NoGoolag
4.53K subscribers
14.2K photos
7.38K videos
600 files
14.8K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
All the ways your Phone tracks your location.

Your phone (Android or iPhone) is tracking your location even if you disable Location Services, turn on airplane mode, and disable Bluetooth. Learn how to stop it once and for all.

πŸ“Ή Watch it via:
YouTube || Invidious

πŸ“‘ @howtobeprivateonline
#Surveillance #Location #Privacy #Guide
Media is too big
VIEW IN TELEGRAM
How to use Tor on your phone

In this anonymity tutorial, you'll learn how to use Tor on your phone - both Tor Browser and Orbot on Android, and Onion Browser on iOS.

πŸ“Ή Watch it via:
YouTube || Invidious

🌐 Get TOR for:
β€’ Android via: Website || F-Droid || Play Store
β€’ iOS via: Apple Store

πŸ“‘ @howtobeprivateonline
#TOR #Privacy #Guide #Browser #VPN
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition

Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.

Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we aren’t aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.

The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. We’ll discuss it in detail for each of the messaging apps.

Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. It’s up to the vendor to decide where and how to store the data; more on that later.

Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers don’t store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.

So let us see the different extraction options available for the five top instant messaging apps for iOS.

https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/

#forensic #guide #imessage #whatsapp #telegram #signal #skype
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@NoGoolag
πŸ“‘
@BlackBox
Media is too big
VIEW IN TELEGRAM
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.

Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.

https://techlore.tech/goincognito.html

Watch it on:

https://tube.privacytools.io/accounts/techlore/video-channels

https://techlore.tech/assets/GoIncognito.torrent

https://www.youtube.com/watch?v=Y19RFmOxfVM

Text and link sources:
https://github.com/techlore-official/go-incognito


πŸ“‘ @techloreofficial
πŸ‘₯ @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Setup for testing Android app vulnerabilities

In the previous article I documented my approach for reverse engineering an Android game. But getting my hands on the code is only one part of security research. Once a potential issue is identified, I need to verify that it is actually exploitable. So there is no way around messing with an actual live app. Ideally that has to happen in a controlled environment with emulated hardware. As before, this is mostly me writing things down for my future self, but it might come useful for other people as well.

πŸ’‘ Contents

βœ…
Choosing a virtualization approach

βœ… Setting up Android SDK

βœ… Minimal proof of concept Android app

βœ… Adding debugging output to the target application

https://palant.info/2021/02/22/setup-for-testing-android-app-vulnerabilities/

#setup #testing #android #app #vulnerabilities #guide
πŸ“‘@cRyPtHoN_INFOSEC_FR
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@cRyPtHoN_INFOSEC_DE
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
How to turn off the ANDROID TRACKING SERVICES [ROOT required]

Let's start:

πŸ‘‰πŸΌ Download Termux from Google Playstore and install and open it.

Install Packages:

pkg install aapt jq tsu curl -y

( Asks for root privileges, allow this β—οΈπŸ‘‡πŸ½)

cd /data/data/com.termux/files/usr/bin
cp -R aapt /system/xbin/aapt
cp -R jq /system/xbin/jq
cp -R curl /system/xbin/curl
chmod +x /system/xbin/aapt
chmod +x /system/xbin/jq
chmod +x /system/xbin/curl

πŸ‘‰πŸΌ Download the script from here:
https://drive.google.com/drive/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE

πŸ’‘ (Please always use the latest version)

πŸ‘‰πŸΌ
Unpack to πŸ‘‰πŸΌ /sdcard and then enter the following command...:

termux-setup-storage (grant permission)

πŸ‘‰πŸΌ Then enter:
 cd /sdcard

(with root) πŸ‘‡πŸ½

tsu

bash DisableTrackers.sh sys (Add ❗️)

After that, just reboot your device and the job is done.

#root #android #tracking #services #guide
πŸ“‘@cRyPtHoN_INFOSEC_FR
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@cRyPtHoN_INFOSEC_DE
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Forwarded from GJ `°÷°` πŸ‡΅πŸ‡ΈπŸ•Š (t ``~__/>_GJ06)
Anatomy of a Linux DNS Lookup – Part I – zwischenzugs – https://zwischenzugs.com/2018/06/08/anatomy-of-a-linux-dns-lookup-part-i/

Since i work a lot with clusteredVMs, I’ve ended up spending a lot of time trying to figure out how #DNS lookups work. I applied β€˜fixes’ to my problems from StackOverflow without really understanding why they work (or don’t work) for some time.

Eventually I got fed up with this and decided to figure out how it all hangs together. I couldn’t find a complete guide for this anywhere online, and talking to colleagues they didn’t know of any (or really what happens in detail)

So I’m writing the #guide myself.
The Hitchhiker’s Guide to Online Anonymity

πŸ’‘ TLDR:
This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!

The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.

The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).

* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion


πŸ’‘ Online Guide:

* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html

πŸ’‘ PDFs:

* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf

πŸ’‘ Changelog:

* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html

πŸ’‘ Archives:

* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/

Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa

πŸ‘‰πŸΌ Follow me on:
* Mastodon: https://mastodon.online/@anonypla

Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.


πŸ“‘ @NoGoolag πŸ“‘ @Libreware
#guide #anonymity #privacy #anonymousplanet