Forwarded from Privacy Matters π‘οΈ
All the ways your Phone tracks your location.
πΉ Watch it via:
YouTube || Invidious
π‘ @howtobeprivateonline
#Surveillance #Location #Privacy #Guide
Your phone (Android or iPhone) is tracking your location even if you disable Location Services, turn on airplane mode, and disable Bluetooth. Learn how to stop it once and for all.
πΉ Watch it via:
YouTube || Invidious
π‘ @howtobeprivateonline
#Surveillance #Location #Privacy #Guide
Forwarded from Privacy Matters π‘οΈ
Media is too big
VIEW IN TELEGRAM
How to use Tor on your phone
πΉ Watch it via:
YouTube || Invidious
π Get TOR for:
β’ Android via: Website || F-Droid || Play Store
β’ iOS via: Apple Store
π‘ @howtobeprivateonline
#TOR #Privacy #Guide #Browser #VPN
In this anonymity tutorial, you'll learn how to use Tor on your phone - both Tor Browser and Orbot on Android, and Onion Browser on iOS.
πΉ Watch it via:
YouTube || Invidious
π Get TOR for:
β’ Android via: Website || F-Droid || Play Store
β’ iOS via: Apple Store
π‘ @howtobeprivateonline
#TOR #Privacy #Guide #Browser #VPN
Forwarded from BlackBox (Security) Archiv
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we arenβt aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. Weβll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. Itβs up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers donβt store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
#forensic #guide #imessage #whatsapp #telegram #signal #skype
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we arenβt aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. Weβll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. Itβs up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers donβt store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
#forensic #guide #imessage #whatsapp #telegram #signal #skype
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
ElcomSoft blog
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the fiveβ¦
Madaidan's Linux Hardening Guide
https://madaidans-insecurities.github.io/guides/linux-hardening.html
#madaidan #Linux #Hardening #Guide
https://madaidans-insecurities.github.io/guides/linux-hardening.html
#madaidan #Linux #Hardening #Guide
Media is too big
VIEW IN TELEGRAM
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
π‘ @techloreofficial
π₯ @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
π‘ @techloreofficial
π₯ @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Forwarded from BlackBox (Security) Archiv
Setup for testing Android app vulnerabilities
In the previous article I documented my approach for reverse engineering an Android game. But getting my hands on the code is only one part of security research. Once a potential issue is identified, I need to verify that it is actually exploitable. So there is no way around messing with an actual live app. Ideally that has to happen in a controlled environment with emulated hardware. As before, this is mostly me writing things down for my future self, but it might come useful for other people as well.
π‘ Contents
β Choosing a virtualization approach
β Setting up Android SDK
β Minimal proof of concept Android app
β Adding debugging output to the target application
https://palant.info/2021/02/22/setup-for-testing-android-app-vulnerabilities/
#setup #testing #android #app #vulnerabilities #guide
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
In the previous article I documented my approach for reverse engineering an Android game. But getting my hands on the code is only one part of security research. Once a potential issue is identified, I need to verify that it is actually exploitable. So there is no way around messing with an actual live app. Ideally that has to happen in a controlled environment with emulated hardware. As before, this is mostly me writing things down for my future self, but it might come useful for other people as well.
π‘ Contents
β Choosing a virtualization approach
β Setting up Android SDK
β Minimal proof of concept Android app
β Adding debugging output to the target application
https://palant.info/2021/02/22/setup-for-testing-android-app-vulnerabilities/
#setup #testing #android #app #vulnerabilities #guide
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Almost Secure
Setup for testing Android app vulnerabilities
Documenting my setup: Android emulator, minimal Android app and instrumenting the target app via Soot to get debugging info.
Forwarded from BlackBox (Security) Archiv
How to turn off the ANDROID TRACKING SERVICES [ROOT required]
Let's start:
ππΌ Download Termux from Google Playstore and install and open it.
Install Packages:
https://drive.google.com/drive/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE
π‘ (Please always use the latest version)
ππΌ Unpack to ππΌ /sdcard and then enter the following command...:
ππΌ Then enter:
tsu
After that, just reboot your device and the job is done.
#root #android #tracking #services #guide
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Let's start:
ππΌ Download Termux from Google Playstore and install and open it.
Install Packages:
pkg install aapt jq tsu curl -y( Asks for root privileges, allow this βοΈππ½)
cd /data/data/com.termux/files/usr/binππΌ Download the script from here:
cp -R aapt /system/xbin/aapt
cp -R jq /system/xbin/jq
cp -R curl /system/xbin/curl
chmod +x /system/xbin/aapt
chmod +x /system/xbin/jq
chmod +x /system/xbin/curl
https://drive.google.com/drive/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE
π‘ (Please always use the latest version)
ππΌ Unpack to ππΌ /sdcard and then enter the following command...:
termux-setup-storage
(grant permission)ππΌ Then enter:
cd /sdcard(with root) ππ½
tsu
bash DisableTrackers.sh sys
(Add βοΈ)After that, just reboot your device and the job is done.
#root #android #tracking #services #guide
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Broken-Phone-Recovery
A #guide how to #backup data from your locked android #phone if you broke your #screen (and more)
https://github.com/v1nc/Broken-Phone-Recovery
A #guide how to #backup data from your locked android #phone if you broke your #screen (and more)
https://github.com/v1nc/Broken-Phone-Recovery
GitHub
GitHub - v1nc/Broken-Phone-Recovery: Data Recovery from your broken Android phone
Data Recovery from your broken Android phone. Contribute to v1nc/Broken-Phone-Recovery development by creating an account on GitHub.
Forwarded from GJ `°÷°` π΅πΈπ (t ``~__/>_GJ06)
Anatomy of a Linux DNS Lookup β Part I β zwischenzugs β https://zwischenzugs.com/2018/06/08/anatomy-of-a-linux-dns-lookup-part-i/
Since i work a lot with clusteredVMs, Iβve ended up spending a lot of time trying to figure out how #DNS lookups work. I applied βfixesβ to my problems from StackOverflow without really understanding why they work (or donβt work) for some time.
Eventually I got fed up with this and decided to figure out how it all hangs together. I couldnβt find a complete guide for this anywhere online, and talking to colleagues they didnβt know of any (or really what happens in detail)
So Iβm writing the #guide myself.
The Hitchhikerβs Guide to Online Anonymity
π‘ TLDR: This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!
The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.
The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).
* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion
π‘ Online Guide:
* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html
π‘ PDFs:
* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf
π‘ Changelog:
* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html
π‘ Archives:
* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/
Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa
ππΌ Follow me on:
* Mastodon: https://mastodon.online/@anonypla
Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.
π‘ @NoGoolag π‘ @Libreware
#guide #anonymity #privacy #anonymousplanet
π‘ TLDR: This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!
The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.
The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).
* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion
π‘ Online Guide:
* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html
π‘ PDFs:
* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf
π‘ Changelog:
* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html
π‘ Archives:
* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/
Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa
ππΌ Follow me on:
* Mastodon: https://mastodon.online/@anonypla
Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.
π‘ @NoGoolag π‘ @Libreware
#guide #anonymity #privacy #anonymousplanet
David_the_Good_Grow_or_Die_The_Good_Guide_to_Survival_Gardening.epub
501.4 KB
#Grow or Die: The Good #Guide to #Survival #Gardening
https://libgen.rs/book/index.php?md5=8288B0B474103D622152C9FD47F6C3D3
http://library.lol/main/8288B0B474103D622152C9FD47F6C3D3
written by David The Good https://www.youtube.com/channel/UC208478ECji1rdkDDbB0vHQ
Survival Gardening With David The Good - Ice Age Farmer Broadcast:
part 1 https://www.bitchute.com/video/5Caul0mPLNUu/
part 2 https://www.bitchute.com/video/nrGmjzf7cHuL/
https://libgen.rs/book/index.php?md5=8288B0B474103D622152C9FD47F6C3D3
http://library.lol/main/8288B0B474103D622152C9FD47F6C3D3
written by David The Good https://www.youtube.com/channel/UC208478ECji1rdkDDbB0vHQ
Survival Gardening With David The Good - Ice Age Farmer Broadcast:
part 1 https://www.bitchute.com/video/5Caul0mPLNUu/
part 2 https://www.bitchute.com/video/nrGmjzf7cHuL/
#Android Smartphone #Hardening non-root #Guide 4.0
By @TheAnonymouseJoker
https://lemmy.ml/post/128667
By @TheAnonymouseJoker
https://lemmy.ml/post/128667