Forwarded from cRyPtHoN™ INFOSEC (EN)
ProtonVPN Apps Open Sourced for Added Transparency and Security
The code for ProtonVPN apps on all supported platforms - Android, iOS, macOS, and Windows - is now open source, the maker announces today, a move that follows a security audit from an independent party.
The decision distances the service from all the other options on the market and is in line with the company's belief in ethics, transparency, and security as core values for a trusted VPN (virtual private network) provider.
https://www.bleepingcomputer.com/news/security/protonvpn-apps-open-sourced-for-added-transparency-and-security/
Read Via Telegram
Earlier Post - HERE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
The code for ProtonVPN apps on all supported platforms - Android, iOS, macOS, and Windows - is now open source, the maker announces today, a move that follows a security audit from an independent party.
The decision distances the service from all the other options on the market and is in line with the company's belief in ethics, transparency, and security as core values for a trusted VPN (virtual private network) provider.
https://www.bleepingcomputer.com/news/security/protonvpn-apps-open-sourced-for-added-transparency-and-security/
Read Via Telegram
Earlier Post - HERE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
microG: Android (almost) without Google – our interview with the developer
The use of microG means that on smartphones, you can enjoy the comfort of Android without being spied on from front to back. It’s a sort of „castrated“ Android, where hardly any data are transferred to the Google servers. How does Google manage to enforce control over the mobile operating system Android with all its might? What does it take to stand up against Google? That and much more, we will find out in our interview with the inventor of microG, Marvin Wißfeld.
👉🏼 👉🏼 Read more:
https://tarnkappe.info/microg-android-almost-without-google-our-interview-with-the-developer/
#interview #microG #android #google #DeleteGoogle #Marvin
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
The use of microG means that on smartphones, you can enjoy the comfort of Android without being spied on from front to back. It’s a sort of „castrated“ Android, where hardly any data are transferred to the Google servers. How does Google manage to enforce control over the mobile operating system Android with all its might? What does it take to stand up against Google? That and much more, we will find out in our interview with the inventor of microG, Marvin Wißfeld.
👉🏼 👉🏼 Read more:
https://tarnkappe.info/microg-android-almost-without-google-our-interview-with-the-developer/
#interview #microG #android #google #DeleteGoogle #Marvin
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Forwarded from cRyPtHoN™ INFOSEC (EN)
Protection is misspelled, says Google: It should be Dumb Browser Stalking EnablerChocolate Factory boffins doubt Apple can fix it, either
Google security researchers have published details about the flaws they identified last year in Intelligent Tracking Protection (ITP), a privacy scheme developed by Apple's WebKit team for the company's Safari browser.
In December, Apple addressed some of these vulnerabilities (CVE-2019-8835, CVE-2019-8844, and CVE-2019-8846) through software updates, specifically Safari 13.0.4 and iOS 13.3. Those bugs could be exploited to leak browsing and search history and to perform denial of service attacks.
https://www.theregister.co.uk/2020/01/22/apple_intelligent_tracking_protection/
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
If you're having problems with latest NewPipe 0.18.1 app from F-Droid, you can use the newest release 0.18.2 from here until it reaches F-Droid repository:
https://github.com/TeamNewPipe/NewPipe/releases
⚠️ Note: The releases from github and F-Droid have different signatures, so first you'll need to backup or export app data, uninstall the app and install the other version
#newpipe #yt #youtube
https://github.com/TeamNewPipe/NewPipe/releases
⚠️ Note: The releases from github and F-Droid have different signatures, so first you'll need to backup or export app data, uninstall the app and install the other version
#newpipe #yt #youtube
GitHub
Releases · TeamNewPipe/NewPipe
A libre lightweight streaming front-end for Android. - TeamNewPipe/NewPipe
Forwarded from J
Do you use google apps/play services?
Anonymous Poll
27%
No, none
18%
No play services, but some apps like YT
36%
Yes, but I'd like to get rid of them
20%
Yes, but I am fine with having them on my phone
YetAnotherCallBlocker
https://gitlab.com/xynngh/YetAnotherCallBlocker
Block calls from annoying or private numbers on your Android device, using a public 3rd-party spam database.
📡 @Libreware
#YetAnotherCallBlocker #block #spam #calls
https://gitlab.com/xynngh/YetAnotherCallBlocker
Block calls from annoying or private numbers on your Android device, using a public 3rd-party spam database.
📡 @Libreware
#YetAnotherCallBlocker #block #spam #calls
GitLab
Xynngh / YetAnotherCallBlocker · GitLab
Block unwanted calls effortlessly
Jeff Bezos, owner of Amazon and the richest man in the world, received a whatsApp message on his mobile phone from the Crown Prince of Saudi Arabia, Mohamed bin Salman.
Bezos didn't know it yet, but his cell phone had just been hacked.
From now on, all his personal information was hacked.
#bezos #whatsapp #saudi #arabia #hacking
Bezos didn't know it yet, but his cell phone had just been hacked.
From now on, all his personal information was hacked.
theguardian.com/world/2020/jan/21/revealed-the-saudi-heir-and-the-alleged-plot-to-undermine-jeff-bezos#bezos #whatsapp #saudi #arabia #hacking
Telegraph
Revealed: the Saudi heir and the alleged plot to undermine Jeff Bezos
Jeff Bezos, the billionaire owner of the Washington Post, had no reason to be suspicious when he received a WhatsApp message from the account of the crown prince of Saudi Arabia in May 2018. Bezos and Mohammed bin Salman had attended a dinner together in…
Snapdrop
Local file sharing in your browser - inspired by Apple's Airdrop.
You have to open https://snapdrop.net url in a Chrome or Firefox browser on any two devices to share files locally between them. Files are not uploaded to the cloud.
Both devices should be on the same local network for this to work.
Instructions and sources:
https://github.com/RobinLinus/snapdrop/blob/master/README.md
📡 @NoGoolag 📡 @Libreware
#snapdrop #share #transfer #filetransfer #airdrop
Local file sharing in your browser - inspired by Apple's Airdrop.
You have to open https://snapdrop.net url in a Chrome or Firefox browser on any two devices to share files locally between them. Files are not uploaded to the cloud.
Both devices should be on the same local network for this to work.
Instructions and sources:
https://github.com/RobinLinus/snapdrop/blob/master/README.md
📡 @NoGoolag 📡 @Libreware
#snapdrop #share #transfer #filetransfer #airdrop
snapdrop.net
Instantly share images, videos, PDFs, and links with people nearby. Peer2Peer and Open Source. No Setup, No Signup.
Send files between devices
⚡️SyncThing
https://syncthing.net
⚡️@Trebleshot
https://play.google.com/store/apps/details?id=com.genonbeta.TrebleShot
Or
https://f-droid.org/app/com.genonbeta.TrebleShot
https://github.com/genonbeta/TrebleShot/blob/master/README.md
⚡️SnapDrop
https://snapdrop.net:
https://github.com/RobinLinus/snapdrop/blob/master/README.md
On izzyOnDroid repo: https://apt.izzysoft.de/fdroid/repo/com.fmsys.snapdrop
⚡️Sharik - Multiplatform file sharing via WI-FI
https://f-droid.org/repo/dev.marchello.sharik
iOS https://github.com/marchellodev/sharik
⚡️Uploadgram
File sharing service that uses the Telegram network as file storage
https://f-droid.org/repo/com.pato05.uploadgram
⚡️Device Connect (Android <-> PC)
https://f-droid.org/repo/net.dcnnt
https://github.com/cyanomiko/dcnnt-android
⚡️Blaze
https://blaze.vercel.app
https://github.com/blenderskool/blaze
⚡️LanXchange
https://play.google.com/store/apps/details?id=de.tobifleig.lxc
Or (izzyOnDroid repo)
https://f-droid.org/app/de.tobifleig.lxc
PC: https://www.lanxchange.com
https://github.com/tfg13/LanXchange/blob/master/README.md
⚡️NitroShare
https://play.google.com/store/apps/details?id=net.nitroshare.android
Or (izzyOnDroid repo)
https://f-droid.org/app/net.nitroshare.android
PC: https://nitroshare.net
https://github.com/nitroshare/nitroshare-android/blob/master/README.md
⚡️Dukto
https://play.google.com/store/apps/details?id=it.msec.dukto
PC: http://msec.it/dukto
⚡️Http Share
https://play.google.com/store/apps/details?id=com.MarcosDiez.shareviahttp
Or
https://f-droid.org/app/com.MarcosDiez.shareviahttp
https://github.com/marcosdiez/shareviahttp/blob/master/README.md
⚡️Mass Transfer (only between Androids)
https://github.com/hexian000/MassTransfer/blob/master/README.md
On izzyOnDroid repo: https://f-droid.org/app/me.hexian000.masstransfer
https://github.com/hexian000/MassTransfer/releases
⚡️ OnionShare
https://onionshare.org
https://github.com/micahflee/onionshare/wiki
⚡️ Android File Transfer For Linux (and Mac OS X) (USB)
https://github.com/whoozle/android-file-transfer-linux/blob/master/README.md
⚡️ uMTP-Responder
Lightweight Media Transfer Protocol (MTP) responder daemon for GNU/Linux (USB)
https://github.com/viveris/uMTP-Responder
⚡️ Warpinator
Unofficial reimplementation of Linux Mint's file sharing tool Warpinator for Android – a tool for sending and receiving files between computers that are on the same network. All you need do is install Warpinator on the computers, choose a group code, edit your firewalls if necessary, and that’s all.
https://apt.izzysoft.de/fdroid/repo/slownoscript.warpinator
https://github.com/slownoscript/warpinator-android
⚡️ More?
https://github.com/topics/file-transfer
📡 @NoGoolag 📡 @Libreware
#send #share #file #transfer #hotspot #sync
⚡️SyncThing
https://syncthing.net
⚡️@Trebleshot
https://play.google.com/store/apps/details?id=com.genonbeta.TrebleShot
Or
https://f-droid.org/app/com.genonbeta.TrebleShot
https://github.com/genonbeta/TrebleShot/blob/master/README.md
⚡️SnapDrop
https://snapdrop.net:
https://github.com/RobinLinus/snapdrop/blob/master/README.md
On izzyOnDroid repo: https://apt.izzysoft.de/fdroid/repo/com.fmsys.snapdrop
⚡️Sharik - Multiplatform file sharing via WI-FI
https://f-droid.org/repo/dev.marchello.sharik
iOS https://github.com/marchellodev/sharik
⚡️Uploadgram
File sharing service that uses the Telegram network as file storage
https://f-droid.org/repo/com.pato05.uploadgram
⚡️Device Connect (Android <-> PC)
https://f-droid.org/repo/net.dcnnt
https://github.com/cyanomiko/dcnnt-android
⚡️Blaze
https://blaze.vercel.app
https://github.com/blenderskool/blaze
⚡️LanXchange
https://play.google.com/store/apps/details?id=de.tobifleig.lxc
Or (izzyOnDroid repo)
https://f-droid.org/app/de.tobifleig.lxc
PC: https://www.lanxchange.com
https://github.com/tfg13/LanXchange/blob/master/README.md
⚡️NitroShare
https://play.google.com/store/apps/details?id=net.nitroshare.android
Or (izzyOnDroid repo)
https://f-droid.org/app/net.nitroshare.android
PC: https://nitroshare.net
https://github.com/nitroshare/nitroshare-android/blob/master/README.md
⚡️Dukto
https://play.google.com/store/apps/details?id=it.msec.dukto
PC: http://msec.it/dukto
⚡️Http Share
https://play.google.com/store/apps/details?id=com.MarcosDiez.shareviahttp
Or
https://f-droid.org/app/com.MarcosDiez.shareviahttp
https://github.com/marcosdiez/shareviahttp/blob/master/README.md
⚡️Mass Transfer (only between Androids)
https://github.com/hexian000/MassTransfer/blob/master/README.md
On izzyOnDroid repo: https://f-droid.org/app/me.hexian000.masstransfer
https://github.com/hexian000/MassTransfer/releases
⚡️ OnionShare
https://onionshare.org
https://github.com/micahflee/onionshare/wiki
⚡️ Android File Transfer For Linux (and Mac OS X) (USB)
https://github.com/whoozle/android-file-transfer-linux/blob/master/README.md
⚡️ uMTP-Responder
Lightweight Media Transfer Protocol (MTP) responder daemon for GNU/Linux (USB)
https://github.com/viveris/uMTP-Responder
⚡️ Warpinator
Unofficial reimplementation of Linux Mint's file sharing tool Warpinator for Android – a tool for sending and receiving files between computers that are on the same network. All you need do is install Warpinator on the computers, choose a group code, edit your firewalls if necessary, and that’s all.
https://apt.izzysoft.de/fdroid/repo/slownoscript.warpinator
https://github.com/slownoscript/warpinator-android
⚡️ More?
https://github.com/topics/file-transfer
📡 @NoGoolag 📡 @Libreware
#send #share #file #transfer #hotspot #sync
Forwarded from Free Software Foundation
Digital Trends
Google will charge law enforcement and government agencies to access user data
Google has begun charging law enforcement for access to user data, with fees of $45 for a subpoena, $60 for a wiretap, and $245 for a search warrant. With a high volume of requests from law enforcement agencies to hand over data, Google has decided to bring…
MinMicroG Installer
By MOVZX and FatherJony and FriendlyNeighborhoodShane
GitHub source code: https://github.com/FriendlyNeighborhoodShane/MinMicroG
Github downloads: https://github.com/friendlyneighborhoodshane/minmicrog_releases/releases (all edition can be downloaded here)
This is a simple MicroG installer that only installs the minimum basics. It can install MicroG into your system partition or as a Magisk module. It supports virtually all mobile architectures (arm/64, x86/64, mips/64) and fully supports KitKat and above. It can also (mostly) support much older versions, but sync adapters and some location providers won't work. It can even uninstall itself from your device, just rename it and flash it again. MinMicroG uses official microG APKs so can be updated from the microG F-droid repo.
The things included in the Standard Edition zip are:
- MicroG (GMSCore, GSFProxy, Droidguard, Maps APIv1) (from MicroG FDroid repo)
- Google Play store (modded for IAPs by Setialpha)
- UNLP backends (Dejá vu, LocalGSM, LocalWiFi, Mozilla, Nominatim, RadioCells) (From FDroid repo)
- AuroraDroid (From Whyorean's GitLab)
- AuroraServices (From Whyorean's GitLab)
- Swipe libs for AOSP keyboard (From OpenGApps GitHub repo)
- Some Google DRM jars (From OpenGApps GitHub repo)
- Google Sync adapters for KK to O (From OpenGApps GitHub repo)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The things included in the NoGoolag Edition zip are:
- MicroG (GMSCore, GSFProxy, Droidguard, Maps APIv1) (from MicroG FDroid repo)
- FakeStore (from MicroG FDroid repo)
- AuroraStore (From Whyorean's GitLab)
- AuroraDroid (From Whyorean's GitLab)
- AuroraServices (From Whyorean's GitLab)
- UNLP backends (Dejá vu, LocalGSM, LocalWiFi, Mozilla, Nominatim, RadioCells) (From FDroid repo)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The things included in the UNLP Edition zip are:
- UNLP (From FDroid repo)
- Maps APIv1
- UNLP backends (Dejá vu, LocalGSM, LocalWiFi, Mozilla, Nominatim, RadioCells) (From FDroid repo)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The things included in the AuroraServices Edition zip are:
- AuroraServices (From Whyorean's GitLab)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The zip debloats 3 Google apps from your phone (GmsCore, GoogleServicesFramework, Phonesky and their MicroG counterparts) and 4 NLP providers. In Magisk mode, they won't be removed from system, and if you uninstall the pack, they'll come back. If you install in system, the debloated stuff will be stored in internal-storage/MinMicroG/Backup.
WARNING: This zip does not and never will debloat anything else because that is the minimum coming in MicroG's way. I have had my own share of PTSD with debloating. I believe (through guesswork) that it should work even on flashes over gapped ROMs, but don't take my word for it. Debloat before you flash.
For support:
If you flashed through recovery, provide its logs.
If you used Magisk Manager, provide its logs.
Thanks to @osm0sis for the base magisk/recovery code and inspiration and guidance on the majority of the stuff in here. You're awesome.
Thanks to @Setialpha, the creator of NanoDroid, and ale5000 for the lib installation code and permissions code.
📡 @NoGoolag #minmicrog #microg #installer #magisk
By MOVZX and FatherJony and FriendlyNeighborhoodShane
GitHub source code: https://github.com/FriendlyNeighborhoodShane/MinMicroG
Github downloads: https://github.com/friendlyneighborhoodshane/minmicrog_releases/releases (all edition can be downloaded here)
This is a simple MicroG installer that only installs the minimum basics. It can install MicroG into your system partition or as a Magisk module. It supports virtually all mobile architectures (arm/64, x86/64, mips/64) and fully supports KitKat and above. It can also (mostly) support much older versions, but sync adapters and some location providers won't work. It can even uninstall itself from your device, just rename it and flash it again. MinMicroG uses official microG APKs so can be updated from the microG F-droid repo.
The things included in the Standard Edition zip are:
- MicroG (GMSCore, GSFProxy, Droidguard, Maps APIv1) (from MicroG FDroid repo)
- Google Play store (modded for IAPs by Setialpha)
- UNLP backends (Dejá vu, LocalGSM, LocalWiFi, Mozilla, Nominatim, RadioCells) (From FDroid repo)
- AuroraDroid (From Whyorean's GitLab)
- AuroraServices (From Whyorean's GitLab)
- Swipe libs for AOSP keyboard (From OpenGApps GitHub repo)
- Some Google DRM jars (From OpenGApps GitHub repo)
- Google Sync adapters for KK to O (From OpenGApps GitHub repo)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The things included in the NoGoolag Edition zip are:
- MicroG (GMSCore, GSFProxy, Droidguard, Maps APIv1) (from MicroG FDroid repo)
- FakeStore (from MicroG FDroid repo)
- AuroraStore (From Whyorean's GitLab)
- AuroraDroid (From Whyorean's GitLab)
- AuroraServices (From Whyorean's GitLab)
- UNLP backends (Dejá vu, LocalGSM, LocalWiFi, Mozilla, Nominatim, RadioCells) (From FDroid repo)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The things included in the UNLP Edition zip are:
- UNLP (From FDroid repo)
- Maps APIv1
- UNLP backends (Dejá vu, LocalGSM, LocalWiFi, Mozilla, Nominatim, RadioCells) (From FDroid repo)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The things included in the AuroraServices Edition zip are:
- AuroraServices (From Whyorean's GitLab)
- Permission files for all of this
- An addon.d file to backup/restore everything on a rom flash
The zip debloats 3 Google apps from your phone (GmsCore, GoogleServicesFramework, Phonesky and their MicroG counterparts) and 4 NLP providers. In Magisk mode, they won't be removed from system, and if you uninstall the pack, they'll come back. If you install in system, the debloated stuff will be stored in internal-storage/MinMicroG/Backup.
WARNING: This zip does not and never will debloat anything else because that is the minimum coming in MicroG's way. I have had my own share of PTSD with debloating. I believe (through guesswork) that it should work even on flashes over gapped ROMs, but don't take my word for it. Debloat before you flash.
For support:
If you flashed through recovery, provide its logs.
If you used Magisk Manager, provide its logs.
Thanks to @osm0sis for the base magisk/recovery code and inspiration and guidance on the majority of the stuff in here. You're awesome.
Thanks to @Setialpha, the creator of NanoDroid, and ale5000 for the lib installation code and permissions code.
📡 @NoGoolag #minmicrog #microg #installer #magisk
GitHub
GitHub - FriendlyNeighborhoodShane/MinMicroG: Sources and noscripts for MinMicroG installers. You shall find no prebuilt releases…
Sources and noscripts for MinMicroG installers. You shall find no prebuilt releases here. - FriendlyNeighborhoodShane/MinMicroG
Forwarded from cRyPtHoN™ INFOSEC (EN)
Magecart gang arrested in Indonesia.
First-ever arrest of a Magecart hacker gang
Interpol and Indonesian police have arrested three men on suspicion of being part of a cybercrime group engaged in Magecart attacks.
"Group-IB Cyber Investigations team determined that some of the GetBilling's infrastructure was located in Indonesia," the company said in a press release today. "Upon discovery of this information, INTERPOL's ASEAN Desk promptly notified Indonesian cyber police."
ZDNet - HERE / Interpol - HERE
Read Via Telegram
#oscp #iocteams #spread #snortteams
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
First-ever arrest of a Magecart hacker gang
Interpol and Indonesian police have arrested three men on suspicion of being part of a cybercrime group engaged in Magecart attacks.
"Group-IB Cyber Investigations team determined that some of the GetBilling's infrastructure was located in Indonesia," the company said in a press release today. "Upon discovery of this information, INTERPOL's ASEAN Desk promptly notified Indonesian cyber police."
ZDNet - HERE / Interpol - HERE
Read Via Telegram
#oscp #iocteams #spread #snortteams
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from cRyPtHoN™ INFOSEC (EN)
This media is not supported in your browser
VIEW IN TELEGRAM
Chrome and Firefox Clamp Down on Suspicious Behavior.
Post - HERE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Post - HERE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Forwarded from cRyPtHoN™ INFOSEC (EN)
This media is not supported in your browser
VIEW IN TELEGRAM
Leaked Documents Expose the Secretive Market for Your Web Browsing Data.
An Avast antivirus subsidiary sells 'Every search. Every click. Every buy. On every site.' Its clients have included Home Depot, Google, Microsoft, Pepsi, and McKinsey.
An antivirus program used by hundreds of millions of people around the world is selling highly sensitive web browsing data to many of the world's biggest companies, a joint investigation by Motherboard and PCMag has found. Our report relies on leaked user data, contracts, and other company documents that show the sale of this data is both highly sensitive and is in many cases supposed to remain confidential between the company selling the data and the clients purchasing it.
https://www.vice.com/en_us/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
An Avast antivirus subsidiary sells 'Every search. Every click. Every buy. On every site.' Its clients have included Home Depot, Google, Microsoft, Pepsi, and McKinsey.
An antivirus program used by hundreds of millions of people around the world is selling highly sensitive web browsing data to many of the world's biggest companies, a joint investigation by Motherboard and PCMag has found. Our report relies on leaked user data, contracts, and other company documents that show the sale of this data is both highly sensitive and is in many cases supposed to remain confidential between the company selling the data and the clients purchasing it.
https://www.vice.com/en_us/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Minimal MicroG Installer V2.5
27 january, 2020
By MOVZX and FatherJony and FriendlyNeighborhoodShane
A simple, flexible MicroG Installer
Changelog:
♦ Update All APKs
-- AuroraSevices supports Q
♦ Fix bootloop on Pie
For y'all younglings that don't know what MinMicroG is, check readme.md inside or https://news.1rj.ru/str/NoGoolag/2141
Also somewhat important, the release location has changed from Telegram to Github:
github.com/friendlyneighborhoodshane/minmicrog_releases/releases
Build noscripts and instructions:
github.com/friendlyneighborhoodshane/minmicrog
📡 @NoGoolag
#microg #minmicrog
27 january, 2020
By MOVZX and FatherJony and FriendlyNeighborhoodShane
A simple, flexible MicroG Installer
Changelog:
♦ Update All APKs
-- AuroraSevices supports Q
♦ Fix bootloop on Pie
For y'all younglings that don't know what MinMicroG is, check readme.md inside or https://news.1rj.ru/str/NoGoolag/2141
Also somewhat important, the release location has changed from Telegram to Github:
github.com/friendlyneighborhoodshane/minmicrog_releases/releases
Build noscripts and instructions:
github.com/friendlyneighborhoodshane/minmicrog
📡 @NoGoolag
#microg #minmicrog
Forwarded from cRyPtHoN™ INFOSEC (EN)
Revealed: Anti-virus company Avast has been selling data from its 435 million users to companies including Google, Microsoft, Home Depot and Pepsi including their web history, location and porn searches.
🌀 Avast used a browser plugin and antivirus software to track its users
🌀 The company tracked web history and more from 435 million users
🌀 That data includes porn searchers and in some cases what video was watched
🌀 Data is anonymized but experts warn its specificity endangers privacy
https://www.dailymail.co.uk/sciencetech/article-7936115/Popular-anti-virus-company-revealed-selling-web-history-porn-searches-location-users.html
Earlier Post - HERE and HERE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
🌀 Avast used a browser plugin and antivirus software to track its users
🌀 The company tracked web history and more from 435 million users
🌀 That data includes porn searchers and in some cases what video was watched
🌀 Data is anonymized but experts warn its specificity endangers privacy
https://www.dailymail.co.uk/sciencetech/article-7936115/Popular-anti-virus-company-revealed-selling-web-history-porn-searches-location-users.html
Earlier Post - HERE and HERE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
Ring Doorbell App Packed with Third-Party Trackers
https://www.eff.org/deeplinks/2020/01/ring-doorbell-app-packed-third-party-trackers
https://www.eff.org/deeplinks/2020/01/ring-doorbell-app-packed-third-party-trackers
Electronic Frontier Foundation
Ring Doorbell App Packed with Third-Party Trackers
Ring isn't just a product that allows users to surveil their neighbors. The company also uses it to surveil its customers.An investigation by EFF of the Ring doorbell app for Android found it to be
Grindr and OKCupid Sell Your Data, but Twitter’s MoPub Is the Real Problem
https://www.eff.org/deeplinks/2020/01/grindr-and-okcupid-sell-your-data-twitters-mopub-real-problem
https://www.eff.org/deeplinks/2020/01/grindr-and-okcupid-sell-your-data-twitters-mopub-real-problem
Electronic Frontier Foundation
Grindr and OKCupid Sell Your Data, but Twitter’s MoPub Is the Real
On January 15, a Norweigian Consumer Council (NCC) investigative report exposed the ways that Grindr, OKCupid, and eight other apps are collecting and sharing extremely sensitive personal data.