Qustodio 2020 Annual Report on Children's Digital Habits.pdf
15.3 MB
Children spend 80 minutes a day with Tiktok - almost as much as Youtube
Tiktok is becoming increasingly popular with children and is now almost on a par with YouTube. Children between the ages of 4 and 15 spend an average of 80 minutes a day on Tiktok, according to a report by Qustodio, a provider of parental control apps. On Youtube, it's five minutes more.
๐๐ผ PDF ๐ฌ๐ง:
https://qweb.cdn.prismic.io/qweb/e59c2e0f-ef4f-4598-b330-10c430e2ec71_Qustodio+2020+Annual+Report+on+Children%27s+Digital+Habits.pdf
๐๐ผ Read more ๐ฉ๐ช:
https://t3n.de/news/kinder-verbringen-taeglich-80-1288824
#tiktok #youtube #digitalhabits #thinkabout #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Tiktok is becoming increasingly popular with children and is now almost on a par with YouTube. Children between the ages of 4 and 15 spend an average of 80 minutes a day on Tiktok, according to a report by Qustodio, a provider of parental control apps. On Youtube, it's five minutes more.
๐๐ผ PDF ๐ฌ๐ง:
https://qweb.cdn.prismic.io/qweb/e59c2e0f-ef4f-4598-b330-10c430e2ec71_Qustodio+2020+Annual+Report+on+Children%27s+Digital+Habits.pdf
๐๐ผ Read more ๐ฉ๐ช:
https://t3n.de/news/kinder-verbringen-taeglich-80-1288824
#tiktok #youtube #digitalhabits #thinkabout #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Fake ransomware decryptor double-encrypts desperate victims' files
A fake decryptor for the STOP Djvu Ransomware is being distributed that lures already desperate people with the promise of free decryption. Instead of getting their files back for free, they are infected with another ransomware that makes their situation even worse.
While ransomware operations such as Maze, REvil, Netwalker, and DoppelPaymer get wide media attention due to their high worth victims, another ransomware called STOP Djvu is infecting more people then all of them combined on a daily basis.
With over 600 submissions a day to the ID-Ransomware ransomware identification service, STOP ransomware is the most actively distributed ransomware over the past year.
Emsisoft and Michael Gillespie had previously released a decryptor for older STOP Djvu variants, but newer variants cannot be decrypted for free.
If the ransomware is so common, you may be wondering why it doesn't get much attention?
The lack of attention is simply because the ransomware mostly affects home users infected through adware bundles pretending to be software cracks.
While downloading and installing cracks is not excusable, many of those who are infected simply cannot afford to pay a $500 ransom for a decryptor.
Double-encrypting someone's data with a second ransomware is just kicking someone while they are already down.
๐๐ผ Read more:
https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/
https://twitter.com/demonslay335/status/1268908281151586304
https://www.golem.de/news/zorab-schadsoftware-ransomware-tarnt-sich-als-entschluesselungs-tool-2006-148959.html
#zorab #Djvu #fake #ransomware #decryptor
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
A fake decryptor for the STOP Djvu Ransomware is being distributed that lures already desperate people with the promise of free decryption. Instead of getting their files back for free, they are infected with another ransomware that makes their situation even worse.
While ransomware operations such as Maze, REvil, Netwalker, and DoppelPaymer get wide media attention due to their high worth victims, another ransomware called STOP Djvu is infecting more people then all of them combined on a daily basis.
With over 600 submissions a day to the ID-Ransomware ransomware identification service, STOP ransomware is the most actively distributed ransomware over the past year.
Emsisoft and Michael Gillespie had previously released a decryptor for older STOP Djvu variants, but newer variants cannot be decrypted for free.
If the ransomware is so common, you may be wondering why it doesn't get much attention?
The lack of attention is simply because the ransomware mostly affects home users infected through adware bundles pretending to be software cracks.
While downloading and installing cracks is not excusable, many of those who are infected simply cannot afford to pay a $500 ransom for a decryptor.
Double-encrypting someone's data with a second ransomware is just kicking someone while they are already down.
๐๐ผ Read more:
https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/
https://twitter.com/demonslay335/status/1268908281151586304
https://www.golem.de/news/zorab-schadsoftware-ransomware-tarnt-sich-als-entschluesselungs-tool-2006-148959.html
#zorab #Djvu #fake #ransomware #decryptor
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
BleepingComputer
Fake ransomware decryptor double-encrypts desperate victims' files
A fake decryptor for the STOP Djvu Ransomware is being distributed that lures already desperate people with the promise of free decryption. Instead of getting their files back for free, they are infected with another ransomware that makes their situationโฆ
The A1 Telekom Austria Hack - they came in through the web shells
On the 3rd of February 2020 I received an encrypted email on 3 of my email addresses from a person calling themself "Libertas" with the subject "Information for the public".
"I am writing to you today because you seem to be a IT security related guy from Austria with a brain. I hope this assumption is correct, otherwise please disregard this message.
I am writing concerning your local telecom company A1 Telekom. -Libertas"
At first I thought it's some conspiracy theorist who wants to publish something on my blog (they always do) but it was not one of these cases and I wasn't prepared to what they presented me.
Disclaimer:
After confirming the hack with A1 I was asked to postpone the publishing of this post until A1 has kicked the attackers out. I complied with their request so I wouldn't interfere with the ongoing investigation. Since I did not publish this post for months the whistleblower also contacted a journalist from Heise.de and we agreed to release our articles at the same time.
Since I have no way of checking the validity of individual statements made by the whistleblower, they could all be fabricated. I find them very plausible and many details of the email were confirmed by A1 but keep it in the back of your head that the statements of "Libertas" might be untrue or half-true until confirmed by A1 Telekom. Since I had the opportunity to talk to people from A1 I will add their statements in blue.
๐๐ผ Read more:
https://blog.haschek.at/2020/the-a1-telekom-hack.html
๐๐ผ Read more ๐ฉ๐ช:
https://www.golem.de/news/oesterreich-hackerangriff-bei-a1-telekom-2006-148984.html
#austria #telekom #hack #hacked #Libertas
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
On the 3rd of February 2020 I received an encrypted email on 3 of my email addresses from a person calling themself "Libertas" with the subject "Information for the public".
"I am writing to you today because you seem to be a IT security related guy from Austria with a brain. I hope this assumption is correct, otherwise please disregard this message.
I am writing concerning your local telecom company A1 Telekom. -Libertas"
At first I thought it's some conspiracy theorist who wants to publish something on my blog (they always do) but it was not one of these cases and I wasn't prepared to what they presented me.
Disclaimer:
After confirming the hack with A1 I was asked to postpone the publishing of this post until A1 has kicked the attackers out. I complied with their request so I wouldn't interfere with the ongoing investigation. Since I did not publish this post for months the whistleblower also contacted a journalist from Heise.de and we agreed to release our articles at the same time.
Since I have no way of checking the validity of individual statements made by the whistleblower, they could all be fabricated. I find them very plausible and many details of the email were confirmed by A1 but keep it in the back of your head that the statements of "Libertas" might be untrue or half-true until confirmed by A1 Telekom. Since I had the opportunity to talk to people from A1 I will add their statements in blue.
๐๐ผ Read more:
https://blog.haschek.at/2020/the-a1-telekom-hack.html
๐๐ผ Read more ๐ฉ๐ช:
https://www.golem.de/news/oesterreich-hackerangriff-bei-a1-telekom-2006-148984.html
#austria #telekom #hack #hacked #Libertas
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
blog.haschek.at
Christian Haschek's blog
Personal blog of Christian Haschek
Europol uses Palantir
Since 2016, the European Police Agency has been using the "Gotham" software to evaluate mass data. Europol has signed a contract for 7.5 million euros with the company Capgemini in 2012, just over half of the money has already been spent. Palantir promoted the software at the "European Police Congress".
The police agency Europol in The Hague has been running the "Gotham" software of the US concern Palantir for several years. This is what the European Commission writes in its answer to a parliamentary question. The application was tested in 2016 within the framework of the "Fraternitรฉ" task force, which Europol set up after the attacks in France at the time. Palantir is also criticised for his close cooperation with the military and secret services in the USA.
Since mid-2017, "Gotham" has been in continuous operation, Europol uses it for "operational analysis". This enables investigators to calculate and visualize relationships between people, objects or the course of events. "Structured data", such as contact lists, tables from radio cell queries and travel histories, are linked with "unstructured data" such as photos or location data. This so-called mass data evaluation is intended to generate new investigative approaches.
๐๐ผ Parliamentary request:
https://www.europarl.europa.eu/doceo/document/E-9-2020-000173-ASW_EN.html
๐๐ผ๐บ Audit-Protokoll-Analysis with Palantir Gotham
https://t.me/BlackBox_Archiv/403
๐๐ผ ๐ฉ๐ช Indications on the use of Facebook data by Palantir:
https://t.me/cRyPtHoN_INFOSEC_DE/3147
๐๐ผ Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/europol-nutzt-palantir/
#eu #palantir #europol #Capgemini #surveillance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Since 2016, the European Police Agency has been using the "Gotham" software to evaluate mass data. Europol has signed a contract for 7.5 million euros with the company Capgemini in 2012, just over half of the money has already been spent. Palantir promoted the software at the "European Police Congress".
The police agency Europol in The Hague has been running the "Gotham" software of the US concern Palantir for several years. This is what the European Commission writes in its answer to a parliamentary question. The application was tested in 2016 within the framework of the "Fraternitรฉ" task force, which Europol set up after the attacks in France at the time. Palantir is also criticised for his close cooperation with the military and secret services in the USA.
Since mid-2017, "Gotham" has been in continuous operation, Europol uses it for "operational analysis". This enables investigators to calculate and visualize relationships between people, objects or the course of events. "Structured data", such as contact lists, tables from radio cell queries and travel histories, are linked with "unstructured data" such as photos or location data. This so-called mass data evaluation is intended to generate new investigative approaches.
๐๐ผ Parliamentary request:
https://www.europarl.europa.eu/doceo/document/E-9-2020-000173-ASW_EN.html
๐๐ผ๐บ Audit-Protokoll-Analysis with Palantir Gotham
https://t.me/BlackBox_Archiv/403
๐๐ผ ๐ฉ๐ช Indications on the use of Facebook data by Palantir:
https://t.me/cRyPtHoN_INFOSEC_DE/3147
๐๐ผ Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/europol-nutzt-palantir/
#eu #palantir #europol #Capgemini #surveillance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Researchers detail huge hack-for-hire campaigns against environmentalists
โDark Basinโ is said to have targeted nonprofit groups battling Exxon Mobil
Hackers for hire have targeted thousands of individuals as part of campaigns against environmental advocacy groups, journalists, and others, according to a report produced by Citizen Lab, the University of Torontoโs cybersecurity watchdog group. Citizen Lab dubbed the group behind the campaigns โDark Basin,โ noting that it specifically targeted climate-change organizations who were campaigning against Exxon Mobil.
The report concludes that the campaigns represent โa clear danger to democracyโ and could allow powerful organizations to target their opponents. โThe extensive targeting of American nonprofits exercising their first amendment rights is exceptionally troubling,โ Citizen Labโs report says. The group has provided its information to federal prosecutors who are investigating the hackers and who hired them, The New York Times reports.
https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/
https://www.nytimes.com/2020/06/09/nyregion/exxon-mobil-hackers-greenpeace.html
#DarkBasin #researchers #hackers #hack #ExxonMobil
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
โDark Basinโ is said to have targeted nonprofit groups battling Exxon Mobil
Hackers for hire have targeted thousands of individuals as part of campaigns against environmental advocacy groups, journalists, and others, according to a report produced by Citizen Lab, the University of Torontoโs cybersecurity watchdog group. Citizen Lab dubbed the group behind the campaigns โDark Basin,โ noting that it specifically targeted climate-change organizations who were campaigning against Exxon Mobil.
The report concludes that the campaigns represent โa clear danger to democracyโ and could allow powerful organizations to target their opponents. โThe extensive targeting of American nonprofits exercising their first amendment rights is exceptionally troubling,โ Citizen Labโs report says. The group has provided its information to federal prosecutors who are investigating the hackers and who hired them, The New York Times reports.
https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/
https://www.nytimes.com/2020/06/09/nyregion/exxon-mobil-hackers-greenpeace.html
#DarkBasin #researchers #hackers #hack #ExxonMobil
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
The Citizen Lab
Dark Basin
Over the course of our multi-year investigation, we found that Dark Basin likely conducted commercial espionage on behalf of their clients against opponents involved in high profile public events, criminal cases, financial transactions, news stories, andโฆ
Real-Time Passive Sound Recovery from Light Bulb Vibrations
Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room
You might not believe it, but it's possible to spy on secret conversations happening in a room from a nearby remote location just by observing a light bulb hanging in thereโvisible from a windowโand measuring the amount of light it emits.
A team of cybersecurity researchers has developed and demonstrated a novel side-channel attacking technique that can be applied by eavesdroppers to recover full sound from a victim's room that contains an overhead hanging bulb.
The findings were published in a new paper by a team of academicsโBen Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici and Boris Zadovโfrom the Israeli's Ben-Gurion University of the Negev and the Weizmann Institute of Science, which will also be presented at the Black Hat USA 2020 conference later this August.
The technique for long-distance eavesdropping, called "Lamphone," works by capturing minuscule sound waves optically through an electro-optical sensor directed at the bulb and using it to recover speech and recognize music.
https://www.nassiben.com/lamphone
PDF:
https://ad447342-c927-414a-bbae-d287bde39ced.filesusr.com/ugd/a53494_443addc922e048d89a664c2423bf43fd.pdf
๐๐ผ Read more:
https://thehackernews.com/2020/06/lamphone-light-bulb-spy.html
#spy #cybersecurity #lightbulb #blackhat #sidechannel #attack
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room
You might not believe it, but it's possible to spy on secret conversations happening in a room from a nearby remote location just by observing a light bulb hanging in thereโvisible from a windowโand measuring the amount of light it emits.
A team of cybersecurity researchers has developed and demonstrated a novel side-channel attacking technique that can be applied by eavesdroppers to recover full sound from a victim's room that contains an overhead hanging bulb.
The findings were published in a new paper by a team of academicsโBen Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici and Boris Zadovโfrom the Israeli's Ben-Gurion University of the Negev and the Weizmann Institute of Science, which will also be presented at the Black Hat USA 2020 conference later this August.
The technique for long-distance eavesdropping, called "Lamphone," works by capturing minuscule sound waves optically through an electro-optical sensor directed at the bulb and using it to recover speech and recognize music.
https://www.nassiben.com/lamphone
PDF:
https://ad447342-c927-414a-bbae-d287bde39ced.filesusr.com/ugd/a53494_443addc922e048d89a664c2423bf43fd.pdf
๐๐ผ Read more:
https://thehackernews.com/2020/06/lamphone-light-bulb-spy.html
#spy #cybersecurity #lightbulb #blackhat #sidechannel #attack
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Ben Nassi
Lamphone
Recent studies have suggested various side-channel attacks for eavesdropping sound by analyzing the side effects of sound waves on nearby objects (e.g., a bag of chips and window) and devices (e.g., motion sensors). These methods pose a great threat to privacyโฆ
You can bypass youtube ads by adding a dot after the domain
๐กOn desktop browsers.
To follow up: I had initially assumed that it didn't work on mobile because the browsers normalized the URL, however this isn't the case. The redirection happens on the server side. So, if you want this to work on mobile browsers, use the "Request Desktop Site" feature.
For example:
It's a commonly forgotten edge case, websites forget to normalize the hostname, the content is still served, but there's no hostname match on the browser so no cookies and broken CORS - and lots of bigger sites use a different domain to serve ads/media with a whitelist that doesn't contain the extra dot
๐ก This works for many news websites as well serving paywalls, e.g.
https://www.reddit.com/r/webdev/comments/gzr3cq/fyi_you_can_bypass_youtube_ads_by_adding_a_dot/
https://www.ghacks.net/2020/06/13/bypass-ads-on-youtube-and-some-paywalls-without-third-party-tools/
๐๐ผ Read more ๐ฉ๐ช:
https://www.golem.de/news/url-trick-ein-zeichen-mehr-und-youtube-ist-werbefrei-2006-149095.html
#youtube #yt #ads #paywalls
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
๐กOn desktop browsers.
To follow up: I had initially assumed that it didn't work on mobile because the browsers normalized the URL, however this isn't the case. The redirection happens on the server side. So, if you want this to work on mobile browsers, use the "Request Desktop Site" feature.
For example:
https://www.youtube.com/watch?v=DuB8VUICGqc // will occasionally show adshttps://www.youtube.com./watch?v=DuB8VUICGqc // will not show adsIt's a commonly forgotten edge case, websites forget to normalize the hostname, the content is still served, but there's no hostname match on the browser so no cookies and broken CORS - and lots of bigger sites use a different domain to serve ads/media with a whitelist that doesn't contain the extra dot
๐ก This works for many news websites as well serving paywalls, e.g.
https://www.nytimes.com./2020/06/09/us/george-floyd-who-is.html
๐๐ผ Read more:https://www.reddit.com/r/webdev/comments/gzr3cq/fyi_you_can_bypass_youtube_ads_by_adding_a_dot/
https://www.ghacks.net/2020/06/13/bypass-ads-on-youtube-and-some-paywalls-without-third-party-tools/
๐๐ผ Read more ๐ฉ๐ช:
https://www.golem.de/news/url-trick-ein-zeichen-mehr-und-youtube-ist-werbefrei-2006-149095.html
#youtube #yt #ads #paywalls
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@FLOSSb0xIN
Reddit
From the webdev community on Reddit: fyi: You can bypass youtube ads by adding a dot after the domain
Explore this post and more from the webdev community
Many Police Departments Have Software That Can Identify People In Crowds
BriefCam, a facial recognition and surveillance video analysis company, sells the ability to surveil protesters and enforce social distancing โ without the public knowing.
As protesters demand an end to police brutality and the coronavirus pandemic sweeps the nation, police departments around the country are using software that can track and identify people in crowds from surveillance footage โ often with little to no public oversight or knowledge.
Dozens of cities around the country are using BriefCam, which sells software that allows police to comb through surveillance footage to monitor protests and enforce social distancing, and almost all of these cities have hosted protests against police brutality in the weeks since George Floyd was killed in police custody, BuzzFeed News has found.
Some of the cities using BriefCamโs technology โ such as New Orleans and St. Paul โ have been the site of extreme police violence, with officers using rubber bullets, tear gas, and batons on protesters. Authorities in Chicago; Boston; Detroit; Denver; Doral, Florida; Hartford, Connecticut; and Santa Fe County, New Mexico have also used it.
Some cities said they were not using BriefCam in conjunction with the protests or the pandemic. The St. Paul Police Department told BuzzFeed News that it has not used BriefCam โto detect social distancing or face masksโ or โfor crowd detection/monitoring protests.โ The department representative did not respond when asked if there is department policy that prevents it.
BriefCam shows the line between contact tracing, policing, and surveillance can be thin โ as cities can spend tens of thousands of dollars for powerful technology, with few restrictions on how police can use it.
BriefCam did not return multiple requests for comment or respond to a detailed list of questions.
๐ก https://www.buzzfeednews.com/article/carolinehaskins1/police-software-briefcam
๐ก https://www.crunchbase.com/organization/briefcam#section-funding-rounds
๐ก https://www.briefcam.com/company/about/
Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/briefcam-dutzende-staedte-in-den-usa-haben-gesichtserkennung-fuer-demonstrationen/
#usa #surveillance #police #software #BriefCam #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
BriefCam, a facial recognition and surveillance video analysis company, sells the ability to surveil protesters and enforce social distancing โ without the public knowing.
As protesters demand an end to police brutality and the coronavirus pandemic sweeps the nation, police departments around the country are using software that can track and identify people in crowds from surveillance footage โ often with little to no public oversight or knowledge.
Dozens of cities around the country are using BriefCam, which sells software that allows police to comb through surveillance footage to monitor protests and enforce social distancing, and almost all of these cities have hosted protests against police brutality in the weeks since George Floyd was killed in police custody, BuzzFeed News has found.
Some of the cities using BriefCamโs technology โ such as New Orleans and St. Paul โ have been the site of extreme police violence, with officers using rubber bullets, tear gas, and batons on protesters. Authorities in Chicago; Boston; Detroit; Denver; Doral, Florida; Hartford, Connecticut; and Santa Fe County, New Mexico have also used it.
Some cities said they were not using BriefCam in conjunction with the protests or the pandemic. The St. Paul Police Department told BuzzFeed News that it has not used BriefCam โto detect social distancing or face masksโ or โfor crowd detection/monitoring protests.โ The department representative did not respond when asked if there is department policy that prevents it.
BriefCam shows the line between contact tracing, policing, and surveillance can be thin โ as cities can spend tens of thousands of dollars for powerful technology, with few restrictions on how police can use it.
BriefCam did not return multiple requests for comment or respond to a detailed list of questions.
๐ก https://www.buzzfeednews.com/article/carolinehaskins1/police-software-briefcam
๐ก https://www.crunchbase.com/organization/briefcam#section-funding-rounds
๐ก https://www.briefcam.com/company/about/
Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/briefcam-dutzende-staedte-in-den-usa-haben-gesichtserkennung-fuer-demonstrationen/
#usa #surveillance #police #software #BriefCam #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
BuzzFeed News
Many Police Departments Have Software That Can Identify People In Crowds
BriefCam, a facial recognition and surveillance video analysis company, sells the ability to surveil protesters and enforce social distancing โ without the public knowing.
Media is too big
VIEW IN TELEGRAM
Who Is Bill Gates? (Full Documentary, 2020)
Just in time for #ExposeBillGates Global Day of Action, The #CorbettReport is releasing the full Who Is #BillGates? documentary in a single upload. Please help to spread the word about this documentary, including the audio and video downloads and hyperlinked transcript at corbettreport.com/gates
๐๐ผ Watch this video on
BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/who-is-bill-gates-full-documentary-2020/
#documentary #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Just in time for #ExposeBillGates Global Day of Action, The #CorbettReport is releasing the full Who Is #BillGates? documentary in a single upload. Please help to spread the word about this documentary, including the audio and video downloads and hyperlinked transcript at corbettreport.com/gates
๐๐ผ Watch this video on
BitChute / LBRY / Minds.com / YouTube
https://www.corbettreport.com/who-is-bill-gates-full-documentary-2020/
#documentary #video
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Anonymous Tweets U.S. Hit by Major DDoS Attack on June 15
Following a massive cell phone service outage that affected hundreds of thousands of T-Mobile, AT&T, Verizon and Sprint customers on Monday, the hacktivist group Anonymous tweeted that it was a result of a โmajor DDoS attack.โ The companies affected and authorities have not confirmed the claim.
DDoS, short for Distributed Denial of Service, is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. Attackers target a wide variety of important resources, from banks to news websites, flooding the sites with too much information to operate and causing a major challenge to people wanting to publish or access important information.
Anonymous tweeted out a digital map that appeared to show the various types of attacks happening between America and the rest of the world on Monday.
The U.S. is currently under a major DDoS attack. https://t.co/7pmLpWUzUp pic.twitter.com/W5giIA2Inc
โ Anonymous (@YourAnonCentral) June 15, 2020
๐๐ผ Read more:
https://heavy.com/news/2020/06/anonymous-ddos-attack-cell-service-outage/
#anonymous #usa #ddos #attack
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Following a massive cell phone service outage that affected hundreds of thousands of T-Mobile, AT&T, Verizon and Sprint customers on Monday, the hacktivist group Anonymous tweeted that it was a result of a โmajor DDoS attack.โ The companies affected and authorities have not confirmed the claim.
DDoS, short for Distributed Denial of Service, is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. Attackers target a wide variety of important resources, from banks to news websites, flooding the sites with too much information to operate and causing a major challenge to people wanting to publish or access important information.
Anonymous tweeted out a digital map that appeared to show the various types of attacks happening between America and the rest of the world on Monday.
The U.S. is currently under a major DDoS attack. https://t.co/7pmLpWUzUp pic.twitter.com/W5giIA2Inc
โ Anonymous (@YourAnonCentral) June 15, 2020
๐๐ผ Read more:
https://heavy.com/news/2020/06/anonymous-ddos-attack-cell-service-outage/
#anonymous #usa #ddos #attack
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Digitalattackmap
Digital Attack Map
A live data visualization of DDoS attacks around the globe
LโApp unique - France goes it alone on digital contact tracing
The European Commission wants to make Corona-tracing apps work across borders ahead of the summer holidays. But the French app has been excluded.
Today, Germany has launched its much-debated app for digital contact tracing in a bid to prevent a second wave of the Corona virus. While the app is only available in Germany, the European Union wants to make digital contact tracing work beyond borders.
On the same day the German app was rolled out, the EU Commission has unveiled technical specifications that shall enable different corona apps to exchange data and thus function across countries. In technical jargon this is called interoperability.
Based on the decentralised approach, the European Commission has announced it will set up a server infrastructure to link national apps. This federation gateway, as it is referred to in a 10-page technical document released by the Commission, shall be up and running within three weeks.
A pilot test between Germany, the Netherlands, Poland and Ireland shall start shortly after, Commission spokesperson Johannes Bahrke said in Brussels.
However, one country is notably absent from the European undertaking โ France. The Commission says that the data exchange will erstwhile only work for apps using a decentralised approach to store user data.
๐๐ผ Corona-Warn-App
The official COVID-19 exposure notification app for Germany:
https://github.com/corona-warn-app
๐๐ผ Read more ๐ฌ๐ง:
https://netzpolitik.org/2020/france-goes-it-alone-on-digital-contact-tracing/
#corona #app #france #germany #eu
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
The European Commission wants to make Corona-tracing apps work across borders ahead of the summer holidays. But the French app has been excluded.
Today, Germany has launched its much-debated app for digital contact tracing in a bid to prevent a second wave of the Corona virus. While the app is only available in Germany, the European Union wants to make digital contact tracing work beyond borders.
On the same day the German app was rolled out, the EU Commission has unveiled technical specifications that shall enable different corona apps to exchange data and thus function across countries. In technical jargon this is called interoperability.
Based on the decentralised approach, the European Commission has announced it will set up a server infrastructure to link national apps. This federation gateway, as it is referred to in a 10-page technical document released by the Commission, shall be up and running within three weeks.
A pilot test between Germany, the Netherlands, Poland and Ireland shall start shortly after, Commission spokesperson Johannes Bahrke said in Brussels.
However, one country is notably absent from the European undertaking โ France. The Commission says that the data exchange will erstwhile only work for apps using a decentralised approach to store user data.
๐๐ผ Corona-Warn-App
The official COVID-19 exposure notification app for Germany:
https://github.com/corona-warn-app
๐๐ผ Read more ๐ฌ๐ง:
https://netzpolitik.org/2020/france-goes-it-alone-on-digital-contact-tracing/
#corona #app #france #germany #eu
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
GitHub
Corona-Warn-App
The official COVID-19 exposure notification app for Germany. - Corona-Warn-App
UntrackMe
What does UntrackMe do?
Basically it handles urls. It can do these:
๐ก Redirect:
Transform YouTube, Twitter, Instagram and Google Maps URLs into URLs of front-ends and services that respect your privacy.
๐ก Unshorten:
See the real link behind short URLs of some URL shortening services without loading the web page
๐ก Cleanup:
Remove known UTM parameters from a URLs
๐๐ผ Read more:
https://fedilab.app/wiki/untrackme/
#UntrackMe #clearlinks #redirect #unshorten #cleanup
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
What does UntrackMe do?
Basically it handles urls. It can do these:
๐ก Redirect:
Transform YouTube, Twitter, Instagram and Google Maps URLs into URLs of front-ends and services that respect your privacy.
๐ก Unshorten:
See the real link behind short URLs of some URL shortening services without loading the web page
๐ก Cleanup:
Remove known UTM parameters from a URLs
๐๐ผ Read more:
https://fedilab.app/wiki/untrackme/
#UntrackMe #clearlinks #redirect #unshorten #cleanup
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
BeautyFraud-Appendix-A.pdf
42.5 KB
The Beauty and the (Fraud) Beast
White Ops Threat Intelligence and Research Team June 2020
๐๐ผ List (pdf) of fraudulent picture editing applications:
https://www.whiteops.com/hubfs/BeautyFraud-Appendix-A.pdf
#pdf #fraudulent #picture #editing #applications #apps
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
White Ops Threat Intelligence and Research Team June 2020
๐๐ผ List (pdf) of fraudulent picture editing applications:
https://www.whiteops.com/hubfs/BeautyFraud-Appendix-A.pdf
#pdf #fraudulent #picture #editing #applications #apps
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
A Quick and Dirty Guide to Cell Phone Surveillance at Protests
As uprisings over police brutality and institutionalized racism have swept over the country, many people are facing the full might of law enforcement weaponry and surveillance for the first time. Whenever protesters, cell phones, and police are in the same place, protesters should worry about cell phone surveillance.
Often, security practitioners or other protesters respond to that worry with advice about the use of cell-site simulators (also known as a CSS, IMSI catcher, Stingray, Dirtbox, Hailstorm, fake base station, or Crossbow) by local law enforcement. But often this advice is misguided or rooted in a fundamental lack of understanding of what a cell-site simulator is, what it does, and how often they are used.
The bottom line is this:
there is very little concrete evidence of cell site simulators being used against protesters in the U.S. The threat of cell site simulators should not stop activists from voicing their dissent or using their phones. On the other hand, given that more than 85 local, state, and federal law enforcement agencies around the country have some type of CSS (some of which are used hundreds of times per year), itโs not unreasonable to include cell site simulators in your security plan if you are going to a protest and take some simple steps to protect yourself.
๐ก Surveillance Self-Defense - Your Security Plan:
https://ssd.eff.org/en/module/your-security-plan
๐๐ผ Read more:
https://www.eff.org/deeplinks/2020/06/quick-and-dirty-guide-cell-phone-surveillance-protests
#surveillance #police #usa #defence #phone #CSS #SecurityPlan
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
As uprisings over police brutality and institutionalized racism have swept over the country, many people are facing the full might of law enforcement weaponry and surveillance for the first time. Whenever protesters, cell phones, and police are in the same place, protesters should worry about cell phone surveillance.
Often, security practitioners or other protesters respond to that worry with advice about the use of cell-site simulators (also known as a CSS, IMSI catcher, Stingray, Dirtbox, Hailstorm, fake base station, or Crossbow) by local law enforcement. But often this advice is misguided or rooted in a fundamental lack of understanding of what a cell-site simulator is, what it does, and how often they are used.
The bottom line is this:
there is very little concrete evidence of cell site simulators being used against protesters in the U.S. The threat of cell site simulators should not stop activists from voicing their dissent or using their phones. On the other hand, given that more than 85 local, state, and federal law enforcement agencies around the country have some type of CSS (some of which are used hundreds of times per year), itโs not unreasonable to include cell site simulators in your security plan if you are going to a protest and take some simple steps to protect yourself.
๐ก Surveillance Self-Defense - Your Security Plan:
https://ssd.eff.org/en/module/your-security-plan
๐๐ผ Read more:
https://www.eff.org/deeplinks/2020/06/quick-and-dirty-guide-cell-phone-surveillance-protests
#surveillance #police #usa #defence #phone #CSS #SecurityPlan
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Surveillance Self-Defense
Your Security Plan
Trying to protect all your data from everyone all the time is impractical and exhausting. But, have no fear! Security is a process, and through thoughtful planning, you can put together a plan thatโs
2020: A Facebook user's Odyssey?
Join us on a journey to try to solve the mystery behind the advertisers who have uploaded our personal data to Facebook but with whom we've never interacted with before.
๐ Key findings:
๐๐ผ In summer 2019, we noticed that "unknown" companies had been uploading our data to Facebook and we decided to send Data Subject Access Requests (DSARs) to find out more.
๐๐ผ This ended up being a lengthy and tedious process, involving requests to fill in unnecessary forms or being asked to provide more data than needed as well as other obstacles to the proper and smooth exercise of our data access rights.
๐๐ผ Eventually, we managed to shed some light on the "Facebook advertisers mystery" by finding out more about the involvement of third parties in the process.
๐๐ผ However, our investigation demonstrates the need to continue challenging this opacity overall and Facebook's less than adequate transparency
๐๐ผ As a result of this investigation some companies reviewed their practices and we have written to Facebook to demand changes.
๐๐ผ Read more:
https://privacyinternational.org/long-read/3857/2020-facebook-users-odyssey
#DeleteFacebook #fb #privacy #mydata #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Join us on a journey to try to solve the mystery behind the advertisers who have uploaded our personal data to Facebook but with whom we've never interacted with before.
๐ Key findings:
๐๐ผ In summer 2019, we noticed that "unknown" companies had been uploading our data to Facebook and we decided to send Data Subject Access Requests (DSARs) to find out more.
๐๐ผ This ended up being a lengthy and tedious process, involving requests to fill in unnecessary forms or being asked to provide more data than needed as well as other obstacles to the proper and smooth exercise of our data access rights.
๐๐ผ Eventually, we managed to shed some light on the "Facebook advertisers mystery" by finding out more about the involvement of third parties in the process.
๐๐ผ However, our investigation demonstrates the need to continue challenging this opacity overall and Facebook's less than adequate transparency
๐๐ผ As a result of this investigation some companies reviewed their practices and we have written to Facebook to demand changes.
๐๐ผ Read more:
https://privacyinternational.org/long-read/3857/2020-facebook-users-odyssey
#DeleteFacebook #fb #privacy #mydata #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Privacy International
2020: A Facebook user's Odyssey?
Introduction In August 2019, when Facebook announced a few new features for advertisers such as ads in search, PI decided to take an in-depth lo
Moroccan Journalist Targeted With Network Injection Attacks Using NSO Groupโs Tools
๐ Summary:
๐๐ผ In October 2019 Amnesty International published a first report on the use of spyware produced by Israeli company NSO Group against Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui. Through our continued investigation, Amnesty Internationalโs Security Lab identified similar evidence of the targeting of Omar Radi, a prominent activist and journalist from Morocco from January 2019 until the end of January 2020.
๐๐ผ Evidence gathered through our technical analysis of Omar Radiโs iPhone revealed traces of the same โnetwork injectionโ attacks we described in our earlier report that were used against Maati Monjib. This provides strong evidence linking these attacks to NSO Groupโs tools.
๐๐ผ These findings are especially significant because Omar Radi was targeted just three days after NSO Group released its human rights policy. These attacks continued after the company became aware of Amnesty Internationalโs first report that provided evidence of the targeted attacks in Morocco. This investigation thus, demonstrates NSO Groupโs continued failure to conduct adequate human rights due diligence and the inefficacy of its own human rights policy.
๐ Introduction:
In October 2019 Amnesty International published the report โMorocco: Human Rights Defenders Targeted with NSO Groupโs Spywareโ, where we detailed the targeting of Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui using surveillance technology produced by the company NSO Group. In this current report, Amnesty International now reveals that Omar Radi, another prominent human rights defender and journalist from Morocco was also targeted using NSO Groupโs tools.
๐๐ผ Read more:
https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/
#morocco #journalist #spy #nso
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
๐ Summary:
๐๐ผ In October 2019 Amnesty International published a first report on the use of spyware produced by Israeli company NSO Group against Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui. Through our continued investigation, Amnesty Internationalโs Security Lab identified similar evidence of the targeting of Omar Radi, a prominent activist and journalist from Morocco from January 2019 until the end of January 2020.
๐๐ผ Evidence gathered through our technical analysis of Omar Radiโs iPhone revealed traces of the same โnetwork injectionโ attacks we described in our earlier report that were used against Maati Monjib. This provides strong evidence linking these attacks to NSO Groupโs tools.
๐๐ผ These findings are especially significant because Omar Radi was targeted just three days after NSO Group released its human rights policy. These attacks continued after the company became aware of Amnesty Internationalโs first report that provided evidence of the targeted attacks in Morocco. This investigation thus, demonstrates NSO Groupโs continued failure to conduct adequate human rights due diligence and the inefficacy of its own human rights policy.
๐ Introduction:
In October 2019 Amnesty International published the report โMorocco: Human Rights Defenders Targeted with NSO Groupโs Spywareโ, where we detailed the targeting of Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui using surveillance technology produced by the company NSO Group. In this current report, Amnesty International now reveals that Omar Radi, another prominent human rights defender and journalist from Morocco was also targeted using NSO Groupโs tools.
๐๐ผ Read more:
https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/
#morocco #journalist #spy #nso
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Amnesty International
Moroccan Journalist Targeted With Network Injection Attacks Using NSO Groupโs Tools
In October 2019 Amnesty International published a first report on the use of spyware produced by Israeli company NSO Group against Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui. Through our continued investigation, Amnesty Internationalโsโฆ
80,000 printers are exposing their IPP port online
Printers are leaking device names, locations, models, firmware versions, organization names, and even WiFi SSIDs.
For years, security researchers have warned that every device left exposed online without being protected by a firewall is an attack surface.
Hackers can deploy exploits to forcibly take control over the device, or they can just connect to the exposed port if no authentication is required.
Devices hacked this way are often enslaved in malware botnets, or they serve as initial footholds and backdoors into larger corporate networks (Russian hackers already use this technique).
However, despite this being common knowledge among cyber-security and IT experts, we still have a large number of devices that are left exposed online unsecured.
๐๐ผ Open IPP Report โ Exposed Printer Devices on the Internet:
https://www.shadowserver.org/news/open-ipp-report-exposed-printer-devices-on-the-internet/
๐๐ผ Read more:
https://www.zdnet.com/article/80000-printers-are-exposing-their-ipp-port-online/
#leak #breach #hacked #exposed #iot #ipp
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Printers are leaking device names, locations, models, firmware versions, organization names, and even WiFi SSIDs.
For years, security researchers have warned that every device left exposed online without being protected by a firewall is an attack surface.
Hackers can deploy exploits to forcibly take control over the device, or they can just connect to the exposed port if no authentication is required.
Devices hacked this way are often enslaved in malware botnets, or they serve as initial footholds and backdoors into larger corporate networks (Russian hackers already use this technique).
However, despite this being common knowledge among cyber-security and IT experts, we still have a large number of devices that are left exposed online unsecured.
๐๐ผ Open IPP Report โ Exposed Printer Devices on the Internet:
https://www.shadowserver.org/news/open-ipp-report-exposed-printer-devices-on-the-internet/
๐๐ผ Read more:
https://www.zdnet.com/article/80000-printers-are-exposing-their-ipp-port-online/
#leak #breach #hacked #exposed #iot #ipp
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
ZDNET
Microsoft: Russian state hackers are using IoT devices to breach enterprise networks
Microsoft said it detected Strontium (APT28) targeting VoIP phones, printers, and video decoders.
Google billionaire Sergey Brin has a secret charity that sends ex-military staff into disaster zones on a superyacht
Global Support and Development is made up of ex-military men and Brinโs former bodyguards. But their mission isnโt warfare.
Sergey Brin, Google cofounder and world's eighth-richest person, has a secret disaster-response team according to a report by The Daily Beast.
The Daily Beast's investigation found Brin was the sole donor to a disaster charity called Global Support and Development (GSD). The Beast identified Brin as the company's sole donor through a California court filing.
The company, almost half of whose staff are ex-military, arrives at disaster areas on a superyacht called "Dragonfly" to clear debris and use high-tech solutions to assist victims. GSD is headed up by Grant Dawson, an ex-naval lieutenant who was one of Brin's personal security detail for years.
The idea for GSD was apparently sparked in 2015 when the yacht's captain was sailing past Vanuatu, which had just been hit by Cyclone Pam. The captain contacted Brin to ask if anything could be done to help, and Brin in turn got in touch with Dawson.
Dawson said in a speech in 2019 about GSD: "So I grabbed a number of Air Force para-rescue guys I'd been affiliated with from the security world, and a couple of corpsmen out of the [Navy] Seal teams [...] We raided every Home Depot and pharmacy we could find and on about 18 hours' notice, we launched."
https://www.msn.com/en-us/news/technology/google-billionaire-sergey-brin-has-a-secret-charity-that-sends-ex-military-staff-into-disaster-zones-on-a-superyacht/ar-BB15OPax
๐๐ผ Read more:
https://www.thedailybeast.com/google-co-founder-sergey-brin-has-a-secret-disaster-relief-squad
๐๐ผ Read more ๐ฉ๐ช:
https://www.welt.de/wirtschaft/article210137503/Spezialtruppe-aus-Ex-Navy-Seals-Die-geheimen-Katastrophenhelfer-des-Sergey-Brin.html
#google #brin #GSD #disaster #response
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Global Support and Development is made up of ex-military men and Brinโs former bodyguards. But their mission isnโt warfare.
Sergey Brin, Google cofounder and world's eighth-richest person, has a secret disaster-response team according to a report by The Daily Beast.
The Daily Beast's investigation found Brin was the sole donor to a disaster charity called Global Support and Development (GSD). The Beast identified Brin as the company's sole donor through a California court filing.
The company, almost half of whose staff are ex-military, arrives at disaster areas on a superyacht called "Dragonfly" to clear debris and use high-tech solutions to assist victims. GSD is headed up by Grant Dawson, an ex-naval lieutenant who was one of Brin's personal security detail for years.
The idea for GSD was apparently sparked in 2015 when the yacht's captain was sailing past Vanuatu, which had just been hit by Cyclone Pam. The captain contacted Brin to ask if anything could be done to help, and Brin in turn got in touch with Dawson.
Dawson said in a speech in 2019 about GSD: "So I grabbed a number of Air Force para-rescue guys I'd been affiliated with from the security world, and a couple of corpsmen out of the [Navy] Seal teams [...] We raided every Home Depot and pharmacy we could find and on about 18 hours' notice, we launched."
https://www.msn.com/en-us/news/technology/google-billionaire-sergey-brin-has-a-secret-charity-that-sends-ex-military-staff-into-disaster-zones-on-a-superyacht/ar-BB15OPax
๐๐ผ Read more:
https://www.thedailybeast.com/google-co-founder-sergey-brin-has-a-secret-disaster-relief-squad
๐๐ผ Read more ๐ฉ๐ช:
https://www.welt.de/wirtschaft/article210137503/Spezialtruppe-aus-Ex-Navy-Seals-Die-geheimen-Katastrophenhelfer-des-Sergey-Brin.html
#google #brin #GSD #disaster #response
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Msn
Google billionaire Sergey Brin has a secret charity that sends ex-military staff into disaster zones on a superyacht
Sergey Brin, Google cofounder and world's eighth-richest person, has a secret disaster-response team according to a report by The Daily Beast.
Tools for encryption and anonymity - Germany and Europe need to step up to their responsibility
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
๐ก
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
๐๐ผ Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
๐๐ผ Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
๐ก
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
๐๐ผ Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
๐๐ผ Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
the Guardian
NSA files decoded: Edward Snowden's surveillance revelations explained
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together โ and what does it mean for you?
68: Triton
Darknetdiaries - Triton
A mysterious mechanical failure one fateful night in a Saudi Arabian chemical plant leads a cast of operational technology researchers down a strange path towards an uncommon, but grave, threat. In this episode, we hear how these researchers discovered this threat and tried to identify who was responsible for the malware behind it. We also consider how this kind of attack may pose a threat to human life wherever there are manufacturing or public infrastructure facilities around the world.
๐ง https://darknetdiaries.com/episode/68/
#darknetdiaries #triton #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
A mysterious mechanical failure one fateful night in a Saudi Arabian chemical plant leads a cast of operational technology researchers down a strange path towards an uncommon, but grave, threat. In this episode, we hear how these researchers discovered this threat and tried to identify who was responsible for the malware behind it. We also consider how this kind of attack may pose a threat to human life wherever there are manufacturing or public infrastructure facilities around the world.
๐ง https://darknetdiaries.com/episode/68/
#darknetdiaries #triton #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
๐ Indicators on Stalkerware ๐
Indicators of compromise on Stalkerware applications for Android
๐ก What Is Stalkerware?
๐๐ผ https://stopstalkerware.org/what-is-stalkerware/
๐๐ผ https://youtu.be/zLtfoCw16Z0
๐ก Safety Toolkit - Below is some important information regarding Stalkware. If you need immediate help, please see our list of Resources.
๐๐ผ https://stopstalkerware.org/get-help/
๐ก Indicators on Stalkerware - Indicators of compromise on Stalkerware applications for Android
๐๐ผ https://github.com/Te-k/stalkerware-indicators
โผ๏ธ If you or someone you know is concerned about potential spying, monitoring, or stalking, trust your instincts and find a safe way to learn about your local resources and options. Please note that if you think someone may be monitoring your device, that person would be able to see any searches for help or resources. If youโre concerned about this, use another device โ one that the person has not had physical access to โ when reaching out for information or assistance. If you are in immediate danger, contact your local authorities. โผ๏ธ
๐๐ผ Read more:
https://netzpolitik.org/2020/how-security-researchers-are-working-to-expose-stalkerware-on-your-phone/
#stalkerware #android #help #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Indicators of compromise on Stalkerware applications for Android
๐ก What Is Stalkerware?
๐๐ผ https://stopstalkerware.org/what-is-stalkerware/
๐๐ผ https://youtu.be/zLtfoCw16Z0
๐ก Safety Toolkit - Below is some important information regarding Stalkware. If you need immediate help, please see our list of Resources.
๐๐ผ https://stopstalkerware.org/get-help/
๐ก Indicators on Stalkerware - Indicators of compromise on Stalkerware applications for Android
๐๐ผ https://github.com/Te-k/stalkerware-indicators
โผ๏ธ If you or someone you know is concerned about potential spying, monitoring, or stalking, trust your instincts and find a safe way to learn about your local resources and options. Please note that if you think someone may be monitoring your device, that person would be able to see any searches for help or resources. If youโre concerned about this, use another device โ one that the person has not had physical access to โ when reaching out for information or assistance. If you are in immediate danger, contact your local authorities. โผ๏ธ
๐๐ผ Read more:
https://netzpolitik.org/2020/how-security-researchers-are-working-to-expose-stalkerware-on-your-phone/
#stalkerware #android #help #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Coalition Against Stalkerware
What Is Stalkerware? - Coalition Against Stalkerware
So far there was neither an agreed standard definition for stalkerware nor detection criteria which made it particularly difficult for IT security industry to communicate around the issue. Therefore, the founding members of the Coalition Against Stalkerwareโฆ