✅Geben Sie keine vertraulichen Informationen über das Telefon weiter. Eine Bank wird Sie niemals nach privaten Informationen wie Einmalpasswort, Karten-/Kontodaten oder Textnachrichten (SMS) fragen.
✅Vertrauen Sie keinen Telefonnummern, auch wenn die angezeigte Nummer die Ihrer Bank ist, da es sich um einen Betrug handeln könnte, bei dem ein Betrüger die Nummer verfälscht, von der aus er anruft, um den Anruf als echt erscheinen zu lassen.
✅Wenn Sie einen Anruf erhalten, stellen Sie Fragen und erhalten Sie so viele Details wie möglich.
✅Informieren Sie im Zweifelsfall den Anrufer, dass Sie die Nummer zurückrufen werden. Dies wird Ihnen helfen, die Echtheit des Anrufs zu überprüfen.
✅Antworten Sie nicht auf verdächtig aussehende E-Mails, automatisierte Anrufe oder Textnachrichten.
✅Geben Sie Ihre personenbezogenen Daten nicht auf sozialen Websites oder in Medien weiter. Seien Sie diskret, wenn Sie twittern.
✅Stellen Sie sicher, dass Sie Ihre Kontaktdaten mit der Bank aktualisieren, um rechtzeitig Benachrichtigungen zu erhalten.
#Vishing #Sicherheitsanfälligkeit #Datenschutz #Privatsphäre #Banking #Warnung
Identität. Informationen. Geld.
Es geht um mehr als nur einen Anruf.
Kennen Sie den Unterschied zwischen einem echten Anruf und Vishing.
Schützen Sie Ihre Finanzdaten vor Missbrauch.
Vorgewarnt ist gewappnet.
Einfach ausgedrückt, wenn du über Vishing Bescheid weißt, bist du besser vorbereitet, dich auch davor zu schützen.
Vishing ist eine Art von Betrug, bei dem sich eine Person als echter Anrufer ausgibt - sei es als Bankbeamter oder Autoritätsperson - und Sie dazu verleitet, Ihre vertraulichen Informationen mit ihm zu teilen. Diese wird dann bei Identitätsdiebstahl verwendet.
Hier sind ein paar Schritte, die Ihnen helfen, sich vor Vishing zu schützen:
✅Geben Sie keine vertraulichen Informationen über das Telefon weiter. Eine Bank wird Sie niemals nach privaten Informationen wie Einmalpasswort, Karten-/Kontodaten oder Textnachrichten (SMS) fragen.
✅Vertrauen Sie keinen Telefonnummern, auch wenn die angezeigte Nummer die Ihrer Bank ist, da es sich um einen Betrug handeln könnte, bei dem ein Betrüger die Nummer verfälscht, von der aus er anruft, um den Anruf als echt erscheinen zu lassen.
✅Wenn Sie einen Anruf erhalten, stellen Sie Fragen und erhalten Sie so viele Details wie möglich.
✅Informieren Sie im Zweifelsfall den Anrufer, dass Sie die Nummer zurückrufen werden. Dies wird Ihnen helfen, die Echtheit des Anrufs zu überprüfen.
✅Antworten Sie nicht auf verdächtig aussehende E-Mails, automatisierte Anrufe oder Textnachrichten.
✅Geben Sie Ihre personenbezogenen Daten nicht auf sozialen Websites oder in Medien weiter. Seien Sie diskret, wenn Sie twittern.
✅Stellen Sie sicher, dass Sie Ihre Kontaktdaten mit der Bank aktualisieren, um rechtzeitig Benachrichtigungen zu erhalten.
#Vishing #Sicherheitsanfälligkeit #Datenschutz #Privatsphäre #Banking #Warnung
Forwarded from cRyPtHoN™ INFOSEC (EN)
How Apps on Android Share Data with Facebook - Report
Saturday, December 29, 2018
Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this report, Privacy International illustrates what this data sharing looks like in practice, particularly for people who do not have a Facebook account.
https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report
Read Via Telegram
📡@cRyPtHoN_INFOSEC_EN
Saturday, December 29, 2018
Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this report, Privacy International illustrates what this data sharing looks like in practice, particularly for people who do not have a Facebook account.
https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report
Read Via Telegram
📡@cRyPtHoN_INFOSEC_EN
Don't kill my app!
Smartphones are turning back into dumbphones. We have to fight back!
To squeeze a little extra battery out of your phone, the Android device vendors listed below (starting with the worst) cripple apps and make them useless.
Smartphones are getting more and more powerful, but the battery capacity is lagging behind. Vendors are always trying to squeeze some battery saving features into the firmware with each new Android release.
But some go so far that they break useful apps just to get a little more juice out of your device. This even gets so absurd that with some vendors (e.g. Nokia, Xiaomi, OnePlus or Huawei) our smart phones are becoming dumbphones again.
👇What you can do against it, manuals for:👇
Source
GitHub
#battery #tips #tricks #guide
Smartphones are turning back into dumbphones. We have to fight back!
To squeeze a little extra battery out of your phone, the Android device vendors listed below (starting with the worst) cripple apps and make them useless.
Smartphones are getting more and more powerful, but the battery capacity is lagging behind. Vendors are always trying to squeeze some battery saving features into the firmware with each new Android release.
But some go so far that they break useful apps just to get a little more juice out of your device. This even gets so absurd that with some vendors (e.g. Nokia, Xiaomi, OnePlus or Huawei) our smart phones are becoming dumbphones again.
👇What you can do against it, manuals for:👇
Nokia: https://dontkillmyapp.com/nokiaOnePlus: https://dontkillmyapp.com/oneplusXiaomi: https://dontkillmyapp.com/xiaomiHuawei: https://dontkillmyapp.com/huaweiMeizu: https://dontkillmyapp.com/meizuSony: https://dontkillmyapp.com/sonySamsung: https://dontkillmyapp.com/samsungHTC: https://dontkillmyapp.com/htcLG: https://dontkillmyapp.com/lgStockAndroid: https://dontkillmyapp.com/stock_androidUniherz: https://dontkillmyapp.com/unihertzSource
: https://dontkillmyapp.com/GitHub
: https://github.com/urbandroid-team/dont-kill-my-app#battery #tips #tricks #guide