Forwarded from North American News
Gay British Politician catfished into sending the personal phone numbers of his fellow MPs on gay sex app.
Men not sending sensitive info and having shit OPSEC to people they want to bang challenge: impossible
https://www.cbsnews.com/news/uk-sexting-spear-phishing-scam-mp-william-wragg-lawmaker-phone-numbers/
Men not sending sensitive info and having shit OPSEC to people they want to bang challenge: impossible
https://www.cbsnews.com/news/uk-sexting-spear-phishing-scam-mp-william-wragg-lawmaker-phone-numbers/
CBS News
U.K. police investigate "spear phishing" sexting scam as lawmaker admits to sharing colleagues' phone numbers
British police are investigating explicit messages sent to a lawmaker as part of an alleged sexting scam targeting politicians.
🤗38🤡20❤2👍1💋1
Forwarded from (Dead)
North American News
Gay British Politician catfished into sending the personal phone numbers of his fellow MPs on gay sex app. Men not sending sensitive info and having shit OPSEC to people they want to bang challenge: impossible https://www.cbsnews.com/news/uk-sexting-spear…
This reminds us of when some antifa fag infiltrated Greg Johnson's (open homosexual) organization years ago and got everything from him just by sleeping with him a couple of times.
Probably the easiest infiltration op as they didn't even have to change anything other than being racist lmao.
Probably the easiest infiltration op as they didn't even have to change anything other than being racist lmao.
🤣73😎5🔥3❤🔥1👍1👎1😍1
Forwarded from #TBOT: Take Back Our Tech
@takebackourtech
Today a judgement was passed in Julian Assange’s extradition case, although it drags the case on and gives the possibility for a final rejection. If this happens, Assange will spend up to 175 years in a US maximum security prison.
His crime? Publishing classified documents which corroborated war crimes, covert surveillance programs, and torture. We pray for his release, and we will never forget how Assange and Wikileaks illuminated public awareness of these shadowy programs so we could begin to protect ourselves.
Follow Taylor Hudak for coverage on the Assange Trial.
Follow the #TBOT Telegram Channel
Follow the #TBOT substack.
In honor of Julian Assange, here are 5 published Wikileaks that expanded our awareness on technology surveillance.
1. The Location of 100 Amazon Data Centers
Amazon, the largest cloud computing provider in the world is also one of the largest cloud providers for government and military. They wouldn’t be doing their jobs if they weren’t protecting the locations of their data centers, unforunately for them - they didn’t see Wikileaks coming. In 2018, Wikileaks published a highly confidential document that listed the IP addresses of one-hundred data centers.
No, there’s no creepy looking Amazon badge on these buildings - these buildings were operated under front companies. The names of these front companies were leaked along with addresses, contact emails, and directions - and a map of their locations.
What secrets lie behind the walls of these unassuming buildings?
https://wikileaks.org/amazon-atlas
2. ELSA, Locating Windows Computers Through WiFi
Leaked in 2017 as part of the Vault 7 CIA hacking tools, ELSA is a geo-location malware project that can detect the location of Windows devices. Once ELSA has infected a target computer, it takes a list of available WiFi access points and cross-references these access points with public geo-location databases supplied by Google or Microsoft. Based on the signal strength it can calculate the position of the device which can be exfiltrated later.
#TBOT Tip: Don’t use Windows. Learn to love Linux.
3. No Isolated Network Is Safe, Brutal Kangaroo
Brutal Kangaroo, also a part of the Vault 7 tools was used to target closed ‘air-gapped’ networks that are not connected to to the outside world. Brutal Kangaroo is deployed using a thumbdrive, and can spread through use of the thumbdrive on other computers. Eventually, controlled computers begin communicating directly with each other to exchange data.
#TBOT Tip: Be watchful over your devices. No external USBs, avoid having USBs delivered.
4. Is your local router a FlyTrap?
CheryBlossom, another tool from Vault 7 is used to capture wireless network devices like wireless routers. Routers can be compromised over the internet through a firmware upgrade, at which point the router becomes a FlyTrap and acts as an ‘Man-In-The-Middle’, manipulating the internet traffic passing through it. It can scan for email addresses, chats, MAC addresses of devices, and VoIP numbers.
#TBOT Tip: Run a VPN on each device to encrypt internet traffic before it reaches a network.
5. Scribbles: Hidden watermarks in printed documents
A tool that has likely been used to catch whistleblowers, Scribbles is yet another Vault 7 project that embeds beacons into Microsoft Office documents. When a whistleblower prints the documents and releases them, the watermark can be restored to discover the source of the leak. Alternative softwares like OpenOffice or LibreOffice made this watermark visible to the target, and it was recommended to make the watermark match the document.
Readers may be reminded of the NSA’s case against whistlerblower Reality Leigh Winner, a former Air Force Linguist who worked for the NSA and sent a printed document to be published at The Intercept. Certain printers use microdots to identify the printer, date and time of printing.
Be careful what you print!
Please open Telegram to view this post
VIEW IN TELEGRAM
👍55🔥7🍌3❤1👏1
Yesterday, one of our channel's subscribers reported that the corner of their screen blinks when viewing videos on Telegram. Today, a possible RCE (found by the group @exploitorg) was detected in Telegram's media processing exclusive to Windows. This exposes users to malicious attacks through media files, such as images or videos.
To rectify this, please follow these steps:
1. Install Linux
Alternatively, disable the auto-download feature:
1. Go to Settings.
2. Tap on Data and Storage.
3. Under the Automatic Media Download section, disable auto-download for "Photos", "Videos", and "Files" across all network types (Mobile Data, Wi-Fi, and Roaming).
To rectify this, please follow these steps:
1. Install Linux
Alternatively, disable the auto-download feature:
1. Go to Settings.
2. Tap on Data and Storage.
3. Under the Automatic Media Download section, disable auto-download for "Photos", "Videos", and "Files" across all network types (Mobile Data, Wi-Fi, and Roaming).
😁52🥰18👍15🍌4🤡2😨2
Forwarded from cKure Red
BREAKING: IRANIAN CYBER ATTACK SHUTS DOWN ISRAEL'S ELECTRIC GRID.
Iranian-linked "Cyber Avengers" hacker group has claimed they orchestrated widespread blackouts in Israel, impacting cities like Tel Aviv, Netanya, and more.
The group accused Israeli authorities of dismissing these incidents as mere technical glitches while secretly losing control over their electrical systems.
Asserting dominance, the group warned of additional, potent cyber-attacks on vital Israeli infrastructure.
Source: IRGC TG
Iranian-linked "Cyber Avengers" hacker group has claimed they orchestrated widespread blackouts in Israel, impacting cities like Tel Aviv, Netanya, and more.
The group accused Israeli authorities of dismissing these incidents as mere technical glitches while secretly losing control over their electrical systems.
Asserting dominance, the group warned of additional, potent cyber-attacks on vital Israeli infrastructure.
Source: IRGC TG
😁119⚡37❤12🔥9🤣3👍2🤯2🤡2🍌2🥰1
Privacy & Security Goys
🚫🍔 https://news.1rj.ru/str/exploitorg/31
Telegram throwing shade at us fr
https://www.bleepingcomputer.com/news/security/telegram-fixes-windows-app-zero-day-used-to-launch-python-noscripts/
Rumors about the existence of zero-click vulnerabilities in Telegram Desktop are inaccurate. Some "experts" recommended to "disable automatic downloads" on Telegram — there were no issues which could have been triggered by automatic downloads.
However, on Telegram Desktop, there was an issue that required the user to CLICK on a malicious file while having the Python interpreter installed on their computer. Contrary to earlier reports, this was not a zero-click vulnerability and it could affect only a tiny fraction of our user base: less than 0.01% of our users have Python installed and use the relevant version of Telegram for Desktop.
A server-side fix has been applied to ensure that even this issue no longer reproduces, so all versions of Telegram Desktop (including all older ones) no longer have this issue.
https://www.bleepingcomputer.com/news/security/telegram-fixes-windows-app-zero-day-used-to-launch-python-noscripts/
BleepingComputer
Telegram fixes Windows app zero-day used to launch Python noscripts
Telegram fixed a zero-day vulnerability in its Windows desktop application that could be used to bypass security warnings and automatically launch Python noscripts.
😭35😁9👍5🤣2🍌2❤1❤🔥1🤡1🖕1
The identity of the commander of Israel’s Unit 8200 is a closely guarded secret. He occupies one of the most sensitive roles in the military, leading one of the world’s most powerful surveillance agencies, comparable to the US National Security Agency.
Yet after spending more than two decades operating in the shadows, the Guardian can reveal how the controversial spy chief – whose name is Yossi Sariel – has left his identity exposed online.
The embarrassing security lapse is linked to a book he published on Amazon, which left a digital trail to a private Google account created in his name, along with his unique ID and links to the account’s maps and calendar profiles.
The Guardian has confirmed with multiple sources that Sariel is the secret author of The Human Machine Team, a book in which he offers a radical vision for how artificial intelligence can transform the relationship between military personnel and machines.
Published in 2021 using a pen name composed of his initials, Brigadier General YS, it provides a blueprint for the advanced AI-powered systems that the Israel Defense Forces (IDF) have been pioneering during the six-month war in Gaza.
An electronic version of the book included an anonymous email address that can easily be traced to Sariel’s name and Google account. Contacted by the Guardian, an IDF spokesperson said the email address was not Sariel’s personal one, but "dedicated specifically for issues to do with the book itself."
Later on Friday, in a statement to the Israeli media, the IDF described the book’s exposure of Sariel’s personal details as "a mistake," adding: "The issue will be examined to prevent the recurrence of similar cases in the future."
https://www.theguardian.com/world/2024/apr/05/top-israeli-spy-chief-exposes-his-true-identity-in-online-security-lapse
Yet after spending more than two decades operating in the shadows, the Guardian can reveal how the controversial spy chief – whose name is Yossi Sariel – has left his identity exposed online.
The embarrassing security lapse is linked to a book he published on Amazon, which left a digital trail to a private Google account created in his name, along with his unique ID and links to the account’s maps and calendar profiles.
The Guardian has confirmed with multiple sources that Sariel is the secret author of The Human Machine Team, a book in which he offers a radical vision for how artificial intelligence can transform the relationship between military personnel and machines.
Published in 2021 using a pen name composed of his initials, Brigadier General YS, it provides a blueprint for the advanced AI-powered systems that the Israel Defense Forces (IDF) have been pioneering during the six-month war in Gaza.
An electronic version of the book included an anonymous email address that can easily be traced to Sariel’s name and Google account. Contacted by the Guardian, an IDF spokesperson said the email address was not Sariel’s personal one, but "dedicated specifically for issues to do with the book itself."
Later on Friday, in a statement to the Israeli media, the IDF described the book’s exposure of Sariel’s personal details as "a mistake," adding: "The issue will be examined to prevent the recurrence of similar cases in the future."
https://www.theguardian.com/world/2024/apr/05/top-israeli-spy-chief-exposes-his-true-identity-in-online-security-lapse
the Guardian
Top Israeli spy chief exposes his true identity in online security lapse
Exclusive: Yossi Sariel unmasked as head of Unit 8200 and architect of AI strategy after book written under pen name reveals his Google account
🤣122🔥8👍6🥴5❤2🥰1👏1😁1🍌1
This media is not supported in your browser
VIEW IN TELEGRAM
Potential adversaries can use social engineering against customer support wagies to steal your chicken tendies money, and there's little you can do to prevent it.
🤯92😁11🤡11👍2🍌1
https://tmo.report/2024/04/t-mobile-employees-across-the-country-receive-cash-offers-to-illegally-swap-sims/
Hire pajeets, hire scammers who scam your own customers
Hire pajeets, hire scammers who scam your own customers
The Mobile Report
T-Mobile Employees Across The Country Receive Cash Offers To Illegally Swap SIMs
T-Mobile employees, both third-party and corporate, are receiving cash offers via text to complete SIM swaps for criminals.
✍64😁23🌚4🤡1🍌1
Forwarded from NoGoolag
Open-source passive radar taken down for regulatory reasons (2022)
https://hackaday.com/2022/11/19/open-source-passive-radar-taken-down-for-regulatory-reasons/
Comments
https://hackaday.com/2022/11/19/open-source-passive-radar-taken-down-for-regulatory-reasons/
Comments
Hackaday
Open-Source Passive Radar Taken Down For Regulatory Reasons
Open-source technology brings a world that laws and regulations are not quite prepared for. As a result, every now and then, open projects need to work around governmental regulations. In todayR…
🍌39🎉4🥰1🥴1🍾1
Media is too big
VIEW IN TELEGRAM
Telegram founder Pavel Durov tells Tucker Carlson about a few interactions he and his team have had with the FBI.
It is important to note the emphasis on open-source software; the feds were not trying to endorse the use of closed-source, proprietary software. Which, of course, hints at the existence of backdoors in at least one specific open-source library.
I'd recommend watching the full interview.
It is important to note the emphasis on open-source software; the feds were not trying to endorse the use of closed-source, proprietary software. Which, of course, hints at the existence of backdoors in at least one specific open-source library.
I'd recommend watching the full interview.
👍93✍24❤8🤡4🍌2🥴1🤣1
In coordination with Europol, the General Directorate Combating Organized Crime (GDBOP), a specialist unit within Bulgaria's Ministry of Interior, says it has shut down a dozen music piracy sites.
https://torrentfreak.com/music-piracy-sites-targeted-by-europol-bulgarian-organized-crime-unit-240415/
The domains of the dozen music piracy sites targeted “due to numerous violations of intellectual property rights” are reported by GDBOP as follows:
downloadmp3bg.com, baixarmp3gratis.com, www.tekstove.org, mp3pesme.com, mp3piosenki.com, descarca-muzica.com, indirsarki.com, mp3kostenlos.com, mp3hitove.com, mp3greek.gr, xn--3-wtbj.net, mp3aghani.com
The domains now display a seizure banner in Bulgarian (translation alongside)
😭51🤬22🖕7👍4❤🔥1🎉1🍌1💔1🤨1🍾1
Forwarded from cKure Red
The AI-Assisted genocide (as documents of the first-time use of AI to kill humans emerge from Israeli active personnel and their media pellets outlets).
The documentary by Al-Jazeera news network was supported by content and news provided by two Israeli news networks, '+972 Magazine' and 'Local Call'. These agencies received information from active Israeli personnel (working IDF members) in the field that have access to the platform and its working. The whistle-blowers cited their conscience to report the unprecedented crime by IDF against the native muslim population of Palestine 🇵🇸 in Gaza and in Jenin, West Bank.
The AI system takes primarily 6 inputs from the Israeli military. In addition, it also uses Google Maps and other sophisticated software made by Google specifically for the support of Palestinian extermination (to which the engineers at google have protested publicly and were fired as a consequence). The modified 'Lavender AI' is called 'Gospel' and takes input from social media accounts if Palestinians. Any activity by a Palestinian in the past or present that is against the establishment of the Israeli regime is considered a worthy kill by the AI. The 'Gospel AI' does increase the kill chances of a person if he switched his SIM cards often. This information is provided by governance and private companies in Israel using their spyware and telecom hacking and sorting software.
The attack by Zionist Jews ✡️ using this AI has a way to feed the collateral damage. Those parameters have been set by the top echelon of the Zionist state. The results of over 50K killed Palestinians (non-alive people directly killed by Israel and non listed humans as in foetuses).
https://www.972mag.com/lavender-ai-israeli-army-gaza/
https://www.theguardian.com/world/2024/apr/03/israel-gaza-ai-database-hamas-airstrikes
https://www.aljazeera.com/news/2024/4/4/ai-assisted-genocide-israel-reportedly-used-database-for-gaza-kill-lists
https://youtu.be/cYQcT2Lv-y4
https://www.instagram.com/reel/C3GId3qtUlp/
https://youtu.be/GFD_Cgr2zho
Please open Telegram to view this post
VIEW IN TELEGRAM
+972 Magazine
‘Lavender’: The AI machine directing Israel’s bombing spree in Gaza
The Israeli army has marked tens of thousands of Gazans as suspects for assassination, using an AI targeting system with little human oversight and a permissive policy for casualties, +972 and Local Call reveal.
🤬60😱26🖕17👍7🤔5😁4🥰2🍌2❤1👎1🍾1
This media is not supported in your browser
VIEW IN TELEGRAM
⚡165🥰39😁9🎉9🫡8🤡6❤4💯4🏆3🍌2🙏1
This media is not supported in your browser
VIEW IN TELEGRAM
Law and Order did an episode on Active Clubs
😁158🤣19⚡10💋8🥴5👍4🔥3🤡1💯1🍌1🤨1
Forwarded from White Lives Matter Official
📌 A quick recap of how we got to 20,000 strong pro-Whites on Telegram.
The idea
》WLM is a decentralized, legal, explicitly pro-White global initiative that is based on meritocraticy and freedom of expression
》It puts forward a culture of elegant, pro-White action that resonates with Whites and particularly with White fathers
》It's purpose, laid out in the manual, is to create local pro-White efforts that use the manual to spread the goal
》Like White cells in a human body, we are spreading the pro-White cure against the anti-White cancer.
The goal is simple - the 14 words.
As any meritocratic, shared accountability initiative - this is entirely a shared success. Honor to all who contribute!
@wlmcontactbot to do your part!
@WhiteLivesMatterOfficial
@WLMofficial14
Twitter
The idea
》WLM is a decentralized, legal, explicitly pro-White global initiative that is based on meritocraticy and freedom of expression
》It puts forward a culture of elegant, pro-White action that resonates with Whites and particularly with White fathers
》It's purpose, laid out in the manual, is to create local pro-White efforts that use the manual to spread the goal
》Like White cells in a human body, we are spreading the pro-White cure against the anti-White cancer.
The goal is simple - the 14 words.
As any meritocratic, shared accountability initiative - this is entirely a shared success. Honor to all who contribute!
@wlmcontactbot to do your part!
@WhiteLivesMatterOfficial
@WLMofficial14
⚡63🤡15❤🔥12❤4👍4👏4🆒3🍌2💊1