Click on the hashtags. If the note doesn't show up, just type the hashtag in the chat. Else, the note got vanished
#afwall
#alternatives
#altfrontends
#amp
#apk
#aurora
#backup
#blockadstrackers
#bounty
#classroom
#cleaningcrap
#cloud
#cloudflare
#datacollection
#debloat
#deezer
#delete
#deodex
#disablecaptiveportal
#disablecomponents
#disablegoogle
#discord
#dns
#dnscrypt
#dontask
#e
#exodus
#facebook
#fakegapps
#faq
#fdroid
#fennec
#findyourphone
#gcam
#gmail_signin_error
#googlefi
#googletakeout
#gpslock
#graphene
#grapheneos
#gratisapps
#guide
#ipsum
#librechair
#lineagemicrog
#location
#logs
#madaidan
#magicgapps
#magisk
#mailalias
#manjaro
#microg
#mixplorer
#netoff
#news
#nitrokey
#notes
#nothingtohide
#osm
#ot
#playgames
#playpaid
#problems
#pushnotifications
#qpatch
#rh01
#riot
#safetynet
#satstat
#searchengines
#shelter
#signal
#signaturespoofing
#sigspoof
#smalipatcher
#spite
#sync
#tgclients
#todolists
#tor
#torfud
#uber
#uncensorISP
#unlppatch
#untracklinks
#vanced
#vpn
#wear
#wiki
#windows
#wireguard
#withoutgoogle
#xiaomi
#afwall
#alternatives
#altfrontends
#amp
#apk
#aurora
#backup
#blockadstrackers
#bounty
#classroom
#cleaningcrap
#cloud
#cloudflare
#datacollection
#debloat
#deezer
#delete
#deodex
#disablecaptiveportal
#disablecomponents
#disablegoogle
#discord
#dns
#dnscrypt
#dontask
#e
#exodus
#fakegapps
#faq
#fdroid
#fennec
#findyourphone
#gcam
#gmail_signin_error
#googlefi
#googletakeout
#gpslock
#graphene
#grapheneos
#gratisapps
#guide
#ipsum
#librechair
#lineagemicrog
#location
#logs
#madaidan
#magicgapps
#magisk
#mailalias
#manjaro
#microg
#mixplorer
#netoff
#news
#nitrokey
#notes
#nothingtohide
#osm
#ot
#playgames
#playpaid
#problems
#pushnotifications
#qpatch
#rh01
#riot
#safetynet
#satstat
#searchengines
#shelter
#signal
#signaturespoofing
#sigspoof
#smalipatcher
#spite
#sync
#tgclients
#todolists
#tor
#torfud
#uber
#uncensorISP
#unlppatch
#untracklinks
#vanced
#vpn
#wear
#wiki
#windows
#wireguard
#withoutgoogle
#xiaomi
Forwarded from Privacy Matters π‘οΈ
Top 8 steps to improve your privacy ||Guide
πΉ Watch it via:
YouTube || Invidious
π‘ @howtobeprivateonline
#Guide #Privacy
This video covers 8 starting steps to improve your online privacy in a chronological order of importance and effectiveness.
πΉ Watch it via:
YouTube || Invidious
π‘ @howtobeprivateonline
#Guide #Privacy
Media is too big
VIEW IN TELEGRAM
Become Anonymous: The Ultimate Guide To Privacy, Security, & Anonymity 2020
by Techlore
https://www.youtube.com/watch?v=a1i-3xwcSGA
Resources:
https://github.com/techlore-official/channel-content/blob/master/Resources/BA2020sources.md
LBRY.tv: https://lbry.tv/@techlore:3
https://techlore.tech
@techloreofficial
#privacy #security #guide
by Techlore
https://www.youtube.com/watch?v=a1i-3xwcSGA
Resources:
https://github.com/techlore-official/channel-content/blob/master/Resources/BA2020sources.md
LBRY.tv: https://lbry.tv/@techlore:3
https://techlore.tech
@techloreofficial
#privacy #security #guide
Forwarded from BlackBox (Security) Archiv
The Digital First Aid Kit!
The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.
π ππΌ https://digitalfirstaid.org/en/index.html
π ππΌ Digital Security Helpline
https://www.accessnow.org/help/
#data #digital #firstaid #security #help #toolkit #guide #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.
π ππΌ https://digitalfirstaid.org/en/index.html
π ππΌ Digital Security Helpline
https://www.accessnow.org/help/
#data #digital #firstaid #security #help #toolkit #guide #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Forwarded from BlackBox (Security) Archiv
Locking down Signal
Concerned about the privacy and security of your communications? Follow our guide to locking down Signal.
The encrypted messaging app, Signal, is quickly becoming a newsroom staple for communicating with sources, accepting tips, talking to colleagues, and for regular old voice calls and messages. While itβs a practical tool for anyone concerned with the security and privacy of their conversations, people working in newsrooms are particularly interesting targets, and should benefit from locking down Signal.
π‘ (If youβre not yet using it, learn how to get started here.)
Signal makes it easy to have a secure conversation without thinking about it. On its face, it looks and feels identical to your default text messaging app, but security experts so often recommend it because of what it does in the background.
First, Signal offers end-to-end encryption, meaning only conversational participants can read the messages. While regular phone calls or text messages allow your phone company to unscramble your conversations, even the team behind Signal canβt listen to them. You donβt need to take their word for it. Signal is open source, meaning the code is available for anyone to review. This also makes security audits simpler for independent specialists, who have torn apart the code and published findings that everything works as intended. Finally, Signal retains nearly no metadata β information about who spoke to whom, and when. (The developers proved as much in court.)
These are some of the advantages you want in an encrypted messaging app.
Because newsrooms can attract a lot of attention, journalists who already use Signal should consider hardening it against physical access, as well as unwanted remote access and network-based eavesdropping. So letβs talk about how.
π ππΌ https://freedom.press/training/locking-down-signal/
#signal #encrypted #messaging #app #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Concerned about the privacy and security of your communications? Follow our guide to locking down Signal.
The encrypted messaging app, Signal, is quickly becoming a newsroom staple for communicating with sources, accepting tips, talking to colleagues, and for regular old voice calls and messages. While itβs a practical tool for anyone concerned with the security and privacy of their conversations, people working in newsrooms are particularly interesting targets, and should benefit from locking down Signal.
π‘ (If youβre not yet using it, learn how to get started here.)
Signal makes it easy to have a secure conversation without thinking about it. On its face, it looks and feels identical to your default text messaging app, but security experts so often recommend it because of what it does in the background.
First, Signal offers end-to-end encryption, meaning only conversational participants can read the messages. While regular phone calls or text messages allow your phone company to unscramble your conversations, even the team behind Signal canβt listen to them. You donβt need to take their word for it. Signal is open source, meaning the code is available for anyone to review. This also makes security audits simpler for independent specialists, who have torn apart the code and published findings that everything works as intended. Finally, Signal retains nearly no metadata β information about who spoke to whom, and when. (The developers proved as much in court.)
These are some of the advantages you want in an encrypted messaging app.
Because newsrooms can attract a lot of attention, journalists who already use Signal should consider hardening it against physical access, as well as unwanted remote access and network-based eavesdropping. So letβs talk about how.
π ππΌ https://freedom.press/training/locking-down-signal/
#signal #encrypted #messaging #app #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Freedom of the Press
Signal, the secure messaging app: A guide for beginners
How to get started using Signal, the encrypted messaging app.
Forwarded from BlackBox (Security) Archiv
Step-by-step guides and detailed information on secure messaging apps for Android, iOS, Windows, Mac and Linux.
π‘ Apps are listed in order of:
β β = "Highly Recommended"
β = "Worth a Try"
β= "Not Recommended"
π ππΌ https://securechatguide.org/centralizedapps.html
#secure #chat #messaging #apps #android #iOS #windows #mac #linux #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
π‘ Apps are listed in order of:
β β = "Highly Recommended"
β = "Worth a Try"
β= "Not Recommended"
π ππΌ https://securechatguide.org/centralizedapps.html
#secure #chat #messaging #apps #android #iOS #windows #mac #linux #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Forwarded from BlackBox (Security) Archiv
Protect your information from physical threats
π‘ ππΌ Table of Contents ππΌ
π ππΌ What you can learn from this guide
π ππΌ Assessing your risks
π ππΌ Creating your physical security policy
π ππΌ Protecting your information from physical intruders
π ππΌ Software and settings related to physical security
π ππΌ Maintaining a healthy environment for your equipment
π ππΌ Further reading
π‘ π ππΌ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
π‘ ππΌ Table of Contents ππΌ
π ππΌ What you can learn from this guide
π ππΌ Assessing your risks
π ππΌ Creating your physical security policy
π ππΌ Protecting your information from physical intruders
π ππΌ Software and settings related to physical security
π ππΌ Maintaining a healthy environment for your equipment
π ππΌ Further reading
π‘ π ππΌ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
securityinabox.org
Protect against physical threats
Forwarded from BlackBox (Security) Archiv
How to Secure Anything
Security engineering is the discipline of building secure systems.
Its lessons are not just applicable to computer security. In fact, in this repo, I aim to document a process for securing anything, whether it's a medieval castle, an art museum, or a computer network.
π‘What is security engineering?
Security engineering isn't about adding a bunch of controls to something.
It's about coming up with security properties you'd like a system to have, choosing mechanisms that enforce these properties, and assuring yourself that your security properties hold.
π ππΌ https://github.com/veeral-patel/how-to-secure-anything
#howto #guide #security #secure #anything
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Security engineering is the discipline of building secure systems.
Its lessons are not just applicable to computer security. In fact, in this repo, I aim to document a process for securing anything, whether it's a medieval castle, an art museum, or a computer network.
π‘What is security engineering?
Security engineering isn't about adding a bunch of controls to something.
It's about coming up with security properties you'd like a system to have, choosing mechanisms that enforce these properties, and assuring yourself that your security properties hold.
π ππΌ https://github.com/veeral-patel/how-to-secure-anything
#howto #guide #security #secure #anything
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
GitHub
GitHub - veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering
How to systematically secure anything: a repository about security engineering - veeral-patel/how-to-secure-anything
Forwarded from Privacy Matters π‘οΈ
How to use Whonix | TOR Tutorial Part 2
πΉ Watch it via:
YouTube || Invidious || BitChute
β’ Part 1 of TOR series: HERE
β’ Download Whonix: HERE
π‘ @howtobeprivateonline
#TOR #Guide #Privacy #OS
Whonix is the safest way to be online and surf the web. Learn how to be anonymous and private with Tor Tutorial Part 2.
πΉ Watch it via:
YouTube || Invidious || BitChute
β’ Part 1 of TOR series: HERE
β’ Download Whonix: HERE
π‘ @howtobeprivateonline
#TOR #Guide #Privacy #OS
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
How to compile Windows Server 2003 - and compile Windows XP, (part 1)
From source code to ISO. Sit back, relax, and witness the miracle of creating a new build of Windows :)
Just to be clear from the start: As of now, there is NO way to completely compile Windows from the Source code, as it lacks some stuff... However, this is pretty close.
π ππΌ https://nitter.net/NTDEV_/
https://invidious.snopyta.org/watch?v=bO0daYbti5g
π ππΌ Compiling Windows XP, part 1
https://invidious.snopyta.org/watch?v=8IyW-bwGQTQ
#windows #compiling #sourcecode #leak #video #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
From source code to ISO. Sit back, relax, and witness the miracle of creating a new build of Windows :)
Just to be clear from the start: As of now, there is NO way to completely compile Windows from the Source code, as it lacks some stuff... However, this is pretty close.
π ππΌ https://nitter.net/NTDEV_/
https://invidious.snopyta.org/watch?v=bO0daYbti5g
π ππΌ Compiling Windows XP, part 1
https://invidious.snopyta.org/watch?v=8IyW-bwGQTQ
#windows #compiling #sourcecode #leak #video #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag