Privacy & Security Goys
Bullish for Monero 🪙
This isn't just for stocks or crypto, and it certainly doesn't apply to "billionaires." Think about real estate. If the value of your home has increased by x% in a given year, doesn't this mean you'll be forced to pay for that, too? It doesn't matter if you have no intention on selling your family homestead — owning land and hard assets is textbook bigotry.
Please correct me if I'm wrong. It would not surprise me in the slightest if this is another play to strip what's left of the middle class of their houses, and force them into renting their living space instead.
You will own nothing and be happy.
Please correct me if I'm wrong. It would not surprise me in the slightest if this is another play to strip what's left of the middle class of their houses, and force them into renting their living space instead.
You will own nothing and be happy.
Forwarded from Disclose.tv
JUST IN - Biden admin is considering payments of $450,000 per person to immigrant families that were separated after illegally crossing the border during the Trump administration (WSJ)
@disclosetv
@disclosetv
Think about what your plans are for when System enforcers come to your door to inject you and your family. Plan and practice for such a contingency. You and I know this won't be limited to Austria.
https://www.politico.eu/article/austria-mandatory-coronavirus-vaccination-february/
https://www.politico.eu/article/austria-mandatory-coronavirus-vaccination-february/
POLITICO
Austria becomes first Western country to resort to mandatory coronavirus vaccination
New 20-day nationwide lockdown also announced as hospitals overwhelmed.
As far as we know at this time, this is just where the vehicle was parked. The suspect may or may not live there.
One of the terrorists, Darrell Edward BROOKS, shows off his mass murder weapon of choice (his SUV) in a YouTube music video. License plate matches partial plate given over police scanner.
Also note that BROOKS is a non-compliant sex offender (manually enter his name to search for yourself). It's clear that rapists and pedophiles have taken Rosenbaum's death personally, and are striking back against the White population unfortunate enough to live near them.
Also note that BROOKS is a non-compliant sex offender (manually enter his name to search for yourself). It's clear that rapists and pedophiles have taken Rosenbaum's death personally, and are striking back against the White population unfortunate enough to live near them.
This media is not supported in your browser
VIEW IN TELEGRAM
Source: Kraken, but as they require KYC and cave in to anti-privacy cryptocurrency regulations, this is not an endorsement. If you live in the UK and hold Monero on Kraken, move it to a wallet asap. And no matter where you live, if you don't hold it, you don't own it – keep the majority of your funds off exchanges and in your wallet.
Forwarded from cRyPtHoN™ INFOSEC (EN)
FBI training document shows lawful access to multiple encrypted messaging apps.
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.
The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.
The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.
The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.
https://securityaffairs.co/wordpress/125176/security/encrypted-messaging-apps-data-access.html
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.
The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.
The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.
The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.
https://securityaffairs.co/wordpress/125176/security/encrypted-messaging-apps-data-access.html
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
👍2❤1
Earlier today, our public general chat was censored on all versions of Telegram downloaded from the Google and Apple app stores. There was no warning or notice given to us.
Our chat remains accessible to those who downloaded the Telegram .apk from the official website or via F-Droid; while our ideological enemies in Silicon Valley have actively chosen to censor us, we haven't violated Telegram's terms and conditions.
As mentioned previously, we enemies of the state are on borrowed time here. We may choose to migrate to another platform in time, but regardless, we hope you implement some knowledge you've learnt here in the real world.
Our chat remains accessible to those who downloaded the Telegram .apk from the official website or via F-Droid; while our ideological enemies in Silicon Valley have actively chosen to censor us, we haven't violated Telegram's terms and conditions.
As mentioned previously, we enemies of the state are on borrowed time here. We may choose to migrate to another platform in time, but regardless, we hope you implement some knowledge you've learnt here in the real world.
Telegram
TCreport Daily
Forwarded from Privacy & Security Goys
Media is too big
VIEW IN TELEGRAM
Over the course of our time here on Telegram spreading awareness and tips on how to avoid getting doxxed we have caught the attention of all kinds of people. From terrorist tracking groups to the kikes at various “news” outlets and elsewhere. We’ve always found their kvetching about our posts and humble following to be amusing and we love the street cred that comes with pissing these people off to these sorts of levels.
I’ve been playing with the idea of having this video made and finally I pulled the trigger... Thankfully a friendly goy that runs @BanThisChannelVI was able to come through with this hilarious video that I’m sharing with you today.
To all the kikes, liars, sellouts, and all of our other enemies that love to make us out to be something we’re not.... Keep it coming.
I’ve been playing with the idea of having this video made and finally I pulled the trigger... Thankfully a friendly goy that runs @BanThisChannelVI was able to come through with this hilarious video that I’m sharing with you today.
To all the kikes, liars, sellouts, and all of our other enemies that love to make us out to be something we’re not.... Keep it coming.
🔥1
Our greatest ally 👃
Reuters
U.S. State Department phones hacked with Israeli company spyware - sources
Apple Inc iPhones of at least nine U.S. State Department employees were hacked by an unknown assailant using sophisticated spyware developed by the Israel-based NSO Group, according to four people familiar with the matter.
👍3
Here's a textbook example of why we do not encourage pro-White activists to join public groups: "Torch Antifascist Network" reports monitoring the internal communications of Patriot Front.
Even though they state the leaked documents "reveal an organization incapable of moving beyond furtive flyering sessions and photo opportunities," they still continue to dox the alleged PF members. This happens to this day.
Tonight, Patriot Front marches in Washington DC, with Antifa ready to engage. And while the QBoomers in those comments are quick to denounce the activists as "feds," this is the standard outcry from limp-dicked conservatives. As far as they're concerned, any direct action is a false flag.
I am not here to denounce PF... but I cannot understand why anyone would want to attempt a march again after Unite the Right and Stop the Steal achieved nothing but put White people behind bars.
By all means, get out there and do something for your people. Being a spectator while the world falls into the flames gets boring. But weigh the potential costs and benefits in everything you do. Going for a walk in uniform involves the risk of injury, death, arrest, losing employment, etc. If anyone brought their phones on this march, you know the feds have them on file.
This isn't a game. This is quite literally a matter of life and death. What happens if next parade, an antifascist empties their mag into the crowd and disappears? The System and its enforcers (both feds and reds) want you dead. Start acting like it.
But hey, at least the low-hanging fruit keeps heat off the rest of us.
A peaceful protest does not strike fear into the enemy.
@PrivSecGoy
Even though they state the leaked documents "reveal an organization incapable of moving beyond furtive flyering sessions and photo opportunities," they still continue to dox the alleged PF members. This happens to this day.
Tonight, Patriot Front marches in Washington DC, with Antifa ready to engage. And while the QBoomers in those comments are quick to denounce the activists as "feds," this is the standard outcry from limp-dicked conservatives. As far as they're concerned, any direct action is a false flag.
I am not here to denounce PF... but I cannot understand why anyone would want to attempt a march again after Unite the Right and Stop the Steal achieved nothing but put White people behind bars.
By all means, get out there and do something for your people. Being a spectator while the world falls into the flames gets boring. But weigh the potential costs and benefits in everything you do. Going for a walk in uniform involves the risk of injury, death, arrest, losing employment, etc. If anyone brought their phones on this march, you know the feds have them on file.
This isn't a game. This is quite literally a matter of life and death. What happens if next parade, an antifascist empties their mag into the crowd and disappears? The System and its enforcers (both feds and reds) want you dead. Start acting like it.
But hey, at least the low-hanging fruit keeps heat off the rest of us.
A peaceful protest does not strike fear into the enemy.
@PrivSecGoy
👍7
Forwarded from Conservative Revolution
A story of youth, dissent, love and betrayal in post 9/11 America woven exclusively with FBI surveillance, ERIC & “ANNA” tells the story of a teenage informant and the activist she helped to put in prison for nearly 20 years
https://fieldofvision.org/eric-anna/
( documentary linked )
Anna would go on to lead McDavid and two other activists in their 20s in a loose plot to bomb targets in Northern California.
one of the longest sentences given to an alleged eco-terrorist in the United States. At the time of his conviction, the FBI had built a network of more than 15,000 informants like Anna
https://theintercept.com/2015/11/19/an-fbi-informant-seduced-eric-mcdavid-into-a-bomb-plot-then-the-government-lied-about-it/
https://news.1rj.ru/str/Anglomania
https://fieldofvision.org/eric-anna/
( documentary linked )
Anna would go on to lead McDavid and two other activists in their 20s in a loose plot to bomb targets in Northern California.
one of the longest sentences given to an alleged eco-terrorist in the United States. At the time of his conviction, the FBI had built a network of more than 15,000 informants like Anna
https://theintercept.com/2015/11/19/an-fbi-informant-seduced-eric-mcdavid-into-a-bomb-plot-then-the-government-lied-about-it/
https://news.1rj.ru/str/Anglomania
🔥1
"Michael Morell, who served as acting director of the agency on two separate occasions under President Obama, also sees the value of Bitcoin to the intelligence community.
"Morell called blockchain technology a 'boon for surveillance' in a report, published by the Coinbase- and Square-led Crypto Council for Innovation.
"The report defended the cryptocurrency against claims that its best use case is for criminal enterprise. Instead, the public nature of transactions makes it an 'underutilized forensic tool for governments to identify illicit activity.'"
Explains the push for israel's zcash and delisting of Monero 🙄
"Morell called blockchain technology a 'boon for surveillance' in a report, published by the Coinbase- and Square-led Crypto Council for Innovation.
"The report defended the cryptocurrency against claims that its best use case is for criminal enterprise. Instead, the public nature of transactions makes it an 'underutilized forensic tool for governments to identify illicit activity.'"
Explains the push for israel's zcash and delisting of Monero 🙄
Decrypt
CIA Confirms the Rumors: It Really Is Working on Cryptocurrency Projects - Decrypt
The CIA may not have invented Bitcoin as conspiracy theorists claim, but it runs several cryptocurrency projects, says Director William Burns.
👍1
2021-acsac.pdf
1.5 MB
An airgapped computer does not connect to the internet and is inherently less vulnerable to attacks. However, as this study shows, it's possible for an adversary equipped with lasers to compromise your devices.
Fortunately, these largely theoretical attacks are easily mitigated by keeping your devices out of sight; ideally in a secured basement room without windows.
Fortunately, these largely theoretical attacks are easily mitigated by keeping your devices out of sight; ideally in a secured basement room without windows.
Privacy & Security Goys
2021-acsac.pdf
Attacks that require malware implanted in some devices:
Exfiltration of Data through a Malware infected Router: https://www.youtube.com/watch?v=mSNt4h7EDKo
Exfiltration of Data through observation of Light variation in a Backlit keyboard with a compromised camera: https://www.youtube.com/watch?v=1kBGDHVr7x0
Exfiltration of Data through a compromised Security Camera (that could first use the previous attack) https://www.youtube.com/watch?v=om5fNqKjj2M
Communication from outsider to compromised Security Cameras through IR light signals: https://www.youtube.com/watch?v=auoYKSzdOj4
Exfiltration of data from a compromised air-gapped computer through acoustic analysis of the FAN noises with a smartphone https://www.youtube.com/watch?v=v2_sZIfZkDQ
Exfiltration of data from a malware-infected air-gapped computer through HD LEDs with a Drone https://www.youtube.com/watch?v=4vIu8ld68fc
Exfiltration of data from a USB malware on an air-gapped computer through electromagnetic interferences https://www.youtube.com/watch?v=E28V1t-k8Hk
Exfiltration of data from a malware-infected HDD drive through covert acoustic noise https://www.youtube.com/watch?v=H7lQXmSLiP8
Exfiltration of data through GSM frequencies from a compromised (with malware) air-gapped computer https://www.youtube.com/watch?v=RChj7Mg3rC4
Exfiltration of data through electromagnetic emissions from a compromised Display device https://www.youtube.com/watch?v=2OzTWiGl1rM&t=20s
Exfiltration of data through magnetic waves from a compromised air-gapped computer to a Smartphone stored inside a Faraday bag https://www.youtube.com/watch?v=yz8E5n1Tzlo
Communication between two compromised air-gapped computers using ultrasonic soundwaves https://www.youtube.com/watch?v=yz8E5n1Tzlo
Exfiltration of Bitcoin Wallet from a compromised air-gapped computer to a smartphone https://www.youtube.com/watch?v=2WtiHZNeveY
Exfiltration of Data from a compromised air-gapped computer using display brightness https://www.youtube.com/watch?v=ZrkZUO2g4DE
Exfiltration of Data from a compromised air-gapped computer through vibrations https://www.youtube.com/watch?v=XGD343nq1dg
Exfiltration of Data from a compromised air-gapped computer by turning RAM into a Wi-Fi emitter https://www.youtube.com/watch?v=vhNnc0ln63c
Exfiltration of Data from a compromised air-gapped computer through power lines https://arxiv.org/abs/1804.04014
Attacks that require no malware:
Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing. Publication with demonstration: http://wallcamera.csail.mit.edu/
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room. Publication with photographic examples: https://arxiv.org/abs/2001.04642
Measuring floor vibrations to identify individuals and determine their health condition and mood. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html
Observing a light bulb from a distance to listen to the sound in the room without any malware: Demonstration: https://www.youtube.com/watch?v=t32QvpfOHqw. It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html
Exfiltration of Data through a Malware infected Router: https://www.youtube.com/watch?v=mSNt4h7EDKo
Exfiltration of Data through observation of Light variation in a Backlit keyboard with a compromised camera: https://www.youtube.com/watch?v=1kBGDHVr7x0
Exfiltration of Data through a compromised Security Camera (that could first use the previous attack) https://www.youtube.com/watch?v=om5fNqKjj2M
Communication from outsider to compromised Security Cameras through IR light signals: https://www.youtube.com/watch?v=auoYKSzdOj4
Exfiltration of data from a compromised air-gapped computer through acoustic analysis of the FAN noises with a smartphone https://www.youtube.com/watch?v=v2_sZIfZkDQ
Exfiltration of data from a malware-infected air-gapped computer through HD LEDs with a Drone https://www.youtube.com/watch?v=4vIu8ld68fc
Exfiltration of data from a USB malware on an air-gapped computer through electromagnetic interferences https://www.youtube.com/watch?v=E28V1t-k8Hk
Exfiltration of data from a malware-infected HDD drive through covert acoustic noise https://www.youtube.com/watch?v=H7lQXmSLiP8
Exfiltration of data through GSM frequencies from a compromised (with malware) air-gapped computer https://www.youtube.com/watch?v=RChj7Mg3rC4
Exfiltration of data through electromagnetic emissions from a compromised Display device https://www.youtube.com/watch?v=2OzTWiGl1rM&t=20s
Exfiltration of data through magnetic waves from a compromised air-gapped computer to a Smartphone stored inside a Faraday bag https://www.youtube.com/watch?v=yz8E5n1Tzlo
Communication between two compromised air-gapped computers using ultrasonic soundwaves https://www.youtube.com/watch?v=yz8E5n1Tzlo
Exfiltration of Bitcoin Wallet from a compromised air-gapped computer to a smartphone https://www.youtube.com/watch?v=2WtiHZNeveY
Exfiltration of Data from a compromised air-gapped computer using display brightness https://www.youtube.com/watch?v=ZrkZUO2g4DE
Exfiltration of Data from a compromised air-gapped computer through vibrations https://www.youtube.com/watch?v=XGD343nq1dg
Exfiltration of Data from a compromised air-gapped computer by turning RAM into a Wi-Fi emitter https://www.youtube.com/watch?v=vhNnc0ln63c
Exfiltration of Data from a compromised air-gapped computer through power lines https://arxiv.org/abs/1804.04014
Attacks that require no malware:
Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing. Publication with demonstration: http://wallcamera.csail.mit.edu/
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room. Publication with photographic examples: https://arxiv.org/abs/2001.04642
Measuring floor vibrations to identify individuals and determine their health condition and mood. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html
Observing a light bulb from a distance to listen to the sound in the room without any malware: Demonstration: https://www.youtube.com/watch?v=t32QvpfOHqw. It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html
👍2
Forwarded from Pepe Library 🐸
This media is not supported in your browser
VIEW IN TELEGRAM
Merry Christmas, frens!
❤5🔥2
Take a moment from your family celebrations and double-check that you're not downloading files automatically on Telegram. Go to settings -> data and storage -> automatic media download. Uncheck the boxes for group, channel, and private chats (at least for the time being).
This malware is targeting crypto-currency wallets on people's devices, including: Armory, AtomicWallet, BitcoinCore, ByteCoin, DashCore, Electrum, Exodus, Ethereum, Jaxx, LitecoinCore, Monero, and Zcash. Hidden keyloggers can scan for your seed phrase stored on your device.
Of course, this risk is mitigated by not storing the seed or private key associated with the majority of your crypto-currency holdings on "hot" wallets – devices that connect to the internet.
Merry Christmas and a Blessed Yule from the whole crew here at @PrivSecGoy!
This malware is targeting crypto-currency wallets on people's devices, including: Armory, AtomicWallet, BitcoinCore, ByteCoin, DashCore, Electrum, Exodus, Ethereum, Jaxx, LitecoinCore, Monero, and Zcash. Hidden keyloggers can scan for your seed phrase stored on your device.
Of course, this risk is mitigated by not storing the seed or private key associated with the majority of your crypto-currency holdings on "hot" wallets – devices that connect to the internet.
Merry Christmas and a Blessed Yule from the whole crew here at @PrivSecGoy!
X (formerly Twitter)
Vladimir S. | Officer's Notes (@officer_cia) on X
Warning ❗️ An attack on thematic @telegram crypto chats ongoing now. The attackers use an account named "Smokes Night" to spread Echelon malware by dropping a file into the chat room.
TLDR: Disable auto-downloading in Telegram settings right now.
👇 See…
TLDR: Disable auto-downloading in Telegram settings right now.
👇 See…
👍6