YalpStore Contemporary
Hey all !
I compiled YalpStore with my dispensers and new anonymous login method on demand of some fellow mates.
Will send the binaries here, in case anyone needs it.
Notes:
0. Only Anonymous login is fixed.
1. Its signed by my keystore, so need to do a clean install.
2. I have no plans to submit it on FDroid or anywhere else.
3. I have pushed the changes on my github, anyone interested can build.
4. Also if you have contacts with the legendary Yalp dev, let me know will talk to him and do a PR if he agrees to merge.
Source : https://github.com/whyorean/YalpStore
#yalp #aurora
Hey all !
I compiled YalpStore with my dispensers and new anonymous login method on demand of some fellow mates.
Will send the binaries here, in case anyone needs it.
Notes:
0. Only Anonymous login is fixed.
1. Its signed by my keystore, so need to do a clean install.
2. I have no plans to submit it on FDroid or anywhere else.
3. I have pushed the changes on my github, anyone interested can build.
4. Also if you have contacts with the legendary Yalp dev, let me know will talk to him and do a PR if he agrees to merge.
Source : https://github.com/whyorean/YalpStore
#yalp #aurora
GitHub
GitHub - whyorean/YalpStore: Download apks from Google Play Store
Download apks from Google Play Store. Contribute to whyorean/YalpStore development by creating an account on GitHub.
Forwarded from Rahul Patel
YalpStore+_Contemporary_0.47.apk
2.2 MB
#Changelog : 0.47
1. Allow clearText traffic on Android N and above.
All my dispensers are using http, so this change would allow using them.
1. Allow clearText traffic on Android N and above.
All my dispensers are using http, so this change would allow using them.
Forwarded from AcTVism Munich
· independent Journalism needs our support — explained by: Abby Martin, Yanis Varoufakis, Jill Stein & Peter Kuznick - #media #politics #democracy
invidio.us/a2PJ6b__nXs
Become a patron of @acTVism! Patreon.com/acTVism
invidio.us/a2PJ6b__nXs
Become a patron of @acTVism! Patreon.com/acTVism
YouTube
Abby Martin, Yanis Varoufakis, Jill Stein & Peter Kuznick speak out for Independent Journalism
Do you want us to continue our independent journalism for 2020? Here's how you can support:
PayPal: PayPal@acTVism.org
Patreon: https://bit.ly/2PUjciH
Betterplace: https://bit.ly/2PtKfCo
Facebook-Fundraiser: https://bit.ly/2tleRgK
IBAN: DE89430609678224073600…
PayPal: PayPal@acTVism.org
Patreon: https://bit.ly/2PUjciH
Betterplace: https://bit.ly/2PtKfCo
Facebook-Fundraiser: https://bit.ly/2tleRgK
IBAN: DE89430609678224073600…
Forwarded from Rahul Patel
AuroraStore_3.1.6_Beta.apk
4 MB
#Changelog : 3.1.6 Beta
1. UI Overhaul
2. Fixed accounts issues
3. Fixed search issues
4. Fixed other major bugs
This is a beta, I may have forgot few things to fix and may have added new bugs, as I haven't got time enough time to code it on a single stretch.
Kindly report the bugs if you find any.
1. UI Overhaul
2. Fixed accounts issues
3. Fixed search issues
4. Fixed other major bugs
This is a beta, I may have forgot few things to fix and may have added new bugs, as I haven't got time enough time to code it on a single stretch.
Kindly report the bugs if you find any.
Digital Privacy at the U.S. Border: Protecting the Data On Your Devices
https://www.eff.org/wp/digital-privacy-us-border-2017
#travel #usa #border #tsa #security #privacy #guide
https://www.eff.org/wp/digital-privacy-us-border-2017
#travel #usa #border #tsa #security #privacy #guide
Electronic Frontier Foundation
Digital Privacy at the U.S. Border: Protecting the Data On Your
by Sophia Cope, Amul Kalia, Seth Schoen, and Adam SchwartzDownload the report as a PDF.EXECUTIVE SUMMARYThe U.S. government reported a five-fold increase in the number of electronic media searches at
LibreOffice 6.4 nearly done as open-source office software project prepares for 10th anniversary
A decade later, has LibreOffice succeeded? With business still hooked on Microsoft Office, not really
The LibreOffice team is testing the first release candidate of version 6.4, which is set for release at the end of January.
What's new in version 6.4? There are numerous fresh features; most are small, but they do include the ability to insert QR codes into any document. The Generate QR Code feature lets you enter a hyperlink (or any text) and generate a QR code with four options for complexity. A low complexity is better for long URLs while high has better error correction if there are errors in reading.
https://www.theregister.co.uk/2019/12/24/libreoffice_64_nearly_done_as_project_prepares_for_10th_anniversary/
Read Via Telegram
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
A decade later, has LibreOffice succeeded? With business still hooked on Microsoft Office, not really
The LibreOffice team is testing the first release candidate of version 6.4, which is set for release at the end of January.
What's new in version 6.4? There are numerous fresh features; most are small, but they do include the ability to insert QR codes into any document. The Generate QR Code feature lets you enter a hyperlink (or any text) and generate a QR code with four options for complexity. A low complexity is better for long URLs while high has better error correction if there are errors in reading.
https://www.theregister.co.uk/2019/12/24/libreoffice_64_nearly_done_as_project_prepares_for_10th_anniversary/
Read Via Telegram
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Daily feed of bad IPs (with blacklist hit scores)
IPsum is a threat intelligence feed based on 30+ different publicly available lists of suspicious and/or malicious IP addresses. All lists are automatically retrieved and parsed on a daily (24h) basis and the final result is pushed to this repository. List is made of IP addresses together with a total number of (black)list occurrence (for each). Greater the number, lesser the chance of false positive detection and/or dropping in (inbound) monitored traffic. Also, list is sorted from most (problematic) to least occurent IP addresses.
💡 As an example, to get a fresh and ready-to-deploy auto-ban list of "bad IPs" that appear on at least 3 (black)lists you can run:
https://github.com/stamparm/ipsum
#IPsum #tool #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
IPsum is a threat intelligence feed based on 30+ different publicly available lists of suspicious and/or malicious IP addresses. All lists are automatically retrieved and parsed on a daily (24h) basis and the final result is pushed to this repository. List is made of IP addresses together with a total number of (black)list occurrence (for each). Greater the number, lesser the chance of false positive detection and/or dropping in (inbound) monitored traffic. Also, list is sorted from most (problematic) to least occurent IP addresses.
💡 As an example, to get a fresh and ready-to-deploy auto-ban list of "bad IPs" that appear on at least 3 (black)lists you can run:
curl --compressed https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1💡 If you want to try it with ipset, you can do the following:
sudo suIn directory levels you can find preprocessed raw IP lists based on number of blacklist occurrences (e.g. levels/3.txt holds IP addresses that can be found on 3 or more blacklists).
apt-get -qq install iptables ipset
ipset -q flush ipsum
ipset -q create ipsum hash:net
for ip in $(curl --compressed https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1); do ipset add ipsum $ip; done
iptables -I INPUT -m set --match-set ipsum src -j DROP
https://github.com/stamparm/ipsum
#IPsum #tool #guide
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Forwarded from Hacker News
GitHub
GitHub - ONLYOFFICE/CommunityServer: Free open source office suite with business productivity tools: document and project management…
Free open source office suite with business productivity tools: document and project management, CRM, mail aggregator. - ONLYOFFICE/CommunityServer
Forwarded from BlackBox (Security) Archiv
Live streaming from the 36th Chaos Communication Congress
Every year at the end of December, not only Christmas but also the Chaos Communication Congress is on our schedule. Under the motto "Resource Exhaustion", several thousand hackers meet again in Leipzig between the years.
📺 Livestream:
https://streaming.media.ccc.de/36c3/
💡 Schedule overview:
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/
#CCC #36C3 #Streaming #Video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Every year at the end of December, not only Christmas but also the Chaos Communication Congress is on our schedule. Under the motto "Resource Exhaustion", several thousand hackers meet again in Leipzig between the years.
📺 Livestream:
https://streaming.media.ccc.de/36c3/
💡 Schedule overview:
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/
#CCC #36C3 #Streaming #Video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
CCC analyses Munich's state trojan FinSpy
The technical #analysis of copies of the #FinSpy #malware substantiates the reasons for the criminal complaint against the Munich manufacturer of the #StateTrojan. The #CCC publishes its report as well as several variants of FinSpy and a complete documentation of the analysis.
#Security researchers of the Chaos Computer Club (CCC) have analyzed a total of 28 copies of the #spy-#software FinSpy for #Android from 2012 to 2019. The main focus of the investigation was the origin of the malware and the date of its production. The reason for the investigation is the criminal complaint of the Gesellschaft für Freiheitsrechte (GFF) and other organizations against the German group of companies #FinFisher because of the deliberate violation of licensing requirements for dual-use software according to § 18 para. 2 No. 1 and § 18 para. 5 No. 1 Foreign Trade Act (AWG).
The CCC today publishes its comprehensive report: Evolution of a private sector malware for governmental players
💡 The result of the analysis is that a copy of malware, which according to the GFF was used against the Turkish opposition movement in 2016, was clearly created after the EU export control regulations for surveillance software came into force.
💡 By comparing it with over twenty other copies from a seven-year period, the CCC shows continuity in the further development into which this copy fits. This is seen as a strong indication that it is a variant of the state Trojan "FinSpy". FinSpy is a product of the FinFisher group of companies, which has branches in Munich and elsewhere.
💡 In its report, the CCC also documents references to German-speaking developers that can be found in the source code.
"Our analysis shows that surveillance software originally from Germany was apparently used against democratic dissidents," said Linus Neumann, one of the authors of the analysis. "How this could have come about, the public prosecutor's office and the customs criminal office must now clarify."
https://github.com/linuzifer/FinSpy-Dokumentation
https://github.com/devio/FinSpy-Tools
👉🏼 Read more:
https://www.ccc.de/de/updates/2019/finspy
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
The technical #analysis of copies of the #FinSpy #malware substantiates the reasons for the criminal complaint against the Munich manufacturer of the #StateTrojan. The #CCC publishes its report as well as several variants of FinSpy and a complete documentation of the analysis.
#Security researchers of the Chaos Computer Club (CCC) have analyzed a total of 28 copies of the #spy-#software FinSpy for #Android from 2012 to 2019. The main focus of the investigation was the origin of the malware and the date of its production. The reason for the investigation is the criminal complaint of the Gesellschaft für Freiheitsrechte (GFF) and other organizations against the German group of companies #FinFisher because of the deliberate violation of licensing requirements for dual-use software according to § 18 para. 2 No. 1 and § 18 para. 5 No. 1 Foreign Trade Act (AWG).
The CCC today publishes its comprehensive report: Evolution of a private sector malware for governmental players
💡 The result of the analysis is that a copy of malware, which according to the GFF was used against the Turkish opposition movement in 2016, was clearly created after the EU export control regulations for surveillance software came into force.
💡 By comparing it with over twenty other copies from a seven-year period, the CCC shows continuity in the further development into which this copy fits. This is seen as a strong indication that it is a variant of the state Trojan "FinSpy". FinSpy is a product of the FinFisher group of companies, which has branches in Munich and elsewhere.
💡 In its report, the CCC also documents references to German-speaking developers that can be found in the source code.
"Our analysis shows that surveillance software originally from Germany was apparently used against democratic dissidents," said Linus Neumann, one of the authors of the analysis. "How this could have come about, the public prosecutor's office and the customs criminal office must now clarify."
https://github.com/linuzifer/FinSpy-Dokumentation
https://github.com/devio/FinSpy-Tools
👉🏼 Read more:
https://www.ccc.de/de/updates/2019/finspy
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
YouTube Stars Once Stole Social Security Benefits
20-somethings ripped off people old enough to be their grandparents
Still in their 20s, the Florida couple enjoyed the good life: exotic getaways, a spacious home in Palm Beach County and a silver Bentley.
They invited the world into their lives by frequently posting videos on YouTube and other online platforms.
On camera they staged pranks, flaunted possessions — their son drives a toy Porsche — and laid family squabbles bare. In a segment called “Things We Hate About Each Other!” he revealed she picks her nose.
https://www.aarp.org/money/scams-fraud/info-2019/florida-social-security-fraud.html
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
20-somethings ripped off people old enough to be their grandparents
Still in their 20s, the Florida couple enjoyed the good life: exotic getaways, a spacious home in Palm Beach County and a silver Bentley.
They invited the world into their lives by frequently posting videos on YouTube and other online platforms.
On camera they staged pranks, flaunted possessions — their son drives a toy Porsche — and laid family squabbles bare. In a segment called “Things We Hate About Each Other!” he revealed she picks her nose.
https://www.aarp.org/money/scams-fraud/info-2019/florida-social-security-fraud.html
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from cRyPtHoN™ INFOSEC (EN)
Mozilla Adds Additional DNS-Over-HTTPS Provider to Firefox
Mozilla has added an additional DNS provider to its DNS-Over-HTTPS implementation in Firefox. This gives Firefox users more options as to which DoH provider they use for secure DNS lookups.
When Mozilla announced that they would be testing the DoH implementation solely with Cloudflare DNS servers, users were concerned that using a single provider decreased user's privacy and gave that provider too much data about Firefox's users.
https://www.bleepingcomputer.com/news/software/mozilla-adds-additional-dns-over-https-provider-to-firefox/
Read Via Telegram
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Mozilla has added an additional DNS provider to its DNS-Over-HTTPS implementation in Firefox. This gives Firefox users more options as to which DoH provider they use for secure DNS lookups.
When Mozilla announced that they would be testing the DoH implementation solely with Cloudflare DNS servers, users were concerned that using a single provider decreased user's privacy and gave that provider too much data about Firefox's users.
https://www.bleepingcomputer.com/news/software/mozilla-adds-additional-dns-over-https-provider-to-firefox/
Read Via Telegram
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Deezer music downloaders
Open source Deezer music downloader apps. Download the whole catalog of Deezer in .mp3 or .flac in Linux / Windows / Mac / Android.
ANDROID APPS:
AIDS Awful, Irritable Deezer Scraper
📱 @NickHasAIDS
💬 @AIDSSociety
📱 Deezloader Remix Mobile Releases
@deezloaderremixmobile
or
https://gitlab.com/Nick80835/DeezLoader-Android/tree/master/Release
🗿 Deezloader Mobile Beta Releases
@deezloaderremixmobilebeta
FAQ: @DeezloaderFAQ
English Group: https://news.1rj.ru/str/joinchat/Ed1JxEfoci8sv2dVwTUQ3A
Grupo Hispano: https://news.1rj.ru/str/joinchat/PvQmO0n3_BxD_1DPWB4zGQ
Grupo Português: @DeezloaderPT
PC:
🖥 Deezloader Remix Windows/MAC/Linux Releases
@deezloaderremix
or
https://notabug.org/RemixDevs/DeezloaderRemix/wiki/Downloads
🗨 Official Support for Windows/MAC/Linux
@DeezloaderRemixCommunity
📰 News
@RemixDevs
NOTES:
Start DeezLoader and click on "OPEN DEEZLOADER HERE".
If you have just updated your app, we advise you to reverify that your configuration has not changed (eg at each launch please reselect "FLAC 1411" in Settings instead of "MP3 320" by default).
Configuration:
Click on the top right of the Deezloader application, go to settings
Artwork size "1400x1400"
Audio Bitrate "FLAC 1411"
Further down tick all the boxes and then click on "Save".
To find the noscripts you have just downloaded, go to the internal storage of your mobile My files> Internal storage> Music> Deezloader.
You can also change the location by going to the Deezloader Settings.
To listen to your mp3 or FLAC from your mobile / tablet / box running Android you can try with music players like Vinyl, Vanilla, AIMP...
📡 @Libreware
#deezloader #deezer #music #android
Open source Deezer music downloader apps. Download the whole catalog of Deezer in .mp3 or .flac in Linux / Windows / Mac / Android.
ANDROID APPS:
AIDS Awful, Irritable Deezer Scraper
📱 @NickHasAIDS
💬 @AIDSSociety
📱 Deezloader Remix Mobile Releases
@deezloaderremixmobile
or
https://gitlab.com/Nick80835/DeezLoader-Android/tree/master/Release
🗿 Deezloader Mobile Beta Releases
@deezloaderremixmobilebeta
FAQ: @DeezloaderFAQ
English Group: https://news.1rj.ru/str/joinchat/Ed1JxEfoci8sv2dVwTUQ3A
Grupo Hispano: https://news.1rj.ru/str/joinchat/PvQmO0n3_BxD_1DPWB4zGQ
Grupo Português: @DeezloaderPT
PC:
🖥 Deezloader Remix Windows/MAC/Linux Releases
@deezloaderremix
or
https://notabug.org/RemixDevs/DeezloaderRemix/wiki/Downloads
🗨 Official Support for Windows/MAC/Linux
@DeezloaderRemixCommunity
📰 News
@RemixDevs
NOTES:
Start DeezLoader and click on "OPEN DEEZLOADER HERE".
If you have just updated your app, we advise you to reverify that your configuration has not changed (eg at each launch please reselect "FLAC 1411" in Settings instead of "MP3 320" by default).
Configuration:
Click on the top right of the Deezloader application, go to settings
Artwork size "1400x1400"
Audio Bitrate "FLAC 1411"
Further down tick all the boxes and then click on "Save".
To find the noscripts you have just downloaded, go to the internal storage of your mobile My files> Internal storage> Music> Deezloader.
You can also change the location by going to the Deezloader Settings.
To listen to your mp3 or FLAC from your mobile / tablet / box running Android you can try with music players like Vinyl, Vanilla, AIMP...
📡 @Libreware
#deezloader #deezer #music #android
Investigate AMAZON
Amazon’s business model is surveillance. They infiltrate our neighborhoods and homes with products that record everything we do. Amazon’s practices and technology threaten our privacy, civil liberties, and security. Fill out the form below to demand lawmakers investigate Amazon’s surveillance dragnet.
https://www.investigateamazon.com/
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Amazon’s business model is surveillance. They infiltrate our neighborhoods and homes with products that record everything we do. Amazon’s practices and technology threaten our privacy, civil liberties, and security. Fill out the form below to demand lawmakers investigate Amazon’s surveillance dragnet.
https://www.investigateamazon.com/
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
No roborders, no nation, or: smile for a European surveillance propagation
How an agency implements Fortress Europe by degrading Non-Europeans to second-rate people
Robots, Satellites and biometrical traps - more than a Billion Euro will be spent in 2021 for what they call "Border Security." The European Border and Coastguard, formerly Frontex, dreams of a fully automomus border surveillance system.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10994-no_roborders_no_nation_or_smile_for_a_european_surveillance_propagation
#video #CCC #36c3
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
How an agency implements Fortress Europe by degrading Non-Europeans to second-rate people
Robots, Satellites and biometrical traps - more than a Billion Euro will be spent in 2021 for what they call "Border Security." The European Border and Coastguard, formerly Frontex, dreams of a fully automomus border surveillance system.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10994-no_roborders_no_nation_or_smile_for_a_european_surveillance_propagation
#video #CCC #36c3
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Cryptography demystified - An introduction without maths
This talk will explain the basic building blocks of cryptography in a manner that will (hopefully) be understandable by everyone. The talk will not require any understanding of maths or computer science.
In particular, the talk will explain encryption, what it is and what it does, what it is not and what it doesn't do, and what other tools cryptography can offer.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10627-cryptography_demystified
#video #CCC #36c3 #cryptography
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
This talk will explain the basic building blocks of cryptography in a manner that will (hopefully) be understandable by everyone. The talk will not require any understanding of maths or computer science.
In particular, the talk will explain encryption, what it is and what it does, what it is not and what it doesn't do, and what other tools cryptography can offer.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10627-cryptography_demystified
#video #CCC #36c3 #cryptography
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Delhi Police film protests, run its images through face recognition software to screen crowd
https://indianexpress.com/article/india/police-film-protests-run-its-images-through-face-recognition-software-to-screen-crowd-6188246/
https://internetfreedom.in/we-demand-the-delhi-police-stop-its-facial-recognition-system
#india #biometrics #facial #recognition #protests
https://indianexpress.com/article/india/police-film-protests-run-its-images-through-face-recognition-software-to-screen-crowd-6188246/
https://internetfreedom.in/we-demand-the-delhi-police-stop-its-facial-recognition-system
#india #biometrics #facial #recognition #protests
The Indian Express
Delhi Police film protests, run its images through face recognition software to screen crowd
Following a Delhi High Court order in a case related to missing children, the Delhi Police had acquired Automated Facial Recognition System (AFRS) software in March 2018 as a tool to identify lost and found boys and girls by matching photos.
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
What the World can learn from Hongkong - From Unanimity to Anonymity
The people of Hong Kong have been using unique tactics, novel uses of technology, and a constantly adapting toolset in their fight to maintain their distinctiveness from China since early June. Numerous anonymous interviews with protesters from front liners to middle class supporters and left wing activists reveal a movement that has been unfairly simplified in international reporting.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10933-what_the_world_can_learn_from_hongkong
#video #CCC #36c3 #Hongkong #Anonymity
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
The people of Hong Kong have been using unique tactics, novel uses of technology, and a constantly adapting toolset in their fight to maintain their distinctiveness from China since early June. Numerous anonymous interviews with protesters from front liners to middle class supporters and left wing activists reveal a movement that has been unfairly simplified in international reporting.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-10933-what_the_world_can_learn_from_hongkong
#video #CCC #36c3 #Hongkong #Anonymity
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Technical aspects of the surveillance in and around the Ecuadorian embassy in London - Details about the man hunt for Julian Assange and Wikileaks
The talk explains and illustrates the procedural and technical details of the surveillance in and around the Ecuadorian embassy in London during the time Julian Assange stayed in there from June 2012 until April 2019.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-11247-technical_aspects_of_the_surveillance_in_and_around_the_ecuadorian_embassy_in_london
#video #CCC #36c3 #surveillance #Assange
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
The talk explains and illustrates the procedural and technical details of the surveillance in and around the Ecuadorian embassy in London during the time Julian Assange stayed in there from June 2012 until April 2019.
⚠️ This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them. Please look for "audio tracks" in your desktop video player.
https://media.ccc.de/v/36c3-11247-technical_aspects_of_the_surveillance_in_and_around_the_ecuadorian_embassy_in_london
#video #CCC #36c3 #surveillance #Assange
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Listening Back Browser Add-On Tranlates Cookies Into Sound
‘Listening Back’ is an add-on for the Chrome and Firefox browsers that sonifies internet cookies in real time as one browses online. Utilising digital waveform synthesis, ‘Listening Back’ provides an audible presence for hidden infrastructures that collect personal and identifying data by storing a file on one’s computer. By directing the listener’s attention to hidden processes of online data collection, Listening Back functions to expose real-time digital surveillance and consequently the ways in which our everyday relationships to being surveilled have become normalised.
Our access to the World Wide Web is mediated by screen devices and ‘Listening Back’ enables users to go beyond the event on the screen and experience some of the algorithmic surveillance processes that underlie our Web experience. This project therefore explores how sound can help us engage with complex phenomena beyond the visual interface of our smart devices by highlighting a disconnect between the graphical interface of the Web, and the socio-political implications of background mechanisms of data capture.
By sonifying a largely invisible tracking technology ‘Listening Back’ critiques a lack of transparency inherent to online monitoring technologies and the broader context of opt in / default cultures intrinsic to contemporary modes of online connectivity. By providing a sonic experiential platform for the real-time activity of Internet cookies this project engages listening as a mode of examination and asks what is the potential of sound as a tool for transparent questioning?
👉🏼 Chrome:
https://chrome.google.com/webstore/detail/listening-back/gdkmphlncmoloepkpifnhneogcliiiah
👉🏼 Firefox:
https://addons.mozilla.org/en-GB/firefox/addon/listening-back/
💡 Read more:
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10855.html
#addon #chrome #firefox #CCC #36c3 #cookies #ListeningBack
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
‘Listening Back’ is an add-on for the Chrome and Firefox browsers that sonifies internet cookies in real time as one browses online. Utilising digital waveform synthesis, ‘Listening Back’ provides an audible presence for hidden infrastructures that collect personal and identifying data by storing a file on one’s computer. By directing the listener’s attention to hidden processes of online data collection, Listening Back functions to expose real-time digital surveillance and consequently the ways in which our everyday relationships to being surveilled have become normalised.
Our access to the World Wide Web is mediated by screen devices and ‘Listening Back’ enables users to go beyond the event on the screen and experience some of the algorithmic surveillance processes that underlie our Web experience. This project therefore explores how sound can help us engage with complex phenomena beyond the visual interface of our smart devices by highlighting a disconnect between the graphical interface of the Web, and the socio-political implications of background mechanisms of data capture.
By sonifying a largely invisible tracking technology ‘Listening Back’ critiques a lack of transparency inherent to online monitoring technologies and the broader context of opt in / default cultures intrinsic to contemporary modes of online connectivity. By providing a sonic experiential platform for the real-time activity of Internet cookies this project engages listening as a mode of examination and asks what is the potential of sound as a tool for transparent questioning?
👉🏼 Chrome:
https://chrome.google.com/webstore/detail/listening-back/gdkmphlncmoloepkpifnhneogcliiiah
👉🏼 Firefox:
https://addons.mozilla.org/en-GB/firefox/addon/listening-back/
💡 Read more:
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10855.html
#addon #chrome #firefox #CCC #36c3 #cookies #ListeningBack
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv