Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Patch immediately: Chrome zero-day flaw is being attacked now
Google's head of Chrome security has warned all Chrome users to update the browser immediately to patch to a zero day flaw that was being exploited now.
Google issued a warning about the attacks yesterday in an update to a post about a Chrome update released on March 1 that contained one security fix.
https://www.cso.com.au/article/658538/patch-immediately-chrome-zero-day-flaw-being-attacked-now/
Read Via Telegram
#deletechrome #deletegoogle
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Google's head of Chrome security has warned all Chrome users to update the browser immediately to patch to a zero day flaw that was being exploited now.
Google issued a warning about the attacks yesterday in an update to a post about a Chrome update released on March 1 that contained one security fix.
https://www.cso.com.au/article/658538/patch-immediately-chrome-zero-day-flaw-being-attacked-now/
Read Via Telegram
#deletechrome #deletegoogle
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
NSA quietly abandons controversial surveillance programme
For the past six months the US National Security Agency has not been collecting metadata on Americans' calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act.
For the past six months the US National Security Agency has not been collecting metadata on Americansβ calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act, a congressional aide said Saturday.
https://www.scmagazineuk.com/nsa-quietly-abandons-controversial-surveillance-programme/article/1578032
Read Via Telegram
#nsa #surveillance #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
For the past six months the US National Security Agency has not been collecting metadata on Americans' calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act.
For the past six months the US National Security Agency has not been collecting metadata on Americansβ calls and texts domestically, marking the quiet end to a controversial surveillance programme enacted by the 2001 Patriot Act, a congressional aide said Saturday.
https://www.scmagazineuk.com/nsa-quietly-abandons-controversial-surveillance-programme/article/1578032
Read Via Telegram
#nsa #surveillance #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Labs survey finds privacy concerns, distrust of social media rampant with all age groups
Before Cambridge Analytica made Facebook an unwilling accomplice to a scandal by appropriating and misusing more than 50 million usersβ data, the public was already living in relative unease over the privacy of their information online.
The Cambridge Analytica incident, along with other, seemingly day-to-day headlines about data breaches pouring private information into criminal hands, has eroded public trust in corporationsβ ability to protect data, as well as their willingness to use the data in ethically responsible ways.
https://blog.malwarebytes.com/security-world/2019/03/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups/
#FacebookDigitalGangsters #socialmedia #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Before Cambridge Analytica made Facebook an unwilling accomplice to a scandal by appropriating and misusing more than 50 million usersβ data, the public was already living in relative unease over the privacy of their information online.
The Cambridge Analytica incident, along with other, seemingly day-to-day headlines about data breaches pouring private information into criminal hands, has eroded public trust in corporationsβ ability to protect data, as well as their willingness to use the data in ethically responsible ways.
https://blog.malwarebytes.com/security-world/2019/03/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups/
#FacebookDigitalGangsters #socialmedia #privacy
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
It's not just the walls that have ears. It's also the hard drives....
From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic
Scientists at the University of Michigan and Zhejiang University in China have found a method to detect human voices through hard drives. The process uses the vibrations of the platters, which are caused by acoustic signals.
Eggheads at the University of Michigan in the US, and Zhejiang University in China, have found that hard disk drives (HDDs) can be turned into listening devices, using malicious firmware and signal processing calculations.
For a study titled "Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone," computer scientists Andrew Kwong, Wenyuan Xu, and Kevin Fu describe an acoustic side-channel that can be accessed by measuring how sound waves make hard disk parts vibrate.
"Our research demonstrates that the mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech," their paper, obtained by The Register ahead of its formal publication, stated. "These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive."
https://www.theregister.co.uk/2019/03/07/hard_drive_eavesdropping/
#surveillance #harddrive #eavesdropping
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic
Scientists at the University of Michigan and Zhejiang University in China have found a method to detect human voices through hard drives. The process uses the vibrations of the platters, which are caused by acoustic signals.
Eggheads at the University of Michigan in the US, and Zhejiang University in China, have found that hard disk drives (HDDs) can be turned into listening devices, using malicious firmware and signal processing calculations.
For a study titled "Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone," computer scientists Andrew Kwong, Wenyuan Xu, and Kevin Fu describe an acoustic side-channel that can be accessed by measuring how sound waves make hard disk parts vibrate.
"Our research demonstrates that the mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech," their paper, obtained by The Register ahead of its formal publication, stated. "These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive."
https://www.theregister.co.uk/2019/03/07/hard_drive_eavesdropping/
#surveillance #harddrive #eavesdropping
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
This media is not supported in your browser
VIEW IN TELEGRAM
Adware Apps in Google Play Simulate Uninstall for Persistence
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time.
πΊ https://twitter.com/LukasStefanko/status/1102889352118616064/video/1
https://www.bleepingcomputer.com/news/security/adware-apps-in-google-play-simulate-uninstall-for-persistence/
π‘ @NoGoolag
#adware #apps #playstore
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time.
πΊ https://twitter.com/LukasStefanko/status/1102889352118616064/video/1
https://www.bleepingcomputer.com/news/security/adware-apps-in-google-play-simulate-uninstall-for-persistence/
π‘ @NoGoolag
#adware #apps #playstore
Distraction, rescue attempt, deep change of heart?
Mark Zuckerberg wants to turn Facebook into a company that focuses on the privacy of communication. But this should not be confused with general data protection.
In his current message on Facebook, Zuckerberg also emphasizes the aspect of end-to-end encryption of content.
What he hides:
The contents of the messages are of course interesting for targeted advertising - but even more important are usually personal information and metadata: Who wrote when with whom and where? Who is linked to whom? How old is the person, what gender does he or she have and which pages do he or she like? Facebook also knows all this when it can't read the contents of communication between users.
It's right and proper that Facebook wants to put the confidentiality of communication content at the heart of its own products. But this should not be confused with Facebook generally becoming a company that focuses on privacy or data protection. Not only content is personal data, but also meta and profile information. At present, it does not look as if Facebook will provide more data protection at those points where it would attack the core of the business model.
(German)
https://t3n.de/news/facebook-zuckerberg-datenschutz-1149112
Facebookβs new move isn't about privacy. Itβs about domination.
https://www.theguardian.com/commentisfree/2019/mar/07/facebook-privacy-domination
A 'privacy-focused' Facebook would kill Zuckerberg's business model
https://www.theguardian.com/commentisfree/2019/mar/07/privacy-focused-facebook-kill-zuckerbergs-business-model
Zuckerberg: Facebook will shift focus to private networks instead of open ones
https://arstechnica.com/gadgets/2019/03/zuckerberg-facebook-will-shift-focus-to-private-networks-instead-of-open-ones
Mark Zuckerberg gets privacy religion, but is it a case of βborn againβ or cynical pragmatism?
https://diginomica.com/mark-zuckerberg-gets-privacy-religion-but-is-it-a-case-of-born-again-or-just-naked-pragmatism
π‘ @NoGoolag
#DeleteFacebook #fb
Mark Zuckerberg wants to turn Facebook into a company that focuses on the privacy of communication. But this should not be confused with general data protection.
In his current message on Facebook, Zuckerberg also emphasizes the aspect of end-to-end encryption of content.
What he hides:
The contents of the messages are of course interesting for targeted advertising - but even more important are usually personal information and metadata: Who wrote when with whom and where? Who is linked to whom? How old is the person, what gender does he or she have and which pages do he or she like? Facebook also knows all this when it can't read the contents of communication between users.
It's right and proper that Facebook wants to put the confidentiality of communication content at the heart of its own products. But this should not be confused with Facebook generally becoming a company that focuses on privacy or data protection. Not only content is personal data, but also meta and profile information. At present, it does not look as if Facebook will provide more data protection at those points where it would attack the core of the business model.
(German)
https://t3n.de/news/facebook-zuckerberg-datenschutz-1149112
Facebookβs new move isn't about privacy. Itβs about domination.
https://www.theguardian.com/commentisfree/2019/mar/07/facebook-privacy-domination
A 'privacy-focused' Facebook would kill Zuckerberg's business model
https://www.theguardian.com/commentisfree/2019/mar/07/privacy-focused-facebook-kill-zuckerbergs-business-model
Zuckerberg: Facebook will shift focus to private networks instead of open ones
https://arstechnica.com/gadgets/2019/03/zuckerberg-facebook-will-shift-focus-to-private-networks-instead-of-open-ones
Mark Zuckerberg gets privacy religion, but is it a case of βborn againβ or cynical pragmatism?
https://diginomica.com/mark-zuckerberg-gets-privacy-religion-but-is-it-a-case-of-born-again-or-just-naked-pragmatism
π‘ @NoGoolag
#DeleteFacebook #fb
Transcript leak: Inside Facebook's secret crisis meeting, where Zuck and Sheryl race to save social network's rep
We have obtained a transcript of a secret crisis meeting held last week between top executives at Facebook, including CEO Mark Zuckerberg and COO Sheryl Sandberg, hammering out a corporate response to the social network's non-stop rollercoaster of scandals. We present it here unedited.
#DeleteFacebook #transcript #leak #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
We have obtained a transcript of a secret crisis meeting held last week between top executives at Facebook, including CEO Mark Zuckerberg and COO Sheryl Sandberg, hammering out a corporate response to the social network's non-stop rollercoaster of scandals. We present it here unedited.
Read at:
https://www.theregister.co.uk/2019/03/08/facebook_privacy_transcript/Read the german translation at:
https://t.me/BlackBox_Archiv/224#DeleteFacebook #transcript #leak #why
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Up to date host lists for advertisements, trackers, malware, annoyances and much more.
π‘ Host lists to block fb
β https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/facebook/all
β https://gist.github.com/thomasbilk/1506210/2d20f47bbcca75b2f78d6909c1637501000d846f
π‘ The independent, comprehensive directory of 16,884,036 unique rules across 1,385 filter and host lists
β https://filterlists.com/
π‘ How to make the internet not suck (as much) by Dan Pollock
β https://someonewhocares.org/hosts/
π‘ List to block MIUI spyware reporting back to xiaomi servers. By @ eboye
β https://gist.githubusercontent.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c/raw/36afd2333c781b5682bf602580a7935649d794b2/adaway-miui-blocklist
π‘ AdAway's default hosts sources
β https://github.com/AdAway/AdAway/wiki/HostsSources
π‘ Goodbye Ads is created for Android users to block advertisements on the device. Our host file is small in size but it blocks 90% of the ads. This host files can be also used in PC
β https://goodbyeads.weebly.com/
β https://forum.xda-developers.com/android/software-hacking/goodbye-ads-advanced-protection-ads-ad-t3827269
β https://github.com/jerryn70/GoodbyeAds
π‘ Comprehensive hosts to block Ads, Analytics, Tracking & Telemetry based on Exodus list
By @ kabir_te
β https://github.com/kaabir/AdBlock_Hosts
π‘ Unified hosts file with base extensions
β https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware
π‘ Host lists to block fb
β https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/facebook/all
β https://gist.github.com/thomasbilk/1506210/2d20f47bbcca75b2f78d6909c1637501000d846f
π‘ The independent, comprehensive directory of 16,884,036 unique rules across 1,385 filter and host lists
β https://filterlists.com/
π‘ How to make the internet not suck (as much) by Dan Pollock
β https://someonewhocares.org/hosts/
π‘ List to block MIUI spyware reporting back to xiaomi servers. By @ eboye
β https://gist.githubusercontent.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c/raw/36afd2333c781b5682bf602580a7935649d794b2/adaway-miui-blocklist
π‘ AdAway's default hosts sources
β https://github.com/AdAway/AdAway/wiki/HostsSources
π‘ Goodbye Ads is created for Android users to block advertisements on the device. Our host file is small in size but it blocks 90% of the ads. This host files can be also used in PC
β https://goodbyeads.weebly.com/
β https://forum.xda-developers.com/android/software-hacking/goodbye-ads-advanced-protection-ads-ad-t3827269
β https://github.com/jerryn70/GoodbyeAds
π‘ Comprehensive hosts to block Ads, Analytics, Tracking & Telemetry based on Exodus list
By @ kabir_te
β https://github.com/kaabir/AdBlock_Hosts
π‘ Unified hosts file with base extensions
β https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware
hblock
Improve your security and privacy by blocking ads, tracking and malware domains.
This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple sources (see below) and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them.
https://hblock.molinero.xyz
https://github.com/hectorm/hblock
adaway.org https://adaway.org/hosts.txt
AdBlock NoCoin List https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
AdGuard - Simplified https://filters.adtidy.org/extension/chromium/filters/15.txt
anudeepND - adservers https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
disconnect.me - Ad https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
disconnect.me - Malvertising https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
disconnect.me - Malware https://s3.amazonaws.com/lists.disconnect.me/simple_malware.txt
disconnect.me - Tracking https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
EasyList https://easylist.to/easylist/easylist.txt
EasyPrivacy https://easylist.to/easylist/easyprivacy.txt
ETH Phishing Detect https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/master/src/hosts.txt
FadeMind - add.2o7Net https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
FadeMind - add.Dead https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Dead/hosts
FadeMind - add.Risk https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts
FadeMind - add.Spam https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
KADhosts https://raw.githubusercontent.com/azet12/KADhosts/master/KADhosts.txt
malwaredomainlist.com https://www.malwaredomainlist.com/hostslist/hosts.txt
malwaredomains.com - Immortal domains http://mirror1.malwaredomains.com/files/immortal_domains.txt
malwaredomains.com - Just domains http://mirror1.malwaredomains.com/files/justdomains
matomo.org - Spammers https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
mitchellkrogza - Badd-Boyz-Hosts https://raw.githubusercontent.com/mitchellkrogza/Badd-Boyz-Hosts/master/hosts
pgl.yoyo.org https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&mimetype=plaintext
ransomwaretracker.abuse.ch https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
someonewhocares.org http://someonewhocares.org/hosts/hosts
spam404.com https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
StevenBlack https://raw.githubusercontent.com/StevenBlack/hosts/master/data/StevenBlack/hosts
winhelp2002.mvps.org http://winhelp2002.mvps.org/hosts.txt
ZeroDot1 - CoinBlockerLists https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
zeustracker.abuse.ch https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
π‘ @NoGoolag
#hblock #hosts #list #adblock #tracker #malware #shell #script
Improve your security and privacy by blocking ads, tracking and malware domains.
This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple sources (see below) and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them.
https://hblock.molinero.xyz
https://github.com/hectorm/hblock
adaway.org https://adaway.org/hosts.txt
AdBlock NoCoin List https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
AdGuard - Simplified https://filters.adtidy.org/extension/chromium/filters/15.txt
anudeepND - adservers https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
disconnect.me - Ad https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
disconnect.me - Malvertising https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
disconnect.me - Malware https://s3.amazonaws.com/lists.disconnect.me/simple_malware.txt
disconnect.me - Tracking https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
EasyList https://easylist.to/easylist/easylist.txt
EasyPrivacy https://easylist.to/easylist/easyprivacy.txt
ETH Phishing Detect https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/master/src/hosts.txt
FadeMind - add.2o7Net https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts
FadeMind - add.Dead https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Dead/hosts
FadeMind - add.Risk https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts
FadeMind - add.Spam https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts
KADhosts https://raw.githubusercontent.com/azet12/KADhosts/master/KADhosts.txt
malwaredomainlist.com https://www.malwaredomainlist.com/hostslist/hosts.txt
malwaredomains.com - Immortal domains http://mirror1.malwaredomains.com/files/immortal_domains.txt
malwaredomains.com - Just domains http://mirror1.malwaredomains.com/files/justdomains
matomo.org - Spammers https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
mitchellkrogza - Badd-Boyz-Hosts https://raw.githubusercontent.com/mitchellkrogza/Badd-Boyz-Hosts/master/hosts
pgl.yoyo.org https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&mimetype=plaintext
ransomwaretracker.abuse.ch https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
someonewhocares.org http://someonewhocares.org/hosts/hosts
spam404.com https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
StevenBlack https://raw.githubusercontent.com/StevenBlack/hosts/master/data/StevenBlack/hosts
winhelp2002.mvps.org http://winhelp2002.mvps.org/hosts.txt
ZeroDot1 - CoinBlockerLists https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
zeustracker.abuse.ch https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
π‘ @NoGoolag
#hblock #hosts #list #adblock #tracker #malware #shell #script
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Biker sues Google Fiber: I broke my leg, borked my ankle in trench dug to lay ad giant's pipe
Sum of a ditch! Bloke demands $75,000 after road prang
Installing broadband fiber is a complex and expensive activity, though it may have got a little bit more so, for Google at least, following a lawsuit in America.
Motorcyclist Hans Newsom is this week suing [PDF] Google Fiber and its local contractor in his hometown of Kansas City, Missouri β after a trench, dug to install the ad giant's fiber cabling, was allegedly left uncovered in the middle of the road, causing him to ultimately fall off his ride.
https://www.theregister.co.uk/2019/03/09/google_fiber_motorcyclist/
Read Via Telegram
#deletegoogle #broadband #lawsuit
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Sum of a ditch! Bloke demands $75,000 after road prang
Installing broadband fiber is a complex and expensive activity, though it may have got a little bit more so, for Google at least, following a lawsuit in America.
Motorcyclist Hans Newsom is this week suing [PDF] Google Fiber and its local contractor in his hometown of Kansas City, Missouri β after a trench, dug to install the ad giant's fiber cabling, was allegedly left uncovered in the middle of the road, causing him to ultimately fall off his ride.
https://www.theregister.co.uk/2019/03/09/google_fiber_motorcyclist/
Read Via Telegram
#deletegoogle #broadband #lawsuit
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Screen-grabbed from Facebook:
A teacher had her students turn their phone volume up and create a collective record of the notifications they received in a single class period.
https://twitter.com/katierosman/status/1103109217626415105
Android co-founder Rich Miner draws attention to the disturbing influence on young people who do not know a world without constant interruptions.
Rich Miner, known as a co-inventor of Android, is concerned about the disruptive impact of permanent smartphone use, especially for younger users. "I'm worried about the disruptive world of smartphones that I helped create," he confessed in a tweet. "And how it affects people who grew up believing it just had to be that way."
https://twitter.com/richminer/status/1103327630215036928
π‘ @NoGoolag
#android #kidds #smartphone #abuse #RichMiner #why #DeleteFacebook
A teacher had her students turn their phone volume up and create a collective record of the notifications they received in a single class period.
https://twitter.com/katierosman/status/1103109217626415105
Android co-founder Rich Miner draws attention to the disturbing influence on young people who do not know a world without constant interruptions.
Rich Miner, known as a co-inventor of Android, is concerned about the disruptive impact of permanent smartphone use, especially for younger users. "I'm worried about the disruptive world of smartphones that I helped create," he confessed in a tweet. "And how it affects people who grew up believing it just had to be that way."
https://twitter.com/richminer/status/1103327630215036928
π‘ @NoGoolag
#android #kidds #smartphone #abuse #RichMiner #why #DeleteFacebook
Twitter
katie rosman
Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record of the notifications they received in a single class period.
Social Media Platforms and the Cyberkrime Economy
In this next chapter of the Web of Profit, we examine the role of popular social media platforms in cybercrime and other forms of crime-enablement. The findings are startling, and should serve as a wake-up call for individuals, enterprises, governments and law enforcement.
https://learn.bromium.com/rs/497-ITQ-712/images/Bromium-Web-of-Profit-Social-Platforms-Report.pdf
Read on TG:
https://t.me/BlackBox_Archiv/231
#socialmedia #platforms #cybercrime #report #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
In this next chapter of the Web of Profit, we examine the role of popular social media platforms in cybercrime and other forms of crime-enablement. The findings are startling, and should serve as a wake-up call for individuals, enterprises, governments and law enforcement.
https://learn.bromium.com/rs/497-ITQ-712/images/Bromium-Web-of-Profit-Social-Platforms-Report.pdf
Read on TG:
https://t.me/BlackBox_Archiv/231
#socialmedia #platforms #cybercrime #report #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Block ads, trackers, malicious websites and adult content on Android and PC
β AdAway
Open source ad blocker for Android using the hosts file
Web: https://adaway.org
Download Stable: https://f-droid.org/app/org.adaway
https://t.me/NoGoolag/671
β Blokada
Free and open source ad blocker. It works across all of your apps, not only the browser. It doesn't require root, supports both wifi and mobile networks.
Web:
https://blokada.org
Telegram:
https://t.me/blokadachat
https://t.me/NoGoolag/576
β Energized β‘οΈ ad - porn - malware blocking
Energized System is designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple reputable sources and creates a hosts file that prevents your system from connecting to them.
Web: energized.pro
Github: github.com/EnergizedProtection/block
Telegram: https://t.me/EnergizedProtection
https://t.me/NoGoolag/464
β Nebulo-1.0Beta-Build 21-PRERELEASE (DNS Over HTTPS) Server App
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets
TG support group and app download: https://t.me/joinchat/I54nRleveRG3xwAa3StNCg
https://t.me/libreware/467
Source codes: http://git.frostnerd.com
β personalDNSfilter
Block ads, trackers, analytics and malware domains system-wide (in browsers and apps).
Root is not required
Web and downloads: https://zenz-solutions.de/personaldnsfilter
XDA: https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898
https://t.me/NoGoolag/677
β personalHTTPproxy
Use local http proxy for ad blocking (Required APN configuration to work).
Web:
https://www.zenz-solutions.de/personalhttpproxy/
Telegram:
https://t.me/pdnsf
https://t.me/NoGoolag/678
Collections of Hosts files:
β Up to date host lists for advertisements, trackers, malware, annoyances and much more:
https://t.me/NoGoolag/912
β hblock (shell script, designed for Unix-like systems)
Improve your security and privacy by blocking ads, tracking and malware domains.
https://t.me/NoGoolag/913
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware #android #pc
β AdAway
Open source ad blocker for Android using the hosts file
Web: https://adaway.org
Download Stable: https://f-droid.org/app/org.adaway
https://t.me/NoGoolag/671
β Blokada
Free and open source ad blocker. It works across all of your apps, not only the browser. It doesn't require root, supports both wifi and mobile networks.
Web:
https://blokada.org
Telegram:
https://t.me/blokadachat
https://t.me/NoGoolag/576
β Energized β‘οΈ ad - porn - malware blocking
Energized System is designed for Unix-like systems, gets a list of domains that serve ads, tracking scripts and malware from multiple reputable sources and creates a hosts file that prevents your system from connecting to them.
Web: energized.pro
Github: github.com/EnergizedProtection/block
Telegram: https://t.me/EnergizedProtection
https://t.me/NoGoolag/464
β Nebulo-1.0Beta-Build 21-PRERELEASE (DNS Over HTTPS) Server App
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets
TG support group and app download: https://t.me/joinchat/I54nRleveRG3xwAa3StNCg
https://t.me/libreware/467
Source codes: http://git.frostnerd.com
β personalDNSfilter
Block ads, trackers, analytics and malware domains system-wide (in browsers and apps).
Root is not required
Web and downloads: https://zenz-solutions.de/personaldnsfilter
XDA: https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898
https://t.me/NoGoolag/677
β personalHTTPproxy
Use local http proxy for ad blocking (Required APN configuration to work).
Web:
https://www.zenz-solutions.de/personalhttpproxy/
Telegram:
https://t.me/pdnsf
https://t.me/NoGoolag/678
Collections of Hosts files:
β Up to date host lists for advertisements, trackers, malware, annoyances and much more:
https://t.me/NoGoolag/912
β hblock (shell script, designed for Unix-like systems)
Improve your security and privacy by blocking ads, tracking and malware domains.
https://t.me/NoGoolag/913
π‘ @NoGoolag
#hosts #list #adblock #tracker #malware #android #pc
This media is not supported in your browser
VIEW IN TELEGRAM
π Facebook's reputation is sinking fast
Axios Harris Poll RQ ranking, 2012β19
Facebook's reputation took a long dive over the past year, staggering under an avalanche of controversies...
https://www.axios.com/facebook-reputation-drops-axios-harris-poll-0d6c406a-4c2e-463a-af98-1748d3e0ab9a.html
π‘ @NoGoolag
#DeleteFacebook #why
Axios Harris Poll RQ ranking, 2012β19
Facebook's reputation took a long dive over the past year, staggering under an avalanche of controversies...
https://www.axios.com/facebook-reputation-drops-axios-harris-poll-0d6c406a-4c2e-463a-af98-1748d3e0ab9a.html
π‘ @NoGoolag
#DeleteFacebook #why
Linux Deploy
This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device.
The application creates a disk image or a dictory on a flash card or uses a partition or RAM, mounts it and installs an OS distribution. Applications of the new system are run in a chroot environment and working together with the Android platform. All changes made on the device are reversible, i.e. the application and components can be removed completely. Installation of a distribution is done by downloading files from official mirrors online over the internet. The application can run better with superuser rights (ROOT).
The program supports multi language interface. You can manage the process of installing the OS, and after installation, you can start and stop services of the new system (there is support for running your scripts) through the UI. The installation process is reported as text in the main application window. During the installation, the program will adjust the environment, which includes the base system, SSH server, VNC server and desktop environment. The program interface can also manage SSH and VNC settings.
Installing a new operating system takes about 15 minutes. The recommended minimum size of a disk image is 1024 MB (with LXDE), and without a GUI - 512 MB. When you install Linux on the flash card with the FAT32 file system, the image size should not exceed 4095 MB! After the initial setup the password for SSH and VNC generated automatically. The password can be changed through "Properties -> User password" or standard OS tools (passwd, vncpasswd).
The app is available for download in Google Play and GitHub. ([2.3.0] - 2019-03-02)
https://github.com/meefik/linuxdeploy/releases/tag/2.3.0
GitHub - Features - FAQ
https://github.com/meefik/linuxdeploy
π‘ @NoGoolag
#linux #deploy #gnu #installation #android #app #OS
This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device.
The application creates a disk image or a dictory on a flash card or uses a partition or RAM, mounts it and installs an OS distribution. Applications of the new system are run in a chroot environment and working together with the Android platform. All changes made on the device are reversible, i.e. the application and components can be removed completely. Installation of a distribution is done by downloading files from official mirrors online over the internet. The application can run better with superuser rights (ROOT).
The program supports multi language interface. You can manage the process of installing the OS, and after installation, you can start and stop services of the new system (there is support for running your scripts) through the UI. The installation process is reported as text in the main application window. During the installation, the program will adjust the environment, which includes the base system, SSH server, VNC server and desktop environment. The program interface can also manage SSH and VNC settings.
Installing a new operating system takes about 15 minutes. The recommended minimum size of a disk image is 1024 MB (with LXDE), and without a GUI - 512 MB. When you install Linux on the flash card with the FAT32 file system, the image size should not exceed 4095 MB! After the initial setup the password for SSH and VNC generated automatically. The password can be changed through "Properties -> User password" or standard OS tools (passwd, vncpasswd).
The app is available for download in Google Play and GitHub. ([2.3.0] - 2019-03-02)
https://github.com/meefik/linuxdeploy/releases/tag/2.3.0
GitHub - Features - FAQ
https://github.com/meefik/linuxdeploy
π‘ @NoGoolag
#linux #deploy #gnu #installation #android #app #OS
Forwarded from Libreware
Nebulo-1.0Beta-Build 21-PRERELEASE (DNS Over HTTPS) Server App
(Pre-release: Support for DoT)
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets
Changelog:
- Renamed the app to Nebulo.
- Performance improvements (smaller memory footprint, faster query time [a few ms])
-> This might improve battery life a bit, I haven't tested this yet
- Decreased APK size by about 300 kB
- Added custom cache time for NXDOMAIN responses. This is very useful for servers which block domains (e.g. ads) as the responses aren't going to change over a longer period of time and thus can be cached much longer. Default of 1800 seconds (30 minutes)
- Fixed some crashes (though not all, help me find them :))
As you can see in the screenshots (TG suport group) now DoT and DoH servers can be added. DoT is faster than DoH and thus should be preferred. I tested it locally, but as of now this feature is marked as non-stable.
TG support group and app download:
https://t.me/joinchat/I54nRleveRG3xwAa3StNCg
π‘ @Libreware
#Frostnerd #Update #Nebulo #prerelease #DNS #HTTPS
(Pre-release: Support for DoT)
This app establishes a local dummy VPN -- it doesn't connect to a VPN server and only handles your DNS packets
Changelog:
- Renamed the app to Nebulo.
- Performance improvements (smaller memory footprint, faster query time [a few ms])
-> This might improve battery life a bit, I haven't tested this yet
- Decreased APK size by about 300 kB
- Added custom cache time for NXDOMAIN responses. This is very useful for servers which block domains (e.g. ads) as the responses aren't going to change over a longer period of time and thus can be cached much longer. Default of 1800 seconds (30 minutes)
- Fixed some crashes (though not all, help me find them :))
As you can see in the screenshots (TG suport group) now DoT and DoH servers can be added. DoT is faster than DoH and thus should be preferred. I tested it locally, but as of now this feature is marked as non-stable.
TG support group and app download:
https://t.me/joinchat/I54nRleveRG3xwAa3StNCg
π‘ @Libreware
#Frostnerd #Update #Nebulo #prerelease #DNS #HTTPS
Forwarded from Libreware
Nebulo-1.0Beta-Build21-PRERELEASE.apk
3.4 MB
Nebulo-1.0Beta-Build 21-PRERELEASE (DNS Over HTTPS) Server App
(Pre-release: Support for DoT)
TG support group and app download:
https://t.me/joinchat/I54nRleveRG3xwAa3StNCg
π‘ @Libreware
#Frostnerd #Update #Nebulo #prerelease #DNS #HTTPS
(Pre-release: Support for DoT)
TG support group and app download:
https://t.me/joinchat/I54nRleveRG3xwAa3StNCg
π‘ @Libreware
#Frostnerd #Update #Nebulo #prerelease #DNS #HTTPS
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Alleged Telegram Token Video Leaked as Ton Blockchain Prepares Testnet Launch
A video of the most secretive blockchain project ever has seemingly been leaked with it showing how Gram, the Telegram token, is meant to work from a userβs perspective.
The new Telegram app version will allow users to scan with a QR code. The usual functionalities are then available, in addition to the incorporation of the gram token.
https://www.trustnodes.com/2019/03/09/alleged-telegram-token-video-leaked-as-ton-blockchain-prepares-testnet-launch
Read Via Telegram
#blockchain #telegram #gram
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
A video of the most secretive blockchain project ever has seemingly been leaked with it showing how Gram, the Telegram token, is meant to work from a userβs perspective.
The new Telegram app version will allow users to scan with a QR code. The usual functionalities are then available, in addition to the incorporation of the gram token.
https://www.trustnodes.com/2019/03/09/alleged-telegram-token-video-leaked-as-ton-blockchain-prepares-testnet-launch
Read Via Telegram
#blockchain #telegram #gram
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
This media is not supported in your browser
VIEW IN TELEGRAM
Alleged Telegram Token Video Leaked as Ton Blockchain Prepares Testnet Launch
#blockchain #telegram #gram
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
#blockchain #telegram #gram
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from Telegram Designers via @like
Media is too big
VIEW IN TELEGRAM
Suggested by @maratkharr