The Linux Choice 🐧
368 subscribers
708 photos
133 videos
96 files
3.91K links
T-L-C is Channel Everything you need to know about Computer Technology and Security of latest News and Hacks. Also we work on pentesting we made this page to show the skils that we and other people could.Thanks for following us.Will be posting alot. 3301
Download Telegram
or other form of power, and allow individuals passing by to communicate with the device and leave messages or other data at their leisure that could be later retrieved.
Emergency Operations

The very nature of an emergency invariably means that the normal situation is no more and we may require tools like the PirateBox to communicate in a grid down or grid damaged event. Shelter standup could be conducted when there is no access to the internet and a tool like the PirateBox could be deployed to allow communication locally. Minor changes to the PirateBox could be made to provide an announcements tool allowing users to connect and view information being posted by emergency management personnel. This could include scheduling, orders, or lists of casualties updated in real time. The PirateBox can be upgraded to provide an amazing connection capability.
Meetups

The PirateBox could also be a fun tool to stand up during meetings or conventions. You can deploy the device and see who finds it and what they do with it. The very nature of the PirateBox will encourage interaction and sharing. Will someone attempt to upload malware? Photos of their pets? Or will they use it to spread discord or chaos? No way to know until you stand one up and wait and see what happens.
Answers

A mesh network is a method by which infrastructure is deployed to allow bridges, switches, and other devices to communicate directly and non-hierarchically as possible with each other.

A mesh network can be deployed during an emergency to allow computers and other devices to communicate with each other over a wireless connection when the grid is damaged or otherwise unavailable.

The PirateBox is an anonymous offline mobile file-sharing and communications system that can be deployed using off-the-shelf hardware and free software.

The PirateBox provides an image board as well as file sharing.

Conclusion

A mesh network is a vital tool for off grid communication and provides a promising base for developing a local method of communication that is divorced from standard infrastructure. Mesh networking is a defense against the control exerted by centralized resources and their decision on what you may or may not do with the internet.

Projects like the PirateBox can be privacy respecting as is claimed in the goals of the project itself. These projects are often intended to help individuals who are interested in removing themselves from the Facebook, Google, and Ad powered ecosystem that most people are beholden to.

You as a user have an opportunity to contribute to a free internet by adding mesh networking to your equipment or gear bag. You can use battery powered Raspberry PI based devices as well as other alternatives to create and distribute a powerful network that can host any number of files. Contribute to a free internet by building a free internet.
Final Recommendations

Choose *nix.
Build or join a mesh network.
Network and build relationships in real life locally.
Develop your equipment and gear.
Choose freedom.
CISA Issues ICS Advisory for New Vulnerabilities in Treck TCP/IP Stack
http://feedproxy.google.com/~r/Securityweek/~3/XqBVnvG31-Q/cisa-issues-ics-advisory-new-vulnerabilities-treck-tcpip-stack

Security updates available for the Treck TCP/IP stack address two critical vulnerabilities leading to remote code execution or denial-of-service. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory to warn organizations using industrial control systems (ICS) about the risks posed by these flaws.
read more (https://www.securityweek.com/cisa-issues-ics-advisory-new-vulnerabilities-treck-tcpip-stack)
Last week we had reported that SolarWinds was subject to a massive cyberattack and it had left the data of many organizations and government departments exposed and at stake. The fallout continues as earlier this week US Senator Ron Wyden said that dozens of US Treasury email accounts were compromised. Both the US Treasury Department […]
The post US Treasury officials’ Email Accounts Hacked by the Threat Actors Behind SolarWinds Attack (https://gbhackers.com/solarwinds-cyberattack/) appeared first on GBHackers On Security (https://gbhackers.com/).
Watcher : Open Source Cybersecurity Threat Hunting Platform
https://kalilinuxtutorials.com/watcher/

Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organization. It should be used on webservers and available on Docker. Watcher Capabilities Detect emerging vulnerability, malware using social network & other RSS sources (www.cert.ssi.gouv.fr, www.cert.europa.eu, www.us-cert.gov, www.cyber.gov.au…). Detect Keywords in pastebin & in other IT content exchange […]
The post Watcher : Open Source Cybersecurity Threat Hunting Platform (https://kalilinuxtutorials.com/watcher/) appeared first on Kali Linux Tutorials (https://kalilinuxtutorials.com/).
Microsoft security researchers have continued to investigate Solorigate which caused supply chain compromise and the subsequent compromise of cloud assets and have said that the ultimate ambition of the compromise was to pivot to the victims’ cloud assets after deploying the Sunburst/Solorigate backdoor on their local networks. What is Solorigate attack chain? The Solorigate attack […]
The post SolarWinds Hackers Aimed to Access Victim Cloud Assets after deploying the Solorigate Backdoor (https://gbhackers.com/solarsinds-targets-cloud-assets/) appeared first on GBHackers On Security (https://gbhackers.com/).
🎉 HAPPY NEW YEAR 🍾