Forwarded from BlackBox (Security) Archiv
A French Infosec channel on Telegram
Are you interested in cybersecurity, privacy, vulnerabilities and Internet politics? You speak French and like to deal with these topics? Gathering knowledge, sharing knowledge and helping others sounds good to you? Then we are looking for exactly you. Get in touch with us.
#infosec #french #telegram #tg
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Are you interested in cybersecurity, privacy, vulnerabilities and Internet politics? You speak French and like to deal with these topics? Gathering knowledge, sharing knowledge and helping others sounds good to you? Then we are looking for exactly you. Get in touch with us.
#infosec #french #telegram #tg
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from Rahul Patel
Hi all,
Here is the first public alpha for AuroraStore v4.
A lot has changed from v3.2.9 which was like 7 months ago.
Google keeps changing the API, so instead of patching every changes.
I decided to write a new GPlay API that is dynamic enough to embrace this regular changes.
Therefore a new client was required to explore this dynamic API.
Here are few things that are new:
1. You can browse streams similar to Play Store, ie
2.
3.
4. A dedicated section for Games
5. A new improved App UI
6. A lot of under the hood improvements.
7. Kotlin
Here are few things that will no longer be available or has changed:
1. Geo-spoof, would provide a companion app to facilitate the same, if required.
2. Favourite app, will add something called similar to WishList, limited to google login only.
3. Anonymous logins now use your device-config to create session, so your device-config is sent to my dispenser server. It may sound scary but it is not, here is a sample of what I send to my dispenser in order to create a anonymous session.
Whatever else is missing, will be added soon,
Please keep in mind that this is a alpha build and it has many bugs & scope for improvements.
Help us improve & support building a friendly FOSS Community.
Use /bug to report a bug & /suggestion to add a suggestion.
I read all messages, I may not reply to all. But I do read all.
Regards,
Rahul
Here is the first public alpha for AuroraStore v4.
A lot has changed from v3.2.9 which was like 7 months ago.
Google keeps changing the API, so instead of patching every changes.
I decided to write a new GPlay API that is dynamic enough to embrace this regular changes.
Therefore a new client was required to explore this dynamic API.
Here are few things that are new:
1. You can browse streams similar to Play Store, ie
For You, Editor's Choice, Early Access. EC & EA is not available on anonymous logins.2.
App Library, so you can track your app install history.3.
App-on-Sale, uses a 3rd party API for index, but app data is fetched from Google's servers4. A dedicated section for Games
5. A new improved App UI
6. A lot of under the hood improvements.
7. Kotlin
Here are few things that will no longer be available or has changed:
1. Geo-spoof, would provide a companion app to facilitate the same, if required.
2. Favourite app, will add something called similar to WishList, limited to google login only.
3. Anonymous logins now use your device-config to create session, so your device-config is sent to my dispenser server. It may sound scary but it is not, here is a sample of what I send to my dispenser in order to create a anonymous session.
Whatever else is missing, will be added soon,
Please keep in mind that this is a alpha build and it has many bugs & scope for improvements.
Help us improve & support building a friendly FOSS Community.
Use /bug to report a bug & /suggestion to add a suggestion.
I read all messages, I may not reply to all. But I do read all.
Regards,
Rahul
GitLab
Aurora OSS / GPlayApi · GitLab
An unofficial FOSS implementation of Google Play API
Forwarded from BlackBox (Security) Archiv
Google couldn't sign me in, so I signed out, indefinitely
I saw the above warning using Vivaldi: a successful and powerful Chromium based browser. There's nothing insecure about it. I tried to fix the problem by disabling all extensions, clearing all browser data, and enabling “less secure app access” in the Google account settings. Alas. The only solution I found was reinstalling the browser. But after having done so—five times—each time when clearing the cookies, or enabling a VPN, it wouldn't let me sign in again. Then the following email found my inbox.
“Someone knows the password to your linked Google Account”… Me. It was me! Obviously I know the password to my linked Google account. Forced to change my password I was duly annoyed. I realized how dependent I was. If Google unpredictably revokes access to your account, you can't log into anything else of their services: YouTube, Gmail, Play Store, Docs, Drive, Calendar, etc. Fortunately I already did a partial Google and social media exodus. Nevertheless, even when only using YouTube and Google Play, losing access startled me. Therefore, because I don't want to be put in this position again, I completed the exodus: discarding the need for a Google account.
A quick aside, I have nothing against monopolies as a general rule. Usually they grow so big because of a significantly superior service (1). But as convenient as they may be—even though their products aren't superior anymore—if their power goes to their head and they start pulling insidious shenanigans, like using false claims to deter people from browsers other than Chrome, then I'm out.
So that's exactly what I did and I was pleasantly surprised by the results. Believe it or not but my phone is more responsive and the battery lasts longer. Although the former might be due to the factory reset, I assume the latter has to do with the decrease in background processes due to 1. removing my Google account 2. subsequently disabling Google Play Store 3. disabling everything in the settings tab called Google services & preferences. Digital minimalism, it's so incredibly satisfying. You should try it. Your life was perfectly fine before you had all that extra stuff to worry about (or pay for); I learnt that from my teacher, Diogenes of Sinope, 404 – 323 BC.
https://www.quitfacebook.org/file/google.html
#google #DeleteGoogle #quitgoogle #alternatives #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
I saw the above warning using Vivaldi: a successful and powerful Chromium based browser. There's nothing insecure about it. I tried to fix the problem by disabling all extensions, clearing all browser data, and enabling “less secure app access” in the Google account settings. Alas. The only solution I found was reinstalling the browser. But after having done so—five times—each time when clearing the cookies, or enabling a VPN, it wouldn't let me sign in again. Then the following email found my inbox.
“Someone knows the password to your linked Google Account”… Me. It was me! Obviously I know the password to my linked Google account. Forced to change my password I was duly annoyed. I realized how dependent I was. If Google unpredictably revokes access to your account, you can't log into anything else of their services: YouTube, Gmail, Play Store, Docs, Drive, Calendar, etc. Fortunately I already did a partial Google and social media exodus. Nevertheless, even when only using YouTube and Google Play, losing access startled me. Therefore, because I don't want to be put in this position again, I completed the exodus: discarding the need for a Google account.
A quick aside, I have nothing against monopolies as a general rule. Usually they grow so big because of a significantly superior service (1). But as convenient as they may be—even though their products aren't superior anymore—if their power goes to their head and they start pulling insidious shenanigans, like using false claims to deter people from browsers other than Chrome, then I'm out.
So that's exactly what I did and I was pleasantly surprised by the results. Believe it or not but my phone is more responsive and the battery lasts longer. Although the former might be due to the factory reset, I assume the latter has to do with the decrease in background processes due to 1. removing my Google account 2. subsequently disabling Google Play Store 3. disabling everything in the settings tab called Google services & preferences. Digital minimalism, it's so incredibly satisfying. You should try it. Your life was perfectly fine before you had all that extra stuff to worry about (or pay for); I learnt that from my teacher, Diogenes of Sinope, 404 – 323 BC.
https://www.quitfacebook.org/file/google.html
#google #DeleteGoogle #quitgoogle #alternatives #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
WikiLeaks Shop Banned From Facebook, No Explanation Given
The official Facebook account for the WikiLeaks Shop has been banned from the platform without explanation.
The shop raises money for Julian Assange’s defense fund by selling merch.
Speaking to the Gateway Pundit, the person who runs the account said that “it seems they banned us for posting a graphic of one of our Free Assange t-shirts.”
The last post on the account before it was removed was simply a black t-shirt with “Free Assange” written across it in white lettering.
“We’ve had no warnings and they won’t say what rule we broke,” the admin explained. “We contacted Facebook support and they were unable to assist us.”
https://www.thegatewaypundit.com/2021/02/wikileaks-shop-banned-facebook-no-explanation-given/
#wikileaks #assange #facebook #DeleteFacebook #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The official Facebook account for the WikiLeaks Shop has been banned from the platform without explanation.
The shop raises money for Julian Assange’s defense fund by selling merch.
Speaking to the Gateway Pundit, the person who runs the account said that “it seems they banned us for posting a graphic of one of our Free Assange t-shirts.”
The last post on the account before it was removed was simply a black t-shirt with “Free Assange” written across it in white lettering.
“We’ve had no warnings and they won’t say what rule we broke,” the admin explained. “We contacted Facebook support and they were unable to assist us.”
https://www.thegatewaypundit.com/2021/02/wikileaks-shop-banned-facebook-no-explanation-given/
#wikileaks #assange #facebook #DeleteFacebook #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Gateway Pundit
WikiLeaks Shop Banned From Facebook, No Explanation Given | The Gateway Pundit | by Cassandra MacDonald
The official account for the WikiLeaks Shop has been banned from the platform without explanation.
Forwarded from BlackBox (Security) Archiv
Safari blocks any website URL containing the word “asian”
On iOS, if you turn on “Limit Adult Website” under Screen Time->Content Restrictions, Safari blocks any website URL containing the word “asian”. Seriously, go try it, it’s unbelievable. I filed a Feeback a long time ago. Nothing changed.
https://nitter.nixnet.services/Stevenpotato/status/1356953980174131200
#ios #safari #asian #blocking
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
On iOS, if you turn on “Limit Adult Website” under Screen Time->Content Restrictions, Safari blocks any website URL containing the word “asian”. Seriously, go try it, it’s unbelievable. I filed a Feeback a long time ago. Nothing changed.
https://nitter.nixnet.services/Stevenpotato/status/1356953980174131200
#ios #safari #asian #blocking
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Nitter
Steven Shen (@Stevenpotato)
On iOS, if you turn on “Limit Adult Website” under Screen Time->Content Restrictions, Safari blocks any website URL containing the word “asian”. Seriously, go try it, it’s unbelievable. I filed a Feeback a long time ago. Nothing changed. Please RT for visibility.…
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Amazon plans to monitor drivers in delivery trucks - to protect them
Amazon wants to use cameras to monitor the drivers of its logistics vehicles and secure evidence. To do so, the company is using AI-powered camera technology from a startup.
Amazon is relying here on a safety technology from the Californian startup Netradyne called Driver-i - a small device that is attached to the vehicle's interior mirror and is equipped with four HD cameras (facing the road, the driver and twice to the side). One camera permanently films the driver.
https://vimeo.com/504570835/e80ee265bc
https://www.netradyne.com/driveri/
https://t3n.de/news/amazon-plant-ueberwachung-fahrer-1353949/
#amazon #DeleteAmazon #driveri #surveillance #thinkabout #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Amazon wants to use cameras to monitor the drivers of its logistics vehicles and secure evidence. To do so, the company is using AI-powered camera technology from a startup.
Amazon is relying here on a safety technology from the Californian startup Netradyne called Driver-i - a small device that is attached to the vehicle's interior mirror and is equipped with four HD cameras (facing the road, the driver and twice to the side). One camera permanently films the driver.
https://vimeo.com/504570835/e80ee265bc
https://www.netradyne.com/driveri/
https://t3n.de/news/amazon-plant-ueberwachung-fahrer-1353949/
#amazon #DeleteAmazon #driveri #surveillance #thinkabout #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
AlwaysOnline Telegram
Run this on a server to make your telegram accounts appear as online always
Don't let others peak on your daily routine with recent online. So keep yourself always online
https://github.com/abusetelegram/AlwaysOnline-
#alwaysonline #tg #telegram
Run this on a server to make your telegram accounts appear as online always
Don't let others peak on your daily routine with recent online. So keep yourself always online
https://github.com/abusetelegram/AlwaysOnline-
#alwaysonline #tg #telegram
GitHub
GitHub - abusetelegram/AlwaysOnline-: Make Your Telegram Always Online | 让你的 Telegram 一直保持在线
Make Your Telegram Always Online | 让你的 Telegram 一直保持在线 - abusetelegram/AlwaysOnline-
PCAPdroid
Capture traffic on Android devices and send the PCAP via UDP without root
PCAPdroid lets you capture the Android traffic and analyze it remotely (e.g. via Wireshark). The traffic can be easily captured on a remote PC via an UDP socket.
💡 Features:
✅ Capture apps traffic without root privileges
✅ Send captured traffic via UDP
✅ Download the traffic PCAP via the integrated HTTP server
✅ Show captured traffic real time statistics
✅ Apply a filter to only capture traffic for the selected app
✅ Decrypt HTTPS/TLS traffic via a remote mitmproxy
https://f-droid.org/packages/com.emanuelef.remote_capture/
#PCAPdroid #android #fdroid #app
Capture traffic on Android devices and send the PCAP via UDP without root
PCAPdroid lets you capture the Android traffic and analyze it remotely (e.g. via Wireshark). The traffic can be easily captured on a remote PC via an UDP socket.
💡 Features:
✅ Capture apps traffic without root privileges
✅ Send captured traffic via UDP
✅ Download the traffic PCAP via the integrated HTTP server
✅ Show captured traffic real time statistics
✅ Apply a filter to only capture traffic for the selected app
✅ Decrypt HTTPS/TLS traffic via a remote mitmproxy
https://f-droid.org/packages/com.emanuelef.remote_capture/
#PCAPdroid #android #fdroid #app
f-droid.org
PCAPdroid | F-Droid - Free and Open Source Android App Repository
No-root network monitor and traffic dump tool for Android devices
Forwarded from BlackBox (Security) Archiv
Help users in Iran reconnect to Signal
Just over a week ago, we announced that Iranian censors had started blocking all Signal traffic in the country. As an interim solution to help people in Iran get connected again, we’ve added support in Signal for a simple TLS proxy that is easy to set up, can be used to bypass the network block, and will securely route traffic to the Signal service.
This new connection method is supported in the latest Signal Android beta release, and will be rolling out to production users in a few days. Our hope is that this will help many people in Iran start sending and receiving messages again while we continue to explore additional censorship circumvention techniques that will work there.
💡Act as a proxy
✳️ If you want to help by running a proxy, to get started you only need the following:
- A server with ports 80 and 443 available.
- A domain name (or subdomain) that points to the server’s IP address.
The proxy is extremely lightweight. An inexpensive and tiny VPS can easily handle hundreds of concurrent users. Here’s how to make it work:
https://signal.org/blog/help-iran-reconnect/
#signal #help #iran #pleaseshare #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Just over a week ago, we announced that Iranian censors had started blocking all Signal traffic in the country. As an interim solution to help people in Iran get connected again, we’ve added support in Signal for a simple TLS proxy that is easy to set up, can be used to bypass the network block, and will securely route traffic to the Signal service.
This new connection method is supported in the latest Signal Android beta release, and will be rolling out to production users in a few days. Our hope is that this will help many people in Iran start sending and receiving messages again while we continue to explore additional censorship circumvention techniques that will work there.
💡Act as a proxy
✳️ If you want to help by running a proxy, to get started you only need the following:
- A server with ports 80 and 443 available.
- A domain name (or subdomain) that points to the server’s IP address.
The proxy is extremely lightweight. An inexpensive and tiny VPS can easily handle hundreds of concurrent users. Here’s how to make it work:
https://signal.org/blog/help-iran-reconnect/
#signal #help #iran #pleaseshare #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Signal
Help users in Iran reconnect to Signal
Just over a week ago, we announced that Iranian censors had started blocking all Signal traffic in the country. As an interim solution to help people in Iran get connected again, we’ve added support in Signal for a simple TLS proxy that is easy to set up…
Over a Dozen Chrome Extensions Caught Hijacking Google Search Results for Millions.
New details have emerged about a vast network of rogue extensions for Chrome and Edge browsers that were found to hijack clicks to links in search results pages to arbitrary URLs, including phishing sites and ads.
Collectively called "CacheFlow" by Avast, the 28 extensions in question — including Video Downloader for Facebook, Vimeo Video Downloader, Instagram Story Downloader, VK Unblock — made use of a sneaky trick to mask its true purpose: Leverage Cache-Control HTTP header as a covert channel to retrieve commands from an attacker-controlled server.
All the backdoored browser add-ons have been taken down by Google and Microsoft as of December 18, 2020, to prevent more users from downloading them from the official stores.
https://thehackernews.com/2021/02/over-dozen-chrome-extensions-caught.html
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
New details have emerged about a vast network of rogue extensions for Chrome and Edge browsers that were found to hijack clicks to links in search results pages to arbitrary URLs, including phishing sites and ads.
Collectively called "CacheFlow" by Avast, the 28 extensions in question — including Video Downloader for Facebook, Vimeo Video Downloader, Instagram Story Downloader, VK Unblock — made use of a sneaky trick to mask its true purpose: Leverage Cache-Control HTTP header as a covert channel to retrieve commands from an attacker-controlled server.
All the backdoored browser add-ons have been taken down by Google and Microsoft as of December 18, 2020, to prevent more users from downloading them from the official stores.
https://thehackernews.com/2021/02/over-dozen-chrome-extensions-caught.html
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
You should delete your WhatsApp ASAP
WhatsApp has always been a privacy nightmare. Use Signal and Matrix if you care about your privacy and security!
https://www.youtube.com/watch?v=shpiVm1qpnw
#DeleteWhatsApp #privacy #security #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
WhatsApp has always been a privacy nightmare. Use Signal and Matrix if you care about your privacy and security!
https://www.youtube.com/watch?v=shpiVm1qpnw
#DeleteWhatsApp #privacy #security #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Most proprietary toasters are malware
Help me understand this (really).
Why should software be expected to have source code available? Don't get me wrong - I love SQLite and OpenSSL, but it has nothing to do with having access to the source code.
My toaster did not come with specs and design documents so I can change it. Neither did my power drill or car.
The music I listen do doesn't have synthesizer settings available and raw source before mixing. Movies I watch don't come with scripts, budgets, contacts, location licenses, etc.
What is it specifically about software that makes people think the source must be available? Where does this expectation come from?
https://news.ycombinator.com/item?id=26030126
#opensource #software #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Help me understand this (really).
Why should software be expected to have source code available? Don't get me wrong - I love SQLite and OpenSSL, but it has nothing to do with having access to the source code.
My toaster did not come with specs and design documents so I can change it. Neither did my power drill or car.
The music I listen do doesn't have synthesizer settings available and raw source before mixing. Movies I watch don't come with scripts, budgets, contacts, location licenses, etc.
What is it specifically about software that makes people think the source must be available? Where does this expectation come from?
https://news.ycombinator.com/item?id=26030126
#opensource #software #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Project Gemini
Gemini is a new, collaboratively designed internet protocol, which explores the space inbetween gopher and the web, striving to address (perceived) limitations of one while avoiding the (undeniable) pitfalls of the other.
This server hosts the official specification and other documentation for Gemini, as well as offering free personal Geminispace (managed via sftp) for those wanting to play with the protocol. The vast majority of this content is served via Gemini itself, so you'll need a suitable client to access it.
A small amount of the server's content is also available via HTTPS below, or via gopher.
https://gemini.circumlunar.space/
#gemini #internet #protocol #gopher
Gemini is a new, collaboratively designed internet protocol, which explores the space inbetween gopher and the web, striving to address (perceived) limitations of one while avoiding the (undeniable) pitfalls of the other.
This server hosts the official specification and other documentation for Gemini, as well as offering free personal Geminispace (managed via sftp) for those wanting to play with the protocol. The vast majority of this content is served via Gemini itself, so you'll need a suitable client to access it.
A small amount of the server's content is also available via HTTPS below, or via gopher.
https://gemini.circumlunar.space/
#gemini #internet #protocol #gopher
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Spot the Surveillance - How to Identify Police Surveillance at Protests and Large Gatherings
The Electronic Frontier Foundation’s Kurt Opsahl will show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.
https://media.ccc.de/v/rc3-11406-spot_the_surveillance
⚠️ This Talk was translated into multiple languages (DE / EN). The files available for download contain all languages as separate audio-tracks.
#rc3 #ccc #police #surveillance #spying #protests #demos #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Electronic Frontier Foundation’s Kurt Opsahl will show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.
https://media.ccc.de/v/rc3-11406-spot_the_surveillance
⚠️ This Talk was translated into multiple languages (DE / EN). The files available for download contain all languages as separate audio-tracks.
#rc3 #ccc #police #surveillance #spying #protests #demos #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Signal's TLS Proxy Failed to be Probing Resistant
Signal Post: https://signal.org/blog/help-iran-reconnect/
Their Repository: https://github.com/signalapp/Signal-TLS-Proxy
Our Original Issue: https://github.com/signalapp/Signal-TLS-Proxy/issues/3
⚠️ this can be very emotional, but truth works like that
So I've studied this with @studentmain and found it problematic about 4 hours ago.
We immediately reported this through a GitHub Issue, with PoC and advice attached, without even sleeping (it's about 4:00 am in local time)
But @moxie-signal (@moxie0) from @signalapp just closed our issue, saying this:
https://github.com/net4people/bbs/issues/60
https://community.signalusers.org/t/tls-proxy-server-unable-to-survive-active-probing-from-internet-surveillance-systems/27282
#signal #issue #proxy #thinkabout #NotNiceSignal
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Signal Post: https://signal.org/blog/help-iran-reconnect/
Their Repository: https://github.com/signalapp/Signal-TLS-Proxy
Our Original Issue: https://github.com/signalapp/Signal-TLS-Proxy/issues/3
⚠️ this can be very emotional, but truth works like that
So I've studied this with @studentmain and found it problematic about 4 hours ago.
We immediately reported this through a GitHub Issue, with PoC and advice attached, without even sleeping (it's about 4:00 am in local time)
But @moxie-signal (@moxie0) from @signalapp just closed our issue, saying this:
https://github.com/net4people/bbs/issues/60
https://community.signalusers.org/t/tls-proxy-server-unable-to-survive-active-probing-from-internet-surveillance-systems/27282
#signal #issue #proxy #thinkabout #NotNiceSignal
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Signal
Help users in Iran reconnect to Signal
Just over a week ago, we announced that Iranian censors had started blocking all Signal traffic in the country. As an interim solution to help people in Iran get connected again, we’ve added support in Signal for a simple TLS proxy that is easy to set up…
Forwarded from StormCloudsGathering
Telegram makes them nervous. Notice that they specifically point out that restrictions in place in Signal are similar to Whatsapp and therefore prevent the spread of ideas they don't like.
https://www.nytimes.com/2021/02/03/technology/personaltech/telegram-signal-misinformation.html?smtyp=cur&smid=tw-nytimes
https://www.nytimes.com/2021/02/03/technology/personaltech/telegram-signal-misinformation.html?smtyp=cur&smid=tw-nytimes
NY Times
Are Private Messaging Apps the Next Misinformation Hot Spot?
Telegram and Signal, the encrypted services that keep conversations confidential, are increasingly popular. Our tech columnists discuss whether this could get ugly.
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
A Wikileaks Road Movie | Full Documentary
A Wikileaks Road Movie: Due to the extraordinary circumstances surrounding the arrests of Julian Assange and Chelsea Manning, Sixteen Films and Journeyman Pictures are providing a time-limited free access to the Wikileaks road movie Mediastan. Mediastan is a documentary film directed by Johannes Wahlström and co-produced by Julian Assange, detailing the publication of the very documents for which both Assange and Manning have been incarcerated.
https://www.youtube.com/watch?v=9n0Yu7bYF9E
#wikileaks #roadmovie #mediastan #docu #documentary #assange #manning #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A Wikileaks Road Movie: Due to the extraordinary circumstances surrounding the arrests of Julian Assange and Chelsea Manning, Sixteen Films and Journeyman Pictures are providing a time-limited free access to the Wikileaks road movie Mediastan. Mediastan is a documentary film directed by Johannes Wahlström and co-produced by Julian Assange, detailing the publication of the very documents for which both Assange and Manning have been incarcerated.
https://www.youtube.com/watch?v=9n0Yu7bYF9E
#wikileaks #roadmovie #mediastan #docu #documentary #assange #manning #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from We Are Change
🚨🚨 Nevada Governor Wants to Allow Tech Companies to Create Their Own Governments
What could possibly go wrong? 🙄
https://wearechange.org/nevada-governor-wants-to-allow-tech-companies-to-create-their-own-governments/
What could possibly go wrong? 🙄
https://wearechange.org/nevada-governor-wants-to-allow-tech-companies-to-create-their-own-governments/
We Are Change
Nevada Governor Wants to Allow Tech Companies to Create Their Own Governments
Nevada isn't just trying to lure in the big fish. It's trying to convince people to come there and build.
Forwarded from BlackBox (Security) Archiv
pentest-report_mullvad_2021_v1.pdf
242.2 KB
Pentest-Report Mullvad VPN & Servers 11.-12.2020
“Mullvad VPN AB is owned by parent company Amagicom AB. The name Amagicom isderived from the Sumerian word ama-gi – the oldest word for “freedom“ or, literally,“back to mother” in the context of slavery – and the abbreviation for communication.Amagicom stands for “free communication”.”
This document is dedicated to a presentation of a security-centered project carried outby Cure53 for Mullvad. More specifically, the report describes the results of a thoroughand comprehensive penetration test and source code audit against the Mullvad VPNservers, infrastructure and related web applications and other exposed services. Theproject was completed in late 2020
https://cure53.de/pentest-report_mullvad_2021_v1.pdf
#pentest #mullvad #vpn #report #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
“Mullvad VPN AB is owned by parent company Amagicom AB. The name Amagicom isderived from the Sumerian word ama-gi – the oldest word for “freedom“ or, literally,“back to mother” in the context of slavery – and the abbreviation for communication.Amagicom stands for “free communication”.”
This document is dedicated to a presentation of a security-centered project carried outby Cure53 for Mullvad. More specifically, the report describes the results of a thoroughand comprehensive penetration test and source code audit against the Mullvad VPNservers, infrastructure and related web applications and other exposed services. Theproject was completed in late 2020
https://cure53.de/pentest-report_mullvad_2021_v1.pdf
#pentest #mullvad #vpn #report #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag