BlackBox (Security) Archiv
4.16K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Forwarded from NoGoolag
Don't use VPN services. (For anything else than their intended purpose, which is NOT anonymity)

https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html

https://gist.github.com/joepie91/5a9909939e6ce7d09e29

TL;DR: Using a VPN does not make you anonymous and you shouldn't trust "no log policies".

Use Tor for browsing.

VPN protocols:

OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)

What are VPN protocols and why do you need to understand the different options?
โ€” What is IPSec?
https://t.me/BlackBox_Archiv/66

โ€” What is IKEv2/IPSec?
โ€” L2TP/IPSec
https://t.me/BlackBox_Archiv/67

โ€”WireGuard
โ€” PPTP
โ€” SSTP
https://t.me/BlackBox_Archiv/68

โ€” OpenVPN UDP vs OpenVPN TCP
โ€” What is the best VPN protocol?
โ€” VPN protocols conclusion
https://t.me/BlackBox_Archiv/69

Why you should not use Tor with VPN (neither Tor over VPN nor VPN over Tor, unless you have some special needs or you cannot access Tor even using bridges):
https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required

#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide
Hackers post fake stories on real news sites 'to discredit Nato'

Hackers have broken into real news websites and posted fake stories stirring up anti-Nato sentiment, a cyber-security firm has warned.

The disinformation campaign, nicknamed "ghostwriter", has been ongoing since 2017, according to FireEye researchers.

It is designed to "chip away" at support for Nato in Lithuania, Latvia, and Poland, they said.

While the false stories are "aligned with Russian security interests", it is not known who is behind the attack.

The disinformation campaign uses "falsified news articles, quotes, correspondence and other documents designed to appear as coming from military officials and political figures in the target countries," FireEye said.

In some cases, false news stories were posted on real news websites without permission.

News websites typically use a content management system (CMS) to handle the large number of articles published.

The attackers apparently gained access to the CMS of the target website and replaced old articles with their own content, or posted entirely new false articles.

They would try to spread the fake stories on social media before they were taken down.

In one example from last year, a Lithuanian news site published a fake article claiming that German soldiers had desecrated a Jewish cemetery.

In another, a fake message was posted to the Polish War Studies Academy website, claiming to be from the organisation's commander. It called for troops to fight against "the American occupation".

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.bbc.com/news/technology-53594440

#hacker #news #fakenews #nato
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Chile picks Japan's trans-Pacific cable route in snub to China

Decision a blow to Huawei and Chinese telecom sector

TOKYO/SAO PAULO -- Chile has chosen a route proposed by Japan for the first fiber-optic cable to directly connect South America and the Asia-Pacific region, designating Australia and New Zealand as endpoints while stopping short of landing in China, Nikkei has learned.

Japan's route beat out a pitch by China that would have made Shanghai the final landing point. This decision comes amid a U.S. pressure campaign to keep China out of global telecommunication projects.

Under the Japanese proposal, the undersea fiber-optic cable would stretch roughly 13,000 km across the Pacific Ocean, pass through New Zealand then arrive at its terminus in Sydney. The Chilean government says this route is recommended the most based on cost and feasibility.

Japan and Australia just completed their own submarine cable linking the two countries this month, meaning Japan could easily connect to the trans-Pacific cable. Both Australia and New Zealand share deep ties with Chile through the Trans-Pacific Partnership, the trade deal that Japan has pushed for.

The Japanese proposal to Chile took into account Australia's hard-line position against China, exemplified by Canberra's decision to blacklist China's Huawei Technologies from its 5G infrastructure.

Chile was caught in the geopolitical crossfire as China, its largest trading partner, lobbied heavily for cable plan to have Shanghai as its terminus. When Chilean President Sebastian Pinera visited Beijing in April last year, Huawei pledged to invest in data centers in Chile.

Huawei initially emerged as the leading candidate for the undersea cable. But the South American country was unable to ignore U.S. intentions in diplomacy and trade.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://asia.nikkei.com/Business/Telecommunication/Chile-picks-Japan-s-trans-Pacific-cable-route-in-snub-to-China

#telecommunication #Chile #Japan #China #Huawei #USA
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Employee vulnerability: Twitter publishes update on account hack

Twitter has explained how the hack on July 15th could have happened: To gain access to Twitter accounts of celebrities like Elon Musk, Barack Obama and Bill Gates, the hackers did not have to code - they just had to appear credible.

The cause of the big Twitter hack was a spear phishing attack. So the hackers' gateway was not technical, but human. A small number of employees were specifically contacted and deceived, Twitter reports. This is how the hackers gained access to the accounts.

Selectively deceiving individual employees

The employees concerned had been contacted by telephone and persuaded to grant access to the internal network and employee ID cards. Some of the affected employees were authorized to use account management tools. This also gave hackers access to them.

For other employees with fewer rights, the attackers took a detour and used the stolen identities to contact other employees to get access to the relevant tools.

In this way, the attackers gained access to 130 accounts, published tweets about 45 of them, read the direct messages of 36 and stored the data of seven.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://t3n.de/news/twitter-hack-spear-phishing-1305797

#twitter #hacker #fraud #bitcoin #hacked #phishing
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Florida teen, two others charged in Twitter 'Bit-Con' hacking attack

Authorities in Florida say a 17 year old was the "mastermind" of the attack that targeted the accounts of Barack Obama, Joe Biden, Kanye West, Bill Gates and others.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ
https://www.nbcnews.com/politics/justice-department/florida-teen-charged-twitter-bit-con-hacking-attack-n1235506

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://thehackernews.com/2020/07/twitter-hacker-arrested.html

#twitter #hacker #fraud #bitcoin #hacked #phishing #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Navajo Code Talkers and the Unbreakable Code

In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance.

During World War II, the Marine Corps used one of the thousands of languages spoken in the world to create an unbreakable code: Navajo.

World War II wasnโ€™t the first time a Native American language was used to create a code.

During World War I, the Choctaw language was used in the transmission of secret tactical messages. It was instrumental in a successful surprise attack against the Germans.

Germany and Japan sent students to the United States after World War I to study Native American languages and cultures, such as Cherokee, Choctaw, and Comanche.

Because of this, many members of the U.S. military services were uneasy about continuing to use Code Talkers during World War II. They were afraid the code would be easily cracked, but that was before they learned about the complexity of Navajo.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://web.archive.org/web/20200801142553/https://www.cia.gov/news-information/featured-story-archive/2008-featured-story-archive/navajo-code-talkers/

#Navajo #CodeTalkers #USA #Germany #Japan #WW2 #WW1
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Ransomware gang publishes tens of GBs of internal data from LG and Xerox

Maze gang publishes internal data from LG and Xerox after failed extortion attempt.

The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.

The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.

While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.

Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."

The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.

If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.

The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.

LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html

#maze #ransomware #lg #xerox #extortion
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
71: FDFF
Darknetdiaries - EP 71: FDFF

In this episode, weโ€™re going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.

๐ŸŽง ๐Ÿ‘‰๐Ÿผ https://darknetdiaries.com/episode/71/

#darknetdiaries #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
US will ban Tiktok on September 15 unless an American company buys it, says Trump

WASHINGTON: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought by an American company and asserted that a substantial amount of the buyout deal should go to the treasury.

Technology giant Microsoft is in talks with TikTok's parent company ByteDance to buy its US operation.
However, the president is in favour of a complete 100 per cent purchase and not the 30 per cent as reportedly being negotiated now.

Trump confirmed to reporters that he spoke to Microsoft's India-born CEO Satya Nadella on the issue.
"We had a great conversation. He (Nadella) called me to see how I felt about it. I said, look, it can't be controlled for security reasons by China...(its) too big, too invasive. It can't be...I don't mind whether it's Microsoft or somebody else, a big company...American company buys it. It's probably easier to buy the whole thing rather than to buy 30 per cent of it," Trump told reporters in the Cabinet Room of the White House.

"I said how do you do 30 per cent? Who's going to get the name. The name is hot. The brand is hot. Who's going to get the name and who is going to get that when it's owned by two different companies. So, my personal opinion was, you probably better off buying the whole thing rather than buying 30 per cent of it. I think buying 30 per cent is complicated and I suggested that he can go ahead. He can try," he said.

Trump said he has "set a date at around September 15 at which point it (TikTok) is going to be out of business in the United States".

However, he said, "If somebody, whether it's Microsoft or somebody else buys it. That would be interesting, I did say that if you buy it, whatever the price is that goes to whoever owns it."
Trump said there would have to be a substantial payment to the US government as part of the deal.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://timesofindia.indiatimes.com/world/us/us-will-ban-tiktok-on-sept-15-unless-an-american-company-buys-it-says-trump/articleshow/77338623.cms

#ToddlerTrump #USA #TikTok #DeleteTikTok
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Europol Regulation - Plans for a "European FBI"

The EU Police Agency should be allowed to investigate and search for cross-border crimes. A proposal to this effect from the Commission is expected in December, and the German Council Presidency wants to support the initiative with a conference in Berlin. Civil rights groups warn about a " data washing machine".

Some of these demands will be reflected in the recast of the four year old Europol regulation that will be published by the European Commission on 6th December. The German Interior Ministry plans to organise a conference on the "future of Europol" on 21st and 22nd October in Berlin and the annual meeting of European police chiefs on 1st and 2nd October in The Hague will also look into the new regulation.

The main pillars of the proposal are already known. In a publication for a preliminary impact assessment, the Commission writes that Europol is to be strengthened to "deal with emerging threats". The scope of criminal offences for which Europol is competent will therefore be extended. The agency would then be able to conduct its own searches in the Schengen Information System (SIS II) and use the Prรผm framework for Europe-wide searches of biometric data.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12387-Strengthening-of-Europol-s-mandate

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://data.consilium.europa.eu/doc/document/ST-14745-2019-INIT/de/pdf

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://netzpolitik.org/2020/europol-verordnung-plaene-fuer-ein-europaeisches-fbi/

#eu #police #europol #fbi #biometric #data #regulation #schengen #pdf #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Distributed Denial of Secrets: Questions wanted for an exclusive interview!

For an exclusive interview we have the makers of the collective DDoSecrets at hand. In contrast to other disclosure platforms, most leaks are not published on a website, but by telegram. Many actions are also announced on Twitter.

Distributed Denial of Secrets fights against dictatorships, corruption, police violence, tax evaders and much more

Last month the public prosecutor's office in Zwickau confiscated a server located in Germany. The reason was the so-called BlueLeaks, which activists of Distributed Denial of Secrets circulated. They distributed no less than 269 gigabytes, which had originally been hacked by a member of Anonymous. The extensive leak includes US police reports and documents. It includes bank details, names, email addresses, emails with attachments, phone numbers, photos, videos etc. pp. After receiving a request for legal assistance, the responsible public prosecutor's office became active the previous month.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ Deadline for questions ends on August 20, 2020 ! ๐Ÿ‘ˆ๐Ÿผ ๐Ÿ‘€

What do you want to know from the people who run it? They face a public interview for the first time! Our deadline ends in exactly 14 days. ๐Ÿ‘‡๐Ÿผ ๐Ÿ‘‡๐Ÿผ

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง https://tarnkappe.info/distributed-denial-of-secrets-questions-wanted-for-an-exclusive-interview/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://tarnkappe.info/distributed-denial-of-secrets-fragen-fuer-ein-exklusives-interview-gesucht/


๐Ÿ’ก This exclusive interview with DDoSecrets will be published in German and English. Questions can therefore be submitted in both languages.

Please ask your questions either in the Tarnkappe Forum, or use one of the following Telegram-Groups:.

๐Ÿ‘‰๐Ÿผ Tarnkappe.info

๐Ÿ‘‰๐Ÿผ NoGoolag

Please do not forget to mark your question(s) with #DDoSecrets

#DDoSecrets #interview
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Report: Hundreds of apps have hidden tracking software used by the government

A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.

The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.

This tactic is deceptive because the tracking isnโ€™t disclosed. However, it appears to be totally legal.

A
new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.

The contractor โ€” a Virginia-based company called Anomaly Six LLC โ€” pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.

It sounds crazy, but itโ€™s happening. Whatโ€™s more, it appears itโ€™s totally legal.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.androidauthority.com/government-tracking-apps-1145989/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801

#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
59: The Courthouse
Darknetdiaries - Ep 59: The Courthouse

In this episode we hear from Gary and Justin. Two seasoned penetration testers who tell us a story about the time when they tried to break into a courthouse but it went all wrong.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ How Security Research Can Get You Arrested
https://t.me/NoGoolag/3405

๐ŸŽง ๐Ÿ‘‰๐Ÿผ Darknetdiaries - Ep 59: The Courthouse
https://darknetdiaries.com/episode/59/

#darknetdiaries #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Evaluating the Impact of Attempts to Correct Health Misinformation on Social Media: A Meta-Analysis

Social media poses a threat to public health by facilitating the spread of misinformation. At the same time, however, social media offers a promising avenue to stem the distribution of false claims โ€“ as evidenced by real-time corrections, crowdsourced fact-checking, and algorithmic tagging. Despite the growing attempts to correct misinformation on social media, there is still considerable ambiguity regarding the ability to effectively ameliorate the negative impact of false messages.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ PDF:
https://www.tandfonline.com/doi/pdf/10.1080/10410236.2020.1794553

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.tandfonline.com/doi/full/10.1080/10410236.2020.1794553

#health #misinformation #SocialMedia #MetaAnalysis #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Exclusive: Microsoft faces complex technical challenges in TikTok carveout

(Reuters) - Microsoft Corpโ€™s (MSFT.O) bid to carve out parts of TikTok from its Chinese owner ByteDance will be a technically complex endeavor that could test the patience of President Donald Trumpโ€™s administration, according to sources familiar with the setup.

Trump has given Microsoft until Sept. 15 to put together a blueprint for an acquisition that safeguards the personal data of Americans stored on the short-video app, and he has issued an order to ban it if there is no deal by then.

Microsoft is negotiating a transition period that will give it time to ringfence TikTok technologically from ByteDance after they agree to a deal, Reuters reported on Aug. 2.

The clean break that Trump and lawmakers envision could take a year or more, some of the sources said.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฌ๐Ÿ‡ง https://www.reuters.com/article/us-usa-tiktok-cybersecurity-exclusive/exclusive-microsoft-faces-complex-technical-challenges-in-tiktok-carveout-idUSKCN256100

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://t3n.de/news/tiktok-laeuft-douyin-servern-1309256

#DeleteTikTok #ByteDance #microsoft #ToddlerTrump
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
The Department of Justice wants to stop California from having net neutrality

The US Department of Justice has filed for an injunction to stop California from implementing their own net neutrality laws. Net neutrality has been repealed in the United States Federal Communication Commission (FCC) effective since summer 2018, and now the effort of states to bring their citizens back under net neutrality protections is being challenged by federal law. In the wake of the FCC repeal of net neutrality laws in 2017, many states sought to pass their own net neutrality laws.

The same thing occurred after the repeal of broadband privacy laws in 2017. In the case of broadband privacy which was passed at the state level in Maine, the internet service providers (ISPs) actually tried to stop the law from being enacted by claiming that their right to selling profiles of user internet activity and history is part of their constitutional right to free speech. In the case of net neutrality, California was the largest state to pass net neutrality rules for internet companies and users within its borders. As part of the FCC repeal of net neutrality laws, the FCC actually included language that would forbid individual states or smaller jurisdictions from passing their own net neutrality laws.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.privateinternetaccess.com/blog/the-department-of-justice-wants-to-stop-california-from-having-net-neutrality/

#usa #netneutrality #california #FCC #why #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Facebook Fired An Employee Who Collected Evidence Of Right-Wing Pages Getting Preferential Treatment

Facebook employees collected evidence showing the company is giving right-wing pages preferential treatment when it comes to misinformation. And theyโ€™re worried about how the company will handle the presidentโ€™s falsehoods in an election year.

After months of debate and disagreement over the handling of inflammatory or misleading posts from Donald Trump, Facebook employees want CEO Mark Zuckerberg to explain what the company would do if the leader of the free world uses the social network to undermine the results of the 2020 US presidential election.

โ€œI do think weโ€™re headed for a problematic scenario where Facebook is going to be used to aggressively undermine the legitimacy of the US elections, in a way that has never been possible in history,โ€ one Facebook employee wrote in a group on Workplace, the companyโ€™s internal communication platform, earlier this week.

For the past week, this scenario has been a topic of heated discussion inside Facebook and was a top question for its leader. Some 2,900 employees asked Zuckerberg to address it publicly during a company-wide meeting on Thursday, which he partly did, calling it "an unprecedented position."

Zuckerbergโ€™s remarks came amid growing internal concerns about the company's competence in handling misinformation, and the precautions it is taking to ensure its platform isnโ€™t used to disrupt or mislead ahead of the US presidential election. Though Facebook says it has committed more money and resources to avoid repeating its failures during the 2016 election, some employees believe it isnโ€™t enough. President Trump has already spent months raising questions about the legitimacy of the upcoming 2020 election, spreading misinformation about mail-in ballots, and declining to say if heโ€™d accept the possibility of losing to Democratic nominee Joe Biden in November.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.buzzfeednews.com/article/craigsilverman/facebook-zuckerberg-what-if-trump-disputes-election-results

#DeleteFacebook #zuckerberg #evidence #usa #elections #rightwing
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Pornhub Sister Company Wants to Expose Video Hosting Site โ€˜Piratesโ€™

MG Premium has requested three new #DMCA subpoenas targeting the operators and uploaders of #video #hosting sites Tapecontent.net, Netu.tv and Gounlimited.to. Pornhub's sister company requests information from #Cloudflare in the hope of identfiying those who share its copyrighted material without permission.

The online porn industry is rather diverse but there is only one company leading the charge โ€“ #Mindgeek.

The company, formerly known as Manwin, owns one of the most visited adult websites, #Pornhub, and is also the driving force behind #YouPorn, #Redtube, #Tube8, #Xtube, and dozens of other sites.

Many of these tube sites became big by offering access to a wide variety of content, some of it posted without permission. However, that doesnโ€™t mean that Mindgeek is turning a blind eye to pirates. On the contrary.

Mindgeekโ€™s imperium also includes companies that create content. MG Premium, for example, which owns thousands of copyrighted adult videos, is the driving force behind popular brands such as Brazzers and Digital Playground. These videos are often pirated and shared through external sites, which is a problem for the company.

To address this issue, Mindgeekโ€™s daughter company regularly goes to court. Last week, it requested three DMCA subpoenas targeting the video-hosting services Tapecontent.net, Netu.tv and Gounlimited.to.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://torrentfreak.com/pornhub-sister-company-wants-to-expose-video-hosting-site-pirates-200811/

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Spainโ€™s largest bus terminal deployed live face recognition four years ago, but few noticed

Madrid South Stationโ€™s face recognition system automatically matches every visitorโ€™s face against a database of suspects, and shares information with the Spanish police.

Around 20 million travellers transited last year through Madridโ€™s South bus terminal, known as Mรฉndez รlvaro Station to locals. Those 20 million persons had their face scanned as they entered the station. They were tracked as they walked to the bays where their bus was parked, before leaving the Spanish capital. Unless the stationโ€™s face detection system produced an alert and they were arrested.

The terminal is a key transport exchange not only for Madrid, but for the whole country. It connects with subway stations and with Renfe, the national train service. Until 2010, the terminal did not have a security unit that was specifically tasked with coordinating the response to petty crime.
Running since 2016

The station is one of the few public buildings in Spain that deployed a live face recognition system. Miguel Angel Gallego, the stationโ€™s chief of security between 2010 and 2019, decided to deploy face recognition after he was contacted by a Spanish start up working with this type of software in 2016.

Mr Gallego faced an uphill battle. The Spanish police, who were not used to face recognition at the time, were not enthusiastic, and neither was Avanza ADO, the company that has been running the bus terminal since 2003. But he remained undeterred. The technology has been running for four years, without much scrutiny from privacy organizations or from the state.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://algorithmwatch.org/en/story/spain-mendez-alvaro-face-recognition/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ ๐Ÿ‡ฉ๐Ÿ‡ช https://netzpolitik.org/2020/gesichtserkennung-in-madrid-videokameras-ueberwachen-unbemerkt-millionen-fahrgaeste/

#biometric #facerecognition #spain #madrid #surveillance #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Episode 1: Hacker vs. Hacker
Canadian Broadcasting Corporation
Hunting Warhead - Episode 1: Hacker vs. Hacker

Einar Stangvik is a white-hat hacker โ€” an internet security expert with an expertise in cracking the most secure and disturbing parts of the web. He discovers a troubling phenomenon online and joins forces with journalist Hรฅkon Hรธydal. It leads them to Australia, to confront two men who are running the largest child abuse site on the dark net.

#truecrime #HuntingWarhead #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag