Media is too big
VIEW IN TELEGRAM
#CRYPTOLEAKS
Peter F. Müller, investigative journalist; Paul Reuvers and Marcus Simons, Cryptomuseum Eindhoven; Markus Kompa, writer. Peter F. Müller revealed in February a delicate collaboration between BND and CIA for harvesting SIGINT via backdoors. It turned out that this was just the tip of an iceberg.
While researching a documentary about the German foreign intelligence agency Bundesnachrichtendienst (BND), Peter F. Müller came across a top secret document (MINERVA) about a delicate collaboration between BND and CIA. Since 1970 the spy agencies secretly owned and controlled the Swiss based Crypto AG, the world market leader for encrypting devices.
https://media.ccc.de/v/rc3-103955-cryptoleaks
#rc3 #ccc #cia #bnd #SIGINT #backdoors #cryptoleaks #minerva #cryptoag
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Peter F. Müller, investigative journalist; Paul Reuvers and Marcus Simons, Cryptomuseum Eindhoven; Markus Kompa, writer. Peter F. Müller revealed in February a delicate collaboration between BND and CIA for harvesting SIGINT via backdoors. It turned out that this was just the tip of an iceberg.
While researching a documentary about the German foreign intelligence agency Bundesnachrichtendienst (BND), Peter F. Müller came across a top secret document (MINERVA) about a delicate collaboration between BND and CIA. Since 1970 the spy agencies secretly owned and controlled the Swiss based Crypto AG, the world market leader for encrypting devices.
https://media.ccc.de/v/rc3-103955-cryptoleaks
#rc3 #ccc #cia #bnd #SIGINT #backdoors #cryptoleaks #minerva #cryptoag
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
TikTok tracks you even if you never made an account
TikTok gathers information on users and shares it with third parties, even if you’ve never made a profile. VICE reporter Riccardo Coluccini – who has used the app but had never made a TikTok account before in his life – sent a GDPR request to TikTok to find out what information the social media giant had gathered on him. At first, TikTok tried to stonewall Coluccini by saying that:
“Unfortunately, we are unable to locate an account associated with the email address.”
However, TikTok’s privacy policy clearly states that they do track users without email addresses. The language looks like this, with TikTok granting itself the right to:
“collect certain information from you when you use the Platform including when you are using the app without an account.”
💡 Finding out what TikTok knows about you
Eventually, TikTok fulfilled the GDPR request after Coluccini provided his IP address as well as his iOS device’s ID For Vendors unique identifier. Once he had his data, Coluccini noted just how much information was stored. Everything from IP address and other device fingerprinting information was stored down to what terms he searched, what videos he watched, and when. This data was synced with third parties such as Facebook, and the amount of data stored is quite large. Though, Colluccini notes that it’s similar to the data that Amazon stores, and any big tech app really.
For those that have made a TikTok profile, you can view the information that TikTok has gathered by requesting that data from TikTok.
https://www.privateinternetaccess.com/blog/tiktok-tracks-you-even-if-you-never-made-an-account/
#tiktok #tracking #bigdata #fingerprinting #privacy #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
TikTok gathers information on users and shares it with third parties, even if you’ve never made a profile. VICE reporter Riccardo Coluccini – who has used the app but had never made a TikTok account before in his life – sent a GDPR request to TikTok to find out what information the social media giant had gathered on him. At first, TikTok tried to stonewall Coluccini by saying that:
“Unfortunately, we are unable to locate an account associated with the email address.”
However, TikTok’s privacy policy clearly states that they do track users without email addresses. The language looks like this, with TikTok granting itself the right to:
“collect certain information from you when you use the Platform including when you are using the app without an account.”
💡 Finding out what TikTok knows about you
Eventually, TikTok fulfilled the GDPR request after Coluccini provided his IP address as well as his iOS device’s ID For Vendors unique identifier. Once he had his data, Coluccini noted just how much information was stored. Everything from IP address and other device fingerprinting information was stored down to what terms he searched, what videos he watched, and when. This data was synced with third parties such as Facebook, and the amount of data stored is quite large. Though, Colluccini notes that it’s similar to the data that Amazon stores, and any big tech app really.
For those that have made a TikTok profile, you can view the information that TikTok has gathered by requesting that data from TikTok.
https://www.privateinternetaccess.com/blog/tiktok-tracks-you-even-if-you-never-made-an-account/
#tiktok #tracking #bigdata #fingerprinting #privacy #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
PIA VPN Blog
TikTok tracks you even if you never made an account
TikTok gathers information on users and shares it with third parties, even if you’ve never made a profile. VICE reporter Riccardo Coluccini - who has used
The Six Dumbest Ideas in Computer Security
There's lots of innovation going on in security - we're inundated with a steady stream of new stuff and it all sounds like it works just great. Every couple of months I'm invited to a new computer security conference, or I'm asked to write a foreword for a new computer security book. And, thanks to the fact that it's a topic of public concern and a "safe issue" for politicians, we can expect a flood of computer security-related legislation from lawmakers. So: computer security is definitely still a "hot topic." But why are we spending all this time and money and still having problems?
Let me introduce you to the six dumbest ideas in computer security. What are they? They're the anti-good ideas. They're the braindamage that makes your $100,000 ASIC-based turbo-stateful packet-mulching firewall transparent to hackers. Where do anti-good ideas come from? They come from misguided attempts to do the impossible - which is another way of saying "trying to ignore reality." Frequently those misguided attempts are sincere efforts by well-meaning people or companies who just don't fully understand the situation, but other times it's just a bunch of savvy entrepreneurs with a well-marketed piece of junk they're selling to make a fast buck. In either case, these dumb ideas are the fundamental reason(s) why all that money you spend on information security is going to be wasted, unless you somehow manage to avoid them.
For your convenience, I've listed the dumb ideas in descending order from the most-frequently-seen. If you can avoid falling into the the trap of the first three, you're among the few true computer security elite.
#1) Default Permit
#2) Enumerating Badness
#3) Penetrate and Patch
#4) Hacking is Cool
#5) Educating Users
#6) Action is Better Than Inaction
https://www.ranum.com/security/computer_security/editorials/dumb/
#dumb #ideas #internet #security
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
There's lots of innovation going on in security - we're inundated with a steady stream of new stuff and it all sounds like it works just great. Every couple of months I'm invited to a new computer security conference, or I'm asked to write a foreword for a new computer security book. And, thanks to the fact that it's a topic of public concern and a "safe issue" for politicians, we can expect a flood of computer security-related legislation from lawmakers. So: computer security is definitely still a "hot topic." But why are we spending all this time and money and still having problems?
Let me introduce you to the six dumbest ideas in computer security. What are they? They're the anti-good ideas. They're the braindamage that makes your $100,000 ASIC-based turbo-stateful packet-mulching firewall transparent to hackers. Where do anti-good ideas come from? They come from misguided attempts to do the impossible - which is another way of saying "trying to ignore reality." Frequently those misguided attempts are sincere efforts by well-meaning people or companies who just don't fully understand the situation, but other times it's just a bunch of savvy entrepreneurs with a well-marketed piece of junk they're selling to make a fast buck. In either case, these dumb ideas are the fundamental reason(s) why all that money you spend on information security is going to be wasted, unless you somehow manage to avoid them.
For your convenience, I've listed the dumb ideas in descending order from the most-frequently-seen. If you can avoid falling into the the trap of the first three, you're among the few true computer security elite.
#1) Default Permit
#2) Enumerating Badness
#3) Penetrate and Patch
#4) Hacking is Cool
#5) Educating Users
#6) Action is Better Than Inaction
https://www.ranum.com/security/computer_security/editorials/dumb/
#dumb #ideas #internet #security
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The battle inside Signal
The fast-growing encrypted messaging app is making itself increasingly vulnerable to abuse. Current and former employees are sounding the alarm.
On January 6th, WhatsApp users around the world began seeing a pop-up message notifying them of upcoming changes to the service’s privacy policy. The changes were designed to enable businesses to send and store messages to WhatsApp’s 2 billion-plus users, but they came with an ultimatum: agree by February 8th, or you can no longer use the app.
The resulting furor sparked a backlash that led Facebook-owned WhatsApp to delay the policy from taking effect until May. In the meantime, though, tens of millions of users began seeking alternatives to Facebook’s suite of products. Among the biggest beneficiaries has been Signal, the encrypted messaging app whose development is funded by a nonprofit organization. Last month, according to one research firm, the six-year-old app had about 20 million users worldwide. But in a 12-hour period the Sunday after WhatsApp’s privacy policy update began, Signal added another 2 million users, an employee familiar with the matter told me. Days of temporary outages followed.
https://www.theverge.com/22249391/signal-app-abuse-messaging-employees-violence-misinformation
#signal #app #abuse #messaging #employees #violence #misinformation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The fast-growing encrypted messaging app is making itself increasingly vulnerable to abuse. Current and former employees are sounding the alarm.
On January 6th, WhatsApp users around the world began seeing a pop-up message notifying them of upcoming changes to the service’s privacy policy. The changes were designed to enable businesses to send and store messages to WhatsApp’s 2 billion-plus users, but they came with an ultimatum: agree by February 8th, or you can no longer use the app.
The resulting furor sparked a backlash that led Facebook-owned WhatsApp to delay the policy from taking effect until May. In the meantime, though, tens of millions of users began seeking alternatives to Facebook’s suite of products. Among the biggest beneficiaries has been Signal, the encrypted messaging app whose development is funded by a nonprofit organization. Last month, according to one research firm, the six-year-old app had about 20 million users worldwide. But in a 12-hour period the Sunday after WhatsApp’s privacy policy update began, Signal added another 2 million users, an employee familiar with the matter told me. Days of temporary outages followed.
https://www.theverge.com/22249391/signal-app-abuse-messaging-employees-violence-misinformation
#signal #app #abuse #messaging #employees #violence #misinformation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Verge
The battle inside Signal
Signal promised to be different from other messaging apps — but will the company’s focus on growth compromise its mission?
This media is not supported in your browser
VIEW IN TELEGRAM
It Wasn’t Me
All the things a bank won’t ask, but a fraudster will! Our latest film “It Wasn’t Me”, in collaboration with the DubaiPoliceHQ, gives you the do’s and don’ts of keeping your identity and account secure at all times.
Dubai Police & Emirates National Bank Dubai
https://mobile.twitter.com/EmiratesNBD_AE/status/1144261859517894658
#music #video #repost #fraud #banking #dubai
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
All the things a bank won’t ask, but a fraudster will! Our latest film “It Wasn’t Me”, in collaboration with the DubaiPoliceHQ, gives you the do’s and don’ts of keeping your identity and account secure at all times.
Dubai Police & Emirates National Bank Dubai
https://mobile.twitter.com/EmiratesNBD_AE/status/1144261859517894658
#music #video #repost #fraud #banking #dubai
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Ultimate Online Anonymity Guide 2020
Privacy is a necessary component for the empowerment of civil society, and this premise remains valid in cyberspace. Our cybersecurity experts put their heads together to bring you a list of the most important things you can do to ensure your anonymity and privacy online. Armed with the tips and tricks they came up with, you can easily become an empowered ghost in the machine.
While the news is you can protect your location with a simple proxy service or the Tor network, these so-called anonymity services do nothing to hide your real personal information, location, or activities from your internet service provider, government surveillance, or thieves. Also, any Google search will stay attached to your browser, readily identifiable by any service wanting your real connection info. Also, even if you get the Tor browser and use it through the best proxy, it won’t hide you from websites you stay logged in to.
💡 How to Stay Anonymous Online
Protecting your internet privacy on the web can seem daunting at times. You speak of needing a new dishwasher on your smartphone with your mother. The next day, you notice ads appearing everywhere you turn online for dishwashers. Want to speak and browse the web anonymously to price check without Google bots, Siri, and Alexa spying on and tracking you?
This post will teach anyone how to take back their privacy. Let’s start with this basics check:
https://mytruemedia.com/ultimate-online-anonymity-guide/
#online #anonymity #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Privacy is a necessary component for the empowerment of civil society, and this premise remains valid in cyberspace. Our cybersecurity experts put their heads together to bring you a list of the most important things you can do to ensure your anonymity and privacy online. Armed with the tips and tricks they came up with, you can easily become an empowered ghost in the machine.
While the news is you can protect your location with a simple proxy service or the Tor network, these so-called anonymity services do nothing to hide your real personal information, location, or activities from your internet service provider, government surveillance, or thieves. Also, any Google search will stay attached to your browser, readily identifiable by any service wanting your real connection info. Also, even if you get the Tor browser and use it through the best proxy, it won’t hide you from websites you stay logged in to.
💡 How to Stay Anonymous Online
Protecting your internet privacy on the web can seem daunting at times. You speak of needing a new dishwasher on your smartphone with your mother. The next day, you notice ads appearing everywhere you turn online for dishwashers. Want to speak and browse the web anonymously to price check without Google bots, Siri, and Alexa spying on and tracking you?
This post will teach anyone how to take back their privacy. Let’s start with this basics check:
https://mytruemedia.com/ultimate-online-anonymity-guide/
#online #anonymity #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
My True Media
Ultimate Online Anonymity Guide [2020] Hide Identity, Location
Our cybersecurity experts pulled out all the stops with this list of new habits, tricks, and tips to hide your activities and remain anonymous online.
Media is too big
VIEW IN TELEGRAM
Become Anonymous: The Ultimate Guide To Privacy, Security, & Anonymity
The ultimate & complete guide to becoming anonymous, private, and secure on the internet. Learn everything you can do to get as close as anonymous as possible! 🕵️♂️
This video tutorial will teach everything about passwords, 2FA, digital footprints, social media, VPNs, proxies, Tor, encrypted communication & messaging, web browsing, smartphones, computers, data privacy, real world privacy/security, FOSS (open source), anonymous shopping, and more for the web. Go Anonymous Today!
https://www.youtube.com/watch?v=a1i-3xwcSGA
#online #privacy #security #anonymity #guide #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The ultimate & complete guide to becoming anonymous, private, and secure on the internet. Learn everything you can do to get as close as anonymous as possible! 🕵️♂️
This video tutorial will teach everything about passwords, 2FA, digital footprints, social media, VPNs, proxies, Tor, encrypted communication & messaging, web browsing, smartphones, computers, data privacy, real world privacy/security, FOSS (open source), anonymous shopping, and more for the web. Go Anonymous Today!
https://www.youtube.com/watch?v=a1i-3xwcSGA
#online #privacy #security #anonymity #guide #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Advertising profiles in your browser: Eyeo launches "Crumbs".
More and more companies are trying to position themselves for the post-cookie age, including adblocker manufacturer Eyeo.
With a new plugin, Eyeo, known for its AdBlock Plus browser plugin, is trying to launch a new advertising market. "Crumbs" blocks conventional advertising trackers and instead creates a user profile in the browser to play out privacy-preserving yet personalized advertising.
The browser plugin, which is currently available for Chrome and Firefox, is supposed to filter out the currently omnipresent cookie popups as well as the actual tracking techniques, such as third-party cookies or certain scripts. In addition, Crumbs sends the signal of the Global Privacy Control group to prohibit the sharing of profile information.
In addition to a complete blocking of advertising cookies, Crumbs also offers a sandbox mode, in which cookies are only accepted for appearances, but then deleted again. In addition, advertising requests are to be routed through a proxy so that advertisers cannot draw any direct conclusions about the IP address.
https://crumbs.org/
https://www.heise.de/news/Werbeprofile-im-Browser-Eyeo-startet-Crumbs-5036636.html
#crumbs #trackers #privacy #controll #adblock #browser #plugin
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
More and more companies are trying to position themselves for the post-cookie age, including adblocker manufacturer Eyeo.
With a new plugin, Eyeo, known for its AdBlock Plus browser plugin, is trying to launch a new advertising market. "Crumbs" blocks conventional advertising trackers and instead creates a user profile in the browser to play out privacy-preserving yet personalized advertising.
The browser plugin, which is currently available for Chrome and Firefox, is supposed to filter out the currently omnipresent cookie popups as well as the actual tracking techniques, such as third-party cookies or certain scripts. In addition, Crumbs sends the signal of the Global Privacy Control group to prohibit the sharing of profile information.
In addition to a complete blocking of advertising cookies, Crumbs also offers a sandbox mode, in which cookies are only accepted for appearances, but then deleted again. In addition, advertising requests are to be routed through a proxy so that advertisers cannot draw any direct conclusions about the IP address.
https://crumbs.org/
https://www.heise.de/news/Werbeprofile-im-Browser-Eyeo-startet-Crumbs-5036636.html
#crumbs #trackers #privacy #controll #adblock #browser #plugin
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
crumbs.org
Take back control of your personal data and stop pesky trackers.
Crumbs empowers users to claim control over the usage of their data online, while offering a new privacy-first model for data-driven advertisement.
Anime4You - illegal streaming portal is down forever
The portal Anime4you is gone from the internet for good. The operator has taken the site offline without warning due to private problems.
Nothing more is coming under the domain anime4you.one. There is now no way for users to somehow back up their anime because of the lack of advance notice. According to a moderator, all data has been deleted. Private reasons should have brought the operator to it. Everyone has to carry his baggage. And everyone reacts differently to the course of his life, the moderator commented on the behavior of the operator. For the Admin stood at least recently firmly that it would like to continue no longer. Many a fellow operator would have liked to take over the project together with the old data, which is now probably no longer possible.
https://tarnkappe.info/anime4you-illegales-streaming-portal-ist-down-forever/
#anime4you #streaming #down
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The portal Anime4you is gone from the internet for good. The operator has taken the site offline without warning due to private problems.
Nothing more is coming under the domain anime4you.one. There is now no way for users to somehow back up their anime because of the lack of advance notice. According to a moderator, all data has been deleted. Private reasons should have brought the operator to it. Everyone has to carry his baggage. And everyone reacts differently to the course of his life, the moderator commented on the behavior of the operator. For the Admin stood at least recently firmly that it would like to continue no longer. Many a fellow operator would have liked to take over the project together with the old data, which is now probably no longer possible.
https://tarnkappe.info/anime4you-illegales-streaming-portal-ist-down-forever/
#anime4you #streaming #down
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Tarnkappe.info
Anime4You - illegales Streaming-Portal ist down forever
Das Portal Anime4you ist endgültig weg vom Fenster. Der Betreiber hat die Seite wegen privater Probleme ohne Vorwarnung vom Netz genommen.
Firefox 85 Cracks Down on Supercookies
Trackers and adtech companies have long abused browser features to follow people around the web. Since 2018, we have been dedicated to reducing the number of ways our users can be tracked. As a first line of defense, we’ve blocked cookies from known trackers and scripts from known fingerprinting companies.
In Firefox 85, we’re introducing a fundamental change in the browser’s network architecture to make all of our users safer: we now partition network connections and caches by the website being visited. Trackers can abuse caches to create supercookies and can use connection identifiers to track users. But by isolating caches and network connections to the website they were created on, we make them useless for cross-site tracking.
💡 How does partitioning network state prevent cross-site tracking?
Like all web browsers, Firefox shares some internal resources between websites to reduce overhead. Firefox’s image cache is a good example: if the same image is embedded on multiple websites, Firefox will load the image from the network during a visit to the first website and on subsequent websites would traditionally load the image from the browser’s local image cache (rather than reloading from the network). Similarly, Firefox would reuse a single network connection when loading resources from the same party embedded on multiple websites. These techniques are intended to save a user bandwidth and time.
Unfortunately, some trackers have found ways to abuse these shared resources to follow users around the web. In the case of Firefox’s image cache, a tracker can create a supercookie by “encoding” an identifier for the user in a cached image on one website, and then “retrieving” that identifier on a different website by embedding the same image. To prevent this possibility, Firefox 85 uses a different image cache for every website a user visits. That means we still load cached images when a user revisits the same site, but we don’t share those caches across sites.
In fact, there are many different caches trackers can abuse to build supercookies. Firefox 85 partitions all of the following caches by the top-level site being visited: HTTP cache, image cache, favicon cache, HSTS cache, OCSP cache, style sheet cache, font cache, DNS cache, HTTP Authentication cache, Alt-Svc cache, and TLS certificate cache.
To further protect users from connection-based tracking, Firefox 85 also partitions pooled connections, prefetch connections, preconnect connections, speculative connections, and TLS session identifiers.
https://blog.mozilla.org/security/2021/01/26/supercookie-protections/
#mozilla #firefox #tracker #fingerprinting #supercookies #protection
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Trackers and adtech companies have long abused browser features to follow people around the web. Since 2018, we have been dedicated to reducing the number of ways our users can be tracked. As a first line of defense, we’ve blocked cookies from known trackers and scripts from known fingerprinting companies.
In Firefox 85, we’re introducing a fundamental change in the browser’s network architecture to make all of our users safer: we now partition network connections and caches by the website being visited. Trackers can abuse caches to create supercookies and can use connection identifiers to track users. But by isolating caches and network connections to the website they were created on, we make them useless for cross-site tracking.
💡 How does partitioning network state prevent cross-site tracking?
Like all web browsers, Firefox shares some internal resources between websites to reduce overhead. Firefox’s image cache is a good example: if the same image is embedded on multiple websites, Firefox will load the image from the network during a visit to the first website and on subsequent websites would traditionally load the image from the browser’s local image cache (rather than reloading from the network). Similarly, Firefox would reuse a single network connection when loading resources from the same party embedded on multiple websites. These techniques are intended to save a user bandwidth and time.
Unfortunately, some trackers have found ways to abuse these shared resources to follow users around the web. In the case of Firefox’s image cache, a tracker can create a supercookie by “encoding” an identifier for the user in a cached image on one website, and then “retrieving” that identifier on a different website by embedding the same image. To prevent this possibility, Firefox 85 uses a different image cache for every website a user visits. That means we still load cached images when a user revisits the same site, but we don’t share those caches across sites.
In fact, there are many different caches trackers can abuse to build supercookies. Firefox 85 partitions all of the following caches by the top-level site being visited: HTTP cache, image cache, favicon cache, HSTS cache, OCSP cache, style sheet cache, font cache, DNS cache, HTTP Authentication cache, Alt-Svc cache, and TLS certificate cache.
To further protect users from connection-based tracking, Firefox 85 also partitions pooled connections, prefetch connections, preconnect connections, speculative connections, and TLS session identifiers.
https://blog.mozilla.org/security/2021/01/26/supercookie-protections/
#mozilla #firefox #tracker #fingerprinting #supercookies #protection
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Mozilla Security Blog
Firefox 85 Cracks Down on Supercookies
Trackers and adtech companies have long abused browser features to follow people around the web. Since 2018, we have been dedicated to reducing the number of ways our users can ...
Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen
The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you. Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious—and then call the human police on them. Police robots may not be able to hurt people like armed predator drones used in combat—yet—but as history shows, calling the police on someone can prove equally deadly.
Long before the 1987 movie Robocop, even before Karel Čapek invented the word robot in 1920, police have been trying to find ways to be everywhere at once. Widespread security cameras are one solution—but even a blanket of CCTV cameras couldn’t follow a suspect into every nook of public space. Thus, the vision of a police robot continued as a dream, until now. Whether they look like Boston Dynamics’ robodogs or Knightscope’s rolling pickles, robots are coming to a street, shopping mall, or grocery store near you.
The Orwellian menace of snitch robots might not be immediately apparent. Robots are fun. They dance. You can take selfies with them. This is by design. Both police departments and the companies that sell these robots know that their greatest contributions aren’t just surveillance, but also goodwill. In one brochure Knightscope sent to University of California-Hastings, a law school in the center of San Francisco, the company advertises their robot’s activity in a Los Angeles shopping district called The Bloc. It’s unclear if the robot stopped any robberies, but it did garner over 100,000 social media impressions and 426 comments. Knightscope claims the robot’s 193 million overall media impressions was worth over $5.8 million. The Bloc held a naming contest for the robot, and said it has a “cool factor” missing from traditional beat cops and security guards.
https://www.eff.org/deeplinks/2021/01/police-robots-are-not-selfie-opportunity-theyre-privacy-disaster-waiting-happen
#police #robots #privacy #disaster #eff #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you. Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious—and then call the human police on them. Police robots may not be able to hurt people like armed predator drones used in combat—yet—but as history shows, calling the police on someone can prove equally deadly.
Long before the 1987 movie Robocop, even before Karel Čapek invented the word robot in 1920, police have been trying to find ways to be everywhere at once. Widespread security cameras are one solution—but even a blanket of CCTV cameras couldn’t follow a suspect into every nook of public space. Thus, the vision of a police robot continued as a dream, until now. Whether they look like Boston Dynamics’ robodogs or Knightscope’s rolling pickles, robots are coming to a street, shopping mall, or grocery store near you.
The Orwellian menace of snitch robots might not be immediately apparent. Robots are fun. They dance. You can take selfies with them. This is by design. Both police departments and the companies that sell these robots know that their greatest contributions aren’t just surveillance, but also goodwill. In one brochure Knightscope sent to University of California-Hastings, a law school in the center of San Francisco, the company advertises their robot’s activity in a Los Angeles shopping district called The Bloc. It’s unclear if the robot stopped any robberies, but it did garner over 100,000 social media impressions and 426 comments. Knightscope claims the robot’s 193 million overall media impressions was worth over $5.8 million. The Bloc held a naming contest for the robot, and said it has a “cool factor” missing from traditional beat cops and security guards.
https://www.eff.org/deeplinks/2021/01/police-robots-are-not-selfie-opportunity-theyre-privacy-disaster-waiting-happen
#police #robots #privacy #disaster #eff #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Electronic Frontier Foundation
Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen
The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you.
Four security vendors disclose SolarWinds-related incidents
Mimecast, Palo Alto Networks, Qualys, and Fidelis confirmed this week they were also targeted during the SolarWinds supply chain attack.
As most experts predicted last month, the fallout from the #SolarWinds supply chain attack is getting bigger as time passes by, and companies had the time to audit internal networks and #DNS logs.
This week, four new cyber-security vendors — #Mimecast, #PaloAltoNetworks, #Qualys, and #Fidelis — have added their names to the list of companies that have installed trojanized versions of the SolarWinds Orion app.
https://www.zdnet.com/article/four-security-vendors-disclose-solarwinds-related-incidents/
#security #vendors #disclose #incidents
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Mimecast, Palo Alto Networks, Qualys, and Fidelis confirmed this week they were also targeted during the SolarWinds supply chain attack.
As most experts predicted last month, the fallout from the #SolarWinds supply chain attack is getting bigger as time passes by, and companies had the time to audit internal networks and #DNS logs.
This week, four new cyber-security vendors — #Mimecast, #PaloAltoNetworks, #Qualys, and #Fidelis — have added their names to the list of companies that have installed trojanized versions of the SolarWinds Orion app.
https://www.zdnet.com/article/four-security-vendors-disclose-solarwinds-related-incidents/
#security #vendors #disclose #incidents
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
ZDNET
Four security vendors disclose SolarWinds-related incidents
Mimecast, Palo Alto Networks, Qualys, and Fidelis confirmed this week they were also targeted during the SolarWinds supply chain attack.
Error 404: The Internet Broke
A strange outage is impacting internet users in the Northeast U.S. It’s not entirely clear what is going on, but it sure is annoying.
Around noon on Tuesday, outage reports began pouring in, according to DownDetector, which tracks online service outages. But it’s not limited to one company; users reported issues with #Comcast, #Google, #Zoom, #YouTube, #Slack, #Amazon Web Services, and many others. (AWS’s own status page indicates that its services are operating normally, for what it’s worth.)
While the cause (or causes) remains unconfirmed, a cut Verizon fiber optic cable in Brooklyn, New York, may be the culprit. Verizon’s customer support confirmed on Twitter that one of its cables had been severed, and customers said they received notice of the outage via email.
Not all services, nor all users, appeared to be affected equally. Even among the New York-based Gizmodo staff, the problem seems just... weird. One editor could access Slack fine, but Google services were down. Others experienced slower response times while still being able to access all services they attempted to use.
At the time of writing, several services, including Google and Zoom, appear to be coming back online. Others remain inaccessible for some users.
https://gizmodo.com/error-404-the-internet-broke-1846134526
https://www.washingtonpost.com/technology/2021/01/26/internet-outage-east-coast/
#outage #internet #usa
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A strange outage is impacting internet users in the Northeast U.S. It’s not entirely clear what is going on, but it sure is annoying.
Around noon on Tuesday, outage reports began pouring in, according to DownDetector, which tracks online service outages. But it’s not limited to one company; users reported issues with #Comcast, #Google, #Zoom, #YouTube, #Slack, #Amazon Web Services, and many others. (AWS’s own status page indicates that its services are operating normally, for what it’s worth.)
While the cause (or causes) remains unconfirmed, a cut Verizon fiber optic cable in Brooklyn, New York, may be the culprit. Verizon’s customer support confirmed on Twitter that one of its cables had been severed, and customers said they received notice of the outage via email.
Not all services, nor all users, appeared to be affected equally. Even among the New York-based Gizmodo staff, the problem seems just... weird. One editor could access Slack fine, but Google services were down. Others experienced slower response times while still being able to access all services they attempted to use.
At the time of writing, several services, including Google and Zoom, appear to be coming back online. Others remain inaccessible for some users.
https://gizmodo.com/error-404-the-internet-broke-1846134526
https://www.washingtonpost.com/technology/2021/01/26/internet-outage-east-coast/
#outage #internet #usa
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Gizmodo
Error 404: The Internet Broke
Around noon on Tuesday, outage reports began pouring in, according to DownDetector, which tracks online service outages. But it’s not limited to one company; users reported outages for Comcast, Google, Zoom, YouTube, Slack, Amazon Web Services, and others.
The 4th Annual Fake News Awards.mp3
19.9 MB
The 4th Annual Fake News Awards!
From the palatial living room studios of The Corbett Report it’s the 4th Annual Fake News Awards. The boldest lies. The stupidest propaganda. The ugliest presstitution. Join James as he debunks the lies and shames the liars behind the biggest fake news stories of 2020. Who will take the Dino for the worst fake news story of the year?
https://www.corbettreport.com/fakenews4/
#corbettreport #fakenews #awards #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
From the palatial living room studios of The Corbett Report it’s the 4th Annual Fake News Awards. The boldest lies. The stupidest propaganda. The ugliest presstitution. Join James as he debunks the lies and shames the liars behind the biggest fake news stories of 2020. Who will take the Dino for the worst fake news story of the year?
https://www.corbettreport.com/fakenews4/
#corbettreport #fakenews #awards #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
Media is too big
VIEW IN TELEGRAM
Cyber Security In 7 Minutes | What Is Cyber Security: How It Works?
This short animated video on Cyber Security will explain what is Cyber Security, why Cyber Security, how Cyber Security works, who is a Cyber Security expert, what are different types of Cyberattacks with examples. You will get to know the types of hackers and the motives behind their attacks and understand how an organization works to secure their data from hackers.
https://www.youtube.com/watch?v=inWWhr5tnEA
#cybersecurity #cyberattacks #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
This short animated video on Cyber Security will explain what is Cyber Security, why Cyber Security, how Cyber Security works, who is a Cyber Security expert, what are different types of Cyberattacks with examples. You will get to know the types of hackers and the motives behind their attacks and understand how an organization works to secure their data from hackers.
https://www.youtube.com/watch?v=inWWhr5tnEA
#cybersecurity #cyberattacks #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Horcrux Encrypted Messaging
"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?
https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging
#rc3 #ccc #horcrux #encrypted #messaging #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?
https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging
#rc3 #ccc #horcrux #encrypted #messaging #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Qualys Security Advisory
Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
👉🏼 Summary
👉🏼 Analysis
👉🏼 Exploitation
👉🏼 Acknowledgments
👉🏼 Timeline
https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
#qualys #security #advisory
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
👉🏼 Summary
👉🏼 Analysis
👉🏼 Exploitation
👉🏼 Acknowledgments
👉🏼 Timeline
https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
#qualys #security #advisory
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
GME: Or, why we shouldn't underestimate “4chan with a Bloomberg terminal”
Step 0: Citadel pays Robinhood for order flow. Citadel gets to see RH's orders a few milliseconds before they're filled. Citadel may choose to front-run some of those trades.
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening in the open.
https://nitter.net/toxic/status/1353890766800621569
#gme #4chan #bloomberg #wallstreet #citadel #robinhood #trades #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Step 0: Citadel pays Robinhood for order flow. Citadel gets to see RH's orders a few milliseconds before they're filled. Citadel may choose to front-run some of those trades.
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening in the open.
https://nitter.net/toxic/status/1353890766800621569
#gme #4chan #bloomberg #wallstreet #citadel #robinhood #trades #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Nitter
Toxic (@toxic)
Step 0: Citadel pays Robinhood for order flow. Citadel gets to see RH's orders a few milliseconds before they're filled. Citadel may choose to front-run some of those trades.
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening…
Step 1: RH's customers and WallStreetBets start manipulating $GME. This is happening…
Google employees around the world have formed a new international union alliance called Alpha Global
Google employees have banded together to form an international union alliance, weeks after the formation of the minority Alphabet Workers Union in the US.
This new international entity, called Alpha Global, has been formed with the UNI Global Union, a movement representing more than 20 million workers worldwide, and which is active in 10 countries, including the US, Germany, Sweden, and the UK.
It isn't clear how many temporary or contract workers with Google have joined Alpha Global, and it is likely to be a small fraction of the company's workforce at this stage. The Verge, which first reported the new union alliance, reports that the new entity won't have any legal bargaining power with Google.
Similarly in the US, the Alphabet Workers Union is a minority union meaning it cannot bargain with management and is not recognized by the US National Labor Relations board. It has more than 600 members, out of Google's estimated 130,000 contractors and temp workers.
Still, the emergence of Alpha Global indicates that white-collar workers at big tech firms are looking to cement an emerging wave of organization.
In a joint statement published on Monday, Alpha Global's officials said: "[Many] Alphabet workers have started on a path to unionization and collective bargaining. Workers are building democratic organizations to represent their interests, to struggle collectively, to create a structural counterbalance to corporate power, and to build a movement of tech workers across the industry."
https://www.businessinsider.com/google-union-technology-alphabet-workers-alpha-global-2021-1
#google #DeleteGoogle #alphabet #workers #union #global #AlphaGlobal #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Google employees have banded together to form an international union alliance, weeks after the formation of the minority Alphabet Workers Union in the US.
This new international entity, called Alpha Global, has been formed with the UNI Global Union, a movement representing more than 20 million workers worldwide, and which is active in 10 countries, including the US, Germany, Sweden, and the UK.
It isn't clear how many temporary or contract workers with Google have joined Alpha Global, and it is likely to be a small fraction of the company's workforce at this stage. The Verge, which first reported the new union alliance, reports that the new entity won't have any legal bargaining power with Google.
Similarly in the US, the Alphabet Workers Union is a minority union meaning it cannot bargain with management and is not recognized by the US National Labor Relations board. It has more than 600 members, out of Google's estimated 130,000 contractors and temp workers.
Still, the emergence of Alpha Global indicates that white-collar workers at big tech firms are looking to cement an emerging wave of organization.
In a joint statement published on Monday, Alpha Global's officials said: "[Many] Alphabet workers have started on a path to unionization and collective bargaining. Workers are building democratic organizations to represent their interests, to struggle collectively, to create a structural counterbalance to corporate power, and to build a movement of tech workers across the industry."
https://www.businessinsider.com/google-union-technology-alphabet-workers-alpha-global-2021-1
#google #DeleteGoogle #alphabet #workers #union #global #AlphaGlobal #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Business Insider
Google employees around the world have formed a new international union alliance called Alpha Global
Officials accused Google of "suppressing speech and cracking down on worker organizing while consolidating monopolistic power."
Cryptocurrency Trader Charged In Manhattan Federal Court With Fraudulent Scheme Involving Over $5 Million
AUDREY STRAUSS, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a Complaint in Manhattan federal court charging JEREMY SPENCE, a/k/a “Coin Signals,” a cryptocurrency trader who solicited funds for various cryptocurrency funds that he operated, with commodities fraud and wire fraud offenses. As alleged, SPENCE took cryptocurrency worth over $5 million from more than 170 individual investors after making false representations in connection with these cryptocurrency funds. SPENCE was arrested this morning in Rhode Island and will be presented later today before Magistrate Judge Patricia A. Sullivan in the U.S. District Court for the District of Rhode Island.
Manhattan U.S. Attorney Audrey Strauss said: “Jeremy Spence, a/k/a, ‘Coin Signals,’ allegedly lured investors to his cryptocurrency investment scam by touting returns of up to 148%. Spence’s investments not only failed to reach his audacious claims, they consistently lost money, leaving a $5 million void in his clients’ crypto accounts. Spence’s alleged conduct should strongly signal would-be investors to thoroughly educate themselves in the cryptocurrency ecosystem before falling prey to investment scams promising huge returns for small investments that are indeed too good to be true.”
FBI Assistant Director-in-Charge Sweeney said: “As alleged, Jeremy Spence misrepresented the success of his investment platform in order to entice people to send money his way. Because his trading was less than profitable and significantly less successful than he represented to investors, he used money from new investors to pay off others in order to keep his plan moving—a typical marker of a Ponzi scheme. Whether investing with cash, shares, or virtual currency, our advice to investors always remains the same—exercise due diligence, and when something just doesn’t seem right, report suspicious activity to the authorities.”
https://telegra.ph/Cryptocurrency-Trader-Charged-In-Manhattan-Federal-Court-With-Fraudulent-Scheme-Involving-Over-5-Million-01-27
via www.justice.gov
#cryptocurrency #trader #manhattan #usa #fbi #fraud #coin #signals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
AUDREY STRAUSS, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a Complaint in Manhattan federal court charging JEREMY SPENCE, a/k/a “Coin Signals,” a cryptocurrency trader who solicited funds for various cryptocurrency funds that he operated, with commodities fraud and wire fraud offenses. As alleged, SPENCE took cryptocurrency worth over $5 million from more than 170 individual investors after making false representations in connection with these cryptocurrency funds. SPENCE was arrested this morning in Rhode Island and will be presented later today before Magistrate Judge Patricia A. Sullivan in the U.S. District Court for the District of Rhode Island.
Manhattan U.S. Attorney Audrey Strauss said: “Jeremy Spence, a/k/a, ‘Coin Signals,’ allegedly lured investors to his cryptocurrency investment scam by touting returns of up to 148%. Spence’s investments not only failed to reach his audacious claims, they consistently lost money, leaving a $5 million void in his clients’ crypto accounts. Spence’s alleged conduct should strongly signal would-be investors to thoroughly educate themselves in the cryptocurrency ecosystem before falling prey to investment scams promising huge returns for small investments that are indeed too good to be true.”
FBI Assistant Director-in-Charge Sweeney said: “As alleged, Jeremy Spence misrepresented the success of his investment platform in order to entice people to send money his way. Because his trading was less than profitable and significantly less successful than he represented to investors, he used money from new investors to pay off others in order to keep his plan moving—a typical marker of a Ponzi scheme. Whether investing with cash, shares, or virtual currency, our advice to investors always remains the same—exercise due diligence, and when something just doesn’t seem right, report suspicious activity to the authorities.”
https://telegra.ph/Cryptocurrency-Trader-Charged-In-Manhattan-Federal-Court-With-Fraudulent-Scheme-Involving-Over-5-Million-01-27
via www.justice.gov
#cryptocurrency #trader #manhattan #usa #fbi #fraud #coin #signals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Telegraph
Cryptocurrency Trader Charged In Manhattan Federal Court With Fraudulent Scheme Involving Over $5 Million
AUDREY STRAUSS, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a…
What’s The Deal With Chromium On Linux? Google At Odds With Package Maintainers
Linux users are more likely than most to be familiar with Chromium, Google’s the free and open source web project that serves as the basis for their wildly popular Chrome. Since the project’s inception over a decade ago, users have been able to compile the BSD licensed code into a browser that’s almost the same as the closed-source Chrome. As such, most distributions offer their own package for the browser and some even include it in the base install. Unfortunately, that may be changing soon.
A post made earlier this month to the official Chromium Blog explained that an audit had determined “third-party Chromium based browsers” were using APIs that were intended only for Google’s internal use. In response, any browser attempting to access features such as Chrome Sync with an unofficial API key would be prevented from doing so after March 15th.
To the average Chromium user, this doesn’t sound like much of a problem. In fact, you might even assume it doesn’t apply to you. The language used in the post makes it sound like Google is referring to browsers which are spun off of the Chromium codebase, and at least in part, they are. But the search giant is also using this opportunity to codify their belief that the only official Chromium builds are the ones that they provide themselves. With that simple change, anyone using a distribution-specific build of Chromium just became persona non grata.
Unhappy with the idea of giving users a semi-functional browser, the Chromium maintainers for several distributions such as Arch Linux and Fedora have said they’re considering pulling the package from their respective repositories altogether. With a Google representative confirming the change is coming regardless of community feedback, it seems likely more distributions will follow suit.
https://hackaday.com/2021/01/26/whats-the-deal-with-chromium-on-linux-google-at-odds-with-package-maintainers/
#chromium #google #linux #chrome #browser #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Linux users are more likely than most to be familiar with Chromium, Google’s the free and open source web project that serves as the basis for their wildly popular Chrome. Since the project’s inception over a decade ago, users have been able to compile the BSD licensed code into a browser that’s almost the same as the closed-source Chrome. As such, most distributions offer their own package for the browser and some even include it in the base install. Unfortunately, that may be changing soon.
A post made earlier this month to the official Chromium Blog explained that an audit had determined “third-party Chromium based browsers” were using APIs that were intended only for Google’s internal use. In response, any browser attempting to access features such as Chrome Sync with an unofficial API key would be prevented from doing so after March 15th.
To the average Chromium user, this doesn’t sound like much of a problem. In fact, you might even assume it doesn’t apply to you. The language used in the post makes it sound like Google is referring to browsers which are spun off of the Chromium codebase, and at least in part, they are. But the search giant is also using this opportunity to codify their belief that the only official Chromium builds are the ones that they provide themselves. With that simple change, anyone using a distribution-specific build of Chromium just became persona non grata.
Unhappy with the idea of giving users a semi-functional browser, the Chromium maintainers for several distributions such as Arch Linux and Fedora have said they’re considering pulling the package from their respective repositories altogether. With a Google representative confirming the change is coming regardless of community feedback, it seems likely more distributions will follow suit.
https://hackaday.com/2021/01/26/whats-the-deal-with-chromium-on-linux-google-at-odds-with-package-maintainers/
#chromium #google #linux #chrome #browser #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Hackaday
What’s The Deal With Chromium On Linux? Google At Odds With Package Maintainers
Linux users are more likely than most to be familiar with Chromium, Google’s the free and open source web project that serves as the basis for their wildly popular Chrome. Since the project&#…