NoGoolag
4.52K subscribers
14.4K photos
7.48K videos
602 files
14.9K links
Download Telegram
InviZible Pro

Telegram channel: @InviZiblePro

Telegram group: @InviZiblePro_Group

Wiki: https://github.com/Gedsh/InviZible/wiki

Download: https://github.com/Gedsh/InviZible/releases

invizible.net

InviZible Pro is an open-source android application. It can protect your internet privacy and security with well-known solutions such as DNSCrypt, Tor and Purple I2P which are used as modules. You can use them all together or activate only one or two at once. InviZible app combines its potential in the best way to achieve comfortable and secure use of the internet.

All application features can be used with root access which gives full control over your android device and power for InviZible to protect your information.

There is a way to use InviZible basic functions without root in combination with those applications that are available to create own local VPN tunnel or use a proxy. Something like NetGuard firewall, personalDNSfilter DNS filter proxy, Firefox browser, Telegram messenger.

InviZible can be used to block ads, malicious sites, and prevent your tracking. Also, you can get access to all blocked Internet resources, Dark Net (onion sites) and Invisible Internet (i2p sites). InviZible helps keep your freedom.

InviZible application is very flexible and can be used by everyone with the default setting. This is usually enough to protect your basic privacy and security. But if you want ultimate protection - no problem. You can configure many useful options to protect yourself better and smarter.

InviZible is compatible with the AfWall+ firewall.


📡 @NoGoolag 📡 @Libreware
#invizible #dns #dnscypt #i2p #tor #privacy #android
What is Cable Haunt?

Cable Haunt is a critical vulnerability found in cable modems from various manufacturers across the world. The vulnerability enables remote attackers to gain complete control of a cable modem, through an endpoint on the modem. Your cable modem is in charge of the internet traffic for all devices on the network. Cable Haunt might therefore be exploited to intercept private messages, redirect traffic, or participation in botnets.

https://cablehaunt.com


📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
#cablehaunt #modem #router #vulnerability #isp
Forwarded from cRyPtHoN INFOSEC (EN)
Privacy activists beg Google to ban un-removable bloatware from Android

Open letter to Chocolate Factory's Sundar Pichai penned by 50 campaign groups

For much of Android's existence, Google has adopted a relatively hands-off approach that lets manufacturers ship units with pre-installed bloatware which, in many cases, cannot be easily removed. This has infuriated users and privacy advocates alike, leading 50 of the latter to pen a blistering open letter to Google and Alphabet chief Sundar Pichai urging him to take action.

https://www.theregister.co.uk/2020/01/13/privacy_activist_beg_google_chief_sundar_pichai_to_ban_unremovable_bloatware/

Earlier Post - HERE

📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Follow We Are Change and G3 News independent media to get informed.
YouTube and Facebook have censored them and they are fighting back!


We Are Change channel: @News4AChange

We Are Change chat: @WeAreChangeChat

G3 News channel: @G3News

G3 News chat: @AntiWar


#news
Forwarded from Aurora OSS
AuroraStore_3.1.8.apk
4 MB
Changelog : v3.1.8
• Fixed Exodus report
• Fixed Login/No network issue
• Fixed Splash screen issue
• Fixed 2FA login issues
• Fixed multiple other issues
• Updated translations
Microsoft issues critical Windows security fix after tipoff from US NSA

Microsoft said the flaw could allow a hacker to forge digital certificates used by some versions of Windows to authenticate and secure data.

https://hindustantimes.com/world-news/microsoft-issues-critical-windows-security-fix-after-tipoff-from-us-nsa/story-Md62ttD4lb1kR0i6WnQalK.html

Note: https://en.wikipedia.org/wiki/NOBUS

NOBUS (nobody but us) are security vulnerabilities which the United States National Security Agency (NSA) believes that only it can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets. More broadly, it refers to the notion that some signals intelligence capabilities are so powerful or otherwise inaccessible that only the NSA will be able to deploy them, though recent analyses suggest that this advantage may be under stress.


#windows #microsoft #nsa #vulnerability #patch
Let's Reverse Engineer Discord

How we reverse engineered Discord’s call protocol and found it being MITM-ed by Discord

Article, Comments

#discord #privacy #mitm
NoGoolag
User agent strings in Chrome will be replaced with a new mechanism called Client Hints https://www.zdnet.com/article/google-to-phase-out-user-agent-strings-in-chrome https://groups.google.com/a/chromium.org/forum/m/#!msg/blink-dev/-2JIRNMWJ7s/yHe4tQNLCgAJ…
The vagueness and the lack of explanation in the article, led me to click the links referencing the standard only to find out these new hints send pretty much the exact same level and detail of information as UA strings, but now its in a way Google controls and they can add other types of queries later on. Also the sentence "The Privacy Sandbox technology stack aims to provide a way for websites and advertisers to query browsers for user details in a way in which browsers don't expose too much information about users." just reminds you that they are still interested in your data and tracking you. Even then, this is not even so relevant since most tracking happens via cookies and your accounts anyways.

All in all, this is a PR stunt
Play Store Still Peppered with Fleeceware Apps

Four months after fleeceware's initial exposure, Android users who purchase "subscriptions" to apps from the Google Play Store are still at risk of being ripped off.

Fleeceware hit the news in September 2019, when researchers at SophosLabs showed how some app publishers were using a sneaky business model to drastically overcharge Android users for basic services.

https://www.infosecurity-magazine.com/news/play-store-still-peppered-with/

Read Via Telegram

Earlier Post - HERE

📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from cRyPtHoN INFOSEC (EN)
Verizon launches new 'privacy-focused' search engine OneSearch that it claims will encrypt keywords and not share user data - but some are skeptical because the firm has tracked customers in the past

🌀 Verizon launched a search engine that it claims is 'privacy-focused'

🌀 It encrypts searches, unfilters and does not store or transfer user information

🌀 The platform is available in North American with other countries coming soon

🌀 But some users have noted that Verizon has tracked users on the web before 😂

https://www.dailymail.co.uk/sciencetech/article-7887179/Verizon-launches-privacy-focused-search-engine-leaving-skeptical-firms-past.html

https://www.onesearch.com/

🚫🚫🚫🚫🚫 ?

📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
'Sextortion' email targeting Google Nest and other smart camera users threatens to upload compromising footage to porn sites if Bitcoin demands are not met

🌀 Security company Mimecast viewed scam email demanding 500 euros in Bitcoin

🌀 Scammers threaten to upload 'nude' videos of the victim to public porn websites

🌀 The email scam is sent to random people who might not even own a Nest device

🌀 The company found almost 1,700 examples of the email, sent mostly to US users

🌀 The process involves logging in to two different email accounts in an attempt by the criminals to cover their tracks

https://www.dailymail.co.uk/sciencetech/article-7886055/Sextortion-campaign-targets-users-Google-Nest-smart-camera.html

📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Now Stores Must Tell You How They're Tracking Your Every Move

California's new privacy law has spurred a torrent of online notices. But the law is also forcing changes offline, in traditional stores.

To anyone with eyes in their kneecaps, the notice outside gadget retailer B8ta’s glossy store next to San Francisco’s new NBA arena is obvious. “We care about your privacy,” the small plaque proclaims, offering a web address and QR code.

https://www.wired.com/story/stores-must-tell-you-how-theyre-tracking/

Read Via Telegram

📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
From: Blair Vidakovich <vidak@riseup.net>
Subject: The Android Mobile Device Software Ecosystem is Terrible
Newsgroups: alt.religion.emacs
Date: Thu, 19 Dec 2019 08:25:02 +0800 (4 weeks, 9 hours, 33 minutes ago)


Forgive my French, but this whole ecosystem of rooting your android
mobile device is a complete abonimation and should, as we millenials say
"get in the sea".

I am rooting a Lenovo Android Tablet for my father, because he has very
low computer literacy, and when left with a computer for too long, will
end up installing dangerous spyware on it.

These are my general observations from completing the task:

- the file manager is a chrome web browser plugin. i cannot view the
entire filesystem without rooting the device.

- it downloaded a system update without my explicit command to do so

- the only way to view user-installed APKs not from the google play
store is to perform a strange finger flick upwards gesture at the home
screen

- i cannot actually view the tar system update file that the operating
system coercively and secretly downloaded - i am merely given a
dialogue box which gives me the options MOREINFO and INSTALL

- all the bootloader and recovery APKs which are available on the
internet require an internet connection at all times to function

- virtually none of the most popular APKs for jailbreaking, rooting, and
installing custom recovery firmware are cryptographically signed or
located in systematically organised package repositories, they are all
floating around on forums, and you are literally shooting from the hip
if you decide to download files from forum posts from users named
"tdawgg777". for all of my complaints and heavy criticism of github, at
least it is an ecosystem with some sort of culture of reputation and
transparency, even if it is the absolute minimum that is acceptable.

- this device came with the proprietary application "netflix" already
installed

- many of the top search engine results that refer to rooting and
installing lineageOS onto tablets are web pages laden with spyware
traps and advertisements, and i assume are not written in
human-composed language - take this obviously intrinsically
trustworthy website: (https://www.getdroidtips.com/)

- FYI, "Framaroot" is literal spyware. Do not attempt to download this
APK.

- any website containing the exact string of symbols "NOW!" in H1 or H2
HTML text should never be accessed

this is, without a doubt, one of the most idiotic and oppressive
software ecosystems i have ever seen, second only to the Windows 10
computer that i attempted to manipulate 2 months ago, which prohibited
me from installing a GNU LaTeX binary because it had not been
cryptographically signed by the Microsoft corporation

I hope you are all having a nice Thursday :-)


this^inf