Google giving far-right users' data to law enforcement, documents reveal
Exclusive: in some cases Google did not necessarily ban users who were often threatening violence or expressing extremist views.
A little-known investigative unit inside search giant Google regularly forwarded detailed personal information on the company’s users to members of a counter-terrorist fusion center in California’s Bay Area, according to leaked documents reviewed by the Guardian.
But checking the documents against Google’s platforms reveals that in some cases Google did not necessarily ban the users they reported to the authorities, and some still have accounts on YouTube, Gmail and other services.
The users were often threatening violence or otherwise expressing extremist views, often associated with the far right.
The documents come from the so-called “Blueleaks” trove, which hackers acquired from the servers of a hosting company in Texas which had been used by several law enforcement agencies. It contains hundreds of thousands of documents from more than 200 agencies, dated between 1996 and June 2020.
👀 👉🏼 https://www.theguardian.com/technology/2020/aug/17/google-giving-user-data-authorities-documents-reveal
#blueleaks #google #userdata #authorities #lawenforcement #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Exclusive: in some cases Google did not necessarily ban users who were often threatening violence or expressing extremist views.
A little-known investigative unit inside search giant Google regularly forwarded detailed personal information on the company’s users to members of a counter-terrorist fusion center in California’s Bay Area, according to leaked documents reviewed by the Guardian.
But checking the documents against Google’s platforms reveals that in some cases Google did not necessarily ban the users they reported to the authorities, and some still have accounts on YouTube, Gmail and other services.
The users were often threatening violence or otherwise expressing extremist views, often associated with the far right.
The documents come from the so-called “Blueleaks” trove, which hackers acquired from the servers of a hosting company in Texas which had been used by several law enforcement agencies. It contains hundreds of thousands of documents from more than 200 agencies, dated between 1996 and June 2020.
👀 👉🏼 https://www.theguardian.com/technology/2020/aug/17/google-giving-user-data-authorities-documents-reveal
#blueleaks #google #userdata #authorities #lawenforcement #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
the Guardian
Google giving far-right users' data to law enforcement, documents reveal
Exclusive: in some cases Google did not necessarily ban users who were often threatening violence or expressing extremist views
ByteDance - TikTok failed to bar users it suspected to be under 13
TikTok says it is for users 13 years and older. But insiders report, the video-sharing-app instructed content moderators not to block children on the platform. Conspicuous videos were escalated to a team in Beijing instead.
According to TikTok’s own rules, users must be at least 13 years old to create an account in the video sharing app. But many children and teenagers don’t care. The app asks for the date of birth, but TikTok does not check whether users are telling the truth.
Internally, TikTok has been aware of the problem for a long time. Not long ago, TikTok and its predecessor musical.ly were mainly populated tby kids; hardly anyone over 14 used the app.
To counter the problem, TikTok has developed an internal system called „user rate“. Content moderators were instructed to classify users into different age groups based to their appearance. This was confirmed to netzpolitik.org by two independent sources with insight into TikTok’s internal moderation practices in Europe. The policy was in place at least until the end of 2019.
Children were not blocked
Remarkable: The accounts of users assumed to be younger than 13 years old were not automatically blocked or suspended. Rather, their videos were restricted in range.
This contradicts TikTok’s rules and the company’s parental guidance. The latter states: „If your teen is under 13 years old and has registered for a TikTok account from 13 years old, you can notify us at privacy@tiktok.com. We will then take appropriate action.“
It is also a violation of European Union data protection laws. According to the General Data Protection Regulation, children and teens under the age of 16 need their parents‘ consent if they want to use apps such as TikTok, Facebook or Instagram. This consent must be given in writing in advance.
👀 👉🏼 🇬🇧 https://netzpolitik.org/2020/bytedance-tiktok-failed-to-bar-users-it-suspected-to-be-under-13/
👀 👉🏼 🇩🇪 https://netzpolitik.org/2020/bytedance-tiktok-hat-kinder-nicht-gesperrt/
#ByteDance #DeleteTikTok #tiktok
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
TikTok says it is for users 13 years and older. But insiders report, the video-sharing-app instructed content moderators not to block children on the platform. Conspicuous videos were escalated to a team in Beijing instead.
According to TikTok’s own rules, users must be at least 13 years old to create an account in the video sharing app. But many children and teenagers don’t care. The app asks for the date of birth, but TikTok does not check whether users are telling the truth.
Internally, TikTok has been aware of the problem for a long time. Not long ago, TikTok and its predecessor musical.ly were mainly populated tby kids; hardly anyone over 14 used the app.
To counter the problem, TikTok has developed an internal system called „user rate“. Content moderators were instructed to classify users into different age groups based to their appearance. This was confirmed to netzpolitik.org by two independent sources with insight into TikTok’s internal moderation practices in Europe. The policy was in place at least until the end of 2019.
Children were not blocked
Remarkable: The accounts of users assumed to be younger than 13 years old were not automatically blocked or suspended. Rather, their videos were restricted in range.
This contradicts TikTok’s rules and the company’s parental guidance. The latter states: „If your teen is under 13 years old and has registered for a TikTok account from 13 years old, you can notify us at privacy@tiktok.com. We will then take appropriate action.“
It is also a violation of European Union data protection laws. According to the General Data Protection Regulation, children and teens under the age of 16 need their parents‘ consent if they want to use apps such as TikTok, Facebook or Instagram. This consent must be given in writing in advance.
👀 👉🏼 🇬🇧 https://netzpolitik.org/2020/bytedance-tiktok-failed-to-bar-users-it-suspected-to-be-under-13/
👀 👉🏼 🇩🇪 https://netzpolitik.org/2020/bytedance-tiktok-hat-kinder-nicht-gesperrt/
#ByteDance #DeleteTikTok #tiktok
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
netzpolitik.org
ByteDance: TikTok failed to bar users it suspected to be under 13 – netzpolitik.org
TikTok says it is for users 13 years and older. But insiders report, the video-sharing-app instructed content moderators not to block children on the platform. Conspicuous videos were escalated to a team in Beijing instead.
The Last Sunny Corner of the Internet? - Setting the Record Straight
The USA accuses Tiktok of lacking data security. With a new platform, Tiktok wants to set things right and win back trust.
While US President Donald Trump criticizes Tiktok's alleged lack of security, the Chinese company is publishing its own website with information on the subject. "In view of the rumours and misinformation about Tiktok that are spreading in Washington and in the media, we should set things right," writes Tiktok there.
👀 👉🏼 https://www.tiktokus.info/
#DeleteTikTok #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The USA accuses Tiktok of lacking data security. With a new platform, Tiktok wants to set things right and win back trust.
While US President Donald Trump criticizes Tiktok's alleged lack of security, the Chinese company is publishing its own website with information on the subject. "In view of the rumours and misinformation about Tiktok that are spreading in Washington and in the media, we should set things right," writes Tiktok there.
👀 👉🏼 https://www.tiktokus.info/
#DeleteTikTok #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Report: Trump campaign’s Russia contacts a ‘grave’ threat
The Trump campaign’s interactions with Russian intelligence services during the 2016 presidential election posed a “grave” counterintelligence threat, a Senate panel concluded Tuesday as it detailed in a report how associates of the Republican candidate had regular contact with Russians and expected to benefit from the Kremlin’s help.
The report, the fifth and final one from the Republican-led Senate intelligence committee on the Russia investigation, describes how Russia launched an aggressive, wide-ranging effort to interfere in the election on Donald Trump’s behalf. It says Trump associates were eager to exploit the Kremlin’s aid, particularly by maximizing the impact of the disclosure of Democratic emails that were hacked by Russian military intelligence officers.
The conclusions mark the culmination of a bipartisan probe that spanned more than three years and produced what the committee called “the most comprehensive denoscription to date of Russia’s activities and the threat they posed.”
The findings echo to a large degree those of special counsel Robert Mueller’s Russia investigation, with the report’s unflinching characterization of furtive interactions between Trump associates and Russian operatives contradicting the Republican president’s claims that the FBI had no basis to investigate whether his campaign was conspiring with Russia.
The report was released as two other Senate committees, the Judiciary and Homeland Security panels, conduct their own reviews of the Russia probe with an eye toward uncovering what they say was FBI misconduct during the early days of the investigation. A prosecutor appointed by Attorney General William Barr, who regards the Russia investigation with skepticism, disclosed his first criminal charge on Friday against a former FBI lawyer who plans to plead guilty to altering a government email.
Among the more striking sections of the nearly 1,000-page report issued Tuesday is the committee’s denoscription of the close professional relationship between former Trump campaign chairman Paul Manafort and Konstantin Kilimnik, whom the committee describes without equivocation as a Russian intelligence officer.
“Taken as a whole, Manafort’s high-level access and willingness to share information with individuals closely affiliated with the Russian intelligence services, particularly Kilimnik, represented a grave counterintelligence threat,” the report says.
The report notes how Manafort shared internal Trump campaign polling data with Kilimnik and says there is “some evidence” that Kilimnik may have been connected to the Kremlin’s operation to hack and leak Democratic emails, though it does not describe that evidence. In addition, the report says that “two pieces of information” raise the possibility of Manafort’s potential connection to those operations, but what follows next in the document is blacked out.
Both men were charged in Mueller’s investigation, but neither was accused of any tie to the hacking.
👀 👉🏼 https://apnews.com/5e833a62e9492f6a66624b7920cc846a
#usa #russia #hacking #hacker #hacked #ToddlerTrump #elections #counterintelligence #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Trump campaign’s interactions with Russian intelligence services during the 2016 presidential election posed a “grave” counterintelligence threat, a Senate panel concluded Tuesday as it detailed in a report how associates of the Republican candidate had regular contact with Russians and expected to benefit from the Kremlin’s help.
The report, the fifth and final one from the Republican-led Senate intelligence committee on the Russia investigation, describes how Russia launched an aggressive, wide-ranging effort to interfere in the election on Donald Trump’s behalf. It says Trump associates were eager to exploit the Kremlin’s aid, particularly by maximizing the impact of the disclosure of Democratic emails that were hacked by Russian military intelligence officers.
The conclusions mark the culmination of a bipartisan probe that spanned more than three years and produced what the committee called “the most comprehensive denoscription to date of Russia’s activities and the threat they posed.”
The findings echo to a large degree those of special counsel Robert Mueller’s Russia investigation, with the report’s unflinching characterization of furtive interactions between Trump associates and Russian operatives contradicting the Republican president’s claims that the FBI had no basis to investigate whether his campaign was conspiring with Russia.
The report was released as two other Senate committees, the Judiciary and Homeland Security panels, conduct their own reviews of the Russia probe with an eye toward uncovering what they say was FBI misconduct during the early days of the investigation. A prosecutor appointed by Attorney General William Barr, who regards the Russia investigation with skepticism, disclosed his first criminal charge on Friday against a former FBI lawyer who plans to plead guilty to altering a government email.
Among the more striking sections of the nearly 1,000-page report issued Tuesday is the committee’s denoscription of the close professional relationship between former Trump campaign chairman Paul Manafort and Konstantin Kilimnik, whom the committee describes without equivocation as a Russian intelligence officer.
“Taken as a whole, Manafort’s high-level access and willingness to share information with individuals closely affiliated with the Russian intelligence services, particularly Kilimnik, represented a grave counterintelligence threat,” the report says.
The report notes how Manafort shared internal Trump campaign polling data with Kilimnik and says there is “some evidence” that Kilimnik may have been connected to the Kremlin’s operation to hack and leak Democratic emails, though it does not describe that evidence. In addition, the report says that “two pieces of information” raise the possibility of Manafort’s potential connection to those operations, but what follows next in the document is blacked out.
Both men were charged in Mueller’s investigation, but neither was accused of any tie to the hacking.
👀 👉🏼 https://apnews.com/5e833a62e9492f6a66624b7920cc846a
#usa #russia #hacking #hacker #hacked #ToddlerTrump #elections #counterintelligence #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
AP News
Trump campaign's Russia contacts 'grave' threat, Senate says
WASHINGTON (AP) — The Trump campaign’s interactions with Russian intelligence services during the 2016 presidential election posed a “grave” counterintelligence threat, a Senate panel concluded Tuesday as it detailed how associates of Donald Trump had regular…
Media is too big
VIEW IN TELEGRAM
Biohackers | First Original Series stored in DNA
DNA storage offers a lot of capacity and longevity. Netflix takes advantage of this and also shows how DNA storage works.
For the Biohackers series, Netflix had the first episode of the new series saved in DNA as a themed advertisement and sent 200 copies of it to fans and interested parties.
📺 👉🏼 https://www.invidio.us/watch?v=DMYgjOHgHxc
#Biohacker #DNA #storage #netflix #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
DNA storage offers a lot of capacity and longevity. Netflix takes advantage of this and also shows how DNA storage works.
For the Biohackers series, Netflix had the first episode of the new series saved in DNA as a themed advertisement and sent 200 copies of it to fans and interested parties.
📺 👉🏼 https://www.invidio.us/watch?v=DMYgjOHgHxc
#Biohacker #DNA #storage #netflix #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Dreamers Dilemma
Enter the realm of dreams in virtual reality, where one person's dream can be shared and experienced by many with the help of technology. But when trailblazing a new virtual frontier, sometimes the dream of succeeding is what's most real.
#vr #virtual #reality #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Enter the realm of dreams in virtual reality, where one person's dream can be shared and experienced by many with the help of technology. But when trailblazing a new virtual frontier, sometimes the dream of succeeding is what's most real.
#vr #virtual #reality #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Oculus - #why
Today, we’re announcing some important updates to how people log into Oculus devices, while still keeping their VR profile. Starting in October 2020, everyone using an Oculus device for the first time will need to log in with a Facebook account.
👀 👉🏼 https://www.oculus.com/blog/a-single-way-to-log-into-oculus-and-unlock-social-features
#oculus #fb #DeleteFacebook #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Today, we’re announcing some important updates to how people log into Oculus devices, while still keeping their VR profile. Starting in October 2020, everyone using an Oculus device for the first time will need to log in with a Facebook account.
👀 👉🏼 https://www.oculus.com/blog/a-single-way-to-log-into-oculus-and-unlock-social-features
#oculus #fb #DeleteFacebook #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Meta
A Single Way to Log Into Oculus and Unlock Social Features | Meta Quest Blog
Today, we’re announcing some important updates to how people log into Oculus devices, while still keeping their VR profile. Starting in October 2020: Everyone using an Oculus device for the first time will need to log in with a Facebook account; if you’re…
Kim Dotcom Predicts NZ Supreme Court Will Rule in Favor of Extradition
Kim Dotcom is predicting that the New Zealand Supreme Court will decide in favor of extraditing him to the United States. The Megaupload founder says that he has faith in at least one judge on the panel, claiming that she knows the "U.S. govt is a rogue operator" and "knows what her fellow Judges are doing and why."
The now-infamous Megaupload case has been treading a tortuous legal path for more than eight years in New Zealand.
The United States Government wants Kim Dotcom, Mathias Ortmann, Bram van der Kolk, and Finn Batato, physically delivered as quickly as possible, to face what has been billed as the largest copyright infringement lawsuit of all time.
After several lower courts determined that the Megaupload defendants should indeed be extradited to the United States, in June 2019 the New Zealand Supreme Court heard the hugely controversial matter. The ‘Megaupload Four’ are hoping that the country’s highest court will see things differently and deny the United States an opportunity to try the men on US soil.
When we spoke to the serial entrepreneur last year, Dotcom wasn’t optimistic.
“I expect a 3:2 majority in favor of extradition because three of the five judges were appointed by the National Party and the former Attorney General who was responsible for the actions taken against me in New Zealand. This is a political case and it will most likely be a political judgment,” he said.
👀 👉🏼 https://torrentfreak.com/kim-dotcom-predicts-nz-supreme-court-will-rule-in-favor-of-extradition-200817/
👀 👉🏼 🇩🇪 https://tarnkappe.info/kim-dotcom-befuerchtet-nach-gerichtsurteil-usa-auslieferung/
#kim #dotcom #megaupload #extradition
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Kim Dotcom is predicting that the New Zealand Supreme Court will decide in favor of extraditing him to the United States. The Megaupload founder says that he has faith in at least one judge on the panel, claiming that she knows the "U.S. govt is a rogue operator" and "knows what her fellow Judges are doing and why."
The now-infamous Megaupload case has been treading a tortuous legal path for more than eight years in New Zealand.
The United States Government wants Kim Dotcom, Mathias Ortmann, Bram van der Kolk, and Finn Batato, physically delivered as quickly as possible, to face what has been billed as the largest copyright infringement lawsuit of all time.
After several lower courts determined that the Megaupload defendants should indeed be extradited to the United States, in June 2019 the New Zealand Supreme Court heard the hugely controversial matter. The ‘Megaupload Four’ are hoping that the country’s highest court will see things differently and deny the United States an opportunity to try the men on US soil.
When we spoke to the serial entrepreneur last year, Dotcom wasn’t optimistic.
“I expect a 3:2 majority in favor of extradition because three of the five judges were appointed by the National Party and the former Attorney General who was responsible for the actions taken against me in New Zealand. This is a political case and it will most likely be a political judgment,” he said.
👀 👉🏼 https://torrentfreak.com/kim-dotcom-predicts-nz-supreme-court-will-rule-in-favor-of-extradition-200817/
👀 👉🏼 🇩🇪 https://tarnkappe.info/kim-dotcom-befuerchtet-nach-gerichtsurteil-usa-auslieferung/
#kim #dotcom #megaupload #extradition
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Torrentfreak
Kim Dotcom Predicts NZ Supreme Court Will Rule in Favor of Extradition * TorrentFreak
Kim Dotcom predicts that the NZ Supreme Court will decide in favor of extradition to the United States to face possibly decades in prison.
Episode 2: Hackers in Hoodies? Demystifying the Cybercriminal
The AnglerPhish Podcast - Hackers in Hoodies? Demystifying the Cybercriminal (Episode 2)
There is a difference between a cybercriminal and a "Hacker" even though the media and many security companies would have you think otherwise. We sit down with real world hacker, Chris Roberts to discuss those differences.
🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 2)
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
There is a difference between a cybercriminal and a "Hacker" even though the media and many security companies would have you think otherwise. We sit down with real world hacker, Chris Roberts to discuss those differences.
🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 2)
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Renowned Costa Rican doctor accused in the U.S. for selling drugs on the “darknet”
The US accuses Costa Rican pharmacist and merchant of shipping restricted narcotics in souvenirs between February 2012 to May 2020; Drug Trafficking Prosecutor's Office in Costa Rica investigated the same facts here but could not prove the crimes.
The United States Department of Justice accused a Costa Rican pharmacist and merchant of allegedly shipping restricted-use narcotics such as morphine, alprazolam and oxycontin, among others, hidden in souvenirs.
The seven-count indictment by a federal grand jury in the District of Columbia, charged David Brian Pate, 44, a U.S. and Costa Rican citizen, and Jose Luis Fung Hou, 38, a Costa Rican citizen, with counts of conspiring with persons to distribute controlled substances, distribution of controlled substances, conspiring with persons to import controlled substances, conspiring to launder money, and laundering of monetary instruments.
👀 👉🏼 PDF: https://www.justice.gov/opa/press-release/file/1301171/download
👀 👉🏼 https://qcostarica.com/renowned-costa-rican-doctor-accused-in-the-u-s-for-selling-drugs-on-the-darknet/
#darknet #trafficking #narcotics #usa #costarica
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The US accuses Costa Rican pharmacist and merchant of shipping restricted narcotics in souvenirs between February 2012 to May 2020; Drug Trafficking Prosecutor's Office in Costa Rica investigated the same facts here but could not prove the crimes.
The United States Department of Justice accused a Costa Rican pharmacist and merchant of allegedly shipping restricted-use narcotics such as morphine, alprazolam and oxycontin, among others, hidden in souvenirs.
The seven-count indictment by a federal grand jury in the District of Columbia, charged David Brian Pate, 44, a U.S. and Costa Rican citizen, and Jose Luis Fung Hou, 38, a Costa Rican citizen, with counts of conspiring with persons to distribute controlled substances, distribution of controlled substances, conspiring with persons to import controlled substances, conspiring to launder money, and laundering of monetary instruments.
👀 👉🏼 PDF: https://www.justice.gov/opa/press-release/file/1301171/download
👀 👉🏼 https://qcostarica.com/renowned-costa-rican-doctor-accused-in-the-u-s-for-selling-drugs-on-the-darknet/
#darknet #trafficking #narcotics #usa #costarica
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
472862136-senate-intel-report-volume5.pdf
50 MB
REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE
UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION
VOLUME 5: COUNTERINTELLIGENCE THREATS AND VULNERABILITIES
👀 👉🏼 PDF (966 pages): https://kryptosjournal.com/uploads/1/3/2/3/132343488/472862136-senate-intel-report-volume5.pdf
👀 👉🏼 https://thehill.com/policy/national-security/512526-manafort-shared-campaign-info-with-russian-intelligence-officer
👀 👉🏼 Report: Trump campaign’s Russia contacts a ‘grave’ threat
https://news.1rj.ru/str/BlackBox_Archiv/1107
#usa #russia #hacking #hacker #hacked #ToddlerTrump #elections #counterintelligence #pdf #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION
VOLUME 5: COUNTERINTELLIGENCE THREATS AND VULNERABILITIES
👀 👉🏼 PDF (966 pages): https://kryptosjournal.com/uploads/1/3/2/3/132343488/472862136-senate-intel-report-volume5.pdf
👀 👉🏼 https://thehill.com/policy/national-security/512526-manafort-shared-campaign-info-with-russian-intelligence-officer
👀 👉🏼 Report: Trump campaign’s Russia contacts a ‘grave’ threat
https://news.1rj.ru/str/BlackBox_Archiv/1107
#usa #russia #hacking #hacker #hacked #ToddlerTrump #elections #counterintelligence #pdf #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
👍1
OVPN: interview with David Wibergh – when privacy matters
The Swedish VPN provider OVPN takes a different approach than most of its competitors. The imprint of ovpn.com contains a summonable address. There are no straw men or cover companies in the Seychelles or anywhere else. We were able to ask David Wibergh, the founder and CEO of OVPN, some questions in our community interview.
Of course, transparency brings a lot of trouble to companies in this branch. Recently, Scandinavian rights holders wanted to take action against OVPN. It was thought that this would expose the Pirate Bay operators. But the provider resisted with legal means.
👀 👉🏼 🇬🇧 https://tarnkappe.info/ovpn-interview-with-david-wibergh-when-privacy-matters/
👀 👉🏼 🇩🇪 https://tarnkappe.info/ovpn-im-interview-wenn-datenschutz-an-erster-stelle-steht/
#interview #ovpn
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Swedish VPN provider OVPN takes a different approach than most of its competitors. The imprint of ovpn.com contains a summonable address. There are no straw men or cover companies in the Seychelles or anywhere else. We were able to ask David Wibergh, the founder and CEO of OVPN, some questions in our community interview.
Of course, transparency brings a lot of trouble to companies in this branch. Recently, Scandinavian rights holders wanted to take action against OVPN. It was thought that this would expose the Pirate Bay operators. But the provider resisted with legal means.
👀 👉🏼 🇬🇧 https://tarnkappe.info/ovpn-interview-with-david-wibergh-when-privacy-matters/
👀 👉🏼 🇩🇪 https://tarnkappe.info/ovpn-im-interview-wenn-datenschutz-an-erster-stelle-steht/
#interview #ovpn
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Tarnkappe.info
OVPN: interview with David Wibergh - when privacy matters
The Swedish VPN provider OVPN takes a different approach than most of its competitors. They rely on transparency instead of obfuscation.
Groundbreaking new material 'could allow artificial intelligence to merge with the human brain'
Scientists have discovered a ground-breaking bio-synthetic material that they claim can be used to merge artificial intelligence with the human brain.
The breakthrough, presented today at the American Chemical Society Fall 2020 virtual expo, is a major step towards integrating electronics with the body to create part human, part robotic "cyborg" beings.
Connecting electronics to human tissue has been a major challenge due to traditional materials like gold, silicon and steel causing scarring when implanted.
👀 👉🏼 https://www.independent.co.uk/life-style/gadgets-and-tech/news/artificial-intelligence-brain-computer-cyborg-elon-musk-neuralink-a9673261.html
#artificial #intelligence #brain #computer #cyborg
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Scientists have discovered a ground-breaking bio-synthetic material that they claim can be used to merge artificial intelligence with the human brain.
The breakthrough, presented today at the American Chemical Society Fall 2020 virtual expo, is a major step towards integrating electronics with the body to create part human, part robotic "cyborg" beings.
Connecting electronics to human tissue has been a major challenge due to traditional materials like gold, silicon and steel causing scarring when implanted.
👀 👉🏼 https://www.independent.co.uk/life-style/gadgets-and-tech/news/artificial-intelligence-brain-computer-cyborg-elon-musk-neuralink-a9673261.html
#artificial #intelligence #brain #computer #cyborg
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The Independent
Material found by scientists 'could merge AI with human brain'
Technology could enable new health diagnostics and achieve Elon Musk's goal of integrating with artificial intelligence
Facebook 'danger to public health' warns report
Health misinformation on Facebook was viewed 3.8 billion times in the past year, peaking during the Covid-19 crisis, a report suggests.
Activist group Avaaz, which conducted the research, said Facebook posed a "major threat" to public health.
Doctors added false claims about vaccines on the social network could limit the numbers prepared to have a Covid jab if one became available.
Facebook said the findings did "not reflect the steps we've taken"
In a statement the firm said: "We share Avaaz's goal of limiting misinformation. Thanks to our global network of fact-checkers, from April to June, we applied warning labels to 98 million pieces of Covid-19 misinformation and removed seven million pieces of content that could lead to imminent harm.
"We've directed over two billion people to resources from health authorities and when someone tries to share a link about Covid-19, we show them a pop-up to connect them with credible health information."
👀 👉🏼 https://www.bbc.co.uk/news/technology-53820225
#fb #DeleteFacebook #fakenews
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Health misinformation on Facebook was viewed 3.8 billion times in the past year, peaking during the Covid-19 crisis, a report suggests.
Activist group Avaaz, which conducted the research, said Facebook posed a "major threat" to public health.
Doctors added false claims about vaccines on the social network could limit the numbers prepared to have a Covid jab if one became available.
Facebook said the findings did "not reflect the steps we've taken"
In a statement the firm said: "We share Avaaz's goal of limiting misinformation. Thanks to our global network of fact-checkers, from April to June, we applied warning labels to 98 million pieces of Covid-19 misinformation and removed seven million pieces of content that could lead to imminent harm.
"We've directed over two billion people to resources from health authorities and when someone tries to share a link about Covid-19, we show them a pop-up to connect them with credible health information."
👀 👉🏼 https://www.bbc.co.uk/news/technology-53820225
#fb #DeleteFacebook #fakenews
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
BBC News
Facebook 'danger to public health' warns report
A study from an activist group suggests health misinformation was viewed 3.8 billion times in the past year.
True privacy and security depend on free software
For all of the assurances you might receive from proprietary software companies that they respect your right to privacy, it is impossible to guarantee that your online communications are actually private without free software. Among technical users, it's common knowledge that privacy is dependent on strong encryption. However, the complex connection between software freedom, encryption, and privacy can be a little difficult to explain in the course of our individual activism, and is due for a more in-depth explanation.
Encryption is about keeping secrets secret, whether that means messages between you and a loved one, sensitive documents, or an entire hard drive. It also isn't only for those with something to hide: making strong encryption part of standard practice increases the safety of all those who really do need it by making it a normal thing to do. When your personal information is at stake, it's all the more important that encryption technology be based on free software. Even the most "benign" proprietary programs have a long history of mistreating their users, and a single "snitch" or backdoor in a proprietary encryption program in some cases could cost lives. At the FSF, we advocate for software freedom in any and all situations -- and in some cases, your safety may depend upon it.
👀 👉🏼 https://www.fsf.org/bulletin/2020/spring/privacy-encryption
#privacy #encryption #backdoor #activism #software #freedom #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
For all of the assurances you might receive from proprietary software companies that they respect your right to privacy, it is impossible to guarantee that your online communications are actually private without free software. Among technical users, it's common knowledge that privacy is dependent on strong encryption. However, the complex connection between software freedom, encryption, and privacy can be a little difficult to explain in the course of our individual activism, and is due for a more in-depth explanation.
Encryption is about keeping secrets secret, whether that means messages between you and a loved one, sensitive documents, or an entire hard drive. It also isn't only for those with something to hide: making strong encryption part of standard practice increases the safety of all those who really do need it by making it a normal thing to do. When your personal information is at stake, it's all the more important that encryption technology be based on free software. Even the most "benign" proprietary programs have a long history of mistreating their users, and a single "snitch" or backdoor in a proprietary encryption program in some cases could cost lives. At the FSF, we advocate for software freedom in any and all situations -- and in some cases, your safety may depend upon it.
👀 👉🏼 https://www.fsf.org/bulletin/2020/spring/privacy-encryption
#privacy #encryption #backdoor #activism #software #freedom #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
www.fsf.org
True privacy and security depend on free software
Fact Check: Feds Did Not Accuse Dark.Fail of a Crime
A leaked FBI document mentions Dark.fail, Dark Eye, Darknetlive, and other onion indexes but the FBI does not refer to any of them as criminal enterprises or claim they are involved in criminal activity.
Several weeks ago, DDOSecrets released a cache of more than 250 GB of files and documents from “police departments, fusion centers and other law enforcement training and support resources.” BlueLeaks, the name given to the dump, contained a small number of internal memos about darkweb marketplaces and forums. One of those documents—a Federal Bureau of Investigation Intelligence Bulletin—included references to four indexes of onion addresses: Dark.Fail, DNStats, Dark Eye, and Darknetlive.
The report, noscriptd “Administrators Operating on the Darknet Likely Relying on Legal Gateways to Route Users, Facilitating the Trafficking of Illicit Products and Services,” relies on the reporting of individuals who have been providing information to the Federal Bureau of Investigation (FBI) for at least two years.
Contrary to rumors spread by misinformed and ill-intentioned users of internet forums, the report does not describe any of the sites as criminal enterprises. Nor does the report state that any of the named sites are involved in criminal activity of any kind. The FBI said the named sites “appear to be operating legally.”
In essence, the document states that law enforcement is now aware that marketplaces are dependent on websites that provide visitors with links for an assortment of onion services.
👀 👉🏼 (TorBrowser)
http://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/fact-check-feds-did-not-call-darkdotfail-a-criminal-enterprise/
#feds #darkdotfail #DDoSecrets #BlueLeaks #leak
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A leaked FBI document mentions Dark.fail, Dark Eye, Darknetlive, and other onion indexes but the FBI does not refer to any of them as criminal enterprises or claim they are involved in criminal activity.
Several weeks ago, DDOSecrets released a cache of more than 250 GB of files and documents from “police departments, fusion centers and other law enforcement training and support resources.” BlueLeaks, the name given to the dump, contained a small number of internal memos about darkweb marketplaces and forums. One of those documents—a Federal Bureau of Investigation Intelligence Bulletin—included references to four indexes of onion addresses: Dark.Fail, DNStats, Dark Eye, and Darknetlive.
The report, noscriptd “Administrators Operating on the Darknet Likely Relying on Legal Gateways to Route Users, Facilitating the Trafficking of Illicit Products and Services,” relies on the reporting of individuals who have been providing information to the Federal Bureau of Investigation (FBI) for at least two years.
Contrary to rumors spread by misinformed and ill-intentioned users of internet forums, the report does not describe any of the sites as criminal enterprises. Nor does the report state that any of the named sites are involved in criminal activity of any kind. The FBI said the named sites “appear to be operating legally.”
In essence, the document states that law enforcement is now aware that marketplaces are dependent on websites that provide visitors with links for an assortment of onion services.
👀 👉🏼 (TorBrowser)
http://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/fact-check-feds-did-not-call-darkdotfail-a-criminal-enterprise/
#feds #darkdotfail #DDoSecrets #BlueLeaks #leak
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Episode 3: Hacktivism. A Conversation with Mike Jones, A Good Man
The AnglerPhish Podcast - Hacktivism. A Conversation with Mike Jones, A Good Man (Episode 3)
Meet Mike Jones--a good man, a former original member of anonymous, a man without a country. Mike sits down with Brett Johnson to discuss some of his history, Hacktivism, Prison Sentences, Privacy, and more.
🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 3)
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Meet Mike Jones--a good man, a former original member of anonymous, a man without a country. Mike sits down with Brett Johnson to discuss some of his history, Hacktivism, Prison Sentences, Privacy, and more.
🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 3)
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Malaysian Navy Documents Uploaded on the Dark Web by Hackers
Documents belonging to the Royal Malaysian Navy have been breached and posted on the dark web although the Malaysian military has dismissed the data as obsolete
When we speak about the numerous cyberattacks that have been orchestrated in brazen campaigns of late, one thing stands out – threat actors breach an organization’s system to access critical files through a loophole, which then exposes the entire system to the attackers.
Although recent times have seen the hacking of victims such as Garmin who ended up parting with millions of dollars for ransom, it appears that threat actors have not restricted their sights to private sector entities – the Royal Malaysian Navy is the latest victim.
Media reports have intimated that about 70 documents belonging to Malaysian Navy were accessed by unknown hackers who uploaded them to a darknet platform.
According to Singapore’s English-language daily newspaper The Straits Times, it turns out that the affected documents were sourced from different threat actors who breached the communication channels belonging to the Malaysian military – including personnel email accounts.
While the newspaper reported the uncertainty to whether the hackers intended to sell the uploaded documents, it was revealed that the affected information touched on details concerning the strength of the Malaysian Navy.
👀 👉🏼
https://www.freemalaysiatoday.com/category/nation/2020/08/17/navy-documents-leaked-on-dark-web-claims-report/
👀 👉🏼 (Tor-Browser)
http://tapeucwutvne7l5o.onion/malaysian-navy-documents-uploaded-on-the-dark-web-by-hackers
#malaysia #navy #hackers #leak #darkweb
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Documents belonging to the Royal Malaysian Navy have been breached and posted on the dark web although the Malaysian military has dismissed the data as obsolete
When we speak about the numerous cyberattacks that have been orchestrated in brazen campaigns of late, one thing stands out – threat actors breach an organization’s system to access critical files through a loophole, which then exposes the entire system to the attackers.
Although recent times have seen the hacking of victims such as Garmin who ended up parting with millions of dollars for ransom, it appears that threat actors have not restricted their sights to private sector entities – the Royal Malaysian Navy is the latest victim.
Media reports have intimated that about 70 documents belonging to Malaysian Navy were accessed by unknown hackers who uploaded them to a darknet platform.
According to Singapore’s English-language daily newspaper The Straits Times, it turns out that the affected documents were sourced from different threat actors who breached the communication channels belonging to the Malaysian military – including personnel email accounts.
While the newspaper reported the uncertainty to whether the hackers intended to sell the uploaded documents, it was revealed that the affected information touched on details concerning the strength of the Malaysian Navy.
👀 👉🏼
https://www.freemalaysiatoday.com/category/nation/2020/08/17/navy-documents-leaked-on-dark-web-claims-report/
👀 👉🏼 (Tor-Browser)
http://tapeucwutvne7l5o.onion/malaysian-navy-documents-uploaded-on-the-dark-web-by-hackers
#malaysia #navy #hackers #leak #darkweb
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Free Malaysia Today (FMT)
Navy documents leaked on Dark Web, claims report
Singapore’s The Straits Times report says documents belonging to the US army and air force were also leaked.
A Five-Year Analysis of the Darknet
The last five years have seen the evolution and adaptation of dark web marketplaces to usher in a new era of cybercrime.
The dark web has played host to a large community of users selling illegal goods and cybercriminal services for years.
The past five years has seen the paradigm shift in the manner in which darknet markets operate, with the evolution of these sites to adapt to changing buyer need, supply chain factors and emerging technologies.
An Overview:
Looking back, Silk Road was launched in the year 2011 at the first dark web marketplace. The years that followed were marked with steady growth that has since expanded. Tor, which happens to be one of the most popular anonymity tools used by darknet market users, was found to host roughly 80,000 platforms, according to a 2015 report.
Experts estimate that the dark web economy garners more than $1 trillion in annual revenues, a staggering figure that surpasses the Gross Domestic Product of several countries of the world.
Indeed, this success can be attributed to the fact that dark web marketplaces have continued to evolve and shift according to metamorphoses of the global threat landscape. The past five years have been marked by significant shifts to emergent platforms, communication channels and products, as darknet user paranoia continues to grow across the board.
In 2019 alone, analysts noted that the emergence of radical changes in the public sphere had a profound effect in the dark web underworld where fake news and propaganda services grew tremendously.
In addition, the channels of darknet communication were subjected to significant changes, along with shift in the manner in which dark web markets and forums were managed.
👀 👉🏼 (Tor-Browser)
http://tapeucwutvne7l5o.onion/a-five-year-analysis-of-the-darknet
#analysis #darknet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The last five years have seen the evolution and adaptation of dark web marketplaces to usher in a new era of cybercrime.
The dark web has played host to a large community of users selling illegal goods and cybercriminal services for years.
The past five years has seen the paradigm shift in the manner in which darknet markets operate, with the evolution of these sites to adapt to changing buyer need, supply chain factors and emerging technologies.
An Overview:
Looking back, Silk Road was launched in the year 2011 at the first dark web marketplace. The years that followed were marked with steady growth that has since expanded. Tor, which happens to be one of the most popular anonymity tools used by darknet market users, was found to host roughly 80,000 platforms, according to a 2015 report.
Experts estimate that the dark web economy garners more than $1 trillion in annual revenues, a staggering figure that surpasses the Gross Domestic Product of several countries of the world.
Indeed, this success can be attributed to the fact that dark web marketplaces have continued to evolve and shift according to metamorphoses of the global threat landscape. The past five years have been marked by significant shifts to emergent platforms, communication channels and products, as darknet user paranoia continues to grow across the board.
In 2019 alone, analysts noted that the emergence of radical changes in the public sphere had a profound effect in the dark web underworld where fake news and propaganda services grew tremendously.
In addition, the channels of darknet communication were subjected to significant changes, along with shift in the manner in which dark web markets and forums were managed.
👀 👉🏼 (Tor-Browser)
http://tapeucwutvne7l5o.onion/a-five-year-analysis-of-the-darknet
#analysis #darknet
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Sixgill_Report_Underground_Financial_Fraud_H1_2020.pdf
703.4 KB
Sixgill Threat Intelligence report - underground financial fraud: h1- 2020
2020 has been an extraordinary year. The new reality of Covid-19 quarantines and shutdowns diverted our attention and put what seems like “real life” largely on hold. During this time, the digital underground continued business as usual, and we witnessed as threat actors continued, without interruption, their trade of malicious content, leaked data, and payment cards.
👀 👉🏼 https://info.cybersixgill.com/underground-financial-fraud-2020
👀 👉🏼 PDF:
https://f.hubspotusercontent30.net/hubfs/5510338/Threat%20Reports/Sixgill_Report_Underground_Financial_Fraud_H1_2020.pdf
#fraud #study #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
2020 has been an extraordinary year. The new reality of Covid-19 quarantines and shutdowns diverted our attention and put what seems like “real life” largely on hold. During this time, the digital underground continued business as usual, and we witnessed as threat actors continued, without interruption, their trade of malicious content, leaked data, and payment cards.
👀 👉🏼 https://info.cybersixgill.com/underground-financial-fraud-2020
👀 👉🏼 PDF:
https://f.hubspotusercontent30.net/hubfs/5510338/Threat%20Reports/Sixgill_Report_Underground_Financial_Fraud_H1_2020.pdf
#fraud #study #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Facebook-Comments-to-FTC-on-Data-Portability.pdf
1.6 MB
Comments to the Federal Trade Commission on Data Portability (AUGUST 21,2020)
👀 👉🏼 PDF 🇬🇧:
https://about.fb.com/wp-content/uploads/2020/08/Facebook-Comments-to-FTC-on-Data-Portability.pdf
👀 👉🏼 🇬🇧 https://uk.reuters.com/article/us-facebook-antitrust/facebook-pushes-for-data-portability-legislation-ahead-of-ftc-hearing-idUKKBN25H0BG
👀 👉🏼 🇩🇪 https://t3n.de/news/datenportabilitaet-facebook-mehr-1314513
#fb #DeleteFacebook #ftc #data #portability #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
👀 👉🏼 PDF 🇬🇧:
https://about.fb.com/wp-content/uploads/2020/08/Facebook-Comments-to-FTC-on-Data-Portability.pdf
👀 👉🏼 🇬🇧 https://uk.reuters.com/article/us-facebook-antitrust/facebook-pushes-for-data-portability-legislation-ahead-of-ftc-hearing-idUKKBN25H0BG
👀 👉🏼 🇩🇪 https://t3n.de/news/datenportabilitaet-facebook-mehr-1314513
#fb #DeleteFacebook #ftc #data #portability #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag