NordVPN makes data transfer to law enforcement agencies official
In a revised data protection statement, the VPN provider NordVPN admits that the processed customer data will be passed on to the authorities as of July 1, if the available data allows them to identify a criminal.
βΌοΈ Privacy Policy - NordVPN
https://my.nordaccount.com/legal/privacy-policy/
#NordVPN #privacy #ourdata #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
In a revised data protection statement, the VPN provider NordVPN admits that the processed customer data will be passed on to the authorities as of July 1, if the available data allows them to identify a criminal.
βΌοΈ Privacy Policy - NordVPN
https://my.nordaccount.com/legal/privacy-policy/
#NordVPN #privacy #ourdata #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Nordaccount
Nord Account
Encryption-powered security at your fingertips.
Maximator: European signals intelligence cooperation, from a Dutch perspective
This article is first to report on the secret European five-partner sigint alliance Maximator that started in the late 1970s. It discloses the name Maximator and provides documentary evidence. The five members of this European alliance are Denmark Sweden, Germany, the Netherlands, and France. The cooperation involves both signals analysis and crypto analysis. The Maximator alliance has remained secret for almost fifty years, in contrast to its Anglo-Saxon Five-Eyes counterpart. The existence of this European sigint alliance gives a novel perspective on western sigint collaborations in the late twentieth century.
The article explains and illustrates, with relatively much attention for the cryptographic details, how the five Maximator participants strengthened their effectiveness via the information about rigged cryptographic devices that its German partner provided, via the joint U.S.-German ownership and control of the Swiss producer Crypto AG of cryptographic devices.
1. Introduction
The post-Second World War signals intelligence (SIGINT) cooperation between five Anglo-Saxon countries β Australia, Canada, the United Kingdom, New Zealand, and the United States β is well-documented.1 This alliance is often called Five Eyes and is based on the 1946 UKUSA Agreement. What is not publicly known so far is that there is a second, parallel, western signals intelligence alliance, namely in north-western Europe, also with five members. It has existed since 1976 and is called Maximator. It comprises Denmark, France, Germany, Sweden, and the Netherlands and is still active today.
The Maximator alliance deepens our understanding of the recently-revealed operation Thesaurus/Rubicon: the joint CIA-BND ownership and control of the Swiss manufacturer of cryptographic equipment Crypto AG, from 1970 to 1993.2 Crucial information about the inner workings (and weaknesses) of cryptographic devices sold by Crypto AG (and by other companies) were distributed within the Maximator network. This allowed the participants to decrypt intercepted messages from the more than one hundred countries that had bought compromised devices from the 1970s onwards.
ππΌ Read more:
https://www.tandfonline.com/doi/full/10.1080/02684527.2020.1743538
#Maximator #SIGINT #eu #cia #bnd #FiveEyes
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
This article is first to report on the secret European five-partner sigint alliance Maximator that started in the late 1970s. It discloses the name Maximator and provides documentary evidence. The five members of this European alliance are Denmark Sweden, Germany, the Netherlands, and France. The cooperation involves both signals analysis and crypto analysis. The Maximator alliance has remained secret for almost fifty years, in contrast to its Anglo-Saxon Five-Eyes counterpart. The existence of this European sigint alliance gives a novel perspective on western sigint collaborations in the late twentieth century.
The article explains and illustrates, with relatively much attention for the cryptographic details, how the five Maximator participants strengthened their effectiveness via the information about rigged cryptographic devices that its German partner provided, via the joint U.S.-German ownership and control of the Swiss producer Crypto AG of cryptographic devices.
1. Introduction
The post-Second World War signals intelligence (SIGINT) cooperation between five Anglo-Saxon countries β Australia, Canada, the United Kingdom, New Zealand, and the United States β is well-documented.1 This alliance is often called Five Eyes and is based on the 1946 UKUSA Agreement. What is not publicly known so far is that there is a second, parallel, western signals intelligence alliance, namely in north-western Europe, also with five members. It has existed since 1976 and is called Maximator. It comprises Denmark, France, Germany, Sweden, and the Netherlands and is still active today.
The Maximator alliance deepens our understanding of the recently-revealed operation Thesaurus/Rubicon: the joint CIA-BND ownership and control of the Swiss manufacturer of cryptographic equipment Crypto AG, from 1970 to 1993.2 Crucial information about the inner workings (and weaknesses) of cryptographic devices sold by Crypto AG (and by other companies) were distributed within the Maximator network. This allowed the participants to decrypt intercepted messages from the more than one hundred countries that had bought compromised devices from the 1970s onwards.
ππΌ Read more:
https://www.tandfonline.com/doi/full/10.1080/02684527.2020.1743538
#Maximator #SIGINT #eu #cia #bnd #FiveEyes
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Taylor & Francis
Maximator: European signals intelligence cooperation, from a Dutch perspective
This article is first to report on the secret European five-partner sigint alliance Maximator that started in the late 1970s. It discloses the name Maximator and provides documentary evidence. The ...
ISP Ordered to Hand Over Piratesβ Details After Cracked Software βPhoned Homeβ
Alleged pirates who installed cracked copies of expensive Siemens CAD tools on their computers are facing potentially huge settlement demands after the software "phoned home" informing the company of the illicit use. The Australian Federal Court has ordered ISP Telstra to hand over the personal details of the suspected infringers.
Reports of movie companies tracking down alleged pirates in order to extract cash settlements are commonplace today.
After IP addresses are monitored in BitTorrent swarms, companies regularly obtain court orders requiring ISPs to hand over the personal details of alleged infringers, to whom they send correspondence threatening a lawsuit, unless they pay up of course.
On first view, a case in Australia seems to follow a similar pattern but the details reveal a more interesting set of circumstances.
In an application filed at the Federal Court in Australia, Siemens Industry Software Inc asked the Court to compel local ISP Telstra to reveal the identities and personal details of β20 potential infringing usersβ who used βcrackedβ versions of its software.
However, instead of tracking these alleged pirates in BitTorrent swarms, Siemens obtained evidence of their infringement directly from their computers.
ππΌ Read more:
https://torrentfreak.com/isp-ordered-to-hand-over-pirates-details-after-cracked-software-phoned-home-200629/
#isp #australia #pirates #software #cracked
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Alleged pirates who installed cracked copies of expensive Siemens CAD tools on their computers are facing potentially huge settlement demands after the software "phoned home" informing the company of the illicit use. The Australian Federal Court has ordered ISP Telstra to hand over the personal details of the suspected infringers.
Reports of movie companies tracking down alleged pirates in order to extract cash settlements are commonplace today.
After IP addresses are monitored in BitTorrent swarms, companies regularly obtain court orders requiring ISPs to hand over the personal details of alleged infringers, to whom they send correspondence threatening a lawsuit, unless they pay up of course.
On first view, a case in Australia seems to follow a similar pattern but the details reveal a more interesting set of circumstances.
In an application filed at the Federal Court in Australia, Siemens Industry Software Inc asked the Court to compel local ISP Telstra to reveal the identities and personal details of β20 potential infringing usersβ who used βcrackedβ versions of its software.
However, instead of tracking these alleged pirates in BitTorrent swarms, Siemens obtained evidence of their infringement directly from their computers.
ππΌ Read more:
https://torrentfreak.com/isp-ordered-to-hand-over-pirates-details-after-cracked-software-phoned-home-200629/
#isp #australia #pirates #software #cracked
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Torrentfreak
ISP Ordered to Hand Over Pirates' Details After Cracked Software 'Phoned Home' * TorrentFreak
Siemens has obtained a court order to identify alleged software pirates. The tools had an embedded "phone home" feature that blew the whistle
A hacker gang is wiping Lenovo NAS devices and asking for ransoms
Ransom notes signed by 'Cl0ud SecuritY' hacker group are being found on old Lenovo EMC NAS devices.
A hacker group going by the name of 'Cl0ud SecuritY' is breaking into old LenovoEMC (formerly Iomega) network-attached storage (NAS) devices, wiping files, and leaving ransom notes behind asking owners to pay between $200 and $275 to get their data back.
Attacks have been happening for at least a month, according to entries on BitcoinAbuse, a web portal where users can report Bitcoin addresses abused in ransomware, extortions, cybercrime, and other online scams.
Attacks appear to have targeted only LenovoEMC/Iomega NAS devices that are exposing their management interface on the internet without a password.
Many of the NAS devices we found this way contained a ransom note named "RECOVER YOUR FILES !!!!.txt."
All ransom notes were signed with the 'Cl0ud SecuritY' monicker and used the same "cloud@mail2pay.com" email address as the point of contact.
ππΌ Read more:
https://www.zdnet.com/article/a-hacker-gang-is-wiping-lenovo-nas-devices-and-asking-for-ransoms/
#Cl0udSecuritY #hacker #lenovo #Iomega #nas #ransomware
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Ransom notes signed by 'Cl0ud SecuritY' hacker group are being found on old Lenovo EMC NAS devices.
A hacker group going by the name of 'Cl0ud SecuritY' is breaking into old LenovoEMC (formerly Iomega) network-attached storage (NAS) devices, wiping files, and leaving ransom notes behind asking owners to pay between $200 and $275 to get their data back.
Attacks have been happening for at least a month, according to entries on BitcoinAbuse, a web portal where users can report Bitcoin addresses abused in ransomware, extortions, cybercrime, and other online scams.
Attacks appear to have targeted only LenovoEMC/Iomega NAS devices that are exposing their management interface on the internet without a password.
Many of the NAS devices we found this way contained a ransom note named "RECOVER YOUR FILES !!!!.txt."
All ransom notes were signed with the 'Cl0ud SecuritY' monicker and used the same "cloud@mail2pay.com" email address as the point of contact.
ππΌ Read more:
https://www.zdnet.com/article/a-hacker-gang-is-wiping-lenovo-nas-devices-and-asking-for-ransoms/
#Cl0udSecuritY #hacker #lenovo #Iomega #nas #ransomware
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
ZDNet
A hacker gang is wiping Lenovo NAS devices and asking for ransoms
Ransom notes signed by 'Cl0ud SecuritY' hacker group are being found on old LenovoEMC NAS devices.
Donβt Use WhatsApp - I gathered 17 reasons why not to use WhatsApp (which you can send to friends & colleagues when they ask why you don't use WhatsApp)
π‘ Reasons Why You Should Not Use WhatsApp:
βοΈ The founder of WhatsApp β Brian Acton β tweeted on March 21st 2018: βIt is time. #deletefacebookβ
βοΈ WhatsApp is forced to disclosed encrypted messages to authorities
βοΈ Brian Acton admits: βI sold my usersβ privacy to a larger benefit. I made a choice and a compromise. And I live with that every day.β
βοΈ Jan Koum left Facebook over data privacy issues.
βοΈ WhatsApp had a security issue with the way it handles video which allowed hackers to take control of your phone
βοΈ WhatsApp commits major security errors on a regular basis, which are suitable for surveillance
βοΈ Jeff Bezos, the richest man in the world, has been hacked due to WhatsAppβs security flaws
βοΈ Facebook is collaborating with the NSA and FBI
βοΈ WhatsApp was used to target 100 journalists and dissidents
βοΈ United Nations officials are banned from using WhatsApp
βοΈ WhatsApp disclosed 12 security flaws in 2019, including 7 classified as βcriticalβ
βοΈ EU Commission orders staff to switch from WhatsApp to Signal
βοΈ Facebookβs executives proposed to weakening its encryption to enable easier access for businesses
βοΈ Facebook is βthe biggest surveillance-based enterprise in historyβ
βοΈ WhatsApp ranked worst for userβs data privacy in internet snooping report
βοΈ WhatsApp messages are stored unencrypted on iCloud or Google Drive
βοΈ Telegram is banned in countries like Russia and Iran while WhatsApp is freely available
ππΌ Read the entire version and find all sources ππΌ
ππΌ Reasons Why You Should Not Use WhatsApp:
https://www.reddit.com/r/privacy/comments/gdhrw9/i_gathered_17_reasons_why_not_to_use_whatsapp/
#wa #DeleteWhatsApp #fb #DeleteFacebook #DontUseWhatsApp
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
π‘ Reasons Why You Should Not Use WhatsApp:
βοΈ The founder of WhatsApp β Brian Acton β tweeted on March 21st 2018: βIt is time. #deletefacebookβ
βοΈ WhatsApp is forced to disclosed encrypted messages to authorities
βοΈ Brian Acton admits: βI sold my usersβ privacy to a larger benefit. I made a choice and a compromise. And I live with that every day.β
βοΈ Jan Koum left Facebook over data privacy issues.
βοΈ WhatsApp had a security issue with the way it handles video which allowed hackers to take control of your phone
βοΈ WhatsApp commits major security errors on a regular basis, which are suitable for surveillance
βοΈ Jeff Bezos, the richest man in the world, has been hacked due to WhatsAppβs security flaws
βοΈ Facebook is collaborating with the NSA and FBI
βοΈ WhatsApp was used to target 100 journalists and dissidents
βοΈ United Nations officials are banned from using WhatsApp
βοΈ WhatsApp disclosed 12 security flaws in 2019, including 7 classified as βcriticalβ
βοΈ EU Commission orders staff to switch from WhatsApp to Signal
βοΈ Facebookβs executives proposed to weakening its encryption to enable easier access for businesses
βοΈ Facebook is βthe biggest surveillance-based enterprise in historyβ
βοΈ WhatsApp ranked worst for userβs data privacy in internet snooping report
βοΈ WhatsApp messages are stored unencrypted on iCloud or Google Drive
βοΈ Telegram is banned in countries like Russia and Iran while WhatsApp is freely available
ππΌ Read the entire version and find all sources ππΌ
ππΌ Reasons Why You Should Not Use WhatsApp:
https://www.reddit.com/r/privacy/comments/gdhrw9/i_gathered_17_reasons_why_not_to_use_whatsapp/
#wa #DeleteWhatsApp #fb #DeleteFacebook #DontUseWhatsApp
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
es220202444136.pdf
331.3 KB
Farewell news from Hong Kong - The new Hong Kong Security Law
Beijing's national security law is already having an impact, pushing activists to take self-protection measures such as resignations, dissolutions of organizations and deletion of social media accounts. The law package could finally destroy the city's democratic hopes.
The new security law (ππΌPDF) has 66 articles and provides for sentences ranging from ten years to life imprisonment for the new offences of secession, subversion, terrorism and participation in outside interference.
ππΌ PDF π¬π§:
https://www.gld.gov.hk/egazette/pdf/20202444e/es220202444136.pdf
Read more π©πͺ:
https://netzpolitik.org/2020/repression-gegen-demokratiebewegung-abschiedsnachrichten-aus-hongkong/
#FreeHongKong #democratic #netpolitics #thinkabout #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Beijing's national security law is already having an impact, pushing activists to take self-protection measures such as resignations, dissolutions of organizations and deletion of social media accounts. The law package could finally destroy the city's democratic hopes.
The new security law (ππΌPDF) has 66 articles and provides for sentences ranging from ten years to life imprisonment for the new offences of secession, subversion, terrorism and participation in outside interference.
ππΌ PDF π¬π§:
https://www.gld.gov.hk/egazette/pdf/20202444e/es220202444136.pdf
Read more π©πͺ:
https://netzpolitik.org/2020/repression-gegen-demokratiebewegung-abschiedsnachrichten-aus-hongkong/
#FreeHongKong #democratic #netpolitics #thinkabout #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
They steal your Facebook
New ways of perpetrating fraud are regularly brought to the attention of our cybersecurity experts and we recently discovered new malware that steals Facebook logins. This malware could effectively ruin your online and offline life by making off with the credentials of one of your most valued pieces of digital real estate. The malware was embedded in a large number of popular apps:
https://www.evina.com/they-steal-your-facebook/
#cybersecurity #malware #google #playstore #apps #fb #DeleteFacebook
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
New ways of perpetrating fraud are regularly brought to the attention of our cybersecurity experts and we recently discovered new malware that steals Facebook logins. This malware could effectively ruin your online and offline life by making off with the credentials of one of your most valued pieces of digital real estate. The malware was embedded in a large number of popular apps:
https://www.evina.com/they-steal-your-facebook/
#cybersecurity #malware #google #playstore #apps #fb #DeleteFacebook
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
COVID-19 βBreach Bubbleβ Waiting to Pop?
The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud experts say recent developments suggest both trends are about to change β and likely for the worse.
The economic laws of supply and demand hold just as true in the business world as they do in the cybercrime space. Global lockdowns from COVID-19 have resulted in far fewer fraudsters willing or able to visit retail stores to use their counterfeit cards, and the decreased demand has severely depressed prices in the underground for purloined card data.
ππΌ Read more:
https://krebsonsecurity.com/2020/06/covid-19-breach-bubble-waiting-to-pop/
#cybercrime #covid #breach #payment #card #data
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud experts say recent developments suggest both trends are about to change β and likely for the worse.
The economic laws of supply and demand hold just as true in the business world as they do in the cybercrime space. Global lockdowns from COVID-19 have resulted in far fewer fraudsters willing or able to visit retail stores to use their counterfeit cards, and the decreased demand has severely depressed prices in the underground for purloined card data.
ππΌ Read more:
https://krebsonsecurity.com/2020/06/covid-19-breach-bubble-waiting-to-pop/
#cybercrime #covid #breach #payment #card #data
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Krebsonsecurity
COVID-19 βBreach Bubbleβ Waiting to Pop?
The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buyβ¦
lookout-uyghur-malware-tr-us.pdf
8.1 MB
Espionage software: China is said to have surveilled mobile phones of Uighurs for years
IT security researchers have found numerous apps that spy on China's Uighur Muslim minority - even abroad.
The Uyghur Muslim minority in China lives in a surveillance state: As reported by the SZ, among others, Beijing has installed thousands of surveillance cameras in the cities of the Xinjiang region, and Uyghurs are sent to re-education camps. Only a few days ago the news agency AP reported that China is also trying to keep the Muslim population under control with drastic birth control.
ππΌ PDF:
https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf
#china #Xinjiang #uyghurs #surveillance #smartphones #apps #malware #pdf #study #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
IT security researchers have found numerous apps that spy on China's Uighur Muslim minority - even abroad.
The Uyghur Muslim minority in China lives in a surveillance state: As reported by the SZ, among others, Beijing has installed thousands of surveillance cameras in the cities of the Xinjiang region, and Uyghurs are sent to re-education camps. Only a few days ago the news agency AP reported that China is also trying to keep the Muslim population under control with drastic birth control.
ππΌ PDF:
https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf
#china #Xinjiang #uyghurs #surveillance #smartphones #apps #malware #pdf #study #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Media is too big
VIEW IN TELEGRAM
/e/ Phone Review: Out-of-the-Box Privacy?
The /e/ foundation aims to offer out-of-the-box security and privacy competing directly against Google's Android and Apple's iOS. Does it compete? Is it secure? Is it private? Is their ecosystem good? Find out in this video review!
π https://invidio.us/watch?v=CgkuNbtoQc8
#e #review #privacy #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
The /e/ foundation aims to offer out-of-the-box security and privacy competing directly against Google's Android and Apple's iOS. Does it compete? Is it secure? Is it private? Is their ecosystem good? Find out in this video review!
π https://invidio.us/watch?v=CgkuNbtoQc8
#e #review #privacy #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
5 Serious Flaws in the New Brazilian βFake Newsβ Bill that Will Undermine Human Rights
On Tuesday night (6/30), the Brazilian Senate approved the βPLS 2630/2020β, the so-called βFake Newsβ bill. A final amendment cut back on article 7 βAccount Registrationβ so that mandatory identification no longer applies to all users and is, in principle, optional in general. Under the revised text, companies "may" demand identification from users where there are complaints of non-compliance with the "fake news" law, or when there is reason to suspect they are bots, are behaving inauthentically, or assuming someone else's identity. The companies are also expected to create some means of detecting fraud in account creation. These new provisions seem to match most companies' existing practices but may be expanded to also include those new obligations established in the "fake news" bill.
ππΌ PDF:
https://legis.senado.leg.br/sdleg-getter/documento?dm=8127649
ππΌ Read more:
https://www.eff.org/deeplinks/2020/06/5-serious-flaws-new-brazilian-fake-news-bill-will-undermine-human-rights
#brazil #FakeNews #HumanRights #netpolitics
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
On Tuesday night (6/30), the Brazilian Senate approved the βPLS 2630/2020β, the so-called βFake Newsβ bill. A final amendment cut back on article 7 βAccount Registrationβ so that mandatory identification no longer applies to all users and is, in principle, optional in general. Under the revised text, companies "may" demand identification from users where there are complaints of non-compliance with the "fake news" law, or when there is reason to suspect they are bots, are behaving inauthentically, or assuming someone else's identity. The companies are also expected to create some means of detecting fraud in account creation. These new provisions seem to match most companies' existing practices but may be expanded to also include those new obligations established in the "fake news" bill.
ππΌ PDF:
https://legis.senado.leg.br/sdleg-getter/documento?dm=8127649
ππΌ Read more:
https://www.eff.org/deeplinks/2020/06/5-serious-flaws-new-brazilian-fake-news-bill-will-undermine-human-rights
#brazil #FakeNews #HumanRights #netpolitics
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
When Google listens to you breathe
The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this.
How much does Google know about us? In other words: Is there anything that Google doesn't know about us? Through our searches on Google and YouTube, the company knows our interests. It potentially knows what we think. And through applications like Google Maps, it may even know where we are at all times.
On 15 June, the Google Group informed the European Commission of its plan to acquire Fitbit, a manufacturer of smart watches and fitness trackers. The Commission now has until 20 July to examine the transaction.
Google buys health data treasure
The planned acquisition of Fitbit could give Google access to health data of millions of people. The processing of sensitive data is strictly regulated by EU law - actually. The takeover could violate the rights of billions of people, although many of them have never heard of Fitbit.
Fitbit's products range from simple pedometers to devices that record calorie consumption, breathing and heart rate. Fitness data provides detailed analysis of, for example, sleep patterns, and the devices also allow users to know if they are menstruating or have had unprotected sex. A large part of Fitbit's value lies in this health data.
In the past, Fitbit has constantly expanded its database through new acquisitions. The company has also recently entered into lucrative partnerships with health insurance companies.
π‘ Read more π¬π§ π©πͺ:
https://www.privacyinternational.org/news-analysis/3962/pass-notes-proposed-google-fitbit-merger
https://netzpolitik.org/2020/fitbit-uebernahme-wenn-dir-google-beim-atmen-zuhoert/
ππΌ BLOCK THE GOOGLE/FITBIT MERGER!
https://action.privacyinternational.org/civicrm/petition/sign?sid=7&reset=1
#google #DeleteGoogle #Fitbit #healthdata #Datenschutz #ourdata #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
The world's largest data company could soon gain access to millions of fitness trackers by purchasing Fitbit. The NGO Privacy International explains why it wants to prevent this.
How much does Google know about us? In other words: Is there anything that Google doesn't know about us? Through our searches on Google and YouTube, the company knows our interests. It potentially knows what we think. And through applications like Google Maps, it may even know where we are at all times.
On 15 June, the Google Group informed the European Commission of its plan to acquire Fitbit, a manufacturer of smart watches and fitness trackers. The Commission now has until 20 July to examine the transaction.
Google buys health data treasure
The planned acquisition of Fitbit could give Google access to health data of millions of people. The processing of sensitive data is strictly regulated by EU law - actually. The takeover could violate the rights of billions of people, although many of them have never heard of Fitbit.
Fitbit's products range from simple pedometers to devices that record calorie consumption, breathing and heart rate. Fitness data provides detailed analysis of, for example, sleep patterns, and the devices also allow users to know if they are menstruating or have had unprotected sex. A large part of Fitbit's value lies in this health data.
In the past, Fitbit has constantly expanded its database through new acquisitions. The company has also recently entered into lucrative partnerships with health insurance companies.
π‘ Read more π¬π§ π©πͺ:
https://www.privacyinternational.org/news-analysis/3962/pass-notes-proposed-google-fitbit-merger
https://netzpolitik.org/2020/fitbit-uebernahme-wenn-dir-google-beim-atmen-zuhoert/
ππΌ BLOCK THE GOOGLE/FITBIT MERGER!
https://action.privacyinternational.org/civicrm/petition/sign?sid=7&reset=1
#google #DeleteGoogle #Fitbit #healthdata #Datenschutz #ourdata #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Privacy International
Pass Notes on the proposed Google / Fitbit merger
Name: Google/Fitbit mergerAge: Gestating
PWDB - New generation of Password Mass-Analysis
One out of every 142 passwords is '123456'
The '123456' password was spotted 7 million times across a data trove of one billion leaked credentials, on one of the biggest password re-use studies of its kind.
ππΌ PWDB - New generation of Password Mass-Analysis
https://github.com/FlameOfIgnis/Pwdb-Public
ππΌ Read more:
https://www.zdnet.com/article/one-out-of-every-142-passwords-is-123456/
#passwords #study #analysis
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
One out of every 142 passwords is '123456'
The '123456' password was spotted 7 million times across a data trove of one billion leaked credentials, on one of the biggest password re-use studies of its kind.
ππΌ PWDB - New generation of Password Mass-Analysis
https://github.com/FlameOfIgnis/Pwdb-Public
ππΌ Read more:
https://www.zdnet.com/article/one-out-of-every-142-passwords-is-123456/
#passwords #study #analysis
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
GitHub
GitHub - ignis-sec/Pwdb-Public: A collection of all the data i could extract from 1 billion leaked credentials from internet.
A collection of all the data i could extract from 1 billion leaked credentials from internet. - ignis-sec/Pwdb-Public
ustpc-facial-recognition-tech-statement.pdf
261.8 KB
ACM calls for governments and businesses to stop using facial recognition
An Association for Computing Machinery (ACM) tech policy group today urged lawmakers to immediately suspend use of facial recognition by businesses and governments, citing documented ethnic, racial, and gender bias. In a letter (ππΌ PDF) released today by the U.S. Technology Policy Committee (USTPC), the group acknowledges the tech is expected to improve in the future but is not yet βsufficiently matureβ and is therefore a threat to peopleβs human and legal rights.
π‘ PDF:
https://www.acm.org/binaries/content/assets/public-policy/ustpc-facial-recognition-tech-statement.pdf
ππΌ Read more:
https://venturebeat.com/2020/06/30/acm-calls-for-governments-and-businesses-to-stop-using-facial-recognition/
#acm #StopFacialrecognition #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
An Association for Computing Machinery (ACM) tech policy group today urged lawmakers to immediately suspend use of facial recognition by businesses and governments, citing documented ethnic, racial, and gender bias. In a letter (ππΌ PDF) released today by the U.S. Technology Policy Committee (USTPC), the group acknowledges the tech is expected to improve in the future but is not yet βsufficiently matureβ and is therefore a threat to peopleβs human and legal rights.
π‘ PDF:
https://www.acm.org/binaries/content/assets/public-policy/ustpc-facial-recognition-tech-statement.pdf
ππΌ Read more:
https://venturebeat.com/2020/06/30/acm-calls-for-governments-and-businesses-to-stop-using-facial-recognition/
#acm #StopFacialrecognition #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Anonymous Hackers Target TikTok: βDelete This Chinese Spyware Nowβ
βDelete TikTok now,β the account tweeted today, July 1, βif you know someone that is using it, explain to them that it is essentially malware operated by the Chinese government running a massive spying operation.β
https://twitter.com/YourAnonCentral/status/1278204068175818752?s=20
https://www.forbes.com/sites/zakdoffman/2020/07/01/anonymous-targets-tiktok-delete-this-chinese-spyware-now/
#anonymous #hacked #TikTok #DeleteTikTok
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
βDelete TikTok now,β the account tweeted today, July 1, βif you know someone that is using it, explain to them that it is essentially malware operated by the Chinese government running a massive spying operation.β
https://twitter.com/YourAnonCentral/status/1278204068175818752?s=20
https://www.forbes.com/sites/zakdoffman/2020/07/01/anonymous-targets-tiktok-delete-this-chinese-spyware-now/
#anonymous #hacked #TikTok #DeleteTikTok
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Facebook once again accidentally reveals user data
5000 developers were able to access user data from Facebook via some apps, which they were not supposed to get. The leak is fixed.
About 5000 developers had access to user data from Facebook, which they should not have been able to see. Actually, the social network has a ban on information from app users that have been inactive for more than 90 days. Actually, that didn't work.
These are apps that users have logged into with their Facebook account. App developers then get access to information such as birthday, email addresses, friend lists and location. After the Cambridge Analytica scandal, in which millions of data were tapped and used for political purposes, Facebook had restricted this access.
Now it has been noticed, says a Facebook blog post, that this 90-day limit did not always last. Nevertheless, some developers continued to gain insights. "This can happen when someone has used a fitness app to invite friends to a workout about it. We didn't notice that some of the friends were inactive for months," explains Facebook. The company doesn't say how many users are affected by this. The data leak has already been plugged. They still want to investigate the incident, but so far there are no indications of misuse of the information by third parties. "We have no indication that any information was shared that users didn't approve."
π https://about.fb.com/news/2020/07/improving-data-limits-simplifying-terms/
Read more π©πͺ π¬π§:
https://www.cnet.com/news/facebook-shared-user-data-with-developers-after-access-should-have-expired/
https://www.heise.de/news/Facebook-gibt-einmal-mehr-aus-Versehen-Nutzerdaten-preis-4801943.html
#DeleteFacebook
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
5000 developers were able to access user data from Facebook via some apps, which they were not supposed to get. The leak is fixed.
About 5000 developers had access to user data from Facebook, which they should not have been able to see. Actually, the social network has a ban on information from app users that have been inactive for more than 90 days. Actually, that didn't work.
These are apps that users have logged into with their Facebook account. App developers then get access to information such as birthday, email addresses, friend lists and location. After the Cambridge Analytica scandal, in which millions of data were tapped and used for political purposes, Facebook had restricted this access.
Now it has been noticed, says a Facebook blog post, that this 90-day limit did not always last. Nevertheless, some developers continued to gain insights. "This can happen when someone has used a fitness app to invite friends to a workout about it. We didn't notice that some of the friends were inactive for months," explains Facebook. The company doesn't say how many users are affected by this. The data leak has already been plugged. They still want to investigate the incident, but so far there are no indications of misuse of the information by third parties. "We have no indication that any information was shared that users didn't approve."
π https://about.fb.com/news/2020/07/improving-data-limits-simplifying-terms/
Read more π©πͺ π¬π§:
https://www.cnet.com/news/facebook-shared-user-data-with-developers-after-access-should-have-expired/
https://www.heise.de/news/Facebook-gibt-einmal-mehr-aus-Versehen-Nutzerdaten-preis-4801943.html
#DeleteFacebook
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Meta
Improving Data Limits for Infrequently Used Apps, Simplifying Platform Terms and Developer Policies | Meta
Our review of apps on our platform is ongoing, and we will continue to make improvements.
Mark Zuckerberg is trying to sue families in Hawaii, to force my people to sell him our land. He even filed lawsuits against owners who are dead. Leave Hawaiian land in Hawaiian HANDS. Stop the white man from colonizing our island.
π https://twitter.com/fuckpiIIar/status/1278433319991074816
#DeleteFacebook #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
π https://twitter.com/fuckpiIIar/status/1278433319991074816
#DeleteFacebook #thinkabout #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Multi-million dollar online fraud: Nigerian Instagram Influencer Arrested
On Instagram he posed with luxury cars and reached millions. The money, however, was probably obtained by a Nigerian who had scammed the Internet.
A Nigerian Instagram influencer and several of his accomplices have been arrested in Dubai for millions of dollars of Internet fraud. Dubai police announced on Thursday that the FBI had thanked the authorities of the United Arab Emirates for the arrest and extradition to the USA. The man, together with accomplices, is said to have defrauded nearly two million victims over the Internet.
ππΌ Source π¬π§:
https://www.facebook.com/126070364137174/posts/3126225064121674
ππΌ Read more π©πͺ:
https://www.heise.de/news/Millionenfacher-Online-Betrug-Nigerianischer-Instagram-Influencer-festgenommen-4805836.html
#nigeria #instagram #online #fraud
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
On Instagram he posed with luxury cars and reached millions. The money, however, was probably obtained by a Nigerian who had scammed the Internet.
A Nigerian Instagram influencer and several of his accomplices have been arrested in Dubai for millions of dollars of Internet fraud. Dubai police announced on Thursday that the FBI had thanked the authorities of the United Arab Emirates for the arrest and extradition to the USA. The man, together with accomplices, is said to have defrauded nearly two million victims over the Internet.
ππΌ Source π¬π§:
https://www.facebook.com/126070364137174/posts/3126225064121674
ππΌ Read more π©πͺ:
https://www.heise.de/news/Millionenfacher-Online-Betrug-Nigerianischer-Instagram-Influencer-festgenommen-4805836.html
#nigeria #instagram #online #fraud
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
heise online
Millionenfacher Online-Betrug: Nigerianischer Instagram-Influencer festgenommen
Auf Instagram posierte er mit Luxuskarossen und erreichte Millionen. Das Geld hatte sich ein Nigerianer aber wohl mit Internetbetrug ergaunert.
Forwarded from NoGoolag
Avoid Google apps spyware!
π‘ @NoGoolag (links at @microGsupport)
β English Group:
https://t.me/joinchat/FyFlS0X2D7eDayZ4R4Gkzw
β Indonesian channels and group:
@microGindonesia
@StopGapps_id
https://t.me/joinchat/HVU5S1HNr9FuSwsX0vRCuQ
β Off-Topic Group:
In NoGoolag group, retrieve the saved note #ot to know
β Guide: t.me/NoGoolag/63
β Installers: t.me/NoGoolag/182
More software
π‘ @Libreware
π‘ @AuroraOfficial Aurora sw channel
π¬ @AuroraSupport Aurora Store group (Foss playstore alternative)
π¬ @AuroraDroid Aurora Droid group (F-Droid client)
π¬ @AuroraOSS
Group to discuss upcoming Aurora projects (Contacts & Dialer, Aurora Services, Aurora Sync, Aurora Maps)
π¦ @qd_invitation
Firefox Configuration Hardening
DNScrypt Proxy Android
Mixplorer updates
News
π‘ @cRyPtHoN_INFOSEC_EN
π‘ @cRyPtHoN_INFOSEC_DE
π‘@BlackBox
π‘ @NoGoolag (links at @microGsupport)
β English Group:
https://t.me/joinchat/FyFlS0X2D7eDayZ4R4Gkzw
β Indonesian channels and group:
@microGindonesia
@StopGapps_id
https://t.me/joinchat/HVU5S1HNr9FuSwsX0vRCuQ
β Off-Topic Group:
In NoGoolag group, retrieve the saved note #ot to know
β Guide: t.me/NoGoolag/63
β Installers: t.me/NoGoolag/182
More software
π‘ @Libreware
π‘ @AuroraOfficial Aurora sw channel
π¬ @AuroraSupport Aurora Store group (Foss playstore alternative)
π¬ @AuroraDroid Aurora Droid group (F-Droid client)
π¬ @AuroraOSS
Group to discuss upcoming Aurora projects (Contacts & Dialer, Aurora Services, Aurora Sync, Aurora Maps)
π¦ @qd_invitation
Firefox Configuration Hardening
DNScrypt Proxy Android
Mixplorer updates
News
π‘ @cRyPtHoN_INFOSEC_EN
π‘ @cRyPtHoN_INFOSEC_DE
π‘@BlackBox
BlackBox (Security) Archiv pinned Β«Avoid Google apps spyware! π‘ @NoGoolag (links at @microGsupport) β
English Group: https://t.me/joinchat/FyFlS0X2D7eDayZ4R4Gkzw β
Indonesian channels and group: @microGindonesia @StopGapps_id https://t.me/joinchat/HVU5S1HNr9FuSwsX0vRCuQ β
Off-Topic Group:β¦Β»
Dismantling of an encrypted network sends shockwaves through organised crime groups across Europe
At a joint press conference today, French and Dutch law enforcement and judicial authorities, Europol and Eurojust presented the impressive results of a joint investigation team to dismantle EncroChat, an encrypted phone network widely used by criminal networks.
Over the last months, the joint investigation made it possible to intercept, share and analyse millions of messages that were exchanged between criminals to plan serious crimes. For an important part, these messages were read by law enforcement in real time, over the shoulder of the unsuspecting senders.
ππΌ Read more:
http://www.eurojust.europa.eu/press/PressReleases/Pages/2020/2020-07-02b.aspx
#EncroChat #encrypted #network #busted #french #dutch #Europol #Eurojust
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
At a joint press conference today, French and Dutch law enforcement and judicial authorities, Europol and Eurojust presented the impressive results of a joint investigation team to dismantle EncroChat, an encrypted phone network widely used by criminal networks.
Over the last months, the joint investigation made it possible to intercept, share and analyse millions of messages that were exchanged between criminals to plan serious crimes. For an important part, these messages were read by law enforcement in real time, over the shoulder of the unsuspecting senders.
ππΌ Read more:
http://www.eurojust.europa.eu/press/PressReleases/Pages/2020/2020-07-02b.aspx
#EncroChat #encrypted #network #busted #french #dutch #Europol #Eurojust
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox