cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

Privacy & Security Goys

"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News "A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner

Show more
Advertising posts
932
Subscribers
+1224 hours
+1217 days
+12130 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel. This API is not exposed to other sites - only to *.google.com. https://x.com/lcasdev/status/1810696257137959018 #google #chrome #extension #privacy 📡@cRyPtHoN_INFOSEC_IT 📡@cRyPtHoN_INFOSEC_FR 📡@cRyPtHoN_INFOSEC_EN 📡@cRyPtHoN_INFOSEC_DE 📡@BlackBox_Archiv
Show all...
Luca Casonato 🏳️‍🌈 (@lcasdev) on X

So, Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel. This API is not exposed to other sites - only to *.google.com.

🌭 5🤷‍♂ 1👍 1🍌 1
Europol Seeks to Break Mobile Roaming Encryption EU’s law enforcement agency Europol is another major entity that is setting its sights on breaking encryption. This time, it’s about home routing and mobile encryption, and the justification is a well-known one: encryption supposedly stands in the way of the ability of law enforcement to investigate. Europol’s recent paper treats home routing not as a useful security feature, but, as “a serious challenge for lawful interception.” Home routing works by encrypting data from a phone through the home network while roaming.
Show all...
Europol-Position-paper-on-Home-routing.pdf4.42 MB
💩 10🤔 1🍌 1
Show all...
Z-Library Admins "Escape House Arrest" After Judge Approves U.S. Extradition * TorrentFreak

After a judge in Argentina approved their extradition to the U.S., two alleged Z-Library operators escaped from house arrest and disappeared.

👍 17 8🗿 4🔥 1
Show all...
OpenAI was hacked, revealing internal secrets and raising national security concerns — year-old breach wasn't reported to the public

Hackers have hacked away any perception of security around the latest AI code.

🤣 22🔥 7👍 4🍌 2
Signal stores data locally; most of it is unencrypted and accessible by any app https://fxtwitter.com/mysk_co/status/1809287118235070662
Show all...
Mysk 🇨🇦🇩🇪 (@mysk_co)

TL;DR: Don't install @signalapp for macOS, it is not secure. I carried out this small experiment: - I wrote a simple Python script that copies the directory of Signal's local storage to another location (to mimic a malicious script or app) - I ran the script in the Terminal and got a copy of my Signal data on my Mac - I booted a fresh macOS installation in a virtual machine - I transferred the copy of Signal's data to the VM and placed it where Signal expects it: ~/Library/Application\ Support/Signal - I installed Signal and started it - Signal started and restored my session with all the chat histories 😳 - I exchanged a couple messages with a contact from the VM and it worked 😳 - Then, I started Signal on the Mac - I got three sessions running in unison: Mac, iPhone, and VM 😳 Messages were either delivered to the Mac or to the VM. The iPhone received all messages. All of the three sessions were live and valid. Signal didn't warn me of the existence of the third session [that I cloned]. Moreover, Signal on…

👍 9🍌 5👏 2🤣 1
Repost from cKure Red
00:42
Video unavailableShow in Telegram
✔️ Zero-Day: Breaking BitLocker via MitM between CPU and TPM chip.
Show all...
2.38 MB
😁 10👍 5
As we've said before, systemd is a highly complex backdoor. Pardon the minor edit in the second image; anon's original analogy was needlessly sexual.
Show all...
🔥 19🤡 4🤔 1
I don’t want to neg open source since it is the best, but blindly assuming something is safe and not jewware because it is open source is a cope. “But you can audit the code.” Sure. Will you? If you even had the time to read 1.2 million lines, do you know what they all say? And will you get it done before the next update?
Show all...
💯 32👍 10
Photo unavailableShow in Telegram
regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387. The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration. https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server 📡@cRyPtHoN_INFOSEC_IT 📡@cRyPtHoN_INFOSEC_FR 📡@cRyPtHoN_INFOSEC_EN 📡@cRyPtHoN_INFOSEC_DE 📡@BlackBox_Archiv
Show all...
😐 7😨 3👍 1
📢 💎 GEM ALERT ⚠️ Check out AgencyInt for a treasure trove of information curated by a couple of misanthropes we know.
Show all...
👍 5💊 4🤡 3🔥 1🌚 1
Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.