Forwarded from Pavel Durov
I’ve been taking part in the discussion in the comments and answering questions. Here are some of the responses:
On Apple-Google censorship https://t.me/durovschat/518801
On making server-side code open https://t.me/durovschat/515221
On a privacy-conscious ad platform https://t.me/durovschat/527441
On US-based encrypted apps https://t.me/durovschat/519187
On encryption vs. usability when using Secret Chats vs Cloud Chats https://t.me/durovschat/527081
On maximising security of communication https://t.me/durovschat/527134
On Apple-Google censorship https://t.me/durovschat/518801
On making server-side code open https://t.me/durovschat/515221
On a privacy-conscious ad platform https://t.me/durovschat/527441
On US-based encrypted apps https://t.me/durovschat/519187
On encryption vs. usability when using Secret Chats vs Cloud Chats https://t.me/durovschat/527081
On maximising security of communication https://t.me/durovschat/527134
Forwarded from BlackBox (Security) Archiv
70TB of Parler users’ messages, videos, and posts leaked by security researchers
Parler, a social network used to plan the storming of the U.S. Capitol last week, has been hit by a massive data scrape. Security researchers collected swaths of user data before the network went dark Monday morning after Amazon, Google, and Apple booted the platform.
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken.
“These are original, unprocessed, raw files as uploaded to Parler with all associated metadata,” claims one of the authors.
Security researchers claim that the scrapped posts are linked to accounts that posted them, and some of the video and image data have geolocation information. That is said also to include data from Parler’s “Verified Citizens,” users of the network who verified their identity by uploading photographs of government-issued IDs, such as a driver’s license.
https://cybernews.com/news/70tb-of-parler-users-messages-videos-and-posts-leaked-by-security-researchers/
https://nitter.net/donk_enby/status/1348281459031814146
#parler #leak
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Parler, a social network used to plan the storming of the U.S. Capitol last week, has been hit by a massive data scrape. Security researchers collected swaths of user data before the network went dark Monday morning after Amazon, Google, and Apple booted the platform.
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken.
“These are original, unprocessed, raw files as uploaded to Parler with all associated metadata,” claims one of the authors.
Security researchers claim that the scrapped posts are linked to accounts that posted them, and some of the video and image data have geolocation information. That is said also to include data from Parler’s “Verified Citizens,” users of the network who verified their identity by uploading photographs of government-issued IDs, such as a driver’s license.
https://cybernews.com/news/70tb-of-parler-users-messages-videos-and-posts-leaked-by-security-researchers/
https://nitter.net/donk_enby/status/1348281459031814146
#parler #leak
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Cybernews
70TB of Parler users’ messages, videos, and posts leaked by security researchers
Parler has been hacked - hit by a massive data scrape. Security researchers collected swaths of user data and leaked it online.
Forwarded from The Black Lives Revolution (BLM)
Looks like Parler wasn’t scrubbing your EXIF data... Oh, how terrible...
Forwarded from BlackBox (Security) Archiv
'Largest illegal darknet marketplace' DarkMarket taken offline
Authorities say the darknet platform had half a million users, where drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were traded. The suspected operator was arrested in Germany.
German prosecutors in the cities of Koblenz and Oldenburg said on Tuesday that they had shut down what was "probably the largest illegal marketplace on the Darknet" called DarkMarket and arrested the man believed to operate it near Germany's border with Denmark.
The detained man, believed to be DarkMarket's operator, is a 34-year-old Australian national.
Authorities say drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were all traded on the site, which had a half a million users and transacted business in cryptocurrencies equivalent to a value of €140 million ($170 million).
Oldenburg police said the raid took place over the weekend. "Investigators were able to shut down the marketplace and turn off the server on Monday," prosecutors said.
International probe
DarkMarket's bust was not the first for German authorities, which have found illegal platform operators on German soil in recent years. In 2019, Koblenz prosecurots announced the discovery of darknet servers hosted from a former NATO bunker in a sleepy German town.
Authorities say the probe that uncovered DarkMarket involved a months-long international law enforcement operation.
US agencies like the #FBI, #DEA narcotics law enforcement division and #IRS tax authority all contributed to the investigation, along with police from #Australia, #Britain, #Denmark, #Switzerland, #Ukraine and #Moldova, with #Europol playing a "coordinating role."
https://www.dw.com/en/largest-illegal-darknet-marketplace-darkmarket-taken-offline/a-56200737
https://www.tagesschau.de/inland/darknet-plattform-vom-netz-101.html
#DarkMarket #cybercrime #darknet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Authorities say the darknet platform had half a million users, where drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were traded. The suspected operator was arrested in Germany.
German prosecutors in the cities of Koblenz and Oldenburg said on Tuesday that they had shut down what was "probably the largest illegal marketplace on the Darknet" called DarkMarket and arrested the man believed to operate it near Germany's border with Denmark.
The detained man, believed to be DarkMarket's operator, is a 34-year-old Australian national.
Authorities say drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were all traded on the site, which had a half a million users and transacted business in cryptocurrencies equivalent to a value of €140 million ($170 million).
Oldenburg police said the raid took place over the weekend. "Investigators were able to shut down the marketplace and turn off the server on Monday," prosecutors said.
International probe
DarkMarket's bust was not the first for German authorities, which have found illegal platform operators on German soil in recent years. In 2019, Koblenz prosecurots announced the discovery of darknet servers hosted from a former NATO bunker in a sleepy German town.
Authorities say the probe that uncovered DarkMarket involved a months-long international law enforcement operation.
US agencies like the #FBI, #DEA narcotics law enforcement division and #IRS tax authority all contributed to the investigation, along with police from #Australia, #Britain, #Denmark, #Switzerland, #Ukraine and #Moldova, with #Europol playing a "coordinating role."
https://www.dw.com/en/largest-illegal-darknet-marketplace-darkmarket-taken-offline/a-56200737
https://www.tagesschau.de/inland/darknet-plattform-vom-netz-101.html
#DarkMarket #cybercrime #darknet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
DW
'Largest illegal darknet marketplace' taken offline
Authorities say the darknet platform had half a million users, where drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were traded. The suspected operator was arrested in Germany.
Stealing Your Private YouTube Videos, One Frame at a Time.
Back in December 2019, a few months after I started hacking on Google VRP, I was looking at YouTube. I wanted to find a way to get access to a Private video which I did not own.
When you upload a video to YouTube, you can select between 3 privacy settings. Public, which means that anyone can find and watch your video, Unlisted, which only allows users who know the video ID (the URL) to watch the video, and Private, where only you can watch the video, or other accounts you’ve explicitly given permission to do so.
https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Back in December 2019, a few months after I started hacking on Google VRP, I was looking at YouTube. I wanted to find a way to get access to a Private video which I did not own.
When you upload a video to YouTube, you can select between 3 privacy settings. Public, which means that anyone can find and watch your video, Unlisted, which only allows users who know the video ID (the URL) to watch the video, and Private, where only you can watch the video, or other accounts you’ve explicitly given permission to do so.
https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
📡 @techloreofficial
👥 @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
📡 @techloreofficial
👥 @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Six California WeChat users sue Tencent for alleged chat surveillance
A group of California WeChat users sued Tencent Holdings Ltd., the Chinese owner of the messaging and payment app, for allegedly violating their right to privacy by surveilling and censoring their communications.
Citizen Power Initiatives for China, a group promoting transition to democracy in China, and six anonymous WeChat users said comments made using WeChat that can be perceived as critical of the Chinese government have led to the users’ accounts being frozen, causing them to be cut off from friends and relatives in China as well as their business clients in the U.S.
“All this chills constitutionally protected speech,” according to the complaint filed Friday in California state court in San Jose. “Indeed, many WeChat users have told CPIFC that they feel real fear that the Party-state or its agents will retaliate against them or their family, and that, as a result, they self-censor, despite the fact that they live in California.”
https://www.latimes.com/business/story/2021-01-11/california-wechat-users-sue-tencent-for-alleged-surveillance
#US #California #China #tencent #wechat #surveillance #privacy
A group of California WeChat users sued Tencent Holdings Ltd., the Chinese owner of the messaging and payment app, for allegedly violating their right to privacy by surveilling and censoring their communications.
Citizen Power Initiatives for China, a group promoting transition to democracy in China, and six anonymous WeChat users said comments made using WeChat that can be perceived as critical of the Chinese government have led to the users’ accounts being frozen, causing them to be cut off from friends and relatives in China as well as their business clients in the U.S.
“All this chills constitutionally protected speech,” according to the complaint filed Friday in California state court in San Jose. “Indeed, many WeChat users have told CPIFC that they feel real fear that the Party-state or its agents will retaliate against them or their family, and that, as a result, they self-censor, despite the fact that they live in California.”
https://www.latimes.com/business/story/2021-01-11/california-wechat-users-sue-tencent-for-alleged-surveillance
#US #California #China #tencent #wechat #surveillance #privacy
Forwarded from BlackBox (Security) Archiv
Master of Pwn.mp3
62.7 MB
Darknet Diaries - EP 82: Master of Pwn
The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”.
https://darknetdiaries.com/episode/82/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”.
https://darknetdiaries.com/episode/82/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
Plexus
https://plexus.techlore.tech
Remove the fear of Android app compatibility
on de-Googled devices
Plexus is a crowdsourced project that relies on the community. You can contribute here: https://github.com/techlore-official/plexus
#plexus #alternatives #degoogle #gapps
https://plexus.techlore.tech
Remove the fear of Android app compatibility
on de-Googled devices
Plexus is a crowdsourced project that relies on the community. You can contribute here: https://github.com/techlore-official/plexus
#plexus #alternatives #degoogle #gapps
plexus.techlore.tech
Crowdsourced de-Googled Android apps status ratings
Remove the fear of Android app compatibility on de-Googled devices.
MicroG update v0.2.17.204714
• Bug fixes for Exposure Notifications API
• Improve translations. Thanks @ heyarne (de), @ Vavun (be, ru), @ oscfdezdz (es)
https://github.com/microg/GmsCore/releases/tag/v0.2.17.204714
#microg
• Bug fixes for Exposure Notifications API
• Improve translations. Thanks @ heyarne (de), @ Vavun (be, ru), @ oscfdezdz (es)
https://github.com/microg/GmsCore/releases/tag/v0.2.17.204714
#microg
GitHub
Release v0.2.17.204714 · microg/GmsCore
Bug fixes for Exposure Notifications API
Improve translations. Thanks @heyarne (de), @Vavun (be, ru), @oscfdezdz (es)
Improve translations. Thanks @heyarne (de), @Vavun (be, ru), @oscfdezdz (es)
Forwarded from /r/privacy
Face Surveillance and the Capitol Attack
https://www.eff.org/deeplinks/2021/01/face-surveillance-and-capitol-attack
https://redd.it/kw41ip
@r_privacy
https://www.eff.org/deeplinks/2021/01/face-surveillance-and-capitol-attack
https://redd.it/kw41ip
@r_privacy
Electronic Frontier Foundation
Face Surveillance and the Capitol Attack
After last week’s violent attack on the Capitol, law enforcement is working overtime to identify the perpetrators. This is critical to accountability for the attempted insurrection. Law enforcement
#Google suspends #Trump's #YouTube account, disables comments
https://www.cnbc.com/2021/01/12/google-suspends-trumps-youtube-account-disables-comments.html
No one cares
https://www.cnbc.com/2021/01/12/google-suspends-trumps-youtube-account-disables-comments.html
No one cares
CNBC
YouTube suspends Trump's account, barring uploads and comments
The Google-owned company took down the account following similar actions by Facebook and Twitter.