Firefox Daylight for Android arrives with Enhanced Tracking Protection, new UI, and GeckoView
After more than a year of development, Mozilla today launched Firefox 79 for Android, branded Firefox Daylight. Like Firefox 57 Quantum, Firefox Daylight gets its own name as it marks “a new beginning for our Android browser.” The new version is “an entirely overhauled, faster, and more convenient product.” Firefox Daylight includes Enhanced Tracking Protection on by default, a new user interface, Mozilla’s own mobile browser engine GeckoView, and a slew of new features. Mozilla is rolling out the new Firefox for Android globally, starting in Germany, France, and the U.K. today and in North America from August 27.
Firefox has about 200 million active users, according to Mozilla, making it a major platform for web developers to consider. But that number has been steadily falling over the years. Furthermore, on mobile, where users are less likely to change their default browser, Firefox holds less than 1% market share, according to Net Applications. That’s why the company decided to hit reset on its Android browser.
The launch comes at a difficult time for Mozilla, which earlier this month announced layoffs of about 250 employees. We spoke with Mozilla senior product manager Vesta Zare about the Firefox Daylight launch. “I wouldn’t say it was impacted that much by the layoffs, but of course everyone was impacted,” Zare said. “But I do want to stress that this remains a priority, a high area of focus for us, especially on mobile.”
👀 👉🏼 https://venturebeat.com/2020/08/25/firefox-daylight-android-enhanced-tracking-protection-geckoview/
#mozilla #firefox #GeckoView #browser #android #tracking #protection
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
After more than a year of development, Mozilla today launched Firefox 79 for Android, branded Firefox Daylight. Like Firefox 57 Quantum, Firefox Daylight gets its own name as it marks “a new beginning for our Android browser.” The new version is “an entirely overhauled, faster, and more convenient product.” Firefox Daylight includes Enhanced Tracking Protection on by default, a new user interface, Mozilla’s own mobile browser engine GeckoView, and a slew of new features. Mozilla is rolling out the new Firefox for Android globally, starting in Germany, France, and the U.K. today and in North America from August 27.
Firefox has about 200 million active users, according to Mozilla, making it a major platform for web developers to consider. But that number has been steadily falling over the years. Furthermore, on mobile, where users are less likely to change their default browser, Firefox holds less than 1% market share, according to Net Applications. That’s why the company decided to hit reset on its Android browser.
The launch comes at a difficult time for Mozilla, which earlier this month announced layoffs of about 250 employees. We spoke with Mozilla senior product manager Vesta Zare about the Firefox Daylight launch. “I wouldn’t say it was impacted that much by the layoffs, but of course everyone was impacted,” Zare said. “But I do want to stress that this remains a priority, a high area of focus for us, especially on mobile.”
👀 👉🏼 https://venturebeat.com/2020/08/25/firefox-daylight-android-enhanced-tracking-protection-geckoview/
#mozilla #firefox #GeckoView #browser #android #tracking #protection
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
VentureBeat
Firefox Daylight for Android arrives with Enhanced Tracking Protection, new UI, and GeckoView
Firefox Daylight for Android includes Enhanced Tracking Protection on by default, a new user interface, GeckoView, and a slew of new features.
Kindle Collects a Surprisingly Large Amount of Data
Turns out, Kindle Collects a Ton of Data
The Kindle sends device information, usage metadata, and details about every interaction with the device (or app) while it's being used. All of this is linked directly to the reader account.
Opening the app, reading a book, flipping through a few pages, then closing the book sends over 100 requests to Amazon servers.
👀 👉🏼 https://nullsweep.com/kindle-collects-a-surprisingly-large-amount-of-data/
#kindle #surveillance #data #collection #amazon #DeleteAmazon #thinkabout #poc
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Turns out, Kindle Collects a Ton of Data
The Kindle sends device information, usage metadata, and details about every interaction with the device (or app) while it's being used. All of this is linked directly to the reader account.
Opening the app, reading a book, flipping through a few pages, then closing the book sends over 100 requests to Amazon servers.
👀 👉🏼 https://nullsweep.com/kindle-collects-a-surprisingly-large-amount-of-data/
#kindle #surveillance #data #collection #amazon #DeleteAmazon #thinkabout #poc
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
72: Bangladesh Bank Heist
Bangladesh Bank Heist - Darknet Diaries
This story is about a bank robbery with the objective to steal 1 billion dollars. Which makes this the largest bank robbery in history. And it was all done over a computer.
🎧 👉🏼 https://darknetdiaries.com/episode/72/
#darknetdiaries #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
This story is about a bank robbery with the objective to steal 1 billion dollars. Which makes this the largest bank robbery in history. And it was all done over a computer.
🎧 👉🏼 https://darknetdiaries.com/episode/72/
#darknetdiaries #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Episode 14: Women in Cybersecurity 1 - The Story of Mia Greene
The AnglerPhish Podcast - Women in Cybersecurity 1 - The Story of Mia Greene (Episode 14)
Cybersecurity Ventures research shows that women represented 20% of the global cybersecurity workforce at the end of 2019. That a vast improvement from 2013 when it was only 11%. But it's not good enough. As part of a Two Episode Special, Mia Greene visits Anglerphish to tell her story and trouble of entering the cybersecurity workforce.
🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 14)
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Cybersecurity Ventures research shows that women represented 20% of the global cybersecurity workforce at the end of 2019. That a vast improvement from 2013 when it was only 11%. But it's not good enough. As part of a Two Episode Special, Mia Greene visits Anglerphish to tell her story and trouble of entering the cybersecurity workforce.
🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 14)
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
WebBundles Harmful to Content Blocking, Security Tools, and the Open Web (Standards Updates #2)
This is second in a series of blog posts describing new and proposed web standards and how they support or threaten web privacy.
In a Nutshell…
Google is proposing a new standard called WebBundles. This standard allows websites to “bundle” resources together, and will make it impossible for browsers to reason about sub-resources by URL. This threatens to change the Web from a hyperlinked collection of resources (that can be audited, selectively fetched, or even replaced), to opaque all-or-nothing “blobs” (like PDFs or SWFs). Organizations, users, researchers and regulators who believe in an open, user-serving, transparent Web should oppose this standard.
While we appreciate the problems the WebBundles and related proposals aim to solve,[1] we believe there are other, better ways of achieving the same ends without compromising the open, transparent, user-first nature of the Web. One potential alternative is to use signed commitments over independently-fetched subresources. These alternatives would fill a separate post, and some have already been shared with spec authors.
The Web Is Uniquely Open, and URLs Are Why
The Web is valuable because it’s user-centric, user-controllable, user-editable. Users, with only a small amount of expertise, can see what web-resources a page includes, and decide which, if any, their browser should load; and non-expert users can take advantage of this knowledge by installing extensions or privacy protecting tools.
The user-centric nature of the Web is very different from most application and information distribution systems. Most applications are compiled collections of code and resources which are difficult-to-impossible to distinguish and reason about. This difference is important, and is part of the reason there are many privacy-protecting tools for the Web, but very few for “binary” application systems.
At root, what makes the Web different, more open, more user-centric than other application systems, is the URL. Because URLs (generally) point to one thing[2], researchers and activists can measure, analyze and reason about those URLs in advance; other users can then use this information to make decisions about whether, and in what way, they’d like to load the thing the URL points to. More important, experts can load https://tracker.com/code.js, determine that it’s privacy-violating, and share that information with other users so that they know not to load that code in the future.
👀 👉🏼 https://brave.com/webbundles-harmful-to-content-blocking-security-tools-and-the-open-web/
#brave #webbundles #contentblocking #security #tools
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
This is second in a series of blog posts describing new and proposed web standards and how they support or threaten web privacy.
In a Nutshell…
Google is proposing a new standard called WebBundles. This standard allows websites to “bundle” resources together, and will make it impossible for browsers to reason about sub-resources by URL. This threatens to change the Web from a hyperlinked collection of resources (that can be audited, selectively fetched, or even replaced), to opaque all-or-nothing “blobs” (like PDFs or SWFs). Organizations, users, researchers and regulators who believe in an open, user-serving, transparent Web should oppose this standard.
While we appreciate the problems the WebBundles and related proposals aim to solve,[1] we believe there are other, better ways of achieving the same ends without compromising the open, transparent, user-first nature of the Web. One potential alternative is to use signed commitments over independently-fetched subresources. These alternatives would fill a separate post, and some have already been shared with spec authors.
The Web Is Uniquely Open, and URLs Are Why
The Web is valuable because it’s user-centric, user-controllable, user-editable. Users, with only a small amount of expertise, can see what web-resources a page includes, and decide which, if any, their browser should load; and non-expert users can take advantage of this knowledge by installing extensions or privacy protecting tools.
The user-centric nature of the Web is very different from most application and information distribution systems. Most applications are compiled collections of code and resources which are difficult-to-impossible to distinguish and reason about. This difference is important, and is part of the reason there are many privacy-protecting tools for the Web, but very few for “binary” application systems.
At root, what makes the Web different, more open, more user-centric than other application systems, is the URL. Because URLs (generally) point to one thing[2], researchers and activists can measure, analyze and reason about those URLs in advance; other users can then use this information to make decisions about whether, and in what way, they’d like to load the thing the URL points to. More important, experts can load https://tracker.com/code.js, determine that it’s privacy-violating, and share that information with other users so that they know not to load that code in the future.
👀 👉🏼 https://brave.com/webbundles-harmful-to-content-blocking-security-tools-and-the-open-web/
#brave #webbundles #contentblocking #security #tools
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Brave
WebBundles Harmful to Content Blocking, Security Tools, and the Open Web | Brave
Google is proposing a new standard called WebBundles. This standard allows websites to “bundle” resources together, and will make it impossible for browsers to reason about sub-resources by URL. While we appreciate the problems the WebBundles and related…
koyu.space - We are creating free internet services for you and your friends
👀 👉🏼 https://koyu.space/about
#koyu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
👀 👉🏼 https://koyu.space/about
#koyu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Face recognition: Algorithms based on protective masks often fail
Many manufacturers of technology for biometric face recognition have recently claimed that they have adapted their algorithms to nose-mouth masks and can now identify even partially concealed persons fairly accurately. However, the latest results of a study by the U.S. standards authority NIST show that the masks significantly increase the error rates of new systems as well.
In an update to previous research published on Tuesday, the Institute for Standards and Technology examined 41 algorithms for automatic face recognition that developers had submitted after mid-March during the Covid 19 disease epidemic that was spreading rapidly in western countries. Many of them are said to have been specifically designed or revised with face masks in mind. An initial test by NIST of algorithms not adapted for masks had shown that even the 89 best of these had error rates between five and 50 percent.
👀 👉🏼 https://pages.nist.gov/frvt/html/frvt_facemask.html
#biometric #facerecognition #NIST
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Many manufacturers of technology for biometric face recognition have recently claimed that they have adapted their algorithms to nose-mouth masks and can now identify even partially concealed persons fairly accurately. However, the latest results of a study by the U.S. standards authority NIST show that the masks significantly increase the error rates of new systems as well.
In an update to previous research published on Tuesday, the Institute for Standards and Technology examined 41 algorithms for automatic face recognition that developers had submitted after mid-March during the Covid 19 disease epidemic that was spreading rapidly in western countries. Many of them are said to have been specifically designed or revised with face masks in mind. An initial test by NIST of algorithms not adapted for masks had shown that even the 89 best of these had error rates between five and 50 percent.
👀 👉🏼 https://pages.nist.gov/frvt/html/frvt_facemask.html
#biometric #facerecognition #NIST
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A Look at Kdenlive – Libre Video Editor for GNU/Linux
I have done my fair share (or more) of video editing in my life, primarily using Adobe Premiere Pro as I was taught in college. However, I try not to use Windows unless I have to, and so I’ve been always on the hunt for better options for my GNU/Linux systems – and I think I’ve found my personal favourite video editor; Kdenlive.
Kdenlive is a free video editor that up until this point, has yet to let me down for my personal needs, and has also been easily the simplest and fastest for encoding and exporting videos.
💡 Kdenlive features
The Kdenlive website lists the features as:
✅ Multi-track video editing
✅ Use any audio / video format
✅ Configurable interface and shortcuts
✅ Titler
✅ Many effects and transitions
✅ Audio and video scopes
✅ Proxy editing
✅ Online resources
✅ Timeline preview
✅ Keyframeable effects
✅ Themable interface
👀 👉🏼 https://www.ghacks.net/2020/08/26/a-look-at-kdenlive-libre-video-editor-for-gnu-linux/
👀 👉🏼 https://kdenlive.org/en/
#kdenlive #video #editor #linux #gnu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
I have done my fair share (or more) of video editing in my life, primarily using Adobe Premiere Pro as I was taught in college. However, I try not to use Windows unless I have to, and so I’ve been always on the hunt for better options for my GNU/Linux systems – and I think I’ve found my personal favourite video editor; Kdenlive.
Kdenlive is a free video editor that up until this point, has yet to let me down for my personal needs, and has also been easily the simplest and fastest for encoding and exporting videos.
💡 Kdenlive features
The Kdenlive website lists the features as:
✅ Multi-track video editing
✅ Use any audio / video format
✅ Configurable interface and shortcuts
✅ Titler
✅ Many effects and transitions
✅ Audio and video scopes
✅ Proxy editing
✅ Online resources
✅ Timeline preview
✅ Keyframeable effects
✅ Themable interface
👀 👉🏼 https://www.ghacks.net/2020/08/26/a-look-at-kdenlive-libre-video-editor-for-gnu-linux/
👀 👉🏼 https://kdenlive.org/en/
#kdenlive #video #editor #linux #gnu
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The head of Denmark’s spy program has been fired for snooping on citizens and lying about it
The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following revelations from a whistleblower. The officials, including the head of the agency, Lars Finden, have been “relieved of duty for the time being” following the release of a trove of documents. The documents detailed that the FE has been illegally spying on Danish citizens in the last six years and were released by an unnamed whistleblower to the independent regulator of Danish security services which is known as Tilsynet med Efterretningstjenesterne (TET).
Whistleblower reveals Danish spying, gets Danish spy chief fired
According to a press release by the TET, Danish intelligence had maintained “operational activities in violation of Danish law, including obtaining and passing on a significant amount of information about Danish citizens.” Additionally, the TET noted that the FE had not only withheld information but actually reported back to overseers “incorrect information on matters relating to the collection of the service and disclosure of information.”
Prior to the whistleblower’s documents making their way to the TET, the FE had been stonewalling investigations on whether foreign intelligence spying capabilities had been used on domestic targets. The press release went on to note that Danish intelligence actually passed on the information to other countries. Unfortunately, due to the “extremely sensitive” nature of the information, it’s possible that we’ll ever know specifically who was spied on, for whom, or why.
👀 👉🏼 🇬🇧 https://www.privateinternetaccess.com/blog/the-head-of-denmarks-spy-program-has-been-fired-for-snooping-on-citizens-and-lying-about-it/
#denmark #spy #spionage #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following revelations from a whistleblower. The officials, including the head of the agency, Lars Finden, have been “relieved of duty for the time being” following the release of a trove of documents. The documents detailed that the FE has been illegally spying on Danish citizens in the last six years and were released by an unnamed whistleblower to the independent regulator of Danish security services which is known as Tilsynet med Efterretningstjenesterne (TET).
Whistleblower reveals Danish spying, gets Danish spy chief fired
According to a press release by the TET, Danish intelligence had maintained “operational activities in violation of Danish law, including obtaining and passing on a significant amount of information about Danish citizens.” Additionally, the TET noted that the FE had not only withheld information but actually reported back to overseers “incorrect information on matters relating to the collection of the service and disclosure of information.”
Prior to the whistleblower’s documents making their way to the TET, the FE had been stonewalling investigations on whether foreign intelligence spying capabilities had been used on domestic targets. The press release went on to note that Danish intelligence actually passed on the information to other countries. Unfortunately, due to the “extremely sensitive” nature of the information, it’s possible that we’ll ever know specifically who was spied on, for whom, or why.
👀 👉🏼 🇬🇧 https://www.privateinternetaccess.com/blog/the-head-of-denmarks-spy-program-has-been-fired-for-snooping-on-citizens-and-lying-about-it/
#denmark #spy #spionage #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
PIA VPN Blog
The head of Denmark's spy program has been fired for snooping on citizens and lying about it
The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following
Confessions of an ID Theft Kingpin, Part I
At the height of his cybercriminal career, the hacker known as “Hieupc” was earning $125,000 a month running a bustling identity theft service that siphoned consumer dossiers from some of the world’s top data brokers. That is, until his greed and ambition played straight into an elaborate snare set by the U.S. Secret Service. Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good.
For several years beginning around 2010, a lone teenager in Vietnam named Hieu Minh Ngo ran one of the Internet’s most profitable and popular services for selling “fullz,” stolen identity records that included a consumer’s name, date of birth, Social Security number and email and physical address.
Ngo got his treasure trove of consumer data by hacking and social engineering his way into a string of major data brokers. By the time the Secret Service caught up with him in 2013, he’d made over $3 million selling fullz data to identity thieves and organized crime rings operating throughout the United States.
Matt O’Neill is the Secret Service agent who in February 2013 successfully executed a scheme to lure Ngo out of Vietnam and into Guam, where the young hacker was arrested and sent to the mainland U.S. to face prosecution. O’Neill now heads the agency’s Global Investigative Operations Center, which supports investigations into transnational organized criminal groups.
👀 👉🏼 https://krebsonsecurity.com/2020/08/confessions-of-an-id-theft-kingpin-part-i/
#confessions #idtheft #kingpin
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
At the height of his cybercriminal career, the hacker known as “Hieupc” was earning $125,000 a month running a bustling identity theft service that siphoned consumer dossiers from some of the world’s top data brokers. That is, until his greed and ambition played straight into an elaborate snare set by the U.S. Secret Service. Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good.
For several years beginning around 2010, a lone teenager in Vietnam named Hieu Minh Ngo ran one of the Internet’s most profitable and popular services for selling “fullz,” stolen identity records that included a consumer’s name, date of birth, Social Security number and email and physical address.
Ngo got his treasure trove of consumer data by hacking and social engineering his way into a string of major data brokers. By the time the Secret Service caught up with him in 2013, he’d made over $3 million selling fullz data to identity thieves and organized crime rings operating throughout the United States.
Matt O’Neill is the Secret Service agent who in February 2013 successfully executed a scheme to lure Ngo out of Vietnam and into Guam, where the young hacker was arrested and sent to the mainland U.S. to face prosecution. O’Neill now heads the agency’s Global Investigative Operations Center, which supports investigations into transnational organized criminal groups.
👀 👉🏼 https://krebsonsecurity.com/2020/08/confessions-of-an-id-theft-kingpin-part-i/
#confessions #idtheft #kingpin
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Krebsonsecurity
Confessions of an ID Theft Kingpin, Part I
At the height of his cybercriminal career, the hacker known as "Hieupc" was earning $125,000 a month running a bustling identity theft service that siphoned consumer dossiers from some of the world's top data brokers. That is, until his greed…
fpinspector-sp2021.pdf
543.5 KB
FP-Inspector
Artifact release for our IEEE Symposium on Security and Privacy 2021 paper ennoscriptd Fingerprinting the Fingerprinters
👀 👉🏼 Fingerprinting the Fingerprinters:Learning to Detect Browser Fingerprinting Behaviors (PDF)
https://umariqbal.com/papers/fpinspector-sp2021.pdf
👀 👉🏼 https://github.com/uiowa-irl/FP-Inspector
#fpinspector #fingerprinting #browser #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Artifact release for our IEEE Symposium on Security and Privacy 2021 paper ennoscriptd Fingerprinting the Fingerprinters
👀 👉🏼 Fingerprinting the Fingerprinters:Learning to Detect Browser Fingerprinting Behaviors (PDF)
https://umariqbal.com/papers/fpinspector-sp2021.pdf
👀 👉🏼 https://github.com/uiowa-irl/FP-Inspector
#fpinspector #fingerprinting #browser #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
China Secretly Built A Vast New Infrastructure To Imprison Muslims (part 1)
(This project was supported by the Open Technology Fund, the Pulitzer Center, and the Eyebeam Center for the Future of Journalism).
China has secretly built scores of massive new prison and internment camps in the past three years, dramatically escalating its campaign against Muslim minorities even as it publicly claimed the detainees had all been set free. The construction of these purpose-built, high-security camps — some capable of housing tens of thousands of people — signals a radical shift away from the country’s previous makeshift use of public buildings, like schools and retirement homes, to a vast and permanent infrastructure for mass detention.
In the most extensive investigation of China’s internment camp system ever done using publicly available satellite images, coupled with dozens of interviews with former detainees, BuzzFeed News identified more than 260 structures built since 2017 and bearing the hallmarks of fortified detention compounds. There is at least one in nearly every county in the far-west region of Xinjiang. During that time, the investigation shows, China has established a sprawling system to detain and incarcerate hundreds of thousands of Uighurs, Kazakhs, and other Muslim minorities, in what is already the largest-scale detention of ethnic and religious minorities since World War II.
These forbidding facilities — including several built or significantly expanded within the last year — are part of the government’s unprecedented campaign of mass detention of more than a million people, which began in late 2016. That year Chen Quanguo, the region’s top official and Communist Party boss, whom the US recently sanctioned over human rights abuses, also put Muslim minorities — more than half the region’s population of about 25 million — under perpetual surveillance via facial recognition cameras, cellphone tracking, checkpoints, and heavy-handed human policing. They are also subject to many other abuses, ranging from sterilization to forced labor.
👀 👉🏼 (part 1)
https://www.buzzfeednews.com/article/meghara/china-new-internment-camps-internment-uighurs-muslims
👀 👉🏼 (part 2)
https://www.buzzfeednews.com/article/alison_killing/china-ex-prisoners-horrors-xinjiang-camps-uighurs
#china #internment #camps #internment #xinjiang #uighurs #muslims #prisoners #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
(This project was supported by the Open Technology Fund, the Pulitzer Center, and the Eyebeam Center for the Future of Journalism).
China has secretly built scores of massive new prison and internment camps in the past three years, dramatically escalating its campaign against Muslim minorities even as it publicly claimed the detainees had all been set free. The construction of these purpose-built, high-security camps — some capable of housing tens of thousands of people — signals a radical shift away from the country’s previous makeshift use of public buildings, like schools and retirement homes, to a vast and permanent infrastructure for mass detention.
In the most extensive investigation of China’s internment camp system ever done using publicly available satellite images, coupled with dozens of interviews with former detainees, BuzzFeed News identified more than 260 structures built since 2017 and bearing the hallmarks of fortified detention compounds. There is at least one in nearly every county in the far-west region of Xinjiang. During that time, the investigation shows, China has established a sprawling system to detain and incarcerate hundreds of thousands of Uighurs, Kazakhs, and other Muslim minorities, in what is already the largest-scale detention of ethnic and religious minorities since World War II.
These forbidding facilities — including several built or significantly expanded within the last year — are part of the government’s unprecedented campaign of mass detention of more than a million people, which began in late 2016. That year Chen Quanguo, the region’s top official and Communist Party boss, whom the US recently sanctioned over human rights abuses, also put Muslim minorities — more than half the region’s population of about 25 million — under perpetual surveillance via facial recognition cameras, cellphone tracking, checkpoints, and heavy-handed human policing. They are also subject to many other abuses, ranging from sterilization to forced labor.
👀 👉🏼 (part 1)
https://www.buzzfeednews.com/article/meghara/china-new-internment-camps-internment-uighurs-muslims
👀 👉🏼 (part 2)
https://www.buzzfeednews.com/article/alison_killing/china-ex-prisoners-horrors-xinjiang-camps-uighurs
#china #internment #camps #internment #xinjiang #uighurs #muslims #prisoners #thinkabout #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
BuzzFeed.News
What They Saw: Ex-Prisoners Detail The Horrors Of China's Detention Camps
Hundreds of thousands of Muslims have been held inside Xinjiang’s camps, but very little is known about life inside. BuzzFeed News spoke to dozens of ex-detainees.
Tesla Insider Works with FBI to Turn the Tables on Russia’s Million Dollar Attempt to Hijack the Network
On August 25, the Department of Justice announced the arrest of Egor Igorevich Kriuchkov, a citizen of Russia, for conspiring to breach the network of a U.S. company and introduce malware into the company’s network Media has identified the company as Tesla’s GigaFactory in Sparks, NV. Kriuchkov was arrested on August 22 as he tried to depart Los Angeles for Russia, and has been detained pending trial.
Unpacking the criminal complaint filed by the FBI Las Vegas Field office, it is clear this isn’t an ordinary attempt to infuse malware into a company’s network, but rather an effort led by a well-financed and logistically nimble organization.
The Tesla Insider Starts the Chain of Events that Led to Success
While the insider’s identity is not known, we do know that the insider is the hero of this tale.
We are able to deduce from the court documents that the insider is a Russian speaking, non-U.S. citizen working in the Tesla GigaFactory in Sparks, NV who has direct access to Tesla’s computer network. When approached, the insider listened and then took appropriate action. He reported the approach to the company, and the company quickly contacted the FBI. The FBI stepped in and obtained the cooperation of the Tesla employee.
Based on the manner of the approach, it is clear that the Russians had conducted operational surveillance of Tesla, the network, and had a means to identify employees. The fact that they targeted a non-U.S. citizen employee and one who spoke Russian, implies their research and surveillance has a nexus in Russia.
👀 👉🏼 UNITED STATES DISTRICT COURT DISTRICT OF NEVADA (PDF)
https://www.heise.de/downloads/18/2/9/5/8/0/4/4/complaint-egor_kriuchkov_3-20-mj-83_0_0.pdf
👀 👉🏼 🇬🇧 https://news.clearancejobs.com/2020/08/26/tesla-insider-works-with-fbi-to-turn-the-tables-on-russias-million-dollar-attempt-to-hijack-the-network/
👀 👉🏼 🇩🇪 https://www.heise.de/newsticker/meldung/Tesla-sollte-angeblich-Ziel-einer-Daten-Erpressung-werden-4880723.html
#tesla #fbi #russia #hijacking #malware #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
On August 25, the Department of Justice announced the arrest of Egor Igorevich Kriuchkov, a citizen of Russia, for conspiring to breach the network of a U.S. company and introduce malware into the company’s network Media has identified the company as Tesla’s GigaFactory in Sparks, NV. Kriuchkov was arrested on August 22 as he tried to depart Los Angeles for Russia, and has been detained pending trial.
Unpacking the criminal complaint filed by the FBI Las Vegas Field office, it is clear this isn’t an ordinary attempt to infuse malware into a company’s network, but rather an effort led by a well-financed and logistically nimble organization.
The Tesla Insider Starts the Chain of Events that Led to Success
While the insider’s identity is not known, we do know that the insider is the hero of this tale.
We are able to deduce from the court documents that the insider is a Russian speaking, non-U.S. citizen working in the Tesla GigaFactory in Sparks, NV who has direct access to Tesla’s computer network. When approached, the insider listened and then took appropriate action. He reported the approach to the company, and the company quickly contacted the FBI. The FBI stepped in and obtained the cooperation of the Tesla employee.
Based on the manner of the approach, it is clear that the Russians had conducted operational surveillance of Tesla, the network, and had a means to identify employees. The fact that they targeted a non-U.S. citizen employee and one who spoke Russian, implies their research and surveillance has a nexus in Russia.
👀 👉🏼 UNITED STATES DISTRICT COURT DISTRICT OF NEVADA (PDF)
https://www.heise.de/downloads/18/2/9/5/8/0/4/4/complaint-egor_kriuchkov_3-20-mj-83_0_0.pdf
👀 👉🏼 🇬🇧 https://news.clearancejobs.com/2020/08/26/tesla-insider-works-with-fbi-to-turn-the-tables-on-russias-million-dollar-attempt-to-hijack-the-network/
👀 👉🏼 🇩🇪 https://www.heise.de/newsticker/meldung/Tesla-sollte-angeblich-Ziel-einer-Daten-Erpressung-werden-4880723.html
#tesla #fbi #russia #hijacking #malware #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Walmart is teaming up with Microsoft on TikTok bid
Walmart confirmed it's teaming up with Microsoft in a bid for TikTok.
TikTok is nearing an agreement to sell its U.S., Canadian, Australian and New Zealand operations in a deal that's likely to be in the $20 billion to $30 billion range, sources say.
In a statement, the big-box retailer said TikTok's integration of e-commerce and advertising "is a clear benefit to creators and users in those markets."
Walmart said it's teaming up with Microsoft in a bid for TikTok.
The retail giant confirmed to CNBC that it's interested in buying the popular short-form video application.
Walmart shares are up nearly 5% on the news.
TikTok's Beijing-based parent company, ByteDance, is nearing an agreement to sell its U.S., Canadian, Australian and New Zealand operations in a deal that's likely to be in the $20 billion to $30 billion range, sources say. It has not yet chosen a buyer, but could announce the deal in coming days, the sources say.
With Walmart's confirmation, it joins several others trying to acquire the tech company, including Oracle.
Walmart is pursuing the acquisition at a time when it's trying to better compete with Amazon. It plans to launch a membership program, called Walmart+, soon. The subnoscription-based service is the retailer's answer to Amazon Prime, which includes original TV shows and movies.
In a statement, the big-box retailer said TikTok's integration of e-commerce and advertising "is a clear benefit to creators and users in those markets." It did not say how it would use TikTok or whether it would be part of Walmart+.
"We believe a potential relationship with TikTok US in partnership with Microsoft could add this key functionality and provide Walmart with an important way for us to reach and serve omnichannel customers as well as grow our third-party marketplace and advertising businesses," it said. "We are confident that a Walmart and Microsoft partnership would meet both the expectations of US TikTok users while satisfying the concerns of US government regulators."
👀 👉🏼 https://www.cnbc.com/2020/08/27/walmart-is-teaming-up-with-microsoft-on-tiktok-bid.html
#walmart #microsoft #tiktok #DeleteTikTok
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Walmart confirmed it's teaming up with Microsoft in a bid for TikTok.
TikTok is nearing an agreement to sell its U.S., Canadian, Australian and New Zealand operations in a deal that's likely to be in the $20 billion to $30 billion range, sources say.
In a statement, the big-box retailer said TikTok's integration of e-commerce and advertising "is a clear benefit to creators and users in those markets."
Walmart said it's teaming up with Microsoft in a bid for TikTok.
The retail giant confirmed to CNBC that it's interested in buying the popular short-form video application.
Walmart shares are up nearly 5% on the news.
TikTok's Beijing-based parent company, ByteDance, is nearing an agreement to sell its U.S., Canadian, Australian and New Zealand operations in a deal that's likely to be in the $20 billion to $30 billion range, sources say. It has not yet chosen a buyer, but could announce the deal in coming days, the sources say.
With Walmart's confirmation, it joins several others trying to acquire the tech company, including Oracle.
Walmart is pursuing the acquisition at a time when it's trying to better compete with Amazon. It plans to launch a membership program, called Walmart+, soon. The subnoscription-based service is the retailer's answer to Amazon Prime, which includes original TV shows and movies.
In a statement, the big-box retailer said TikTok's integration of e-commerce and advertising "is a clear benefit to creators and users in those markets." It did not say how it would use TikTok or whether it would be part of Walmart+.
"We believe a potential relationship with TikTok US in partnership with Microsoft could add this key functionality and provide Walmart with an important way for us to reach and serve omnichannel customers as well as grow our third-party marketplace and advertising businesses," it said. "We are confident that a Walmart and Microsoft partnership would meet both the expectations of US TikTok users while satisfying the concerns of US government regulators."
👀 👉🏼 https://www.cnbc.com/2020/08/27/walmart-is-teaming-up-with-microsoft-on-tiktok-bid.html
#walmart #microsoft #tiktok #DeleteTikTok
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
CNBC
Walmart is teaming up with Microsoft on TikTok bid
Walmart said TikTok's integration of e-commerce and advertising "is a clear benefit to creators and users in those markets."
BAJ demands to unblock websites, stop pressure on media, and ensure release of publications
On Friday evening it was reported that the Ministry of Information had restricted access of Belarusian users to websites of a large number of media and political movements. Most well-known of them are Radio Svaboda, Belsat TV, Euroradio, Solidarity newspaper, Udf.by, The Village, By.tribuna.com, Vitebsk Courier, People's News of Vitebsk, Masheka.by, and the website of the Human rights center Viasna.
Also, since August 9, Belarusian users have had no access to the website of BAJ, an association of journalists, member of the International and European Federations of Journalists.
👀 👉🏼 https://baj.by/en/content/baj-demands-unblock-websites-stop-pressure-media-and-ensure-release-publications
👀 👉🏼 https://www.nbcnews.com/news/world/belarus-appears-block-news-media-websites-opposition-leader-calls-more-n1237767
👀 👉🏼 🇩🇪 https://netzpolitik.org/2020/netzsperren-und-festnahmen-regierung-in-belarus-stoert-internetzugang/
#baj #unblock #websites #belarus #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
On Friday evening it was reported that the Ministry of Information had restricted access of Belarusian users to websites of a large number of media and political movements. Most well-known of them are Radio Svaboda, Belsat TV, Euroradio, Solidarity newspaper, Udf.by, The Village, By.tribuna.com, Vitebsk Courier, People's News of Vitebsk, Masheka.by, and the website of the Human rights center Viasna.
Also, since August 9, Belarusian users have had no access to the website of BAJ, an association of journalists, member of the International and European Federations of Journalists.
👀 👉🏼 https://baj.by/en/content/baj-demands-unblock-websites-stop-pressure-media-and-ensure-release-publications
👀 👉🏼 https://www.nbcnews.com/news/world/belarus-appears-block-news-media-websites-opposition-leader-calls-more-n1237767
👀 👉🏼 🇩🇪 https://netzpolitik.org/2020/netzsperren-und-festnahmen-regierung-in-belarus-stoert-internetzugang/
#baj #unblock #websites #belarus #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
baj.by
BAJ demands to unblock websites, stop pressure on media, and ensure release of publications | baj.by
What’s a Palantir? The Tech Industry’s Next Big I.P.O.
A tech start-up named for objects in “The Lord of the Rings” has become a major government contractor. But what it does is not easy to understand.
About a month before he became president, Donald J. Trump met with the leaders of the country’s top technology companies at Trump Tower in Manhattan.
The meeting included the chief executives of Amazon, Apple, Google, Microsoft and other household names like Tesla and Oracle. And then there was Alex Karp, chief executive of a company, called Palantir Technologies, that few outside Silicon Valley and government circles had heard of.
Palantir, the only privately held company represented in the room, had become a major player among government contractors. And, indicative of its growing prominence, one of its founders, the venture capitalist Peter Thiel, had supported Mr. Trump during the 2016 election and had helped set up the meeting.
Now, as Palantir prepares to go public in what could be the largest stock market listing of a tech start-up since Uber last year, many are wondering: What exactly does this influential but little-known company do?
Offering software — and, crucially, teams of engineers that customize the software — Palantir helps organizations make sense of vast amounts of data. It helps gather information from various sources like internet traffic and cellphone records and analyzes that information. It puts those disparate pieces together into something that makes sense to its users, like a visual display.
But it can take plenty of engineers and plenty of time to make Palantir’s technology work the way customers need it to. And that mix of technology and human muscle may lead to some confusion on Wall Street about how to value the company. Is Palantir a software company, which is traditionally a very profitable business, or is it a less-profitable consulting firm? Or is it both?
“For investors, it is a bit of a Rubik’s Cube,” said Daniel Ives, managing director of equity research at Wedbush Securities.
Palantir, which was founded in 2003, has long described its technology as ideal for tracking terrorists, often embracing an unconfirmed rumor that it helped locate Osama bin Laden. The name Palantir is a nod to spherical objects used in the “Lord of the Rings” books to see other parts of fictional Middle-earth.
💡 Funded in part by In-Q-Tel, the investment arm of the Central Intelligence Agency, the company built its flagship software technology, Gotham, with an eye toward use inside the C.I.A.
👀 👉🏼 https://www.nytimes.com/2020/08/26/technology/palantir-ipo.html
#palantir #trump #ToddlerTrump #USA
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
A tech start-up named for objects in “The Lord of the Rings” has become a major government contractor. But what it does is not easy to understand.
About a month before he became president, Donald J. Trump met with the leaders of the country’s top technology companies at Trump Tower in Manhattan.
The meeting included the chief executives of Amazon, Apple, Google, Microsoft and other household names like Tesla and Oracle. And then there was Alex Karp, chief executive of a company, called Palantir Technologies, that few outside Silicon Valley and government circles had heard of.
Palantir, the only privately held company represented in the room, had become a major player among government contractors. And, indicative of its growing prominence, one of its founders, the venture capitalist Peter Thiel, had supported Mr. Trump during the 2016 election and had helped set up the meeting.
Now, as Palantir prepares to go public in what could be the largest stock market listing of a tech start-up since Uber last year, many are wondering: What exactly does this influential but little-known company do?
Offering software — and, crucially, teams of engineers that customize the software — Palantir helps organizations make sense of vast amounts of data. It helps gather information from various sources like internet traffic and cellphone records and analyzes that information. It puts those disparate pieces together into something that makes sense to its users, like a visual display.
But it can take plenty of engineers and plenty of time to make Palantir’s technology work the way customers need it to. And that mix of technology and human muscle may lead to some confusion on Wall Street about how to value the company. Is Palantir a software company, which is traditionally a very profitable business, or is it a less-profitable consulting firm? Or is it both?
“For investors, it is a bit of a Rubik’s Cube,” said Daniel Ives, managing director of equity research at Wedbush Securities.
Palantir, which was founded in 2003, has long described its technology as ideal for tracking terrorists, often embracing an unconfirmed rumor that it helped locate Osama bin Laden. The name Palantir is a nod to spherical objects used in the “Lord of the Rings” books to see other parts of fictional Middle-earth.
💡 Funded in part by In-Q-Tel, the investment arm of the Central Intelligence Agency, the company built its flagship software technology, Gotham, with an eye toward use inside the C.I.A.
👀 👉🏼 https://www.nytimes.com/2020/08/26/technology/palantir-ipo.html
#palantir #trump #ToddlerTrump #USA
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
NY Times
What’s a Palantir? The Tech Industry’s Next Big I.P.O. (Published 2020)
A tech start-up named for objects in “The Lord of the Rings” has become a major government contractor. But what it does is not easy to understand.
Season 1, Episode 1, Capitalist Kibbutz
Capitalist Kibbutz
When Adam Neumann dreamed up WeWork, he took inspiration from part of his childhood: his years on a kibbutz in Israel. On stage when discussing WeWork, he waxed poetic about the spirit of community he had found there, and how WeWork was similar, but different -- a "kibbutz 2.0." So reporter Ellen Huet wanted to find out: Was the kibbutz anything like a WeWork? And how did it shape what Adam later built?
👀 👉🏼 https://www.bloomberg.com/news/audio/2020-06-24/capitalist-kibbutz-podcast
#bloomberg #capitalist #kibbutz #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
When Adam Neumann dreamed up WeWork, he took inspiration from part of his childhood: his years on a kibbutz in Israel. On stage when discussing WeWork, he waxed poetic about the spirit of community he had found there, and how WeWork was similar, but different -- a "kibbutz 2.0." So reporter Ellen Huet wanted to find out: Was the kibbutz anything like a WeWork? And how did it shape what Adam later built?
👀 👉🏼 https://www.bloomberg.com/news/audio/2020-06-24/capitalist-kibbutz-podcast
#bloomberg #capitalist #kibbutz #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
What they do in the shadows - examining the far-right networks on Telegram
The present paper contributes to the research on the activities of far-right actors on social media by examining the interconnections between far-right actors and groups on Telegram platform using network analysis. The far-right network observed on Telegram is highly decentralized, similarly to the far-right networks found on other social media platforms. The network is divided mostly along the ideological and national lines, with the communities related to 4chan imageboard and Donald Trump’s supporters being the most influential.
The analysis of the network evolution shows that the start of its explosive growth coincides in time with the mass bans of the far-right actors on mainstream social media platforms. The observed patterns of network evolution suggest that the simultaneous migration of these actors to Telegram has allowed them to swiftly recreate their connections and gain prominence in the network thus casting doubt on the effectiveness of deplatforming for curbing the influence of far-right and other extremist actors.
👀 👉🏼 https://www.tandfonline.com/doi/full/10.1080/1369118X.2020.1803946
#telegram #tg #shadow #interconnections #research #analysis #extremist #4chan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The present paper contributes to the research on the activities of far-right actors on social media by examining the interconnections between far-right actors and groups on Telegram platform using network analysis. The far-right network observed on Telegram is highly decentralized, similarly to the far-right networks found on other social media platforms. The network is divided mostly along the ideological and national lines, with the communities related to 4chan imageboard and Donald Trump’s supporters being the most influential.
The analysis of the network evolution shows that the start of its explosive growth coincides in time with the mass bans of the far-right actors on mainstream social media platforms. The observed patterns of network evolution suggest that the simultaneous migration of these actors to Telegram has allowed them to swiftly recreate their connections and gain prominence in the network thus casting doubt on the effectiveness of deplatforming for curbing the influence of far-right and other extremist actors.
👀 👉🏼 https://www.tandfonline.com/doi/full/10.1080/1369118X.2020.1803946
#telegram #tg #shadow #interconnections #research #analysis #extremist #4chan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Taylor & Francis
What they do in the shadows: examining the far-right networks on Telegram
The present paper contributes to the research on the activities of far-right actors on social media by examining the interconnections between far-right actors and groups on Telegram platform using ...
So, these asses have been scraping telegram searching for users and groups and building a whole goddamn database containing thousands of records of people talking/connecting/being in groups (which goes against telegram's main premise).
They even admit that governments use them... Which is also something Durov doesn't approve of.
And they cannot even sanitize their input.
👀 👉🏼 https://news.1rj.ru/str/BlackBox_Archiv/1166
#telegram #tg #durov #shadow #interconnections #research #analysis #gov #extremist #4chan #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
They even admit that governments use them... Which is also something Durov doesn't approve of.
And they cannot even sanitize their input.
👀 👉🏼 https://news.1rj.ru/str/BlackBox_Archiv/1166
#telegram #tg #durov #shadow #interconnections #research #analysis #gov #extremist #4chan #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from NoGoolag
The Lesson We’re Learning From TikTok? It’s All About Our Data
We should minimize how much we share with all of our favorite and not-so-favorite apps. Here’s how.
Is TikTok, the Chinese-owned social network that is used mostly by teenagers to post dance videos, a national security threat?
It depends on whom you ask.
President Trump has said it is and has threatened to ban the app in the United States. But security experts are more hesitant to draw conclusions. While there is no direct evidence that TikTok has done anything malicious with people’s data, sharing information could be fundamentally less safe with a company that might allow the Chinese authorities to intercept it.
So I asked two companies that offer mobile security products to take a close look at TikTok’s app to see what they could glean about it. They had very different takes.
https://www.nytimes.com/2020/08/26/technology/personaltech/tiktok-data-apps.html
#TikTok #privacy
We should minimize how much we share with all of our favorite and not-so-favorite apps. Here’s how.
Is TikTok, the Chinese-owned social network that is used mostly by teenagers to post dance videos, a national security threat?
It depends on whom you ask.
President Trump has said it is and has threatened to ban the app in the United States. But security experts are more hesitant to draw conclusions. While there is no direct evidence that TikTok has done anything malicious with people’s data, sharing information could be fundamentally less safe with a company that might allow the Chinese authorities to intercept it.
So I asked two companies that offer mobile security products to take a close look at TikTok’s app to see what they could glean about it. They had very different takes.
https://www.nytimes.com/2020/08/26/technology/personaltech/tiktok-data-apps.html
#TikTok #privacy
One of the biggest online piracy groups in the world taken down
On 25 August, an alleged criminal network of copyright infringing hackers, mainly responsible for pirating movies and hosting illegal digital content worldwide was dismantled in a coordinated action between US authorities and their counterparts in 18 countries around the world, with Europol and Eurojust support. Sixty servers were taken down in North America, Europe and Asia and several of the main suspects were arrested.
Streamed prior to release
The Sparks Group obtained DVDs and Blu-ray discs of unreleased content and compromised the copyright protections on the discs to reproduce and upload the content publically to online servers. It is believed that the piracy group, under investigation since September 2016, had successfully reproduced and disseminated hundreds of movies and TV programmes prior to their retail release date, including nearly every movie released by major production studios in the US. The Sparks Group has caused tens of millions of US dollars in losses to film production studios, mainly to the US movie, television, and supporting industries, from the copyright infringement.
👀 👉🏼 https://www.europol.europa.eu/newsroom/news/one-of-biggest-online-piracy-groups-in-world-taken-down
👀 👉🏼 https://www.justice.gov/usao-sdny/pr/acting-us-attorney-announces-federal-charges-and-international-operation-dismantle-0
👀 👉🏼 🇩🇪 https://www.golem.de/news/sparks-eine-der-wichtigsten-release-groups-zerschlagen-2008-150546.html
#sparks #online #piracy #raid #takedown #europol
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
On 25 August, an alleged criminal network of copyright infringing hackers, mainly responsible for pirating movies and hosting illegal digital content worldwide was dismantled in a coordinated action between US authorities and their counterparts in 18 countries around the world, with Europol and Eurojust support. Sixty servers were taken down in North America, Europe and Asia and several of the main suspects were arrested.
Streamed prior to release
The Sparks Group obtained DVDs and Blu-ray discs of unreleased content and compromised the copyright protections on the discs to reproduce and upload the content publically to online servers. It is believed that the piracy group, under investigation since September 2016, had successfully reproduced and disseminated hundreds of movies and TV programmes prior to their retail release date, including nearly every movie released by major production studios in the US. The Sparks Group has caused tens of millions of US dollars in losses to film production studios, mainly to the US movie, television, and supporting industries, from the copyright infringement.
👀 👉🏼 https://www.europol.europa.eu/newsroom/news/one-of-biggest-online-piracy-groups-in-world-taken-down
👀 👉🏼 https://www.justice.gov/usao-sdny/pr/acting-us-attorney-announces-federal-charges-and-international-operation-dismantle-0
👀 👉🏼 🇩🇪 https://www.golem.de/news/sparks-eine-der-wichtigsten-release-groups-zerschlagen-2008-150546.html
#sparks #online #piracy #raid #takedown #europol
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Europol
One of the biggest online piracy groups in the world taken down | Europol
On 25 August, an alleged criminal network of copyright infringing hackers, mainly responsible for pirating movies and hosting illegal digital content worldwide was dismantled in a coordinated action between US authorities and their counterparts in 18 countries…