Media is too big
VIEW IN TELEGRAM
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running.
https://www.youtube.com/watch?v=Fsh5JcK5F4k
00:00 - Intro
00:22 - Brilliant Add
01:59 - OTW Books
03:54 - Pegasus overview ....
โผ๏ธ just start the video from 03:54 to skip that sponsoring crap โผ๏ธ
#pegasus #spyware #video
๐ฅ@cRyPtHoN_INFOSEC_IT
๐ฅ@cRyPtHoN_INFOSEC_FR
๐ฅ@cRyPtHoN_INFOSEC_EN
๐ฅ@cRyPtHoN_INFOSEC_DE
๐ฅ@BlackBox_Archiv
Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running.
https://www.youtube.com/watch?v=Fsh5JcK5F4k
00:00 - Intro
00:22 - Brilliant Add
01:59 - OTW Books
03:54 - Pegasus overview ....
โผ๏ธ just start the video from 03:54 to skip that sponsoring crap โผ๏ธ
#pegasus #spyware #video
๐ฅ@cRyPtHoN_INFOSEC_IT
๐ฅ@cRyPtHoN_INFOSEC_FR
๐ฅ@cRyPtHoN_INFOSEC_EN
๐ฅ@cRyPtHoN_INFOSEC_DE
๐ฅ@BlackBox_Archiv
๐6
Sharing Your Credit Card With a Shady Pirate IPTV Service Isnโt a Brilliant Idea
Pirate IPTV services have transformed into a billion-dollar industry in recent years. It is a highly profitable business that, at the upper echelon, appears to be well organized. However, research from the Digital Citizens Alliance shows that handing over credit card details to unknown parties also has its drawbacks, including 'surprise' charges.
https://torrentfreak.com/sharing-your-credit-card-with-a-shady-pirate-iptv-service-isnt-a-brilliant-idea-230624/
#iptv
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Pirate IPTV services have transformed into a billion-dollar industry in recent years. It is a highly profitable business that, at the upper echelon, appears to be well organized. However, research from the Digital Citizens Alliance shows that handing over credit card details to unknown parties also has its drawbacks, including 'surprise' charges.
https://torrentfreak.com/sharing-your-credit-card-with-a-shady-pirate-iptv-service-isnt-a-brilliant-idea-230624/
#iptv
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Torrentfreak
Sharing Your Credit Card With a Shady Pirate IPTV Service Isn't a Brilliant Idea * TorrentFreak
Research from the Digital Citizens Alliance shows that handing over credit card details to unknown parties has its drawbacks.
๐ฑ2
The Russian government is trying to block the Tor network, but users can circumvent this block by using a Tor Bridge or Tor Snowflake.
๐๐ผ Download Tor Browser: @gettor_bot
๐ก You can help Tor Russian users to circumvent censorship by:
- Running a snowflake proxy: https://snowflake.torproject.org
- Running an obsf4 bridge:
https://community.torproject.org/relay/setup/bridge/
https://forum.torproject.org/t/tor-blocked-in-russia-how-to-circumvent-censorship/982
#tor #russia
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐๐ผ Download Tor Browser: @gettor_bot
๐ก You can help Tor Russian users to circumvent censorship by:
- Running a snowflake proxy: https://snowflake.torproject.org
- Running an obsf4 bridge:
https://community.torproject.org/relay/setup/bridge/
https://forum.torproject.org/t/tor-blocked-in-russia-how-to-circumvent-censorship/982
#tor #russia
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
community.torproject.org
Tor Project | Bridge
Defend yourself against tracking and surveillance. Circumvent censorship. | Bridge
๐5โค3๐1๐ฑ1
Cracking Down on Dissent, Russia Seeds a Surveillance Supply Chain
Russia is incubating a cottage industry of new digital surveillance tools to suppress domestic opposition to the war in Ukraine. The tech may also be sold overseas.
As the war in Ukraine unfolded last year, Russiaโs best digital spies turned to new tools to fight an enemy on another front: those inside its own borders who opposed the war.
To aid an internal crackdown, Russian authorities had amassed an arsenal of technologies to track the online lives of citizens. After it invaded Ukraine, its demand grew for more surveillance tools. That helped stoke a cottage industry of tech contractors, which built products that have become a powerful โ and novel โ means of digital surveillance.
The technologies have given the police and Russiaโs Federal Security Service, better known as the F.S.B., access to a buffet of snooping capabilities focused on the day-to-day use of phones and websites. The tools offer ways to track certain kinds of activity on encrypted apps like WhatsApp and Signal, monitor the locations of phones, identify anonymous social media users and break into peopleโs accounts, according to documents from Russian surveillance providers obtained by The New York Times, as well as security experts, digital activists and a person involved with the countryโs digital surveillance operations.
https://www.nytimes.com/2023/07/03/technology/russia-ukraine-surveillance-tech.html
#surveillance
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Russia is incubating a cottage industry of new digital surveillance tools to suppress domestic opposition to the war in Ukraine. The tech may also be sold overseas.
As the war in Ukraine unfolded last year, Russiaโs best digital spies turned to new tools to fight an enemy on another front: those inside its own borders who opposed the war.
To aid an internal crackdown, Russian authorities had amassed an arsenal of technologies to track the online lives of citizens. After it invaded Ukraine, its demand grew for more surveillance tools. That helped stoke a cottage industry of tech contractors, which built products that have become a powerful โ and novel โ means of digital surveillance.
The technologies have given the police and Russiaโs Federal Security Service, better known as the F.S.B., access to a buffet of snooping capabilities focused on the day-to-day use of phones and websites. The tools offer ways to track certain kinds of activity on encrypted apps like WhatsApp and Signal, monitor the locations of phones, identify anonymous social media users and break into peopleโs accounts, according to documents from Russian surveillance providers obtained by The New York Times, as well as security experts, digital activists and a person involved with the countryโs digital surveillance operations.
https://www.nytimes.com/2023/07/03/technology/russia-ukraine-surveillance-tech.html
#surveillance
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
NY Times
Cracking Down on Dissent, Russia Seeds a Surveillance Supply Chain (Published 2023)
Russia is incubating a cottage industry of new digital surveillance tools to suppress domestic opposition to the war in Ukraine. The tech may also be sold overseas.
โค2๐1
The National Assembly in France adopted article 3 of the Justice bill which authorizes the authorities to remotely activate the cameras and microphones of telephones or other connected devices without the knowledge of the persons concerned.
https://twitter.com/WallStreetSilv/status/1676724700074897409
https://newsinfrance.com/justice-law-the-activation-of-remote-telephones-approved-by-the-national-assembly/
#surveillance #france
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://twitter.com/WallStreetSilv/status/1676724700074897409
https://newsinfrance.com/justice-law-the-activation-of-remote-telephones-approved-by-the-national-assembly/
#surveillance #france
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
X (formerly Twitter)
Wall Street Mav (@WallStreetMav) on X
The National Assembly in France adopted article 3 of the Justice bill which authorizes the authorities to remotely activate the cameras and microphones of telephones or other connected devices without the knowledge of the persons concerned.
80 votes forโฆ
80 votes forโฆ
๐ฑ14๐2๐ฅ1
Surveillance advertising in Europe: The adtech industry tracks most of what you do on the Internet. This file shows just how much
The advertising industry has more than 650,000 labels to target people. Reading through them reveals how even the most sensitive aspects of our life are monitored. EU-based data brokers play a vital role in this system.
Everything we do on the Internet is being recorded and analyzed in order to achieve one goal: to show us targeted advertising. This is a reality to which many people have become accustomed in exchange for free services. However, very few people understand exactly where our data ends up when we visit websites, use apps or make digital payments. Targeted advertising moves in mysterious ways. Thatโs another fact weโve become accustomed to.
๐๐ผ Download: https://web.archive.org/web/20230525225541mp_/https://xandr-be-prod.zoominsoftware.io/bundle/monetize_monetize-standard/page/attachments/data-marketplace-buyer-overview/data_marketplace_public_segments_pricing_05212021.xlsx
https://netzpolitik.org/2023/surveillance-advertising-in-europe-the-adtech-industry-tracks-most-of-what-you-do-on-the-internet-this-file-shows-just-how-much/
#surveillance #advertising #eu
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The advertising industry has more than 650,000 labels to target people. Reading through them reveals how even the most sensitive aspects of our life are monitored. EU-based data brokers play a vital role in this system.
Everything we do on the Internet is being recorded and analyzed in order to achieve one goal: to show us targeted advertising. This is a reality to which many people have become accustomed in exchange for free services. However, very few people understand exactly where our data ends up when we visit websites, use apps or make digital payments. Targeted advertising moves in mysterious ways. Thatโs another fact weโve become accustomed to.
๐๐ผ Download: https://web.archive.org/web/20230525225541mp_/https://xandr-be-prod.zoominsoftware.io/bundle/monetize_monetize-standard/page/attachments/data-marketplace-buyer-overview/data_marketplace_public_segments_pricing_05212021.xlsx
https://netzpolitik.org/2023/surveillance-advertising-in-europe-the-adtech-industry-tracks-most-of-what-you-do-on-the-internet-this-file-shows-just-how-much/
#surveillance #advertising #eu
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
netzpolitik.org
Surveillance advertising in Europe: The adtech industry tracks most of what you do on the Internet. This file shows just how much.
The advertising industry has more than 650,000 labels to target people. Reading through them reveals how even the most sensitive aspects of our life are monitored. EU-based data brokers play a vital role in this system.
๐11โค1
The Death of Infosec Twitter
โInfosec twitterโ has been used to describe the vibrant, active and often enthusiastic community of security practitioners working in and around the industry. Itโs been a source of insight, inspiration and entertainment for many and for years. Therefore, it is with a bit of sadness that I must announce that the death of infosec twitter is upon us.
https://www.cyentia.com/the-death-of-infosec-twitter/
#infosec
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
โInfosec twitterโ has been used to describe the vibrant, active and often enthusiastic community of security practitioners working in and around the industry. Itโs been a source of insight, inspiration and entertainment for many and for years. Therefore, it is with a bit of sadness that I must announce that the death of infosec twitter is upon us.
https://www.cyentia.com/the-death-of-infosec-twitter/
#infosec
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Cyentia Institute | Data-Driven Cybersecurity Research
The Death of Infosec Twitter | Cyentia Institute
"Infosec Twitter," a vibrant community of security practitioners, known for its insight, inspiration, and entertainment, is coming to an end.
๐5๐1
Debunking Runa Sandvik โ CatalanGate Spyware
In April 2022, the world was informed about 65 suspected instances of espionage in Catalonia. The revelation came through a report and data jointly released by The Citizen Lab, a public policy institution at The University of Toronto, and Amnesty Tech, a cybersecurity division of Amnesty International. Following their investigation, these special interest groups leveled direct accusations against the Spanish government, alleging the utilization of surveillance technology developed by Israeli cyber intelligence firms NSO Group and Candiru, LTD to target Catalan civil society.
https://jonathandata1.medium.com/debunking-runa-sandvik-pegasus-spyware-catalangate-40a3cd2ebc53
#nso #pegasus #spyware #catalangate
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
In April 2022, the world was informed about 65 suspected instances of espionage in Catalonia. The revelation came through a report and data jointly released by The Citizen Lab, a public policy institution at The University of Toronto, and Amnesty Tech, a cybersecurity division of Amnesty International. Following their investigation, these special interest groups leveled direct accusations against the Spanish government, alleging the utilization of surveillance technology developed by Israeli cyber intelligence firms NSO Group and Candiru, LTD to target Catalan civil society.
https://jonathandata1.medium.com/debunking-runa-sandvik-pegasus-spyware-catalangate-40a3cd2ebc53
#nso #pegasus #spyware #catalangate
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐1๐ฅ1
Hackers are infecting Call of Duty players with a self-spreading malware
Hackers are infecting players of an old Call of Duty game with a worm that spreads automatically in online lobbies, according to two analyses of the malware.
On June 26, a user on a Steam forum alerted other players of Call of Duty: Modern Warfare 2 that hackers โattack using hacked lobbies,โ and suggested running an antivirus. The malware mentioned in the thread appears to be on the malware online repository VirusTotal.
Another player claimed to have analyzed the malware and wrote in the same forum thread that the malware appears to be a worm, based on a series of text strings inside the malware. A game industry insider, who asked to remain anonymous because they were not allowed to speak to the press, confirmed that the malware contains those strings, indicating a worm.
https://techcrunch.com/2023/07/27/hackers-are-infecting-call-of-duty-players-with-a-self-spreading-malware
#malware #alert
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Hackers are infecting players of an old Call of Duty game with a worm that spreads automatically in online lobbies, according to two analyses of the malware.
On June 26, a user on a Steam forum alerted other players of Call of Duty: Modern Warfare 2 that hackers โattack using hacked lobbies,โ and suggested running an antivirus. The malware mentioned in the thread appears to be on the malware online repository VirusTotal.
Another player claimed to have analyzed the malware and wrote in the same forum thread that the malware appears to be a worm, based on a series of text strings inside the malware. A game industry insider, who asked to remain anonymous because they were not allowed to speak to the press, confirmed that the malware contains those strings, indicating a worm.
https://techcrunch.com/2023/07/27/hackers-are-infecting-call-of-duty-players-with-a-self-spreading-malware
#malware #alert
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
TechCrunch
Hackers are infecting Call of Duty players with a self-spreading malware
Activision said it brought the 2009-released game offline while it investigates "an issue."
๐5
CannaPower - Pirate Site Not Impressed by Global DNS Blocking Order
Sony Music's legal efforts have produced a major breakthrough. As the result of a German blocking order, DNS provider Quad9 now blocks global access to music piracy site CannaPower. The operator of the site doesn't appear to be impressed so far, noting that it doesn't really hurt traffic. "They will never get us down," the operator says, adding that moving to the Tor network remains an option as well.
https://torrentfreak.com/pirate-site-not-impressed-by-global-dns-blocking-order-230803/
#cannapower
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Sony Music's legal efforts have produced a major breakthrough. As the result of a German blocking order, DNS provider Quad9 now blocks global access to music piracy site CannaPower. The operator of the site doesn't appear to be impressed so far, noting that it doesn't really hurt traffic. "They will never get us down," the operator says, adding that moving to the Tor network remains an option as well.
https://torrentfreak.com/pirate-site-not-impressed-by-global-dns-blocking-order-230803/
#cannapower
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Torrentfreak
Pirate Site Not Impressed by Global DNS Blocking Order * TorrentFreak
DNS resolver Quad9 has blocked global access to pirate site CannaPower, but the operator of the site doesn't appear to be impressed.
๐7โค2๐ฑ1
<Lolek> Hosted, a notorious bulletproof hosting provider who was a competitor to the infamous CyberBunker, has been seized by the United States Federal Bureau-Investigation, IRS Criminal Investigation unit, and Poland's Central Bureau of Combating Cybercrime (CBZC)
https://nitter.net/vxunderground/status/1688965817654775820#m
Via Twitter
#lolek #bulletproof #hosting #seized
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://nitter.net/vxunderground/status/1688965817654775820#m
Via Twitter
#lolek #bulletproof #hosting #seized
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐4โค1๐1
Ransomware Diaries: Volume 3 โ LockBitโs Secrets
In this volume of the Ransomware Diaries, I will share interesting, previously unknown details of the LockBit ransomware operation that LockBit has tried very hard to cover up. Until now, you have been lied to about LockBitโs true capability. Today, I will show you the actual current state of its criminal program and demonstrate with evidence-backed analysis that LockBit has several critical operational problems, which have gone unnoticed.
This time, besides using fake personas, I have spoken directly with the gang and many of its affiliate partners. I also reached out to victims. I learned what happens behind the scenes during the ransom negotiations and the relationships LockBit has with its affiliate partners and competing rival gangs. LockBit has secrets it does not want either party to know. Now, I look forward to sharing them with you!
Before I begin, I need to share a significant event that took place as I finalized this report. In August 2023, LockBitโs leadership vanished and was unreachable to fellow gang members, including its affiliate partners, for the first two weeks of August. During that time, several of LockBitโs close associates shared concerns that the gangโs leadership was on the run or dead. Then, on August 13, LockBit reappeared on private channels as if it never happened. Still, during the time LockBit was gone, LockBits data leak site and infrastructure were up, but no one was actively managing it.
๐๐ผ Volume 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/
๐๐ผ Volume 2: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/#Part_II_The_Victims%E2%80%99_Story
๐๐ผ Volume 1: https://analyst1.com/ransomware-diaries-volume-1/
#ransomware #lockbit
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
In this volume of the Ransomware Diaries, I will share interesting, previously unknown details of the LockBit ransomware operation that LockBit has tried very hard to cover up. Until now, you have been lied to about LockBitโs true capability. Today, I will show you the actual current state of its criminal program and demonstrate with evidence-backed analysis that LockBit has several critical operational problems, which have gone unnoticed.
This time, besides using fake personas, I have spoken directly with the gang and many of its affiliate partners. I also reached out to victims. I learned what happens behind the scenes during the ransom negotiations and the relationships LockBit has with its affiliate partners and competing rival gangs. LockBit has secrets it does not want either party to know. Now, I look forward to sharing them with you!
Before I begin, I need to share a significant event that took place as I finalized this report. In August 2023, LockBitโs leadership vanished and was unreachable to fellow gang members, including its affiliate partners, for the first two weeks of August. During that time, several of LockBitโs close associates shared concerns that the gangโs leadership was on the run or dead. Then, on August 13, LockBit reappeared on private channels as if it never happened. Still, during the time LockBit was gone, LockBits data leak site and infrastructure were up, but no one was actively managing it.
๐๐ผ Volume 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/
๐๐ผ Volume 2: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/#Part_II_The_Victims%E2%80%99_Story
๐๐ผ Volume 1: https://analyst1.com/ransomware-diaries-volume-1/
#ransomware #lockbit
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Analyst1
Ransomware Diaries V. 3: LockBit's Secrets
In "LockBit's Secrets", Jon DiMaggio will show the state of LockBit's criminal program and demonstrate with evidence-backed analysis that he is hiding critical issues in its organization.
๐2โค1
Big Ass Data Broker Opt-Out List
This list was started on September 29, 2017 and was most recently updated in May 2023 to add information on sites that require you to click links sent via email or to receive an automated call and enter a four-digit number on your phone in order to complete an opt-out request.
https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List
#bigdata
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
This list was started on September 29, 2017 and was most recently updated in May 2023 to add information on sites that require you to click links sent via email or to receive an automated call and enter a four-digit number on your phone in order to complete an opt-out request.
https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List
#bigdata
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
GitHub
GitHub - yaelwrites/Big-Ass-Data-Broker-Opt-Out-List
Contribute to yaelwrites/Big-Ass-Data-Broker-Opt-Out-List development by creating an account on GitHub.
๐3โค2
Google now moderates your synched bookmarks
https://strangeobject.space/@silvermoon82/110969122337810598
#deletegoogle
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://strangeobject.space/@silvermoon82/110969122337810598
#deletegoogle
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐3โค1๐ฑ1
CRYPTOGRAPHY BUG BOUNTY
TYPE #1 Reward: $300K - $1M
TYPE #2 Reward: $12,000
We've extensively researched cryptography and developed a simple standalone linux app that doesn't require network access, you can also monitor network to ensure security. App is automated and controllable through bash. bugs type #2 is only have one purpose but finding a type #1 bugs, which serves a dual purpose: advancing the development of the new generation of blockchain and type #1 data refers to cryptocurrencies that have remained transaction-free since 2009, guaranteeing their lack of ownership... If you discover type #1 bug, you could be rewarded generously and your life could greatly improve. we firmly believe that more hands and our collective knowledge hold immense power.
System requirements: README
Special Bonus: If someone discovers bug type #2 for the second time, they shall be rewarded twofold.
Contract me: @THEALFA
Reports: 0 Last paid: $0
Last updated: 1 SEP 2023
TYPE #1 Reward: $300K - $1M
TYPE #2 Reward: $12,000
We've extensively researched cryptography and developed a simple standalone linux app that doesn't require network access, you can also monitor network to ensure security. App is automated and controllable through bash. bugs type #2 is only have one purpose but finding a type #1 bugs, which serves a dual purpose: advancing the development of the new generation of blockchain and type #1 data refers to cryptocurrencies that have remained transaction-free since 2009, guaranteeing their lack of ownership... If you discover type #1 bug, you could be rewarded generously and your life could greatly improve. we firmly believe that more hands and our collective knowledge hold immense power.
System requirements: README
Special Bonus: If someone discovers bug type #2 for the second time, they shall be rewarded twofold.
Contract me: @THEALFA
Reports: 0 Last paid: $0
Last updated: 1 SEP 2023
Telegraph
System Requirements
We've extensively researched cryptography and developed a standalone linux app that doesn't require network access. App is automated & controllable through bash.
๐7๐4
Itโs Official: Cars Are the Worst Product Category We Have Ever Reviewed for Privacy
Ah, the wind in your hair, the open road ahead, and not a care in the worldโฆ except all the trackers, cameras, microphones, and sensors capturing your every move. Ugh. Modern cars are a privacy nightmare.
Car makers have been bragging about their cars being โcomputers on wheels" for years to promote their advanced features. However, the conversation about what driving a computer means for its occupants' privacy hasnโt really caught up. While we worried that our doorbells and watches that connect to the internet might be spying on us, car brands quietly entered the data business by turning their vehicles into powerful data-gobbling machines. Machines that, because of their all those brag-worthy bells and whistles, have an unmatched power to watch, listen, and collect information about what you do and where you go in your car.
https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/
#privacy #security
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Ah, the wind in your hair, the open road ahead, and not a care in the worldโฆ except all the trackers, cameras, microphones, and sensors capturing your every move. Ugh. Modern cars are a privacy nightmare.
Car makers have been bragging about their cars being โcomputers on wheels" for years to promote their advanced features. However, the conversation about what driving a computer means for its occupants' privacy hasnโt really caught up. While we worried that our doorbells and watches that connect to the internet might be spying on us, car brands quietly entered the data business by turning their vehicles into powerful data-gobbling machines. Machines that, because of their all those brag-worthy bells and whistles, have an unmatched power to watch, listen, and collect information about what you do and where you go in your car.
https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/
#privacy #security
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ฅ8๐ฑ7๐3
Hacking Meduza: Pegasus spyware used to target Putinโs critic
An investigation by Access Now and the Citizen Lab at the Munk School of Global Affairs at the University of Toronto (the Citizen Lab) has revealed that the iPhone of journalist Galina Timchenko, head of Meduza, a leading Russian independent media outlet based in Latvia, has been infected with Israeli firm NSO Groupโs Pegasus spyware. The spyware attack took place two weeks after the Russian government declared Meduza an โundesirable organizationโ for its critical coverage of Vladimir Putinโs regime and the war in Ukraine. At the same time, some European political leaders were publicly arguing for surveillance of all Russians in exile. This is the first documented case of a Pegasus infection of a Russian journalist.
https://www.accessnow.org/publication/hacking-meduza-pegasus-spyware-used-to-target-putins-critic/
#pegasus #spyware
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
An investigation by Access Now and the Citizen Lab at the Munk School of Global Affairs at the University of Toronto (the Citizen Lab) has revealed that the iPhone of journalist Galina Timchenko, head of Meduza, a leading Russian independent media outlet based in Latvia, has been infected with Israeli firm NSO Groupโs Pegasus spyware. The spyware attack took place two weeks after the Russian government declared Meduza an โundesirable organizationโ for its critical coverage of Vladimir Putinโs regime and the war in Ukraine. At the same time, some European political leaders were publicly arguing for surveillance of all Russians in exile. This is the first documented case of a Pegasus infection of a Russian journalist.
https://www.accessnow.org/publication/hacking-meduza-pegasus-spyware-used-to-target-putins-critic/
#pegasus #spyware
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Access Now
Hacking Meduza: Pegasus spyware used to target Putinโs critic
The publisher of Russian independent media org Meduza was hacked with NSOโs Pegasus spyware. As both Russia and Latvia are potential culprits, Access Now demands accountability and sanctions.
๐7โค4๐ฑ1
GameLauncher: A WIP replacement for samsungs gamelauncher which respects your privacy
GameLauncher is an app to see all your games in one place but without tracking.
GameLauncher is an open-source replacement for proprietary game-launchers from samsung and other manufacturers. It works without a network connection and collects absolutely no data about you. Simply launch the app and all your apps will be there. Still WIP!
https://github.com/0xFOSSMan/GameLauncher
#foss #opensource #gamelauncher
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
GameLauncher is an app to see all your games in one place but without tracking.
GameLauncher is an open-source replacement for proprietary game-launchers from samsung and other manufacturers. It works without a network connection and collects absolutely no data about you. Simply launch the app and all your apps will be there. Still WIP!
https://github.com/0xFOSSMan/GameLauncher
#foss #opensource #gamelauncher
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
GitHub
GitHub - 0xfossman/GameLauncher: GameLauncher is an app to see all your games in one place while respecting your privacy
GameLauncher is an app to see all your games in one place while respecting your privacy - 0xfossman/GameLauncher
๐2
Using silent SMS to localize LTE users
Proof of concept implementation
In this blog post, Iโll dive into an intriguing technique โ using silent SMS messages to track LTE usersโ locations. Weโll see how an attacker could send silent SMS messages with a defined pattern and analyze LTE traffic to verify the victim location.
https://mandomat.github.io/2023-09-21-localization-with-silent-SMS/
#silentsms #proofofconcept #lte #sms
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Proof of concept implementation
In this blog post, Iโll dive into an intriguing technique โ using silent SMS messages to track LTE usersโ locations. Weโll see how an attacker could send silent SMS messages with a defined pattern and analyze LTE traffic to verify the victim location.
https://mandomat.github.io/2023-09-21-localization-with-silent-SMS/
#silentsms #proofofconcept #lte #sms
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Home
Using silent SMS to localize LTE users
Proof of concept implementation
๐6๐ฑ6
Your childโs privacy is worth more than likes
Sharenting and its implications for children's privacy
Some parents love to share pictures and videos of their children online. Pictures of the newborn baby or that first smile; a video with the first steps, the first visit to the swimming pool, parties, trips, family moments; then perhaps posts with funny stories, intriguing questions, and even sensitive conversations, such as a teenager revealing to the parent that they are non-binary. This behavior even has a name: sharenting, or documenting your childโs life online. And it has serious implications for children's privacy.
https://www.theprivacywhisperer.com/p/your-childs-privacy-is-worth-more
#privacy #children #sharenting
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Sharenting and its implications for children's privacy
Some parents love to share pictures and videos of their children online. Pictures of the newborn baby or that first smile; a video with the first steps, the first visit to the swimming pool, parties, trips, family moments; then perhaps posts with funny stories, intriguing questions, and even sensitive conversations, such as a teenager revealing to the parent that they are non-binary. This behavior even has a name: sharenting, or documenting your childโs life online. And it has serious implications for children's privacy.
https://www.theprivacywhisperer.com/p/your-childs-privacy-is-worth-more
#privacy #children #sharenting
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The Privacy Whispere
Your childโs privacy is worth more than likes
The Privacy Whisperer, by Luiza Jarovsky
๐9
Beware of investment spam messages in the name of BlackBox (Security) Archiv!
For some time now, someone has been posing as BlackBox (Security) Archiv to distribute Bitcoin spam.
Please don't fall for it! BlackBox would never write to its readers in private chats. If you receive such a message, please report the user to Telegram and then delete the chat.
Stay safe, watch your back and don't get tricked! :)
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
For some time now, someone has been posing as BlackBox (Security) Archiv to distribute Bitcoin spam.
Please don't fall for it! BlackBox would never write to its readers in private chats. If you receive such a message, please report the user to Telegram and then delete the chat.
Stay safe, watch your back and don't get tricked! :)
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐15