Forwarded from cRyPtHoN™ INFOSEC (EN)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from BlackBox (Security) Archiv
‘Windows is sh*t:’ Linux Users and The Technical Superiority Problem
“Windows is shit.” “That’s garbage, don’t use it.” “I don’t understand why anyone uses that crap.” ~Toxic nerds on the internet, since forever.
https://medium.com/linuxforeveryone/windows-is-sh-t-linux-users-and-the-technical-superiority-problem-196a597aa860
#linux #windows #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
“Windows is shit.” “That’s garbage, don’t use it.” “I don’t understand why anyone uses that crap.” ~Toxic nerds on the internet, since forever.
https://medium.com/linuxforeveryone/windows-is-sh-t-linux-users-and-the-technical-superiority-problem-196a597aa860
#linux #windows #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>_GJ06)
Your email and password were probably posted online in the mother of all data leaks – BGR – https://bgr.com/2021/02/09/data-breach-tool-check-if-your-email-credentials-compromised-cybernews/
BGR
Your email and password were probably posted online in the mother of all data leaks
Hackers recently posted more than 3 billion user credentials online as part of a massive data breach compilation of emails and passwords. Read on for a way to check and see if your email and password combination was part of this published trove. If they were…
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>_GJ06)
Personal Data Leak Checker: Your Email & Data - Breached? | CyberNews – https://cybernews.com/personal-data-leak-check/
Cybernews
Personal Data Leak Checker: Your Email & Data - Breached? | CyberNews
Check whether your online credentials have been comprised with our up to date personal data leak checker tool.
Forwarded from voxit
Why do not share https://haveibeenpwned.com/ and https://haveibeenpwned.com/Passwords instead? It provides really more infos and have this so useful notification service ;)
Forwarded from Libreware
disable-trackers-from-recovery.pl
23.2 KB
Modified perl script of @ robertoprubio to use the local file
where <pathname> refers to pathname of the local exodus file that you've downloaded from https://etip.exodus-privacy.eu.org/trackers/export
#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
perl disable-trackers-from-recovery.pl --exodus-trackers-pathname <pathname> where <pathname> refers to pathname of the local exodus file that you've downloaded from https://etip.exodus-privacy.eu.org/trackers/export
#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
Forwarded from BlackBox (Security) Archiv
Why you should stop reading Durov's blog posts
This article debunks Durov's irrational blog post used as a weapon in online debates. The quoted parts are from the original article:
https://telegra.ph/Why-you-should-stop-reading-Durovs-blog-posts-11-25
#telegram #durov #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
This article debunks Durov's irrational blog post used as a weapon in online debates. The quoted parts are from the original article:
https://telegra.ph/Why-you-should-stop-reading-Durovs-blog-posts-11-25
#telegram #durov #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Telegraph
Why you should stop reading Durov's blog posts
This article debunks Durov's irrational blog post used as a weapon in online debates. The quoted parts are from the original article:
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>_GJ06)
Un projet fait par des étudiants espagnol pour récupéré vos données personnelles. .
Tutanota@mastodon.social - A great #OpenSource project by Spanish students helps you to easily check how to take back your data from #BigTech such as #Google, #Twitter, #Facebook and more.
😎 💪 Check it out: https://justgetmydata.com
#gafam #rpgd #DonnéesPersonnel
#GetYourDataBack
#MyData
Tutanota@mastodon.social - A great #OpenSource project by Spanish students helps you to easily check how to take back your data from #BigTech such as #Google, #Twitter, #Facebook and more.
😎 💪 Check it out: https://justgetmydata.com
#gafam #rpgd #DonnéesPersonnel
#GetYourDataBack
#MyData
Forwarded from Rahul Patel
AuroraStore_v4_BETA_01.apk
5 MB
Forwarded from BlackBox (Security) Archiv
Jam
Jam is an Open Source alternative to Clubhouse, Twitter Spaces and similar audio spaces.
With Jam you can create Jams which are audio rooms that can be used for panel discussions, jam sessions, free flowing conversations, debates, theatre plays, musicals and more. The only limit is your imagination.
https://gitlab.com/jam-systems/jam
https://jam.systems/
#jam #alternatives #alternative #clubhouse #twitter #audio #spaces #opensource
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Jam is an Open Source alternative to Clubhouse, Twitter Spaces and similar audio spaces.
With Jam you can create Jams which are audio rooms that can be used for panel discussions, jam sessions, free flowing conversations, debates, theatre plays, musicals and more. The only limit is your imagination.
https://gitlab.com/jam-systems/jam
https://jam.systems/
#jam #alternatives #alternative #clubhouse #twitter #audio #spaces #opensource
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
GitLab
Jam Systems / Jam · GitLab
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>_GJ06)
This Site Published Every Face From Parler's Capitol Riot Videos | WIRED – https://www.wired.com/story/faces-of-the-riot-capitol-insurrection-facial-recognition/
#ReconnaissanceFaciale #facialreco #Technopolice
#ReconnaissanceFaciale #facialreco #Technopolice
Wired
A Site Published Every Face From Parler's Capitol Riot Videos
Faces of the Riot used open source software to detect, extract, and deduplicate every face from the 827 videos taken from the insurrection on January 6.
Forwarded from Austin-sama 🤙🏽 #CatGang
Aurora Droid users again facing app crashes when searching any app.
This is happening due to some null values of apps present in the Main F-Droid Repo & Guardian Repo.
📍For the meantime a temporary fix is to disable the main F-Droid repo & Guardian repo from app.
The Aurora Dev is currently Busy in Development of Aurora Store. When he completes that he will surely Provides remained fixes/Improvements to Aurora Droid app.
Thanks
https://gitlab.com/AuroraOSS
This is happening due to some null values of apps present in the Main F-Droid Repo & Guardian Repo.
📍For the meantime a temporary fix is to disable the main F-Droid repo & Guardian repo from app.
The Aurora Dev is currently Busy in Development of Aurora Store. When he completes that he will surely Provides remained fixes/Improvements to Aurora Droid app.
Thanks
If you know coding & would like to help, please do so by contributing on the AuroraOSS Gitlab repo: https://gitlab.com/AuroraOSS
Forwarded from BlackBox (Security) Archiv
How they harvest our data
TL;DR: everything is very bad. Prognosis is not comforting; if we do nothing all the distopias we read in fiction novels will look like a happy holiday at granny's.
It's hard to be in IT, cause your friends have no idea what you do. Engineer, product manager, QA — how does it all differ from fixing a printer in the office? (tip: you don't get $150k/year for fixing printers).
You also can't really talk to normal people about IT, because they use this industry, but they don't get it. But there's a topic you can raise with any mortal, that will get their attention: data privacy.
How do they gather data about us? Will VPN and incognito mode save us? Maybe we should all just pack our stuff and go into the woods and make friends with wolves and bears?
https://dkzlv.com/en/how-they-harvest-data/
#data #bigdata #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
TL;DR: everything is very bad. Prognosis is not comforting; if we do nothing all the distopias we read in fiction novels will look like a happy holiday at granny's.
It's hard to be in IT, cause your friends have no idea what you do. Engineer, product manager, QA — how does it all differ from fixing a printer in the office? (tip: you don't get $150k/year for fixing printers).
You also can't really talk to normal people about IT, because they use this industry, but they don't get it. But there's a topic you can raise with any mortal, that will get their attention: data privacy.
How do they gather data about us? Will VPN and incognito mode save us? Maybe we should all just pack our stuff and go into the woods and make friends with wolves and bears?
https://dkzlv.com/en/how-they-harvest-data/
#data #bigdata #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
pgpp-arxiv20.pdf
7.1 MB
Pretty Good Phone Privacy
To receive service in today’s cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
To receive service in today’s cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from Confidential and Proprietary (join from @exconfidential)
Business Insider
Activists call on Google to crack down on Myanmar coup leaders using services like Blogger and Gmail
Activists say Google should stop the leaders of a military coup in Myanmar from using Blogger for propaganda and Gmail for firms on US sanctions list.