Fire Hydrant of Freedom

Politics, Religion, Science, Culture and Humanities => Politics & Religion => Topic started by: G M on April 24, 2018, 09:31:16 AM

Title: In search of online privacy
Post by: G M on April 24, 2018, 09:31:16 AM
Due to the growing assaults on privacy, I am working on techniques and methods for the average user to implement that will improve your degree of privacy. KEEP IN MIND THAT NOTHING ONLINE IS SECURE.
Title: Be Brave
Post by: G M on April 24, 2018, 09:32:38 AM
Brave.com

So far, I really like this browser for many reasons, the privacy element being one of them.
Title: POTH: Serial killer tracked through relatives DNA
Post by: Crafty_Dog on April 26, 2018, 08:12:51 PM
Not sure if this is the right thread for this, but I don't know where else to put it:

 Sacramento County sheriff’s deputy carried bags of evidence from the home of the suspect in the Golden State Killer case on Thursday.CreditJim Wilson/The New York Times

By Thomas Fuller
April 26, 2018

SACRAMENTO — The Golden State Killer raped and murdered victims all across the state of California in an era before Google searches and social media, a time when the police relied on shoe leather, not cellphone records or big data.

But it was technology that got him. The suspect, Joseph James DeAngelo, 72, was arrested by the police on Tuesday. Investigators accuse him of committing more than 50 rapes and 12 murders.

Investigators used DNA from crime scenes that had been stored all these years and plugged the genetic profile of the suspected assailant into an online genealogy database. They found distant relatives of Mr. DeAngelo’s and, despite his years of eluding the authorities, traced their DNA to to his front door.

“We found a person that was the right age and lived in this area — and that was Mr. DeAngelo,” said Steve Grippi, the assistant chief in the Sacramento district attorney’s office.



Investigators then obtained what Anne Marie Schubert, the Sacramento district attorney, called “abandoned” DNA samples from Mr. DeAngelo. “You leave your DNA in a place that is a public domain,” she said.

The test result confirmed the match to more than 10 murders in California. Ms. Schubert’s office then obtained a second sample and came back with the same positive result, matching the full DNA profile.


Those who had investigated the case for years in vain were ecstatic by the sudden breakthrough. “He was totally off the radar till just a week ago, and it was a lead they got, somehow they got information and through checking family or descendants — it was pretty complicated the way they did it — they were able to get him on the radar,” said Ray Biondi, 81, who was the lieutenant in charge of the homicide bureau of the Sacramento County Sheriff’s Department during the crime spree.

Representatives at 23andMe and some other gene testing services denied on Thursday that they had been involved in identifying the killer.

The big players in commercial DNA testing — including 23andMe and AncestryDNA — extract genetic profiles from the saliva that customers send to the company in a tube by mail. It would not be easy for law enforcement to upload a profile to one of those sites. Over the past few years, numerous smaller genealogical websites have emerged, however, giving customers more avenues to upload a DNA profile and search for relatives.


If law enforcement located the suspect through a genealogy site, it could raise ethical issues, particularly if individuals did not consent to having their genetic profiles searched against crime scene evidence.

The Golden State Killer, also known as the East Area Rapist, tormented his victims with sadistic rituals. Some he shot and killed with a firearm. Others were bludgeoned to death with whatever he could find — in one case a piece of firewood. He had many trademarks: He wore a mask, he bound his victims’ hands. He started by raping single women and then went on to raping married women with their husbands present, before killing them both.

Among the numerous serial killers who stalked America in the 1960s, 1970s and 1980s — the Zodiac Killer, the Son of Sam, to name two — the Golden State Killer was among the most notorious.

[Read our full story about the Golden State Killer.]

Ms. Schubert has been central to the efforts to find the killer. Her childhood in the Sacramento suburb of Arden-Arcade, just miles from where the suspect prowled through houses and raped women, was marked by the terror of wondering if she or people she knew might be next.


‘A Needle in a Haystack’

Joseph James DeAngelo, 72, was arrested at a home in Citrus Heights, Calif. The so-called Golden State Killer is thought to have killed 12 people, raped at least 45 people and burglarized more than 120 homes in the 1970s and ’80s.Published OnApril 25, 2018CreditImage by Rich Pedroncelli/Associated Press

“It wasn’t a matter of if he was coming, it was when,” Ms. Schubert said. Her parents were “not gun people,” she said, but her father bought a firearm. Her mother kept an ice pick under her pillow when she slept.

Monica Miller, who was in charge of the Sacramento F.B.I. field office from 2013 to 2017, said that when she retired, the case of the Golden State Killer was cold. She said that Ms. Schubert, “was central in leading this, convincing people this was worth pursuing.” For the people of Sacramento, she added, “it was almost an open wound. People would still talk about it. He was a phantom or a ghost in people’s minds.”

In her career as a district attorney, Ms. Schubert championed DNA technology and taught courses about cold cases, creating a unit in the Sacramento district attorney’s office to pursue them. Eighteen years ago she reached out to an investigator from Contra Costa County who specialized in the East Area Rapist, beginning a collaboration to re-energize the case.


Two years ago she convened a task force on the 40th anniversary of the attacks in the Sacramento suburbs. It was the work of that group — a collaboration with counties in Southern California, the San Francisco Bay Area and the F.B.I. — that helped solve the case, Ms. Schubert said.

Many questions remain about the suspect. Did his family or his former colleagues have hints about his grisly past? Why did he appear to stop his spree of rapes and murders in 1986? Did he leverage his job as a police officer to elude detection?

All of these questions swirled in conversations among residents of Citrus Heights, Mr. DeAngelo’s neighborhood. They awoke on Wednesday shocked to find that their neighbor, a man who liked to tinker with his motorcycle in front of his neat beige stucco house, had been accused of being one of America’s most notorious serial rapists.

“It’s crazy — they were looking for this guy for 40 years and he was right here under our noses,” said Ashley Piorun, who lives five houses down from Mr. DeAngelo. “We were shellshocked to find out.”

This suburban neighborhood of well-kept homes, northeast of Sacramento, is a classic California housing tract of looping cul-de-sacs and towering palm trees. Ms. Piorun calls it a “quiet, sweet, boring neighborhood.”

Paul Sanchietti, another neighbor, said he had taken an interest in the case six months ago and combed through the Wikipedia entry that listed all of the grisly and sadistic crimes the Golden State Killer was accused of committing.

“Here I was looking up the guy on Wikipedia and he was five doors down,” Mr. Sanchietti said of Mr. DeAngelo.

Advertisement

From the outside, the house seemed meticulously maintained. The roof is new, the garden hose is perfectly coiled, the landscaping of sod, wood chips and decorative rocks is neat.

Mr. Sanchietti said he had nothing more than polite interactions with Mr. DeAngelo over the past two decades, but like other neighbors, he remembered Mr. DeAngelo as having a temper.

“He would get volatile,” Mr. Sanchietti said. “He would be out here tending to his car and he would get very angry. There were a lot of four letter words.”

“Every neighborhood has some strange little dude,” Mr. Sanchietti said. “But for him to be a serial murderer and rapist — that never crossed my mind.”

Richard A. Oppel Jr. and Heather Murphy contributed reporting from New York, and Adam Goldman from Washington.
Title: Re: POTH: Serial killer tracked through relatives DNA
Post by: G M on April 27, 2018, 04:26:44 PM
Well, I was hoping to cover vulnerabilities with viable solutions. As far as below, aside from not having relatives, there aren't many countermeasures... 

 :-D

Not sure if this is the right thread for this, but I don't know where else to put it:

 Sacramento County sheriff’s deputy carried bags of evidence from the home of the suspect in the Golden State Killer case on Thursday.CreditJim Wilson/The New York Times

By Thomas Fuller
April 26, 2018

SACRAMENTO — The Golden State Killer raped and murdered victims all across the state of California in an era before Google searches and social media, a time when the police relied on shoe leather, not cellphone records or big data.

But it was technology that got him. The suspect, Joseph James DeAngelo, 72, was arrested by the police on Tuesday. Investigators accuse him of committing more than 50 rapes and 12 murders.

Investigators used DNA from crime scenes that had been stored all these years and plugged the genetic profile of the suspected assailant into an online genealogy database. They found distant relatives of Mr. DeAngelo’s and, despite his years of eluding the authorities, traced their DNA to to his front door.

“We found a person that was the right age and lived in this area — and that was Mr. DeAngelo,” said Steve Grippi, the assistant chief in the Sacramento district attorney’s office.



Investigators then obtained what Anne Marie Schubert, the Sacramento district attorney, called “abandoned” DNA samples from Mr. DeAngelo. “You leave your DNA in a place that is a public domain,” she said.

The test result confirmed the match to more than 10 murders in California. Ms. Schubert’s office then obtained a second sample and came back with the same positive result, matching the full DNA profile.


Those who had investigated the case for years in vain were ecstatic by the sudden breakthrough. “He was totally off the radar till just a week ago, and it was a lead they got, somehow they got information and through checking family or descendants — it was pretty complicated the way they did it — they were able to get him on the radar,” said Ray Biondi, 81, who was the lieutenant in charge of the homicide bureau of the Sacramento County Sheriff’s Department during the crime spree.

Representatives at 23andMe and some other gene testing services denied on Thursday that they had been involved in identifying the killer.

The big players in commercial DNA testing — including 23andMe and AncestryDNA — extract genetic profiles from the saliva that customers send to the company in a tube by mail. It would not be easy for law enforcement to upload a profile to one of those sites. Over the past few years, numerous smaller genealogical websites have emerged, however, giving customers more avenues to upload a DNA profile and search for relatives.


If law enforcement located the suspect through a genealogy site, it could raise ethical issues, particularly if individuals did not consent to having their genetic profiles searched against crime scene evidence.

The Golden State Killer, also known as the East Area Rapist, tormented his victims with sadistic rituals. Some he shot and killed with a firearm. Others were bludgeoned to death with whatever he could find — in one case a piece of firewood. He had many trademarks: He wore a mask, he bound his victims’ hands. He started by raping single women and then went on to raping married women with their husbands present, before killing them both.

Among the numerous serial killers who stalked America in the 1960s, 1970s and 1980s — the Zodiac Killer, the Son of Sam, to name two — the Golden State Killer was among the most notorious.

[Read our full story about the Golden State Killer.]

Ms. Schubert has been central to the efforts to find the killer. Her childhood in the Sacramento suburb of Arden-Arcade, just miles from where the suspect prowled through houses and raped women, was marked by the terror of wondering if she or people she knew might be next.


‘A Needle in a Haystack’

Joseph James DeAngelo, 72, was arrested at a home in Citrus Heights, Calif. The so-called Golden State Killer is thought to have killed 12 people, raped at least 45 people and burglarized more than 120 homes in the 1970s and ’80s.Published OnApril 25, 2018CreditImage by Rich Pedroncelli/Associated Press

“It wasn’t a matter of if he was coming, it was when,” Ms. Schubert said. Her parents were “not gun people,” she said, but her father bought a firearm. Her mother kept an ice pick under her pillow when she slept.

Monica Miller, who was in charge of the Sacramento F.B.I. field office from 2013 to 2017, said that when she retired, the case of the Golden State Killer was cold. She said that Ms. Schubert, “was central in leading this, convincing people this was worth pursuing.” For the people of Sacramento, she added, “it was almost an open wound. People would still talk about it. He was a phantom or a ghost in people’s minds.”

In her career as a district attorney, Ms. Schubert championed DNA technology and taught courses about cold cases, creating a unit in the Sacramento district attorney’s office to pursue them. Eighteen years ago she reached out to an investigator from Contra Costa County who specialized in the East Area Rapist, beginning a collaboration to re-energize the case.


Two years ago she convened a task force on the 40th anniversary of the attacks in the Sacramento suburbs. It was the work of that group — a collaboration with counties in Southern California, the San Francisco Bay Area and the F.B.I. — that helped solve the case, Ms. Schubert said.

Many questions remain about the suspect. Did his family or his former colleagues have hints about his grisly past? Why did he appear to stop his spree of rapes and murders in 1986? Did he leverage his job as a police officer to elude detection?

All of these questions swirled in conversations among residents of Citrus Heights, Mr. DeAngelo’s neighborhood. They awoke on Wednesday shocked to find that their neighbor, a man who liked to tinker with his motorcycle in front of his neat beige stucco house, had been accused of being one of America’s most notorious serial rapists.

“It’s crazy — they were looking for this guy for 40 years and he was right here under our noses,” said Ashley Piorun, who lives five houses down from Mr. DeAngelo. “We were shellshocked to find out.”

This suburban neighborhood of well-kept homes, northeast of Sacramento, is a classic California housing tract of looping cul-de-sacs and towering palm trees. Ms. Piorun calls it a “quiet, sweet, boring neighborhood.”

Paul Sanchietti, another neighbor, said he had taken an interest in the case six months ago and combed through the Wikipedia entry that listed all of the grisly and sadistic crimes the Golden State Killer was accused of committing.

“Here I was looking up the guy on Wikipedia and he was five doors down,” Mr. Sanchietti said of Mr. DeAngelo.

Advertisement

From the outside, the house seemed meticulously maintained. The roof is new, the garden hose is perfectly coiled, the landscaping of sod, wood chips and decorative rocks is neat.

Mr. Sanchietti said he had nothing more than polite interactions with Mr. DeAngelo over the past two decades, but like other neighbors, he remembered Mr. DeAngelo as having a temper.

“He would get volatile,” Mr. Sanchietti said. “He would be out here tending to his car and he would get very angry. There were a lot of four letter words.”

“Every neighborhood has some strange little dude,” Mr. Sanchietti said. “But for him to be a serial murderer and rapist — that never crossed my mind.”

Richard A. Oppel Jr. and Heather Murphy contributed reporting from New York, and Adam Goldman from Washington.

Title: Do you have one?
Post by: G M on April 27, 2018, 05:26:29 PM
(https://i.imgur.com/ZtacKhz.jpg)


If so, WTF were you thinking?

https://www.engadget.com/2018/04/25/amazon-fixed-exploit-alexa-listen/

Amazon's Alexa is good at listening, since it has to be ready when you say its wake word, like "Alexa," "Echo" or "Computer." That very same feature, though, has people worried about their own privacy. Researchers from security firm Checkmarx have found a way to get Alexa to listen in and send a transcript of any conversations that it records while eavesdropping.

The researchers were able to create a harmless-seeming Alexa Skill that would actively record long after most Skills shut down to preserve people's privacy. Checkmarx's Amit Ashbel told CNET that it could just keep recording. "As far as we could tell, there was no limit," he said. "As long as you [didn't] tell it to stop, it wouldn't."

Checkmarx says that it notified Amazon of this exploit at the beginning of April; Amazon confirmed to CNET that it has since fixed the issue. "Customer trust is important to us and we take security and privacy seriously," a spokesperson said in a statement. "We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do."
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on April 27, 2018, 05:53:42 PM
Woof GM:

Where do you see the border between this thread and the Privacy/4th Amendment thread on the SC&H forum?
Title: Re: G M's guide to online privacy
Post by: G M on April 27, 2018, 06:21:31 PM
Woof GM:

Where do you see the border between this thread and the Privacy/4th Amendment thread on the SC&H forum?

My idea is that I will provide a practical way to mitigate privacy threats here, rather than discuss the larger ideas that may not have immediate solutions.
Title: VPN
Post by: G M on April 28, 2018, 08:00:50 AM
https://www.pcworld.com/article/3198369/privacy/best-vpn-services-apps-reviews-buying-advice.html
Title: Re: VPN
Post by: G M on April 28, 2018, 08:08:39 AM
https://www.pcworld.com/article/3198369/privacy/best-vpn-services-apps-reviews-buying-advice.html

https://www.npr.org/sections/alltechconsidered/2017/08/17/543716811/turning-to-vpns-for-online-privacy-you-might-be-putting-your-data-at-risk

Although filled with the usual leftist idiocy, this article raises good points.
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on April 28, 2018, 08:35:51 AM
"My idea is that I will provide a practical way to mitigate privacy threats here, rather than discuss the larger ideas that may not have immediate solutions."

This makes sense.  Good idea.
Title: RATs
Post by: G M on May 01, 2018, 01:02:08 PM
http://www.thewindowsclub.com/what-is-remote-access-trojan

What is Remote Access Trojan? Prevention, Detection & Removal discussed

RECOMMENDED: Click here to repair Windows problems & optimize system performance
Remote Access Trojans (RAT) have always proved to be a big risk to this world when it comes to hijacking a computer or just playing a prank with a friend. A RAT is a malicious software that lets the operator attack a computer and gain unauthorized remote access to it. RATs have been here for years, and they persist as finding some RATs is a difficult task even for the modern Antivirus software out there.

In this post, we will see what is Remote Access Trojan and talks about detection & removal techniques available. It also explains, in short, some of the common RATs like CyberGate, DarkComet, Optix, Shark, Havex, ComRat, VorteX Rat, Sakula and KjW0rm.

Remote Access Trojans
Remote Access Trojan

Most of the Remote Access Trojan are downloaded in malicious emails, unauthorized programs and web links that take you nowhere. RATs are not simple like Keylogger programs – they provide the attacker with a lot of capabilities such as:

Keylogging: Your keystrokes could be monitored, and usernames, passwords, and other sensitive information could be recovered from it.
Screen Capture: Screenshots can be obtained to see what is going on your computer.
Hardware Media Capture: RATs can take access to your webcam and mic to record you and your surroundings completely violating privacy.
Administration Rights: The attacker may change any settings, modify registry values and do a lot more to your computer without your permission. RAT can provide an administrator level privileges to the attacker.
Overclocking: The attacker may increase processor speeds, overclocking the system can harm the hardware components and eventually burn them to ashes.
Other system-specific capabilities: Attacker can have access to anything on your computer, your files, passwords, chats and just anything.
How do Remote Access Trojans work
Remote Access Trojans come in a server-client configuration where the server is covertly installed on the victim PC, and the client can be used to access the victim PC through a GUI or a command interface. A link between server and client is opened on a specific port, and encrypted or plain communication can happen between the server and the client. If the network and packets sent/received are monitored properly, RATs can be identified and removed.

RAT attack Prevention
RATs make their way to computers from spam emails, maliciously programmed software or they come packed as a part of some other software or application. You must always have a good antivirus program installed on your computer that can detect and eliminate RATs. Detecting RATs is quite a difficult task as they are installed under a random name that may seem like any other common application, and so you need to have a really good Antivirus program for that.

Monitoring your network can also be a good way to detect any Trojan sending your personal data over the internet.

If you don’t use Remote Administration Tools, disable Remote Assistance connections to your computer. You will get the setting in SystemProperties > Remote tab > Uncheck Allow Remote Assistance connections to this computer option.

Keep your operating system, installed software and particularly security programs updated at all times. Also, try not to click on emails that you don’t trust and are from an unknown source. Do not download any software from sources other than its official website or mirror.

After the RAT attack
Once you know you’ve been attacked, the first step is to disconnect your system from the Internet and the Network if you are connected. Change all your passwords and other sensitive information and check if any of your accounts has been compromised using another clean computer. Check your bank accounts for any fraudulent transactions and immediately inform your bank about the Trojan in your computer. Then scan the computer for issues and seek professional help for removing the RAT. Consider closing Port 80. Use a Firewall Port Scanner to check all your Ports.

You can even try to back-track and know who was behind the attack, but you’ll need professional help for that. RATs can usually be removed once they are detected, or you can have a fresh installation of Windows to complete remove it off.

Common Remote Access Trojans
Many Remote Access Trojans are currently active now and infecting millions of devices. The most notorious ones are discussed here in this article:

Sub7: ‘Sub7’ derived by spelling NetBus (an older RAT) backward is a free remote administration tool that lets you have control over the host PC. The tool has been categorized into Trojans by security experts, and it can be potentially risky to have it on your computer.
Back Orifice: Back Orifice and its successor Back Orifice 2000 is a free tool that was originally meant for remote administration – but it didn’t take time that the tool got converted into a Remote Access Trojan. There has been a controversy that this tool is a Trojan, but developers stand upon the fact that it is a legitimate tool that provides remote administration access. The program is now identified as malware by most of the antivirus programs.
DarkComet: It is a very extensible remote administration tool with a lot of features that could be potentially used for spying. The tool also has its links with the Syrian Civil War where it is reported that the Government used this tool to spy on civilians. The tool has already been misused a lot, and the developers have stopped its further development.
sharK: It is an advanced remote administration tool. Not meant for beginners and amateur hackers. It is said to be a tool for security professionals and advanced users.
Havex: This trojan that has been extensively used against the industrial sector. It collects information including the presence of any Industrial Control System and then passes on the same information to remote websites.
Sakula: A remote access Trojan that comes in an installer of your choice. It will depict that it is installing some tool on your computer but will install the malware along with it.
KjW0rm: This Trojan comes packed with a lot of capabilities but already marked as a threat by many Antivirus tools.
These Remote Access Trojan have helped many hackers compromise millions of computers. Having protection against these tools is a must, and a good security program with an alert user is all it takes to prevent these Trojans from compromising your computer.

This post was meant to be an informative article about RATs and does not in any way promote their usage. There may be some legal laws about the usage of such tools in your country, in any case.

Read more about Remote Administration Tools here.

RECOMMENDED: Download this tool to quickly find & fix Windows errors automatically
Related Posts:

Remote Administration Tools – Emerging Threats
Enable, Disable Remote Desktop Connection in Windows 10/8.1
Remote Credential Guard protects Remote Desktop credentials in Windows 10
Trojan Attacks are on the rise! How do Trojans work?
Set up & use Windows Remote Assistance in Windows 10/8.1

Posted by AnandK@TWC on February 6, 2017 , in Category Security with Tags Malware, Remote
Anand Khanse is the Admin of TheWindowsClub.com, a 10-year Microsoft MVP Awardee in Windows (2006-16) & a Windows Insider MVP. Please read the entire post & the comments first, create a System Restore Point before making any changes to your system & be careful about any 3rd-party offers while installing freeware.
Title: Re: VPN
Post by: DougMacG on May 01, 2018, 02:48:17 PM
https://www.pcworld.com/article/3198369/privacy/best-vpn-services-apps-reviews-buying-advice.html

It looks to me like you can use their no. 1 pick for internet privacy for 18 cents per day.  Fair enough.  You can even mail them cash, in Sweden.
https://www.mullvad.net/en/account/bitcoin/

Keep going with this thread.  Best replacement for gmail?

I am horribly addicted to and violated by google.  I like the free features and I do NOT like that I have given them and they are tracking - everything.

New announcement from Facebook about (pretend) privacy today.  Click on clear history?  I would like to clear my google history, otherwise the privacy of my new browsing, movements and communications is not very important.
http://money.cnn.com/2018/05/01/technology/facebook-f8-2018-zuckerberg-keynote/index.html
Title: Re: VPN
Post by: G M on May 01, 2018, 03:24:36 PM
https://www.pcworld.com/article/3198369/privacy/best-vpn-services-apps-reviews-buying-advice.html

It looks to me like you can use their no. 1 pick for internet privacy for 18 cents per day.  Fair enough.  You can even mail them cash, in Sweden.
https://www.mullvad.net/en/account/bitcoin/

Keep going with this thread.  Best replacement for gmail?

I am horribly addicted to and violated by google.  I like the free features and I do NOT like that I have given them and they are tracking - everything.

New announcement from Facebook about (pretend) privacy today.  Click on clear history?  I would like to clear my google history, otherwise the privacy of my new browsing, movements and communications is not very important.
http://money.cnn.com/2018/05/01/technology/facebook-f8-2018-zuckerberg-keynote/index.html

At this time, I am recommending Proton Mail.

https://protonmail.com/
Title: How to stop NSA from using Goolag?
Post by: G M on August 14, 2018, 11:30:33 AM
https://www.makeuseof.com/tag/nsa-post/

On the Goolag.

I haven't had time to really examine the techniques in the link above.

Title: Have you deleted your Goolag search history?
Post by: G M on September 12, 2018, 11:15:21 AM
https://spreadprivacy.com/delete-google-search-history/

If not now, when?
Title: Erase Browser history
Post by: Crafty_Dog on September 13, 2018, 01:33:10 PM
https://www.popsci.com/erase-browsing-history?CMPID=ene091318
Title: A modest privacy protection proposal
Post by: Crafty_Dog on September 30, 2018, 07:10:39 PM
https://medium.com/@lopp/a-modest-privacy-protection-proposal-5b47631d7f4c
Title: I've got nothing to hide
Post by: Crafty_Dog on October 03, 2018, 10:48:56 AM


https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565##
Title: Hizbollah goes catfishing
Post by: Crafty_Dog on October 11, 2018, 10:11:50 AM
Report: Hizballah Hacked into Mobile Devices Worldwide
by IPT News  •  Oct 11, 2018 at 10:30 am
https://www.investigativeproject.org/7649/report-hizballah-hacked-into-mobile-devices
 Print
 Send
 RSS
Share:   

  Be the first of your friends to like this.
 
Hizballah hackers used 'catfishing' techniques on social media to infiltrate mobile devices worldwide, according to a Monday release from the Czech Security Intelligence Service (BIS), as reported by Radio Praha (Prague).
Title: Hillary approved!
Post by: G M on October 11, 2018, 02:32:28 PM
https://www.bleachbit.org/
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on October 11, 2018, 04:35:02 PM
 :lol: :lol: :lol:
Title: Frys.com VPN sale
Post by: G M on November 28, 2018, 04:33:35 PM
Go to frys.com

Nord VPN

Ten dollars off using the code below:

3401556
Title: More on VPNs
Post by: G M on January 07, 2019, 03:17:57 PM
https://www.fastcompany.com/90282668/the-one-thing-you-should-do-to-protect-your-privacy-in-2019

"Free VPN providers don’t pay for servers and bandwidth out of the goodness of their heart. Case in point: Facebook offers a “free” VPN service called Onavo–but it’s not really free. You pay for it with your browsing history. People who use Onavo send all their web traffic through Facebook’s servers, which the company then mines for data."

That is a very special kind of stupid!
Title: Erase Browser history 2.0
Post by: Crafty_Dog on January 13, 2019, 03:52:38 PM
https://www.popsci.com/erase-browsing-history?cmpid=ene20190113&utm_source=internal&utm_medium=email&cid=46517&mid=400826150
Title: Outstanding website!
Post by: G M on January 26, 2019, 02:45:19 PM
www.privacytools.io - encryption against global mass surveillance

Take steps now to improve your privacy.
Title: Lock your mic on all your computing devices
Post by: G M on February 27, 2019, 03:00:11 PM
https://mic-lock.com/
Title: Cell phone companies suck (Especially Verizon), get a pseudo-burner phone
Post by: G M on March 10, 2019, 08:41:28 PM
https://www.lifewire.com/best-prepaid-cell-phone-plans-4159386

Pseudo-burner phone- A prepaid wireless phone purchased with CASH and always has additional minutes purchased with CASH and is not used in any way that would allow the owner's identity to be directly linked to the phone.

What separates a pseudo-burner from a true burner phone? Complex tradecraft, including the use of Faraday Cage type containers.

https://qz.com/736224/heres-how-to-make-a-signal-blocking-cell-phone-pouch-like-the-ones-protesters-are-using-at-the-republican-national-convention/

https://www.cnet.com/pictures/silent-pocket-faraday-phone-cases/
Title: “Burner phones” – George Clooney recognizes their value
Post by: G M on April 10, 2019, 11:21:25 AM
“Burner phones” – George Clooney recognizes their value.

Pay-as-you-go phones (aka “burner phones”) can be purchased without the need to set up an account, so the phone will not be tied to your identity.  When someone has concerns that their smart phone may have been hacked or compromised, a good option is to pick up a burner phone to use for those phone calls that need to be kept private and confidential.  The less expensive models that are not “smart phones” will not support apps that may contain spyware. It is much cheaper and quicker than having a smart phone analyzed electronically for spyware.

George Clooney and his new wife recognized burner phones as a way to help control some of the privacy of their recent wedding.

TMZ reported the rules for wedding guests:

— Leave your cellphone in your hotel room
— If you think you may need your phone, then bring it … but leave it at a kiosk near the entrance
— All guests will be provided a burner phone with a code, which serves as a ticket to enter
— All guests will also receive a camera to take pics as they please
— HERE’S THE CATCH … The camera has a code that allows George’s people to access the photos.  So if Amal’s 3rd cousin were to give TMZ a pic of the nuptials, George could find the matching phone pic and skewer the cuz.



 

From The Register:
George Clooney, WikiLeaks’ lawyer wife hand out burner phones to wedding guests

George Clooney and his new wife – a human rights lawyer who has represented six-fingered embassy dweller Julian AssangeTM – went to extreme lengths to safeguard the privacy of their wedding, even issuing guests with “burner phones” under their control.

Guests at last weekend’s nuptials between George Clooney and top lawyer Amal Alamuddin in Venice, Italy, were reportedly given strict instructions on how to help keep images and details of the wedding festivities beyond the reach of tabloid journalists and hackers.

Clooney – who is due to direct a film about the News of the World celebrity voicemail hacking scandal – reportedly ordered wedding guests to leave their personal smartphones and tablets in their hotel rooms.
Clooney’s burner phones (brand unknown) served as a ticket for the event, celebrity gossip site TMZ reports. Guests were also given instructions on smartphone security protocols for the event, Business Insider adds.

Team Clooney were apparently nervous about photographs and other information leaking out from the poorly protected accounts of celebrity guests, a concern heightened by the iCloud celeb nudie hacking scandal.

Security veteran Graham Cluley commented: “How were George Clooney and Amal Alamuddin to know if the celebrities they had invited to their three-day wedding party hadn’t already had their accounts compromised, and might be unwittingly leaking information and snaps? But the precaution taken by the newlyweds wasn’t taken purely because of hackers, but because the couple are said to have sold the rights to the wedding photographs to a magazine

[American Vogue], in return for a charitable donation.”
Title: Dump Goolag-mail
Post by: G M on May 23, 2019, 05:00:22 PM
https://www.theverge.com/2018/7/2/17527972/gmail-app-developers-full-email-access

https://www.bleepingcomputer.com/news/google/google-is-using-your-gmail-account-to-track-your-purchases/

A better option:

https://protonmail.com/

https://www.forbes.com/sites/tjmccue/2018/10/31/why-i-am-switching-to-secure-protonmail-from-insecure-google-gmail/
Title: An EP professional's advice to Celebrities that you can use
Post by: G M on July 05, 2019, 05:40:32 PM
Kent Moyer’s Top 10 Security Recommendations for Celebrity Clients:

DO NOT hire bodyguards or “Buddyguards.” (There is a difference from Bodyguards and Executive Protection)
DO USE Encrypted e-mail with your family & C-Suite level Employees or Executives. (Protonmail.com)
DO USE vetted American Executive Protection Agents & Drivers, during international travel.
DO NOT tweet where you are going. It alerts potential bad guys of your location!
DO NOT post pictures on social media of:
Your family,
Where you live,
Where your office is, or
Locations you often frequent in.
DO NOT get any mail at your home & DO make sure no one knows where you live. (Put your home into a corporation name.)
DO have a professional security consultant perform a risk/vulnerability assessment of:
Your home,
Your office, and
Your children’s school.
DO get your personal information off of the Internet.
DO spend one hour putting together a security plan for every trip you go on.
DO create security alertness in your daily life. If you receive any threats, stalkers or inappropriate mail, get it to security professional. Have a professional security investigator resource you can go to for you and your family.

This article is first published in the April 2017 Issue of Los Angeles Confidential Magazine p. 119
Title: Improved cybersecurity and privacy through tape
Post by: G M on July 06, 2019, 06:23:52 PM
https://www.telegraph.co.uk/technology/2016/06/22/why-has-mark-zuckerberg-taped-over-the-webcam-and-microphone-on/

(https://www.telegraph.co.uk/content/dam/technology/2016/06/22/13393972_10102910644965951_4268170000962807139_n_trans_NvBQzQNjv4BqEOGY5qHQpHLJUpjvYIVxQlVse9JsN00kzbUr3IXHaGo.jpg?imwidth=1400)

(https://www.telegraph.co.uk/content/dam/technology/2016/06/22/zuck_trans_NvBQzQNjv4BqqVzuuqpFlyLIwiB6NTmJwfSVWeZ_vEN7c6bHu2jJnT8.jpg?imwidth=1240)

Title: Anti-Surveillance Mask
Post by: Crafty_Dog on September 11, 2019, 11:39:29 PM
https://www.cnet.com/news/urme-anti-surveillance-mask-lets-you-pass-as-someone-else/?fbclid=IwAR1OmOWN_evebG1Ef9Zl79PeRKFR5PcMH_NQWM4Sv6AfuHtDcNdvCIh87jU
Title: Re: Anti-Surveillance Mask
Post by: G M on September 12, 2019, 01:16:19 PM
https://www.cnet.com/news/urme-anti-surveillance-mask-lets-you-pass-as-someone-else/?fbclid=IwAR1OmOWN_evebG1Ef9Zl79PeRKFR5PcMH_NQWM4Sv6AfuHtDcNdvCIh87jU

I like the idea.
Title: China intercepting your texts
Post by: G M on November 05, 2019, 09:59:06 PM
https://www.theepochtimes.com/chinese-state-sponsored-hackers-intercept-text-messages-worldwide-cyber-report_3135052.html

Solution: https://signal.org/
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on November 06, 2019, 12:30:19 AM
For the tech troglodytes amongst us, what is "signal"?
Title: Re: G M's guide to online privacy
Post by: G M on November 06, 2019, 01:10:33 AM
For the tech troglodytes amongst us, what is "signal"?

It's an app you should be able to get from the Apple or Android app store on your smart phone.

Look for Signal-private messenger
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on November 06, 2019, 09:58:25 AM
Ah.

Does the other person need to have it as well?

Title: Re: G M's guide to online privacy
Post by: G M on November 06, 2019, 06:35:05 PM
Ah.

Does the other person need to have it as well?

Only if you want the communication secured.

Actually, just tested it and I can't seem to connect to a non-Signal number. Interesting.


https://medium.com/@mshelton/signal-for-beginners-c6b44f76a1f0



Title: Stop using SMS
Post by: G M on November 16, 2019, 05:25:32 PM
https://www.popularmechanics.com/technology/security/a29789903/what-is-sms/
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on November 16, 2019, 10:29:49 PM
Does the other person need to have an Iphone to use WhatsApp?
Title: Re: G M's guide to online privacy
Post by: G M on November 17, 2019, 12:05:07 AM
Does the other person need to have an Iphone to use WhatsApp?

Don't use WhatsApp, use Signal. For the comms to be encrypted, both parties must use the app.
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on November 17, 2019, 03:46:51 PM
"Actually, just tested it and I can't seem to connect to a non-Signal number. Interesting."

Confused , , ,
Title: Re: G M's guide to online privacy
Post by: G M on November 17, 2019, 04:51:55 PM
"Actually, just tested it and I can't seem to connect to a non-Signal number. Interesting."

Confused , , ,

Signal appears to only work with other Signal users.
Title: Don't use public USB chargers for your phone
Post by: G M on November 17, 2019, 06:14:22 PM
https://www.zdnet.com/article/officials-warn-about-the-dangers-of-using-public-usb-charging-stations/
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on November 17, 2019, 08:55:57 PM
Forwarding this to Cindy.
Title: Surveillance Self Defense
Post by: Crafty_Dog on December 19, 2019, 07:36:12 AM
https://ssd.eff.org/en#index
Title: One Nation, Tracked
Post by: Crafty_Dog on December 19, 2019, 07:40:12 AM
second post

https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html?te=1&nl=the-privacy%20project&emc=edit_priv_20191219?campaign_id=122&instance_id=14661&segment_id=19721&user_id=52f016547a40edbdd6de69b8a7728bbf&regi_id=4964119320191219
Title: CA's new privacy law
Post by: Crafty_Dog on January 11, 2020, 09:30:56 PM
https://messaging-custom-newsletters.nytimes.com/template/oakv2?uri=nyt://newsletter/dd461c74-4591-4333-a2f8-e142073a5134&te=1&nl=california-today&emc=edit_ca_20200103?campaign_id=49&instance_id=14938&segment_id=20022&user_id=52f016547a40edbdd6de69b8a7728bbf&regi_id=49641193_ca_20200103
Title: Reflectacles
Post by: G M on January 15, 2020, 06:56:14 PM
https://www.reflectacles.com/#home

I will be buying some.
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on January 16, 2020, 07:55:56 AM
https://appleinsider.com/articles/20/01/14/the-fbi-has-the-tools-it-needs-to-break-into-the-iphone-and-shouldnt-ask-for-backdoors

=================================

The Case of Bill Barr vs. Apple
The AG is ignoring the important benefits to society of encryption.
By The Editorial Board
Jan. 14, 2020 7:20 pm ET

The advance of digital technology is creating new ethical challenges across society, and here we go again in the battle between law enforcement and the privacy of encrypted cell phones in a democracy.

Attorney General William Barr demanded Monday that Apple help the U.S. government unlock two iPhones in its terror investigation of the Saudi air cadet who last month killed three sailors at a Navy training base in Pensacola, Florida. “This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said.


The AG’s implication is that Apple is withholding information critical to a government terror investigation. But then the FBI also boasted on Monday that it has been able to obtain many leads from other sources including social media, interviews and 42 terabytes of digital media. That includes a social media post by the shooter on 9/11 last year that “the countdown has started.”

Apple says it responded within hours to the FBI’s first request for data on Dec. 6, the day of the attack. It says it responded to six subsequent requests by providing information stored on its cloud servers, account information and transactional data for multiple accounts. The company says it didn't learn until Jan. 6 of a second iPhone associated with the probe, and two days after that it received a subpoena.

Apple continues to cooperate, but what it won’t do is create special software to break into an iPhone so the FBI can obtain information stored on the device. Nor will it devise a “backdoor” for law enforcement. Mr. Barr says this refusal means that Apple and other American tech companies are subordinating national security to commercial interests by refusing to assist law enforcement.

Apple is no doubt looking out for its commercial interests, and privacy is one of its selling points. But its encryption and security protections also have significant social and public benefits. Encryption has become more important as individuals store and transmit more personal information on their phones—including bank accounts and health records—amid increasing cyber-espionage.

Criminals communicate over encrypted platforms, but encryption protects all users including business executives, journalists, politicians, and dissenters in non-democratic societies. Any special key that Apple created for the U.S. government to unlock iPhones would also be exploitable by bad actors.

If American tech companies offer backdoors for U.S. law enforcement, criminals would surely switch to foreign providers. This would make it harder to obtain data stored on cloud servers. Apple says it has responded to more than 127,000 requests from U.S. law enforcement agencies over the past seven years. We doubt Huawei would be as cooperative.

Apple’s security features also make its phones more attractive to foreign customers. Requiring Apple to build vulnerabilities into its phones would make it less competitive and aid Chinese competitors like Huawei and ZTE, which the Justice Department has charged with violating U.S. sanctions.

***
In any case the FBI has apparently found a work-around to unlock encrypted phones. Four years ago the Obama Justice Department sought a court order to force Apple to unlock an iPhone used by the San Bernardino terrorists. A private company eventually helped the government break in. The FBI has since paid more than $1 million to a private company to extract data from encrypted phones.

The Israeli forensics firm Cellebrite last year trumpeted a new product that would allow it to unlock and extract data from all Apple and high-end Android devices. Competition among forensic firms is making it cheaper and easier to unlock phones. The National Security Agency last year expressed concern that encryption may not be strong enough to withstand advances in quantum computing. Politicians also keep howling that tech companies don’t do enough to protect user privacy.

Mr. Barr’s job includes protecting Americans from terror attacks and criminal networks, and we sympathize with his concern that encryption could slow an investigation when minutes matter. But the answer is for Congress to work with him to forge a compromise that balances private and government interests. That’s what happened in 2018 when Congress created a process for law enforcement to obtain data stored on servers overseas.

In the meantime, Apple doesn’t deserve to be treated like a public enemy.
Title: Apple
Post by: Crafty_Dog on January 21, 2020, 04:55:13 PM
https://tidbits.com/2020/01/21/apple-allegedly-dropped-full-icloud-backup-encryption-under-fbi-pressure/
Title: Re: Apple
Post by: G M on January 21, 2020, 05:14:43 PM
https://tidbits.com/2020/01/21/apple-allegedly-dropped-full-icloud-backup-encryption-under-fbi-pressure/

(https://media.makeameme.org/created/what-if-i-s1sk9l.jpg)
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on January 21, 2020, 09:45:02 PM
That is funny.
Title: Blurring Photos Before Posting.
Post by: Crafty_Dog on June 09, 2020, 11:57:06 AM
https://www.popsci.com/story/technology/blur-faces-protest-photos-software-apps/?utm_source=internal&utm_medium=email
Title: Goolag alternatives
Post by: G M on September 16, 2020, 07:05:26 PM
https://restoreprivacy.com/google-alternatives/

Escape!
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on September 17, 2020, 10:58:05 PM
I will be checking this out!
Title: re: G M's guide to online privacy, Google Alternatives
Post by: DougMacG on October 22, 2020, 02:45:38 PM
https://dogbrothers.com/phpBB2/index.php?topic=2698.msg128449#msg128449

https://restoreprivacy.com/google-alternatives/
----------------------------------------------------

A lot of information there!  I will be implementing as many of these as I can, one by one.  Would like to hear the progress of others on these. 

My main devices:  Windows 10 laptop.  Android phone.  Are others here on Apple or Windows and Android?

So many things keep me from getting real privacy, but much of this is do-able.  New Browsers New Search Engines.  I would like to switch my map program, but Google will still know everywhere I go. (?)  Can I really change my operating systems without problems? 
Title: Re: re: G M's guide to online privacy, Google Alternatives
Post by: G M on October 22, 2020, 02:54:21 PM
https://brax.me/prod/host.php?f=_store&h=rob&p=&version=

I am planning on getting a De-Goolaged phone from here.


https://www.youtube.com/watch?v=mqSCmT5S-2w



https://dogbrothers.com/phpBB2/index.php?topic=2698.msg128449#msg128449

https://restoreprivacy.com/google-alternatives/
----------------------------------------------------

A lot of information there!  I will be implementing as many of these as I can, one by one.  Would like to hear the progress of others on these. 

My main devices:  Windows 10 laptop.  Android phone.  Are others here on Apple or Windows and Android?

So many things keep me from getting real privacy, but much of this is do-able.  New Browsers New Search Engines.  I would like to switch my map program, but Google will still know everywhere I go. (?)  Can I really change my operating systems without problems?
Title: Re: re: G M's guide to online privacy, Google Alternatives
Post by: DougMacG on October 23, 2020, 07:34:54 AM
https://brax.me/prod/host.php?f=_store&h=rob&p=&version=

I am planning on getting a De-Goolaged phone from here.

https://www.youtube.com/watch?v=mqSCmT5S-2w

Good.  Please keep us posted on this.  If/when this achieves full enough functionality, I will do it too and there is going to be a huge market for it. 

The public still needs alternatives to Facebook and twitter.
Title: Is your TV watching you?
Post by: G M on December 25, 2020, 06:32:05 PM
https://www.zerohedge.com/technology/your-new-tcl-hdtv-made-china-security-risk
Title: Covering your online tracks
Post by: G M on February 13, 2021, 12:26:31 PM
https://www.americanpartisan.org/2021/02/digital-spoor-and-cyber-weapons-how-to-cover-your-tracks-online-by-silicon-valley-sniper/
Title: Re: Covering your online tracks
Post by: DougMacG on February 14, 2021, 08:54:10 AM
https://www.americanpartisan.org/2021/02/digital-spoor-and-cyber-weapons-how-to-cover-your-tracks-online-by-silicon-valley-sniper/

Good explanation of some of the questions presented lately.

"Digital security is about finding the right balance between risk and convenience, so prepare to be inconvenienced. It’s necessary."

Included in inconvenience is cost.  There is some cost in money and time in turning away from what we were lured into for 'free'.

I don't have a VPN - yet.  I'm not fully hidden on the internet.  I can't easily undo public records, make them disappear.  I want and need to be reachable.  Google still owns me though I have switched mostly to Brave and duckduckgo.  I don't use FB but miss out on the good parts of what they provide.  [I use it indirectly because I learn of news with friends and family from others use of it.]  I avoid Amazon.  Never used Instagram.  Need to break with youtube.  I read some twitter but have no log in or presence.  I plan to go further this year with de-googling.

But another point is that we need alternatives to all of the above and throw the media in with that.  We need to organize like minded people through our own social networks to advance our agenda politically and thwart theirs.  If we all run and hide, we lose, though I know the argument is we already lost.
Title: Re: Covering your online tracks
Post by: G M on February 14, 2021, 02:55:31 PM
If you really want to be harder to target:

https://archive.fo/XCTZl

As far as a VPN, once my Nord VPN subscription expires, I think I will use BytzVPN:

https://brax.me/prod/host.php?f=_store&h=rob&p=&version=


https://www.americanpartisan.org/2021/02/digital-spoor-and-cyber-weapons-how-to-cover-your-tracks-online-by-silicon-valley-sniper/

Good explanation of some of the questions presented lately.

"Digital security is about finding the right balance between risk and convenience, so prepare to be inconvenienced. It’s necessary."

Included in inconvenience is cost.  There is some cost in money and time in turning away from what we were lured into for 'free'.

I don't have a VPN - yet.  I'm not fully hidden on the internet.  I can't easily undo public records, make them disappear.  I want and need to be reachable.  Google still owns me though I have switched mostly to Brave and duckduckgo.  I don't use FB but miss out on the good parts of what they provide.  [I use it indirectly because I learn of news with friends and family from others use of it.]  I avoid Amazon.  Never used Instagram.  Need to break with youtube.  I read some twitter but have no log in or presence.  I plan to go further this year with de-googling.

But another point is that we need alternatives to all of the above and throw the media in with that.  We need to organize like minded people through our own social networks to advance our agenda politically and thwart theirs.  If we all run and hide, we lose, though I know the argument is we already lost.
Title: You have options
Post by: G M on April 07, 2021, 08:07:34 PM
https://media.gab.com/system/media_attachments/files/070/901/618/original/1cfe08dbff4dc929.jpg
Title: Listen to Rob Braxman
Post by: G M on April 13, 2021, 08:16:12 PM
https://www.youtube.com/watch?v=rqXJBK3WU-A
Title: Re: Listen to Rob Braxman
Post by: DougMacG on April 14, 2021, 09:23:22 AM
https://www.youtube.com/watch?v=rqXJBK3WU-A

Thanks for posting.  This guy is very, very good.
Title: Rob Braxman
Post by: Crafty_Dog on April 20, 2021, 06:46:11 AM
https://odysee.com/@RobBraxmanTech:6
Title: The insecurity industry
Post by: G M on July 29, 2021, 10:31:28 AM
https://www.theburningplatform.com/2021/07/29/the-insecurity-industry/#more-244822
Title: ComSec is important
Post by: G M on August 31, 2021, 06:33:46 PM
https://bayourenaissanceman.blogspot.com/2021/08/communications-security-when-everyone.html
Title: Privacy is an essential part of security
Post by: G M on November 13, 2021, 06:14:45 PM
https://www.vice.com/en/article/vb9nzx/black-market-tmobile-phone-location-data-bounty-hunter-murder
Title: Re: Privacy is an essential part of security
Post by: DougMacG on November 14, 2021, 05:51:13 AM
https://www.vice.com/en/article/vb9nzx/black-market-tmobile-phone-location-data-bounty-hunter-murder

From the article :
"For years, I've warned that protecting personal data isn't just about personal privacy, it's about personal safety," Senator Ron Wyden told Motherboard in a statement.
—------------

Ron Wyden is a far left Senator from Oregon.  There are quite a few things relating to internet and privacy that the right, left and center can agree on and still our dysfunctional government does nothing.
Title: Re: Privacy is an essential part of security
Post by: G M on November 14, 2021, 07:27:17 AM
https://www.vice.com/en/article/vb9nzx/black-market-tmobile-phone-location-data-bounty-hunter-murder

From the article :
"For years, I've warned that protecting personal data isn't just about personal privacy, it's about personal safety," Senator Ron Wyden told Motherboard in a statement.
—------------

Ron Wyden is a far left Senator from Oregon.  There are quite a few things relating to internet and privacy that the right, left and center can agree on and still our dysfunctional government does nothing.

It’s pretty clear the PTB are interested only in controlling us and protecting us doesn’t even enter into their calculations.
Title: Privacy oriented cellular?
Post by: G M on April 13, 2022, 09:48:44 AM
https://www.voltawireless.com/

Haven't studied this yet.
Title: WaPo Privacy How To
Post by: Crafty_Dog on June 24, 2022, 03:55:39 PM
https://www.washingtonpost.com/technology/2022/06/24/delete-yourself-online/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3730098%2F62b5daf9cfe8a21601be4c36%2F61cdf026ae7e8a4ac205b2b3%2F46%2F70%2F62b5daf9cfe8a21601be4c36&wp_cu=10fdb05edea8f32c1b02f6dfec609335%7CD462DD329F9C56B3E0530100007F597F
Title: WT: Google warns of spyware
Post by: Crafty_Dog on July 29, 2022, 04:45:07 AM
Google warns of spyware business to hack into personal devices

Says commercial sale hurts values

BY RYAN LOVELACE THE WASHINGTON TIMES

Google is warning Congress that the sale of spyware tools is fueling the growth of a commercial surveillance industry that enables governments to track people around the world in unprecedented ways.

Google’s Shane Huntley recently told the House Intelligence Committee that the commercial surveillance industry is thriving and should concern Americans.

“These vendors are enabling the proliferation of dangerous hacking tools, arming nationstate actors that would not otherwise be able to develop these capabilities in-house,” Mr. Huntley said in written testimony. “While the use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.”

Spyware, malicious software that facilitates the monitoring of someone’s smartphone or other electronic devices, can give criminals access to people’s messages, microphones and cameras, often without any indication of the snooping.

The spyware is readily available in the high-tech marketplace, and cyberattackers, hackers and governments are all customers of these products.

Americans have become ensnared by these surveillance tools.

Carine Kanimba, a naturalized U.S. citizen from Rwanda, told intelligence committee lawmakers that the Rwanda government used spyware tools against her family after facilitating the kidnapping of her father.

Ms. Kanimba said the Rwandan government targeting her has relied upon American taxpayers’ money. “I am told that my surveillance would cost the Rwandan government millions of dollars,” Ms. Kanimba said at an intelligence committee hearing on Wednesday. “Rwanda is the third-most aid-dependent country in the world, foreign aid makes up to 70% of national expenditure, and the U.S. provided 160 million dollars in aid to Rwanda last year. All of you, members of Congress and American taxpayers themselves deserve to know how the government of Rwanda is spending humanitarian aid.”

Lawmakers expressed horror at Ms. Kanimba’s experience. Democratic Reps. Jim Himes of Connecticut and Jackie Speier of California suggested the U.S. should reconsider giving foreign aid to Rwanda.

Among the most pernicious forms of digital surveillance is spyware that relies on “zeroclick” flaws, which do not require someone to click on anything for a hacker to gain access to a victim’s device.

Creating tools to protect Americans from surveillance products is difficult.

“Short of not using a device, there is no way to prevent exploitation by a zero-click exploit,” Mr. Huntley wrote. “It’s a weapon against which there is no defense.

Mr. Huntley is part of Google’s Threat Analysis group, a team of about 50 people focused on statesponsored malware attacks and other threats from major hacking groups. He said 7 of 9 previously unknown vulnerabilities his team discovered last year were created by commercial providers and then sold to state-backed hackers and attackers.

Determining when someone falls victim to spyware is difficult. Mr. Huntley said Google uses a range of tools to detect surveillance and gathers information from outsiders and Google users.

The Toronto-based research group Citizen Lab uncovered an NSO Group exploit last year affecting Apple devices, which captured public attention. Apple later issued a security update. The Biden administration also blacklisted the technology by adding NSO to a Commerce Department list, placing restrictions on the group’s business.

Citizen Lab’s John Scott-Railton told the lawmakers that he finds victims by connecting with people his group believes are likely to become targets of repressive regimes and through work with other companies.

He said Citizen Lab found one exploit on the phone of a woman advocating for women’s rights to drive in Saudi Arabia and in another case a man’s phone was running hot because it was infected with multiple spyware products.

“Typically, with this pretty sophisticated stuff, there would be no sign,” Mr. Scott-Railton said. “There are exceptions.”

Mr. Himes said American public officials are not beyond the reach of commercial spyware customers.

“You can imagine that if this can be in a warehouse in Ghana that nobody, not Mike Pence, not Nancy Pelosi, not Kevin McCarthy, not Adam Schiff … are immune from having their most private deliberations watched,” Mr. Himes said. “And that may be just enough to interfere in our elections, just enough to end our democracies.”


Carine Kanimba and technology experts urged Congress to oppose the use of commercial spyware and discourage investment in spyware that has been used against dissidents, journalists and diplomats. ASSOCIATED PRES
Title: How URLs track us
Post by: Crafty_Dog on July 31, 2022, 08:16:32 PM
https://www.popsci.com/diy/remove-tracking-url/
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on August 01, 2022, 05:56:10 AM
Obvious irony there in that an article about how to avoid being tracked tracked me.
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on August 23, 2022, 12:22:39 PM
Biden administration sued for social media surveillance information

BY RYAN LOVELACE THE WASHINGTON TIMES

A liberal-leaning think tank is suing the Biden administration to reveal the government’s social media surveillance tools and the extent of online spying on Americans.

The New York-based Brennan Center sued the Department of Homeland Security and Immigration and Customs Enforcement for refusing to hand over records about its use of data analytics products that scour the internet.

“The agency’s expanded use of social media monitoring tools will heighten existing risks to privacy and to freedom of speech, expression, and association, affecting Americans, immigrants, and foreign travelers while making scant contributions to national security,” the Brennan Center’s Rachel Levinson-Waldman and Jose Guillermo Gutierrez said in a statement posted on the center’s website.

The lawsuit filed last week in the U.S. District Court for the Southern District of New York seeks records about the government’s use of tools from three companies: ShadowDragon, Logically Inc. and Voyager Labs. The trio makes data tools relying on artificial intelligence that allows customers to spend more time analyzing information rather than gathering it.

The Brennan Center’s lawsuit said it knows ICE uses Shadow-Dragon, DHS has had preliminary conversations with Logically Inc., and Voyager Labs markets its services for areas under DHS’ purview such as border security.

In December 2021, the Brennan Center sought a range of documents on the government’s use of these tools including records about internal audits, legal justifications, training and use, purchase orders, communications about the companies, and nondisclosure agreements.

Rather than reject the Freedom of Information Act request for records, the Brennan Center’s lawsuit alleges the government ignored it. A DHS official transferred the request internally in December 2021, ignored further requests through April 2022, and declared the matter closed earlier this month.

Immigration enforcement agencies are hardly the only ones using social media tools and facing scrutiny for doing so. The U.S. Postal Service Inspector General published an audit in March saying that postal inspectors conducted unauthorized searches and exceeded their legal authority through its Internet Covert Operations Program (iCOP).

Postal inspectors working on the iCOP program allegedly snooped on Americans’ social media accounts to monitor “right-wing Parler and Telegram accounts” ahead of protests, according to a bulletin published by Yahoo News last year.

The Postal Service watchdog’s investigation was conducted in response to a request from House Oversight Committee Chairwoman Carolyn B. Maloney, New York Democrat, and ranking member Rep. James Comer, Kentucky Republican.

National security agencies and officials have an interest in social media monitoring too. The Department of Defense last year said it planned to spend nearly $60 million on its Influence Campaign Awareness and Sensemaking program to make algorithms and gathering tweets, memes, blog posts, and political ads. The goal is to provide tools to create an “early warning” of foreign influence, according to the Pentagon’s Defense Advanced Research Projects Agency.

The full picture of how the federal government monitors social media is unclear but many agencies find it valuable. At a Cyber Initiatives Group event last week, intelligence community cyber executive Laura Galante said information published on Twitter and blogs can be “just as critical as different types of classified or other sources” when studying cyberthreats.

DHS and ICE did not immediately respond to requests for comment on the Brennan Center’s lawsuit.
Title: liberal think tank suing Biden DHS immigration
Post by: ccp on August 23, 2022, 12:53:42 PM
****A liberal-leaning think tank is suing the Biden administration to reveal the government’s social media surveillance tools and the extent of online spying on Americans.****

guise is they are suing to "protect Americans"

No it is not
they are suing to protect illegals !

they don't give rat's ass about citizens....
Title: Twitter and the Surveillance State
Post by: Crafty_Dog on August 24, 2022, 08:14:25 AM
https://theconservativetreehouse.com/blog/2022/08/23/twitter-whistleblower-surfaces-presenting-challenge-for-u-s-surveillance-state-enter-cnn-and-the-washington-post/?fbclid=IwAR2XXSFNWF1Lx1tHfZrB0eeo1mM5pP-Z47zV6BXJAryLB2NAFXbcVfs-kew
Title: Re: Twitter and the Surveillance State
Post by: G M on August 24, 2022, 11:09:19 AM
https://theconservativetreehouse.com/blog/2022/08/23/twitter-whistleblower-surfaces-presenting-challenge-for-u-s-surveillance-state-enter-cnn-and-the-washington-post/?fbclid=IwAR2XXSFNWF1Lx1tHfZrB0eeo1mM5pP-Z47zV6BXJAryLB2NAFXbcVfs-kew

https://ace.mu.nu/archives/400625.php


Funny enough, I actually met "Mudge" at Def Con back in the 90's.
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on August 24, 2022, 02:28:10 PM
Far out.
Title: Not your network, not your car
Post by: Crafty_Dog on September 06, 2022, 01:33:13 AM
https://vinthewrench.substack.com/p/not-your-network-not-your-car?r=xxlht&utm_medium=ios&fbclid=IwAR3Q4QdEjca5v6YIANIZ3JPViPt6y78ZB_k--av7CnuXV5w-n6uHSL9N42w


I'm getting a "not secure" on this URL which is at the end of the preceding:

http://opengarages.org/handbook/
Title: Thoughts on this?
Post by: Crafty_Dog on May 22, 2023, 01:46:49 PM


https://joindeleteme.com/?utm_source=Facebook&utm_medium=paid-social&utm_campaign=PROS_Interests_LAL&utm_content=IMG_Holiday-Fear_FB-IG_Bad-People_PROS&utm_term=VPN&adsetid=23853743207020264&campaignid=23853714100090264&fbclid=IwAR3duCidlO9br0bbrE3lpxhfSr8V_Cqt8JVDVh9QMe9S16Qlq_8n_IM9VPg
Title: Re: G M's guide to online privacy
Post by: Crafty_Dog on June 15, 2023, 08:11:54 AM


I'm thinking of signing up to Twitter so I can follow Tucker (and maybe a few others)

In that I am already on FB am I surrendering anything additional?
Title: Re: G M's guide to online privacy
Post by: G M on June 27, 2023, 09:24:52 AM


I'm thinking of signing up to Twitter so I can follow Tucker (and maybe a few others)

In that I am already on FB am I surrendering anything additional?

Probably not.
Title: Liberty’s Torch: on technology
Post by: G M on June 27, 2023, 09:25:49 AM
https://www.libertystorch.info/2023/06/26/some-thoughts-on-technology/
Title: The anonymous world of extreme privacy
Post by: Crafty_Dog on January 26, 2024, 03:00:03 PM
https://www.marketplace.org/shows/marketplace-tech/the-anonymous-world-of-extreme-privacy/

Remember, I am a clueless boomer and have no idea whether this guy knows whereof he speaks.  Indeed, I would be glad to hear the assessments of others.