Why Democracies Die: The Reason Privacy Is the Source of Power in the 21st Century
https://medium.com/privateid-blog/why-democracies-die-the-reason-privacy-is-the-source-of-power-in-the-21st-century-4883906d910
#why
https://medium.com/privateid-blog/why-democracies-die-the-reason-privacy-is-the-source-of-power-in-the-21st-century-4883906d910
#why
Medium
Why Democracies Die: The Reason Privacy Is the Source of Power in the 21st Century
Listen to the PrivateID Podcast. Download this episode here (right click/save as..)
π NoGooLag group - Avoid gapps n spyware! - well known to be a cult
https://t.iss.one/joinchat/FyFlS0X2D7f6YNvdxhEsfw
π Privacy & Security - Group discussion for anything related to Privacy and Security.
https://t.iss.one/Privacy101Security
π BlackBox Security - Latest news and discussions about security - privacy and democracy threats
https://t.iss.one/joinchat/Ev2mTVbTsZTMNLFeIztFjQ
https://t.iss.one/joinchat/FyFlS0X2D7f6YNvdxhEsfw
π Privacy & Security - Group discussion for anything related to Privacy and Security.
https://t.iss.one/Privacy101Security
π BlackBox Security - Latest news and discussions about security - privacy and democracy threats
https://t.iss.one/joinchat/Ev2mTVbTsZTMNLFeIztFjQ
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Open source breaches up by over 70 percent
A quarter of firms confirmed or suspected a web application breach in the past 12 months.
Open source breaches have increased by 71 percent over the last five years, while 26 percent of companies reported a confirmed or suspected web application breach in the past year alone, according to a new survey.
https://www.scmagazineuk.com/open-source-breaches-70-percent/article/1577919
Read Via Telegram
#opensource #vulnerability #hacking
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
A quarter of firms confirmed or suspected a web application breach in the past 12 months.
Open source breaches have increased by 71 percent over the last five years, while 26 percent of companies reported a confirmed or suspected web application breach in the past year alone, according to a new survey.
https://www.scmagazineuk.com/open-source-breaches-70-percent/article/1577919
Read Via Telegram
#opensource #vulnerability #hacking
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
And the mass is walking!
#Article13Demo in #Frankfurt has become so big that it has been converted into a walking demo! #SaveYourInternet #article13 #Uploadfilter
https://twitter.com/uploadfilter/status/1102997023933022208?s=09
#Uploadfilter #Artikel13 #NoUploadFilter #demo #CreateAwareness #getactive #SaveTheInternet #FreeSpeach
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
#Article13Demo in #Frankfurt has become so big that it has been converted into a walking demo! #SaveYourInternet #article13 #Uploadfilter
https://twitter.com/uploadfilter/status/1102997023933022208?s=09
#Uploadfilter #Artikel13 #NoUploadFilter #demo #CreateAwareness #getactive #SaveTheInternet #FreeSpeach
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
π§ π¬π§ Silk Road [Part 1- 2 - 3]
The Silk Road was an ancient network of trade routes that started in China in the 2nd century B.C. Via a combination of roads, and sea routes, goods like silk, paper and spices were transported from the producers in Asia to markets in Europe. Eventually, it wasnβt just goods that were traded β there were also ideas, customs, religions and even diseases.
The Silk Road expanded throughout different continents and civilizations for several centuries. It connected Asia, Europe, Africa and the Middle East. A marketplace across the world.
Two major expansions can be traced back to the Silk Road. One of these was the introduction of Buddhism into China. The second was the Black Death.
π» Part 1:
https://t.iss.one/BlackBox_Archiv/212
π» Part 2:
https://t.iss.one/BlackBox_Archiv/213
π» Part 3:
https://t.iss.one/BlackBox_Archiv/214
#SilkRoad #darknet #podcast #DEA
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
The Silk Road was an ancient network of trade routes that started in China in the 2nd century B.C. Via a combination of roads, and sea routes, goods like silk, paper and spices were transported from the producers in Asia to markets in Europe. Eventually, it wasnβt just goods that were traded β there were also ideas, customs, religions and even diseases.
The Silk Road expanded throughout different continents and civilizations for several centuries. It connected Asia, Europe, Africa and the Middle East. A marketplace across the world.
Two major expansions can be traced back to the Silk Road. One of these was the introduction of Buddhism into China. The second was the Black Death.
π» Part 1:
https://t.iss.one/BlackBox_Archiv/212
π» Part 2:
https://t.iss.one/BlackBox_Archiv/213
π» Part 3:
https://t.iss.one/BlackBox_Archiv/214
#SilkRoad #darknet #podcast #DEA
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Google is working on securely storing Digital Driver's Licenses in Android
https://www.xda-developers.com/google-android-digital-drivers-license
π‘ @NoGoolag
#google #driver #license #id #why
https://www.xda-developers.com/google-android-digital-drivers-license
π‘ @NoGoolag
#google #driver #license #id #why
XDA Developers
Google is working on securely storing Digital Driverβs Licenses in Android
Android R could support securely storing mobile driver's licenses on devices like the Google Pixel 2, Google Pixel 3, or Google Pixel 4.
Generic System Image (GSI) list (arm - arm64)
Here's a up to date collection of available GSI ROMs, in order to keep it easy to choose what you want.
You will find:
β Official Android 9 Pie
β Unofficial Android 9 Pie
β Android 8 Oreo
https://github.com/phhusson/treble_experimentations/wiki/Generic-System-Image-%28GSI%29-list
How to flash a Generic System Image (GSI) on Project Treble supported devices
https://www.xda-developers.com/flash-generic-system-image-project-treble-device/
π‘ @NoGoolag
#GSI #ROM #android #pie #oreo #official #unofficial
Here's a up to date collection of available GSI ROMs, in order to keep it easy to choose what you want.
You will find:
β Official Android 9 Pie
β Unofficial Android 9 Pie
β Android 8 Oreo
https://github.com/phhusson/treble_experimentations/wiki/Generic-System-Image-%28GSI%29-list
How to flash a Generic System Image (GSI) on Project Treble supported devices
https://www.xda-developers.com/flash-generic-system-image-project-treble-device/
π‘ @NoGoolag
#GSI #ROM #android #pie #oreo #official #unofficial
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Patch immediately: Chrome zero-day flaw is being attacked now
Google's head of Chrome security has warned all Chrome users to update the browser immediately to patch to a zero day flaw that was being exploited now.
Google issued a warning about the attacks yesterday in an update to a post about a Chrome update released on March 1 that contained one security fix.
https://www.cso.com.au/article/658538/patch-immediately-chrome-zero-day-flaw-being-attacked-now/
Read Via Telegram
#deletechrome #deletegoogle
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Google's head of Chrome security has warned all Chrome users to update the browser immediately to patch to a zero day flaw that was being exploited now.
Google issued a warning about the attacks yesterday in an update to a post about a Chrome update released on March 1 that contained one security fix.
https://www.cso.com.au/article/658538/patch-immediately-chrome-zero-day-flaw-being-attacked-now/
Read Via Telegram
#deletechrome #deletegoogle
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
NSA quietly abandons controversial surveillance programme
For the past six months the US National Security Agency has not been collecting metadata on Americans' calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act.
For the past six months the US National Security Agency has not been collecting metadata on Americansβ calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act, a congressional aide said Saturday.
https://www.scmagazineuk.com/nsa-quietly-abandons-controversial-surveillance-programme/article/1578032
Read Via Telegram
#nsa #surveillance #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
For the past six months the US National Security Agency has not been collecting metadata on Americans' calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act.
For the past six months the US National Security Agency has not been collecting metadata on Americansβ calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act, a congressional aide said Saturday.
https://www.scmagazineuk.com/nsa-quietly-abandons-controversial-surveillance-programme/article/1578032
Read Via Telegram
#nsa #surveillance #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Labs survey finds privacy concerns, distrust of social media rampant with all age groups
Before Cambridge Analytica made Facebook an unwilling accomplice to a scandal by appropriating and misusing more than 50 million usersβ data, the public was already living in relative unease over the privacy of their information online.
The Cambridge Analytica incident, along with other, seemingly day-to-day headlines about data breaches pouring private information into criminal hands, has eroded public trust in corporationsβ ability to protect data, as well as their willingness to use the data in ethically responsible ways.
https://blog.malwarebytes.com/security-world/2019/03/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups/
#FacebookDigitalGangsters #socialmedia #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Before Cambridge Analytica made Facebook an unwilling accomplice to a scandal by appropriating and misusing more than 50 million usersβ data, the public was already living in relative unease over the privacy of their information online.
The Cambridge Analytica incident, along with other, seemingly day-to-day headlines about data breaches pouring private information into criminal hands, has eroded public trust in corporationsβ ability to protect data, as well as their willingness to use the data in ethically responsible ways.
https://blog.malwarebytes.com/security-world/2019/03/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups/
#FacebookDigitalGangsters #socialmedia #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
It's not just the walls that have ears. It's also the hard drives....
From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic
Scientists at the University of Michigan and Zhejiang University in China have found a method to detect human voices through hard drives. The process uses the vibrations of the platters, which are caused by acoustic signals.
Eggheads at the University of Michigan in the US, and Zhejiang University in China, have found that hard disk drives (HDDs) can be turned into listening devices, using malicious firmware and signal processing calculations.
For a study titled "Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone," computer scientists Andrew Kwong, Wenyuan Xu, and Kevin Fu describe an acoustic side-channel that can be accessed by measuring how sound waves make hard disk parts vibrate.
"Our research demonstrates that the mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech," their paper, obtained by The Register ahead of its formal publication, stated. "These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive."
https://www.theregister.co.uk/2019/03/07/hard_drive_eavesdropping/
#surveillance #harddrive #eavesdropping
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic
Scientists at the University of Michigan and Zhejiang University in China have found a method to detect human voices through hard drives. The process uses the vibrations of the platters, which are caused by acoustic signals.
Eggheads at the University of Michigan in the US, and Zhejiang University in China, have found that hard disk drives (HDDs) can be turned into listening devices, using malicious firmware and signal processing calculations.
For a study titled "Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone," computer scientists Andrew Kwong, Wenyuan Xu, and Kevin Fu describe an acoustic side-channel that can be accessed by measuring how sound waves make hard disk parts vibrate.
"Our research demonstrates that the mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech," their paper, obtained by The Register ahead of its formal publication, stated. "These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive."
https://www.theregister.co.uk/2019/03/07/hard_drive_eavesdropping/
#surveillance #harddrive #eavesdropping
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
This media is not supported in your browser
VIEW IN TELEGRAM
Adware Apps in Google Play Simulate Uninstall for Persistence
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time.
πΊ https://twitter.com/LukasStefanko/status/1102889352118616064/video/1
https://www.bleepingcomputer.com/news/security/adware-apps-in-google-play-simulate-uninstall-for-persistence/
π‘ @NoGoolag
#adware #apps #playstore
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time.
πΊ https://twitter.com/LukasStefanko/status/1102889352118616064/video/1
https://www.bleepingcomputer.com/news/security/adware-apps-in-google-play-simulate-uninstall-for-persistence/
π‘ @NoGoolag
#adware #apps #playstore
Distraction, rescue attempt, deep change of heart?
Mark Zuckerberg wants to turn Facebook into a company that focuses on the privacy of communication. But this should not be confused with general data protection.
In his current message on Facebook, Zuckerberg also emphasizes the aspect of end-to-end encryption of content.
What he hides:
The contents of the messages are of course interesting for targeted advertising - but even more important are usually personal information and metadata: Who wrote when with whom and where? Who is linked to whom? How old is the person, what gender does he or she have and which pages do he or she like? Facebook also knows all this when it can't read the contents of communication between users.
It's right and proper that Facebook wants to put the confidentiality of communication content at the heart of its own products. But this should not be confused with Facebook generally becoming a company that focuses on privacy or data protection. Not only content is personal data, but also meta and profile information. At present, it does not look as if Facebook will provide more data protection at those points where it would attack the core of the business model.
(German)
https://t3n.de/news/facebook-zuckerberg-datenschutz-1149112
Facebookβs new move isn't about privacy. Itβs about domination.
https://www.theguardian.com/commentisfree/2019/mar/07/facebook-privacy-domination
A 'privacy-focused' Facebook would kill Zuckerberg's business model
https://www.theguardian.com/commentisfree/2019/mar/07/privacy-focused-facebook-kill-zuckerbergs-business-model
Zuckerberg: Facebook will shift focus to private networks instead of open ones
https://arstechnica.com/gadgets/2019/03/zuckerberg-facebook-will-shift-focus-to-private-networks-instead-of-open-ones
Mark Zuckerberg gets privacy religion, but is it a case of βborn againβ or cynical pragmatism?
https://diginomica.com/mark-zuckerberg-gets-privacy-religion-but-is-it-a-case-of-born-again-or-just-naked-pragmatism
π‘ @NoGoolag
#DeleteFacebook #fb
Mark Zuckerberg wants to turn Facebook into a company that focuses on the privacy of communication. But this should not be confused with general data protection.
In his current message on Facebook, Zuckerberg also emphasizes the aspect of end-to-end encryption of content.
What he hides:
The contents of the messages are of course interesting for targeted advertising - but even more important are usually personal information and metadata: Who wrote when with whom and where? Who is linked to whom? How old is the person, what gender does he or she have and which pages do he or she like? Facebook also knows all this when it can't read the contents of communication between users.
It's right and proper that Facebook wants to put the confidentiality of communication content at the heart of its own products. But this should not be confused with Facebook generally becoming a company that focuses on privacy or data protection. Not only content is personal data, but also meta and profile information. At present, it does not look as if Facebook will provide more data protection at those points where it would attack the core of the business model.
(German)
https://t3n.de/news/facebook-zuckerberg-datenschutz-1149112
Facebookβs new move isn't about privacy. Itβs about domination.
https://www.theguardian.com/commentisfree/2019/mar/07/facebook-privacy-domination
A 'privacy-focused' Facebook would kill Zuckerberg's business model
https://www.theguardian.com/commentisfree/2019/mar/07/privacy-focused-facebook-kill-zuckerbergs-business-model
Zuckerberg: Facebook will shift focus to private networks instead of open ones
https://arstechnica.com/gadgets/2019/03/zuckerberg-facebook-will-shift-focus-to-private-networks-instead-of-open-ones
Mark Zuckerberg gets privacy religion, but is it a case of βborn againβ or cynical pragmatism?
https://diginomica.com/mark-zuckerberg-gets-privacy-religion-but-is-it-a-case-of-born-again-or-just-naked-pragmatism
π‘ @NoGoolag
#DeleteFacebook #fb
Transcript leak: Inside Facebook's secret crisis meeting, where Zuck and Sheryl race to save social network's rep
We have obtained a transcript of a secret crisis meeting held last week between top executives at Facebook, including CEO Mark Zuckerberg and COO Sheryl Sandberg, hammering out a corporate response to the social network's non-stop rollercoaster of scandals. We present it here unedited.
#DeleteFacebook #transcript #leak #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
We have obtained a transcript of a secret crisis meeting held last week between top executives at Facebook, including CEO Mark Zuckerberg and COO Sheryl Sandberg, hammering out a corporate response to the social network's non-stop rollercoaster of scandals. We present it here unedited.
Read at: https://www.theregister.co.uk/2019/03/08/facebook_privacy_transcript/Read the german translation at: https://t.iss.one/BlackBox_Archiv/224#DeleteFacebook #transcript #leak #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Up to date host lists for advertisements, trackers, malware, annoyances and much more.
π‘ Host lists to block fb
β https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/facebook/all
β https://gist.github.com/thomasbilk/1506210/2d20f47bbcca75b2f78d6909c1637501000d846f
π‘ The independent, comprehensive directory of 16,884,036 unique rules across 1,385 filter and host lists
β https://filterlists.com/
π‘ How to make the internet not suck (as much) by Dan Pollock
β https://someonewhocares.org/hosts/
π‘ List to block MIUI spyware reporting back to xiaomi servers. By @ eboye
β https://gist.githubusercontent.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c/raw/36afd2333c781b5682bf602580a7935649d794b2/adaway-miui-blocklist
π‘ AdAway's default hosts sources
β https://github.com/AdAway/AdAway/wiki/HostsSources
π‘ Goodbye Ads is created for Android users to block advertisements on the device. Our host file is small in size but it blocks 90% of the ads. This host files can be also used in PC
β https://goodbyeads.weebly.com/
β https://forum.xda-developers.com/android/software-hacking/goodbye-ads-advanced-protection-ads-ad-t3827269
β https://github.com/jerryn70/GoodbyeAds
π‘ Comprehensive hosts to block Ads, Analytics, Tracking & Telemetry based on Exodus list
By @ kabir_te
β https://github.com/kaabir/AdBlock_Hosts
π‘ Unified hosts file with base extensions
β https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware
π‘ Host lists to block fb
β https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/facebook/all
β https://gist.github.com/thomasbilk/1506210/2d20f47bbcca75b2f78d6909c1637501000d846f
π‘ The independent, comprehensive directory of 16,884,036 unique rules across 1,385 filter and host lists
β https://filterlists.com/
π‘ How to make the internet not suck (as much) by Dan Pollock
β https://someonewhocares.org/hosts/
π‘ List to block MIUI spyware reporting back to xiaomi servers. By @ eboye
β https://gist.githubusercontent.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c/raw/36afd2333c781b5682bf602580a7935649d794b2/adaway-miui-blocklist
π‘ AdAway's default hosts sources
β https://github.com/AdAway/AdAway/wiki/HostsSources
π‘ Goodbye Ads is created for Android users to block advertisements on the device. Our host file is small in size but it blocks 90% of the ads. This host files can be also used in PC
β https://goodbyeads.weebly.com/
β https://forum.xda-developers.com/android/software-hacking/goodbye-ads-advanced-protection-ads-ad-t3827269
β https://github.com/jerryn70/GoodbyeAds
π‘ Comprehensive hosts to block Ads, Analytics, Tracking & Telemetry based on Exodus list
By @ kabir_te
β https://github.com/kaabir/AdBlock_Hosts
π‘ Unified hosts file with base extensions
β https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware
hblock
Improve your security and privacy by blocking ads, tracking and malware domains.
This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple sources (see below) and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them.
https://hblock.molinero.xyz
https://github.com/hectorm/hblock
adaway.org https://adaway.org/hosts.txt
AdBlock NoCoin List https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
AdGuard - Simplified https://filters.adtidy.org/extension/chromium/filters/15.txt
anudeepND - adservers https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
disconnect.iss.one - Ad https://s3.amazonaws.com/lists.disconnect.iss.one/simple_ad.txt
disconnect.iss.one - Malvertising https://s3.amazonaws.com/lists.disconnect.iss.one/simple_malvertising.txt
disconnect.iss.one - Malware https://s3.amazonaws.com/lists.disconnect.iss.one/simple_malware.txt
disconnect.iss.one - Tracking https://s3.amazonaws.com/lists.disconnect.iss.one/simple_tracking.txt
EasyList https://easylist.to/easylist/easylist.txt
EasyPrivacy https://easylist.to/easylist/easyprivacy.txt
ETH Phishing Detect https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/master/src/hosts.txt
FadeMind - add.2o7Net https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
FadeMind - add.Dead https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Dead/hosts
FadeMind - add.Risk https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts
FadeMind - add.Spam https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
KADhosts https://raw.githubusercontent.com/azet12/KADhosts/master/KADhosts.txt
malwaredomainlist.com https://www.malwaredomainlist.com/hostslist/hosts.txt
malwaredomains.com - Immortal domains https://mirror1.malwaredomains.com/files/immortal_domains.txt
malwaredomains.com - Just domains https://mirror1.malwaredomains.com/files/justdomains
matomo.org - Spammers https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
mitchellkrogza - Badd-Boyz-Hosts https://raw.githubusercontent.com/mitchellkrogza/Badd-Boyz-Hosts/master/hosts
pgl.yoyo.org https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&mimetype=plaintext
ransomwaretracker.abuse.ch https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
someonewhocares.org https://someonewhocares.org/hosts/hosts
spam404.com https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
StevenBlack https://raw.githubusercontent.com/StevenBlack/hosts/master/data/StevenBlack/hosts
winhelp2002.mvps.org https://winhelp2002.mvps.org/hosts.txt
ZeroDot1 - CoinBlockerLists https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
zeustracker.abuse.ch https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
π‘ @NoGoolag
#hblock #hosts #list #adblock #tracker #malware #shell #script
Improve your security and privacy by blocking ads, tracking and malware domains.
This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple sources (see below) and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them.
https://hblock.molinero.xyz
https://github.com/hectorm/hblock
adaway.org https://adaway.org/hosts.txt
AdBlock NoCoin List https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
AdGuard - Simplified https://filters.adtidy.org/extension/chromium/filters/15.txt
anudeepND - adservers https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
disconnect.iss.one - Ad https://s3.amazonaws.com/lists.disconnect.iss.one/simple_ad.txt
disconnect.iss.one - Malvertising https://s3.amazonaws.com/lists.disconnect.iss.one/simple_malvertising.txt
disconnect.iss.one - Malware https://s3.amazonaws.com/lists.disconnect.iss.one/simple_malware.txt
disconnect.iss.one - Tracking https://s3.amazonaws.com/lists.disconnect.iss.one/simple_tracking.txt
EasyList https://easylist.to/easylist/easylist.txt
EasyPrivacy https://easylist.to/easylist/easyprivacy.txt
ETH Phishing Detect https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/master/src/hosts.txt
FadeMind - add.2o7Net https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
FadeMind - add.Dead https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Dead/hosts
FadeMind - add.Risk https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts
FadeMind - add.Spam https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
KADhosts https://raw.githubusercontent.com/azet12/KADhosts/master/KADhosts.txt
malwaredomainlist.com https://www.malwaredomainlist.com/hostslist/hosts.txt
malwaredomains.com - Immortal domains https://mirror1.malwaredomains.com/files/immortal_domains.txt
malwaredomains.com - Just domains https://mirror1.malwaredomains.com/files/justdomains
matomo.org - Spammers https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
mitchellkrogza - Badd-Boyz-Hosts https://raw.githubusercontent.com/mitchellkrogza/Badd-Boyz-Hosts/master/hosts
pgl.yoyo.org https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&mimetype=plaintext
ransomwaretracker.abuse.ch https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
someonewhocares.org https://someonewhocares.org/hosts/hosts
spam404.com https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
StevenBlack https://raw.githubusercontent.com/StevenBlack/hosts/master/data/StevenBlack/hosts
winhelp2002.mvps.org https://winhelp2002.mvps.org/hosts.txt
ZeroDot1 - CoinBlockerLists https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
zeustracker.abuse.ch https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
π‘ @NoGoolag
#hblock #hosts #list #adblock #tracker #malware #shell #script
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Biker sues Google Fiber: I broke my leg, borked my ankle in trench dug to lay ad giant's pipe
Sum of a ditch! Bloke demands $75,000 after road prang
Installing broadband fiber is a complex and expensive activity, though it may have got a little bit more so, for Google at least, following a lawsuit in America.
Motorcyclist Hans Newsom is this week suing [PDF] Google Fiber and its local contractor in his hometown of Kansas City, Missouri β after a trench, dug to install the ad giant's fiber cabling, was allegedly left uncovered in the middle of the road, causing him to ultimately fall off his ride.
https://www.theregister.co.uk/2019/03/09/google_fiber_motorcyclist/
Read Via Telegram
#deletegoogle #broadband #lawsuit
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Sum of a ditch! Bloke demands $75,000 after road prang
Installing broadband fiber is a complex and expensive activity, though it may have got a little bit more so, for Google at least, following a lawsuit in America.
Motorcyclist Hans Newsom is this week suing [PDF] Google Fiber and its local contractor in his hometown of Kansas City, Missouri β after a trench, dug to install the ad giant's fiber cabling, was allegedly left uncovered in the middle of the road, causing him to ultimately fall off his ride.
https://www.theregister.co.uk/2019/03/09/google_fiber_motorcyclist/
Read Via Telegram
#deletegoogle #broadband #lawsuit
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Screen-grabbed from Facebook:
A teacher had her students turn their phone volume up and create a collective record of the notifications they received in a single class period.
https://twitter.com/katierosman/status/1103109217626415105
Android co-founder Rich Miner draws attention to the disturbing influence on young people who do not know a world without constant interruptions.
Rich Miner, known as a co-inventor of Android, is concerned about the disruptive impact of permanent smartphone use, especially for younger users. "I'm worried about the disruptive world of smartphones that I helped create," he confessed in a tweet. "And how it affects people who grew up believing it just had to be that way."
https://twitter.com/richminer/status/1103327630215036928
π‘ @NoGoolag
#android #kidds #smartphone #abuse #RichMiner #why #DeleteFacebook
A teacher had her students turn their phone volume up and create a collective record of the notifications they received in a single class period.
https://twitter.com/katierosman/status/1103109217626415105
Android co-founder Rich Miner draws attention to the disturbing influence on young people who do not know a world without constant interruptions.
Rich Miner, known as a co-inventor of Android, is concerned about the disruptive impact of permanent smartphone use, especially for younger users. "I'm worried about the disruptive world of smartphones that I helped create," he confessed in a tweet. "And how it affects people who grew up believing it just had to be that way."
https://twitter.com/richminer/status/1103327630215036928
π‘ @NoGoolag
#android #kidds #smartphone #abuse #RichMiner #why #DeleteFacebook
Twitter
katie rosman
Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record of the notifications they received in a single class period.
Social Media Platforms and the Cyberkrime Economy
In this next chapter of the Web of Profit, we examine the role of popular social media platforms in cybercrime and other forms of crime-enablement. The findings are startling, and should serve as a wake-up call for individuals, enterprises, governments and law enforcement.
https://learn.bromium.com/rs/497-ITQ-712/images/Bromium-Web-of-Profit-Social-Platforms-Report.pdf
Read on TG:
https://t.iss.one/BlackBox_Archiv/231
#socialmedia #platforms #cybercrime #report #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
In this next chapter of the Web of Profit, we examine the role of popular social media platforms in cybercrime and other forms of crime-enablement. The findings are startling, and should serve as a wake-up call for individuals, enterprises, governments and law enforcement.
https://learn.bromium.com/rs/497-ITQ-712/images/Bromium-Web-of-Profit-Social-Platforms-Report.pdf
Read on TG:
https://t.iss.one/BlackBox_Archiv/231
#socialmedia #platforms #cybercrime #report #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Block ads, trackers, malicious websites and adult content on Android and PC
β AdAway
Open source ad blocker for Android using the hosts file
Web: https://adaway.org
Download Stable: https://f-droid.org/app/org.adaway
https://t.iss.one/NoGoolag/671
β Blokada
Free and open source ad blocker. It works across all of your apps, not only the browser. It doesn't require root, supports both wifi and mobile networks.
Web:
https://blokada.org
Telegram:
https://t.iss.one/blokadachat
https://t.iss.one/NoGoolag/576
β Energized β‘οΈ ad - porn - malware blocking
Energized System is designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple reputable sources and creates a hosts file that prevents your system from connecting to them.
Web: energized.pro
Github: github.com/EnergizedProtection/block
Telegram: https://t.iss.one/EnergizedProtection
https://t.iss.one/NoGoolag/464
β Nebulo-1.0Beta-Build 21-PRERELEASE (DNS Over HTTPS) Server App
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets
TG support group and app download: https://t.iss.one/joinchat/I54nRleveRG3xwAa3StNCg
https://t.iss.one/libreware/467
Source codes: https://git.frostnerd.com
β personalDNSfilter
Block ads, trackers, analytics and malware domains system-wide (in browsers and apps).
Root is not required
Web and downloads: https://zenz-solutions.de/personaldnsfilter
XDA: https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898
https://t.iss.one/NoGoolag/677
β personalHTTPproxy
Use local http proxy for ad blocking (Required APN configuration to work).
Web:
https://www.zenz-solutions.de/personalhttpproxy/
Telegram:
https://t.iss.one/pdnsf
https://t.iss.one/NoGoolag/678
Collections of Hosts files:
β Up to date host lists for advertisements, trackers, malware, annoyances and much more:
https://t.iss.one/NoGoolag/912
β hblock (shell script, designed for Unix-like systems)
Improve your security and privacy by blocking ads, tracking and malware domains.
https://t.iss.one/NoGoolag/913
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware #android #pc
β AdAway
Open source ad blocker for Android using the hosts file
Web: https://adaway.org
Download Stable: https://f-droid.org/app/org.adaway
https://t.iss.one/NoGoolag/671
β Blokada
Free and open source ad blocker. It works across all of your apps, not only the browser. It doesn't require root, supports both wifi and mobile networks.
Web:
https://blokada.org
Telegram:
https://t.iss.one/blokadachat
https://t.iss.one/NoGoolag/576
β Energized β‘οΈ ad - porn - malware blocking
Energized System is designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple reputable sources and creates a hosts file that prevents your system from connecting to them.
Web: energized.pro
Github: github.com/EnergizedProtection/block
Telegram: https://t.iss.one/EnergizedProtection
https://t.iss.one/NoGoolag/464
β Nebulo-1.0Beta-Build 21-PRERELEASE (DNS Over HTTPS) Server App
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets
TG support group and app download: https://t.iss.one/joinchat/I54nRleveRG3xwAa3StNCg
https://t.iss.one/libreware/467
Source codes: https://git.frostnerd.com
β personalDNSfilter
Block ads, trackers, analytics and malware domains system-wide (in browsers and apps).
Root is not required
Web and downloads: https://zenz-solutions.de/personaldnsfilter
XDA: https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898
https://t.iss.one/NoGoolag/677
β personalHTTPproxy
Use local http proxy for ad blocking (Required APN configuration to work).
Web:
https://www.zenz-solutions.de/personalhttpproxy/
Telegram:
https://t.iss.one/pdnsf
https://t.iss.one/NoGoolag/678
Collections of Hosts files:
β Up to date host lists for advertisements, trackers, malware, annoyances and much more:
https://t.iss.one/NoGoolag/912
β hblock (shell script, designed for Unix-like systems)
Improve your security and privacy by blocking ads, tracking and malware domains.
https://t.iss.one/NoGoolag/913
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware #android #pc