Forwarded from BlackBox (Security) Archiv
Silk-Road - Casefile True Crime (part 1 - 3)
Pennsylvania State University student Ross Ulbricht had been fascinated with mathematics and science from a young age. During his college years, he developed a new fascination with libertarianism, a political philosophy that values individual freedom above all else. For Ross, this became more of an interest – it became a way of life.
Combining his libertarianism beliefs with his interest in computers, Ross came up with the idea to create a free trade, an untraceable online market that operated outside of government regulations. His vision soon became a reality, and The Silk Road was born.
👉🏼 🎧 Silk Road Part 1
https://t.me/BlackBox_Archiv/212
👉🏼 🎧 Silk Road Part 2
https://t.me/BlackBox_Archiv/213
👉🏼 🎧 Silk Road Part 3
https://t.me/BlackBox_Archiv/214
Nob and the Dread Pirate Roberts started to communicate regularly. The Dread Pirate Roberts had no idea he was really speaking to a DEA agent. And the DEA agent had no idea about the true identity of the Dread Pirate Roberts.
#SilkRoad #darknet #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
Pennsylvania State University student Ross Ulbricht had been fascinated with mathematics and science from a young age. During his college years, he developed a new fascination with libertarianism, a political philosophy that values individual freedom above all else. For Ross, this became more of an interest – it became a way of life.
Combining his libertarianism beliefs with his interest in computers, Ross came up with the idea to create a free trade, an untraceable online market that operated outside of government regulations. His vision soon became a reality, and The Silk Road was born.
👉🏼 🎧 Silk Road Part 1
https://t.me/BlackBox_Archiv/212
👉🏼 🎧 Silk Road Part 2
https://t.me/BlackBox_Archiv/213
👉🏼 🎧 Silk Road Part 3
https://t.me/BlackBox_Archiv/214
Nob and the Dread Pirate Roberts started to communicate regularly. The Dread Pirate Roberts had no idea he was really speaking to a DEA agent. And the DEA agent had no idea about the true identity of the Dread Pirate Roberts.
#SilkRoad #darknet #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
Telegram
BlackBox (Security) Archiv
🎧 🇬🇧 Silk Road [Part 1 of 3]
The Silk Road was an ancient network of trade routes that started in China in the 2nd century B.C. Via a combination of roads, and sea routes, goods like silk, paper and spices were transported from the producers in Asia to markets…
The Silk Road was an ancient network of trade routes that started in China in the 2nd century B.C. Via a combination of roads, and sea routes, goods like silk, paper and spices were transported from the producers in Asia to markets…
Lawmakers introduce legislation to create civilian reserve program to fight hackers
A group of bipartisan lawmakers in the House and Senate on Wednesday rolled out legislation that would create a National Guard-style program to help defend critical systems against increasing from nation states and criminals.
The Civilian Cyber Security Reserve Act would establish a civilian reserve program to provide cybersecurity training for individuals who have previously worked for either the U.S. federal government or armed services. They would then be available as resources for the Departments of Defense and Homeland Security to boost federal cybersecurity protections.
The bill has bipartisan support, and is sponsored by Sens. Jacky Rosen (D-Nev.) and Marsha Blackburn (R-Tenn.) in the Senate, alongside Reps. Jimmy Panetta (D-Calif.) and Ken Calvert (R-Calif.) in the House.
It was introduced as both the Biden administration and Congress have been forced to concentrate on enhancing the cybersecurity of critical systems in the wake of multiple major hacking incidents.
The SolarWinds hack, discovered in December, involved Russian hackers compromising nine federal agencies, while new vulnerabilities in Microsoft’s Exchange Server announced in March allowed Chinese hackers to potentially breach thousands of organizations.
Cyber criminals have also stepped up attacks on vulnerable groups during the pandemic, with state and local governments, hospitals and schools increasingly hit by debilitating ransomware attacks over the past year.
Rosen pointed to the escalating cyberattacks Wednesday, saying they “demonstrate the risks of not addressing our severe cyber workforce shortage.”
https://thehill.com/policy/cybersecurity/550802-lawmakers-introduce-legislation-to-create-civilian-reserve-program-to
#cyberattacks #cybersecurity #usa #civilian #reserve #program #SolarWinds
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
A group of bipartisan lawmakers in the House and Senate on Wednesday rolled out legislation that would create a National Guard-style program to help defend critical systems against increasing from nation states and criminals.
The Civilian Cyber Security Reserve Act would establish a civilian reserve program to provide cybersecurity training for individuals who have previously worked for either the U.S. federal government or armed services. They would then be available as resources for the Departments of Defense and Homeland Security to boost federal cybersecurity protections.
The bill has bipartisan support, and is sponsored by Sens. Jacky Rosen (D-Nev.) and Marsha Blackburn (R-Tenn.) in the Senate, alongside Reps. Jimmy Panetta (D-Calif.) and Ken Calvert (R-Calif.) in the House.
It was introduced as both the Biden administration and Congress have been forced to concentrate on enhancing the cybersecurity of critical systems in the wake of multiple major hacking incidents.
The SolarWinds hack, discovered in December, involved Russian hackers compromising nine federal agencies, while new vulnerabilities in Microsoft’s Exchange Server announced in March allowed Chinese hackers to potentially breach thousands of organizations.
Cyber criminals have also stepped up attacks on vulnerable groups during the pandemic, with state and local governments, hospitals and schools increasingly hit by debilitating ransomware attacks over the past year.
Rosen pointed to the escalating cyberattacks Wednesday, saying they “demonstrate the risks of not addressing our severe cyber workforce shortage.”
https://thehill.com/policy/cybersecurity/550802-lawmakers-introduce-legislation-to-create-civilian-reserve-program-to
#cyberattacks #cybersecurity #usa #civilian #reserve #program #SolarWinds
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
TheHill
Lawmakers introduce legislation to create civilian reserve program to fight hackers
A group of bipartisan lawmakers in the House and Senate on Wednesday rolled out legislation that would create a National Guard-style program to help defend critical systems against increasing
0Click security vulnerabilities discovered affecting Tesla Model S/3/X/Y
Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click security vulnerabilities in an open-source software component (ConnMan) used in Tesla automobiles that allowed them to compromise parked cars and control their infotainment systems over WiFi. It would be possible for an attacker to unlock the doors and trunk, change seat positions, both steering and acceleration modes - in short, pretty much what a driver pressing various buttons on the console can do. This attack does not yield drive control of the car though. Named “TBONE”, these exploits were originally written for the PWN2OWN 2020 contest, which was cancelled due to COVID-19. They later disclosed these vulnerabilities to Tesla, who patched them in update 2020.44 in late October 2020.
The affected components were also widely used in infotainment systems of other car manufacturers as well. Eventually the German CERT was engaged and the wider automotive industry was informed of the vulnerability in January 2021. Patches have been checked into the Git repository and a new version of ConnMan (v1.39) has been released since February 2021. The researchers therefore decided to demonstrate these vulnerabilities to the cybersecurity community at large.
https://kunnamon.io/tbone/
#tesla #security #vulnerabilities #TBONE
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click security vulnerabilities in an open-source software component (ConnMan) used in Tesla automobiles that allowed them to compromise parked cars and control their infotainment systems over WiFi. It would be possible for an attacker to unlock the doors and trunk, change seat positions, both steering and acceleration modes - in short, pretty much what a driver pressing various buttons on the console can do. This attack does not yield drive control of the car though. Named “TBONE”, these exploits were originally written for the PWN2OWN 2020 contest, which was cancelled due to COVID-19. They later disclosed these vulnerabilities to Tesla, who patched them in update 2020.44 in late October 2020.
The affected components were also widely used in infotainment systems of other car manufacturers as well. Eventually the German CERT was engaged and the wider automotive industry was informed of the vulnerability in January 2021. Patches have been checked into the Git repository and a new version of ConnMan (v1.39) has been released since February 2021. The researchers therefore decided to demonstrate these vulnerabilities to the cybersecurity community at large.
https://kunnamon.io/tbone/
#tesla #security #vulnerabilities #TBONE
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Kunnamon
TBONE - Kunnamon
Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click security vulnerabilities in an open-source software component (ConnMan) used in Tesla automobiles that allowed them to compromise…
Exclusive: Government, industry push bitcoin regulation to fight ransomware scourge
SAN FRANCISCO (Reuters) - Government and industry officials confronting an epidemic of ransomware, where hackers freeze the computers of a target and demand a payoff, are zeroing in on cryptocurrency regulation as the key to combating the scourge, sources familiar with the work of a public-private task force said.
In a report on Thursday, the panel of experts is expected to call for far more aggressive tracking of bitcoin and other cryptocurrencies. While those have won greater acceptance among investors over the past year, they remain the lifeblood of ransomware operators and other criminals who face little risk of prosecution in much of the world.
Ransomware gangs collected almost $350 million last year, up threefold from 2019, two members of the task force wrote this week. Companies, government agencies, hospitals and school systems are among the victims of ransomware groups, some of which U.S. officials say have friendly relations with nation-states including North Korea and Russia.
“There’s a lot more that can be done to constrain the abuse of these pretty amazing technologies,” said Philip Reiner, chief executive of the Institute for Security and Technology, who led the Ransomware Task Force. He declined to comment on the report before its release.
Just a week ago, the U.S. Department of Justice established a government group on ransomware. Central bank regulators and financial crime investigators worldwide are also debating if and how cryptocurrencies should be regulated.
The new rules proposed by the public-private panel, some of which would need Congressional action, are mostly aimed at piercing the anonymity of cryptocurrency transactions, the sources said. If implemented, they could temper enthusiasm among those who see the cryptocurrencies as a refuge from national monetary policies and government oversight of individuals’ financial activities, having surged past $1 trillion in total capitalization.
https://www.reuters.com/article/us-bitcoin-regulation-ransomware-exclusi-idUSKBN2CF2UM
#usa #bitcoin #regulation #hacker #ransomware #epidemic
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
SAN FRANCISCO (Reuters) - Government and industry officials confronting an epidemic of ransomware, where hackers freeze the computers of a target and demand a payoff, are zeroing in on cryptocurrency regulation as the key to combating the scourge, sources familiar with the work of a public-private task force said.
In a report on Thursday, the panel of experts is expected to call for far more aggressive tracking of bitcoin and other cryptocurrencies. While those have won greater acceptance among investors over the past year, they remain the lifeblood of ransomware operators and other criminals who face little risk of prosecution in much of the world.
Ransomware gangs collected almost $350 million last year, up threefold from 2019, two members of the task force wrote this week. Companies, government agencies, hospitals and school systems are among the victims of ransomware groups, some of which U.S. officials say have friendly relations with nation-states including North Korea and Russia.
“There’s a lot more that can be done to constrain the abuse of these pretty amazing technologies,” said Philip Reiner, chief executive of the Institute for Security and Technology, who led the Ransomware Task Force. He declined to comment on the report before its release.
Just a week ago, the U.S. Department of Justice established a government group on ransomware. Central bank regulators and financial crime investigators worldwide are also debating if and how cryptocurrencies should be regulated.
The new rules proposed by the public-private panel, some of which would need Congressional action, are mostly aimed at piercing the anonymity of cryptocurrency transactions, the sources said. If implemented, they could temper enthusiasm among those who see the cryptocurrencies as a refuge from national monetary policies and government oversight of individuals’ financial activities, having surged past $1 trillion in total capitalization.
https://www.reuters.com/article/us-bitcoin-regulation-ransomware-exclusi-idUSKBN2CF2UM
#usa #bitcoin #regulation #hacker #ransomware #epidemic
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Reuters
EXCLUSIVE Government, industry push bitcoin regulation to fight ransomware scourge
Government and industry officials confronting an epidemic of ransomware, where hackers freeze the computers of a target and demand a payoff, are zeroing in on cryptocurrency regulation as the key to combating the scourge, sources familiar with the work of…
Experiencing the /e/ OS: The Open Source De-Googled Android Version (updated April 29, 2021)
/e/ Android operating system is a privacy oriented, Google-free mobile operating system, fork of Lineage OS and was founded in mid-2018 by Gaël Duval, creator of Mandrake Linux (now Mandriva Linux).
Despite making Android an open source project in 2007, Google replaced some OS elements with proprietary software when Android gained popularity. /e/ Foundation has replaced the proprietary apps and services with MicroG, an open source alternative framework which minimizes tracking and device activity.
https://itsfoss.com/e-os-review/
#foss #eOS #opensource #degoogled #android #microg
📡 @nogoolag 📡 @blackbox_archiv
/e/ Android operating system is a privacy oriented, Google-free mobile operating system, fork of Lineage OS and was founded in mid-2018 by Gaël Duval, creator of Mandrake Linux (now Mandriva Linux).
Despite making Android an open source project in 2007, Google replaced some OS elements with proprietary software when Android gained popularity. /e/ Foundation has replaced the proprietary apps and services with MicroG, an open source alternative framework which minimizes tracking and device activity.
https://itsfoss.com/e-os-review/
#foss #eOS #opensource #degoogled #android #microg
📡 @nogoolag 📡 @blackbox_archiv
It's FOSS
Experiencing the /e/ OS: The Open Source De-Googled Android Version
/e/ Android operating system is a privacy oriented, Google-free mobile operating system, fork of Lineage OS and was founded in mid-2018 by Gaël Duval, creator of Mandrake Linux (now Mandriva Linux).
Despite making Android an open source project in 2007…
Despite making Android an open source project in 2007…
IST-Ransomware-Task-Force_Final_Report.pdf
2 MB
RTF Report: Combatting Ransomware
A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force
Ransomware is no longer just a financial crime; it is an urgent national security risk that threatens schools, hospitals, businesses, and governments across the globe.
https://securityandtechnology.org/ransomwaretaskforce/report/
https://securityandtechnology.org/wp-content/uploads/2021/04/IST-Ransomware-Task-Force_Final_Report.pdf
#ransomware #rtf #report #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force
Ransomware is no longer just a financial crime; it is an urgent national security risk that threatens schools, hospitals, businesses, and governments across the globe.
https://securityandtechnology.org/ransomwaretaskforce/report/
https://securityandtechnology.org/wp-content/uploads/2021/04/IST-Ransomware-Task-Force_Final_Report.pdf
#ransomware #rtf #report #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Jamulus - Play music online. With friends. For free.
What is Jamulus?
Jamulus is software for playing music, rehearsing, or just jamming with anyone online with low latency. You can use your Windows, macOS or Linux machine to connect to Jamulus servers worldwide. Jamulus is free and you can just use your normal broadband connection. Simply connect to a public server or host your own private one. Jamulus has been in development since 2006 and is designed for high quality, low-latency sound, making it easy to play together remotely and in time.
https://jamulus.io/
https://github.com/jamulussoftware/jamulus
💡 For detailed information about how Jamulus hacks the space-time continuum to produce a near-perfect 5th dimension of collaborative sound, see this paper by Volker Fischer (PDF).
#jamulus #software #music #online #jamming #opensource
📡 @nogoolag 📡 @blackbox_archiv
What is Jamulus?
Jamulus is software for playing music, rehearsing, or just jamming with anyone online with low latency. You can use your Windows, macOS or Linux machine to connect to Jamulus servers worldwide. Jamulus is free and you can just use your normal broadband connection. Simply connect to a public server or host your own private one. Jamulus has been in development since 2006 and is designed for high quality, low-latency sound, making it easy to play together remotely and in time.
https://jamulus.io/
https://github.com/jamulussoftware/jamulus
💡 For detailed information about how Jamulus hacks the space-time continuum to produce a near-perfect 5th dimension of collaborative sound, see this paper by Volker Fischer (PDF).
#jamulus #software #music #online #jamming #opensource
📡 @nogoolag 📡 @blackbox_archiv
jamulus.io
Jamulus ‒ Play music online. With friends. For free.
Jamulus is free and open source software that lets musicians perform music, rehearse or jam together, in real time over the Internet.
The Rise of Big Data Psychiatry
The information captured by our smartphones, as well as new speech- and facial-recognition technologies, can yield invaluable insights for mental health professionals.
As a physician, I need to figure out three things when a new patient walks into my office: what their life is typically like, what has changed that made them seek treatment and what I can do to help them. It’s a complex problem, and most fields of medicine approach it by taking measurements. If I were a cardiologist evaluating a patient’s chest pain, for instance, I would speak with the patient, but then I would listen to their heart and measure their pulse and blood pressure. I might order an electrocardiogram or a cardiac stress test, tools that weren’t available a century ago.
Because I’m a psychiatrist, however, I evaluate patients in precisely the same way that my predecessors did in 1920: I ask them to tell me what’s wrong, and while they’re talking I carefully observe their speech and behavior. But psychiatry has remained largely immune to measurement. At no point in the examination do I gather numerical data about the patient’s life or behavior, even though tools for taking such measurements already exist. In fact, you likely are carrying one around in your pocket right now.
In the last decade, an entire industry has been built to predict a person’s behavior based on their smartphone use and online activity. Because our search and social media history is digitized and time stamped, it represents a permanent breadcrumb trail of our thoughts and emotions. Tech companies and governments already use these data to monitor and commodify our likes and dislikes; soon psychiatrists might be able to use them to measure and evaluate our mental state.
Our smartphones measure our movements with accelerometers, our location with GPS and our social engagement with the number of calls and texts we send. These data have extraordinary potential for psychiatric diagnosis and treatment. Studies have shown that the words we use to express ourselves on Facebook and Twitter can predict the emergence of conditions like postpartum depression and psychosis. A person’s recent Google search history, it turns out, is a better predictor of suicide than their clinician’s most recent notes.
https://telegra.ph/The-Rise-of-Big-Data-Psychiatry-04-29
via www.wsj.com
#smartphones #BigData #psychiatry #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
The information captured by our smartphones, as well as new speech- and facial-recognition technologies, can yield invaluable insights for mental health professionals.
As a physician, I need to figure out three things when a new patient walks into my office: what their life is typically like, what has changed that made them seek treatment and what I can do to help them. It’s a complex problem, and most fields of medicine approach it by taking measurements. If I were a cardiologist evaluating a patient’s chest pain, for instance, I would speak with the patient, but then I would listen to their heart and measure their pulse and blood pressure. I might order an electrocardiogram or a cardiac stress test, tools that weren’t available a century ago.
Because I’m a psychiatrist, however, I evaluate patients in precisely the same way that my predecessors did in 1920: I ask them to tell me what’s wrong, and while they’re talking I carefully observe their speech and behavior. But psychiatry has remained largely immune to measurement. At no point in the examination do I gather numerical data about the patient’s life or behavior, even though tools for taking such measurements already exist. In fact, you likely are carrying one around in your pocket right now.
In the last decade, an entire industry has been built to predict a person’s behavior based on their smartphone use and online activity. Because our search and social media history is digitized and time stamped, it represents a permanent breadcrumb trail of our thoughts and emotions. Tech companies and governments already use these data to monitor and commodify our likes and dislikes; soon psychiatrists might be able to use them to measure and evaluate our mental state.
Our smartphones measure our movements with accelerometers, our location with GPS and our social engagement with the number of calls and texts we send. These data have extraordinary potential for psychiatric diagnosis and treatment. Studies have shown that the words we use to express ourselves on Facebook and Twitter can predict the emergence of conditions like postpartum depression and psychosis. A person’s recent Google search history, it turns out, is a better predictor of suicide than their clinician’s most recent notes.
https://telegra.ph/The-Rise-of-Big-Data-Psychiatry-04-29
via www.wsj.com
#smartphones #BigData #psychiatry #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Telegraph
The Rise of Big Data Psychiatry
As a physician, I need to figure out three things when a new patient walks into my office: what their life is typically like, what has changed that made them seek treatment and what I can do to help them. It’s a complex problem, and most fields of medicine…
The IRS Wants Help Hacking Cryptocurrency Hardware Wallets
As more investors and criminals move to hardware wallets to secure their funds, the IRS is looking for new methods to access those wallets in criminal investigations.
The IRS is looking for help to break into cryptocurrency hardware wallets, according to a document posted on the agency website in March of this year.
Many cryptocurrency investors store their cryptographic keys, which confer ownership of their funds, with the exchange they use to transact or on a personal device. Some folks, however, want a little more security and use hardware wallets—small physical drives which store a user's keys securely, unconnected to the internet. The law enforcement arm of the tax agency, IRS Criminal Investigation, and more specifically its Digital Forensic Unit, is now asking contractors to come up with solutions to hack into cryptowallets that could be of interest in investigations, the document states.
"The decentralization and anonymity provided by cryptocurrencies has fostered an environment for the storage and exchange of something of value, outside of the traditional purview of law enforcement and regulatory organizations," the document reads. "There is a portion of this cryptographic puzzle that continues to elude organizations—millions, perhaps even billions of dollars, exist within cryptowallets."
The security of hardware wallets presents a problem for investigators. The document states that agencies may be in possession of a hardware wallet as part of a case, but may not be able to access it if the suspect does not comply. This means that authorities cannot effectively "investigate the movement of currencies" and it may "prevent the forfeiture and recovery" of the funds.
http://telegra.ph/The-IRS-Wants-Help-Hacking-Cryptocurrency-Hardware-Wallets-04-29
via www.vice.com
#irs #hacking #cryptowallets #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
As more investors and criminals move to hardware wallets to secure their funds, the IRS is looking for new methods to access those wallets in criminal investigations.
The IRS is looking for help to break into cryptocurrency hardware wallets, according to a document posted on the agency website in March of this year.
Many cryptocurrency investors store their cryptographic keys, which confer ownership of their funds, with the exchange they use to transact or on a personal device. Some folks, however, want a little more security and use hardware wallets—small physical drives which store a user's keys securely, unconnected to the internet. The law enforcement arm of the tax agency, IRS Criminal Investigation, and more specifically its Digital Forensic Unit, is now asking contractors to come up with solutions to hack into cryptowallets that could be of interest in investigations, the document states.
"The decentralization and anonymity provided by cryptocurrencies has fostered an environment for the storage and exchange of something of value, outside of the traditional purview of law enforcement and regulatory organizations," the document reads. "There is a portion of this cryptographic puzzle that continues to elude organizations—millions, perhaps even billions of dollars, exist within cryptowallets."
The security of hardware wallets presents a problem for investigators. The document states that agencies may be in possession of a hardware wallet as part of a case, but may not be able to access it if the suspect does not comply. This means that authorities cannot effectively "investigate the movement of currencies" and it may "prevent the forfeiture and recovery" of the funds.
http://telegra.ph/The-IRS-Wants-Help-Hacking-Cryptocurrency-Hardware-Wallets-04-29
via www.vice.com
#irs #hacking #cryptowallets #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Telegraph
The IRS Wants Help Hacking Cryptocurrency Hardware Wallets
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet. See More → The IRS is looking for help to break into cryptocurrency hardware wallets, according to a document posted on the agency…
U.S. government probes VPN hack within federal agencies, races to find clues
For at least the third time since the beginning of this year, the U.S. government is investigating a hack against federal agencies that began during the Trump administration but was only recently discovered, according to senior U.S. officials and private sector cyber defenders.
It is the latest so-called supply chain cyberattack, highlighting how sophisticated, often government-backed groups are targeting vulnerable software built by third parties as a stepping-stone to sensitive government and corporate computer networks.
The new government breaches involve a popular virtual private network (VPN) known as Pulse Connect Secure, which hackers were able to break into as customers used it. read more
More than a dozen federal agencies run Pulse Secure on their networks, according to public contract records. An emergency cybersecurity directive last week demanded that agencies scan their systems for related compromises and report back.
The results, collected on Friday and analyzed this week, show evidence of potential breaches in at least five federal civilian agencies, said Matt Hartman, a senior official with the U.S. Cybersecurity Infrastructure Security Agency.
https://www.reuters.com/technology/us-government-probes-vpn-hack-within-federal-agencies-races-find-clues-2021-04-29/
#usa #government #vpn #hack #federal #agencies
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
For at least the third time since the beginning of this year, the U.S. government is investigating a hack against federal agencies that began during the Trump administration but was only recently discovered, according to senior U.S. officials and private sector cyber defenders.
It is the latest so-called supply chain cyberattack, highlighting how sophisticated, often government-backed groups are targeting vulnerable software built by third parties as a stepping-stone to sensitive government and corporate computer networks.
The new government breaches involve a popular virtual private network (VPN) known as Pulse Connect Secure, which hackers were able to break into as customers used it. read more
More than a dozen federal agencies run Pulse Secure on their networks, according to public contract records. An emergency cybersecurity directive last week demanded that agencies scan their systems for related compromises and report back.
The results, collected on Friday and analyzed this week, show evidence of potential breaches in at least five federal civilian agencies, said Matt Hartman, a senior official with the U.S. Cybersecurity Infrastructure Security Agency.
https://www.reuters.com/technology/us-government-probes-vpn-hack-within-federal-agencies-races-find-clues-2021-04-29/
#usa #government #vpn #hack #federal #agencies
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Reuters
U.S. government probes VPN hack within federal agencies, races to find clues
For at least the third time since the beginning of this year, the U.S. government is investigating a hack against federal agencies that began during the Trump administration but was only recently discovered, according to senior U.S. officials and private…
Africa's Expansion of AI Surveillance - Regional Gaps and Key Trends
Many African states are deploying Artificial Intelligence (AI) surveillance technologies to monitor citizens for various purposes, but seldom in ways that are rights-respecting and particularly privacy-respecting. Today’s AI surveillance technologies are capable of analysing big data, monitoring and tracking by classifying people’s movements into astonishingly precise categories.
These AI-powered tools provide governments and companies with the capability to gather and freely access personal data, which may cause serious harms. As AI increasingly moves towards becoming a general-purpose technology, Africa needs to develop governance frameworks that enable the delivery of public services and public goods while preventing harms and mitigating risks. For instance, in the wake of the COVID-19 pandemic AI powered by data science and machine learning is being applied in many areas, including in drug discovery as well as in public health management and public policy to model and predict outbreaks and COVID spread and help with contact tracing.
As AI is increasingly being used to tackle national and global problems like the COVID-19 pandemic, governments are increasingly adopting measures that can lead to violations of human rights. This raises the challenge of preserving and upholding both individual and collective rights. Research ICT Africa is carrying out a mapping exercise, gathering empirical data on computer vision and surveillance across 14 countries in Africa. In so doing, our purpose is to facilitate evidence-based and informed policymaking in the context of emerging surveillance systems that are changing the ability of states and corporations to monitor citizens. The study has preliminarily identified a range of deployments, from facial recognition systems, safe city projects and cloud computing infrastructures, to smart policing initiatives that are meant to achieve various goals.
https://www.africaportal.org/publications/africas-expansion-ai-surveillance-regional-gaps-and-key-trends/
#africa #ai #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Many African states are deploying Artificial Intelligence (AI) surveillance technologies to monitor citizens for various purposes, but seldom in ways that are rights-respecting and particularly privacy-respecting. Today’s AI surveillance technologies are capable of analysing big data, monitoring and tracking by classifying people’s movements into astonishingly precise categories.
These AI-powered tools provide governments and companies with the capability to gather and freely access personal data, which may cause serious harms. As AI increasingly moves towards becoming a general-purpose technology, Africa needs to develop governance frameworks that enable the delivery of public services and public goods while preventing harms and mitigating risks. For instance, in the wake of the COVID-19 pandemic AI powered by data science and machine learning is being applied in many areas, including in drug discovery as well as in public health management and public policy to model and predict outbreaks and COVID spread and help with contact tracing.
As AI is increasingly being used to tackle national and global problems like the COVID-19 pandemic, governments are increasingly adopting measures that can lead to violations of human rights. This raises the challenge of preserving and upholding both individual and collective rights. Research ICT Africa is carrying out a mapping exercise, gathering empirical data on computer vision and surveillance across 14 countries in Africa. In so doing, our purpose is to facilitate evidence-based and informed policymaking in the context of emerging surveillance systems that are changing the ability of states and corporations to monitor citizens. The study has preliminarily identified a range of deployments, from facial recognition systems, safe city projects and cloud computing infrastructures, to smart policing initiatives that are meant to achieve various goals.
https://www.africaportal.org/publications/africas-expansion-ai-surveillance-regional-gaps-and-key-trends/
#africa #ai #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Africa Portal
Africa's Expansion of AI Surveillance - Regional Gaps and Key Trends
Many African states are deploying Artificial Intelligence (AI) surveillance technologies to monitor citizens for various purposes, but seldom in ways that are rights-respecting and particularly privacy-respecting. Today’s AI surveillance technologies are…
How much are you worth on the dark web? (Credit card, PayPal, SSN)
Comparitech researchers analyzed 40+ dark web marketplaces to find out how much your credit card, Paypal, and SSN are worth to cybercriminals.
After a data breach or successful phishing campaign, much of the stolen personal information is sold on black markets. Many such marketplaces reside on the dark web. But how does the sale of stolen information work, exactly, and how much money are criminals making from stolen data?
Comparitech researchers analyzed the prices of stolen credit cards, hacked PayPal accounts, and private Social Security numbers on more than 40 different dark web marketplaces. We looked at prices based on account balance, credit limit, country, and what information is included with a given listing.
You might be surprised to find out how little—or how much—your data is worth depending on a few key factors.
💡 Key findings:
Americans have the cheapest fullz (full credentials), averaging $8 per record. Japan and the UAE have the most expensive identities at an average of $25.
👉🏼 Prices for stolen credit cards range widely from $0.11 to $986.
👉🏼 Hacked PayPal accounts range from $5 to $1,767.
👉🏼 US and UK accounted for highest percentage of stolen credit cards which reflected in lower average price of $1.50 and $2.50 respectively.
👉🏼 The median credit limit on a stolen credit card is 24 times the price of the card.
👉🏼 The median account balance of a hacked PayPal account is 32 times the price on the dark web.
https://www.comparitech.com/blog/vpn-privacy/dark-web-prices/
#darknet #market #prices #cc #paypal #ssn
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Comparitech researchers analyzed 40+ dark web marketplaces to find out how much your credit card, Paypal, and SSN are worth to cybercriminals.
After a data breach or successful phishing campaign, much of the stolen personal information is sold on black markets. Many such marketplaces reside on the dark web. But how does the sale of stolen information work, exactly, and how much money are criminals making from stolen data?
Comparitech researchers analyzed the prices of stolen credit cards, hacked PayPal accounts, and private Social Security numbers on more than 40 different dark web marketplaces. We looked at prices based on account balance, credit limit, country, and what information is included with a given listing.
You might be surprised to find out how little—or how much—your data is worth depending on a few key factors.
💡 Key findings:
Americans have the cheapest fullz (full credentials), averaging $8 per record. Japan and the UAE have the most expensive identities at an average of $25.
👉🏼 Prices for stolen credit cards range widely from $0.11 to $986.
👉🏼 Hacked PayPal accounts range from $5 to $1,767.
👉🏼 US and UK accounted for highest percentage of stolen credit cards which reflected in lower average price of $1.50 and $2.50 respectively.
👉🏼 The median credit limit on a stolen credit card is 24 times the price of the card.
👉🏼 The median account balance of a hacked PayPal account is 32 times the price on the dark web.
https://www.comparitech.com/blog/vpn-privacy/dark-web-prices/
#darknet #market #prices #cc #paypal #ssn
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Comparitech
Dark web prices for stolen PayPal accounts and credit cards
Comparitech researchers analyzed 40+ dark web marketplaces to find out how much your credit card, Paypal, and SSN are worth to cybercriminals
Media is too big
VIEW IN TELEGRAM
I’m now in charge of Audacity. Seriously.
Audacity is the world’s most widely used audio editing & recording software. It is free and open source and maintained by an amazing community. In this video, I’m announcing my own involvement in the project, which I’m very excited about. For those worried about MuseScore (an open source notation & music app that I also lead): don’t be. I’m not going anywhere!
https://www.youtube.com/watch?v=RMWNvwLiXIQ
#audacity #MuseScore #audio #editing #recording #video
🎥 @nogoolag 🎥 @blackbox_archiv
Audacity is the world’s most widely used audio editing & recording software. It is free and open source and maintained by an amazing community. In this video, I’m announcing my own involvement in the project, which I’m very excited about. For those worried about MuseScore (an open source notation & music app that I also lead): don’t be. I’m not going anywhere!
https://www.youtube.com/watch?v=RMWNvwLiXIQ
#audacity #MuseScore #audio #editing #recording #video
🎥 @nogoolag 🎥 @blackbox_archiv
Password reset code brute-force vulnerability in AWS Cognito
The password reset function of AWS Cognito allows attackers to change the account password if a six-digit number (reset code) sent out by E-mail is correctly entered. By using concurrent HTTP request techniques, it was shown that an attacker can do more guesses on this number than mentioned in the AWS documentation (1587 instead of 20). If the attack succeeds and the attacked accounts do not have multi-factor authentication enabled, a full take-over of the attacked AWS Cognito user accounts would have been possible. The issue was fixed by AWS on 2021-04-20.
💡Impact
An attacker who guessed the correct reset code can set a new password for the attacked AWS Cognito account. This allows attackers to take over the account that is not using additional multi-factor authentication.
https://www.pentagrid.ch/en/blog/password-reset-code-brute-force-vulnerability-in-AWS-Cognito/
#password #reset #code #brutforce #vulnerability #AWSCognito
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The password reset function of AWS Cognito allows attackers to change the account password if a six-digit number (reset code) sent out by E-mail is correctly entered. By using concurrent HTTP request techniques, it was shown that an attacker can do more guesses on this number than mentioned in the AWS documentation (1587 instead of 20). If the attack succeeds and the attacked accounts do not have multi-factor authentication enabled, a full take-over of the attacked AWS Cognito user accounts would have been possible. The issue was fixed by AWS on 2021-04-20.
💡Impact
An attacker who guessed the correct reset code can set a new password for the attacked AWS Cognito account. This allows attackers to take over the account that is not using additional multi-factor authentication.
https://www.pentagrid.ch/en/blog/password-reset-code-brute-force-vulnerability-in-AWS-Cognito/
#password #reset #code #brutforce #vulnerability #AWSCognito
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Pentagrid AG
Password reset code brute-force vulnerability in AWS Cognito
Attacking the password reset function of AWS Cognito
Risky Business #621 -- Ultra professional criminal attackers ascendant
Risky.Biz
Risky Business #621 -- Ultra professional criminal attackers ascendant
Infosec's trajectory looks a bit depressing right now...
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:
👉🏼 USA imposes sanctions over SolarWinds campaign
👉🏼 Enterprise border devices being attacked everywhere by all and sundry
👉🏼 Malvertising is coming back
👉🏼 Ultra professional criminal attackers are ascendant
👉🏼 All the latest ransomware, supply chain and other infosec news
This week’s sponsor interview is with Brian Dye, CEO of Corelight. We speak to him about what he’s calling “Open NDR”. A lot of the big SOCs have settled on their preferred ways of sharing threat information, and Brian drops by to talk all about those trends.
https://risky.biz/RB621/
#podcast #riskybusiness
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
Infosec's trajectory looks a bit depressing right now...
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:
👉🏼 USA imposes sanctions over SolarWinds campaign
👉🏼 Enterprise border devices being attacked everywhere by all and sundry
👉🏼 Malvertising is coming back
👉🏼 Ultra professional criminal attackers are ascendant
👉🏼 All the latest ransomware, supply chain and other infosec news
This week’s sponsor interview is with Brian Dye, CEO of Corelight. We speak to him about what he’s calling “Open NDR”. A lot of the big SOCs have settled on their preferred ways of sharing threat information, and Brian drops by to talk all about those trends.
https://risky.biz/RB621/
#podcast #riskybusiness
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
The 11th Reason to Delete your Social Media Account: the Algorithm will Find You
TL;DR: you should delete your social media accounts, right now, even if you think they’re a net benefit in your life. I won’t judge you if you don’t, but this is not a joke, it’s not hypocritical to post a link to this on social media, and the fact that you probably came across it on social media doesn’t make the advice any less valuable.
After the introduction, there are five parts: the algorithm is real, the algorithm wants you online, the algorithm will find you, walk away from the algorithm, no, but seriously.
Introduction
A few years ago, Jaron Lanier wrote Ten Arguments to Delete your Social Media Accounts Right Now. Lanier’s book has the helpful feature of being completely unambiguous in its message (when, Jaron, when should I delete them? Oh). I ended up assigning it as optional reading for my undergraduate class, Bubbles. The Thanksgiving break means that students usually patch out that week and miss class, so I run an optional seminar instead. I’ve learned a huge amount from these little liminal-moment seminars each year, and some of them have led to real revisions in my own thinking, see, e.g., my views on University censorship when I was on Jim Rutt’s Currents podcast. In previous years, we read John Locke’s pluralistic Letter Concerning Toleration, but Lanier’s book has the advantage of not needing any coaching in close-reading.
https://simondedeo.com/?p=705
#delete #socialmedia #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
TL;DR: you should delete your social media accounts, right now, even if you think they’re a net benefit in your life. I won’t judge you if you don’t, but this is not a joke, it’s not hypocritical to post a link to this on social media, and the fact that you probably came across it on social media doesn’t make the advice any less valuable.
After the introduction, there are five parts: the algorithm is real, the algorithm wants you online, the algorithm will find you, walk away from the algorithm, no, but seriously.
Introduction
A few years ago, Jaron Lanier wrote Ten Arguments to Delete your Social Media Accounts Right Now. Lanier’s book has the helpful feature of being completely unambiguous in its message (when, Jaron, when should I delete them? Oh). I ended up assigning it as optional reading for my undergraduate class, Bubbles. The Thanksgiving break means that students usually patch out that week and miss class, so I run an optional seminar instead. I’ve learned a huge amount from these little liminal-moment seminars each year, and some of them have led to real revisions in my own thinking, see, e.g., my views on University censorship when I was on Jim Rutt’s Currents podcast. In previous years, we read John Locke’s pluralistic Letter Concerning Toleration, but Lanier’s book has the advantage of not needing any coaching in close-reading.
https://simondedeo.com/?p=705
#delete #socialmedia #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Axiom of Chance
The 11th Reason to Delete your Social Media Account: the Algorithm will Find You
TL;DR: outrage mobs aren’t a bug. They’re a feature. After the introduction, there are five parts: the algorithm is real, the algorithm wants you online, the algorithm will find you, walk away from…
Introducing: The Lazarus Heist
Canadian Broadcasting Corporation
The Lazarus Heist
The Lazarus Heist is a new podcast from our partners at the BBC World Service. It’s about a devastating cyber-attack, Kim Jong-un, Sony Pictures Entertainment, and how the Lazarus Group hackers caused mayhem in Hollywood. And this is just the beginning. This is episode one, but you can subscribe to The Lazarus Heist and listen to more episodes wherever you get your podcasts.
#LazarusHeist #truecrime #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
The Lazarus Heist is a new podcast from our partners at the BBC World Service. It’s about a devastating cyber-attack, Kim Jong-un, Sony Pictures Entertainment, and how the Lazarus Group hackers caused mayhem in Hollywood. And this is just the beginning. This is episode one, but you can subscribe to The Lazarus Heist and listen to more episodes wherever you get your podcasts.
#LazarusHeist #truecrime #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
🎙@NoGoolag
Media is too big
VIEW IN TELEGRAM
Hacking the Samsung Galaxy S8 Irisscanner
Mobile vendors have established fingerprints as a biometric feature to unlock smartphones. Now they turn to iris recognition, as do hackers. This video demonstrates how to circumvent the iris recognition of the Samsung Galaxy S8 flagship phone only using basic tools.
https://media.ccc.de/v/biometrie-s8-iris-en
#ccc #biometric #unlock #smartphones #irisrecognition #irisscanner #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Mobile vendors have established fingerprints as a biometric feature to unlock smartphones. Now they turn to iris recognition, as do hackers. This video demonstrates how to circumvent the iris recognition of the Samsung Galaxy S8 flagship phone only using basic tools.
https://media.ccc.de/v/biometrie-s8-iris-en
#ccc #biometric #unlock #smartphones #irisrecognition #irisscanner #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Facebook, IoTeX, R3 Among New Members of Confidential Computing Consortium
Facebook, Accenture, IoTeX, Nvidia and six other companies are joining the Linux Foundation’s Confidential Computing Consortium (CCC), increasing the size of the privacy-focused group by 60 percent.
The addition of members IoTeX, which leverages blockchain to secure the internet of things, and R3, an enterprise blockchain company, nearly doubles the number of blockchain companies involved.
Created in late October 2019, the CCC aims to bring developers together to accelerate the use of Trusted Execution Environment (TEE) technologies and standards. A TEE sequesters code and data away from applications on the main operating system, so they’re protected from adversaries who may gain access to the main operating system. If the main system is in the White House, for instance, with a variety of protections, a TEE is the bunker underneath it.
Within a TEE, unauthorized actors cannot view the data that is being used within the TEE and cannot alter the data. This enables applications and other systems to run without having direct access to extensive amounts of vulnerable data such as financial or personally identifiable information.
“Securing data-in-use in hardware-based TEEs, can … strengthen other security- and integrity-related technologies,” like running a blockchain ledger, said Stephen Walli, the chairperson of the CCC’s governing board, in a statement.
“Confidential computing brings privacy-preserving smart devices to the next level by not only allowing users to own their private data, but also to use it in a privacy-preserving way,” Raullen Chai, CEO of IoTex, told CoinDesk in an email. “This has major implications for consumer-facing industries such as health care and smart homes, as well as enterprise for private multi-party data sharing and interactions.”
http://telegra.ph/Facebook-IoTeX-R3-Among-New-Members-of-Confidential-Computing-Consortium---CoinDesk-04-30
via www.coindesk.com
#facebook #DeleteFacebook #IoTeX #confidential #computing #consortium #ccc
📡 @nogoolag 📡 @blackbox_archiv
Facebook, Accenture, IoTeX, Nvidia and six other companies are joining the Linux Foundation’s Confidential Computing Consortium (CCC), increasing the size of the privacy-focused group by 60 percent.
The addition of members IoTeX, which leverages blockchain to secure the internet of things, and R3, an enterprise blockchain company, nearly doubles the number of blockchain companies involved.
Created in late October 2019, the CCC aims to bring developers together to accelerate the use of Trusted Execution Environment (TEE) technologies and standards. A TEE sequesters code and data away from applications on the main operating system, so they’re protected from adversaries who may gain access to the main operating system. If the main system is in the White House, for instance, with a variety of protections, a TEE is the bunker underneath it.
Within a TEE, unauthorized actors cannot view the data that is being used within the TEE and cannot alter the data. This enables applications and other systems to run without having direct access to extensive amounts of vulnerable data such as financial or personally identifiable information.
“Securing data-in-use in hardware-based TEEs, can … strengthen other security- and integrity-related technologies,” like running a blockchain ledger, said Stephen Walli, the chairperson of the CCC’s governing board, in a statement.
“Confidential computing brings privacy-preserving smart devices to the next level by not only allowing users to own their private data, but also to use it in a privacy-preserving way,” Raullen Chai, CEO of IoTex, told CoinDesk in an email. “This has major implications for consumer-facing industries such as health care and smart homes, as well as enterprise for private multi-party data sharing and interactions.”
http://telegra.ph/Facebook-IoTeX-R3-Among-New-Members-of-Confidential-Computing-Consortium---CoinDesk-04-30
via www.coindesk.com
#facebook #DeleteFacebook #IoTeX #confidential #computing #consortium #ccc
📡 @nogoolag 📡 @blackbox_archiv
Telegraph
Facebook, IoTeX, R3 Among New Members of Confidential Computing Consortium - CoinDesk
Facebook, Accenture, IoTeX, Nvidia and six other companies are joining the Linux Foundation’s Confidential Computing Consortium (CCC), increasing the size of the privacy-focused group by 60 percent. The addition of members IoTeX, which leverages blockchain…
Njalla-Controlled Domains Strangely Changed Hands
Two high-profile Njalla-registered domains have been hijacked, probably by phishing actors. The buyers of the domains haven’t received a 2FA confirmation, so this was either a problem on Njalla’s or a SIM-swap action.
The privacy-respecting domain registration service has acknowledged the issue but refused to make public comments.
There have been reports about domains controlled by the Njalla registrar changing hands without triggering 2FA notices or ever giving their operators a chance to intervene and stop the transfer. One report comes from Dark.Fail, an anonymous researcher who likes to dive deep into the Tor network, and another one comes from DarknetLive.
My domain dark[.]fail was hijacked 12hr ago. I am not in control of it. DarknetLive's domain was also stolen.
We are not the same person. Our registrar Njalla is the common denominator between both attacks. My 2FA was on. I received no emails from Njalla. Something is broken.
— dark.fail (@DarkDotFail) April 30, 2021
https://www.technadu.com/njalla-controlled-domains-strangely-changed-hands/270875/
#njalla #domain #hijacking #darknet #darkfail #darknetlive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Two high-profile Njalla-registered domains have been hijacked, probably by phishing actors. The buyers of the domains haven’t received a 2FA confirmation, so this was either a problem on Njalla’s or a SIM-swap action.
The privacy-respecting domain registration service has acknowledged the issue but refused to make public comments.
There have been reports about domains controlled by the Njalla registrar changing hands without triggering 2FA notices or ever giving their operators a chance to intervene and stop the transfer. One report comes from Dark.Fail, an anonymous researcher who likes to dive deep into the Tor network, and another one comes from DarknetLive.
My domain dark[.]fail was hijacked 12hr ago. I am not in control of it. DarknetLive's domain was also stolen.
We are not the same person. Our registrar Njalla is the common denominator between both attacks. My 2FA was on. I received no emails from Njalla. Something is broken.
— dark.fail (@DarkDotFail) April 30, 2021
https://www.technadu.com/njalla-controlled-domains-strangely-changed-hands/270875/
#njalla #domain #hijacking #darknet #darkfail #darknetlive
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
TechNadu
Njalla-Controlled Domains Strangely Changed Hands - TechNadu
Two high-profile Njalla-registered domains have been hijacked, probably by phishing actors, and users remain in the dark about what happened.
The EU's "terrorist content" regulation and what it means for UK hosting providers
The European Parliament has adopted (deemed approved) a regulation addressing the dissemination of terrorist content online. The stated aim of the Regulation is to "address the misuse of hosting services for terrorist purposes and contribute to public security in European societies".
If you provide hosting services (which is defined broadly, and includes social media services, sites with public comments sections, eCommerce sites with free-text review facilities, as well as "hosting providers" in the more typical sense) to people in the EU, you'll want to read this.
It's a bit long and complicated, so do get in touch if you need advice on how it applies to your specific services.
Important: Even if you are in scope, you do not need to comply yet: it will apply 12 months and 20 days after it is published in the Official Journal of the European Union. I'll update this page when the date is crystallised.
https://decoded.legal/blog/2021/04/the-eus-terrorist-content-regulation-and-what-it-means-for-uk-hosting-providers
#eu #terrorist #content #regulation #hosting #provider
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The European Parliament has adopted (deemed approved) a regulation addressing the dissemination of terrorist content online. The stated aim of the Regulation is to "address the misuse of hosting services for terrorist purposes and contribute to public security in European societies".
If you provide hosting services (which is defined broadly, and includes social media services, sites with public comments sections, eCommerce sites with free-text review facilities, as well as "hosting providers" in the more typical sense) to people in the EU, you'll want to read this.
It's a bit long and complicated, so do get in touch if you need advice on how it applies to your specific services.
Important: Even if you are in scope, you do not need to comply yet: it will apply 12 months and 20 days after it is published in the Official Journal of the European Union. I'll update this page when the date is crystallised.
https://decoded.legal/blog/2021/04/the-eus-terrorist-content-regulation-and-what-it-means-for-uk-hosting-providers
#eu #terrorist #content #regulation #hosting #provider
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
decoded.legal
The EU's "terrorist content" regulation and what it means for UK hosting providers - Internet, telecoms, and tech law decoded
A guidance note on the EU's terrorist content regulation, aimed at providers of hosting services, social media services, as well as blogs and other sites with user commenting facilities