NoGoolag
4.76K subscribers
20.8K photos
11.7K videos
806 files
20.7K links
Live free!

📡 @NoGoolag

FAQ:
https://t.iss.one/NoGoolag/169

★Group:
https://t.iss.one/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
Many recent roms that supported signature spoofing have this issue now with the latest December security patch by Google

You can try flashing nanodroid patcher to solve it for now

#dec #december #sigspoof #signature #spoofing
End-to-End Encryption

The 2018 debate over the government’s authority to access private encrypted data on digital devices was kicked off in January when the FBO Director Christopher Wray called unbreakable encryption an “urgent public safety issue.” The year will likely also be remembered for a controversial bill passed in Australia, which could give the government there access to data otherwise protected by end-to-end encryption. The year also saw challenges to end-to-end encryption by Russian authorities who ordered secure messaging service Telegram to hand over the encryption keys of 9.5 million active Russian users.

#encryption #privacy #telegram #surveillance
📡@cRyPtHoN_INFOSEC_EN
Forwarded from cRyPtHoN INFOSEC (EN)
Dance Like No One Else Can See

📡@cRyPtHoN_INFOSEC_EN
NanoDroid v20.4 "Constitution"

What's new?

- Thanks to @ale5000 the Patcher can now detect whether the ROM has native sigspoof support and refuses patching in that case

- likewise for the addon.d, in case a custom ROM gains native sigspoof with an OTA-Update.

- LineageOS for microG since December updates refuses sigspoof to work when the permission is not defined in privapp-permissions, this is now the case (on all ROMs with native sigspoof support)

- The SysTest package now checks whether ROM has native sigspoof support, other (minor) changes

- Some Stock ROMs have a Setup Wizard that's incompatible with microG. In Magisk mode it'll be auto-disabled, for System Mode you need to do this manually, if required (see the Issues section of the documentation).
if you don't know what's that about: ignore this.

- To aid Multi-ROM users the Patcher now appends the ROM name/build id to the name of the services.jar backup

- The Uninstaller is not 100 % in shape for this change, will be fixed with the next release

- Updated and improved the Issues section of the documentation and (hopefully) make the ChangeLog easier to understand for end-users.

- Other changes, usual updates, updated and improved the first post here on XDA

https://forum.xda-developers.com/showpost.php?p=78551476&postcount=5146

Download: https://downloads.nanolx.org/NanoDroid/Stable/
Forwarded from Deleted Account
Protect yourself from Vishing frauds

Identity. Information. Money.
There's more on the line than just a call.
Know the difference between a genuine call and vishing.
Protect your financial information from being misused.

Forewarned is forearmed.

Simply put, when you know about vishing, you are better prepared to protect yourself from it too.

Vishing is a type of fraud where a person poses as a genuine caller – may be as a bank official or an authority figure – and lures you into sharing your confidential information with him/her. This is then used for identity theft.

Here are a few steps that will help you protect yourself from vishing:
• Do not provide confidential information over the phone. A bank will never ask you for private information like One Time Password, card/account information or text (SMS) messages.

• Do not trust phone numbers, even if the number displayed is that of your bank, as it could be a scam, where a fraudster falsifies the number he/she is calling from in order to make the call appear as genuine

• When you receive a call, ask questions and get as many details as possible

• When in doubt, inform the caller that you will call back on the number. This will help you validate the genuineness of the call.

• Do not respond to any suspicious looking e-mail, automated calls or text messages

• Do not share your personal information on social sites or media. Be discreet when you tweet.

• Ensure that you update your contact details with the Bank to get timely alerts
Forwarded from Sunny
Schützen Sie sich vor Vishing-Betrug.

Identität. Informationen. Geld.
Es geht um mehr als nur einen Anruf.
Kennen Sie den Unterschied zwischen einem echten Anruf und Vishing.
Schützen Sie Ihre Finanzdaten vor Missbrauch.

Vorgewarnt ist gewappnet.

Einfach ausgedrückt, wenn du über Vishing Bescheid weißt, bist du besser vorbereitet, dich auch davor zu schützen.

Vishing ist eine Art von Betrug, bei dem sich eine Person als echter Anrufer ausgibt - sei es als Bankbeamter oder Autoritätsperson - und Sie dazu verleitet, Ihre vertraulichen Informationen mit ihm zu teilen. Diese wird dann bei Identitätsdiebstahl verwendet.

Hier sind ein paar Schritte, die Ihnen helfen, sich vor Vishing zu schützen:
Geben Sie keine vertraulichen Informationen über das Telefon weiter. Eine Bank wird Sie niemals nach privaten Informationen wie Einmalpasswort, Karten-/Kontodaten oder Textnachrichten (SMS) fragen.

Vertrauen Sie keinen Telefonnummern, auch wenn die angezeigte Nummer die Ihrer Bank ist, da es sich um einen Betrug handeln könnte, bei dem ein Betrüger die Nummer verfälscht, von der aus er anruft, um den Anruf als echt erscheinen zu lassen.

Wenn Sie einen Anruf erhalten, stellen Sie Fragen und erhalten Sie so viele Details wie möglich.

Informieren Sie im Zweifelsfall den Anrufer, dass Sie die Nummer zurückrufen werden. Dies wird Ihnen helfen, die Echtheit des Anrufs zu überprüfen.

Antworten Sie nicht auf verdächtig aussehende E-Mails, automatisierte Anrufe oder Textnachrichten.

Geben Sie Ihre personenbezogenen Daten nicht auf sozialen Websites oder in Medien weiter. Seien Sie diskret, wenn Sie twittern.

Stellen Sie sicher, dass Sie Ihre Kontaktdaten mit der Bank aktualisieren, um rechtzeitig Benachrichtigungen zu erhalten.

#Vishing #Sicherheitsanfälligkeit #Datenschutz #Privatsphäre #Banking #Warnung
Forwarded from cRyPtHoN INFOSEC (EN)
Forwarded from cRyPtHoN INFOSEC (EN)
How Apps on Android Share Data with Facebook - Report

Saturday, December 29, 2018

Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this report, Privacy International illustrates what this data sharing looks like in practice, particularly for people who do not have a Facebook account.
https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report

Read Via Telegram

📡@cRyPtHoN_INFOSEC_EN
Don't kill my app!

Smartphones are turning back into dumbphones. We have to fight back!
To squeeze a little extra battery out of your phone, the Android device vendors listed below (starting with the worst) cripple apps and make them useless.

Smartphones are getting more and more powerful, but the battery capacity is lagging behind. Vendors are always trying to squeeze some battery saving features into the firmware with each new Android release.

But some go so far that they break useful apps just to get a little more juice out of your device. This even gets so absurd that with some vendors (e.g. Nokia, Xiaomi, OnePlus or Huawei) our smart phones are becoming dumbphones again.

👇What you can do against it, manuals for:👇

Nokia: https://dontkillmyapp.com/nokia
OnePlus: https://dontkillmyapp.com/oneplus
Xiaomi: https://dontkillmyapp.com/xiaomi
Huawei: https://dontkillmyapp.com/huawei
Meizu: https://dontkillmyapp.com/meizu
Sony: https://dontkillmyapp.com/sony
Samsung: https://dontkillmyapp.com/samsung
HTC: https://dontkillmyapp.com/htc
LG: https://dontkillmyapp.com/lg
StockAndroid: https://dontkillmyapp.com/stock_android
Uniherz: https://dontkillmyapp.com/unihertz

Source: https://dontkillmyapp.com/
GitHub: https://github.com/urbandroid-team/dont-kill-my-app

#battery #tips #tricks #guide
FilesLocker Ransomware Decrypter

FilesLocker Decrypter is a ransomware decryptor created by Michael Gillespie that decrypts files encrypted by the FilesLocker Ransomware. This decrypter works with version v1 and v2 of the ransomware.

In order to use this decrypter, users must have a copy of the ransom note for the infected system as it contains the encrypted decryption key. This decryption key will be decrypted and used to decrypt a victim's files for free.

More information about the FilesLocker Ransomware can be found at this URL: https://www.bleepingcomputer.com/news/security/new-fileslocker-ransomware-offered-as-a-ransomware-as-a-service/
A detailed guide on using the decryptor can be found here: https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-the-fileslocker-ransomware-with-fileslockerdecrypter/
FilesLocker Decrypter Download: https://www.bleepingcomputer.com/download/fileslockerdecrypter/dl/378/ for: Windows XP/Vista/7/8/Windows 10
32-bit program. Can run on both a 32-bit and 64-bit OS.
Read this guide in german:
https://t.iss.one/cRyPtHoN_INFOSEC_DE/1559

#FilesLocker #Malware #Ransomware #Decrypter #download #guide #Windows
UnCaptcha2 manages to bypass Google's reCAPTCHA system

New iteration of unCaptcha overcomes Google's enhancements making it "easier than ever before" to fool reCAPTCHA, claim researchers

The unCaptcha automated system can once again bypass Google’s reCAPTCHA challenges, despite major updates to the security service.

UnCaptcha was developed in 2017 by researchers at the University of Maryland to bypass the reCAPTCHA mechanism used to protect websites from automated account creation. The system achieved 85 percent accuracy defeating Google's ReCaptcha.

https://www.scmagazineuk.com/uncaptcha2-manages-bypass-googles-recaptcha-system/article/1522085

https://github.com/ecthros/uncaptcha2

Read Via Telegram

📡@cRyPtHoN_INFOSEC_EN
DNS Watch
84.200.69.80
resolver1.dns.watch
No Logging, DNSSEC enabled

84.200.70.40
resolver2.dns.watch
No Logging, DNSSEC enabled

2001:1608:10:25::1c04:b12f
resolver1.dns.watch
Explicit v6 FQDN: resolver1v6.dns.watch
No Logging, DNSSEC enabled

2001:1608:10:25::9249:d69b
resolver2.dns.watch
Explicit v6 FQDN: resolver2v6.dns.watch
No Logging, DNSSEC enabled


Uncensored DNS

DNS Servers
anycast.censurfridns.dk

91.239.100.100
2001:67c:28a4::

Anycast from multiple locations.

unicast.censurfridns.dk

89.233.43.71
2a01:3a0:53:53::

This node is hosted at AS9167 in Copenhagen, Denmark.
https://blog.uncensoreddns.org


#dns
MysteriumVPN Free VPN

❗️2 Trackers (Google)
❗️10 Authorizations

👉 Exodus Privacy Report: https://reports.exodus-privacy.eu.org/en/reports/52142/

👉 Privacy policy Mysterium Network:
https://mysterium.network/privacy-policy/

⚠️Financed by advertising, places trackers, records the use and surfing behavior of the user on the Internet and then sells these your data.

👉 See screenshot: https://t.iss.one/BlackBox_Security_Datenschutz_DE/3400

👉Verdict: Do not use it.👈

#Privacy #VPN #Tracking #Google #advertising #Tracking