News app Flipboard hacked: User data possibly copied
Unknown users have had access to Flipboard's user database since summer 2018. The people in charge have reset all passwords.
Currently, some users of the social news app Flipboard receive e-mails about a security incident. In these e-mails, the operators of the service inform that an unknown person had access to the database with user data and possibly copied it. This includes, for example, user names and passwords. Data from bank accounts and credit cards should not be affected.
Several months in the system
According to an official statement by Flipboard, an unauthorized third party had access to the database between June 2018 and April 2019. This allowed him to view usernames, passwords and, in some cases, email addresses and digital tokens connecting third-party accounts to a Flipboard account. The incident was not noticed until April 23, 2019.
Whether or not all flipboard users are affected by the incident is not currently known. Meanwhile the responsible persons have reset all passwords and tokens. Anyone logging on to a new system must assign a new password. If you also use your flipboard password for other online services, you should change it quickly for security reasons.
https://about.flipboard.com/support-information-incident-may-2019/?noredirect=en_US
#newsapp #flipboard #databreach #hacked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Unknown users have had access to Flipboard's user database since summer 2018. The people in charge have reset all passwords.
Currently, some users of the social news app Flipboard receive e-mails about a security incident. In these e-mails, the operators of the service inform that an unknown person had access to the database with user data and possibly copied it. This includes, for example, user names and passwords. Data from bank accounts and credit cards should not be affected.
Several months in the system
According to an official statement by Flipboard, an unauthorized third party had access to the database between June 2018 and April 2019. This allowed him to view usernames, passwords and, in some cases, email addresses and digital tokens connecting third-party accounts to a Flipboard account. The incident was not noticed until April 23, 2019.
Whether or not all flipboard users are affected by the incident is not currently known. Meanwhile the responsible persons have reset all passwords and tokens. Anyone logging on to a new system must assign a new password. If you also use your flipboard password for other online services, you should change it quickly for security reasons.
https://about.flipboard.com/support-information-incident-may-2019/?noredirect=en_US
#newsapp #flipboard #databreach #hacked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Germany mulls giving end-to-end chat app encryption das boot: Law requiring decrypted plain-text is in the works
Officials want to upgrade rules from device searching to message interception
Government officials in Germany are reportedly mulling a law to force chat app providers to hand over end-to-end encrypted conversations in plain text on demand.
According to Der Spiegel this month, the Euro nation's Ministry of the Interior wants a new set of rules that would require operators of services like WhatsApp, Signal, Apple iMessage, and Telegram to cough up plain-text records of people's private enciphered chats to authorities that obtain a court order.
This would expand German law, which right now only allows communications to be gathered from a suspect's device itself, to also include the companies providing encrypted chat services and software. True and strong end-to-end encrypted conversations can only be decrypted by those participating in the discussion, so the proposed rules would require app makers to deliberately knacker or backdoor their code in order to comply. Those changes would be needed to allow them to collect messages passing through their systems and decrypt them on demand.
Up until now, German police have opted not to bother with trying to decrypt the contents of messages in transit, opting instead to simply seize and break into the device itself, where the messages are typically stored in plain text.
The new rules are set to be discussed by the members of the interior ministry in an upcoming June conference, and are likely to face stiff opposition not only on privacy grounds, but also in regards to the technical feasibility of the requirements.
Spokespeople for Facebook-owned WhatsApp, and Threema, makers of encrypted messaging software, were not available to comment.
The rules are the latest in an ongoing global feud between the developers of secure messaging apps and the governments. The apps, designed in part to let citizens, journalists, and activists communicate secured from the prying eyes of oppressive government regimes.
https://www.theregister.co.uk/2019/05/28/german_government_encryption/
Read as well:
Germany Seeks Access to Encrypted Messages on WhatsApp, Telegram
https://www.infosecurity-magazine.com/news/germany-seeks-access-to-encrypted/
📡 @NoGoolag
https://t.me/NoGoolag/1259
#decrypt #encrypt #whatsapp #telegram #wire #threema #germany #statetrojan #backdoor #why #eu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Officials want to upgrade rules from device searching to message interception
Government officials in Germany are reportedly mulling a law to force chat app providers to hand over end-to-end encrypted conversations in plain text on demand.
According to Der Spiegel this month, the Euro nation's Ministry of the Interior wants a new set of rules that would require operators of services like WhatsApp, Signal, Apple iMessage, and Telegram to cough up plain-text records of people's private enciphered chats to authorities that obtain a court order.
This would expand German law, which right now only allows communications to be gathered from a suspect's device itself, to also include the companies providing encrypted chat services and software. True and strong end-to-end encrypted conversations can only be decrypted by those participating in the discussion, so the proposed rules would require app makers to deliberately knacker or backdoor their code in order to comply. Those changes would be needed to allow them to collect messages passing through their systems and decrypt them on demand.
Up until now, German police have opted not to bother with trying to decrypt the contents of messages in transit, opting instead to simply seize and break into the device itself, where the messages are typically stored in plain text.
The new rules are set to be discussed by the members of the interior ministry in an upcoming June conference, and are likely to face stiff opposition not only on privacy grounds, but also in regards to the technical feasibility of the requirements.
Spokespeople for Facebook-owned WhatsApp, and Threema, makers of encrypted messaging software, were not available to comment.
The rules are the latest in an ongoing global feud between the developers of secure messaging apps and the governments. The apps, designed in part to let citizens, journalists, and activists communicate secured from the prying eyes of oppressive government regimes.
https://www.theregister.co.uk/2019/05/28/german_government_encryption/
Read as well:
Germany Seeks Access to Encrypted Messages on WhatsApp, Telegram
https://www.infosecurity-magazine.com/news/germany-seeks-access-to-encrypted/
📡 @NoGoolag
https://t.me/NoGoolag/1259
#decrypt #encrypt #whatsapp #telegram #wire #threema #germany #statetrojan #backdoor #why #eu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
iPhone apps share your data with trackers, ad companies and research firms
It’s the middle of the night. Do you know who your iPhone is talking to?
Apple says, “What happens on your iPhone stays on your iPhone.” Our privacy experiment showed 5,400 hidden app trackers guzzled our data — in a single week.
It’s 3 a.m. Do you know what your iPhone is doing?
Mine has been alarmingly busy. Even though the screen is off and I’m snoring, apps are beaming out lots of information about me to companies I’ve never heard of. Your iPhone probably is doing the same — and Apple could be doing more to stop it.
On a recent Monday night, a dozen marketing companies, research firms and other personal data guzzlers got reports from my iPhone. At 11:43 p.m., a company called Amplitude learned my phone number, email and exact location. At 3:58 a.m., another called Appboy got a digital fingerprint of my phone. At 6:25 a.m., a tracker called Demdex received a way to identify my phone and sent back a list of other trackers to pair up with.
And all night long, there was some startling behavior by a household name: Yelp. It was receiving a message that included my IP address -— once every five minutes.
Our data has a secret life in many of the devices we use every day, from talking Alexa speakers to smart TVs. But we’ve got a giant blind spot when it comes to the data companies probing our phones.
You might assume you can count on Apple to sweat all the privacy details. After all, it touted in a recent ad, “What happens on your iPhone stays on your iPhone.” My investigation suggests otherwise.
IPhone apps I discovered tracking me by passing information to third parties — just while I was asleep — include Microsoft OneDrive, Intuit’s Mint, Nike, Spotify, The Washington Post and IBM’s the Weather Channel. One app, the crime-alert service Citizen, shared personally identifiable information in violation of its published privacy policy.
And your iPhone doesn’t only feed data trackers while you sleep. In a single week, I encountered over 5,400 trackers, mostly in apps, not including the incessant Yelp traffic. According to privacy firm Disconnect, which helped test my iPhone, those unwanted trackers would have spewed out 1.5 gigabytes of data over the span of a month. That’s half of an entire basic wireless service plan from AT&T.
“This is your data. Why should it even leave your phone? Why should it be collected by someone when you don’t know what they’re going to do with it?” says Patrick Jackson, a former National Security Agency researcher who is chief technology officer for Disconnect. He hooked my iPhone into special software so we could examine the traffic. “I know the value of data, and I don’t want mine in any hands where it doesn’t need to be,” he told me.
Read more:
https://outline.com/q38TDx
Comments
https://news.ycombinator.com/item?id=20031443
#apple #iphone #trackers #datamining #privacy #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
It’s the middle of the night. Do you know who your iPhone is talking to?
Apple says, “What happens on your iPhone stays on your iPhone.” Our privacy experiment showed 5,400 hidden app trackers guzzled our data — in a single week.
It’s 3 a.m. Do you know what your iPhone is doing?
Mine has been alarmingly busy. Even though the screen is off and I’m snoring, apps are beaming out lots of information about me to companies I’ve never heard of. Your iPhone probably is doing the same — and Apple could be doing more to stop it.
On a recent Monday night, a dozen marketing companies, research firms and other personal data guzzlers got reports from my iPhone. At 11:43 p.m., a company called Amplitude learned my phone number, email and exact location. At 3:58 a.m., another called Appboy got a digital fingerprint of my phone. At 6:25 a.m., a tracker called Demdex received a way to identify my phone and sent back a list of other trackers to pair up with.
And all night long, there was some startling behavior by a household name: Yelp. It was receiving a message that included my IP address -— once every five minutes.
Our data has a secret life in many of the devices we use every day, from talking Alexa speakers to smart TVs. But we’ve got a giant blind spot when it comes to the data companies probing our phones.
You might assume you can count on Apple to sweat all the privacy details. After all, it touted in a recent ad, “What happens on your iPhone stays on your iPhone.” My investigation suggests otherwise.
IPhone apps I discovered tracking me by passing information to third parties — just while I was asleep — include Microsoft OneDrive, Intuit’s Mint, Nike, Spotify, The Washington Post and IBM’s the Weather Channel. One app, the crime-alert service Citizen, shared personally identifiable information in violation of its published privacy policy.
And your iPhone doesn’t only feed data trackers while you sleep. In a single week, I encountered over 5,400 trackers, mostly in apps, not including the incessant Yelp traffic. According to privacy firm Disconnect, which helped test my iPhone, those unwanted trackers would have spewed out 1.5 gigabytes of data over the span of a month. That’s half of an entire basic wireless service plan from AT&T.
“This is your data. Why should it even leave your phone? Why should it be collected by someone when you don’t know what they’re going to do with it?” says Patrick Jackson, a former National Security Agency researcher who is chief technology officer for Disconnect. He hooked my iPhone into special software so we could examine the traffic. “I know the value of data, and I don’t want mine in any hands where it doesn’t need to be,” he told me.
Read more:
https://outline.com/q38TDx
Comments
https://news.ycombinator.com/item?id=20031443
#apple #iphone #trackers #datamining #privacy #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
How to permanently delete a Facebook account
Here is the shortcut link to the official Facebook account deletion page.
A deceased member's account can be memorialized or removed.
Delete Facebook - Spread the word
Need more detail? Try the step-by-step guide.
https://deletefacebook.com
#deletefacebook #delete #fb
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Here is the shortcut link to the official Facebook account deletion page.
A deceased member's account can be memorialized or removed.
Delete Facebook - Spread the word
Need more detail? Try the step-by-step guide.
https://deletefacebook.com
#deletefacebook #delete #fb
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
HUAWEI is now back on the member list of SD, Wifi, Bluetooth, and JEDEC Association
For a few days we saw Huawei's membership was either revoked or suspended by SD, Wifi, Bluetooth, and JEDEC Association. After a few days, the membership seems to have been restored.
What's interesting to watch is how these organizations all behave in sync. Links:
https://www.bluetooth.com/develop-with-bluetooth/join/member-directory/
https://www.sdcard.org/about_sda/member_companies/index.html
https://www.wi-fi.org/membership/member-companies
https://www.jedec.org/about-jedec/member-list
#huawei
For a few days we saw Huawei's membership was either revoked or suspended by SD, Wifi, Bluetooth, and JEDEC Association. After a few days, the membership seems to have been restored.
What's interesting to watch is how these organizations all behave in sync. Links:
https://www.bluetooth.com/develop-with-bluetooth/join/member-directory/
https://www.sdcard.org/about_sda/member_companies/index.html
https://www.wi-fi.org/membership/member-companies
https://www.jedec.org/about-jedec/member-list
#huawei
All for all - and Assange against all
Julian Assange is the only anarchist who has made world politics in the 21st century. In London he must go to court - and with him the ideas of hacker culture.
80c11049faebf441d524fb3c4cd5351c: American soldier Chelsea Manning types this character combination into a chat on March 8, 2010. It is a so-called hash value, the encrypted form of a password. Manning wants to open another door in the army's computer system from which she forwards internal documents to Wikileaks. But she can't crack the hash, hopes for her chat partner, and according to the US Department of Justice the name is Julian Assange. But even the Wikileaks founder and his team are unable to decipher the hash.
The very moment when Assange's hacking skills fail is his doom.
This Thursday, the most famous face that hacker culture has produced will be on trial in London. It is about Assange's extradition to his arch-enemy, the United States of America. The accusation: espionage as Manning's accomplice. Depending on one's point of view, this does not only call into question freedom of the press. The basic conviction of an increasingly influential subculture is also being negotiated: that all information must be freed from dark computer memories and all knowledge of domination must be removed. Everything for everyone. Assange is the only anarchist who made world politics in the 21st century.
The term "hacker" first appeared in the USA in the 1950s and has little to do with political ideas. The first mainframe computers still programmed with punched cards are found in universities. The early hackers did not want to invade foreign computer systems - there are hardly any of them yet. They want to extend the functions of computers. The word "hack" initially means solving a technical problem. In the "Tech Model Railroad Club", a model railway club at the Massachusetts Institute of Technology, the first hackers are working on improving track circuits.
Chip technology later replaced the transistor computer, computers became smaller and more affordable for private individuals. But because there were no graphical user interfaces until the 1980s, as is the case today in Windows or smartphones, owners must at least be able to program a little. To this day, movies present hacking as a superhuman skill. As an X-ray view that perceives what happens under the smooth surfaces of the devices and in nanometer-sized chip parts. Historian Julia Gül Erdogan sees things differently. She says: "The goal of the early hackers was to demystify computer technology. They wanted to understand and master their new machines." Erdogan is doing his doctorate at the Centre for Contemporary Historical Research in Potsdam on hacker cultures in the FRG and GDR.
Source 🇩🇪
https://www.sueddeutsche.de/digital/julian-assange-hacker-it-sicherheit-1.4467914
Translation full article 🇬🇧
https://t.me/BlackBox_Archiv/396
📡 @BlackBox
#FreeAssange
Julian Assange is the only anarchist who has made world politics in the 21st century. In London he must go to court - and with him the ideas of hacker culture.
80c11049faebf441d524fb3c4cd5351c: American soldier Chelsea Manning types this character combination into a chat on March 8, 2010. It is a so-called hash value, the encrypted form of a password. Manning wants to open another door in the army's computer system from which she forwards internal documents to Wikileaks. But she can't crack the hash, hopes for her chat partner, and according to the US Department of Justice the name is Julian Assange. But even the Wikileaks founder and his team are unable to decipher the hash.
The very moment when Assange's hacking skills fail is his doom.
This Thursday, the most famous face that hacker culture has produced will be on trial in London. It is about Assange's extradition to his arch-enemy, the United States of America. The accusation: espionage as Manning's accomplice. Depending on one's point of view, this does not only call into question freedom of the press. The basic conviction of an increasingly influential subculture is also being negotiated: that all information must be freed from dark computer memories and all knowledge of domination must be removed. Everything for everyone. Assange is the only anarchist who made world politics in the 21st century.
The term "hacker" first appeared in the USA in the 1950s and has little to do with political ideas. The first mainframe computers still programmed with punched cards are found in universities. The early hackers did not want to invade foreign computer systems - there are hardly any of them yet. They want to extend the functions of computers. The word "hack" initially means solving a technical problem. In the "Tech Model Railroad Club", a model railway club at the Massachusetts Institute of Technology, the first hackers are working on improving track circuits.
Chip technology later replaced the transistor computer, computers became smaller and more affordable for private individuals. But because there were no graphical user interfaces until the 1980s, as is the case today in Windows or smartphones, owners must at least be able to program a little. To this day, movies present hacking as a superhuman skill. As an X-ray view that perceives what happens under the smooth surfaces of the devices and in nanometer-sized chip parts. Historian Julia Gül Erdogan sees things differently. She says: "The goal of the early hackers was to demystify computer technology. They wanted to understand and master their new machines." Erdogan is doing his doctorate at the Centre for Contemporary Historical Research in Potsdam on hacker cultures in the FRG and GDR.
Source 🇩🇪
https://www.sueddeutsche.de/digital/julian-assange-hacker-it-sicherheit-1.4467914
Translation full article 🇬🇧
https://t.me/BlackBox_Archiv/396
📡 @BlackBox
#FreeAssange
WhatsApp users will start seeing in-app ads within ‘Status’ feature from 2020
http://9to5google.com/2019/05/23/whatsapp-ads-2020
Comments:
https://news.ycombinator.com/item?id=20029376
#whatsapp #ads #fb #messaging
http://9to5google.com/2019/05/23/whatsapp-ads-2020
Comments:
https://news.ycombinator.com/item?id=20029376
#whatsapp #ads #fb #messaging
9to5Google
WhatsApp users will start seeing in-app ads within ‘Status’ feature from 2020
We've known for some time that WhatsApp would be getting ads but now we have explicit confirmation that it is coming by 2020 to the 'Status' section.
Google Duo starting to send ads to its users? This behavior has been confirmed by many Reddit users
https://www.reddit.com/r/Android/comments/bumq3r/anyone_else_just_get_a_push_notification_ad_from
#duo #ads #google #googleduo #messaging
https://www.reddit.com/r/Android/comments/bumq3r/anyone_else_just_get_a_push_notification_ad_from
#duo #ads #google #googleduo #messaging
🗞 Google tightens restrictions on apps with sexual content, loot boxes, hate speech, and marijuana sales
Google is making a number of policy changes to the Google Play store and the applications that are allowed to be inside it. This seems to be both a big push towards making the Play Store more family friendly while also clearing up some gray areas that developers have been curious about. The latest changes
...
https://www.xda-developers.com/google-play-restrictions-sexual-content-loot-boxes-hate-speech-marijuana
#google #playstore #cannabis #censorship
Google is making a number of policy changes to the Google Play store and the applications that are allowed to be inside it. This seems to be both a big push towards making the Play Store more family friendly while also clearing up some gray areas that developers have been curious about. The latest changes
...
https://www.xda-developers.com/google-play-restrictions-sexual-content-loot-boxes-hate-speech-marijuana
#google #playstore #cannabis #censorship
XDA Developers
Google tightens restrictions on apps with sexual content, loot boxes, hate speech, and marijuana sales
Google is making a number of policy changes to the Google Play store and the applications that are allowed to be inside it.
Google will let enterprise users escape Chrome's ad-blocking restrictions
The company's new extension changes could have a big impact on internet ads.
Google announced Manifest V3 earlier this year -- a proposed change to Chrome's extension system that would essentially stop ad-blockers from working effectively. Despite the significant backlash Google faced in the aftermath of this decision, it's now doubled down on the changes with one major exception -- enterprise users will be unaffected.
📰 https://9to5google.com/2019/05/29/chrome-ad-blocking-enterprise-manifest-v3/
Read Via Telegram
Other Article
📰 https://t.me/cRyPtHoN_INFOSEC_EN/4221
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
The company's new extension changes could have a big impact on internet ads.
Google announced Manifest V3 earlier this year -- a proposed change to Chrome's extension system that would essentially stop ad-blockers from working effectively. Despite the significant backlash Google faced in the aftermath of this decision, it's now doubled down on the changes with one major exception -- enterprise users will be unaffected.
📰 https://9to5google.com/2019/05/29/chrome-ad-blocking-enterprise-manifest-v3/
Read Via Telegram
Other Article
📰 https://t.me/cRyPtHoN_INFOSEC_EN/4221
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Microg / Nanodroid issues and solutions
💡 https://gitlab.com/Nanolx/NanoDroid/tree/master#issues
💡 https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/post79468220
💡 npem
In a terminal app like termux write these 2 commands and reboot (first one is just to get root, accept):
https://gitlab.com/Nanolx/NanoDroid/blob/master/doc/NanoDroidPerm.md
📡 @NoGoolag 📡 @Libreware
#microg #issues #solutions #problem #nanodroid #rh01
💡 https://gitlab.com/Nanolx/NanoDroid/tree/master#issues
💡 https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/post79468220
💡 npem
In a terminal app like termux write these 2 commands and reboot (first one is just to get root, accept):
sunpemhttps://gitlab.com/Nanolx/NanoDroid/blob/master/doc/NanoDroidPerm.md
📡 @NoGoolag 📡 @Libreware
#microg #issues #solutions #problem #nanodroid #rh01
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
📺 Unboxing Social Data Algorithms - #facebook #tracking #exposed
Today I want to talk about a project named ALEX, which is the acronym for Algorithm Exposed, and one of its first output: a tool for scientific analysis of the social network personalisation algorithm, that we call fbtrex, Facebook-tracking-exposed. It works by collecting what Facebook sends to you, as your timeline. Because is personalised, it can be obtained as evidence and used to understand the algorithm logic.
📺 Claudio Agosti @ transmediale 2019b #video #podcast
https://2019.transmediale.de/content/affects-ex-machina-unboxing-social-data-algorithms
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Today I want to talk about a project named ALEX, which is the acronym for Algorithm Exposed, and one of its first output: a tool for scientific analysis of the social network personalisation algorithm, that we call fbtrex, Facebook-tracking-exposed. It works by collecting what Facebook sends to you, as your timeline. Because is personalised, it can be obtained as evidence and used to understand the algorithm logic.
📺 Claudio Agosti @ transmediale 2019b #video #podcast
https://2019.transmediale.de/content/affects-ex-machina-unboxing-social-data-algorithms
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ALEX - fbtrex - Facebook-tracking-exposed
Our vision is to increase transparency behind personalization algorithms, so that people can have more effective control of their online Facebook experience and more awareness of the information to which they are exposed.
👉🏼 Facebook users that want data about own filter bubble
👉🏼 Researchers collecting data with control groups in FB
👉🏼 Journalist interested in echo chambers and algorithm personalization
It works by collecting what Facebook sends to you, as your timeline. Because is personalised, it can be obtained as evidence and used to understand the algorithm logic.
Our mission is to help researchers assess how current filtering mechanisms work and how personalization algorithms should be modified in order to minimize the dangerous social effects.
https://facebook.tracking.exposed/
Firefox addon:
https://addons.mozilla.org/en-US/firefox/addon/facebook-tracking-exposed/
📺 Video about Facebook-tracking-exposed:
https://t.me/BlackBox_Archiv/399 or https://t.me/NoGoolag/1300
#facebook #ALEX #tracking #exposed #addon #algorithm #DeleteFacebook
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Our vision is to increase transparency behind personalization algorithms, so that people can have more effective control of their online Facebook experience and more awareness of the information to which they are exposed.
👉🏼 Facebook users that want data about own filter bubble
👉🏼 Researchers collecting data with control groups in FB
👉🏼 Journalist interested in echo chambers and algorithm personalization
It works by collecting what Facebook sends to you, as your timeline. Because is personalised, it can be obtained as evidence and used to understand the algorithm logic.
Our mission is to help researchers assess how current filtering mechanisms work and how personalization algorithms should be modified in order to minimize the dangerous social effects.
https://facebook.tracking.exposed/
Firefox addon:
https://addons.mozilla.org/en-US/firefox/addon/facebook-tracking-exposed/
📺 Video about Facebook-tracking-exposed:
https://t.me/BlackBox_Archiv/399 or https://t.me/NoGoolag/1300
#facebook #ALEX #tracking #exposed #addon #algorithm #DeleteFacebook
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
DNSCloak: System-wide tracking and advertising blocker for iOS
With DNSCloak not only encrypted DNS requests via DNSCrypt & DNS-over-HTTPS/2 (DoH) are possible, but also system-wide blocking of advertisements and trackers via filter lists.
DNSCrypt is a protocol that authenticates the communication between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses signatures to ensure that the responses come from the selected DNS resolver and have not been manipulated. You can learn more about the DNSCrypt protocol at
"Our app implements the protocols DNSCrypt & DNS-over-HTTPS/2 (DoH) and allows you to protect your DNS traffic from spoofing. It overwrites your DNS settings with one or more DNSCrypt or DNS-over-HTTPS/2 (DoH) resolvers. Works for both WiFi and mobile phones."
If you have iOS, you should have a look at it and give feedback how you like it!
Feedback with #DNSCloak @ https://t.me/joinchat/FyFlS0X2D7f6YNvdxhEsfw
More info:
https://dnscrypt.info
App download:
https://itunes.apple.com/app/id1452162351
📡 @NoGoolag
#iOS #adblock #DNSCloak #DNSCrypt #DoH
With DNSCloak not only encrypted DNS requests via DNSCrypt & DNS-over-HTTPS/2 (DoH) are possible, but also system-wide blocking of advertisements and trackers via filter lists.
DNSCrypt is a protocol that authenticates the communication between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses signatures to ensure that the responses come from the selected DNS resolver and have not been manipulated. You can learn more about the DNSCrypt protocol at
"Our app implements the protocols DNSCrypt & DNS-over-HTTPS/2 (DoH) and allows you to protect your DNS traffic from spoofing. It overwrites your DNS settings with one or more DNSCrypt or DNS-over-HTTPS/2 (DoH) resolvers. Works for both WiFi and mobile phones."
If you have iOS, you should have a look at it and give feedback how you like it!
Feedback with #DNSCloak @ https://t.me/joinchat/FyFlS0X2D7f6YNvdxhEsfw
More info:
https://dnscrypt.info
App download:
https://itunes.apple.com/app/id1452162351
📡 @NoGoolag
#iOS #adblock #DNSCloak #DNSCrypt #DoH
Julian Assange Tortured with Psychotropic Drug
Retired USAF lieutenant colonel Karen Kwiatkowski writes in an article posted at Lew Rockwell’s website that Julian Assange is receiving the same treatment as suspected terrorists while in captivity at “Her Majesty’s Prison Service” at Belmarsh.
The FBI, Pentagon, and CIA are “interviewing” Assange. Kwiatkowski writes:
"Interviewing is the wrong word. I’d like to say doctoring him, because it would be more accurate, except that word implies some care for a positive outcome. Chemical Gina has her hands in this one, and we are being told that Assange is being “treated” with 3-quinuclidinyl benzilate, known as BZ."
BZ is a powerful drug that produces hallucinations.
“Soldiers on BZ could remember only fragments of the experience afterward. As the drug wore off, and the subjects had trouble discerning what was real, many experienced anxiety, aggression, even terror,” the New Yorker reported. “…The drug’s effect lasted for days. At its peak, volunteers were totally cut off in their own minds, jolting from one fragmented existence to the next. They saw visions: Lilliputian baseball players competing on a tabletop diamond; animals or people or objects that materialized and vanished.”
Assange is being chemically lobotomized prior to being extradited to the United States to stand trial on bogus computer hacking charges that—and the corporate media won’t tell you this—passed the statute of limitations three years ago (see 18 U.S. Code § 371. Conspiracy to commit offense or to defraud United States).
https://www.globalresearch.ca/julian-assange-tortured-psychotropic-drug/5676921
Read as well:
https://twitter.com/wikileaks/status/1133847992656715776
https://www.theguardian.com/commentisfree/2018/jan/24/julian-assange-care-wikileaks-ecuadorian-embassy
https://www.reuters.com/article/us-wikileaks-assange/swedish-court-rejects-delay-of-assange-hearing-over-ill-health-lawyer-idUSKCN1SY1UI
https://www.lewrockwell.com/2019/05/karen-kwiatkowski/pray-and-weep/
📡 @NoGoolag
#FreeAssange #assange #wikileaks
Retired USAF lieutenant colonel Karen Kwiatkowski writes in an article posted at Lew Rockwell’s website that Julian Assange is receiving the same treatment as suspected terrorists while in captivity at “Her Majesty’s Prison Service” at Belmarsh.
The FBI, Pentagon, and CIA are “interviewing” Assange. Kwiatkowski writes:
"Interviewing is the wrong word. I’d like to say doctoring him, because it would be more accurate, except that word implies some care for a positive outcome. Chemical Gina has her hands in this one, and we are being told that Assange is being “treated” with 3-quinuclidinyl benzilate, known as BZ."
BZ is a powerful drug that produces hallucinations.
“Soldiers on BZ could remember only fragments of the experience afterward. As the drug wore off, and the subjects had trouble discerning what was real, many experienced anxiety, aggression, even terror,” the New Yorker reported. “…The drug’s effect lasted for days. At its peak, volunteers were totally cut off in their own minds, jolting from one fragmented existence to the next. They saw visions: Lilliputian baseball players competing on a tabletop diamond; animals or people or objects that materialized and vanished.”
Assange is being chemically lobotomized prior to being extradited to the United States to stand trial on bogus computer hacking charges that—and the corporate media won’t tell you this—passed the statute of limitations three years ago (see 18 U.S. Code § 371. Conspiracy to commit offense or to defraud United States).
https://www.globalresearch.ca/julian-assange-tortured-psychotropic-drug/5676921
Read as well:
https://twitter.com/wikileaks/status/1133847992656715776
https://www.theguardian.com/commentisfree/2018/jan/24/julian-assange-care-wikileaks-ecuadorian-embassy
https://www.reuters.com/article/us-wikileaks-assange/swedish-court-rejects-delay-of-assange-hearing-over-ill-health-lawyer-idUSKCN1SY1UI
https://www.lewrockwell.com/2019/05/karen-kwiatkowski/pray-and-weep/
📡 @NoGoolag
#FreeAssange #assange #wikileaks
How a big company tries to get freeCodeCamp.org to publish their articles only behind their paywall
First Medium tries to offer them money, but what to do if people are not interested in money, if they only want to share their knowledge with everyone for free, so that everyone can profit from this knowledge?
Quite simply, they try to threaten you with a lawyer and legal steps.
This is a good example of why you should definitely run your own blog and not get involved with any greedy media sharks.
freecodecamp.org/ has now learned his lesson and no longer has his blog on medium.com, they now have their own blog where they can share their knowledge for free
❗️Knowledge should be freely available to everyone
Such media platforms as medium.com should be boycotted. There are enough alternatives #thinkabout
https://twitter.com/oleg008/status/1134475953470656513
https://www.freecodecamp.org/
📡 @NoGoolag
#thinkabout #medium #blog
First Medium tries to offer them money, but what to do if people are not interested in money, if they only want to share their knowledge with everyone for free, so that everyone can profit from this knowledge?
Quite simply, they try to threaten you with a lawyer and legal steps.
This is a good example of why you should definitely run your own blog and not get involved with any greedy media sharks.
freecodecamp.org/ has now learned his lesson and no longer has his blog on medium.com, they now have their own blog where they can share their knowledge for free
❗️Knowledge should be freely available to everyone
Such media platforms as medium.com should be boycotted. There are enough alternatives #thinkabout
https://twitter.com/oleg008/status/1134475953470656513
https://www.freecodecamp.org/
📡 @NoGoolag
#thinkabout #medium #blog
Twitter for Julian Assange, WikiLeaks & Free Press
This channel was created to collect posts from Twitter, linking to news about Julian Assange .
If you always want to get the latest news about Assange, you should definitely have a look at it
📡 https://t.me/saveAssange
📡 @NoGoolag
#FreeAssange
This channel was created to collect posts from Twitter, linking to news about Julian Assange .
If you always want to get the latest news about Assange, you should definitely have a look at it
📡 https://t.me/saveAssange
📡 @NoGoolag
#FreeAssange
Telegram
#Wikileaks
This channel was created to collect posts from Twitter, linking to news about Julian Assange - once powered by nitter.net @ifttt.
additional info: @WikiLeaksTwitterbot
additional info: @WikiLeaksTwitterbot