Forwarded from NoGoolag
Don't use VPN services. (For anything else than their intended purpose, which is NOT anonymity)
https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
TL;DR: Using a VPN does not make you anonymous and you shouldn't trust "no log policies".
Use Tor for browsing.
VPN protocols:
OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)
What are VPN protocols and why do you need to understand the different options?
โ What is IPSec?
https://t.me/BlackBox_Archiv/66
โ What is IKEv2/IPSec?
โ L2TP/IPSec
https://t.me/BlackBox_Archiv/67
โWireGuard
โ PPTP
โ SSTP
https://t.me/BlackBox_Archiv/68
โ OpenVPN UDP vs OpenVPN TCP
โ What is the best VPN protocol?
โ VPN protocols conclusion
https://t.me/BlackBox_Archiv/69
Why you should not use Tor with VPN (neither Tor over VPN nor VPN over Tor, unless you have some special needs or you cannot access Tor even using bridges):
https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required
#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide
https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html
https://gist.github.com/joepie91/5a9909939e6ce7d09e29
TL;DR: Using a VPN does not make you anonymous and you shouldn't trust "no log policies".
Use Tor for browsing.
VPN protocols:
OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019)
What are VPN protocols and why do you need to understand the different options?
โ What is IPSec?
https://t.me/BlackBox_Archiv/66
โ What is IKEv2/IPSec?
โ L2TP/IPSec
https://t.me/BlackBox_Archiv/67
โWireGuard
โ PPTP
โ SSTP
https://t.me/BlackBox_Archiv/68
โ OpenVPN UDP vs OpenVPN TCP
โ What is the best VPN protocol?
โ VPN protocols conclusion
https://t.me/BlackBox_Archiv/69
Why you should not use Tor with VPN (neither Tor over VPN nor VPN over Tor, unless you have some special needs or you cannot access Tor even using bridges):
https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required
#OpenVPN #IPSec #L2TP #IKEv2 #WireGuard #guide
overengineer.dev
VPN - a Very Precarious Narrative - Dennis Schubert
A very long article about commercial VPNs, their marketing strategies, and the truth behind their privacy and security claims.
Hackers post fake stories on real news sites 'to discredit Nato'
Hackers have broken into real news websites and posted fake stories stirring up anti-Nato sentiment, a cyber-security firm has warned.
The disinformation campaign, nicknamed "ghostwriter", has been ongoing since 2017, according to FireEye researchers.
It is designed to "chip away" at support for Nato in Lithuania, Latvia, and Poland, they said.
While the false stories are "aligned with Russian security interests", it is not known who is behind the attack.
The disinformation campaign uses "falsified news articles, quotes, correspondence and other documents designed to appear as coming from military officials and political figures in the target countries," FireEye said.
In some cases, false news stories were posted on real news websites without permission.
News websites typically use a content management system (CMS) to handle the large number of articles published.
The attackers apparently gained access to the CMS of the target website and replaced old articles with their own content, or posted entirely new false articles.
They would try to spread the fake stories on social media before they were taken down.
In one example from last year, a Lithuanian news site published a fake article claiming that German soldiers had desecrated a Jewish cemetery.
In another, a fake message was posted to the Polish War Studies Academy website, claiming to be from the organisation's commander. It called for troops to fight against "the American occupation".
๐ ๐๐ผ https://www.bbc.com/news/technology-53594440
#hacker #news #fakenews #nato
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Hackers have broken into real news websites and posted fake stories stirring up anti-Nato sentiment, a cyber-security firm has warned.
The disinformation campaign, nicknamed "ghostwriter", has been ongoing since 2017, according to FireEye researchers.
It is designed to "chip away" at support for Nato in Lithuania, Latvia, and Poland, they said.
While the false stories are "aligned with Russian security interests", it is not known who is behind the attack.
The disinformation campaign uses "falsified news articles, quotes, correspondence and other documents designed to appear as coming from military officials and political figures in the target countries," FireEye said.
In some cases, false news stories were posted on real news websites without permission.
News websites typically use a content management system (CMS) to handle the large number of articles published.
The attackers apparently gained access to the CMS of the target website and replaced old articles with their own content, or posted entirely new false articles.
They would try to spread the fake stories on social media before they were taken down.
In one example from last year, a Lithuanian news site published a fake article claiming that German soldiers had desecrated a Jewish cemetery.
In another, a fake message was posted to the Polish War Studies Academy website, claiming to be from the organisation's commander. It called for troops to fight against "the American occupation".
๐ ๐๐ผ https://www.bbc.com/news/technology-53594440
#hacker #news #fakenews #nato
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Bbc
Hackers post fake stories on real news sites 'to discredit Nato'
Researchers say articles on genuine sites were replaced with ones that matched Russia's interests.
Chile picks Japan's trans-Pacific cable route in snub to China
Decision a blow to Huawei and Chinese telecom sector
TOKYO/SAO PAULO -- Chile has chosen a route proposed by Japan for the first fiber-optic cable to directly connect South America and the Asia-Pacific region, designating Australia and New Zealand as endpoints while stopping short of landing in China, Nikkei has learned.
Japan's route beat out a pitch by China that would have made Shanghai the final landing point. This decision comes amid a U.S. pressure campaign to keep China out of global telecommunication projects.
Under the Japanese proposal, the undersea fiber-optic cable would stretch roughly 13,000 km across the Pacific Ocean, pass through New Zealand then arrive at its terminus in Sydney. The Chilean government says this route is recommended the most based on cost and feasibility.
Japan and Australia just completed their own submarine cable linking the two countries this month, meaning Japan could easily connect to the trans-Pacific cable. Both Australia and New Zealand share deep ties with Chile through the Trans-Pacific Partnership, the trade deal that Japan has pushed for.
The Japanese proposal to Chile took into account Australia's hard-line position against China, exemplified by Canberra's decision to blacklist China's Huawei Technologies from its 5G infrastructure.
Chile was caught in the geopolitical crossfire as China, its largest trading partner, lobbied heavily for cable plan to have Shanghai as its terminus. When Chilean President Sebastian Pinera visited Beijing in April last year, Huawei pledged to invest in data centers in Chile.
Huawei initially emerged as the leading candidate for the undersea cable. But the South American country was unable to ignore U.S. intentions in diplomacy and trade.
๐ ๐๐ผ https://asia.nikkei.com/Business/Telecommunication/Chile-picks-Japan-s-trans-Pacific-cable-route-in-snub-to-China
#telecommunication #Chile #Japan #China #Huawei #USA
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Decision a blow to Huawei and Chinese telecom sector
TOKYO/SAO PAULO -- Chile has chosen a route proposed by Japan for the first fiber-optic cable to directly connect South America and the Asia-Pacific region, designating Australia and New Zealand as endpoints while stopping short of landing in China, Nikkei has learned.
Japan's route beat out a pitch by China that would have made Shanghai the final landing point. This decision comes amid a U.S. pressure campaign to keep China out of global telecommunication projects.
Under the Japanese proposal, the undersea fiber-optic cable would stretch roughly 13,000 km across the Pacific Ocean, pass through New Zealand then arrive at its terminus in Sydney. The Chilean government says this route is recommended the most based on cost and feasibility.
Japan and Australia just completed their own submarine cable linking the two countries this month, meaning Japan could easily connect to the trans-Pacific cable. Both Australia and New Zealand share deep ties with Chile through the Trans-Pacific Partnership, the trade deal that Japan has pushed for.
The Japanese proposal to Chile took into account Australia's hard-line position against China, exemplified by Canberra's decision to blacklist China's Huawei Technologies from its 5G infrastructure.
Chile was caught in the geopolitical crossfire as China, its largest trading partner, lobbied heavily for cable plan to have Shanghai as its terminus. When Chilean President Sebastian Pinera visited Beijing in April last year, Huawei pledged to invest in data centers in Chile.
Huawei initially emerged as the leading candidate for the undersea cable. But the South American country was unable to ignore U.S. intentions in diplomacy and trade.
๐ ๐๐ผ https://asia.nikkei.com/Business/Telecommunication/Chile-picks-Japan-s-trans-Pacific-cable-route-in-snub-to-China
#telecommunication #Chile #Japan #China #Huawei #USA
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Nikkei Asia
Chile picks Japan's trans-Pacific cable route in snub to China
Decision a blow to Huawei and Chinese telecom sector
Facebook Q2 2020 Earnings
๐ ๐๐ผ https://investor.fb.com/investor-events/event-details/2020/Facebook-Q2-2020-Earnings-/default.aspx
#DeleteFacebook #earnings
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐ ๐๐ผ https://investor.fb.com/investor-events/event-details/2020/Facebook-Q2-2020-Earnings-/default.aspx
#DeleteFacebook #earnings
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Employee vulnerability: Twitter publishes update on account hack
Twitter has explained how the hack on July 15th could have happened: To gain access to Twitter accounts of celebrities like Elon Musk, Barack Obama and Bill Gates, the hackers did not have to code - they just had to appear credible.
The cause of the big Twitter hack was a spear phishing attack. So the hackers' gateway was not technical, but human. A small number of employees were specifically contacted and deceived, Twitter reports. This is how the hackers gained access to the accounts.
Selectively deceiving individual employees
The employees concerned had been contacted by telephone and persuaded to grant access to the internal network and employee ID cards. Some of the affected employees were authorized to use account management tools. This also gave hackers access to them.
For other employees with fewer rights, the attackers took a detour and used the stolen identities to contact other employees to get access to the relevant tools.
In this way, the attackers gained access to 130 accounts, published tweets about 45 of them, read the direct messages of 36 and stored the data of seven.
๐ ๐๐ผ https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html
๐ ๐๐ผ ๐ฉ๐ช https://t3n.de/news/twitter-hack-spear-phishing-1305797
#twitter #hacker #fraud #bitcoin #hacked #phishing
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Twitter has explained how the hack on July 15th could have happened: To gain access to Twitter accounts of celebrities like Elon Musk, Barack Obama and Bill Gates, the hackers did not have to code - they just had to appear credible.
The cause of the big Twitter hack was a spear phishing attack. So the hackers' gateway was not technical, but human. A small number of employees were specifically contacted and deceived, Twitter reports. This is how the hackers gained access to the accounts.
Selectively deceiving individual employees
The employees concerned had been contacted by telephone and persuaded to grant access to the internal network and employee ID cards. Some of the affected employees were authorized to use account management tools. This also gave hackers access to them.
For other employees with fewer rights, the attackers took a detour and used the stolen identities to contact other employees to get access to the relevant tools.
In this way, the attackers gained access to 130 accounts, published tweets about 45 of them, read the direct messages of 36 and stored the data of seven.
๐ ๐๐ผ https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html
๐ ๐๐ผ ๐ฉ๐ช https://t3n.de/news/twitter-hack-spear-phishing-1305797
#twitter #hacker #fraud #bitcoin #hacked #phishing
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Twitter
An update on our security incident
An update on our security incident and what we know so far.
Media is too big
VIEW IN TELEGRAM
Florida teen, two others charged in Twitter 'Bit-Con' hacking attack
Authorities in Florida say a 17 year old was the "mastermind" of the attack that targeted the accounts of Barack Obama, Joe Biden, Kanye West, Bill Gates and others.
๐ ๐๐ผ https://www.nbcnews.com/politics/justice-department/florida-teen-charged-twitter-bit-con-hacking-attack-n1235506
๐ ๐๐ผ https://thehackernews.com/2020/07/twitter-hacker-arrested.html
#twitter #hacker #fraud #bitcoin #hacked #phishing #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Authorities in Florida say a 17 year old was the "mastermind" of the attack that targeted the accounts of Barack Obama, Joe Biden, Kanye West, Bill Gates and others.
๐ ๐๐ผ https://www.nbcnews.com/politics/justice-department/florida-teen-charged-twitter-bit-con-hacking-attack-n1235506
๐ ๐๐ผ https://thehackernews.com/2020/07/twitter-hacker-arrested.html
#twitter #hacker #fraud #bitcoin #hacked #phishing #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Navajo Code Talkers and the Unbreakable Code
In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance.
During World War II, the Marine Corps used one of the thousands of languages spoken in the world to create an unbreakable code: Navajo.
World War II wasnโt the first time a Native American language was used to create a code.
During World War I, the Choctaw language was used in the transmission of secret tactical messages. It was instrumental in a successful surprise attack against the Germans.
Germany and Japan sent students to the United States after World War I to study Native American languages and cultures, such as Cherokee, Choctaw, and Comanche.
Because of this, many members of the U.S. military services were uneasy about continuing to use Code Talkers during World War II. They were afraid the code would be easily cracked, but that was before they learned about the complexity of Navajo.
๐ ๐๐ผ https://web.archive.org/web/20200801142553/https://www.cia.gov/news-information/featured-story-archive/2008-featured-story-archive/navajo-code-talkers/
#Navajo #CodeTalkers #USA #Germany #Japan #WW2 #WW1
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance.
During World War II, the Marine Corps used one of the thousands of languages spoken in the world to create an unbreakable code: Navajo.
World War II wasnโt the first time a Native American language was used to create a code.
During World War I, the Choctaw language was used in the transmission of secret tactical messages. It was instrumental in a successful surprise attack against the Germans.
Germany and Japan sent students to the United States after World War I to study Native American languages and cultures, such as Cherokee, Choctaw, and Comanche.
Because of this, many members of the U.S. military services were uneasy about continuing to use Code Talkers during World War II. They were afraid the code would be easily cracked, but that was before they learned about the complexity of Navajo.
๐ ๐๐ผ https://web.archive.org/web/20200801142553/https://www.cia.gov/news-information/featured-story-archive/2008-featured-story-archive/navajo-code-talkers/
#Navajo #CodeTalkers #USA #Germany #Japan #WW2 #WW1
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
web.archive.org
Navajo Code Talkers and the Unbreakable Code โ Central Intelligence Agency
November 6, 2008 - In the heat of battle, it is of the utmost importance that messages are delivered and received as quickly as possible. It is even more crucial that these messages are encoded so the enemy does not know about plans in advance. During Worldโฆ
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.
The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.
While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.
Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."
The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.
If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.
The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.
LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.
๐ ๐๐ผ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/
๐ ๐๐ผ ๐ฉ๐ช https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html
#maze #ransomware #lg #xerox #extortion
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.
The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.
While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.
Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."
The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.
If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.
The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.
LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.
๐ ๐๐ผ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/
๐ ๐๐ผ ๐ฉ๐ช https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html
#maze #ransomware #lg #xerox #extortion
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNET
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
71: FDFF
Darknetdiaries - EP 71: FDFF
In this episode, weโre going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.
๐ง ๐๐ผ https://darknetdiaries.com/episode/71/
#darknetdiaries #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
In this episode, weโre going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.
๐ง ๐๐ผ https://darknetdiaries.com/episode/71/
#darknetdiaries #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
US will ban Tiktok on September 15 unless an American company buys it, says Trump
WASHINGTON: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought by an American company and asserted that a substantial amount of the buyout deal should go to the treasury.
Technology giant Microsoft is in talks with TikTok's parent company ByteDance to buy its US operation.
However, the president is in favour of a complete 100 per cent purchase and not the 30 per cent as reportedly being negotiated now.
Trump confirmed to reporters that he spoke to Microsoft's India-born CEO Satya Nadella on the issue.
"We had a great conversation. He (Nadella) called me to see how I felt about it. I said, look, it can't be controlled for security reasons by China...(its) too big, too invasive. It can't be...I don't mind whether it's Microsoft or somebody else, a big company...American company buys it. It's probably easier to buy the whole thing rather than to buy 30 per cent of it," Trump told reporters in the Cabinet Room of the White House.
"I said how do you do 30 per cent? Who's going to get the name. The name is hot. The brand is hot. Who's going to get the name and who is going to get that when it's owned by two different companies. So, my personal opinion was, you probably better off buying the whole thing rather than buying 30 per cent of it. I think buying 30 per cent is complicated and I suggested that he can go ahead. He can try," he said.
Trump said he has "set a date at around September 15 at which point it (TikTok) is going to be out of business in the United States".
However, he said, "If somebody, whether it's Microsoft or somebody else buys it. That would be interesting, I did say that if you buy it, whatever the price is that goes to whoever owns it."
Trump said there would have to be a substantial payment to the US government as part of the deal.
๐ ๐๐ผ https://timesofindia.indiatimes.com/world/us/us-will-ban-tiktok-on-sept-15-unless-an-american-company-buys-it-says-trump/articleshow/77338623.cms
#ToddlerTrump #USA #TikTok #DeleteTikTok
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
WASHINGTON: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought by an American company and asserted that a substantial amount of the buyout deal should go to the treasury.
Technology giant Microsoft is in talks with TikTok's parent company ByteDance to buy its US operation.
However, the president is in favour of a complete 100 per cent purchase and not the 30 per cent as reportedly being negotiated now.
Trump confirmed to reporters that he spoke to Microsoft's India-born CEO Satya Nadella on the issue.
"We had a great conversation. He (Nadella) called me to see how I felt about it. I said, look, it can't be controlled for security reasons by China...(its) too big, too invasive. It can't be...I don't mind whether it's Microsoft or somebody else, a big company...American company buys it. It's probably easier to buy the whole thing rather than to buy 30 per cent of it," Trump told reporters in the Cabinet Room of the White House.
"I said how do you do 30 per cent? Who's going to get the name. The name is hot. The brand is hot. Who's going to get the name and who is going to get that when it's owned by two different companies. So, my personal opinion was, you probably better off buying the whole thing rather than buying 30 per cent of it. I think buying 30 per cent is complicated and I suggested that he can go ahead. He can try," he said.
Trump said he has "set a date at around September 15 at which point it (TikTok) is going to be out of business in the United States".
However, he said, "If somebody, whether it's Microsoft or somebody else buys it. That would be interesting, I did say that if you buy it, whatever the price is that goes to whoever owns it."
Trump said there would have to be a substantial payment to the US government as part of the deal.
๐ ๐๐ผ https://timesofindia.indiatimes.com/world/us/us-will-ban-tiktok-on-sept-15-unless-an-american-company-buys-it-says-trump/articleshow/77338623.cms
#ToddlerTrump #USA #TikTok #DeleteTikTok
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The Times of India
US Ban Tiktok: US will ban Tiktok on September 15 unless an American company buys it, says Trump | World News - Times of India
US News: US President Donald Trump on Monday said the popular Chinese app, TikTok, would be banned in the country beginning September 15, unless it is bought b
Europol Regulation - Plans for a "European FBI"
The EU Police Agency should be allowed to investigate and search for cross-border crimes. A proposal to this effect from the Commission is expected in December, and the German Council Presidency wants to support the initiative with a conference in Berlin. Civil rights groups warn about a " data washing machine".
Some of these demands will be reflected in the recast of the four year old Europol regulation that will be published by the European Commission on 6th December. The German Interior Ministry plans to organise a conference on the "future of Europol" on 21st and 22nd October in Berlin and the annual meeting of European police chiefs on 1st and 2nd October in The Hague will also look into the new regulation.
The main pillars of the proposal are already known. In a publication for a preliminary impact assessment, the Commission writes that Europol is to be strengthened to "deal with emerging threats". The scope of criminal offences for which Europol is competent will therefore be extended. The agency would then be able to conduct its own searches in the Schengen Information System (SIS II) and use the Prรผm framework for Europe-wide searches of biometric data.
๐ ๐๐ผ https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12387-Strengthening-of-Europol-s-mandate
๐ ๐๐ผ https://data.consilium.europa.eu/doc/document/ST-14745-2019-INIT/de/pdf
๐ ๐๐ผ ๐ฉ๐ช https://netzpolitik.org/2020/europol-verordnung-plaene-fuer-ein-europaeisches-fbi/
#eu #police #europol #fbi #biometric #data #regulation #schengen #pdf #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The EU Police Agency should be allowed to investigate and search for cross-border crimes. A proposal to this effect from the Commission is expected in December, and the German Council Presidency wants to support the initiative with a conference in Berlin. Civil rights groups warn about a " data washing machine".
Some of these demands will be reflected in the recast of the four year old Europol regulation that will be published by the European Commission on 6th December. The German Interior Ministry plans to organise a conference on the "future of Europol" on 21st and 22nd October in Berlin and the annual meeting of European police chiefs on 1st and 2nd October in The Hague will also look into the new regulation.
The main pillars of the proposal are already known. In a publication for a preliminary impact assessment, the Commission writes that Europol is to be strengthened to "deal with emerging threats". The scope of criminal offences for which Europol is competent will therefore be extended. The agency would then be able to conduct its own searches in the Schengen Information System (SIS II) and use the Prรผm framework for Europe-wide searches of biometric data.
๐ ๐๐ผ https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12387-Strengthening-of-Europol-s-mandate
๐ ๐๐ผ https://data.consilium.europa.eu/doc/document/ST-14745-2019-INIT/de/pdf
๐ ๐๐ผ ๐ฉ๐ช https://netzpolitik.org/2020/europol-verordnung-plaene-fuer-ein-europaeisches-fbi/
#eu #police #europol #fbi #biometric #data #regulation #schengen #pdf #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
European Commission - Have your say
Distributed Denial of Secrets: Questions wanted for an exclusive interview!
For an exclusive interview we have the makers of the collective DDoSecrets at hand. In contrast to other disclosure platforms, most leaks are not published on a website, but by telegram. Many actions are also announced on Twitter.
Distributed Denial of Secrets fights against dictatorships, corruption, police violence, tax evaders and much more
Last month the public prosecutor's office in Zwickau confiscated a server located in Germany. The reason was the so-called BlueLeaks, which activists of Distributed Denial of Secrets circulated. They distributed no less than 269 gigabytes, which had originally been hacked by a member of Anonymous. The extensive leak includes US police reports and documents. It includes bank details, names, email addresses, emails with attachments, phone numbers, photos, videos etc. pp. After receiving a request for legal assistance, the responsible public prosecutor's office became active the previous month.
๐ ๐๐ผ Deadline for questions ends on August 20, 2020 ! ๐๐ผ ๐
What do you want to know from the people who run it? They face a public interview for the first time! Our deadline ends in exactly 14 days. ๐๐ผ ๐๐ผ
๐ ๐๐ผ ๐ฌ๐ง https://tarnkappe.info/distributed-denial-of-secrets-questions-wanted-for-an-exclusive-interview/
๐ ๐๐ผ ๐ฉ๐ช https://tarnkappe.info/distributed-denial-of-secrets-fragen-fuer-ein-exklusives-interview-gesucht/
๐ก This exclusive interview with DDoSecrets will be published in German and English. Questions can therefore be submitted in both languages.
Please ask your questions either in the Tarnkappe Forum, or use one of the following Telegram-Groups:.
๐๐ผ Tarnkappe.info
๐๐ผ NoGoolag
Please do not forget to mark your question(s) with #DDoSecrets
#DDoSecrets #interview
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
For an exclusive interview we have the makers of the collective DDoSecrets at hand. In contrast to other disclosure platforms, most leaks are not published on a website, but by telegram. Many actions are also announced on Twitter.
Distributed Denial of Secrets fights against dictatorships, corruption, police violence, tax evaders and much more
Last month the public prosecutor's office in Zwickau confiscated a server located in Germany. The reason was the so-called BlueLeaks, which activists of Distributed Denial of Secrets circulated. They distributed no less than 269 gigabytes, which had originally been hacked by a member of Anonymous. The extensive leak includes US police reports and documents. It includes bank details, names, email addresses, emails with attachments, phone numbers, photos, videos etc. pp. After receiving a request for legal assistance, the responsible public prosecutor's office became active the previous month.
๐ ๐๐ผ Deadline for questions ends on August 20, 2020 ! ๐๐ผ ๐
What do you want to know from the people who run it? They face a public interview for the first time! Our deadline ends in exactly 14 days. ๐๐ผ ๐๐ผ
๐ ๐๐ผ ๐ฌ๐ง https://tarnkappe.info/distributed-denial-of-secrets-questions-wanted-for-an-exclusive-interview/
๐ ๐๐ผ ๐ฉ๐ช https://tarnkappe.info/distributed-denial-of-secrets-fragen-fuer-ein-exklusives-interview-gesucht/
๐ก This exclusive interview with DDoSecrets will be published in German and English. Questions can therefore be submitted in both languages.
Please ask your questions either in the Tarnkappe Forum, or use one of the following Telegram-Groups:.
๐๐ผ Tarnkappe.info
๐๐ผ NoGoolag
Please do not forget to mark your question(s) with #DDoSecrets
#DDoSecrets #interview
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Tarnkappe.info
Distributed Denial of Secrets: Questions wanted for an exclusive interview!
For an exclusive interview we have the makers of DDoSecrets on the pipe. You can submit your questions within the next 14 days.
Report: Hundreds of apps have hidden tracking software used by the government
A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.
The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.
This tactic is deceptive because the tracking isnโt disclosed. However, it appears to be totally legal.
A new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.
The contractor โ a Virginia-based company called Anomaly Six LLC โ pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.
It sounds crazy, but itโs happening. Whatโs more, it appears itโs totally legal.
๐ ๐๐ผ https://www.androidauthority.com/government-tracking-apps-1145989/
๐ ๐๐ผ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801
#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.
The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.
This tactic is deceptive because the tracking isnโt disclosed. However, it appears to be totally legal.
A new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.
The contractor โ a Virginia-based company called Anomaly Six LLC โ pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.
It sounds crazy, but itโs happening. Whatโs more, it appears itโs totally legal.
๐ ๐๐ผ https://www.androidauthority.com/government-tracking-apps-1145989/
๐ ๐๐ผ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801
#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Android Authority
Report: Hundreds of apps have hidden tracking software used by the government
According to a new report, there is government tracking software hidden in hundreds of apps. The software is undisclosed, put there by federal contractors.
59: The Courthouse
Darknetdiaries - Ep 59: The Courthouse
In this episode we hear from Gary and Justin. Two seasoned penetration testers who tell us a story about the time when they tried to break into a courthouse but it went all wrong.
๐ ๐๐ผ How Security Research Can Get You Arrested
https://t.me/NoGoolag/3405
๐ง ๐๐ผ Darknetdiaries - Ep 59: The Courthouse
https://darknetdiaries.com/episode/59/
#darknetdiaries #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
In this episode we hear from Gary and Justin. Two seasoned penetration testers who tell us a story about the time when they tried to break into a courthouse but it went all wrong.
๐ ๐๐ผ How Security Research Can Get You Arrested
https://t.me/NoGoolag/3405
๐ง ๐๐ผ Darknetdiaries - Ep 59: The Courthouse
https://darknetdiaries.com/episode/59/
#darknetdiaries #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Evaluating the Impact of Attempts to Correct Health Misinformation on Social Media: A Meta-Analysis
Social media poses a threat to public health by facilitating the spread of misinformation. At the same time, however, social media offers a promising avenue to stem the distribution of false claims โ as evidenced by real-time corrections, crowdsourced fact-checking, and algorithmic tagging. Despite the growing attempts to correct misinformation on social media, there is still considerable ambiguity regarding the ability to effectively ameliorate the negative impact of false messages.
๐ ๐๐ผ PDF:
https://www.tandfonline.com/doi/pdf/10.1080/10410236.2020.1794553
๐ ๐๐ผ https://www.tandfonline.com/doi/full/10.1080/10410236.2020.1794553
#health #misinformation #SocialMedia #MetaAnalysis #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Social media poses a threat to public health by facilitating the spread of misinformation. At the same time, however, social media offers a promising avenue to stem the distribution of false claims โ as evidenced by real-time corrections, crowdsourced fact-checking, and algorithmic tagging. Despite the growing attempts to correct misinformation on social media, there is still considerable ambiguity regarding the ability to effectively ameliorate the negative impact of false messages.
๐ ๐๐ผ PDF:
https://www.tandfonline.com/doi/pdf/10.1080/10410236.2020.1794553
๐ ๐๐ผ https://www.tandfonline.com/doi/full/10.1080/10410236.2020.1794553
#health #misinformation #SocialMedia #MetaAnalysis #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Exclusive: Microsoft faces complex technical challenges in TikTok carveout
(Reuters) - Microsoft Corpโs (MSFT.O) bid to carve out parts of TikTok from its Chinese owner ByteDance will be a technically complex endeavor that could test the patience of President Donald Trumpโs administration, according to sources familiar with the setup.
Trump has given Microsoft until Sept. 15 to put together a blueprint for an acquisition that safeguards the personal data of Americans stored on the short-video app, and he has issued an order to ban it if there is no deal by then.
Microsoft is negotiating a transition period that will give it time to ringfence TikTok technologically from ByteDance after they agree to a deal, Reuters reported on Aug. 2.
The clean break that Trump and lawmakers envision could take a year or more, some of the sources said.
๐ ๐๐ผ ๐ฌ๐ง https://www.reuters.com/article/us-usa-tiktok-cybersecurity-exclusive/exclusive-microsoft-faces-complex-technical-challenges-in-tiktok-carveout-idUSKCN256100
๐ ๐๐ผ ๐ฉ๐ช https://t3n.de/news/tiktok-laeuft-douyin-servern-1309256
#DeleteTikTok #ByteDance #microsoft #ToddlerTrump
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
(Reuters) - Microsoft Corpโs (MSFT.O) bid to carve out parts of TikTok from its Chinese owner ByteDance will be a technically complex endeavor that could test the patience of President Donald Trumpโs administration, according to sources familiar with the setup.
Trump has given Microsoft until Sept. 15 to put together a blueprint for an acquisition that safeguards the personal data of Americans stored on the short-video app, and he has issued an order to ban it if there is no deal by then.
Microsoft is negotiating a transition period that will give it time to ringfence TikTok technologically from ByteDance after they agree to a deal, Reuters reported on Aug. 2.
The clean break that Trump and lawmakers envision could take a year or more, some of the sources said.
๐ ๐๐ผ ๐ฌ๐ง https://www.reuters.com/article/us-usa-tiktok-cybersecurity-exclusive/exclusive-microsoft-faces-complex-technical-challenges-in-tiktok-carveout-idUSKCN256100
๐ ๐๐ผ ๐ฉ๐ช https://t3n.de/news/tiktok-laeuft-douyin-servern-1309256
#DeleteTikTok #ByteDance #microsoft #ToddlerTrump
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Reuters
Exclusive: Microsoft faces complex technical challenges in TikTok carveout
(Reuters) - Microsoft Corpโs (MSFT.O) bid to carve out parts of TikTok from its Chinese owner ByteDance will be a technically complex endeavor that could test the patience of President Donald Trumpโs administration, according to sources familiar with theโฆ
The Department of Justice wants to stop California from having net neutrality
The US Department of Justice has filed for an injunction to stop California from implementing their own net neutrality laws. Net neutrality has been repealed in the United States Federal Communication Commission (FCC) effective since summer 2018, and now the effort of states to bring their citizens back under net neutrality protections is being challenged by federal law. In the wake of the FCC repeal of net neutrality laws in 2017, many states sought to pass their own net neutrality laws.
The same thing occurred after the repeal of broadband privacy laws in 2017. In the case of broadband privacy which was passed at the state level in Maine, the internet service providers (ISPs) actually tried to stop the law from being enacted by claiming that their right to selling profiles of user internet activity and history is part of their constitutional right to free speech. In the case of net neutrality, California was the largest state to pass net neutrality rules for internet companies and users within its borders. As part of the FCC repeal of net neutrality laws, the FCC actually included language that would forbid individual states or smaller jurisdictions from passing their own net neutrality laws.
๐ ๐๐ผ https://www.privateinternetaccess.com/blog/the-department-of-justice-wants-to-stop-california-from-having-net-neutrality/
#usa #netneutrality #california #FCC #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The US Department of Justice has filed for an injunction to stop California from implementing their own net neutrality laws. Net neutrality has been repealed in the United States Federal Communication Commission (FCC) effective since summer 2018, and now the effort of states to bring their citizens back under net neutrality protections is being challenged by federal law. In the wake of the FCC repeal of net neutrality laws in 2017, many states sought to pass their own net neutrality laws.
The same thing occurred after the repeal of broadband privacy laws in 2017. In the case of broadband privacy which was passed at the state level in Maine, the internet service providers (ISPs) actually tried to stop the law from being enacted by claiming that their right to selling profiles of user internet activity and history is part of their constitutional right to free speech. In the case of net neutrality, California was the largest state to pass net neutrality rules for internet companies and users within its borders. As part of the FCC repeal of net neutrality laws, the FCC actually included language that would forbid individual states or smaller jurisdictions from passing their own net neutrality laws.
๐ ๐๐ผ https://www.privateinternetaccess.com/blog/the-department-of-justice-wants-to-stop-california-from-having-net-neutrality/
#usa #netneutrality #california #FCC #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
PIA VPN Blog
The Department of Justice wants to stop California from having net neutrality
The US Department of Justice has filed for an injunction to stop California from implementing their own net neutrality laws. Net neutrality has been
Facebook Fired An Employee Who Collected Evidence Of Right-Wing Pages Getting Preferential Treatment
Facebook employees collected evidence showing the company is giving right-wing pages preferential treatment when it comes to misinformation. And theyโre worried about how the company will handle the presidentโs falsehoods in an election year.
After months of debate and disagreement over the handling of inflammatory or misleading posts from Donald Trump, Facebook employees want CEO Mark Zuckerberg to explain what the company would do if the leader of the free world uses the social network to undermine the results of the 2020 US presidential election.
โI do think weโre headed for a problematic scenario where Facebook is going to be used to aggressively undermine the legitimacy of the US elections, in a way that has never been possible in history,โ one Facebook employee wrote in a group on Workplace, the companyโs internal communication platform, earlier this week.
For the past week, this scenario has been a topic of heated discussion inside Facebook and was a top question for its leader. Some 2,900 employees asked Zuckerberg to address it publicly during a company-wide meeting on Thursday, which he partly did, calling it "an unprecedented position."
Zuckerbergโs remarks came amid growing internal concerns about the company's competence in handling misinformation, and the precautions it is taking to ensure its platform isnโt used to disrupt or mislead ahead of the US presidential election. Though Facebook says it has committed more money and resources to avoid repeating its failures during the 2016 election, some employees believe it isnโt enough. President Trump has already spent months raising questions about the legitimacy of the upcoming 2020 election, spreading misinformation about mail-in ballots, and declining to say if heโd accept the possibility of losing to Democratic nominee Joe Biden in November.
๐ ๐๐ผ https://www.buzzfeednews.com/article/craigsilverman/facebook-zuckerberg-what-if-trump-disputes-election-results
#DeleteFacebook #zuckerberg #evidence #usa #elections #rightwing
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Facebook employees collected evidence showing the company is giving right-wing pages preferential treatment when it comes to misinformation. And theyโre worried about how the company will handle the presidentโs falsehoods in an election year.
After months of debate and disagreement over the handling of inflammatory or misleading posts from Donald Trump, Facebook employees want CEO Mark Zuckerberg to explain what the company would do if the leader of the free world uses the social network to undermine the results of the 2020 US presidential election.
โI do think weโre headed for a problematic scenario where Facebook is going to be used to aggressively undermine the legitimacy of the US elections, in a way that has never been possible in history,โ one Facebook employee wrote in a group on Workplace, the companyโs internal communication platform, earlier this week.
For the past week, this scenario has been a topic of heated discussion inside Facebook and was a top question for its leader. Some 2,900 employees asked Zuckerberg to address it publicly during a company-wide meeting on Thursday, which he partly did, calling it "an unprecedented position."
Zuckerbergโs remarks came amid growing internal concerns about the company's competence in handling misinformation, and the precautions it is taking to ensure its platform isnโt used to disrupt or mislead ahead of the US presidential election. Though Facebook says it has committed more money and resources to avoid repeating its failures during the 2016 election, some employees believe it isnโt enough. President Trump has already spent months raising questions about the legitimacy of the upcoming 2020 election, spreading misinformation about mail-in ballots, and declining to say if heโd accept the possibility of losing to Democratic nominee Joe Biden in November.
๐ ๐๐ผ https://www.buzzfeednews.com/article/craigsilverman/facebook-zuckerberg-what-if-trump-disputes-election-results
#DeleteFacebook #zuckerberg #evidence #usa #elections #rightwing
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
BuzzFeed News
Facebook Fired An Employee Who Collected Evidence Of Right-Wing Pages Getting Preferential Treatment
Facebook employees collected evidence showing the company is giving right-wing pages preferential treatment when it comes to misinformation. And theyโre worried about how the company will handle the presidentโs falsehoods in an election year.
Pornhub Sister Company Wants to Expose Video Hosting Site โPiratesโ
MG Premium has requested three new #DMCA subpoenas targeting the operators and uploaders of #video #hosting sites Tapecontent.net, Netu.tv and Gounlimited.to. Pornhub's sister company requests information from #Cloudflare in the hope of identfiying those who share its copyrighted material without permission.
The online porn industry is rather diverse but there is only one company leading the charge โ #Mindgeek.
The company, formerly known as Manwin, owns one of the most visited adult websites, #Pornhub, and is also the driving force behind #YouPorn, #Redtube, #Tube8, #Xtube, and dozens of other sites.
Many of these tube sites became big by offering access to a wide variety of content, some of it posted without permission. However, that doesnโt mean that Mindgeek is turning a blind eye to pirates. On the contrary.
Mindgeekโs imperium also includes companies that create content. MG Premium, for example, which owns thousands of copyrighted adult videos, is the driving force behind popular brands such as Brazzers and Digital Playground. These videos are often pirated and shared through external sites, which is a problem for the company.
To address this issue, Mindgeekโs daughter company regularly goes to court. Last week, it requested three DMCA subpoenas targeting the video-hosting services Tapecontent.net, Netu.tv and Gounlimited.to.
๐ ๐๐ผ https://torrentfreak.com/pornhub-sister-company-wants-to-expose-video-hosting-site-pirates-200811/
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
MG Premium has requested three new #DMCA subpoenas targeting the operators and uploaders of #video #hosting sites Tapecontent.net, Netu.tv and Gounlimited.to. Pornhub's sister company requests information from #Cloudflare in the hope of identfiying those who share its copyrighted material without permission.
The online porn industry is rather diverse but there is only one company leading the charge โ #Mindgeek.
The company, formerly known as Manwin, owns one of the most visited adult websites, #Pornhub, and is also the driving force behind #YouPorn, #Redtube, #Tube8, #Xtube, and dozens of other sites.
Many of these tube sites became big by offering access to a wide variety of content, some of it posted without permission. However, that doesnโt mean that Mindgeek is turning a blind eye to pirates. On the contrary.
Mindgeekโs imperium also includes companies that create content. MG Premium, for example, which owns thousands of copyrighted adult videos, is the driving force behind popular brands such as Brazzers and Digital Playground. These videos are often pirated and shared through external sites, which is a problem for the company.
To address this issue, Mindgeekโs daughter company regularly goes to court. Last week, it requested three DMCA subpoenas targeting the video-hosting services Tapecontent.net, Netu.tv and Gounlimited.to.
๐ ๐๐ผ https://torrentfreak.com/pornhub-sister-company-wants-to-expose-video-hosting-site-pirates-200811/
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Torrentfreak
Pornhub Sister Company Wants to Expose Video Hosting Site 'Pirates' * TorrentFreak
MG Premium requested subpoenas targeting the operators and uploaders of the video hosting sites Tapecontent.net, Netu.tv and Gounlimited.to.
Spainโs largest bus terminal deployed live face recognition four years ago, but few noticed
Madrid South Stationโs face recognition system automatically matches every visitorโs face against a database of suspects, and shares information with the Spanish police.
Around 20 million travellers transited last year through Madridโs South bus terminal, known as Mรฉndez รlvaro Station to locals. Those 20 million persons had their face scanned as they entered the station. They were tracked as they walked to the bays where their bus was parked, before leaving the Spanish capital. Unless the stationโs face detection system produced an alert and they were arrested.
The terminal is a key transport exchange not only for Madrid, but for the whole country. It connects with subway stations and with Renfe, the national train service. Until 2010, the terminal did not have a security unit that was specifically tasked with coordinating the response to petty crime.
Running since 2016
The station is one of the few public buildings in Spain that deployed a live face recognition system. Miguel Angel Gallego, the stationโs chief of security between 2010 and 2019, decided to deploy face recognition after he was contacted by a Spanish start up working with this type of software in 2016.
Mr Gallego faced an uphill battle. The Spanish police, who were not used to face recognition at the time, were not enthusiastic, and neither was Avanza ADO, the company that has been running the bus terminal since 2003. But he remained undeterred. The technology has been running for four years, without much scrutiny from privacy organizations or from the state.
๐ ๐๐ผ https://algorithmwatch.org/en/story/spain-mendez-alvaro-face-recognition/
๐ ๐๐ผ ๐ฉ๐ช https://netzpolitik.org/2020/gesichtserkennung-in-madrid-videokameras-ueberwachen-unbemerkt-millionen-fahrgaeste/
#biometric #facerecognition #spain #madrid #surveillance #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Madrid South Stationโs face recognition system automatically matches every visitorโs face against a database of suspects, and shares information with the Spanish police.
Around 20 million travellers transited last year through Madridโs South bus terminal, known as Mรฉndez รlvaro Station to locals. Those 20 million persons had their face scanned as they entered the station. They were tracked as they walked to the bays where their bus was parked, before leaving the Spanish capital. Unless the stationโs face detection system produced an alert and they were arrested.
The terminal is a key transport exchange not only for Madrid, but for the whole country. It connects with subway stations and with Renfe, the national train service. Until 2010, the terminal did not have a security unit that was specifically tasked with coordinating the response to petty crime.
Running since 2016
The station is one of the few public buildings in Spain that deployed a live face recognition system. Miguel Angel Gallego, the stationโs chief of security between 2010 and 2019, decided to deploy face recognition after he was contacted by a Spanish start up working with this type of software in 2016.
Mr Gallego faced an uphill battle. The Spanish police, who were not used to face recognition at the time, were not enthusiastic, and neither was Avanza ADO, the company that has been running the bus terminal since 2003. But he remained undeterred. The technology has been running for four years, without much scrutiny from privacy organizations or from the state.
๐ ๐๐ผ https://algorithmwatch.org/en/story/spain-mendez-alvaro-face-recognition/
๐ ๐๐ผ ๐ฉ๐ช https://netzpolitik.org/2020/gesichtserkennung-in-madrid-videokameras-ueberwachen-unbemerkt-millionen-fahrgaeste/
#biometric #facerecognition #spain #madrid #surveillance #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
AlgorithmWatch
Spainโs largest bus terminal deployed live face recognition four years ago, but few noticed - AlgorithmWatch
Madrid South Stationโs face recognition system automatically matches every visitorโs face against a database of suspects, and shares information with the Spanish police.
Episode 1: Hacker vs. Hacker
Canadian Broadcasting Corporation
Hunting Warhead - Episode 1: Hacker vs. Hacker
Einar Stangvik is a white-hat hacker โ an internet security expert with an expertise in cracking the most secure and disturbing parts of the web. He discovers a troubling phenomenon online and joins forces with journalist Hรฅkon Hรธydal. It leads them to Australia, to confront two men who are running the largest child abuse site on the dark net.
#truecrime #HuntingWarhead #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Einar Stangvik is a white-hat hacker โ an internet security expert with an expertise in cracking the most secure and disturbing parts of the web. He discovers a troubling phenomenon online and joins forces with journalist Hรฅkon Hรธydal. It leads them to Australia, to confront two men who are running the largest child abuse site on the dark net.
#truecrime #HuntingWarhead #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag