Forwarded from cRyPtHoN™ INFOSEC (EN)
Please open Telegram to view this post
VIEW IN TELEGRAM
A company that sold encrypted phones was run by crime lords
That’s definitely a conflict of interest
You’ve probably heard the idiom of the fox guarding the hen house — but how about the one of the encrypted phone company run by drug lords?
Okay, that’s obviously not an idiom, but it’s a true story chronicled by Vice’s Joseph Cox. In the story, Cox tells how MPC — a now-seemingly defunct company that apparently sold phones, tablets, and computers running custom firmware with significant encryption protections — was ultimately controlled by two at-large criminal kingpins known as The Brothers.
As Cox’s reporting explains, The Brothers apparently first bought and used encrypted BlackBerrys before hiring developers to make a custom operating system that could theoretically offer them even more privacy and loaded it on phones. The story doesn’t say what type of phones The Brothers use(d), but MPC sold Nexus 5 and 5X phones loaded with a custom OS, which seems likely to be the same one paid for by The Brothers.
Read on Telegram
#why #idiots #crime #encryptionisgood #deletegoogle #deletempc #thinkabout
That’s definitely a conflict of interest
You’ve probably heard the idiom of the fox guarding the hen house — but how about the one of the encrypted phone company run by drug lords?
Okay, that’s obviously not an idiom, but it’s a true story chronicled by Vice’s Joseph Cox. In the story, Cox tells how MPC — a now-seemingly defunct company that apparently sold phones, tablets, and computers running custom firmware with significant encryption protections — was ultimately controlled by two at-large criminal kingpins known as The Brothers.
As Cox’s reporting explains, The Brothers apparently first bought and used encrypted BlackBerrys before hiring developers to make a custom operating system that could theoretically offer them even more privacy and loaded it on phones. The story doesn’t say what type of phones The Brothers use(d), but MPC sold Nexus 5 and 5X phones loaded with a custom OS, which seems likely to be the same one paid for by The Brothers.
Read on Telegram
#why #idiots #crime #encryptionisgood #deletegoogle #deletempc #thinkabout
Vice
Inside the Phone Company Secretly Run By Drug Traffickers
Crime blogger Martin Kok was assassinated while leaving a sex club. It turned out MPC, one of his clients, was not an ordinary phone company.
Forwarded from BlackBox (Security) Archiv
This media is not supported in your browser
VIEW IN TELEGRAM
New method makes people invisible for face recognition
Researchers from Facebook's AI research team and Tel-Aviv University have developed a new method to fool facial recognition on videos․
📺 https://www.youtube.com/watch?v=cCYnBtni7Wg
💡 New method tricks facial recognition on videos:
https://t3n.de/news/neue-methode-trickst-videos-1213004/
#facial #recognition #facebook #video #DeIdentification
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Researchers from Facebook's AI research team and Tel-Aviv University have developed a new method to fool facial recognition on videos․
📺 https://www.youtube.com/watch?v=cCYnBtni7Wg
💡 New method tricks facial recognition on videos:
https://t3n.de/news/neue-methode-trickst-videos-1213004/
#facial #recognition #facebook #video #DeIdentification
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
TLDR Digital Safety Checklist
🤔 Who this guide is for
💡 You use the internet on a day-to-day basis – for work, social media, financial transactions, etc.
💡 You feel you could be doing more to ensure your digital safety and privacy, but you're also not in immediate danger. (If you are, seek out an expert for a 1:1 consult.)
💡 You're comfortable with technology. For example, you're comfortable going into the settings section of your computer/smartphone.
👀 How this guide works
💡 Recommendations have been sorted in ascending levels of difficulty. Start from level one and work your way up!
💡 I recommend doing everything in levels one, two and three. I did, and I'm only a mildly technically-competent person.
💡 Then scan the scenarios to see if any of them apply to you. (They assume that you've done everything in levels 1-3.)
💡 This guide is a living document – please feel free to submit a pull request or fork your own version of this guide on GitHub.
🕒 Last updated: 23 October 2019
👉🏼 Read more:
https://hongkonggong.github.io/tldr-digital-security/
👉🏼 GitHub:
https://github.com/hongkonggong/tldr-digital-security
#digital #safety #checklist #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
🤔 Who this guide is for
💡 You use the internet on a day-to-day basis – for work, social media, financial transactions, etc.
💡 You feel you could be doing more to ensure your digital safety and privacy, but you're also not in immediate danger. (If you are, seek out an expert for a 1:1 consult.)
💡 You're comfortable with technology. For example, you're comfortable going into the settings section of your computer/smartphone.
👀 How this guide works
💡 Recommendations have been sorted in ascending levels of difficulty. Start from level one and work your way up!
💡 I recommend doing everything in levels one, two and three. I did, and I'm only a mildly technically-competent person.
💡 Then scan the scenarios to see if any of them apply to you. (They assume that you've done everything in levels 1-3.)
💡 This guide is a living document – please feel free to submit a pull request or fork your own version of this guide on GitHub.
🕒 Last updated: 23 October 2019
👉🏼 Read more:
https://hongkonggong.github.io/tldr-digital-security/
👉🏼 GitHub:
https://github.com/hongkonggong/tldr-digital-security
#digital #safety #checklist #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
GitHub
GitHub - narwhalacademy/zebra-crossing: Zebra Crossing: an easy-to-use digital safety checklist
Zebra Crossing: an easy-to-use digital safety checklist - narwhalacademy/zebra-crossing
Forwarded from Confidential and Proprietary (join from @exconfidential)
khonect_new_ios-master.zip
259.9 MB
#Source code for some shitty ios app (https://apps.apple.com/us/app/khonect/id1323060028), uploading here because this contains ios app signing #certificates
Forwarded from Confidential and Proprietary (join from @exconfidential)
Some 2015 #MTK stuff, stored in the weirdest way possible: https://github.com/LIFECorp?tab=repositories
to download everything use this script and pray: https://github.com/LIFECorp/root_source/blob/master/sync_sources.sh
to download everything use this script and pray: https://github.com/LIFECorp/root_source/blob/master/sync_sources.sh
GitHub
LIFECorp - Repositories
LIFECorp has 20 repositories available. Follow their code on GitHub.
Navi is a FOSS file Download client for android with multi-download, pause and resume and more.
https://f-droid.org/en/packages/com.tachibana.downloader/
https://f-droid.org/en/packages/com.tachibana.downloader/
f-droid.org
Download Navi | F-Droid - Free and Open Source Android App Repository
Download Navi is a free and Open Source download manager for Android 4.4+
Forwarded from Confidential and Proprietary (join from @exconfidential)
#Spreadtrum #MM tree dump. Contains trustzone, efuse & bootloader implementations and various other proprietary things
https://gitlab.com/exconfidential/sprd
https://gitlab.com/exconfidential/sprd
Forwarded from BlackBox (Security) Archiv
Australia wants to use face-matching to verify people downloading porn
Proving that you're old enough for online porn could get a lot more awkward.
The UK might have ditched plans for an age filter on online porn, but Australia is going all-in with a new proposal that could require internet users to verify their identity in a face-matching database before viewing pornography.
The proposal comes as Australian lawmakers consider new restrictions around age verification for online porn and gambling as part of a bipartisan parliamentary inquiry.
In a submission to the inquiry, first reported by ZDNet, Australia's Department of Home Affairs proposed using its Face Verification Service to verify internet users wanting to look at porn.
"Home Affairs is developing a Face Verification Service which matches a person's photo against images used on one of their evidence of identity documents to help verify their identity," DHA wrote in a submission to the inquiry. "This could assist in age verification, for example by preventing a minor from using their parent's driver licence to circumvent age verification controls."
The first phase of the Face Verification Service launched in 2016 with a database that included citizenship images, accessible by government agencies including the Australian Federal Police. However, the Government has proposed expanding the Service to include drivers' license photos to capture a larger part of the population.
👉🏼 Read more:
https://www.cnet.com/news/australia-face-verification-service-proposed-for-online-porn-age-filter/
#Australia #facial #verification #online #age #filter #porn
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Proving that you're old enough for online porn could get a lot more awkward.
The UK might have ditched plans for an age filter on online porn, but Australia is going all-in with a new proposal that could require internet users to verify their identity in a face-matching database before viewing pornography.
The proposal comes as Australian lawmakers consider new restrictions around age verification for online porn and gambling as part of a bipartisan parliamentary inquiry.
In a submission to the inquiry, first reported by ZDNet, Australia's Department of Home Affairs proposed using its Face Verification Service to verify internet users wanting to look at porn.
"Home Affairs is developing a Face Verification Service which matches a person's photo against images used on one of their evidence of identity documents to help verify their identity," DHA wrote in a submission to the inquiry. "This could assist in age verification, for example by preventing a minor from using their parent's driver licence to circumvent age verification controls."
The first phase of the Face Verification Service launched in 2016 with a database that included citizenship images, accessible by government agencies including the Australian Federal Police. However, the Government has proposed expanding the Service to include drivers' license photos to capture a larger part of the population.
👉🏼 Read more:
https://www.cnet.com/news/australia-face-verification-service-proposed-for-online-porn-age-filter/
#Australia #facial #verification #online #age #filter #porn
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
This media is not supported in your browser
VIEW IN TELEGRAM
Startpage sold to System1 👀
💡 https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/
💡 https://www.kuketz-blog.de/ist-die-suchmaschine-startpage-noch-empfehlenswert/
📺 https://www.youtube.com/watch?v=aAwtQvt1P_c
#startpage #system1
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
💡 https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/
💡 https://www.kuketz-blog.de/ist-die-suchmaschine-startpage-noch-empfehlenswert/
📺 https://www.youtube.com/watch?v=aAwtQvt1P_c
#startpage #system1
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
. Assange in Court
I was deeply shaken while witnessing yesterday’s events in Westminster Magistrates Court. Every decision was railroaded through over the scarcely heard arguments and objections of Assange’s legal team, by a magistrate who barely pretended to be listening.
Before I get on to the blatant lack of fair process, the first thing I must note was Julian’s condition. I was badly shocked by just how much weight my friend has lost, by the speed his hair has receded and by the appearance of premature and vastly accelerated ageing. He has a pronounced limp I have never seen before. Since his arrest he has lost over 15 kg in weight.
But his physical appearance was not as shocking as his mental deterioration. When asked to give his name and date of birth, he struggled visibly over several seconds to recall both. I will come to the important content of his statement at the end of proceedings in due course, but his difficulty in making it was very evident; it was a real struggle for him to articulate the words and focus his train of thought.
Until yesterday I had always been quietly sceptical of those who claimed that Julian’s treatment amounted to torture – even of Nils Melzer, the UN Special Rapporteur on Torture – and sceptical of those who suggested he may be subject to debilitating drug treatments. But having attended the trials in Uzbekistan of several victims of extreme torture, and having worked with survivors from Sierra Leone and elsewhere, I can tell you that yesterday changed my mind entirely and Julian exhibited exactly the symptoms of a torture victim brought blinking into the light, particularly in terms of disorientation, confusion, and the real struggle to assert free will through the fog of learned helplessness.
More:
--> https://www.craigmurray.org.uk/archives/2019/10/assange-in-court/
#imperialists #fucktrump #usaevil #why
I was deeply shaken while witnessing yesterday’s events in Westminster Magistrates Court. Every decision was railroaded through over the scarcely heard arguments and objections of Assange’s legal team, by a magistrate who barely pretended to be listening.
Before I get on to the blatant lack of fair process, the first thing I must note was Julian’s condition. I was badly shocked by just how much weight my friend has lost, by the speed his hair has receded and by the appearance of premature and vastly accelerated ageing. He has a pronounced limp I have never seen before. Since his arrest he has lost over 15 kg in weight.
But his physical appearance was not as shocking as his mental deterioration. When asked to give his name and date of birth, he struggled visibly over several seconds to recall both. I will come to the important content of his statement at the end of proceedings in due course, but his difficulty in making it was very evident; it was a real struggle for him to articulate the words and focus his train of thought.
Until yesterday I had always been quietly sceptical of those who claimed that Julian’s treatment amounted to torture – even of Nils Melzer, the UN Special Rapporteur on Torture – and sceptical of those who suggested he may be subject to debilitating drug treatments. But having attended the trials in Uzbekistan of several victims of extreme torture, and having worked with survivors from Sierra Leone and elsewhere, I can tell you that yesterday changed my mind entirely and Julian exhibited exactly the symptoms of a torture victim brought blinking into the light, particularly in terms of disorientation, confusion, and the real struggle to assert free will through the fog of learned helplessness.
More:
--> https://www.craigmurray.org.uk/archives/2019/10/assange-in-court/
#imperialists #fucktrump #usaevil #why
Craig Murray
Assange in Court
UPDATE I have received scores of requests to republish and/or translate this article. It is absolutely free to use and reproduce and I should be delighted if everybody does; the world should know wha
Forwarded from BlackBox (Security) Archiv
Exclusive: Government officials around the globe targeted for hacking through WhatsApp
WASHINGTON (Reuters) - Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Sources familiar with WhatsApp’s internal investigation into the breach said a “significant” portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents. Many of the nations are U.S. allies, they said.
The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.
WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.
The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.
While it is not clear who used the software to hack officials' phones, NSO has said it sells its spyware exclusively to government customers.
👉🏼 Read more:
https://uk.mobile.reuters.com/article/amp/idUKKBN1XA27N
#WhatsApp #Hack #government #military
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
WASHINGTON (Reuters) - Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Sources familiar with WhatsApp’s internal investigation into the breach said a “significant” portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents. Many of the nations are U.S. allies, they said.
The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.
WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.
The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.
While it is not clear who used the software to hack officials' phones, NSO has said it sells its spyware exclusively to government customers.
👉🏼 Read more:
https://uk.mobile.reuters.com/article/amp/idUKKBN1XA27N
#WhatsApp #Hack #government #military
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
Nebulo – DNS over HTTPS/TLS: Our Interview with the Developer
Nebulo – DNS over HTTPS/TLS is a small but neat Android app to make the internet a little bit safer for us. But for users who just want less advertising on their devices, Nebulo is an interesting option. Many interesting questions have come together thanks to the help of our readers.
Nebulo – DNS over HTTPS/TLS 👀
As mentioned before, Nebulo comes with a few features that can be quite practical for us in everyday life.
💡 one-time configuration at the beginning, after that you don’t have to worry about anything anymore
💡 the provider promises: no advertising and no tracking!
💡 own servers can be specified
💡 comparatively low battery consumption, which is important for smartphone users
💡 also works without root.
If you like, you have the possibility to participate actively in the Nebulo Telegram support group. In the support group, you can always find the latest app version to download, or of course you can report bugs and make suggestions. Nebulo can also be found in the Google Play Store, on F-Droid or in the Aurora Droid as well as on GitLab.
Daniel Wolf and the Nebulo DNS App: our interview with the developer
Tarnkappe.info: Daniel, why do you concentrate on Android? Because it’s the better mobile OS? Or because it was easier to develop the DNS changer app for it, or get it approved by the app store operator?
Daniel Wolf: That’s a quick question to answer. Before I made Android apps, I programmed with Java. I also had an Android mobile phone, so the choice was obvious.
DNS Changer itself was created because I needed it myself.
👉🏼 Read more:
https://tarnkappe.info/nebulo-dns-over-https-tls-our-interview-with-the-developer/
#Nebulo #App #DNS #changer #interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Nebulo – DNS over HTTPS/TLS is a small but neat Android app to make the internet a little bit safer for us. But for users who just want less advertising on their devices, Nebulo is an interesting option. Many interesting questions have come together thanks to the help of our readers.
Nebulo – DNS over HTTPS/TLS 👀
As mentioned before, Nebulo comes with a few features that can be quite practical for us in everyday life.
💡 one-time configuration at the beginning, after that you don’t have to worry about anything anymore
💡 the provider promises: no advertising and no tracking!
💡 own servers can be specified
💡 comparatively low battery consumption, which is important for smartphone users
💡 also works without root.
If you like, you have the possibility to participate actively in the Nebulo Telegram support group. In the support group, you can always find the latest app version to download, or of course you can report bugs and make suggestions. Nebulo can also be found in the Google Play Store, on F-Droid or in the Aurora Droid as well as on GitLab.
Daniel Wolf and the Nebulo DNS App: our interview with the developer
Tarnkappe.info: Daniel, why do you concentrate on Android? Because it’s the better mobile OS? Or because it was easier to develop the DNS changer app for it, or get it approved by the app store operator?
Daniel Wolf: That’s a quick question to answer. Before I made Android apps, I programmed with Java. I also had an Android mobile phone, so the choice was obvious.
DNS Changer itself was created because I needed it myself.
👉🏼 Read more:
https://tarnkappe.info/nebulo-dns-over-https-tls-our-interview-with-the-developer/
#Nebulo #App #DNS #changer #interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
facebook-sealed-exhibits.pdf
627.5 MB
Facebook fought to keep a trove of thousands of explosive internal documents and emails secret. They were just published online in full.
Thousands of pages of internal Facebook documents were published on Wednesday, shedding new light on how the company profited from user data and grappled with rivals.
👉🏼 Read more:
https://www.businessinsider.nl/facebook-internal-documents-executive-emails-published-six4three-court-leak-2019-11
#DeleteFacebook #documents #secret #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Thousands of pages of internal Facebook documents were published on Wednesday, shedding new light on how the company profited from user data and grappled with rivals.
👉🏼 Read more:
https://www.businessinsider.nl/facebook-internal-documents-executive-emails-published-six4three-court-leak-2019-11
#DeleteFacebook #documents #secret #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES