NoGoolag
4.52K subscribers
14K photos
7.29K videos
597 files
14.7K links
Download Telegram
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index

Some Guides to Interacting With the FBI
https://t.me/RevToolboxRedux/1828

Fuck Off Google! - Invisible Committee
https://t.me/RevToolboxRedux/1843

Police At the Door - What to do
https://t.me/RevToolboxRedux/1865

Digital Safety Story
https://t.me/RevToolboxRedux/1867

STOP TALKING Before It's Too Late!
https://t.me/RevToolboxRedux/1868

Doxcare - by Crimethinc
https://t.me/RevToolboxRedux/1879

EXIF Cleaners for Clean Image Files
https://t.me/RevToolboxRedux/1935

How To Protect Your Privacy at a Protest (video)
https://t.me/RevToolboxRedux/1939

Attending a Protest - Surveillance Self Defense
https://t.me/RevToolboxRedux/1945

Ten Rules of the Protester - translated from Russian
https://t.me/RevToolboxRedux/1951

Overview/Comparison of different messaging apps
https://t.me/RevToolboxRedux/1985

Wessel's Opsec Guide
https://t.me/RevToolboxRedux/1997

Become Anonymous - a video guide
https://t.me/RevToolboxRedux/2017

Ten Ways to Secure Your Telegram
https://t.me/RevToolboxRedux/2029

Warrior Crowd Control and Riot Manual
https://t.me/RevToolboxRedux/2037

A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/2057

S.A.L.U.T.E. Spread Info Not Panic (original)
https://t.me/RevToolboxRedux/2114

How Long It Will Take to Crack Your Password
https://t.me/RevToolboxRedux/2118

Black Bloc Tactics - Crimethinc
https://t.me/RevToolboxRedux/2119

Ozimandias Direct Action and Sabotage Handbook
https://t.me/RevToolboxRedux/2122

Guide to Communications and OSINT for 2020 protest movements
https://t.me/RevToolboxRedux/2123

WTO Seattle Logistics Zine (1999)
https://t.me/RevToolboxRedux/2127

PDX Hivebloc Guides
https://t.me/RevToolboxRedux/2128

Confidence Courage Connection Trust - A Proposal for Security Culture
https://t.me/RevToolboxRedux/2131

The Riot Is One Night, But Metadata Lasts Forever
https://t.me/RevToolboxRedux/2132

Digital Safety Kit (committee to protect journalists)
https://t.me/RevToolboxRedux/2133

Stingray Trackers - what you need to know and how to protect yourself
https://t.me/RevToolboxRedux/2134

T-Shirt/Ninja Bloc
https://t.me/RevToolboxRedux/2135

Anti-Surveillance Toolkit - Photography and Video
https://t.me/RevToolboxRedux/2142

The Riot Is One Night, But Metadata Lasts Forever (alt)
https://t.me/RevToolboxRedux/2143

How to Protect Yourself and Others from Police Agitation
https://t.me/RevToolboxRedux/2196

How to Identify Police Surveillance (video, EFF)
https://t.me/RevToolboxRedux/2203

DIY Occupation Guide and Squatters Resources
https://t.me/RevToolboxRedux/2218

Didn't See Nothin' Don't Know Nothin', A Social Media Field Guide
https://t.me/RevToolboxRedux/2238

Resources, Tips, Communiques for Direct Action and CCTV Sabotage
https://t.me/RevToolboxRedux/2241

Resist State Oppression (art)
https://t.me/RevToolboxRedux/2255

The Red Flags of Rogue URL's
https://t.me/RevToolboxRedux/2256

Anonymize Your Online Footprint
https://t.me/RevToolboxRedux/2257

Earthfirst! Direct Action Manual for Monkeywrenchers
https://t.me/RevToolboxRedux/2306

Flyer for Livestreamers and Journalists
https://t.me/RevToolboxRedux/2310

What to Do In the Upcoming Days - for protesters in Burma
https://t.me/RevToolboxRedux/2321

If ICE Agents Show Up At Your Door
https://t.me/RevToolboxRedux/2328

A Recipe for Nocturnal Direct Actions! (zine)
https://t.me/RevToolboxRedux/2330

US Army FM 3-24 - Insurgencies and Countering Insurgencies
https://t.me/RevToolboxRedux/2350

Ecodefense: A Field Guide to Monkeywrenching
https://t.me/RevToolboxRedux/2355

Front-ends for evil sites/platforms
https://t.me/RevToolboxRedux/2408

How To Watch YouTube Without App/Website
https://t.me/RevToolboxRedux/2411

Use Your Right to Report Responsibly
https://t.me/RevToolboxRedux/2446

Protest Reporting Toolkit
https://t.me/RevToolboxRedux/2451

The Cops Don't Play Fair, Be Prepared
https://t.me/RevToolboxRedux/2457

No Face, No Case
https://t.me/RevToolboxRedux/2487
https://t.me/RevToolboxRedux/2519

#directory
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index

Video on How to Handle a Detective Visit
https://t.me/RevToolboxRedux/1823

What Is Autonomous Action?
https://t.me/RevToolboxRedux/2512

Some Protest Basics
https://t.me/RevToolboxRedux/2513

Guides for Police Provocateurs and FBI Agents
https://t.me/RevToolboxRedux/2537

Don't Become the State's Eyes (image)
https://t.me/RevToolboxRedux/2538

Digital Security Guidelines - CLDC Digital Security Program
https://t.me/RevToolboxRedux/2557

Protest Safety Planning
https://t.me/RevToolboxRedux/2596

Pittsburgh: Reflections on Leadership and Collective Autonomy
https://t.me/RevToolboxRedux/2618

Basic Guide to Protesting Safely
https://t.me/RevToolboxRedux/2689

When the Police Knock on Your Door
https://t.me/RevToolboxRedux/2711

Anti- and Counter-Surveillance Techniques for Intelligence Officers
https://t.me/RevToolboxRedux/2768

Telegram 101: How to communicate securely in Telegram?
https://t.me/RevToolboxRedux/2808

Black Bloc, Grey Bloc, and Debloc
https://t.me/RevToolboxRedux/2928

No Face No Case, 1312
https://t.me/RevToolboxRedux/2953

Reinforce Rights Not Racism (image)
https://t.me/RevToolboxRedux/2971

FM 34-2-1 Reconnaissance and Surveillance and Intelligence Support to Counterreconnaissance (1991)
https://t.me/RevToolboxRedux/2974

Hitchhikers Guide to Online Anonymity
https://t.me/RevToolboxRedux/2975

Burner Phone Best Practices
https://t.me/RevToolboxRedux/2976

Counterinsurgency in Modern Warfare (2008)
https://t.me/RevToolboxRedux/2992

Army Support to Military Deception, FM 3-13.4
https://t.me/RevToolboxRedux/2993

All Cameras Are Breakable
https://t.me/RevToolboxRedux/3000

Watch Out For Snitches (poster)
https://t.me/RevToolboxRedux/3017

Holistic Security: A Strategy Manual for Human Rights Defenders
https://t.me/RevToolboxRedux/3054

Never Turn Off The Phone: A new approach to security culture
https://t.me/RevToolboxRedux/3055

Rebel Alliance Tech Manual
https://t.me/RevToolboxRedux/3056

Secrets and Lies (story about informal organization)
https://t.me/RevToolboxRedux/3057

Digital Harm Reduction - Taking Ourselves Seriously article 1
https://t.me/RevToolboxRedux/3058

The Invisible Ground: honoring each others security needs
https://t.me/RevToolboxRedux/3059

Recording or taking photo's at a protest can be unwise (image)
https://t.me/RevToolboxRedux/3076

List of found physical surveillance devices
https://t.me/RevToolboxRedux/3086

Things I Wish I Did Before Being Raided by the Police
https://t.me/RevToolboxRedux/3087

Defend Dissent - Digital Suppression and Cryptographic Defense of Social Movements
https://t.me/RevToolboxRedux/3090

LOCKING DOWN SIGNAl (article)
https://t.me/RevToolboxRedux/3091

How To Prevent Facial Recognition Technology from Identifying You
https://t.me/RevToolboxRedux/3159

Doxxing Prevention Harm Reduction Training
https://t.me/RevToolboxRedux/3161

Damage Control - the story of how one activist group kept ourselves safe and strong in the face of movement infiltration
https://t.me/RevToolboxRedux/3162

Security and Counter-Surveillance: Information Against the Police State
https://t.me/RevToolboxRedux/3225

ANARCHIST SURVIVAL GUIDE FOR UNDERSTANDING GESTAPO SWINE INTERROGATION MIND GAMES
https://t.me/RevToolboxRedux/3230

Untitled, or What to Do When Everyone Gets Arrested
https://t.me/RevToolboxRedux/3232

The Art and Science of Billboard Improvement
https://t.me/RevToolboxRedux/3238

Basic Recon Skills (zine)
https://t.me/RevToolboxRedux/3239

COMMUNICATION EQUIPMENT FOR REBELS - Skills for Revolutionary Survival #5
https://t.me/RevToolboxRedux/3308

Your Greatest Weapon Against the State is Anonymity (image)
https://t.me/RevToolboxRedux/3328

Some useful rules for social media
https://t.me/RevToolboxRedux/10

#directory
Lock and wipe on emergency.

You can use PanicKit, tile,shortcut or send a message with a secret code. On trigger, using Device Administration API, it locks a device and optionally runs wipe (factory reset). Or it can send a broadcast message instead of the wipe.

Also you can:

fire when a device was not unlocked for X time
fire when a USB data connection is made while a device is locked
fire when a fake messenger app is launched
fire when a duress password is entered (companion app: Duress)
The app works in Work Profile too, but with limitations. Use it to install risky apps and Wasted in it. Then you can wipe this profile data with one click without wiping the whole device.

For base security take a look at: Sentry.Only encrypted device may guarantee that the data will not be recoverable.

Be aware that the app does not work in safe mode
.

Wasted (Lock a device and delete its data in an emergency)
https://f-droid.org/packages/me.lucky.wasted/
https://github.com/x13a/Wasted

#security #cellebrite #UFED
simplex@mastodon.social - SimpleX Chat v5.1-beta.1 is released!

New in v5.1-beta.1:
- message reactions - finally!🚀
- self-destruct passcode.
- voice messages up to 5 minutes.
- custom time to disappear - can be set just for one message.
- message editing history.
- a setting to disable audio/video calls per contact.
- group welcome message visible in group profile.

Install the apps via the links here: https://github.com/simplex-chat/simplex-chat#install-the-app

More details: https://simplex.chat/blog/20230523-simplex-chat-v5-1-message-reactions-self-destruct-passcode.html

#privacy #security #messenger
This media is not supported in your browser
VIEW IN TELEGRAM
KryptEY - Secure E2EE communication


An Android keyboard for secure end-to-end-encrypted messages through the Signal protocol in any messenger. Communicate securely and independent, regardless of the legal situation or whether messengers use E2EE. No server needed.
https://github.com/amnesica/KryptEY

F-Droid
https://f-droid.org/packages/com.amnesica.kryptey/
IzzyOnDroid
https://android.izzysoft.de/repo/apk/com.amnesica.kryptey

Reminder : new apps available in F-Droid app may not emmediatly show on the F-Droid web site ( ie when you share the link app it returns a 404 error ) some extra time is needed for both to be available
https://gitlab.com/fdroid/wiki/-/wikis/FAQ#how-long-does-it-take-for-my-app-to-show-up-on-website-and-client

#encryption #keyboard #E2EE
#messenger #security #Signal
SimpleX Chat: private and secure cross platform messenger without any user IDs (not even random)

:~ E2E-encrypted messages with markdown and editing

:~ E2E-encrypted images and files

:~ Decentralized secret groups — only users know they exist

:~ E2E-encrypted voice messages

:~ Disappearing messages

:~ E2E-encrypted audio and video calls

:~ Portable encrypted database — move your profile to another device

:~Incognito mode —
unique to SimpleX Chat

Website : https://simplex.chat/

SimpleX Chat (SimpleX Chat - e2e encrypted messenger without any user IDs - private by design!)
https://f-droid.org/packages/chat.simplex.app/

Quick start –
https://simplex.chat/docs/guide/readme.html

#SimpleXchat #security #privacy #encryption #E2EE
#FLOSS
France’s browser-based website blocking proposal will set a disastrous precedent for the open internet –Mozzila Blog

"In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. It would force browser providers to create the means to mandatorily block websites present on a government provided list. Such a move will overturn decades of established content moderation norms and provide a playbook for authoritarian governments"

#censorship
#france #browser #cybersecurity #mozilla #security #surveillance
itnewsbot@schleuss.online - WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April - Enlarge (credit: Getty Images)

A newly discovered zeroday in t... - https://arstechnica.com/?p=1962625 #vulnerability #security #zipfiles #exploit #zeroday #biz#winrar
Media is too big
VIEW IN TELEGRAM
Horror Stories from the Automotive Industry | Chaos Computer Club Berlin - Video

In this talk, we will revisit some of the scariest stories we faced during more than 50 penetration testing and security research projects, with a twist. In the ever-emerging industry of automotive, with old and new OEMs trying to get a share of the pie, many things are at stake, with many things getting overlooked, forgotten, or even deliberately covered.

We will go through a journey of critical findings in different targets and the constant battle between penetration testers, developers, and mid to upper management. This will help the audience get an understanding of how the industry behaves right now, what they (and what we) are doing wrong, and how the future of automotive security should be shaped, not only for the sake of security, but also for the sake of safety and reliability.

https://www.youtube.com/watch?v=rAA-agcNeeg

#cars #OEM #Automobile #PenTesting #Automotive #security #safety #CCCde
Privacy Companies Push Back Against EU Plot To End Online Privacy

An urgent appeal has been relayed to ministers across the #EU by a consortium of tech companies, exacting a grave warning against backing a proposed regulation focusing on child sexual abuse as a pretense to jeopardize the security integrity of internet services relying on end-to-end encryption and end privacy for all citizens.

In a open letter a total of 18 organizations – predominantly comprising providers of encrypted email and messaging services – have voiced concerns about the potential experimental regulation by the European Commission (EC), singling out the “detrimental” effects on children’s #privacy and #security and the possible dire repercussions for #cybersecurity.

#BigBrother #EUChatControl
#ChatControl #Encryption
Media is too big
VIEW IN TELEGRAM
Know Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive Privacy Space

This talk introduces and examines privacy-inclusive taxonomies Meta has developed and uses to track privacy weaknesses, enumerate privacy adversarial TTPs, deconflict privacy and security efforts, and scale detection and remediation efforts. Taxonomies, such as #MITRE's #CVE, #CAPEC, and #ATT&CK® #frameworks, have long been used to track and understand cybersecurity weaknesses and the tactics of cyber adversaries. These taxonomies help #organizations stay abreast of trends, guide software development best practices, and pinpoint the most effective remediation and detection strategies to common #cybersecurity issues. As the field of offensive privacy matures, organizations require similar taxonomies to understand #privacy threats and align efforts across #security and privacy teams....

By: Zach Miller , David Renardy

Full Abstract and Presentation Materials
Media is too big
VIEW IN TELEGRAM
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

Modern video encoding standards such as H.264 are a marvel of hidden complexity. But with hidden complexity comes hidden #security risk. #Decoding video today involves interacting with dedicated #hardware accelerators and the #proprietary, privileged software components used to drive (#driver) them. The video #decoder ecosystem is obscure, opaque, diverse, highly privileged, largely untested, and highly exposed -- a dangerous combination.

We introduce H26Forge, a framework that carefully crafts #video files to expose edge cases in H.264 decoders....

By: Stephen Checkoway , Hovav Shacham , Willy Vasquez

Full Abstract and Presentation Materials

#VideoEncoding #Vulnerabilities #Security #Codec #H264 #Exploit
n0rthl1ght/ahwt: Another Hardening Windows Tool – GitHub

GPL-3.0 license
AHWT - another hardening tool for Windows operating systems.

Description (on RUS)
Program is a script generator with collection of parameters and recommendations from CIS Benchmarks and DoD STIGs with some adjusments.

All parameters placed in databases with the names of the operating systems that are used to.

Parameters were checked and tested according to official MS documentation and researchers opinion.
Scripts generates in 2 modes - auto and manual.

All databases have profiles for each operating system min/med/full which corresponds with Minimum (only level 3 parameters (CIS lvl 2/STIG lvl 3)), Medium (level 2 & 3 parameters (CIS lvl 1 & 2/STIG lvl 2)) and Full (lvl 1-3 parameters).

#Windows #Hardening #Security
Safe Space (A safe space for your digital valuables.)

Safe space is an app that creates a separate place on your android device to store valuable files. This storage location is not visible to other apps and is encrypted by the system by default.

Features:
* Store files in a secure storage location that is not visible to other apps and is secured by device encryption and system authentication (Biometric and PIN/Pattern/Password)
* Open Images, Audio, Video, PDF documents and plain text documents
* Create simple text notes without leaving the app
* Dark and light mode
* ability to copy and move files
* Import from and export files to external storage without storage permissions
* Completely offline with no telemetry and data collection

https://f-droid.org/packages/org.privacymatters.safespace

#Android #Security #Privacy
#EncryptedFiles
:: privacy.sexy — Privacy is sexy
:: 🔐 Enforce privacy & security best-practices on Windows, macOS and Linux.

:: -- 🤔 How to use
:: 📙 Start by exploring different categories and choosing different tweaks.
:: 📙 On top left, you can apply predefined selections for privacy level you'd like.
:: 📙 After you choose any tweak, you can download or copy to execute your script.
:: 📙 Come back regularly to apply latest version for stronger privacy and security.

:: -- 🧐 Why privacy.sexy
:: ✔️ Rich tweak pool to harden security & privacy of the OS and other software on it.
:: ✔️ No need to run any compiled software on your system, just run the generated scripts.
:: ✔️ Have full visibility into what the tweaks do as you enable them.
:: ✔️ Open-source and free (both free as in beer and free as in speech).
:: ✔️ Committed to your safety with strong security measures.

https://privacy.sexy/

#Privacy #Security #GnuLinux #MacOS #Windows