NoGoolag
4.52K subscribers
14.4K photos
7.48K videos
602 files
14.9K links
Live free!

๐Ÿ“ก @NoGoolag

FAQ:
http://t.me/NoGoolag/169

โ˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

๐Ÿ“ก @Libreware

๐Ÿ“ก @TakeBackOurTech

๐ŸฆŠ @d3_works

๐Ÿ“š @SaveAlexandria

๐Ÿ’ฏ % satire OSINT
Download Telegram
Media is too big
VIEW IN TELEGRAM
Democratizing and Decolonizing the Future - Grassroots Utopias from Indonesia

In this online podium discussion we will present the power of critical ideas and show examples of utopian futures in the making in Indonesia. The projects created by Indonesian hackers and makers use technology to solve one or more local problems, attempting to create more equitable and positive future for their communities. They will be streamed as they happen live: different projects from around Indonesia will show how they make social change happen.

๐Ÿ“บ ๐Ÿ‘‰๐Ÿผ https://media.ccc.de/v/ds20-11322-democratizing_and_decolonizing_the_future

#ds20 #ccc #indonesia #utopias #democratizing #decolonizing #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
seccomp โ€” Your Next Layer of Defense

Why should you allow all possible system calls from your application when you know that you only need some? If you have ever wondered the same then this is the right talk for you.

๐Ÿ‘‰๐Ÿผ We are covering:

* What is seccomp in a nutshell and where could you use it.
* Practical example with Docker, Elasticsearch, and Beats.
* How to collect seccomp violations with Auditd.

Because your security approach can always use an additional layer of protection.

๐Ÿ“บ ๐Ÿ‘‰๐Ÿผ https://media.ccc.de/v/froscon2020-2614-seccomp_your_next_layer_of_defense

#froscon2020 #ccc #seccomp #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
All Creatures Welcome

All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to โ€œuse hacking as a mindset,โ€ the viewers immerse themselves, together with the filmmaker, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club; a real-world reflection of the virtual spectrum. Together with the filmmaker and the slogan"use hacking as a mindset" we immerse in a documentary adventure game and explore the world of Komputerfrieks, as they used to call themselves at the inaugural meeting of the Chaos Computer Club in 1981.

๐Ÿ“บ ๐Ÿ‘‰๐Ÿผ (German Subs)
https://media.ccc.de/v/all_creatures_welcome

#ccc #welcome #video #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
What The Fax?! - Hacking your network likes it's 1980 again

We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?

But can FAX be something more than a bureaucratic burden? Can it actually be a catastrophic security hole that may be used to compromise your entire network? Come watch our talk and find out โ€ฆ

๐Ÿ‘‰๐Ÿผ ๐Ÿ“บ ๐Ÿ‡ฉ๐Ÿ‡ช ๐Ÿ‡ฌ๐Ÿ‡ง ๐Ÿ‡ซ๐Ÿ‡ท
https://media.ccc.de/v/35c3-9462-what_the_fax

๐Ÿ’ก These file here contains multiple languages.
The file available for download contains all languages as separate audio-tracks.

#ccc #fax #security #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Elephant In The Background: Empowering Users Against Browser Fingerprinting

Tracking users is a ubiquitous practice in the web today. User activity is recorded on a large scale and analyzed by various actors to create personalized products, forecast future behavior, and prevent online fraud. While so far HTTP cookies have been the weapon of choice, new and more pervasive techniques such as browser fingerprinting are gaining traction. Hence, in this talk, we describe how users can be empowered against fingerprinting by showing them when, how, and who is tracking them using JavaScript fingerprinting.

https://media.ccc.de/v/rc3-113142-the_elephant_in_the_background

#ccc #rc3 #browser #fingerprinting #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@NoGoolag
๐Ÿ“ก
@BlackBox
Media is too big
VIEW IN TELEGRAM
CIA vs. Wikileaks - Intimidation surveillance and other tactics observed and experienced

In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that strongly indicate a context of the US Central Intelligence Agency and/or potentially other entities of the US Government actions against Wikileaks and surrounding persons and organisations.

https://media.ccc.de/v/rc3-11512-cia_vs_wikileaks

๐Ÿ’ก These file here contains multiple languages. (๐Ÿ‡ฉ๐Ÿ‡ช ๐Ÿ‡ฌ๐Ÿ‡ง)
The file available for download contains all languages as separate audio-tracks.

#ccc #rc3 #cia #wikileaks #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@NoGoolag
๐Ÿ“ก
@BlackBox
Media is too big
VIEW IN TELEGRAM
Login To HELL: The nightmares of an infosec professional in South America

"In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical providerโ€™s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crimeโ€”a crime he didnโ€™t commit, and one that probably never even happened.

Alberto, a hacker, was the perfect target for a judicial system that doesnโ€™t understand cybersecurity or cybercrimes. Through police misconduct and incompetence, his life was thrown into upheaval, and he is still recovering from a system where there are no guarantees of a fair trial.

https://media.ccc.de/v/rc3-625023-login_to_hell

๐ŸŽ™Darknetdiaries - EP 25: Alberto
https://t.me/BlackBox_Archiv/1678

#alberto #truecrime #darknetdiaries #rc3 #ccc #cybersecurity #cybercrime #podcast #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Horcrux Encrypted Messaging

"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?

https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging

#rc3 #ccc #horcrux #encrypted #messaging #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Hackerfleet Operating System & the Isomer Framework

A quick and dirty hands on introduction to Isomer development and how to set up the prime project using it, the Hackerfleet Operating System. This workshop is mostly intended for sailors, campers etc. but also very useful in many other situations.

What is all this? What are the benefits? How do things work? What will you need to get started? How to set everything up? How do you join the project and how to contribute? These kind of questions shall be answered! Additional workshopping and hacking may happen in a breakout room or something.

https://media.ccc.de/v/rc3-176543-the_hackerfleet_operating_system_the_isomer_framework

#hackerfleet #isomer #framework #rc3 #ccc #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Spot the Surveillance - How to Identify Police Surveillance at Protests and Large Gatherings

The Electronic Frontier Foundationโ€™s Kurt Opsahl will show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.

https://media.ccc.de/v/rc3-11406-spot_the_surveillance

โš ๏ธ This Talk was translated into multiple languages (DE / EN). The files available for download contain all languages as separate audio-tracks.

#rc3 #ccc #police #surveillance #spying #protests #demos #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's operating system

Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.

https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os

#RedStarOS #northkorea #ccc #32c3 #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Hacking the Samsung Galaxy S8 Irisscanner

Mobile vendors have established fingerprints as a biometric feature to unlock smartphones. Now they turn to iris recognition, as do hackers. This video demonstrates how to circumvent the iris recognition of the Samsung Galaxy S8 flagship phone only using basic tools.

https://media.ccc.de/v/biometrie-s8-iris-en

#ccc #biometric #unlock #smartphones #irisrecognition #irisscanner #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Facebook, IoTeX, R3 Among New Members of Confidential Computing Consortium

Facebook, Accenture, IoTeX, Nvidia and six other companies are joining the Linux Foundationโ€™s Confidential Computing Consortium (
CCC), increasing the size of the privacy-focused group by 60 percent.

The addition of members IoTeX, which leverages blockchain to secure the internet of things, and R3, an enterprise blockchain company, nearly doubles the number of blockchain companies involved.

Created in late October 2019, the CCC aims to bring developers together to accelerate the use of Trusted Execution Environment (TEE) technologies and standards. A TEE sequesters code and data away from applications on the main operating system, so theyโ€™re protected from adversaries who may gain access to the main operating system. If the main system is in the White House, for instance, with a variety of protections, a TEE is the bunker underneath it.

Within a TEE, unauthorized actors cannot view the data that is being used within the TEE and cannot alter the data. This enables applications and other systems to run without having direct access to extensive amounts of vulnerable data such as financial or personally identifiable information.

โ€œSecuring data-in-use in hardware-based TEEs, can โ€ฆ strengthen other security- and integrity-related technologies,โ€ like running a blockchain ledger, said Stephen Walli, the chairperson of the CCCโ€™s governing board, in a statement.

โ€œConfidential computing brings privacy-preserving smart devices to the next level by not only allowing users to own their private data, but also to use it in a privacy-preserving way,โ€ Raullen Chai, CEO of IoTex, told CoinDesk in an email. โ€œThis has major implications for consumer-facing industries such as health care and smart homes, as well as enterprise for private multi-party data sharing and interactions.โ€

http://telegra.ph/Facebook-IoTeX-R3-Among-New-Members-of-Confidential-Computing-Consortium---CoinDesk-04-30

via www.coindesk.com

#facebook #DeleteFacebook #IoTeX #confidential #computing #consortium #ccc
๐Ÿ“ก @nogoolag ๐Ÿ“ก @blackbox_archiv