Forwarded from BlackBox (Security) Archiv
'Largest illegal darknet marketplace' DarkMarket taken offline
Authorities say the darknet platform had half a million users, where drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were traded. The suspected operator was arrested in Germany.
German prosecutors in the cities of Koblenz and Oldenburg said on Tuesday that they had shut down what was "probably the largest illegal marketplace on the Darknet" called DarkMarket and arrested the man believed to operate it near Germany's border with Denmark.
The detained man, believed to be DarkMarket's operator, is a 34-year-old Australian national.
Authorities say drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were all traded on the site, which had a half a million users and transacted business in cryptocurrencies equivalent to a value of €140 million ($170 million).
Oldenburg police said the raid took place over the weekend. "Investigators were able to shut down the marketplace and turn off the server on Monday," prosecutors said.
International probe
DarkMarket's bust was not the first for German authorities, which have found illegal platform operators on German soil in recent years. In 2019, Koblenz prosecurots announced the discovery of darknet servers hosted from a former NATO bunker in a sleepy German town.
Authorities say the probe that uncovered DarkMarket involved a months-long international law enforcement operation.
US agencies like the #FBI, #DEA narcotics law enforcement division and #IRS tax authority all contributed to the investigation, along with police from #Australia, #Britain, #Denmark, #Switzerland, #Ukraine and #Moldova, with #Europol playing a "coordinating role."
https://www.dw.com/en/largest-illegal-darknet-marketplace-darkmarket-taken-offline/a-56200737
https://www.tagesschau.de/inland/darknet-plattform-vom-netz-101.html
#DarkMarket #cybercrime #darknet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Authorities say the darknet platform had half a million users, where drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were traded. The suspected operator was arrested in Germany.
German prosecutors in the cities of Koblenz and Oldenburg said on Tuesday that they had shut down what was "probably the largest illegal marketplace on the Darknet" called DarkMarket and arrested the man believed to operate it near Germany's border with Denmark.
The detained man, believed to be DarkMarket's operator, is a 34-year-old Australian national.
Authorities say drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were all traded on the site, which had a half a million users and transacted business in cryptocurrencies equivalent to a value of €140 million ($170 million).
Oldenburg police said the raid took place over the weekend. "Investigators were able to shut down the marketplace and turn off the server on Monday," prosecutors said.
International probe
DarkMarket's bust was not the first for German authorities, which have found illegal platform operators on German soil in recent years. In 2019, Koblenz prosecurots announced the discovery of darknet servers hosted from a former NATO bunker in a sleepy German town.
Authorities say the probe that uncovered DarkMarket involved a months-long international law enforcement operation.
US agencies like the #FBI, #DEA narcotics law enforcement division and #IRS tax authority all contributed to the investigation, along with police from #Australia, #Britain, #Denmark, #Switzerland, #Ukraine and #Moldova, with #Europol playing a "coordinating role."
https://www.dw.com/en/largest-illegal-darknet-marketplace-darkmarket-taken-offline/a-56200737
https://www.tagesschau.de/inland/darknet-plattform-vom-netz-101.html
#DarkMarket #cybercrime #darknet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
DW
'Largest illegal darknet marketplace' taken offline
Authorities say the darknet platform had half a million users, where drugs, counterfeit money, stolen credit card data, anonymous SIM cards and malware were traded. The suspected operator was arrested in Germany.
Stealing Your Private YouTube Videos, One Frame at a Time.
Back in December 2019, a few months after I started hacking on Google VRP, I was looking at YouTube. I wanted to find a way to get access to a Private video which I did not own.
When you upload a video to YouTube, you can select between 3 privacy settings. Public, which means that anyone can find and watch your video, Unlisted, which only allows users who know the video ID (the URL) to watch the video, and Private, where only you can watch the video, or other accounts you’ve explicitly given permission to do so.
https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Back in December 2019, a few months after I started hacking on Google VRP, I was looking at YouTube. I wanted to find a way to get access to a Private video which I did not own.
When you upload a video to YouTube, you can select between 3 privacy settings. Public, which means that anyone can find and watch your video, Unlisted, which only allows users who know the video ID (the URL) to watch the video, and Private, where only you can watch the video, or other accounts you’ve explicitly given permission to do so.
https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
📡 @techloreofficial
👥 @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
https://techlore.tech/goincognito.html
Watch it on:
https://tube.privacytools.io/accounts/techlore/video-channels
https://techlore.tech/assets/GoIncognito.torrent
https://www.youtube.com/watch?v=Y19RFmOxfVM
Text and link sources:
https://github.com/techlore-official/go-incognito
📡 @techloreofficial
👥 @techloregroup
#guide #goincognito #privacy #anonymity #security #techlore
Six California WeChat users sue Tencent for alleged chat surveillance
A group of California WeChat users sued Tencent Holdings Ltd., the Chinese owner of the messaging and payment app, for allegedly violating their right to privacy by surveilling and censoring their communications.
Citizen Power Initiatives for China, a group promoting transition to democracy in China, and six anonymous WeChat users said comments made using WeChat that can be perceived as critical of the Chinese government have led to the users’ accounts being frozen, causing them to be cut off from friends and relatives in China as well as their business clients in the U.S.
“All this chills constitutionally protected speech,” according to the complaint filed Friday in California state court in San Jose. “Indeed, many WeChat users have told CPIFC that they feel real fear that the Party-state or its agents will retaliate against them or their family, and that, as a result, they self-censor, despite the fact that they live in California.”
https://www.latimes.com/business/story/2021-01-11/california-wechat-users-sue-tencent-for-alleged-surveillance
#US #California #China #tencent #wechat #surveillance #privacy
A group of California WeChat users sued Tencent Holdings Ltd., the Chinese owner of the messaging and payment app, for allegedly violating their right to privacy by surveilling and censoring their communications.
Citizen Power Initiatives for China, a group promoting transition to democracy in China, and six anonymous WeChat users said comments made using WeChat that can be perceived as critical of the Chinese government have led to the users’ accounts being frozen, causing them to be cut off from friends and relatives in China as well as their business clients in the U.S.
“All this chills constitutionally protected speech,” according to the complaint filed Friday in California state court in San Jose. “Indeed, many WeChat users have told CPIFC that they feel real fear that the Party-state or its agents will retaliate against them or their family, and that, as a result, they self-censor, despite the fact that they live in California.”
https://www.latimes.com/business/story/2021-01-11/california-wechat-users-sue-tencent-for-alleged-surveillance
#US #California #China #tencent #wechat #surveillance #privacy
Forwarded from BlackBox (Security) Archiv
Master of Pwn.mp3
62.7 MB
Darknet Diaries - EP 82: Master of Pwn
The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”.
https://darknetdiaries.com/episode/82/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”.
https://darknetdiaries.com/episode/82/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_DE
🎙@cRyPtHoN_INFOSEC_EN
🎙@BlackBox_Archiv
🎙@NoGoolag
Plexus
https://plexus.techlore.tech
Remove the fear of Android app compatibility
on de-Googled devices
Plexus is a crowdsourced project that relies on the community. You can contribute here: https://github.com/techlore-official/plexus
#plexus #alternatives #degoogle #gapps
https://plexus.techlore.tech
Remove the fear of Android app compatibility
on de-Googled devices
Plexus is a crowdsourced project that relies on the community. You can contribute here: https://github.com/techlore-official/plexus
#plexus #alternatives #degoogle #gapps
plexus.techlore.tech
Crowdsourced de-Googled Android apps status ratings
Remove the fear of Android app compatibility on de-Googled devices.
MicroG update v0.2.17.204714
• Bug fixes for Exposure Notifications API
• Improve translations. Thanks @ heyarne (de), @ Vavun (be, ru), @ oscfdezdz (es)
https://github.com/microg/GmsCore/releases/tag/v0.2.17.204714
#microg
• Bug fixes for Exposure Notifications API
• Improve translations. Thanks @ heyarne (de), @ Vavun (be, ru), @ oscfdezdz (es)
https://github.com/microg/GmsCore/releases/tag/v0.2.17.204714
#microg
GitHub
Release v0.2.17.204714 · microg/GmsCore
Bug fixes for Exposure Notifications API
Improve translations. Thanks @heyarne (de), @Vavun (be, ru), @oscfdezdz (es)
Improve translations. Thanks @heyarne (de), @Vavun (be, ru), @oscfdezdz (es)
Forwarded from /r/privacy
Face Surveillance and the Capitol Attack
https://www.eff.org/deeplinks/2021/01/face-surveillance-and-capitol-attack
https://redd.it/kw41ip
@r_privacy
https://www.eff.org/deeplinks/2021/01/face-surveillance-and-capitol-attack
https://redd.it/kw41ip
@r_privacy
Electronic Frontier Foundation
Face Surveillance and the Capitol Attack
After last week’s violent attack on the Capitol, law enforcement is working overtime to identify the perpetrators. This is critical to accountability for the attempted insurrection. Law enforcement
#Google suspends #Trump's #YouTube account, disables comments
https://www.cnbc.com/2021/01/12/google-suspends-trumps-youtube-account-disables-comments.html
No one cares
https://www.cnbc.com/2021/01/12/google-suspends-trumps-youtube-account-disables-comments.html
No one cares
CNBC
YouTube suspends Trump's account, barring uploads and comments
The Google-owned company took down the account following similar actions by Facebook and Twitter.
https://RSS.app
Instantly generate RSS feeds from any URL to add to your favorite RSS news reader app
#rss
Instantly generate RSS feeds from any URL to add to your favorite RSS news reader app
#rss
RSS.app
RSS Feed Generator, Widgets & Bots: Web & Social feeds | RSS.app
RSS.app is the #1 RSS feed generator and app. Generate custom feeds from any website or social media. Create widgets or auto-post to Discord, Slack & Telegram.
Make a Telegram bot for notifying about new RSS feed items
https://ljmocic.medium.com/make-telegram-bot-for-notifying-about-new-rss-feed-items-4cfbcc37f4fd
Replace your #RSS #reader with a simple #Telegram #bot
https://ljmocic.medium.com/make-telegram-bot-for-notifying-about-new-rss-feed-items-4cfbcc37f4fd
Replace your #RSS #reader with a simple #Telegram #bot
Medium
Make Telegram bot for notifying about new RSS feed items
Replace your RSS reader with simple Telegram bot
Forwarded from BlackBox (Security) Archiv
How I stole the data in millions of people’s Google accounts
You don’t know me, but there’s a good chance I know you.
That’s because I have complete and total access to the private information in millions of peoples’ Google accounts. Emailed bank statements, medical records in Google Drive, Facebook chat records sent via Gmail, Google Voice voicemails, private pictures in Google Photos. The list goes on. None of them have any idea, and none of them ever will. Perhaps one of them is you.
So how did I do it? It all starts with an app I made.
For obvious reasons I won’t give away the name. It’s a pretty straightforward app, designed for fitness enthusiasts, with features like logging your pace during a run and guiding you through strength-building exercises. Like many apps, it requires the user to create an account before they can start using it. According to analytics, about 60% of users opt for the enticing ‘Sign up with Google’ button instead.
https://blog.usejournal.com/how-i-stole-the-data-in-millions-of-peoples-google-accounts-aa1b72dcc075?gi=379e212a2b46
#DeleteGoogle #google #data #accounts
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
You don’t know me, but there’s a good chance I know you.
That’s because I have complete and total access to the private information in millions of peoples’ Google accounts. Emailed bank statements, medical records in Google Drive, Facebook chat records sent via Gmail, Google Voice voicemails, private pictures in Google Photos. The list goes on. None of them have any idea, and none of them ever will. Perhaps one of them is you.
So how did I do it? It all starts with an app I made.
For obvious reasons I won’t give away the name. It’s a pretty straightforward app, designed for fitness enthusiasts, with features like logging your pace during a run and guiding you through strength-building exercises. Like many apps, it requires the user to create an account before they can start using it. According to analytics, about 60% of users opt for the enticing ‘Sign up with Google’ button instead.
https://blog.usejournal.com/how-i-stole-the-data-in-millions-of-peoples-google-accounts-aa1b72dcc075?gi=379e212a2b46
#DeleteGoogle #google #data #accounts
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Medium
How I stole the data in millions of people’s Google accounts
You don’t know me, but there’s a good chance I know you.
"Wolf culture" - How Huawei controls its employees in Europe
Former employees accuse Huawei of discrimination. How massively the company interferes in their private lives and how it keeps its staff in line is revealed by internal documents and covert audio recordings that netzpolitik.org and the media partners of The Signals Network have analysed.
The journalist with the camera causes nervousness. Minutes after he appears in front of Huawei’s European headquarters in Düsseldorf in mid-November, a stocky security guard and a female employee rush over. The street in front of the building is public space, but the company seems to feel its turf has been violated. „What do you want here?“, the woman asks. „Delete the photos.“
Insights into the inner workings of the controversial Chinese mobile phone company are rare. Huawei has about 200,000 employees worldwide, and about 2,400 in Germany, according to the company. The European headquarters are in Düsseldorf. „We Are A Top Employer!“, a sign in the entrance area reads, beneath it orchids decorate the reception table. In the corridor hangs a photo of a hiking group posing and waving on a mountain peak.
What voices tell us from inside, on the other hand, belies the impression of a friendly atmosphere. They tell of a technology company that seems to see its employees first and foremost as raw materials from which it wants to forge its own success. About a company that moves Chinese employees around like chess pieces, that fires employees at will and where a quasi-military esprit de corps prevails. In Germany, the company sometimes violates the spirit, perhaps even the letter, of labour law.
https://netzpolitik.org/2021/wolf-culture-how-huawei-controls-its-employees-in-europe/
https://www.telegraph.co.uk/news/2021/01/13/huawei-expat-employees-marry-westerners-faced-forced-leave-europe/
(Paywall)
https://www.elmundo.es/economia/2021/01/13/5ffe1f39fc6c83b1588b463e.html
https://www.republik.ch/2021/01/13/inside-huawei
#huawei #discrimination #expat #employees #europe #eu #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Former employees accuse Huawei of discrimination. How massively the company interferes in their private lives and how it keeps its staff in line is revealed by internal documents and covert audio recordings that netzpolitik.org and the media partners of The Signals Network have analysed.
The journalist with the camera causes nervousness. Minutes after he appears in front of Huawei’s European headquarters in Düsseldorf in mid-November, a stocky security guard and a female employee rush over. The street in front of the building is public space, but the company seems to feel its turf has been violated. „What do you want here?“, the woman asks. „Delete the photos.“
Insights into the inner workings of the controversial Chinese mobile phone company are rare. Huawei has about 200,000 employees worldwide, and about 2,400 in Germany, according to the company. The European headquarters are in Düsseldorf. „We Are A Top Employer!“, a sign in the entrance area reads, beneath it orchids decorate the reception table. In the corridor hangs a photo of a hiking group posing and waving on a mountain peak.
What voices tell us from inside, on the other hand, belies the impression of a friendly atmosphere. They tell of a technology company that seems to see its employees first and foremost as raw materials from which it wants to forge its own success. About a company that moves Chinese employees around like chess pieces, that fires employees at will and where a quasi-military esprit de corps prevails. In Germany, the company sometimes violates the spirit, perhaps even the letter, of labour law.
https://netzpolitik.org/2021/wolf-culture-how-huawei-controls-its-employees-in-europe/
https://www.telegraph.co.uk/news/2021/01/13/huawei-expat-employees-marry-westerners-faced-forced-leave-europe/
(Paywall)
https://www.elmundo.es/economia/2021/01/13/5ffe1f39fc6c83b1588b463e.html
https://www.republik.ch/2021/01/13/inside-huawei
#huawei #discrimination #expat #employees #europe #eu #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
netzpolitik.org
How Huawei controls its employees in Europe
Former employees accuse Huawei of discrimination. How massively the company interferes in their private lives and how it keeps its staff in line is revealed by internal documents and covert audio recordings that netzpolitik.org and the media partners of The…
Salaat First: Another Popular Muslim Prayer App Sells Location Data to FBI, ICE
Salaat First shared location data with a French firm Predicio which had customers including Venntel, a US government contractor.
The methods of surveillance have changed over time. Nowadays, government agencies do not need to follow someone to track their activities. Mobile phone users, unknowingly, hand over their privacy rights to the tech companies that in turn sell it to government contractors. A popular Muslim prayer app, named Salaat First, found selling users' location data to its partner that has customers with the US government agencies including the FBI and the ICE.
Salaat First, which reminds its users about Muslim prayer timings, has been downloaded over 10 million times on Android. To accurately tell users prayer times, Salaat First asks for permission to read precise location, has access to device ID, phone, media storage, USB storage and full network access. However, the app developer was selling the same user data to its partner, a French firm named Predicio.
https://www.ibtimes.sg/salaat-first-another-popular-muslim-prayer-app-sells-location-data-fbi-ice-54843
#US #France #FBI #ICE #surveillance #location #data
Salaat First shared location data with a French firm Predicio which had customers including Venntel, a US government contractor.
The methods of surveillance have changed over time. Nowadays, government agencies do not need to follow someone to track their activities. Mobile phone users, unknowingly, hand over their privacy rights to the tech companies that in turn sell it to government contractors. A popular Muslim prayer app, named Salaat First, found selling users' location data to its partner that has customers with the US government agencies including the FBI and the ICE.
Salaat First, which reminds its users about Muslim prayer timings, has been downloaded over 10 million times on Android. To accurately tell users prayer times, Salaat First asks for permission to read precise location, has access to device ID, phone, media storage, USB storage and full network access. However, the app developer was selling the same user data to its partner, a French firm named Predicio.
https://www.ibtimes.sg/salaat-first-another-popular-muslim-prayer-app-sells-location-data-fbi-ice-54843
#US #France #FBI #ICE #surveillance #location #data
International Business Times
Salaat First: Another Popular Muslim Prayer App Sells Location Data to FBI, ICE
Salaat First shared location data with a French firm Predicio which had customers including Venntel, a US government contractor.