Spanish Congress approves "digital decree" The "gag law" to control the Internet?
The Permanent #Commission of the #Congress has approved with the favorable votes of #PSOE, #PP and #Citizens, the Royal Decree-Law 14/2019 of October 31, of urgent measures for the #digital #administration. A tremendously controversial #rule, unprecedented in #Spanish #democracy and that is raising blisters in all areas, as some #lawyers and #activists believe that it is an unconstitutional rule that violates fundamental rights.
The so-called "#digitaldecree" will allow the #Government to assume (temporarily) the direct management of electronic communications networks and services in certain exceptional cases that may affect public order, public security and national security. In practice, the Government will be able to cut off communications and networks such as the Internet in all or part of the territory without a prior court order, alleging an alteration of 'public order'.
The approval entails the adaptation of section 6 of article 4 of the General Telecommunications Law, the wording of which will literally read as follows: "The Government, on an exceptional and transitory basis, may agree to the assumption by the General State Administration of the direct management or intervention of electronic communications networks and services in certain exceptional cases that may affect public order, public security and national security. This exceptional power [...] may affect any infrastructure, associated resource or element or level of the network or service that is necessary to preserve or restore public order, public security and national security.
👉🏼 Read more:
https://www.muycomputer.com/2019/11/28/decretazo-digital-control-internet/
#spain #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The Permanent #Commission of the #Congress has approved with the favorable votes of #PSOE, #PP and #Citizens, the Royal Decree-Law 14/2019 of October 31, of urgent measures for the #digital #administration. A tremendously controversial #rule, unprecedented in #Spanish #democracy and that is raising blisters in all areas, as some #lawyers and #activists believe that it is an unconstitutional rule that violates fundamental rights.
The so-called "#digitaldecree" will allow the #Government to assume (temporarily) the direct management of electronic communications networks and services in certain exceptional cases that may affect public order, public security and national security. In practice, the Government will be able to cut off communications and networks such as the Internet in all or part of the territory without a prior court order, alleging an alteration of 'public order'.
The approval entails the adaptation of section 6 of article 4 of the General Telecommunications Law, the wording of which will literally read as follows: "The Government, on an exceptional and transitory basis, may agree to the assumption by the General State Administration of the direct management or intervention of electronic communications networks and services in certain exceptional cases that may affect public order, public security and national security. This exceptional power [...] may affect any infrastructure, associated resource or element or level of the network or service that is necessary to preserve or restore public order, public security and national security.
👉🏼 Read more:
https://www.muycomputer.com/2019/11/28/decretazo-digital-control-internet/
#spain #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveilled
Cities around the world are scaling up their use of surveillance cameras and facial recognition systems – but which ones are watching their citizens most closely?
Qiu Rui, a #policeman in #Chongqing, was on duty this summer when he received an #alert from a #facial #recognition system at a local square. There was a high probability a man caught on camera was a suspect in a 2002 murder case, the system told him.
The city’s #surveillance #system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers. Three days later the police captured the man, who eventually admitted that he was the suspect.
Cases such as this, where facial recognition systems are used to help local police crack crime cases, are not unusual in the south-west #China city, which recently ranked first in an #analysis of the world’s most surveilled cities compiled by the UK-based technology research firm Comparitech. With 2.58m cameras covering 15.35 million people – equal to one camera for every six residents – Chongqing has more surveillance cameras than any other city in the world for its population, beating even Beijing, Shanghai and tech hub Shenzhen.
👉🏼 Read more:
https://www.theguardian.com/cities/2019/dec/02/big-brother-is-watching-chinese-city-with-26m-cameras-is-worlds-most-heavily-surveilled
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Cities around the world are scaling up their use of surveillance cameras and facial recognition systems – but which ones are watching their citizens most closely?
Qiu Rui, a #policeman in #Chongqing, was on duty this summer when he received an #alert from a #facial #recognition system at a local square. There was a high probability a man caught on camera was a suspect in a 2002 murder case, the system told him.
The city’s #surveillance #system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers. Three days later the police captured the man, who eventually admitted that he was the suspect.
Cases such as this, where facial recognition systems are used to help local police crack crime cases, are not unusual in the south-west #China city, which recently ranked first in an #analysis of the world’s most surveilled cities compiled by the UK-based technology research firm Comparitech. With 2.58m cameras covering 15.35 million people – equal to one camera for every six residents – Chongqing has more surveillance cameras than any other city in the world for its population, beating even Beijing, Shanghai and tech hub Shenzhen.
👉🏼 Read more:
https://www.theguardian.com/cities/2019/dec/02/big-brother-is-watching-chinese-city-with-26m-cameras-is-worlds-most-heavily-surveilled
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
A decade of hacking: The most notable cyber-security events of the 2010s
The 2010s decade is drawing to a close and ZDNet is looking back at the most important cyber-security events that have taken place during the past ten years.
Over the past decade, we've seen it all. We've had monstrous #data #breaches, years of prolific #hacktivism, plenty of nation-state #cyber-#espionage operations, almost non-stop financially-motivated #cybercrime, and destructive #malware that has rendered systems unusable.
Below is a summary of the most important events of the 2010s, ordered by year. We didn't necessarily look at the biggest breaches or the most extensive hacking operations but instead focused on hacks and techniques that gave birth to a new cyber-security trend or were a paradigm shift in how experts looked at the entire field of cyber-security.
From the #Stuxnet attacks of 2010 to #China's extensive #mass-#surveillance of the #Uyghur #minority, we selected the most relevant events and explained why they were important.
👉🏼 Read more:
https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The 2010s decade is drawing to a close and ZDNet is looking back at the most important cyber-security events that have taken place during the past ten years.
Over the past decade, we've seen it all. We've had monstrous #data #breaches, years of prolific #hacktivism, plenty of nation-state #cyber-#espionage operations, almost non-stop financially-motivated #cybercrime, and destructive #malware that has rendered systems unusable.
Below is a summary of the most important events of the 2010s, ordered by year. We didn't necessarily look at the biggest breaches or the most extensive hacking operations but instead focused on hacks and techniques that gave birth to a new cyber-security trend or were a paradigm shift in how experts looked at the entire field of cyber-security.
From the #Stuxnet attacks of 2010 to #China's extensive #mass-#surveillance of the #Uyghur #minority, we selected the most relevant events and explained why they were important.
👉🏼 Read more:
https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
China Uses DNA to Map Faces, With Help From the West
Beijing’s pursuit of control over a Muslim ethnic group pushes the rules of science and raises questions about consent.
TUMXUK, #China — In a dusty city in the #Xinjiang region on China’s western frontier, the #authorities are testing the #rules of #science.
With a million or more #ethnic #Uighurs and others from predominantly #Muslim #minority groups swept up in detentions across Xinjiang, officials in Tumxuk have gathered blood samples from hundreds of Uighurs — part of a mass #DNA collection effort dogged by questions about consent and how the data will be used.
In #Tumxuk, at least, there is a partial answer: Chinese #scientists are trying to find a way to use a DNA sample to create an image of a person’s face.
The #technology, which is also being developed in the #UnitedStates and elsewhere, is in the early stages of #development and can produce rough pictures good enough only to narrow a #manhunt or perhaps eliminate #suspects. But given the crackdown in Xinjiang, experts on ethics in science worry that China is building a #tool that could be used to justify and intensify #racial #profiling and other state #discrimination against Uighurs.
In the long term, experts say, it may even be possible for the Communist government to feed images produced from a DNA sample into the mass surveillance and facial recognition systems that it is building, tightening its grip on society by improving its ability to track dissidents and protesters as well as criminals.
Some of this research is taking place in labs run by China’s Ministry of Public Security, and at least two Chinese scientists working with the ministry on the technology have received funding from respected institutions in Europe. International scientific journals have published their findings without examining the origin of the DNA used in the studies or vetting the ethical questions raised by collecting such samples in Xinjiang.
In papers, the Chinese scientists said they followed norms set by international associations of scientists, which would require that the men in Tumxuk (pronounced TUM-shook) gave their blood willingly. But in Xinjiang, many people have no choice. The government collects samples under the veneer of a mandatory health checkup program, according to Uighurs who have fled the country. Those placed in internment camps — two of which are in Tumxuk — also have little choice.
👉🏼 Read more:
https://www.nytimes.com/2019/12/03/business/china-dna-uighurs-xinjiang.html
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Beijing’s pursuit of control over a Muslim ethnic group pushes the rules of science and raises questions about consent.
TUMXUK, #China — In a dusty city in the #Xinjiang region on China’s western frontier, the #authorities are testing the #rules of #science.
With a million or more #ethnic #Uighurs and others from predominantly #Muslim #minority groups swept up in detentions across Xinjiang, officials in Tumxuk have gathered blood samples from hundreds of Uighurs — part of a mass #DNA collection effort dogged by questions about consent and how the data will be used.
In #Tumxuk, at least, there is a partial answer: Chinese #scientists are trying to find a way to use a DNA sample to create an image of a person’s face.
The #technology, which is also being developed in the #UnitedStates and elsewhere, is in the early stages of #development and can produce rough pictures good enough only to narrow a #manhunt or perhaps eliminate #suspects. But given the crackdown in Xinjiang, experts on ethics in science worry that China is building a #tool that could be used to justify and intensify #racial #profiling and other state #discrimination against Uighurs.
In the long term, experts say, it may even be possible for the Communist government to feed images produced from a DNA sample into the mass surveillance and facial recognition systems that it is building, tightening its grip on society by improving its ability to track dissidents and protesters as well as criminals.
Some of this research is taking place in labs run by China’s Ministry of Public Security, and at least two Chinese scientists working with the ministry on the technology have received funding from respected institutions in Europe. International scientific journals have published their findings without examining the origin of the DNA used in the studies or vetting the ethical questions raised by collecting such samples in Xinjiang.
In papers, the Chinese scientists said they followed norms set by international associations of scientists, which would require that the men in Tumxuk (pronounced TUM-shook) gave their blood willingly. But in Xinjiang, many people have no choice. The government collects samples under the veneer of a mandatory health checkup program, according to Uighurs who have fled the country. Those placed in internment camps — two of which are in Tumxuk — also have little choice.
👉🏼 Read more:
https://www.nytimes.com/2019/12/03/business/china-dna-uighurs-xinjiang.html
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
FBI warns about snoopy smart TVs spying on you
An FBI branch office warns smart TV users that they can be gateways for hackers to come into your home. Meanwhile, the smart TV OEMs are already spying on you
A recent #FBI #report warned #smart #TV users that #hackers can also take control of your unsecured TV. "At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently #cyberstalk you," explained the FBI.
The risk isn't new. A few years ago, smart TVs from #LG, #Samsung, and #Vizio were #spying and #reporting on your viewing habits to their #manufacturers.
Today, the FBI is warning that "TV manufacturers and #app #developers may be listening and watching you." It added, "[A] television can also be a gateway for hackers to come into your home. A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the #backdoor through your #router."
That's true, but while there have been relatively few cases of hackers invading homes via their smart TVs, it's only a matter of time until they're watching and listening to you.
👉🏼 Read more:
https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
An FBI branch office warns smart TV users that they can be gateways for hackers to come into your home. Meanwhile, the smart TV OEMs are already spying on you
A recent #FBI #report warned #smart #TV users that #hackers can also take control of your unsecured TV. "At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently #cyberstalk you," explained the FBI.
The risk isn't new. A few years ago, smart TVs from #LG, #Samsung, and #Vizio were #spying and #reporting on your viewing habits to their #manufacturers.
Today, the FBI is warning that "TV manufacturers and #app #developers may be listening and watching you." It added, "[A] television can also be a gateway for hackers to come into your home. A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the #backdoor through your #router."
That's true, but while there have been relatively few cases of hackers invading homes via their smart TVs, it's only a matter of time until they're watching and listening to you.
👉🏼 Read more:
https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The iPhone 11 Pro’s Location Data Puzzler
One of the more curious behaviors of Apple’s new #iPhone 11 Pro is that it intermittently seeks the user’s location information even when all #applications and #system services on the phone are individually set to never request this data. #Apple says this is by design, but that response seems at odds with the company’s own #privacy #policy.
The privacy policy available from the iPhone’s #Location #Services screen says, “If Location Services is on, your iPhone will periodically send the geo-tagged locations of nearby Wi-Fi hotspots and cell towers (where supported by a device) in an anonymous and encrypted form to Apple, to be used for augmenting this #crowd-sourced #database of Wi-Fi hotspot and cell tower locations.”
The #policy explains users can disable all location services entirely with one swipe (by navigating to Settings > Privacy > Location Services, then switching “Location Services” to “off”). When one does this, the location services indicator — a small diagonal upward arrow to the left of the battery icon — no longer appears unless Location Services is re-enabled.
The policy continues: “You can also disable location-based system services by tapping on System Services and turning off each location-based system service.” But apparently there are some system services on this model (and possibly other iPhone 11 models) which request location data and cannot be disabled by users without completely turning off location services, as the arrow icon still appears periodically even after individually disabling all system services that use location.
On Nov. 13, #KrebsOnSecurity contacted Apple to report this as a possible privacy bug in the new iPhone Pro and/or in #iOS 13.x, sharing a #video showing how the device still seeks the user’s location when each app and system service is set to “never” request location information (but with the main Location Data service still turned on).
👉🏼 Video:
https://youtu.be/37_3hd_SK24
👉🏼 Read more:
https://krebsonsecurity.com/2019/12/the-iphone-11-pros-location-data-puzzler/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
One of the more curious behaviors of Apple’s new #iPhone 11 Pro is that it intermittently seeks the user’s location information even when all #applications and #system services on the phone are individually set to never request this data. #Apple says this is by design, but that response seems at odds with the company’s own #privacy #policy.
The privacy policy available from the iPhone’s #Location #Services screen says, “If Location Services is on, your iPhone will periodically send the geo-tagged locations of nearby Wi-Fi hotspots and cell towers (where supported by a device) in an anonymous and encrypted form to Apple, to be used for augmenting this #crowd-sourced #database of Wi-Fi hotspot and cell tower locations.”
The #policy explains users can disable all location services entirely with one swipe (by navigating to Settings > Privacy > Location Services, then switching “Location Services” to “off”). When one does this, the location services indicator — a small diagonal upward arrow to the left of the battery icon — no longer appears unless Location Services is re-enabled.
The policy continues: “You can also disable location-based system services by tapping on System Services and turning off each location-based system service.” But apparently there are some system services on this model (and possibly other iPhone 11 models) which request location data and cannot be disabled by users without completely turning off location services, as the arrow icon still appears periodically even after individually disabling all system services that use location.
On Nov. 13, #KrebsOnSecurity contacted Apple to report this as a possible privacy bug in the new iPhone Pro and/or in #iOS 13.x, sharing a #video showing how the device still seeks the user’s location when each app and system service is set to “never” request location information (but with the main Location Data service still turned on).
👉🏼 Video:
https://youtu.be/37_3hd_SK24
👉🏼 Read more:
https://krebsonsecurity.com/2019/12/the-iphone-11-pros-location-data-puzzler/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Two malicious Python libraries caught stealing SSH and GPG keys
One library was available for only two days, but the second was live for nearly a year.
The #Python #security #team removed two #trojanized #Python #libraries from #PyPI (Python Package Index) that were caught #stealing #SSH and #GPG keys from the projects of infected developers.
The two libraries were created by the same #developer and mimicked other more popular libraries -- using a technique called #typosquatting to register similarly-looking names.
The first is "python3-dateutil," which imitated the popular "dateutil" library. The second is "jeIlyfish" (the first L is an I), which mimicked the "jellyfish" library.
The two malicious clones were discovered on Sunday, December 1, by German software developer Lukas Martini. Both libraries were removed on the same day after Martini notified dateutil developers and the PyPI security team.
While the python3-dateutil was created and uploaded on PyPI two days before, on November 29, the jeIlyfish library had been available for nearly a year, since December 11, 2018.
👉🏼 Read more:
https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
One library was available for only two days, but the second was live for nearly a year.
The #Python #security #team removed two #trojanized #Python #libraries from #PyPI (Python Package Index) that were caught #stealing #SSH and #GPG keys from the projects of infected developers.
The two libraries were created by the same #developer and mimicked other more popular libraries -- using a technique called #typosquatting to register similarly-looking names.
The first is "python3-dateutil," which imitated the popular "dateutil" library. The second is "jeIlyfish" (the first L is an I), which mimicked the "jellyfish" library.
The two malicious clones were discovered on Sunday, December 1, by German software developer Lukas Martini. Both libraries were removed on the same day after Martini notified dateutil developers and the PyPI security team.
While the python3-dateutil was created and uploaded on PyPI two days before, on November 29, the jeIlyfish library had been available for nearly a year, since December 11, 2018.
👉🏼 Read more:
https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
You can hack anything - you just shouldn't get caught - #OpSec for data travellers
In this introductory talk we give an overview of the #risks of the #hacking #hobby: doors that are broken in, house searches and high legal fees obscure the enjoyment of free hacking.
Here it is worthwhile for the #hacking offspring to learn from the mistakes of others. We give classic examples of mistakes in #operational #security so that you don't have to make them.
📺 🇬🇧 🇫🇷 🇩🇪
https://media.ccc.de/v/35c3-9716-du_kannst_alles_hacken_du_darfst_dich_nur_nicht_erwischen_lassen
#video #CCC #Linus
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
In this introductory talk we give an overview of the #risks of the #hacking #hobby: doors that are broken in, house searches and high legal fees obscure the enjoyment of free hacking.
Here it is worthwhile for the #hacking offspring to learn from the mistakes of others. We give classic examples of mistakes in #operational #security so that you don't have to make them.
📺 🇬🇧 🇫🇷 🇩🇪
https://media.ccc.de/v/35c3-9716-du_kannst_alles_hacken_du_darfst_dich_nur_nicht_erwischen_lassen
#video #CCC #Linus
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Kashmiris Are Disappearing From WhatsApp
Kashmiris enduring their region's ongoing internet blackout are losing their WhatsApp accounts because of the platform's policy on inactive accounts.
On Wednesday, #Kashmiris began #disappearing from #WhatsApp — and no one initially knew why. #Citizens of the disputed geographical territory, whose autonomy the #Indian #government revoked in August, abruptly and inexplicably began departing WhatsApp groups in which they had long participated, leaving behind only a “[Phone number] left” message.
It's been four months since India’s government shut down Kashmir’s internet services, cutting off the region from the rest of the world. Because of this, some observers suspected that the Kashmiris who disappeared from their WhatsApp #groups this week did not do so on their own and may not even know anything has changed.
In a comment provided after this story's publication, a spokesperson for #Facebook, which owns WhatsApp, said the disappearances were the result of the messaging app's policy on inactive accounts.
"To maintain security and limit data retention, WhatsApp accounts generally expire after 120 days of inactivity," they wrote. "When that happens, those accounts automatically exit their WhatsApp groups. People will need to be re-added to groups upon regaining access to the Internet and joining WhatsApp again."
The spokesperson did not respond to questions from BuzzFeed News about how many Kashmiris were affected. Those whose profiles have expired will have to re-register on WhatsApp and recreate their profiles on the platform.
👉🏼 Read more:
https://www.buzzfeednews.com/article/pranavdixit/hundreds-of-kashmiris-are-disappearing-from-their-whatsapp
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Kashmiris enduring their region's ongoing internet blackout are losing their WhatsApp accounts because of the platform's policy on inactive accounts.
On Wednesday, #Kashmiris began #disappearing from #WhatsApp — and no one initially knew why. #Citizens of the disputed geographical territory, whose autonomy the #Indian #government revoked in August, abruptly and inexplicably began departing WhatsApp groups in which they had long participated, leaving behind only a “[Phone number] left” message.
It's been four months since India’s government shut down Kashmir’s internet services, cutting off the region from the rest of the world. Because of this, some observers suspected that the Kashmiris who disappeared from their WhatsApp #groups this week did not do so on their own and may not even know anything has changed.
In a comment provided after this story's publication, a spokesperson for #Facebook, which owns WhatsApp, said the disappearances were the result of the messaging app's policy on inactive accounts.
"To maintain security and limit data retention, WhatsApp accounts generally expire after 120 days of inactivity," they wrote. "When that happens, those accounts automatically exit their WhatsApp groups. People will need to be re-added to groups upon regaining access to the Internet and joining WhatsApp again."
The spokesperson did not respond to questions from BuzzFeed News about how many Kashmiris were affected. Those whose profiles have expired will have to re-register on WhatsApp and recreate their profiles on the platform.
👉🏼 Read more:
https://www.buzzfeednews.com/article/pranavdixit/hundreds-of-kashmiris-are-disappearing-from-their-whatsapp
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
FBI Puts $5 Million Bounty On Russian Hackers Behind Dridex Banking Malware
The #UnitedStates Department of Justice today disclosed the identities of two #Russian #hackers and charged them for developing and distributing the #Dridex #banking #Trojan using which the duo stole more than $100 million over a period of 10 years.
Maksim Yakubets, the leader of 'Evil Corp' hacking group, and his co-conspirator Igor Turashev primarily distributed Dridex — also known as 'Bugat' and 'Cridex' — through multi-million email campaigns and targeted numerous organizations around the world.
👉🏼 Read more:
https://thehackernews.com/2019/12/dridex-russian-hackers-wanted-by-fbi.html
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
The #UnitedStates Department of Justice today disclosed the identities of two #Russian #hackers and charged them for developing and distributing the #Dridex #banking #Trojan using which the duo stole more than $100 million over a period of 10 years.
Maksim Yakubets, the leader of 'Evil Corp' hacking group, and his co-conspirator Igor Turashev primarily distributed Dridex — also known as 'Bugat' and 'Cridex' — through multi-million email campaigns and targeted numerous organizations around the world.
👉🏼 Read more:
https://thehackernews.com/2019/12/dridex-russian-hackers-wanted-by-fbi.html
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Congratulations, YouTube... Now Show Your Work
Earlier this week, #YouTube finally acknowledged their #recommendation #engine suggests harmful content. It’s a small step in the right direction, but YouTube still has a long history of dismissing independent #researchers. We created a #timeline to prove it.
Over the past year and some, it’s been like clockwork.
First: a news story emerges about YouTube’s recommendation engine harming users. Take your pick: The #algorithm has radicalized young adults in the U.S., sowed division in #Brazil, spread state-sponsored #propaganda in #HongKong, and more.
Then: YouTube responds. But not by admitting fault or detailing a solution. Instead, the company issues a statement diffusing blame, criticising the research methodologies used to investigate their recommendations, and vaguely promising that they’re working on it.
In a blog post earlier this week, YouTube acknowledged that their recommendation engine has been suggesting borderline content to users and posted a timeline showing that they’ve dedicated significant resources towards fixing this problem for several years. What they fail to acknowledge is how they have been evading and dismissing journalists and academics who have been highlighting this problem for years. Further, there is still a glaring absence of publicly verifiable data that supports YouTube’s claims that they are fixing the problem.
That’s why today, #Mozilla is publishing an #inventory of YouTube’s responses to external #research into their recommendation engine. Our timeline chronicles 14 responses — all evasive or dismissive — issued over the span of 22 months. You can find them below, in reverse chronological order.
💡 We noticed a few trends across these statements:
‼️ YouTube often claims it’s addressing the issue by tweaking its algorithm, but provides almost no detail into what, exactly, those tweaks are
‼️ YouTube claims to have data that disproves independent research — but, refuses to share that data
‼️ YouTube dismisses independent research into this topic as misguided or anecdotal, but refuses to allow third-party access to its data in order to confirm this
👉🏼 Read more:
https://foundation.mozilla.org/en/blog/congratulations-youtube-now-show-your-work/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Earlier this week, #YouTube finally acknowledged their #recommendation #engine suggests harmful content. It’s a small step in the right direction, but YouTube still has a long history of dismissing independent #researchers. We created a #timeline to prove it.
Over the past year and some, it’s been like clockwork.
First: a news story emerges about YouTube’s recommendation engine harming users. Take your pick: The #algorithm has radicalized young adults in the U.S., sowed division in #Brazil, spread state-sponsored #propaganda in #HongKong, and more.
Then: YouTube responds. But not by admitting fault or detailing a solution. Instead, the company issues a statement diffusing blame, criticising the research methodologies used to investigate their recommendations, and vaguely promising that they’re working on it.
In a blog post earlier this week, YouTube acknowledged that their recommendation engine has been suggesting borderline content to users and posted a timeline showing that they’ve dedicated significant resources towards fixing this problem for several years. What they fail to acknowledge is how they have been evading and dismissing journalists and academics who have been highlighting this problem for years. Further, there is still a glaring absence of publicly verifiable data that supports YouTube’s claims that they are fixing the problem.
That’s why today, #Mozilla is publishing an #inventory of YouTube’s responses to external #research into their recommendation engine. Our timeline chronicles 14 responses — all evasive or dismissive — issued over the span of 22 months. You can find them below, in reverse chronological order.
💡 We noticed a few trends across these statements:
‼️ YouTube often claims it’s addressing the issue by tweaking its algorithm, but provides almost no detail into what, exactly, those tweaks are
‼️ YouTube claims to have data that disproves independent research — but, refuses to share that data
‼️ YouTube dismisses independent research into this topic as misguided or anecdotal, but refuses to allow third-party access to its data in order to confirm this
👉🏼 Read more:
https://foundation.mozilla.org/en/blog/congratulations-youtube-now-show-your-work/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Privacy Analysis of Tiktok’s App and Website (#PoC)
I did a detailed privacy check of the Tiktok app and website. Tiktok commits multiple breaches of law, trust, transparency and data protection.
Here are all technical and legal details. You can read a less technical article about it at the Süddeutsche Zeitung (german).
This is my setup: I used #mitmproxy to route all #app #traffic for #analysis. See in this #video how device information, usage time and watched videos are sent to #Appsflyer and #Facebook.
Hard to believe that this is covered by „legitimate interest“ and transparency: Entered search terms are sent to Facebook...
👉🏼 Read more:
https://rufposten.de/blog/2019/12/05/privacy-analysis-of-tiktoks-app-and-website/
#TikTok #PoC
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
I did a detailed privacy check of the Tiktok app and website. Tiktok commits multiple breaches of law, trust, transparency and data protection.
Here are all technical and legal details. You can read a less technical article about it at the Süddeutsche Zeitung (german).
This is my setup: I used #mitmproxy to route all #app #traffic for #analysis. See in this #video how device information, usage time and watched videos are sent to #Appsflyer and #Facebook.
Hard to believe that this is covered by „legitimate interest“ and transparency: Entered search terms are sent to Facebook...
👉🏼 Read more:
https://rufposten.de/blog/2019/12/05/privacy-analysis-of-tiktoks-app-and-website/
#TikTok #PoC
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Conservative government giving NHS data to Amazon for free, documents reveal
US company will be able to access all ‘healthcare information, including without limitation symptoms, causes, and definitions’
#NHS #data on the #health of the #population is being handed over to #Amazon at no charge under a controversial deal between the #USA giant and the #Department of Health and Social Care.
While individual patient data is not being given to the company, a copy of the December 2018 contract between Amazon and the #DHSC reveals the company will be able to profit from its access to a range of NHS information.
Health secretary Matt #Hancock hailed the deal with Amazon in July as a way to help give patients better medical advice using #technology such as #Alexa, which uses Amazon’s #algorithm to answer key question.
Campaigners from #Privacy International obtained a copy of the contract using freedom of information laws. The full contract reveals the deal goes far beyond medical advice for use by Alexa.
It states the company will be able to access all “healthcare information, including without limitation symptoms, causes, and definitions, and all related copyrightable content, data, information and other materials”, the DHSC has.
The contract allows Amazon to use this data in a number of ways – not just providing advice to UK users.
👉🏼 Read more:
https://www.independent.co.uk/news/health/amazon-nhs-data-access-uk-government-contract-a9237901.html
#DeleteAmazon #UK #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
US company will be able to access all ‘healthcare information, including without limitation symptoms, causes, and definitions’
#NHS #data on the #health of the #population is being handed over to #Amazon at no charge under a controversial deal between the #USA giant and the #Department of Health and Social Care.
While individual patient data is not being given to the company, a copy of the December 2018 contract between Amazon and the #DHSC reveals the company will be able to profit from its access to a range of NHS information.
Health secretary Matt #Hancock hailed the deal with Amazon in July as a way to help give patients better medical advice using #technology such as #Alexa, which uses Amazon’s #algorithm to answer key question.
Campaigners from #Privacy International obtained a copy of the contract using freedom of information laws. The full contract reveals the deal goes far beyond medical advice for use by Alexa.
It states the company will be able to access all “healthcare information, including without limitation symptoms, causes, and definitions, and all related copyrightable content, data, information and other materials”, the DHSC has.
The contract allows Amazon to use this data in a number of ways – not just providing advice to UK users.
👉🏼 Read more:
https://www.independent.co.uk/news/health/amazon-nhs-data-access-uk-government-contract-a9237901.html
#DeleteAmazon #UK #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Banned recording reveals: China ambassador threatened Faroese leader at secret meeting
China's ambassador to Denmark threatened the Faroese prime minister by indicating that a trade agreement would be dropped if the autonomous Danish archipelago does not sign a 5G contract with technology giant Huawei, Berlingske can now reveal.
#China ambassador to #Denmark, Mr. Feng Tie, made overt #threats to prominent members of the #Faroese #government in order to secure a strategically important contract for the #Chinese telecoms giant #Huawei, by indicating that the Chinese government would drop a free trade agreement with the Faroe Islands if the company did not get the contract.
This appears from an #audio #recording which was subsequently banned from publication, #Berlingske can now reveal.
The recording marks the first instance where the Chinese government has linked access to China's huge market to Huawei being awarded contracts for #5G #networks in #Europe. Huawei has publicly stated that it is a private company with no ties to the Chinese state.
For the past seven days, the Faroese government has sought to keep the recording a secret by getting an injunction to prevent the Faroese TV station Kringvarp Føroya from publishing its content. Kringvarp Føroya had planned to reveal the recording in a Faroese news broadcast Monday a week ago.
But as Berlingske can now reveal, the audio clip clearly indicates how the Chinese top #diplomat used the meeting to unequivocally tie the Huawei contract to wider trade interests, which would particularly affect the Faroe Islands' large and growing exports of salmon to China.
👉🏼 Read more:
https://www.berlingske.dk/internationalt/banned-recording-reveals-china-ambassador-threatened-faroese-leader
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
China's ambassador to Denmark threatened the Faroese prime minister by indicating that a trade agreement would be dropped if the autonomous Danish archipelago does not sign a 5G contract with technology giant Huawei, Berlingske can now reveal.
#China ambassador to #Denmark, Mr. Feng Tie, made overt #threats to prominent members of the #Faroese #government in order to secure a strategically important contract for the #Chinese telecoms giant #Huawei, by indicating that the Chinese government would drop a free trade agreement with the Faroe Islands if the company did not get the contract.
This appears from an #audio #recording which was subsequently banned from publication, #Berlingske can now reveal.
The recording marks the first instance where the Chinese government has linked access to China's huge market to Huawei being awarded contracts for #5G #networks in #Europe. Huawei has publicly stated that it is a private company with no ties to the Chinese state.
For the past seven days, the Faroese government has sought to keep the recording a secret by getting an injunction to prevent the Faroese TV station Kringvarp Føroya from publishing its content. Kringvarp Føroya had planned to reveal the recording in a Faroese news broadcast Monday a week ago.
But as Berlingske can now reveal, the audio clip clearly indicates how the Chinese top #diplomat used the meeting to unequivocally tie the Huawei contract to wider trade interests, which would particularly affect the Faroe Islands' large and growing exports of salmon to China.
👉🏼 Read more:
https://www.berlingske.dk/internationalt/banned-recording-reveals-china-ambassador-threatened-faroese-leader
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Ring’s Hidden Data Let Us Map Amazon's Sprawling Home Surveillance Network
As reporters raced this summer to bring new details of Ring’s law enforcement contracts to light, the home security company, acquired last year by Amazon for a whopping $1 billion, strove to underscore the privacy it had pledged to provide users.
Even as its #creeping objective of ensuring an ever-expanding #network of home #security devices eventually becomes indispensable to daily #police work, #Ring promised its customers would always have a choice in “what information, if any, they share with law enforcement.” While it quietly toiled to minimize what police officials could reveal about Ring’s police partnerships to the public, it vigorously reinforced its obligation to the privacy of its customers—and to the users of its crime-alert #app, #Neighbors.
However, a #Gizmodo #investigation, which began last month and ultimately revealed the potential locations of up to tens of thousands of Ring #cameras, has cast new doubt on the effectiveness of the company’s privacy safeguards. It further offers one of the most “striking” and “disturbing” glimpses yet, privacy experts said, of #Amazon’s privately run, #omni-#surveillance shroud that’s enveloping U.S. cities.
Gizmodo has acquired data over the past month connected to nearly 65,800 individual posts shared by users of the Neighbors app. The posts, which reach back 500 days from the point of collection, offer extraordinary insight into the proliferation of Ring video surveillance across #American #neighborhoods and raise important questions about the #privacy trade-offs of a consumer-driven network of surveillance cameras controlled by one of the world’s most powerful corporations.
And not just for those whose faces have been recorded.
👉🏼 Read more:
https://gizmodo.com/ring-s-hidden-data-let-us-map-amazons-sprawling-home-su-1840312279
#DeleteAmazon #DeleteRing #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
As reporters raced this summer to bring new details of Ring’s law enforcement contracts to light, the home security company, acquired last year by Amazon for a whopping $1 billion, strove to underscore the privacy it had pledged to provide users.
Even as its #creeping objective of ensuring an ever-expanding #network of home #security devices eventually becomes indispensable to daily #police work, #Ring promised its customers would always have a choice in “what information, if any, they share with law enforcement.” While it quietly toiled to minimize what police officials could reveal about Ring’s police partnerships to the public, it vigorously reinforced its obligation to the privacy of its customers—and to the users of its crime-alert #app, #Neighbors.
However, a #Gizmodo #investigation, which began last month and ultimately revealed the potential locations of up to tens of thousands of Ring #cameras, has cast new doubt on the effectiveness of the company’s privacy safeguards. It further offers one of the most “striking” and “disturbing” glimpses yet, privacy experts said, of #Amazon’s privately run, #omni-#surveillance shroud that’s enveloping U.S. cities.
Gizmodo has acquired data over the past month connected to nearly 65,800 individual posts shared by users of the Neighbors app. The posts, which reach back 500 days from the point of collection, offer extraordinary insight into the proliferation of Ring video surveillance across #American #neighborhoods and raise important questions about the #privacy trade-offs of a consumer-driven network of surveillance cameras controlled by one of the world’s most powerful corporations.
And not just for those whose faces have been recorded.
👉🏼 Read more:
https://gizmodo.com/ring-s-hidden-data-let-us-map-amazons-sprawling-home-su-1840312279
#DeleteAmazon #DeleteRing #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Project DREAD: White House veterans helped Gulf monarchy build secret surveillance unit
In the years after 9/11, former U.S. counterterrorism czar Richard Clarke warned Congress that the country needed more expansive spying powers to prevent another catastrophe. Five years after leaving government, he shopped the same idea to an enthusiastic partner: an Arab monarchy with deep pockets.
In 2008, Clarke went to work as a consultant guiding the United Arab Emirates as it created a cyber surveillance capability that would utilize top American intelligence contractors to help monitor threats against the tiny nation.
The secret unit Clarke helped create had an ominous acronym: #DREAD, short for #Development #Research #Exploitation and #Analysis #Department. In the years that followed, the #UAE unit expanded its hunt far beyond suspected extremists to include a #Saudi women’s rights activist, diplomats at the United Nations and personnel at #FIFA, the world soccer body. By 2012, the program would be known among its #American operatives by a codename: #Project #Raven.
Reuters reports this year revealed how a group of former National Security Agency operatives and other elite American intelligence veterans helped the UAE spy on a wide range of targets through the previously undisclosed program — from terrorists to human rights activists, journalists and dissidents.
Now, an examination of the origins of DREAD, reported here for the first time, shows how a pair of former senior White House leaders, working with ex-#NSA #spies and #Beltway contractors, played pivotal roles in building a program whose actions are now under scrutiny by federal authorities.
To chart the UAE spying mission’s evolution, #Reuters examined more than 10,000 DREAD program documents and interviewed more than a dozen contractors, intelligence operatives and former government insiders with direct knowledge of the program. The documents Reuters reviewed span nearly a decade of the DREAD program, starting in 2008, and include internal memos describing the project’s logistics, operational plans and targets.
Clarke was the first in a string of former White House and U.S. defense executives who arrived in the UAE after 9/11 to build the spying unit. Utilizing his close relationship to the country’s rulers, forged through decades of experience as a senior U.S. decision-maker, Clarke won numerous security consulting contracts in the UAE. One of them was to help build the secret spying unit in an unused airport facility in Abu Dhabi.
👉🏼 Read more:
https://www.reuters.com/investigates/special-report/usa-raven-whitehouse/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
In the years after 9/11, former U.S. counterterrorism czar Richard Clarke warned Congress that the country needed more expansive spying powers to prevent another catastrophe. Five years after leaving government, he shopped the same idea to an enthusiastic partner: an Arab monarchy with deep pockets.
In 2008, Clarke went to work as a consultant guiding the United Arab Emirates as it created a cyber surveillance capability that would utilize top American intelligence contractors to help monitor threats against the tiny nation.
The secret unit Clarke helped create had an ominous acronym: #DREAD, short for #Development #Research #Exploitation and #Analysis #Department. In the years that followed, the #UAE unit expanded its hunt far beyond suspected extremists to include a #Saudi women’s rights activist, diplomats at the United Nations and personnel at #FIFA, the world soccer body. By 2012, the program would be known among its #American operatives by a codename: #Project #Raven.
Reuters reports this year revealed how a group of former National Security Agency operatives and other elite American intelligence veterans helped the UAE spy on a wide range of targets through the previously undisclosed program — from terrorists to human rights activists, journalists and dissidents.
Now, an examination of the origins of DREAD, reported here for the first time, shows how a pair of former senior White House leaders, working with ex-#NSA #spies and #Beltway contractors, played pivotal roles in building a program whose actions are now under scrutiny by federal authorities.
To chart the UAE spying mission’s evolution, #Reuters examined more than 10,000 DREAD program documents and interviewed more than a dozen contractors, intelligence operatives and former government insiders with direct knowledge of the program. The documents Reuters reviewed span nearly a decade of the DREAD program, starting in 2008, and include internal memos describing the project’s logistics, operational plans and targets.
Clarke was the first in a string of former White House and U.S. defense executives who arrived in the UAE after 9/11 to build the spying unit. Utilizing his close relationship to the country’s rulers, forged through decades of experience as a senior U.S. decision-maker, Clarke won numerous security consulting contracts in the UAE. One of them was to help build the secret spying unit in an unused airport facility in Abu Dhabi.
👉🏼 Read more:
https://www.reuters.com/investigates/special-report/usa-raven-whitehouse/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Dozens of telegram accounts hacked in Russia
If you log on to #Telegram, you usually get a secret code sent to your mobile phone. Only with this secret code you can access your Telegram #account. According to the #security #researchers of the IB group, however, #hackers managed to gain access to these #secret #codes and successfully retrieve telegram chats from a handful of Russian users.
Dmitry Rodin, runs a successful code school in Russia. In a conversation with #Forbes magazine, he now confirmed the incidents. His Telegram account was also successfully #hacked. He told the media that he had received a telegram warning that someone had tried to access his account. Dmitry Rodin ignored the first notification, but there was another warning. Someone from Samara, Russia, had successfully logged into his account. He immediately ended all active sessions except his own.
#GroupIB and Dmitry Rodin are both pretty sure that no #vulnerability in the Telegram Messenger was #exploited to gain access to the affected Telegram accounts.
"Maybe someone logged into my account by intercepting the SMS. This would indicate that there is a problem on the operator's side. This would mean that other accounts that use SMS as an authentication factor are also threatened." (Dmitry Rodin)
Group-IB has been informed about at least 13 such cases so far. The security researchers of Group-IB assume, however, that it will not stay that way. Moreover, they speak of a completely new type of threat for anyone who uses SMS codes to log in.
"This number is likely to increase, however, as it is a new type of threat that is just beginning to spread" (Group-IB)
Most worryingly, both Group-IB and Dmitry Rodin suspect that passwords (OTP) were compromised at one point. If this hypothesis is true, it is a very large security #threat, as this technology is used in many logins and financial transactions around the world.
👉🏼 Read more:
https://www.forbes.com/sites/thomasbrewster/2019/12/12/mystery-russian-telegram-hacks-intercept-secret-codes-to-spy-on-messages
👉🏼 Read as well:
https://tarnkappe.info/group-ib-dutzende-telegram-accounts-in-russland-gehackt/
📺 Ability Inc. Advert 1:
https://youtu.be/CfnVvptL-8E
📺 Ability Inc. Advert 2:
https://youtu.be/FwdnY-EIMRc
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
If you log on to #Telegram, you usually get a secret code sent to your mobile phone. Only with this secret code you can access your Telegram #account. According to the #security #researchers of the IB group, however, #hackers managed to gain access to these #secret #codes and successfully retrieve telegram chats from a handful of Russian users.
Dmitry Rodin, runs a successful code school in Russia. In a conversation with #Forbes magazine, he now confirmed the incidents. His Telegram account was also successfully #hacked. He told the media that he had received a telegram warning that someone had tried to access his account. Dmitry Rodin ignored the first notification, but there was another warning. Someone from Samara, Russia, had successfully logged into his account. He immediately ended all active sessions except his own.
#GroupIB and Dmitry Rodin are both pretty sure that no #vulnerability in the Telegram Messenger was #exploited to gain access to the affected Telegram accounts.
"Maybe someone logged into my account by intercepting the SMS. This would indicate that there is a problem on the operator's side. This would mean that other accounts that use SMS as an authentication factor are also threatened." (Dmitry Rodin)
Group-IB has been informed about at least 13 such cases so far. The security researchers of Group-IB assume, however, that it will not stay that way. Moreover, they speak of a completely new type of threat for anyone who uses SMS codes to log in.
"This number is likely to increase, however, as it is a new type of threat that is just beginning to spread" (Group-IB)
Most worryingly, both Group-IB and Dmitry Rodin suspect that passwords (OTP) were compromised at one point. If this hypothesis is true, it is a very large security #threat, as this technology is used in many logins and financial transactions around the world.
👉🏼 Read more:
https://www.forbes.com/sites/thomasbrewster/2019/12/12/mystery-russian-telegram-hacks-intercept-secret-codes-to-spy-on-messages
👉🏼 Read as well:
https://tarnkappe.info/group-ib-dutzende-telegram-accounts-in-russland-gehackt/
📺 Ability Inc. Advert 1:
https://youtu.be/CfnVvptL-8E
📺 Ability Inc. Advert 2:
https://youtu.be/FwdnY-EIMRc
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Forwarded from MicroG Support
Avoid Google apps spyware!
📡 @NoGoolag (links at @microGsupport)
★English Group:
https://t.me/joinchat/FyFlS0X2D7eDayZ4R4Gkzw
★Indonesian Group:
https://t.me/joinchat/HVU5S1HNr9FuSwsX0vRCuQ
★Off-Topic Group:
https://t.me/joinchat/LepbVElZLJbkWMRBNhcPfA
★Guide: t.me/NoGoolag/63
★Installers: t.me/NoGoolag/182
More software
📡 @Libreware
📡 @AuroraOfficial Aurora sw channel
💬 @AuroraSupport Aurora Store group (Foss playstore alternative)
💬 @AuroraDroid Aurora Droid group (F-Droid client)
💬 @AuroraOSS
Group to discuss upcoming Aurora projects (Contacts & Dialer, Aurora Services, Aurora Sync, Aurora Maps)
🦊 Firefox Configuration hardening: @qd_invitation
News
📡 @cRyPtHoN_INFOSEC_EN
📡 @cRyPtHoN_INFOSEC_DE
📡 @NoGoolag (links at @microGsupport)
★English Group:
https://t.me/joinchat/FyFlS0X2D7eDayZ4R4Gkzw
★Indonesian Group:
https://t.me/joinchat/HVU5S1HNr9FuSwsX0vRCuQ
★Off-Topic Group:
https://t.me/joinchat/LepbVElZLJbkWMRBNhcPfA
★Guide: t.me/NoGoolag/63
★Installers: t.me/NoGoolag/182
More software
📡 @Libreware
📡 @AuroraOfficial Aurora sw channel
💬 @AuroraSupport Aurora Store group (Foss playstore alternative)
💬 @AuroraDroid Aurora Droid group (F-Droid client)
💬 @AuroraOSS
Group to discuss upcoming Aurora projects (Contacts & Dialer, Aurora Services, Aurora Sync, Aurora Maps)
🦊 Firefox Configuration hardening: @qd_invitation
News
📡 @cRyPtHoN_INFOSEC_EN
📡 @cRyPtHoN_INFOSEC_DE
Data octopuses: Not only Google wants to know where you are and what you do
Google's location tracking on Android devices is legendary. Privacy is almost always a huge problem. Data protectors regularly go to the barricades. Law enforcement agencies are rubbing their hands more and more often. What's more, the largest data octopus of all has created an "unprecedented" data collection system for law enforcement agencies. A data collection that we usually always and mostly unknowingly agree to. But our Android smartphone or iPhone also reveals a lot about us. And that regardless of whether we want it or not.
Why do we unknowingly agree with the passion for data collection, some readers will surely ask. You can turn off location tracking in the settings. Or I simply switch to the so-called "aircraft mode", or alternatively take my SIM card out of the mobile phone. Then Google can no longer track my location and everything is fine, you think. Why this is not quite right and what our android or iPhone and others collect so much data about us, we want to take a closer look at today in this article.
Location tracking: Google doesn't do things by halves
Even if we deactivate the "location history" or "location history" for iPhones and Android smartphones, the data octopus Google continues to locate its users. Even if the function "location history" is switched off, Google or Apps, which we have installed on our Android, evaluates the user's location and saves it locally on the respective device. If we open certain apps or services, the data is then transferred. Even in "airplane mode" or without a SIM card, Google collects location data for each of our steps in the background, i.e. indirectly. As soon as our smartphone has access to the Internet again, the data collected about us in the meantime is automatically uploaded to Google's Sensorvault database.
📺 Video:
https://t.me/NoGoolag/76
👉🏽 Google is Malware
https://www.gnu.org/proprietary/malware-google.html
👉🏽 Read more:
https://tarnkappe.info/datenkraken-nicht-nur-google-moechte-immer-wissen-wo-ihr-seid/
#DeleteGoogle #GoogleMalware #DataStealers #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Google's location tracking on Android devices is legendary. Privacy is almost always a huge problem. Data protectors regularly go to the barricades. Law enforcement agencies are rubbing their hands more and more often. What's more, the largest data octopus of all has created an "unprecedented" data collection system for law enforcement agencies. A data collection that we usually always and mostly unknowingly agree to. But our Android smartphone or iPhone also reveals a lot about us. And that regardless of whether we want it or not.
Why do we unknowingly agree with the passion for data collection, some readers will surely ask. You can turn off location tracking in the settings. Or I simply switch to the so-called "aircraft mode", or alternatively take my SIM card out of the mobile phone. Then Google can no longer track my location and everything is fine, you think. Why this is not quite right and what our android or iPhone and others collect so much data about us, we want to take a closer look at today in this article.
Location tracking: Google doesn't do things by halves
Even if we deactivate the "location history" or "location history" for iPhones and Android smartphones, the data octopus Google continues to locate its users. Even if the function "location history" is switched off, Google or Apps, which we have installed on our Android, evaluates the user's location and saves it locally on the respective device. If we open certain apps or services, the data is then transferred. Even in "airplane mode" or without a SIM card, Google collects location data for each of our steps in the background, i.e. indirectly. As soon as our smartphone has access to the Internet again, the data collected about us in the meantime is automatically uploaded to Google's Sensorvault database.
📺 Video:
https://t.me/NoGoolag/76
👉🏽 Google is Malware
https://www.gnu.org/proprietary/malware-google.html
👉🏽 Read more:
https://tarnkappe.info/datenkraken-nicht-nur-google-moechte-immer-wissen-wo-ihr-seid/
#DeleteGoogle #GoogleMalware #DataStealers #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
First Lawsuit of Its Kind Accuses Big Tech of Profiting From Child Labor in Cobalt Mines
#Apple, #Google, #Microsoft, #Dell, and #Tesla are being sued over their alleged reliance on #cobalt mined by #children.
In the first lawsuit of its kind, Apple, Google, Microsoft, Dell, and Tesla are being sued on behalf of 14 Congolese families whose children were killed or permanently injured while illegally mining cobalt for electronics made by these companies.
Filed in #UnitedStates District Court for the District of Columbia by human rights group International Rights Advocates, the federal class-action lawsuit alleges the companies "aided and abetted" a system of #forced child labor and had "specific knowledge" of the conditions these children were working in but did not act to protect their profit margins.
"Apple, #Alphabet, Dell, Microsoft, and Tesla all have specific policies claiming to prohibit child labour in their supply chains," said IRAdvocates in the complaint. "Their failure to actually implement these policies to stop forced #child #labour in cobalt #mining is an intentional act to avoid ending the windfall of getting cheap cobalt."
Cobalt is an important component of lithium-ion #batteries that are used in many modern #electronics. In the lawsuit, the families argue that their children were #illegally working at cobalt mines owned by #Glencore, the world's largest cobalt producer. Glencore then supplied cobalt to #Umicore, a #Belgian mining company and metals trader. Umicore then provided cobalt for lithium-ion batteries to Apple, Google, Tesla, and Dell. Also implicated is Zhejiang Huayou Cobalt, a #Chinese cobalt producer, which works with Apple, Dell, and Microsoft.
👉🏽 Read more:
https://www.vice.com/en_us/article/bvg8n8/first-lawsuit-of-its-kind-accuses-big-tech-of-profiting-from-child-labor-in-cobalt-mines
#DeleteGoogle
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
#Apple, #Google, #Microsoft, #Dell, and #Tesla are being sued over their alleged reliance on #cobalt mined by #children.
In the first lawsuit of its kind, Apple, Google, Microsoft, Dell, and Tesla are being sued on behalf of 14 Congolese families whose children were killed or permanently injured while illegally mining cobalt for electronics made by these companies.
Filed in #UnitedStates District Court for the District of Columbia by human rights group International Rights Advocates, the federal class-action lawsuit alleges the companies "aided and abetted" a system of #forced child labor and had "specific knowledge" of the conditions these children were working in but did not act to protect their profit margins.
"Apple, #Alphabet, Dell, Microsoft, and Tesla all have specific policies claiming to prohibit child labour in their supply chains," said IRAdvocates in the complaint. "Their failure to actually implement these policies to stop forced #child #labour in cobalt #mining is an intentional act to avoid ending the windfall of getting cheap cobalt."
Cobalt is an important component of lithium-ion #batteries that are used in many modern #electronics. In the lawsuit, the families argue that their children were #illegally working at cobalt mines owned by #Glencore, the world's largest cobalt producer. Glencore then supplied cobalt to #Umicore, a #Belgian mining company and metals trader. Umicore then provided cobalt for lithium-ion batteries to Apple, Google, Tesla, and Dell. Also implicated is Zhejiang Huayou Cobalt, a #Chinese cobalt producer, which works with Apple, Dell, and Microsoft.
👉🏽 Read more:
https://www.vice.com/en_us/article/bvg8n8/first-lawsuit-of-its-kind-accuses-big-tech-of-profiting-from-child-labor-in-cobalt-mines
#DeleteGoogle
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
With artificial intelligence: Google makes now animal protection
Google has discovered a new field for itself. With the help of a huge network of wild cameras, the company monitors the populations of various animal species. An AI classifies the animals on the images.
📺 Bringing Cutting-Edge Technology to Wildlife Conservation
https://www.wildlifeinsights.org/
#DeleteGoogle #wildlifeinsights #ai #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN
Google has discovered a new field for itself. With the help of a huge network of wild cameras, the company monitors the populations of various animal species. An AI classifies the animals on the images.
📺 Bringing Cutting-Edge Technology to Wildlife Conservation
https://www.wildlifeinsights.org/
#DeleteGoogle #wildlifeinsights #ai #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@FLOSSb0xIN