Privacy & Security Goys
11.8K subscribers
432 photos
117 videos
28 files
623 links
"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News

"A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner
Download Telegram
Forwarded from Intel Slava
🇺🇦🇷🇺 SBU: Telegram cooperates with the FSB and Roskomnadzor, but ignores the Ukrainian authorities

▪️"First of all, the SBU monitors where the Telegram servers are located. There is a high probability that they are on Russian territory. The second problem of Telegram is that its owner and developers are citizens of Russia. The third is that we see clear cooperation between Telegram and Roskomnadzor and the FSB. When necessary The FSB blocks any channel on the territory of Russia, Telegram carries out these instructions instantly,” said A. Melnichenko, a representative of the department of counterintelligence protection and information security of the SBU.
▪️The SBU is taking certain measures to de-anonymize administrators of Telegram channels conducting destructive activities.
▪️"Sometimes some of them can be blocked, but Telegram does not listen to the requests of Ukraine as it does to the requests of Russia."
▪️Yesterday, the head of the Main Intelligence Directorate, Kirill Budanov, called Telegram “a problem from a national security point of view.”
😁43🤡26👍13🤔4❤‍🔥3🍌3🥰2💊2🤬1🍾1
😁93🤣14🤡5👎3🍌21🥰1🥴1
Forwarded from /archive/ (eax32)
XZ has been backdoored, whoah. Good thing people noticed it very quickly and we already have a patch. Since there is no official version with the fix, just downgrade.

https://archlinux.org/news/the-xz-package-has-been-backdoored/

https://www.phoronix.com/news/XZ-CVE-2024-3094
🥴19🍌6👍1
😁99🫡28🥴1443💯3😴3👍2🍌2🎅2🥰1
Media is too big
VIEW IN TELEGRAM
📌WLM is celebrating it's 3 year anniversary!

This pro-White, legal, & anonymous initiative that has held activism events for 35 months straight was set up to revive our Racial Consciousness and regain our Honor as a People. Through our hard work, WLM has become one of the biggest pro-White forces at street level, and countless groups have spiralled off our efforts.

We speak through ACTION. We build power through ACTION. We achieve the 14 through ACTION.

You are not alone. Join a tribe. Join WLM.
@WLMcontactbot.

@WhiteLivesMatterOfficial
@WLMOfficial14
👏7015🤡109🥱7👍4🤣4🖕3🥰2🥴1🍌1
Forwarded from Smokes & Memes: Banned in Europe EDITION (JC "Augmented Augtism" Denton)
This media is not supported in your browser
VIEW IN TELEGRAM
Federal Agent
🤡64🤣28💅5👎3💊3🍌2🖕1
Forwarded from 🕌 Autism Outlet 2: The Sneedening 🕌 (Clitoridectomy Groyper)
😁69🥴35😈8🆒3🤡2🍌2👍1
Closeted zoophiles and other flaming degenerates are seething as the largest furry porn site on the web faces shutdown over age verification laws

https://fxtwitter.com/LuckFoxo33AD/status/1775264524192587844
👏98😁39🍾14👍3🥱3🔥2🤬2🥴2🍌2
Forwarded from North American News
Gay British Politician catfished into sending the personal phone numbers of his fellow MPs on gay sex app.

Men not sending sensitive info and having shit OPSEC to people they want to bang challenge: impossible

https://www.cbsnews.com/news/uk-sexting-spear-phishing-scam-mp-william-wragg-lawmaker-phone-numbers/
🤗38🤡202👍1💋1
Forwarded from (Dead)
North American News
Gay British Politician catfished into sending the personal phone numbers of his fellow MPs on gay sex app. Men not sending sensitive info and having shit OPSEC to people they want to bang challenge: impossible https://www.cbsnews.com/news/uk-sexting-spear…
This reminds us of when some antifa fag infiltrated Greg Johnson's (open homosexual) organization years ago and got everything from him just by sleeping with him a couple of times.

Probably the easiest infiltration op as they didn't even have to change anything other than being racist lmao.
🤣73😎5🔥3❤‍🔥1👍1👎1😍1
⚡️5 Startling Technology Leaks from Julian Assange's Wikileaks
@takebackourtech

Today a judgement was passed in Julian Assange’s extradition case, although it drags the case on and gives the possibility for a final rejection. If this happens, Assange will spend up to 175 years in a US maximum security prison.

His crime? Publishing classified documents which corroborated war crimes, covert surveillance programs, and torture. We pray for his release, and we will never forget how Assange and Wikileaks illuminated public awareness of these shadowy programs so we could begin to protect ourselves.

Follow Taylor Hudak for coverage on the Assange Trial.
Follow the #TBOT Telegram Channel
Follow the #TBOT substack.

In honor of Julian Assange, here are 5 published Wikileaks that expanded our awareness on technology surveillance.

1. The Location of 100 Amazon Data Centers

Amazon, the largest cloud computing provider in the world is also one of the largest cloud providers for government and military. They wouldn’t be doing their jobs if they weren’t protecting the locations of their data centers, unforunately for them - they didn’t see Wikileaks coming. In 2018, Wikileaks published a highly confidential document that listed the IP addresses of one-hundred data centers.

No, there’s no creepy looking Amazon badge on these buildings - these buildings were operated under front companies. The names of these front companies were leaked along with addresses, contact emails, and directions - and a map of their locations.

What secrets lie behind the walls of these unassuming buildings?

https://wikileaks.org/amazon-atlas

2. ELSA, Locating Windows Computers Through WiFi

Leaked in 2017 as part of the Vault 7 CIA hacking tools, ELSA is a geo-location malware project that can detect the location of Windows devices. Once ELSA has infected a target computer, it takes a list of available WiFi access points and cross-references these access points with public geo-location databases supplied by Google or Microsoft. Based on the signal strength it can calculate the position of the device which can be exfiltrated later.

#TBOT Tip: Don’t use Windows. Learn to love Linux.

3. No Isolated Network Is Safe, Brutal Kangaroo

Brutal Kangaroo, also a part of the Vault 7 tools was used to target closed ‘air-gapped’ networks that are not connected to to the outside world. Brutal Kangaroo is deployed using a thumbdrive, and can spread through use of the thumbdrive on other computers. Eventually, controlled computers begin communicating directly with each other to exchange data.

#TBOT Tip: Be watchful over your devices. No external USBs, avoid having USBs delivered.

4. Is your local router a FlyTrap?

CheryBlossom, another tool from Vault 7 is used to capture wireless network devices like wireless routers. Routers can be compromised over the internet through a firmware upgrade, at which point the router becomes a FlyTrap and acts as an ‘Man-In-The-Middle’, manipulating the internet traffic passing through it. It can scan for email addresses, chats, MAC addresses of devices, and VoIP numbers.

#TBOT Tip: Run a VPN on each device to encrypt internet traffic before it reaches a network.

5. Scribbles: Hidden watermarks in printed documents

A tool that has likely been used to catch whistleblowers, Scribbles is yet another Vault 7 project that embeds beacons into Microsoft Office documents. When a whistleblower prints the documents and releases them, the watermark can be restored to discover the source of the leak. Alternative softwares like OpenOffice or LibreOffice made this watermark visible to the target, and it was recommended to make the watermark match the document.

Readers may be reminded of the NSA’s case against whistlerblower Reality Leigh Winner, a former Air Force Linguist who worked for the NSA and sent a printed document to be published at The Intercept. Certain printers use microdots to identify the printer, date and time of printing.

Be careful what you print!
Please open Telegram to view this post
VIEW IN TELEGRAM
👍55🔥7🍌31👏1
Yesterday, one of our channel's subscribers reported that the corner of their screen blinks when viewing videos on Telegram. Today, a possible RCE (found by the group @exploitorg) was detected in Telegram's media processing exclusive to Windows. This exposes users to malicious attacks through media files, such as images or videos.

To rectify this, please follow these steps:
1. Install Linux

Alternatively, disable the auto-download feature:
1. Go to Settings.
2. Tap on Data and Storage.
3. Under the Automatic Media Download section, disable auto-download for "Photos", "Videos", and "Files" across all network types (Mobile Data, Wi-Fi, and Roaming).
😁52🥰18👍15🍌4🤡2😨2
Forwarded from cKure Red
BREAKING: IRANIAN CYBER ATTACK SHUTS DOWN ISRAEL'S ELECTRIC GRID.

Iranian-linked "Cyber Avengers" hacker group has claimed they orchestrated widespread blackouts in Israel, impacting cities like Tel Aviv, Netanya, and more.

The group accused Israeli authorities of dismissing these incidents as mere technical glitches while secretly losing control over their electrical systems.

Asserting dominance, the group warned of additional, potent cyber-attacks on vital Israeli infrastructure.

Source: IRGC TG
😁1193712🔥9🤣3👍2🤯2🤡2🍌2🥰1