Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
A Wikileaks Road Movie | Full Documentary
A Wikileaks Road Movie: Due to the extraordinary circumstances surrounding the arrests of Julian Assange and Chelsea Manning, Sixteen Films and Journeyman Pictures are providing a time-limited free access to the Wikileaks road movie Mediastan. Mediastan is a documentary film directed by Johannes Wahlström and co-produced by Julian Assange, detailing the publication of the very documents for which both Assange and Manning have been incarcerated.
https://www.youtube.com/watch?v=9n0Yu7bYF9E
#wikileaks #roadmovie #mediastan #docu #documentary #assange #manning #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A Wikileaks Road Movie: Due to the extraordinary circumstances surrounding the arrests of Julian Assange and Chelsea Manning, Sixteen Films and Journeyman Pictures are providing a time-limited free access to the Wikileaks road movie Mediastan. Mediastan is a documentary film directed by Johannes Wahlström and co-produced by Julian Assange, detailing the publication of the very documents for which both Assange and Manning have been incarcerated.
https://www.youtube.com/watch?v=9n0Yu7bYF9E
#wikileaks #roadmovie #mediastan #docu #documentary #assange #manning #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from We Are Change
🚨🚨 Nevada Governor Wants to Allow Tech Companies to Create Their Own Governments
What could possibly go wrong? 🙄
https://wearechange.org/nevada-governor-wants-to-allow-tech-companies-to-create-their-own-governments/
What could possibly go wrong? 🙄
https://wearechange.org/nevada-governor-wants-to-allow-tech-companies-to-create-their-own-governments/
We Are Change
Nevada Governor Wants to Allow Tech Companies to Create Their Own Governments
Nevada isn't just trying to lure in the big fish. It's trying to convince people to come there and build.
Forwarded from BlackBox (Security) Archiv
pentest-report_mullvad_2021_v1.pdf
242.2 KB
Pentest-Report Mullvad VPN & Servers 11.-12.2020
“Mullvad VPN AB is owned by parent company Amagicom AB. The name Amagicom isderived from the Sumerian word ama-gi – the oldest word for “freedom“ or, literally,“back to mother” in the context of slavery – and the abbreviation for communication.Amagicom stands for “free communication”.”
This document is dedicated to a presentation of a security-centered project carried outby Cure53 for Mullvad. More specifically, the report describes the results of a thoroughand comprehensive penetration test and source code audit against the Mullvad VPNservers, infrastructure and related web applications and other exposed services. Theproject was completed in late 2020
https://cure53.de/pentest-report_mullvad_2021_v1.pdf
#pentest #mullvad #vpn #report #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
“Mullvad VPN AB is owned by parent company Amagicom AB. The name Amagicom isderived from the Sumerian word ama-gi – the oldest word for “freedom“ or, literally,“back to mother” in the context of slavery – and the abbreviation for communication.Amagicom stands for “free communication”.”
This document is dedicated to a presentation of a security-centered project carried outby Cure53 for Mullvad. More specifically, the report describes the results of a thoroughand comprehensive penetration test and source code audit against the Mullvad VPNservers, infrastructure and related web applications and other exposed services. Theproject was completed in late 2020
https://cure53.de/pentest-report_mullvad_2021_v1.pdf
#pentest #mullvad #vpn #report #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Myanmar: New internet blackout “heinous and reckless”
Responding to credible reports of a widespread mobile internet blackout underway in Myanmar, Amnesty International’s Deputy Regional Director for Campaigns, Ming Yu Hah, said:
“To shut down the internet amid a volatile coup, a humanitarian crisis and a health pandemic is a heinous and reckless decision.
“Since the 1 February coup, people in Myanmar have been forced into a situation of abject uncertainty. An expanded internet shutdown will put them at greater risk of more egregious human rights violations at the hands of the military.
“The military must re-establish all telecommunications immediately and stop putting people’s rights in danger. All mobile operators and telecommunications providers in Myanmar must seek urgent clarification from the Myanmar authorities.”
On 6 February, the Myanmar military reportedly ordered telecommunications companies in the country to fully shut down internet and 4G services. According to information received by Amnesty International, the effective blackout will be in operation until Monday 8 February.
An earlier order, on 5 February, instructed telecommunications companies to block access to Twitter and Instagram.
On 4 February, the military had already announced that they were ordering telecoms operators to block access to Facebook until 7 February.
As the 1 February military coup was underway, internet and phone outages were reported in several parts of the country, including in the capital, Nay Pyi Taw, the largest city, Yangon, as well as Shan and Kachin States and the Mandalay and Sagaing regions. Access was later reestablished.
There have also been mobile internet restrictions in conflict-affected areas of Rakhine and Chin States in the country for more than a year. 4G internet access in those areas was reportedly restored late in the evening on 2 February 2021.
Such restrictions pose a real danger to at-risk civilian populations, especially when access to information is so vital during the COVID-19 pandemic – and even more so when the situation on the ground is so tense amid the coup, and in conflict-affected areas.
https://www.amnesty.org/en/latest/news/2021/02/myanmar-new-internet-blackout/
#myanmar #internet #blackout #AmnestyInternational #thinkabout #why #HelpMyanmar
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Responding to credible reports of a widespread mobile internet blackout underway in Myanmar, Amnesty International’s Deputy Regional Director for Campaigns, Ming Yu Hah, said:
“To shut down the internet amid a volatile coup, a humanitarian crisis and a health pandemic is a heinous and reckless decision.
“Since the 1 February coup, people in Myanmar have been forced into a situation of abject uncertainty. An expanded internet shutdown will put them at greater risk of more egregious human rights violations at the hands of the military.
“The military must re-establish all telecommunications immediately and stop putting people’s rights in danger. All mobile operators and telecommunications providers in Myanmar must seek urgent clarification from the Myanmar authorities.”
On 6 February, the Myanmar military reportedly ordered telecommunications companies in the country to fully shut down internet and 4G services. According to information received by Amnesty International, the effective blackout will be in operation until Monday 8 February.
An earlier order, on 5 February, instructed telecommunications companies to block access to Twitter and Instagram.
On 4 February, the military had already announced that they were ordering telecoms operators to block access to Facebook until 7 February.
As the 1 February military coup was underway, internet and phone outages were reported in several parts of the country, including in the capital, Nay Pyi Taw, the largest city, Yangon, as well as Shan and Kachin States and the Mandalay and Sagaing regions. Access was later reestablished.
There have also been mobile internet restrictions in conflict-affected areas of Rakhine and Chin States in the country for more than a year. 4G internet access in those areas was reportedly restored late in the evening on 2 February 2021.
Such restrictions pose a real danger to at-risk civilian populations, especially when access to information is so vital during the COVID-19 pandemic – and even more so when the situation on the ground is so tense amid the coup, and in conflict-affected areas.
https://www.amnesty.org/en/latest/news/2021/02/myanmar-new-internet-blackout/
#myanmar #internet #blackout #AmnestyInternational #thinkabout #why #HelpMyanmar
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Amnesty International
"Heinous and reckless" internet blackout underway in Myanmar
To shut down the internet amid a volatile coup, a humanitarian crisis and a health pandemic is a heinous and reckless decision.
Forwarded from BlackBox (Security) Archiv
The End of the Privacy of Digital Correspondence
The EU wants to have all private chats, messages, and emails automatically searched for suspicious content, generally and indiscriminately. The stated aim: To prosecute child pornography. The result: Mass surveillance through fully automated real-time messaging and chat control and the end of secrecy of digital correspondence.
In 2020 the European Commission proposed “temporary” legislation aimed at allowing the search of all private chats, messages, and emails for illegal depictions of minors and attempted initiation of contacts with minors. This is to allow the providers of Facebook Messenger, Gmail, et al, to scan every message for suspicious text and images. This takes place in a fully automated process and using error-prone “artificial intelligence”. If an algorithm considers a message suspicious, its content and meta-data are disclosed automatically and without human verification to a private US-based organization and from there to national police authorities worldwide. The reported users are not notified.
Some U.S. providers of services such as Gmail and Outlook.com are already performing such automated messaging and chat controls. Through a second piece of legislation, the EU Commission intends to oblige all providers of chat, messaging and e-mail services to deploy this mass surveillance technology.
https://www.patrick-breyer.de/?page_id=594160&lang=en
#eu #privacy #masssurveillance #surveillance #messaging #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The EU wants to have all private chats, messages, and emails automatically searched for suspicious content, generally and indiscriminately. The stated aim: To prosecute child pornography. The result: Mass surveillance through fully automated real-time messaging and chat control and the end of secrecy of digital correspondence.
In 2020 the European Commission proposed “temporary” legislation aimed at allowing the search of all private chats, messages, and emails for illegal depictions of minors and attempted initiation of contacts with minors. This is to allow the providers of Facebook Messenger, Gmail, et al, to scan every message for suspicious text and images. This takes place in a fully automated process and using error-prone “artificial intelligence”. If an algorithm considers a message suspicious, its content and meta-data are disclosed automatically and without human verification to a private US-based organization and from there to national police authorities worldwide. The reported users are not notified.
Some U.S. providers of services such as Gmail and Outlook.com are already performing such automated messaging and chat controls. Through a second piece of legislation, the EU Commission intends to oblige all providers of chat, messaging and e-mail services to deploy this mass surveillance technology.
https://www.patrick-breyer.de/?page_id=594160&lang=en
#eu #privacy #masssurveillance #surveillance #messaging #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Supercookie: Browser Fingerprinting via Favicon
Supercookie uses favicons to assign a unique identifier to website visitors.
Unlike traditional tracking methods, this ID can be stored almost persistently and cannot be easily cleared by the user.
The tracking method works even in the browser's incognito mode and is not cleared by flushing the cache, closing the browser or restarting the system, using a VPN or installing AdBlockers.
https://github.com/jonasstrehle/supercookie
#supercookie #browser #tracking
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Supercookie uses favicons to assign a unique identifier to website visitors.
Unlike traditional tracking methods, this ID can be stored almost persistently and cannot be easily cleared by the user.
The tracking method works even in the browser's incognito mode and is not cleared by flushing the cache, closing the browser or restarting the system, using a VPN or installing AdBlockers.
https://github.com/jonasstrehle/supercookie
#supercookie #browser #tracking
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
More CopperheadOS harassment proof
Wow, I'm late to this, but having a lawyer send a letter to a student's university to try to get them in trouble for open source contributions they made on their own time is very not ok.
https://nitter.nixnet.services/FiloSottile/status/1358231799458103297
#copperheadOS #harassment #proof #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Wow, I'm late to this, but having a lawyer send a letter to a student's university to try to get them in trouble for open source contributions they made on their own time is very not ok.
https://nitter.nixnet.services/FiloSottile/status/1358231799458103297
#copperheadOS #harassment #proof #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Nitter
Filippo Valsorda 💚🤍❤️ ✊ (@FiloSottile)
Wow, I'm late to this, but having a lawyer send a letter to a student's university to try to get them in trouble for open source contributions they made on their own time is very not ok.
NewPipe x SponsorBlock
A fork of NewPipe with SponsorBlock functionality.
The implementation is still a bit basic but it generally works pretty well.
💡 How can I get this?
Builds will be uploaded in the Releases section. Please download the APK from the newest release and install it on your device.
💡 Why isn't this in upstream NewPipe?
The developer team behind the official NewPipe decided that they do not want to include this kind of functionality in their app. See https://newpipe.schabi.org/blog/pinned/newpipe-and-online-advertising/ and https://github.com/TeamNewPipe/NewPipe/pull/3205 for more information and discussion.
We obviously disagree but we respect their decision and continue to offer SponsorBlock in NewPipe via this fork.
https://github.com/polymorphicshade/NewPipe#newpipe-x-sponsorblock
#newpipe #sponsorblock
A fork of NewPipe with SponsorBlock functionality.
The implementation is still a bit basic but it generally works pretty well.
💡 How can I get this?
Builds will be uploaded in the Releases section. Please download the APK from the newest release and install it on your device.
💡 Why isn't this in upstream NewPipe?
The developer team behind the official NewPipe decided that they do not want to include this kind of functionality in their app. See https://newpipe.schabi.org/blog/pinned/newpipe-and-online-advertising/ and https://github.com/TeamNewPipe/NewPipe/pull/3205 for more information and discussion.
We obviously disagree but we respect their decision and continue to offer SponsorBlock in NewPipe via this fork.
https://github.com/polymorphicshade/NewPipe#newpipe-x-sponsorblock
#newpipe #sponsorblock
NewPipe
NewPipe's position on advertising
The NewPipe project recently had a few debates on advertising, its ethics and how Team NewPipe decides whether or not a certain form of advertising is acceptable. In this article, we present our position on advertising in general, show the difference between…
Forwarded from BlackBox (Security) Archiv
VoltPillager: Researchers Compromise Intel SGX With Hardware-Based Undervolting Attack
Security researchers out of the University of Birmingham have crafted another attack against Intel Software Guard Extensions (SGX) when having physical motherboard access and using their "VoltPillager" hardware device they assembled for about $30 USD.
Two years ago Plundervolt was widely publicized for compromising Intel's SGX security by manipulating the CPU frequency/voltage as able to through software interfaces. By carefully undervolting the Intel CPUs when executing enclave computations they were able to ultimately compromise the integrity of SGX.
The impact of Plundervolt was already limited as typically the software needs root/administrative rights to access the CPU voltage/frequency MSRs or other kernel interfaces for manipulating them. But in response to Plundervolt, motherboard vendors began offering options to allow disabling voltage/frequency interface controls on their systems. Following Plundervolt, security researchers at the University of Birmingham in the UK began exploring a hardware-based attack on SGX.
https://www.phoronix.com/scan.php?page=news_item&px=VoltPillager-HW-Undervolt
#research #VoltPillager #undervolting #attack #intel #sgx
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Security researchers out of the University of Birmingham have crafted another attack against Intel Software Guard Extensions (SGX) when having physical motherboard access and using their "VoltPillager" hardware device they assembled for about $30 USD.
Two years ago Plundervolt was widely publicized for compromising Intel's SGX security by manipulating the CPU frequency/voltage as able to through software interfaces. By carefully undervolting the Intel CPUs when executing enclave computations they were able to ultimately compromise the integrity of SGX.
The impact of Plundervolt was already limited as typically the software needs root/administrative rights to access the CPU voltage/frequency MSRs or other kernel interfaces for manipulating them. But in response to Plundervolt, motherboard vendors began offering options to allow disabling voltage/frequency interface controls on their systems. Following Plundervolt, security researchers at the University of Birmingham in the UK began exploring a hardware-based attack on SGX.
https://www.phoronix.com/scan.php?page=news_item&px=VoltPillager-HW-Undervolt
#research #VoltPillager #undervolting #attack #intel #sgx
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Phoronix
VoltPillager: Researchers Compromise Intel SGX With Hardware-Based Undervolting Attack
Security researchers out of the University of Birmingham have crafted another attack against Intel Software Guard Extensions (SGX) when having physical motherboard access and using their 'VoltPillager' hardware device they assembled for about $30 USD.
Forwarded from BlackBox (Security) Archiv
If you are still releasing custom ROMs/kernels with permissive, YOU ARE LITERALLY BACKDOORING YOUR USERS!
Remember when I said using SELinux permissive is really bad? Here is a privilege escalation PoC where the only requirement is SELinux permissive. If you are still releasing custom ROMs/kernels with permissive, YOU ARE LITERALLY BACKDOORING YOUR USERS!
https://nitter.nixnet.services/topjohnwu/status/1359054106019565571
https://github.com/vvb2060/Magica
#selinux #backdooring #customrom #topjohnwu #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Remember when I said using SELinux permissive is really bad? Here is a privilege escalation PoC where the only requirement is SELinux permissive. If you are still releasing custom ROMs/kernels with permissive, YOU ARE LITERALLY BACKDOORING YOUR USERS!
https://nitter.nixnet.services/topjohnwu/status/1359054106019565571
https://github.com/vvb2060/Magica
#selinux #backdooring #customrom #topjohnwu #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from We Are Change
🚨🚨 Facebook Hires NATO Press Officer Ben Nimmo as Intelligence Chief
It is difficult to distinguish where the deep state ends and the fourth estate begins.
https://wearechange.org/facebook-hires-nato-press-officer-ben-nimmo-as-intelligence-chief/
It is difficult to distinguish where the deep state ends and the fourth estate begins.
https://wearechange.org/facebook-hires-nato-press-officer-ben-nimmo-as-intelligence-chief/
Security things in Linux v5.8
https://outflux.net/blog/archives/2021/02/08/security-things-in-linux-v5-8/
#linux #security #kernel
https://outflux.net/blog/archives/2021/02/08/security-things-in-linux-v5-8/
#linux #security #kernel
RADV+ACO Look To Your Help For Improving The Vulkan Driver & Linux Gaming Performance
RADV is a Vulkan driver for AMD GPUs that is part of the Mesa project and installed on most Linux distros out of the box. Our goal is to deliver a stable and performant driver to Linux gamers, and recently we've made our own shader compiler called ACO. To create the best possible experience, we'd like to take it a step further and ask our users for some testing and feedback.
https://www.phoronix.com/scan.php?page=article&item=radv-aco-cft
#vulkan #linux #gaming
RADV is a Vulkan driver for AMD GPUs that is part of the Mesa project and installed on most Linux distros out of the box. Our goal is to deliver a stable and performant driver to Linux gamers, and recently we've made our own shader compiler called ACO. To create the best possible experience, we'd like to take it a step further and ask our users for some testing and feedback.
https://www.phoronix.com/scan.php?page=article&item=radv-aco-cft
#vulkan #linux #gaming
Phoronix
RADV+ACO Look To Your Help For Improving The Vulkan Driver & Linux Gaming Performance - Phoronix
Phoronix is the leading technology website for Linux hardware reviews, open-source news, Linux benchmarks, open-source benchmarks, and computer hardware tests.
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Fedora on the PinePhone: Pipewire Calling!
https://odysee.com/@linmob:3/fedora-on-the-pinephone-pipewire-calling:1
#linux #fedora #pinephone #pipwire #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
https://odysee.com/@linmob:3/fedora-on-the-pinephone-pipewire-calling:1
#linux #fedora #pinephone #pipwire #video
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Stash - an organizer for your porn
What is Stash?
Stash allows you to organize and view your own collection of adult video and image files. Think of it like a private PornHub site for your personal porn collection.
View your content
Preview and view all of your scenes and galleries from your web browser on your PC, tablet or phone. Stash directly streams videos to your web browser. Stash supports streaming of a large variety of formats and codecs to most web browsers.
Curate your content
Rate your scenes, and tag them with performers, tags, movies and studios. Filter and sort your content with a variety of filter and sorting options.
Stash also allows you to derive scene metadata from video filenames. Alternatively, you can scrape scene metadata from websites using community-curated scrapers.
https://stashapp.cc/
https://github.com/stashapp/stash/releases
#stash #porn #organizer
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
What is Stash?
Stash allows you to organize and view your own collection of adult video and image files. Think of it like a private PornHub site for your personal porn collection.
View your content
Preview and view all of your scenes and galleries from your web browser on your PC, tablet or phone. Stash directly streams videos to your web browser. Stash supports streaming of a large variety of formats and codecs to most web browsers.
Curate your content
Rate your scenes, and tag them with performers, tags, movies and studios. Filter and sort your content with a variety of filter and sorting options.
Stash also allows you to derive scene metadata from video filenames. Alternatively, you can scrape scene metadata from websites using community-curated scrapers.
https://stashapp.cc/
https://github.com/stashapp/stash/releases
#stash #porn #organizer
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
GitHub
Releases · stashapp/stash
An organizer for your porn, written in Go. Documentation: https://docs.stashapp.cc - stashapp/stash
Google wants to connect everything you own to the internet
Surveilling older adults, connected helmets, wearables talking to doctors and other patents from Big Tech.
Hello and welcome back to the world of zany patents from Big Tech! While 2020 is still dragging on (I know it's 2021, but you can't tell me 2020 is over until I can go anywhere other than the grocery store), at least there are still great new patents to uncover. And there's some fascinating ones this week, including Facebook wanting to make clothes like real in games, Microsoft trying to make sports more inclusive and Google wanting to make it easier to spy on your parents. If that's something you want to do.
And remember: The big tech companies file all kinds of crazy patents for things, and though most never amount to anything, some end up defining the future.
⚠️ Alphabet - Surveilling older adults
⚠️ Making analog products digital
⚠️ Keeping your doctor in the loop
⚠️ Amazon - Autonomous avoiding
⚠️ Apple - Detecting traffic wardens
⚠️ Facebook - Simulating clothing
⚠️ Microsoft - An automatic travel diary
⚠️ Bringing sports to visually-impaired people
⚠️ Icebreakers on social media
https://www.protocol.com/google-patents-internet-everything
#google #DeleteGoogle #microsoft #amazon #DeleteAmazon #patents #bigtech #surveillance #thinkabout
Surveilling older adults, connected helmets, wearables talking to doctors and other patents from Big Tech.
Hello and welcome back to the world of zany patents from Big Tech! While 2020 is still dragging on (I know it's 2021, but you can't tell me 2020 is over until I can go anywhere other than the grocery store), at least there are still great new patents to uncover. And there's some fascinating ones this week, including Facebook wanting to make clothes like real in games, Microsoft trying to make sports more inclusive and Google wanting to make it easier to spy on your parents. If that's something you want to do.
And remember: The big tech companies file all kinds of crazy patents for things, and though most never amount to anything, some end up defining the future.
⚠️ Alphabet - Surveilling older adults
⚠️ Making analog products digital
⚠️ Keeping your doctor in the loop
⚠️ Amazon - Autonomous avoiding
⚠️ Apple - Detecting traffic wardens
⚠️ Facebook - Simulating clothing
⚠️ Microsoft - An automatic travel diary
⚠️ Bringing sports to visually-impaired people
⚠️ Icebreakers on social media
https://www.protocol.com/google-patents-internet-everything
#google #DeleteGoogle #microsoft #amazon #DeleteAmazon #patents #bigtech #surveillance #thinkabout
Protocol — The people, power and politics of tech
Google wants to connect everything you own to the internet
Surveilling older adults, connected helmets, wearables talking to doctors and other patents from Big Tech.
Criminal Indian organization known as government is hiring online propagandists to defend them
The Indian Cyber Crime Coordination Center (I4C) will coordinate all these criminals
https://www.firstpost.com/india/govt-seeks-cyber-crime-volunteers-to-report-on-anti-national-posts-project-launched-in-jammu-and-kashmir-9286071.html
#i4c #India #gov #criminals #why
The Indian Cyber Crime Coordination Center (I4C) will coordinate all these criminals
https://www.firstpost.com/india/govt-seeks-cyber-crime-volunteers-to-report-on-anti-national-posts-project-launched-in-jammu-and-kashmir-9286071.html
#i4c #India #gov #criminals #why
Firstpost
Govt seeks cyber crime volunteers to report on 'anti-national' posts; project launched in Jammu and Kashmir-India News , Firstpost
The project known as Indian Cyber Crime Coordination Centre (I4C) will also have cyber awareness promoters to help create awareness about cyber crime among citizens and cyber experts who will provide technical help in investigations