Privacy & Security Goys


Гео и язык канала: не указан, Английский
Категория: Политика


"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News
"A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner

Связанные каналы  |  Похожие каналы

Гео и язык канала
не указан, Английский
Категория
Политика
Статистика
Фильтр публикаций


In coordination with Europol, the General Directorate Combating Organized Crime (GDBOP), a specialist unit within Bulgaria's Ministry of Interior, says it has shut down a dozen music piracy sites.

https://torrentfreak.com/music-piracy-sites-targeted-by-europol-bulgarian-organized-crime-unit-240415/
The domains of the dozen music piracy sites targeted “due to numerous violations of intellectual property rights” are reported by GDBOP as follows:

downloadmp3bg.com, baixarmp3gratis.com, www.tekstove.org, mp3pesme.com, mp3piosenki.com, descarca-muzica.com, indirsarki.com, mp3kostenlos.com, mp3hitove.com, mp3greek.gr, xn--3-wtbj.net, mp3aghani.com
The domains now display a seizure banner in Bulgarian (translation alongside)

882 2 22 7 28

Видео недоступно для предпросмотра
Смотреть в Telegram
Telegram founder Pavel Durov tells Tucker Carlson about a few interactions he and his team have had with the FBI.

It is important to note the emphasis on open-source software; the feds were not trying to endorse the use of closed-source, proprietary software. Which, of course, hints at the existence of backdoors in at least one specific open-source library.

I'd recommend watching the full interview.

3k 0 138 27 89




2.6k 1 49 28 80

Видео недоступно для предпросмотра
Смотреть в Telegram
Potential adversaries can use social engineering against customer support wagies to steal your chicken tendies money, and there's little you can do to prevent it.

4.2k 3 149 9 88

Репост из: Opsec matters
plusnigger.org

2.4k 0 126 4 185

The identity of the commander of Israel’s Unit 8200 is a closely guarded secret. He occupies one of the most sensitive roles in the military, leading one of the world’s most powerful surveillance agencies, comparable to the US National Security Agency.

Yet after spending more than two decades operating in the shadows, the Guardian can reveal how the controversial spy chief – whose name is Yossi Sariel – has left his identity exposed online.

The embarrassing security lapse is linked to a book he published on Amazon, which left a digital trail to a private Google account created in his name, along with his unique ID and links to the account’s maps and calendar profiles.

The Guardian has confirmed with multiple sources that Sariel is the secret author of The Human Machine Team, a book in which he offers a radical vision for how artificial intelligence can transform the relationship between military personnel and machines.

Published in 2021 using a pen name composed of his initials, Brigadier General YS, it provides a blueprint for the advanced AI-powered systems that the Israel Defense Forces (IDF) have been pioneering during the six-month war in Gaza.

An electronic version of the book included an anonymous email address that can easily be traced to Sariel’s name and Google account. Contacted by the Guardian, an IDF spokesperson said the email address was not Sariel’s personal one, but "dedicated specifically for issues to do with the book itself."

Later on Friday, in a statement to the Israeli media, the IDF described the book’s exposure of Sariel’s personal details as "a mistake," adding: "The issue will be examined to prevent the recurrence of similar cases in the future."

https://www.theguardian.com/world/2024/apr/05/top-israeli-spy-chief-exposes-his-true-identity-in-online-security-lapse

7.7k 3 184 14 131

Telegram throwing shade at us fr
Rumors about the existence of zero-click vulnerabilities in Telegram Desktop are inaccurate. Some "experts" recommended to "disable automatic downloads" on Telegram — there were no issues which could have been triggered by automatic downloads.

However, on Telegram Desktop, there was an issue that required the user to CLICK on a malicious file while having the Python interpreter installed on their computer. Contrary to earlier reports, this was not a zero-click vulnerability and it could affect only a tiny fraction of our user base: less than 0.01% of our users have Python installed and use the relevant version of Telegram for Desktop.

A server-side fix has been applied to ensure that even this issue no longer reproduces, so all versions of Telegram Desktop (including all older ones) no longer have this issue.

https://www.bleepingcomputer.com/news/security/telegram-fixes-windows-app-zero-day-used-to-launch-python-scripts/

3.1k 1 24 33 51

Репост из: cKure Red
BREAKING: IRANIAN CYBER ATTACK SHUTS DOWN ISRAEL'S ELECTRIC GRID.

Iranian-linked "Cyber Avengers" hacker group has claimed they orchestrated widespread blackouts in Israel, impacting cities like Tel Aviv, Netanya, and more.

The group accused Israeli authorities of dismissing these incidents as mere technical glitches while secretly losing control over their electrical systems.

Asserting dominance, the group warned of additional, potent cyber-attacks on vital Israeli infrastructure.

Source: IRGC TG

3.1k 0 59 26 172



Yesterday, one of our channel's subscribers reported that the corner of their screen blinks when viewing videos on Telegram. Today, a possible RCE (found by the group @exploitorg) was detected in Telegram's media processing exclusive to Windows. This exposes users to malicious attacks through media files, such as images or videos.

To rectify this, please follow these steps:
1. Install Linux

Alternatively, disable the auto-download feature:
1. Go to Settings.
2. Tap on Data and Storage.
3. Under the Automatic Media Download section, disable auto-download for "Photos", "Videos", and "Files" across all network types (Mobile Data, Wi-Fi, and Roaming).

14.1k 10 328 44 87

Репост из: #TakeBackOurTech
⚡️5 Startling Technology Leaks from Julian Assange's Wikileaks
@takebackourtech

Today a judgem
ent was passed in Julian Assange’s extradition case, although it drags the case on and gives the possibility for a final rejection. If this happens, Assange will spend up to 175 years in a US maximum security prison.

His crime? Publishing classified documents which corroborated war crimes, covert surveillance programs, and torture. We pray for his release, and we will never forget how Assange and Wikileaks illuminated public awareness of these shadowy programs so we could begin to protect ourselves.

Follow Taylor Hudak for coverage on the Assange Trial.
Follow the #TBOT Telegram Channel
Follow the #TBOT substack.

In honor of Julian Assange, here are 5 published Wikileaks that expanded our awareness on technology surveillance.

1. The Location of 100 Amazon Data Centers

Amazon, the largest cloud computing provider in the world is also one of the largest cloud providers for government and military. They wouldn’t be doing their jobs if they weren’t protecting the locations of their data centers, unforunately for them - they didn’t see Wikileaks coming. In 2018, Wikileaks published a highly confidential document that listed the IP addresses of one-hundred data centers.

No, there’s no creepy looking Amazon badge on these buildings - these buildings were operated under front companies. The names of these front companies were leaked along with addresses, contact emails, and directions - and a map of their locations.

What secrets lie behind the walls of these unassuming buildings?

https://wikileaks.org/amazon-atlas

2. ELSA, Locating Windows Computers Through WiFi

Leaked in 2017 as part of the Vault 7 CIA hacking tools, ELSA is a geo-location malware project that can detect the location of Windows devices. Once ELSA has infected a target computer, it takes a list of available WiFi access points and cross-references these access points with public geo-location databases supplied by Google or Microsoft. Based on the signal strength it can calculate the position of the device which can be exfiltrated later.

#TBOT Tip: Don’t use Windows. Learn to love Linux.

3. No Isolated Network Is Safe, Brutal Kangaroo

Brutal Kangaroo, also a part of the Vault 7 tools was used to target closed ‘air-gapped’ networks that are not connected to to the outside world. Brutal Kangaroo is deployed using a thumbdrive, and can spread through use of the thumbdrive on other computers. Eventually, controlled computers begin communicating directly with each other to exchange data.

#TBOT Tip: Be watchful over your devices. No external USBs, avoid having USBs delivered.

4. Is your local router a FlyTrap?

CheryBlossom, another tool from Vault 7 is used to capture wireless network devices like wireless routers. Routers can be compromised over the internet through a firmware upgrade, at which point the router becomes a FlyTrap and acts as an ‘Man-In-The-Middle’, manipulating the internet traffic passing through it. It can scan for email addresses, chats, MAC addresses of devices, and VoIP numbers.

#TBOT Tip: Run a VPN on each device to encrypt internet traffic before it reaches a network.

5. Scribbles: Hidden watermarks in printed documents

A tool that has likely been used to catch whistleblowers, Scribbles is yet another Vault 7 project that embeds beacons into Microsoft Office documents. When a whistleblower prints the documents and releases them, the watermark can be restored to discover the source of the leak. Alternative softwares like OpenOffice or LibreOffice made this watermark visible to the target, and it was recommended to make the watermark match the document.

Readers may be reminded of the NSA’s case against whistlerblower Reality Leigh Winner, a former Air Force Linguist who worked for the NSA and sent a printed document to be published at The Intercept. Certain printers use microdots to identify the printer, date and time of printing.

Be careful what you print!

4.6k 0 125 13 58

Репост из: North American News
Gay British Politician catfished into sending the personal phone numbers of his fellow MPs on gay sex app.

Men not sending sensitive info and having shit OPSEC to people they want to bang challenge: impossible

https://www.cbsnews.com/news/uk-sexting-spear-phishing-scam-mp-william-wragg-lawmaker-phone-numbers/
U.K. police investigate "spear phishing" sexting scam as lawmaker admits to sharing colleagues' phone numbers
British police are investigating explicit messages sent to a lawmaker as part of an alleged sexting scam targeting politicians.

4.5k 0 44 11 56




4.6k 1 44 10 99

Closeted zoophiles and other flaming degenerates are seething as the largest furry porn site on the web faces shutdown over age verification laws

https://fxtwitter.com/LuckFoxo33AD/status/1775264524192587844

5.3k 0 52 46 155


4.3k 0 105 36 114

Видео недоступно для предпросмотра
Смотреть в Telegram
👨🏼‍💻

7.6k 3 200 13 161

Репост из: Smokes & Memes is FRONT!
Видео недоступно для предпросмотра
Смотреть в Telegram
Federal Agent

4k 0 35 12 100

Репост из: White Lives Matter Official
Видео недоступно для предпросмотра
Смотреть в Telegram
📌WLM is celebrating it's 3 year anniversary!

This pro-White, legal, & anonymous initiative that has held activism events for 35 months straight was set up to revive our Racial Consciousness and regain our Honor as a People. Through our hard work, WLM has become one of the biggest pro-White forces at street level, and countless groups have spiralled off our efforts.

We speak through ACTION. We build power through ACTION. We achieve the 14 through ACTION.

You are not alone. Join a tribe. Join WLM.
@WLMcontactbot.

@WhiteLives
MatterOfficial
@WLMOfficial14

3.6k 0 18 4 121
Показано 20 последних публикаций.