NoGoolag
4.51K subscribers
14.7K photos
7.65K videos
609 files
15.2K links
Download Telegram
Media is too big
VIEW IN TELEGRAM
What The Fax?! - Hacking your network likes it's 1980 again

We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?

But can FAX be something more than a bureaucratic burden? Can it actually be a catastrophic security hole that may be used to compromise your entire network? Come watch our talk and find out …

👉🏼 📺 🇩🇪 🇬🇧 🇫🇷
https://media.ccc.de/v/35c3-9462-what_the_fax

💡 These file here contains multiple languages.
The file available for download contains all languages as separate audio-tracks.

#ccc #fax #security #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Elephant In The Background: Empowering Users Against Browser Fingerprinting

Tracking users is a ubiquitous practice in the web today. User activity is recorded on a large scale and analyzed by various actors to create personalized products, forecast future behavior, and prevent online fraud. While so far HTTP cookies have been the weapon of choice, new and more pervasive techniques such as browser fingerprinting are gaining traction. Hence, in this talk, we describe how users can be empowered against fingerprinting by showing them when, how, and who is tracking them using JavaScript fingerprinting.

https://media.ccc.de/v/rc3-113142-the_elephant_in_the_background

#ccc #rc3 #browser #fingerprinting #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@NoGoolag
📡
@BlackBox
Media is too big
VIEW IN TELEGRAM
CIA vs. Wikileaks - Intimidation surveillance and other tactics observed and experienced

In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that strongly indicate a context of the US Central Intelligence Agency and/or potentially other entities of the US Government actions against Wikileaks and surrounding persons and organisations.

https://media.ccc.de/v/rc3-11512-cia_vs_wikileaks

💡 These file here contains multiple languages. (🇩🇪 🇬🇧)
The file available for download contains all languages as separate audio-tracks.

#ccc #rc3 #cia #wikileaks #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@NoGoolag
📡
@BlackBox
Media is too big
VIEW IN TELEGRAM
Login To HELL: The nightmares of an infosec professional in South America

"In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened.

Alberto, a hacker, was the perfect target for a judicial system that doesn’t understand cybersecurity or cybercrimes. Through police misconduct and incompetence, his life was thrown into upheaval, and he is still recovering from a system where there are no guarantees of a fair trial.

https://media.ccc.de/v/rc3-625023-login_to_hell

🎙Darknetdiaries - EP 25: Alberto
https://t.me/BlackBox_Archiv/1678

#alberto #truecrime #darknetdiaries #rc3 #ccc #cybersecurity #cybercrime #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Horcrux Encrypted Messaging

"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?

https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging

#rc3 #ccc #horcrux #encrypted #messaging #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Hackerfleet Operating System & the Isomer Framework

A quick and dirty hands on introduction to Isomer development and how to set up the prime project using it, the Hackerfleet Operating System. This workshop is mostly intended for sailors, campers etc. but also very useful in many other situations.

What is all this? What are the benefits? How do things work? What will you need to get started? How to set everything up? How do you join the project and how to contribute? These kind of questions shall be answered! Additional workshopping and hacking may happen in a breakout room or something.

https://media.ccc.de/v/rc3-176543-the_hackerfleet_operating_system_the_isomer_framework

#hackerfleet #isomer #framework #rc3 #ccc #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Spot the Surveillance - How to Identify Police Surveillance at Protests and Large Gatherings

The Electronic Frontier Foundation’s Kurt Opsahl will show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.

https://media.ccc.de/v/rc3-11406-spot_the_surveillance

⚠️ This Talk was translated into multiple languages (DE / EN). The files available for download contain all languages as separate audio-tracks.

#rc3 #ccc #police #surveillance #spying #protests #demos #video
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's operating system

Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.

https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os

#RedStarOS #northkorea #ccc #32c3 #video
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Hacking the Samsung Galaxy S8 Irisscanner

Mobile vendors have established fingerprints as a biometric feature to unlock smartphones. Now they turn to iris recognition, as do hackers. This video demonstrates how to circumvent the iris recognition of the Samsung Galaxy S8 flagship phone only using basic tools.

https://media.ccc.de/v/biometrie-s8-iris-en

#ccc #biometric #unlock #smartphones #irisrecognition #irisscanner #video
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Facebook, IoTeX, R3 Among New Members of Confidential Computing Consortium

Facebook, Accenture, IoTeX, Nvidia and six other companies are joining the Linux Foundation’s Confidential Computing Consortium (
CCC), increasing the size of the privacy-focused group by 60 percent.

The addition of members IoTeX, which leverages blockchain to secure the internet of things, and R3, an enterprise blockchain company, nearly doubles the number of blockchain companies involved.

Created in late October 2019, the CCC aims to bring developers together to accelerate the use of Trusted Execution Environment (TEE) technologies and standards. A TEE sequesters code and data away from applications on the main operating system, so they’re protected from adversaries who may gain access to the main operating system. If the main system is in the White House, for instance, with a variety of protections, a TEE is the bunker underneath it.

Within a TEE, unauthorized actors cannot view the data that is being used within the TEE and cannot alter the data. This enables applications and other systems to run without having direct access to extensive amounts of vulnerable data such as financial or personally identifiable information.

“Securing data-in-use in hardware-based TEEs, can … strengthen other security- and integrity-related technologies,” like running a blockchain ledger, said Stephen Walli, the chairperson of the CCC’s governing board, in a statement.

“Confidential computing brings privacy-preserving smart devices to the next level by not only allowing users to own their private data, but also to use it in a privacy-preserving way,” Raullen Chai, CEO of IoTex, told CoinDesk in an email. “This has major implications for consumer-facing industries such as health care and smart homes, as well as enterprise for private multi-party data sharing and interactions.”

http://telegra.ph/Facebook-IoTeX-R3-Among-New-Members-of-Confidential-Computing-Consortium---CoinDesk-04-30

via www.coindesk.com

#facebook #DeleteFacebook #IoTeX #confidential #computing #consortium #ccc
📡 @nogoolag 📡 @blackbox_archiv