FuzzOS
👉🏼 Summary
We’re going to work on an operating system which is designed specifically for fuzzing! This is going to be a streaming series for most of December which will cover making a new operating system with a strong focus on fuzzing. This means that things like the memory manager, determinism, and scalability will be the most important parts of the OS, and a lot of effort will go into making them super fast!
👉🏼 When
Streaming will start sometime on Thursday, December 10th, probably around 18:00 UTC, but the streams will be at relatively random times on relatively random days. I can’t really commit to specific times!
Streams will likely be 4-5 days a week (probably M-F), and probably 8-12 hours in length. We’ll see, who knows, depends how much fun we have!
👉🏼 Where
You’ll be able to find the streams live on my Twitch Channel, and if you’re unlucky and miss the streams, you’ll be able to find the recordings on my YouTube Channel! Don’t forget to like, comment, and subscribe, of course.
https://gamozolabs.github.io/fuzzing/2020/12/06/fuzzos.html
#fuzzOS #fuzzing
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
👉🏼 Summary
We’re going to work on an operating system which is designed specifically for fuzzing! This is going to be a streaming series for most of December which will cover making a new operating system with a strong focus on fuzzing. This means that things like the memory manager, determinism, and scalability will be the most important parts of the OS, and a lot of effort will go into making them super fast!
👉🏼 When
Streaming will start sometime on Thursday, December 10th, probably around 18:00 UTC, but the streams will be at relatively random times on relatively random days. I can’t really commit to specific times!
Streams will likely be 4-5 days a week (probably M-F), and probably 8-12 hours in length. We’ll see, who knows, depends how much fun we have!
👉🏼 Where
You’ll be able to find the streams live on my Twitch Channel, and if you’re unlucky and miss the streams, you’ll be able to find the recordings on my YouTube Channel! Don’t forget to like, comment, and subscribe, of course.
https://gamozolabs.github.io/fuzzing/2020/12/06/fuzzos.html
#fuzzOS #fuzzing
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Twitch
gamozo - Twitch
I do high-performance programming
This media is not supported in your browser
VIEW IN TELEGRAM
Agents raid home of fired Florida data scientist who built COVID-19 dashboard
DeSantis "sent the Gestapo": Video shows FDLE agents with guns drawn at home of woman fired over COVID-19 data.
State police brandishing firearms Monday raided the Tallahassee home of Rebekah Jones, the former Department of Health data DeSantis who built the state's much-praised COVID-19 dashboard before being fired over what she said was refusing to "manipulate data."
"They pointed a gun in my face. They pointed guns at my kids," Jones tweeted shortly before 5 p.m.
https://eu.tallahassee.com/story/news/2020/12/07/agents-raid-home-fired-florida-data-scientist-who-built-covid-19-dashboard-rebekah-jones/6482817002/
#DeSantis #fdle #agents #tallahassee #florida #scientist #usa #covid #data
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
DeSantis "sent the Gestapo": Video shows FDLE agents with guns drawn at home of woman fired over COVID-19 data.
State police brandishing firearms Monday raided the Tallahassee home of Rebekah Jones, the former Department of Health data DeSantis who built the state's much-praised COVID-19 dashboard before being fired over what she said was refusing to "manipulate data."
"They pointed a gun in my face. They pointed guns at my kids," Jones tweeted shortly before 5 p.m.
https://eu.tallahassee.com/story/news/2020/12/07/agents-raid-home-fired-florida-data-scientist-who-built-covid-19-dashboard-rebekah-jones/6482817002/
#DeSantis #fdle #agents #tallahassee #florida #scientist #usa #covid #data
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Chinese Phone Maker Gionee Found Guilty of Implanting Malware in More Than 20 Million Devices
A Chinese court has found phone manufacturer Gionee guilty of intentionally implanting malware in more than 21.75 million smartphones to generate revenue from users.
Shenzhen Zhipu Technology, a subsidiary of Gionee, together with its partner, Beijing Baice, implanted a Trojan Horse program in Gionee smartphones via an update to the Story Lock Screen app in 2018, according to an official document released by the People’s Court of Yiwu City, Zhejiang Province.
The software is installed on the affected phones without users’ knowledge through a hot code push functionality, which allows an automatic update to mobile apps when the server is updated, without going through any app reviews.
A hot update plugin called “Dark Horse Platform” was proposed by Baice in December 2018 to increase the efficiency of the “pull method”, which is used to launch the app and boost daily active user count.
The SDK version of the Story Lock Screen app was upgraded with Trojan plugins while the Dark Horse Platform was used to install and update the “Living Trojan Horse” without the user’s knowledge, court documents revealed.
The “pull method” was then activated 2.88 billion times between December 2018 and October 2019, generating a revenue of 27.85 million yuan ($4.2 million) for the two companies through unsolicited ads and other illegitimate means, the court added.
Shenzhen Zhipu was given a fine of 400,000 yuan ($61,000) for “illegally controlling computer information systems”.
Zhipu is a software technology company specializing in advertising operations and gaming products, and Gionee owns 85% of its shares. Beijing Baice was Zhipu’s partner in the update scheduler.
Four of Zhipu’s employees — Xu Li, Zhu Ying, Jia Zhengqiang and Pan Qi — were sentenced to three to three years and six months in jail and fined 200,000 ($30,000) each.
https://pandaily.com/chinese-phone-maker-gionee-found-guilty-of-implanting-malware-in-more-than-20-million-devices/
#gionee #malware #china
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A Chinese court has found phone manufacturer Gionee guilty of intentionally implanting malware in more than 21.75 million smartphones to generate revenue from users.
Shenzhen Zhipu Technology, a subsidiary of Gionee, together with its partner, Beijing Baice, implanted a Trojan Horse program in Gionee smartphones via an update to the Story Lock Screen app in 2018, according to an official document released by the People’s Court of Yiwu City, Zhejiang Province.
The software is installed on the affected phones without users’ knowledge through a hot code push functionality, which allows an automatic update to mobile apps when the server is updated, without going through any app reviews.
A hot update plugin called “Dark Horse Platform” was proposed by Baice in December 2018 to increase the efficiency of the “pull method”, which is used to launch the app and boost daily active user count.
The SDK version of the Story Lock Screen app was upgraded with Trojan plugins while the Dark Horse Platform was used to install and update the “Living Trojan Horse” without the user’s knowledge, court documents revealed.
The “pull method” was then activated 2.88 billion times between December 2018 and October 2019, generating a revenue of 27.85 million yuan ($4.2 million) for the two companies through unsolicited ads and other illegitimate means, the court added.
Shenzhen Zhipu was given a fine of 400,000 yuan ($61,000) for “illegally controlling computer information systems”.
Zhipu is a software technology company specializing in advertising operations and gaming products, and Gionee owns 85% of its shares. Beijing Baice was Zhipu’s partner in the update scheduler.
Four of Zhipu’s employees — Xu Li, Zhu Ying, Jia Zhengqiang and Pan Qi — were sentenced to three to three years and six months in jail and fined 200,000 ($30,000) each.
https://pandaily.com/chinese-phone-maker-gionee-found-guilty-of-implanting-malware-in-more-than-20-million-devices/
#gionee #malware #china
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Pandaily
Chinese Phone Maker Gionee Found Guilty of Implanting Malware in More Than 20 Million Devices
A Chinese court has found phone manufacturer Gionee guilty of intentionally implanting malware in more than 21.75 million smartphones to generate revenue from users.
This media is not supported in your browser
VIEW IN TELEGRAM
SOPS: Secrets OPerationS
sops is an editor of encrypted files that supports #YAML, #JSON, #ENV, #INI and #BINARY formats and encrypts with #AWS #KMS, #GCP #KMS, #Azure #Key #Vault and #PGP.
https://github.com/mozilla/sops
#sops #encryption #tool
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
sops is an editor of encrypted files that supports #YAML, #JSON, #ENV, #INI and #BINARY formats and encrypts with #AWS #KMS, #GCP #KMS, #Azure #Key #Vault and #PGP.
https://github.com/mozilla/sops
#sops #encryption #tool
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Cybersecurity firm FireEye has been hacked
In a blog post, CEO Kevin Mandia said a highly sophisticated foreign nation-state attack resulted in the theft of internal hacking tools (Red Team kits)
https://nitter.net/Bing_Chris/status/1336416367554203648#m
https://www.reuters.com/article/fireeye-cyber/u-s-cybersecurity-firm-fireeye-discloses-breach-theft-of-internal-hacking-tools-idUSL1N2IO2EI
#fireeye #hacked #nationstate #attack
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
In a blog post, CEO Kevin Mandia said a highly sophisticated foreign nation-state attack resulted in the theft of internal hacking tools (Red Team kits)
https://nitter.net/Bing_Chris/status/1336416367554203648#m
https://www.reuters.com/article/fireeye-cyber/u-s-cybersecurity-firm-fireeye-discloses-breach-theft-of-internal-hacking-tools-idUSL1N2IO2EI
#fireeye #hacked #nationstate #attack
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we aren’t aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. We’ll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. It’s up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers don’t store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
#forensic #guide #imessage #whatsapp #telegram #signal #skype
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we aren’t aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. We’ll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. It’s up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers don’t store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
#forensic #guide #imessage #whatsapp #telegram #signal #skype
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
ElcomSoft blog
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five…
Oblivious DNS Over HTTPS
Abstract
This document describes an extension to DNS Over HTTPS (DoH) that
allows hiding client IP addresses via proxying encrypted DNS
transactions. This improves privacy of DNS operations by not
allowing any one server entity to be aware of both the client IP
address and the content of DNS queries and answers.
https://tools.ietf.org/html/draft-pauly-dprive-oblivious-doh-03
#dns #https #doh #privacy
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Abstract
This document describes an extension to DNS Over HTTPS (DoH) that
allows hiding client IP addresses via proxying encrypted DNS
transactions. This improves privacy of DNS operations by not
allowing any one server entity to be aware of both the client IP
address and the content of DNS queries and answers.
https://tools.ietf.org/html/draft-pauly-dprive-oblivious-doh-03
#dns #https #doh #privacy
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The CentOS Project Just Committed Suicide
In shocking news the CentOS project announced today that they are shifting their Linux distribution to be based on the beta (non-stable) branch of Red Hat Enterprise Linux, rather than the stable branch. And that they are terminating CentOS 8 updates at the 31st of December, 2021.
The CentOS project will now release something named “CentOS Stream”, which is a Linux distribution built on the beta branch of RHEL so that contributors and interested groups can solve issues and report bugs before the software are shipped in RHEL. In other words, CentOS will become a testing mice for RHEL before new RHEL versions get released.
Historically, the CentOS Linux distribution was always built on the stable branch of Red Hat Enterprise Linux, providing binary compatibility between the two while also providing the same quality and stability. Red Hat publishes the source RPMs (SPRMS) of all its packages publicly on the Internet, and what the CentOS project was doing is that it was taking these packages, building them, and then shipping them under the CentOS re-branding. It also provided a promise that it will support each CentOS release up to 10 years with updates. Today, all of these promises are canceled as the project takes a new direction.
https://fosspost.org/centos-project-suicide/
https://blog.centos.org/2020/12/future-is-centos-stream/
#centos #os #redhat #linux
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
In shocking news the CentOS project announced today that they are shifting their Linux distribution to be based on the beta (non-stable) branch of Red Hat Enterprise Linux, rather than the stable branch. And that they are terminating CentOS 8 updates at the 31st of December, 2021.
The CentOS project will now release something named “CentOS Stream”, which is a Linux distribution built on the beta branch of RHEL so that contributors and interested groups can solve issues and report bugs before the software are shipped in RHEL. In other words, CentOS will become a testing mice for RHEL before new RHEL versions get released.
Historically, the CentOS Linux distribution was always built on the stable branch of Red Hat Enterprise Linux, providing binary compatibility between the two while also providing the same quality and stability. Red Hat publishes the source RPMs (SPRMS) of all its packages publicly on the Internet, and what the CentOS project was doing is that it was taking these packages, building them, and then shipping them under the CentOS re-branding. It also provided a promise that it will support each CentOS release up to 10 years with updates. Today, all of these promises are canceled as the project takes a new direction.
https://fosspost.org/centos-project-suicide/
https://blog.centos.org/2020/12/future-is-centos-stream/
#centos #os #redhat #linux
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
FOSS Post
The CentOS Project Just Committed Suicide
In shocking news the CentOS project announced today that they are shifting their Linux distribution to be based on the beta (non-stable) branch of Red Hat
How anti-fingerprinting extensions tend to make fingerprinting easier
Do you have a privacy protection extension installed in your browser? There are so many around, and every security vendor is promoting their own. Typically, these will provide a feature called “anti-fingerprinting” or “fingerprint protection” which is supposed to make you less identifiable on the web. What you won’t notice: this feature is almost universally flawed, potentially allowing even better fingerprinting.
I’ve seen a number of extensions misimplement this functionality, yet I rarely bother to write a report. The effort to fully explain the problem is considerable. On the other hand, it is obvious that for most vendors privacy protection is merely a check that they can put on their feature list. Quality does not matter because no user will be able to tell whether their solution actually worked. With minimal resources available, my issue report is unlikely to cause a meaningful action.
That’s why I decided to explain the issues in a blog post, a typical extension will have at least three out of four. Next time I run across a browser extension suffering from all the same flaws I can send them a link to this post. And maybe some vendors will resolve the issues then. Or, even better, not even make these mistakes in the first place.
👉🏼 Contents 👈🏼
— How fingerprinting works
— How anti-fingerprinting is supposed to work
— Barking the wrong tree
— Catching all those pesky frames
— Timing woes
— The art of faking
https://palant.info/2020/12/10/how-anti-fingerprinting-extensions-tend-to-make-fingerprinting-easier/
#fingerprinting #extensions #privacy #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Do you have a privacy protection extension installed in your browser? There are so many around, and every security vendor is promoting their own. Typically, these will provide a feature called “anti-fingerprinting” or “fingerprint protection” which is supposed to make you less identifiable on the web. What you won’t notice: this feature is almost universally flawed, potentially allowing even better fingerprinting.
I’ve seen a number of extensions misimplement this functionality, yet I rarely bother to write a report. The effort to fully explain the problem is considerable. On the other hand, it is obvious that for most vendors privacy protection is merely a check that they can put on their feature list. Quality does not matter because no user will be able to tell whether their solution actually worked. With minimal resources available, my issue report is unlikely to cause a meaningful action.
That’s why I decided to explain the issues in a blog post, a typical extension will have at least three out of four. Next time I run across a browser extension suffering from all the same flaws I can send them a link to this post. And maybe some vendors will resolve the issues then. Or, even better, not even make these mistakes in the first place.
👉🏼 Contents 👈🏼
— How fingerprinting works
— How anti-fingerprinting is supposed to work
— Barking the wrong tree
— Catching all those pesky frames
— Timing woes
— The art of faking
https://palant.info/2020/12/10/how-anti-fingerprinting-extensions-tend-to-make-fingerprinting-easier/
#fingerprinting #extensions #privacy #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Almost Secure
How anti-fingerprinting extensions tend to make fingerprinting easier
Browser extensions claiming to protect against fingerprinting will typically result in more data available for fingerprinting.
Brave-Browser: Apple thwarts the browser's payment system because it is not built on the mandatory in-app interface. Brave therefore removes functions from iOS.
Today Brave is releasing a new version (1.22) of its iOS browser in order to comply with recent stipulations made by Apple. In a nutshell, Brave users on iPhones and iPads will no longer be able to earn rewards for their attention, and will no longer be able to tip their favorite online creators via Brave. These changes to our Brave Rewards system do not apply to our desktop and Android browsers.
https://brave.com/rewards-ios/
#brave #apple #ios
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Today Brave is releasing a new version (1.22) of its iOS browser in order to comply with recent stipulations made by Apple. In a nutshell, Brave users on iPhones and iPads will no longer be able to earn rewards for their attention, and will no longer be able to tip their favorite online creators via Brave. These changes to our Brave Rewards system do not apply to our desktop and Android browsers.
https://brave.com/rewards-ios/
#brave #apple #ios
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Brave
Brave Complies With Apple iOS Guidelines, Will Continue to Innovate for Users and Creators They Support | Brave
Brave is releasing a new version of our iOS browser in order to comply with recent stipulations made by Apple.
‘No one’s safe under these laws’: Surveillance Bill could target activists and downloaders
The Morrison government’s proposed Surveillance Bill could be used to target everyone from Black Lives Matter campaigners to underage kids illegally downloading movies, critics have warned.
Victorians Greens Senator Lidia Thorpe told The New Daily that the sweeping powers proposed by the Bill have “far-reaching implications for grassroots activists, and people standing up for their rights”.
“No one’s safe under these new laws,” Senator Thorpe said.
“It will affect grassroots communities across the country, it will affect children. It will affect anybody who downloads a movie illegally over the internet – they could go to jail for five years.”
The proposed legislation gives the Australian Federal Police, the Australian Criminal Intelligence Commission and, through those bodies, the Australian Signals Directorate three new powers to investigate and disrupt criminal activity online.
https://thenewdaily.com.au/life/tech/2020/12/10/dutton-surveillance-bill-australia/
#surveillance #australia #netpolitics #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Morrison government’s proposed Surveillance Bill could be used to target everyone from Black Lives Matter campaigners to underage kids illegally downloading movies, critics have warned.
Victorians Greens Senator Lidia Thorpe told The New Daily that the sweeping powers proposed by the Bill have “far-reaching implications for grassroots activists, and people standing up for their rights”.
“No one’s safe under these new laws,” Senator Thorpe said.
“It will affect grassroots communities across the country, it will affect children. It will affect anybody who downloads a movie illegally over the internet – they could go to jail for five years.”
The proposed legislation gives the Australian Federal Police, the Australian Criminal Intelligence Commission and, through those bodies, the Australian Signals Directorate three new powers to investigate and disrupt criminal activity online.
https://thenewdaily.com.au/life/tech/2020/12/10/dutton-surveillance-bill-australia/
#surveillance #australia #netpolitics #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The New Daily
‘Extremely concerning’: Dutton’s Surveillance Bill risks undermining Australians’ privacy
Digital Rights Watch's Lucie Krahulcova said the Bill is the latest in an ongoing push by Home Affairs to expand surveillance with few safeguards.
Whatsapp, Threema & Co.: Messenger must hand over personal data
A new telecommunications law provides new surveillance powers for security authorities. It also includes data retention.
The new Telecommunications Act (TKG) has it all. On 465 pages, messengers and e-mail are declared to be telecommunications services, thus introducing surveillance powers similar to those for conventional telephones. Data retention and faster network expansion also appear in the bill. This is to be decided on a fast-track basis.
Whereas many of the provisions of the Telecommunications Act previously applied to Internet providers or telephone providers, they will now be extended to so-called over-the-top services such as e-mail providers or messengers like Whatsapp, Signal, Threema, Telegram or Wire. According to the so-called Gmail ruling of the European Court of Justice (ECJ), these are not telecommunications services, and accordingly the surveillance powers of the security authorities do not apply to them.
With the TKG amendment, messengers that collect inventory data such as name, address or an identifier such as phone number, user name or other ID are obliged to store this data and hand it over to security authorities upon request, even if the account has already been deleted.
👉🏼 Source 🇩🇪 👈🏼
https://www.golem.de/news/whatsapp-threema-co-messenger-sollen-bestandsdaten-herausgeben-muessen-2012-152770.html
#whatsapp #threema #telegram #personaldata #surveillance #authorities #messenger #netpolitics #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A new telecommunications law provides new surveillance powers for security authorities. It also includes data retention.
The new Telecommunications Act (TKG) has it all. On 465 pages, messengers and e-mail are declared to be telecommunications services, thus introducing surveillance powers similar to those for conventional telephones. Data retention and faster network expansion also appear in the bill. This is to be decided on a fast-track basis.
Whereas many of the provisions of the Telecommunications Act previously applied to Internet providers or telephone providers, they will now be extended to so-called over-the-top services such as e-mail providers or messengers like Whatsapp, Signal, Threema, Telegram or Wire. According to the so-called Gmail ruling of the European Court of Justice (ECJ), these are not telecommunications services, and accordingly the surveillance powers of the security authorities do not apply to them.
With the TKG amendment, messengers that collect inventory data such as name, address or an identifier such as phone number, user name or other ID are obliged to store this data and hand it over to security authorities upon request, even if the account has already been deleted.
👉🏼 Source 🇩🇪 👈🏼
https://www.golem.de/news/whatsapp-threema-co-messenger-sollen-bestandsdaten-herausgeben-muessen-2012-152770.html
#whatsapp #threema #telegram #personaldata #surveillance #authorities #messenger #netpolitics #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Golem.de
Messenger sollen Bestandsdaten herausgeben müssen
Ein neues Telekommunikationsgesetz sieht neue Überwachungsbefugnisse für Sicherheitsbehörden vor. Auch die Vorratsdatenspeicherung steht darin.
Google faces $417 million claim from Czech search engine Seznam
PRAGUE (Reuters) - Seznam.cz, the Czech Republic’s leading home-grown web search platform, said on Thursday it had claimed 9.072 billion crowns ($417 million) in damages from Google, alleging that the U.S. giant restricted competition.
Seznam said Google abused a dominant position on the Czech market with licensed operating systems and application stores for smart devices equipped with Android operating system.
A spokeswoman for Google, a unit of Alphabet, said it could not comment as it had not yet received the claim.
“Based on the European Commission’s decision back in 2018 which confirmed that Google was in breach with EU antitrust rules, we claim the compensation of damage that we have suffered while trying to distribute our applications and services via mobile devices with Android operation system,” Seznam deputy chairman Pavel Zima said.
https://www.reuters.com/article/us-alphabet-seznam-idUSKBN28K0UW
#google #DeleteGoogle #seznam #alphabet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
PRAGUE (Reuters) - Seznam.cz, the Czech Republic’s leading home-grown web search platform, said on Thursday it had claimed 9.072 billion crowns ($417 million) in damages from Google, alleging that the U.S. giant restricted competition.
Seznam said Google abused a dominant position on the Czech market with licensed operating systems and application stores for smart devices equipped with Android operating system.
A spokeswoman for Google, a unit of Alphabet, said it could not comment as it had not yet received the claim.
“Based on the European Commission’s decision back in 2018 which confirmed that Google was in breach with EU antitrust rules, we claim the compensation of damage that we have suffered while trying to distribute our applications and services via mobile devices with Android operation system,” Seznam deputy chairman Pavel Zima said.
https://www.reuters.com/article/us-alphabet-seznam-idUSKBN28K0UW
#google #DeleteGoogle #seznam #alphabet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Reuters
Google faces $417 million claim from Czech search engine Seznam
Seznam.cz, the Czech Republic's leading home-grown web search platform, said on Thursday it had claimed 9.072 billion crowns ($417 million) in damages from Google, alleging that the U.S. giant restricted competition.
Hyundai Motor Group to Acquire Controlling Interest in Boston Dynamics from SoftBank Group, Opening a New Chapter in the Robotics and Mobility Industry
BOSTON and SEOUL, South Korea and TOKYO, Dec. 11, 2020 /PRNewswire/ -- Hyundai Motor Group and SoftBank Group Corp. (SoftBank) today agreed on main terms of the transaction pursuant to which Hyundai Motor Group will acquire a controlling interest in Boston Dynamics in a deal that values the mobile robot firm at $1.1 billion. The deal came as Hyundai Motor Group envisions the transformation of human life by combining world-leading robotics technologies with its mobility expertise. Financial terms were not disclosed.
https://www.prnewswire.com/news-releases/hyundai-motor-group-to-acquire-controlling-interest-in-boston-dynamics-from-softbank-group-opening-a-new-chapter-in-the-robotics-and-mobility-industry-301191028.html
#bostondynamics #hyundai
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
BOSTON and SEOUL, South Korea and TOKYO, Dec. 11, 2020 /PRNewswire/ -- Hyundai Motor Group and SoftBank Group Corp. (SoftBank) today agreed on main terms of the transaction pursuant to which Hyundai Motor Group will acquire a controlling interest in Boston Dynamics in a deal that values the mobile robot firm at $1.1 billion. The deal came as Hyundai Motor Group envisions the transformation of human life by combining world-leading robotics technologies with its mobility expertise. Financial terms were not disclosed.
https://www.prnewswire.com/news-releases/hyundai-motor-group-to-acquire-controlling-interest-in-boston-dynamics-from-softbank-group-opening-a-new-chapter-in-the-robotics-and-mobility-industry-301191028.html
#bostondynamics #hyundai
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
PR Newswire
Hyundai Motor Group to Acquire Controlling Interest in Boston Dynamics from SoftBank Group, Opening a New Chapter in the Robotics…
Hyundai Motor Group to acquire controlling interest in Boston Dynamics, valued at $1.1 billion, with the goal of advancing robotics and mobility to realize...
shanghai-ccp-member-db-master.zip
305.6 MB
👇🏼 Dataleak (zip) from 2,000,000 Million Members of 🇨🇳☭ Chinese Communist Party (Shanghai Clique) 👇🏼
A major leak containing a register with the details of nearly two million CCP members has occurred – exposing members who are now working all over the world, while also lifting the lid on how the party operates under Xi Jinping, says Sharri Markson.
Ms Markson said the leak is a register with the details of Communist Party members, including their names, party position, birthday, national ID number and ethnicity.
“It is believed to be the first leak of its kind in the world,” the Sky News host said.
https://telegra.ph/Major-leak-exposes-members-and-lifts-the-lid-on-the-Chinese-Communist-Party--Sky-News-Australia-12-13
#leak #china #xi #communist #party #shanghai #clique #zip
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A major leak containing a register with the details of nearly two million CCP members has occurred – exposing members who are now working all over the world, while also lifting the lid on how the party operates under Xi Jinping, says Sharri Markson.
Ms Markson said the leak is a register with the details of Communist Party members, including their names, party position, birthday, national ID number and ethnicity.
“It is believed to be the first leak of its kind in the world,” the Sky News host said.
https://telegra.ph/Major-leak-exposes-members-and-lifts-the-lid-on-the-Chinese-Communist-Party--Sky-News-Australia-12-13
#leak #china #xi #communist #party #shanghai #clique #zip
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
EXCLUSIVE-U.S. Treasury breached by hackers backed by foreign government - sources
WASHINGTON, Dec 13 (Reuters) - A sophisticated hacking group backed by a foreign government stole information from the U.S. Treasury Department and a U.S. agency responsible for deciding policy around the internet and telecommunications, according to people familiar with the matter.
https://www.reuters.com/article/usa-cyber-amazoncom/exclusive-u-s-treasury-breached-by-hackers-backed-by-foreign-government-sources-idUSL1N2IT0HS?s=09
#usa #treasury #breach #breached #hacked #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
WASHINGTON, Dec 13 (Reuters) - A sophisticated hacking group backed by a foreign government stole information from the U.S. Treasury Department and a U.S. agency responsible for deciding policy around the internet and telecommunications, according to people familiar with the matter.
https://www.reuters.com/article/usa-cyber-amazoncom/exclusive-u-s-treasury-breached-by-hackers-backed-by-foreign-government-sources-idUSL1N2IT0HS?s=09
#usa #treasury #breach #breached #hacked #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
U.S.
EXCLUSIVE-U.S. Treasury breached by hackers backed by foreign government - sources
A sophisticated hacking group backed by a foreign government stole information from the U.S. Treasury Department and a U.S. agency responsible for deciding policy around the internet and telecommunications, according to people familiar with the matter. (Reporting…
Israeli Spy Tech Firm Says It Can Break Into Signal App Previously Considered Safe From Hacking
Cellebrite claims its tech can now crack Signal, which is regarded as the most encrypted app and is commonly used by journalists to communicate with sources
Israeli phone-hacking firm Cellebrite can now break into Signal, an encrypted app considered safe from external snooping, it claimed in a blog post on Thursday. Meanwhile, a U.S. report revealed Friday that American school districts have also bought the firm’s technology.
Cellebrite’s phone-hacking technology is intended for law enforcement agencies and is sold across the world. However, critics have long slammed the company for selling its wares to states with poor human rights records, from Indonesia and Venezuela to Belarus and Saudi Arabia.
https://www.haaretz.com/israel-news/tech-news/.premium-israeli-spy-tech-firm-says-it-can-break-into-signal-app-previously-considered-safe-1.9368581
https://www.cellebrite.com/en/blog/cellebrites-new-solution-for-decrypting-the-signal-app/
#signal #cellebrite #decrypting #app
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Cellebrite claims its tech can now crack Signal, which is regarded as the most encrypted app and is commonly used by journalists to communicate with sources
Israeli phone-hacking firm Cellebrite can now break into Signal, an encrypted app considered safe from external snooping, it claimed in a blog post on Thursday. Meanwhile, a U.S. report revealed Friday that American school districts have also bought the firm’s technology.
Cellebrite’s phone-hacking technology is intended for law enforcement agencies and is sold across the world. However, critics have long slammed the company for selling its wares to states with poor human rights records, from Indonesia and Venezuela to Belarus and Saudi Arabia.
https://www.haaretz.com/israel-news/tech-news/.premium-israeli-spy-tech-firm-says-it-can-break-into-signal-app-previously-considered-safe-1.9368581
https://www.cellebrite.com/en/blog/cellebrites-new-solution-for-decrypting-the-signal-app/
#signal #cellebrite #decrypting #app
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
BREAKING: President Trump will pardon Julian Assange.
https://nitter.net/pastormarkburns/status/1338518866683686915
#assange #free #pardon #trump
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
https://nitter.net/pastormarkburns/status/1338518866683686915
#assange #free #pardon #trump
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Pornhub has just removed nearly 9 million of its videos
Pornhub has removed all videos (millions of videos in total) uploaded on its website by its unverified users, as part of a crackdown on its user-uploaded content after two major payment services (Visa and Mastercard) suspended its services for them. Firstly reported by Motherboard, and New York Times that the site was hosting videos that shows children being assaulted uploaded by people who are underage.
The site on last Tuesday said that it would begin limiting its uploads to the site’s verified users only. So as of now, uploads have to come from Pornhub’s official content partners or members of its “Model Program,” which requires age verification to sign up. The verification policy will also apply to all sites owned by MindGeek, which is Pornhub’s parent company.
“This means every piece of Pornhub content is from verified uploaders, a requirement that platforms like Facebook, Instagram, TikTok, YouTube, Snapchat, and Twitter have yet to institute,” Pornhub wrote in a blog post.
https://craffic.co.in/pornhub-just-removed-nearly-9-million-of-its-videos/
https://www.pornhub.com/blog/11422
#pornhub
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Pornhub has removed all videos (millions of videos in total) uploaded on its website by its unverified users, as part of a crackdown on its user-uploaded content after two major payment services (Visa and Mastercard) suspended its services for them. Firstly reported by Motherboard, and New York Times that the site was hosting videos that shows children being assaulted uploaded by people who are underage.
The site on last Tuesday said that it would begin limiting its uploads to the site’s verified users only. So as of now, uploads have to come from Pornhub’s official content partners or members of its “Model Program,” which requires age verification to sign up. The verification policy will also apply to all sites owned by MindGeek, which is Pornhub’s parent company.
“This means every piece of Pornhub content is from verified uploaders, a requirement that platforms like Facebook, Instagram, TikTok, YouTube, Snapchat, and Twitter have yet to institute,” Pornhub wrote in a blog post.
https://craffic.co.in/pornhub-just-removed-nearly-9-million-of-its-videos/
https://www.pornhub.com/blog/11422
#pornhub
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Craffic
Pornhub has just removed nearly 9 million of its videos - Craffic
Pornhub has removed all videos (millions of videos in total) uploaded on its website by its unverified users, as part of a crackdown on its user-uploaded
Regarding #JulianAssange tweet, Inadvertent tweet, faulty source, please disregard!
https://nitter.net/pastormarkburns/status/1338543695742857224#m
https://t.me/BlackBox_Archiv/1566
#assange #free #pardon #trump
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
https://nitter.net/pastormarkburns/status/1338543695742857224#m
https://t.me/BlackBox_Archiv/1566
#assange #free #pardon #trump
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Pirate IPTV: UK Police Prepare to Send Warnings to 7,000 Users
Police say they are preparing to send warning notices to more than 7,000 UK residents who are believed to have purchased pirate IPTV subscriptions. The warnings follow the arrest of a then 28-year-old man in the North-West of England during the summer and the seizure of luxury cars, expensive jewelry, and a pirate IPTV customer database.
As pirate IPTV providers and resellers continue to provide access to low-cost premium TV services, law enforcement agencies around the world are stepping up efforts to disrupt their activities.
Pirate IPTV platforms remain popular in the UK, where they are the preferred choice to access matches from the Premier League and other mainstream content at affordable prices. As a result, many individuals are taking advantage of the market and attracting thousands of subscribers but action in the UK last summer shows that’s not without risk.
https://torrentfreak.com/pirate-iptv-uk-police-prepare-to-send-warnings-to-7000-users-201214/
#pirate #iptv #uk #police #warnings #customers
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Police say they are preparing to send warning notices to more than 7,000 UK residents who are believed to have purchased pirate IPTV subscriptions. The warnings follow the arrest of a then 28-year-old man in the North-West of England during the summer and the seizure of luxury cars, expensive jewelry, and a pirate IPTV customer database.
As pirate IPTV providers and resellers continue to provide access to low-cost premium TV services, law enforcement agencies around the world are stepping up efforts to disrupt their activities.
Pirate IPTV platforms remain popular in the UK, where they are the preferred choice to access matches from the Premier League and other mainstream content at affordable prices. As a result, many individuals are taking advantage of the market and attracting thousands of subscribers but action in the UK last summer shows that’s not without risk.
https://torrentfreak.com/pirate-iptv-uk-police-prepare-to-send-warnings-to-7000-users-201214/
#pirate #iptv #uk #police #warnings #customers
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Torrentfreak
Pirate IPTV: UK Police Prepare to Send Warnings to 7,000 Users * TorrentFreak
Police say they are preparing to send warning notices to more than 7,000 UK residents who purchased pirate IPTV subscriptions.