Forwarded from BlackBox (Security) Archiv
Open Source Guides
Open source software is made by people just like you. Learn how to launch and grow your project.
Open Source Guides are a collection of resources for individuals, communities, and companies who want to learn how to run and contribute to an open source project.
ππΌ Read more:
https://opensource.guide/
https://github.com/github/opensource.guide#readme
#OpenSource #software #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Open source software is made by people just like you. Learn how to launch and grow your project.
Open Source Guides are a collection of resources for individuals, communities, and companies who want to learn how to run and contribute to an open source project.
ππΌ Read more:
https://opensource.guide/
https://github.com/github/opensource.guide#readme
#OpenSource #software #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Open Source Guides
Learn how to launch and grow your project.
Forwarded from BlackBox (Security) Archiv
Many Police Departments Have Software That Can Identify People In Crowds
BriefCam, a facial recognition and surveillance video analysis company, sells the ability to surveil protesters and enforce social distancing β without the public knowing.
As protesters demand an end to police brutality and the coronavirus pandemic sweeps the nation, police departments around the country are using software that can track and identify people in crowds from surveillance footage β often with little to no public oversight or knowledge.
Dozens of cities around the country are using BriefCam, which sells software that allows police to comb through surveillance footage to monitor protests and enforce social distancing, and almost all of these cities have hosted protests against police brutality in the weeks since George Floyd was killed in police custody, BuzzFeed News has found.
Some of the cities using BriefCamβs technology β such as New Orleans and St. Paul β have been the site of extreme police violence, with officers using rubber bullets, tear gas, and batons on protesters. Authorities in Chicago; Boston; Detroit; Denver; Doral, Florida; Hartford, Connecticut; and Santa Fe County, New Mexico have also used it.
Some cities said they were not using BriefCam in conjunction with the protests or the pandemic. The St. Paul Police Department told BuzzFeed News that it has not used BriefCam βto detect social distancing or face masksβ or βfor crowd detection/monitoring protests.β The department representative did not respond when asked if there is department policy that prevents it.
BriefCam shows the line between contact tracing, policing, and surveillance can be thin β as cities can spend tens of thousands of dollars for powerful technology, with few restrictions on how police can use it.
BriefCam did not return multiple requests for comment or respond to a detailed list of questions.
π‘ https://www.buzzfeednews.com/article/carolinehaskins1/police-software-briefcam
π‘ https://www.crunchbase.com/organization/briefcam#section-funding-rounds
π‘ https://www.briefcam.com/company/about/
Read more π©πͺ:
https://netzpolitik.org/2020/briefcam-dutzende-staedte-in-den-usa-haben-gesichtserkennung-fuer-demonstrationen/
#usa #surveillance #police #software #BriefCam #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
BriefCam, a facial recognition and surveillance video analysis company, sells the ability to surveil protesters and enforce social distancing β without the public knowing.
As protesters demand an end to police brutality and the coronavirus pandemic sweeps the nation, police departments around the country are using software that can track and identify people in crowds from surveillance footage β often with little to no public oversight or knowledge.
Dozens of cities around the country are using BriefCam, which sells software that allows police to comb through surveillance footage to monitor protests and enforce social distancing, and almost all of these cities have hosted protests against police brutality in the weeks since George Floyd was killed in police custody, BuzzFeed News has found.
Some of the cities using BriefCamβs technology β such as New Orleans and St. Paul β have been the site of extreme police violence, with officers using rubber bullets, tear gas, and batons on protesters. Authorities in Chicago; Boston; Detroit; Denver; Doral, Florida; Hartford, Connecticut; and Santa Fe County, New Mexico have also used it.
Some cities said they were not using BriefCam in conjunction with the protests or the pandemic. The St. Paul Police Department told BuzzFeed News that it has not used BriefCam βto detect social distancing or face masksβ or βfor crowd detection/monitoring protests.β The department representative did not respond when asked if there is department policy that prevents it.
BriefCam shows the line between contact tracing, policing, and surveillance can be thin β as cities can spend tens of thousands of dollars for powerful technology, with few restrictions on how police can use it.
BriefCam did not return multiple requests for comment or respond to a detailed list of questions.
π‘ https://www.buzzfeednews.com/article/carolinehaskins1/police-software-briefcam
π‘ https://www.crunchbase.com/organization/briefcam#section-funding-rounds
π‘ https://www.briefcam.com/company/about/
Read more π©πͺ:
https://netzpolitik.org/2020/briefcam-dutzende-staedte-in-den-usa-haben-gesichtserkennung-fuer-demonstrationen/
#usa #surveillance #police #software #BriefCam #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
BuzzFeed News
Many Police Departments Have Software That Can Identify People In Crowds
BriefCam, a facial recognition and surveillance video analysis company, sells the ability to surveil protesters and enforce social distancing β without the public knowing.
Forwarded from BlackBox (Security) Archiv
ISP Ordered to Hand Over Piratesβ Details After Cracked Software βPhoned Homeβ
Alleged pirates who installed cracked copies of expensive Siemens CAD tools on their computers are facing potentially huge settlement demands after the software "phoned home" informing the company of the illicit use. The Australian Federal Court has ordered ISP Telstra to hand over the personal details of the suspected infringers.
Reports of movie companies tracking down alleged pirates in order to extract cash settlements are commonplace today.
After IP addresses are monitored in BitTorrent swarms, companies regularly obtain court orders requiring ISPs to hand over the personal details of alleged infringers, to whom they send correspondence threatening a lawsuit, unless they pay up of course.
On first view, a case in Australia seems to follow a similar pattern but the details reveal a more interesting set of circumstances.
In an application filed at the Federal Court in Australia, Siemens Industry Software Inc asked the Court to compel local ISP Telstra to reveal the identities and personal details of β20 potential infringing usersβ who used βcrackedβ versions of its software.
However, instead of tracking these alleged pirates in BitTorrent swarms, Siemens obtained evidence of their infringement directly from their computers.
ππΌ Read more:
https://torrentfreak.com/isp-ordered-to-hand-over-pirates-details-after-cracked-software-phoned-home-200629/
#isp #australia #pirates #software #cracked
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Alleged pirates who installed cracked copies of expensive Siemens CAD tools on their computers are facing potentially huge settlement demands after the software "phoned home" informing the company of the illicit use. The Australian Federal Court has ordered ISP Telstra to hand over the personal details of the suspected infringers.
Reports of movie companies tracking down alleged pirates in order to extract cash settlements are commonplace today.
After IP addresses are monitored in BitTorrent swarms, companies regularly obtain court orders requiring ISPs to hand over the personal details of alleged infringers, to whom they send correspondence threatening a lawsuit, unless they pay up of course.
On first view, a case in Australia seems to follow a similar pattern but the details reveal a more interesting set of circumstances.
In an application filed at the Federal Court in Australia, Siemens Industry Software Inc asked the Court to compel local ISP Telstra to reveal the identities and personal details of β20 potential infringing usersβ who used βcrackedβ versions of its software.
However, instead of tracking these alleged pirates in BitTorrent swarms, Siemens obtained evidence of their infringement directly from their computers.
ππΌ Read more:
https://torrentfreak.com/isp-ordered-to-hand-over-pirates-details-after-cracked-software-phoned-home-200629/
#isp #australia #pirates #software #cracked
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@NoGoolag
π‘@BlackBox
Torrentfreak
ISP Ordered to Hand Over Pirates' Details After Cracked Software 'Phoned Home' * TorrentFreak
Siemens has obtained a court order to identify alleged software pirates. The tools had an embedded "phone home" feature that blew the whistle
Forwarded from BlackBox (Security) Archiv
Report: Hundreds of apps have hidden tracking software used by the government
A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.
The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.
This tactic is deceptive because the tracking isnβt disclosed. However, it appears to be totally legal.
A new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.
The contractor β a Virginia-based company called Anomaly Six LLC β pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.
It sounds crazy, but itβs happening. Whatβs more, it appears itβs totally legal.
π ππΌ https://www.androidauthority.com/government-tracking-apps-1145989/
π ππΌ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801
#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.
The data gleaned from this tracking is then sold back to the US government for undisclosed purposes.
This tactic is deceptive because the tracking isnβt disclosed. However, it appears to be totally legal.
A new report today from The Wall Street Journal exposes yet another concerning development when it comes to mobile phone tracking. According to the report, at least one federal contractor puts government tracking software in over 500 mobile applications.
The contractor β a Virginia-based company called Anomaly Six LLC β pays mobile developers to include its in-house tracking code within their apps. The trackers then collect anonymized data from our phones and Anomaly Six aggregates that data and sells it to the US government.
It sounds crazy, but itβs happening. Whatβs more, it appears itβs totally legal.
π ππΌ https://www.androidauthority.com/government-tracking-apps-1145989/
π ππΌ https://www.wsj.com/articles/u-s-government-contractor-embedded-software-in-apps-to-track-phones-11596808801
#usa #government #tracking #software #apps #smartphones #data #surveillance #why #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Android Authority
Report: Hundreds of apps have hidden tracking software used by the government
According to a new report, there is government tracking software hidden in hundreds of apps. The software is undisclosed, put there by federal contractors.
Forwarded from BlackBox (Security) Archiv
True privacy and security depend on free software
For all of the assurances you might receive from proprietary software companies that they respect your right to privacy, it is impossible to guarantee that your online communications are actually private without free software. Among technical users, it's common knowledge that privacy is dependent on strong encryption. However, the complex connection between software freedom, encryption, and privacy can be a little difficult to explain in the course of our individual activism, and is due for a more in-depth explanation.
Encryption is about keeping secrets secret, whether that means messages between you and a loved one, sensitive documents, or an entire hard drive. It also isn't only for those with something to hide: making strong encryption part of standard practice increases the safety of all those who really do need it by making it a normal thing to do. When your personal information is at stake, it's all the more important that encryption technology be based on free software. Even the most "benign" proprietary programs have a long history of mistreating their users, and a single "snitch" or backdoor in a proprietary encryption program in some cases could cost lives. At the FSF, we advocate for software freedom in any and all situations -- and in some cases, your safety may depend upon it.
π ππΌ https://www.fsf.org/bulletin/2020/spring/privacy-encryption
#privacy #encryption #backdoor #activism #software #freedom #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
For all of the assurances you might receive from proprietary software companies that they respect your right to privacy, it is impossible to guarantee that your online communications are actually private without free software. Among technical users, it's common knowledge that privacy is dependent on strong encryption. However, the complex connection between software freedom, encryption, and privacy can be a little difficult to explain in the course of our individual activism, and is due for a more in-depth explanation.
Encryption is about keeping secrets secret, whether that means messages between you and a loved one, sensitive documents, or an entire hard drive. It also isn't only for those with something to hide: making strong encryption part of standard practice increases the safety of all those who really do need it by making it a normal thing to do. When your personal information is at stake, it's all the more important that encryption technology be based on free software. Even the most "benign" proprietary programs have a long history of mistreating their users, and a single "snitch" or backdoor in a proprietary encryption program in some cases could cost lives. At the FSF, we advocate for software freedom in any and all situations -- and in some cases, your safety may depend upon it.
π ππΌ https://www.fsf.org/bulletin/2020/spring/privacy-encryption
#privacy #encryption #backdoor #activism #software #freedom #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
www.fsf.org
True privacy and security depend on free software
Forwarded from BlackBox (Security) Archiv
The Vintage Software Collection
The Vintage Software collection gathers various efforts by groups to classify, preserve, and provide historical software. These older programs, many of them running on defunct and rare hardware, are provided for purposes of study, education, and historical reference.
π ππΌ https://archive.org/details/vintagesoftware
#archive #vintage #software
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The Vintage Software collection gathers various efforts by groups to classify, preserve, and provide historical software. These older programs, many of them running on defunct and rare hardware, are provided for purposes of study, education, and historical reference.
π ππΌ https://archive.org/details/vintagesoftware
#archive #vintage #software
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Forwarded from BlackBox (Security) Archiv
Most proprietary toasters are malware
Help me understand this (really).
Why should software be expected to have source code available? Don't get me wrong - I love SQLite and OpenSSL, but it has nothing to do with having access to the source code.
My toaster did not come with specs and design documents so I can change it. Neither did my power drill or car.
The music I listen do doesn't have synthesizer settings available and raw source before mixing. Movies I watch don't come with scripts, budgets, contacts, location licenses, etc.
What is it specifically about software that makes people think the source must be available? Where does this expectation come from?
https://news.ycombinator.com/item?id=26030126
#opensource #software #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Help me understand this (really).
Why should software be expected to have source code available? Don't get me wrong - I love SQLite and OpenSSL, but it has nothing to do with having access to the source code.
My toaster did not come with specs and design documents so I can change it. Neither did my power drill or car.
The music I listen do doesn't have synthesizer settings available and raw source before mixing. Movies I watch don't come with scripts, budgets, contacts, location licenses, etc.
What is it specifically about software that makes people think the source must be available? Where does this expectation come from?
https://news.ycombinator.com/item?id=26030126
#opensource #software #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Bad software sent postal workers to jail, because no one wanted to admit it could be wrong
Data from the Horizon system was used to prove they stole money β but they didn't
For the past 20 years UK Post Office employees have been dealing with a piece of software called Horizon, which had a fatal flaw: bugs that made it look like employees stole tens of thousands of British pounds.
This led to some local postmasters being convicted of crimes, even being sent to prison, because the Post Office doggedly insisted the software could be trusted.
After fighting for decades, 39 people are finally having their convictions overturned, after what is reportedly the largest miscarriage of justice that the UK has ever seen.
https://www.theverge.com/2021/4/23/22399721/uk-post-office-software-bug-criminal-convictions-overturned
#UK #PostOffice #worker #bad #software #miscarriage #justice
Data from the Horizon system was used to prove they stole money β but they didn't
For the past 20 years UK Post Office employees have been dealing with a piece of software called Horizon, which had a fatal flaw: bugs that made it look like employees stole tens of thousands of British pounds.
This led to some local postmasters being convicted of crimes, even being sent to prison, because the Post Office doggedly insisted the software could be trusted.
After fighting for decades, 39 people are finally having their convictions overturned, after what is reportedly the largest miscarriage of justice that the UK has ever seen.
https://www.theverge.com/2021/4/23/22399721/uk-post-office-software-bug-criminal-convictions-overturned
#UK #PostOffice #worker #bad #software #miscarriage #justice
Forwarded from BlackBox (Security) Archiv
Jamulus - Play music online. With friends. For free.
What is Jamulus?
Jamulus is software for playing music, rehearsing, or just jamming with anyone online with low latency. You can use your Windows, macOS or Linux machine to connect to Jamulus servers worldwide. Jamulus is free and you can just use your normal broadband connection. Simply connect to a public server or host your own private one. Jamulus has been in development since 2006 and is designed for high quality, low-latency sound, making it easy to play together remotely and in time.
https://jamulus.io/
https://github.com/jamulussoftware/jamulus
π‘ For detailed information about how Jamulus hacks the space-time continuum to produce a near-perfect 5th dimension of collaborative sound, see this paper by Volker Fischer (PDF).
#jamulus #software #music #online #jamming #opensource
π‘ @nogoolag π‘ @blackbox_archiv
What is Jamulus?
Jamulus is software for playing music, rehearsing, or just jamming with anyone online with low latency. You can use your Windows, macOS or Linux machine to connect to Jamulus servers worldwide. Jamulus is free and you can just use your normal broadband connection. Simply connect to a public server or host your own private one. Jamulus has been in development since 2006 and is designed for high quality, low-latency sound, making it easy to play together remotely and in time.
https://jamulus.io/
https://github.com/jamulussoftware/jamulus
π‘ For detailed information about how Jamulus hacks the space-time continuum to produce a near-perfect 5th dimension of collaborative sound, see this paper by Volker Fischer (PDF).
#jamulus #software #music #online #jamming #opensource
π‘ @nogoolag π‘ @blackbox_archiv
jamulus.io
Jamulus β Play music online. With friends. For free.
Jamulus is free and open source software that lets musicians perform music, rehearse or jam together, in real time over the Internet.
Media is too big
VIEW IN TELEGRAM
Reproducible Builds, the first ten years |Chaos Computer Club Berlin - ccc.de
In this talk Holger Levsen will give an overview about reproducible builds, the past, the presence and the future. How it started with a small BoF at DebConf13 (and before), how it grew from being a Debian effort to something many projects work on together, until in 2021 it was mentioned in an executive order of the president of the United States. And of course the talk will not end there but rather outline where we are today and where we still need to be going, until we'll all be running 100% reproducible software, verified by many.
https://reproducible-builds.org/docs/definition
#Software #ReproducibleBuilds #dev #Debian
In this talk Holger Levsen will give an overview about reproducible builds, the past, the presence and the future. How it started with a small BoF at DebConf13 (and before), how it grew from being a Debian effort to something many projects work on together, until in 2021 it was mentioned in an executive order of the president of the United States. And of course the talk will not end there but rather outline where we are today and where we still need to be going, until we'll all be running 100% reproducible software, verified by many.
https://reproducible-builds.org/docs/definition
#Software #ReproducibleBuilds #dev #Debian