Forwarded from BlackBox (Security) Archiv
Further study proves lie of โanonymousโ data
Anonymous data is often not really anonymous at all, in many data records individuals can be uniquely identified even without a name. A new study illustrates the amazing precision with which this can be done. Many companies and databases undermine the basic data protection regulation.
Not everywhere where it says anonymous is also anonymous in it. This is made clear by a study in the scientific journal โNatureโ. The researchers can identify 99.98 percent of Americans in each data set, with only 15 characteristics such as age, place of residence or nationality.
The scientistsโ example: a cheap health insurance company sells customer data, but only โanonymouslyโ and only from a fraction of the database. The study makes it clear: this is not true anonymity, the data is not secure. People are simply too unique to hide in databases. Removing names only makes records pseudonymous, not anonymous. With an online tool, anyone can trace the de-anonymization themselves.
The authors write that โeven highly fragmented anonymized data records do not meet the modern anonymization standards of the Basic Data Protection Ordinanceโ. Their results question โthe technical and legal adequacyโ of simply deleting directly identifying data types and not worrying about identifiability using other data types.
Data is never completely anonymous
โThe study once again shows very beautifully what we have known for a long time,โ says data protection researcher Wolfie Christl to netzpolitik.org. โAs long as data records relating to individuals are being processed, no form of anonymization can prevent individuals from being reidentified with complete certainty.
๐๐ผ Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/further-study-proves-lie-of-anonymous-data
#study #data #anonymous #poc
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Anonymous data is often not really anonymous at all, in many data records individuals can be uniquely identified even without a name. A new study illustrates the amazing precision with which this can be done. Many companies and databases undermine the basic data protection regulation.
Not everywhere where it says anonymous is also anonymous in it. This is made clear by a study in the scientific journal โNatureโ. The researchers can identify 99.98 percent of Americans in each data set, with only 15 characteristics such as age, place of residence or nationality.
The scientistsโ example: a cheap health insurance company sells customer data, but only โanonymouslyโ and only from a fraction of the database. The study makes it clear: this is not true anonymity, the data is not secure. People are simply too unique to hide in databases. Removing names only makes records pseudonymous, not anonymous. With an online tool, anyone can trace the de-anonymization themselves.
The authors write that โeven highly fragmented anonymized data records do not meet the modern anonymization standards of the Basic Data Protection Ordinanceโ. Their results question โthe technical and legal adequacyโ of simply deleting directly identifying data types and not worrying about identifiability using other data types.
Data is never completely anonymous
โThe study once again shows very beautifully what we have known for a long time,โ says data protection researcher Wolfie Christl to netzpolitik.org. โAs long as data records relating to individuals are being processed, no form of anonymization can prevent individuals from being reidentified with complete certainty.
๐๐ผ Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/further-study-proves-lie-of-anonymous-data
#study #data #anonymous #poc
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
Privacy International study shows your mental health is for sale
A new study by Privacy International reveals how popular websites about depression in France, Germany and the UK share user data with advertisers, data brokers and large tech companies, while some depression test websites leak answers and test results with third parties. The findings raise serious concerns about compliance with European data protection and privacy laws.
๐๐ผ Story
https://privacyintyqcroe.onion/long-read/3194/privacy-international-study-shows-your-mental-health-sale
๐๐ผ Report
https://privacyintyqcroe.onion/report/3193/report-your-mental-health-sale
#privacy #study #report #DataBrokers #ourdata #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
A new study by Privacy International reveals how popular websites about depression in France, Germany and the UK share user data with advertisers, data brokers and large tech companies, while some depression test websites leak answers and test results with third parties. The findings raise serious concerns about compliance with European data protection and privacy laws.
๐๐ผ Story
https://privacyintyqcroe.onion/long-read/3194/privacy-international-study-shows-your-mental-health-sale
๐๐ผ Report
https://privacyintyqcroe.onion/report/3193/report-your-mental-health-sale
#privacy #study #report #DataBrokers #ourdata #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
DeepPrivacy: A Generative Adversarial Network for Face Anonymization
We propose a novel architecture which is able to automatically anonymize faces in images while retaining the original data distribution. We ensure total anonymization of all faces in an image by generating images exclusively on privacy-safe information. Our model is based on a conditional generative adversarial network, generating images considering the original pose and image background. The conditional information enables us to generate highly realistic faces with a seamless transition between the generated face and the existing background. Furthermore, we introduce a diverse dataset of human faces, including unconventional poses, occluded faces, and a vast variability in backgrounds. Finally, we present experimental results reflecting the capability of our model to anonymize images while preserving the data distribution, making the data suitable for further training of deep learning models. As far as we know, no other solution has been proposed that guarantees the anonymization of faces while generating realistic images.
๐๐ผ PDF:
https://arxiv.org/pdf/1909.04538.pdf
๐๐ผ GitHub:
https://github.com/hukkelas/DeepPrivacy
๐๐ผ Story on Motherboard:
https://www.vice.com/en_us/article/ne87pg/deepprivacy-fake-face-anonymized-algorithm
#DeepPrivacy #privacy #anonymization #research #study #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
We propose a novel architecture which is able to automatically anonymize faces in images while retaining the original data distribution. We ensure total anonymization of all faces in an image by generating images exclusively on privacy-safe information. Our model is based on a conditional generative adversarial network, generating images considering the original pose and image background. The conditional information enables us to generate highly realistic faces with a seamless transition between the generated face and the existing background. Furthermore, we introduce a diverse dataset of human faces, including unconventional poses, occluded faces, and a vast variability in backgrounds. Finally, we present experimental results reflecting the capability of our model to anonymize images while preserving the data distribution, making the data suitable for further training of deep learning models. As far as we know, no other solution has been proposed that guarantees the anonymization of faces while generating realistic images.
๐๐ผ PDF:
https://arxiv.org/pdf/1909.04538.pdf
๐๐ผ GitHub:
https://github.com/hukkelas/DeepPrivacy
๐๐ผ Story on Motherboard:
https://www.vice.com/en_us/article/ne87pg/deepprivacy-fake-face-anonymized-algorithm
#DeepPrivacy #privacy #anonymization #research #study #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
Free internet access should be a basic human right
Free internet access must be considered as a human right, as people unable to get online โ particularly in developing countries โ lack meaningful ways to influence the global players shaping their everyday lives, according to a new study.
As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.
New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture โ a means of enabling billions of people to lead โminimally decent livesโ.
Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings โ the first study of its kind โ in the Journal of Applied Philosophy.
โInternet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,โ commented Dr Reglitz.
โWithout such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply donโt have a say in the making of the rules they must obey and which shape their life chances.โ
He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of todayโs political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people โofflineโ had decreased.
๐๐ผ Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx
#humenrights #internet #study
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Free internet access must be considered as a human right, as people unable to get online โ particularly in developing countries โ lack meaningful ways to influence the global players shaping their everyday lives, according to a new study.
As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.
New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture โ a means of enabling billions of people to lead โminimally decent livesโ.
Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings โ the first study of its kind โ in the Journal of Applied Philosophy.
โInternet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,โ commented Dr Reglitz.
โWithout such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply donโt have a say in the making of the rules they must obey and which shape their life chances.โ
He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of todayโs political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people โofflineโ had decreased.
๐๐ผ Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx
#humenrights #internet #study
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
โWhat about building 7?โ A social psychological study of online discussion of 9/11 conspiracy theories
Recent research into the psychology of conspiracy belief has highlighted the importance of belief systems in the acceptance or rejection of conspiracy theories. We examined a large sample of conspiracist (pro-conspiracy-theory) and conventionalist (anti-conspiracy-theory) comments on news websites in order to investigate the relative importance of promoting alternative explanations vs. rejecting conventional explanations for events.
In accordance with our hypotheses, we found that conspiracist commenters were more likely to argue against the opposing interpretation and less likely to argue in favor of their own interpretation, while the opposite was true of conventionalist commenters. However, conspiracist comments were more likely to explicitly put forward an account than conventionalist comments were. In addition, conspiracists were more likely to express mistrust and made more positive and fewer negative references to other conspiracy theories.
The data also indicate that conspiracists were largely unwilling to apply the โconspiracy theoryโ label to their own beliefs and objected when others did so, lending support to the long-held suggestion that conspiracy belief carries a social stigma. Finally, conventionalist arguments tended to have a more hostile tone. These tendencies in persuasive communication can be understood as a reflection of an underlying conspiracist worldview in which the details of individual conspiracy theories are less important than a generalized rejection of official explanations.
โThe Internet was made for conspiracy theory: it is a conspiracy theory: one thing leads to another, always another link leading you deeper into no thing and no place.โ (Stewart, 1999, p. 18).
๐๐ผ Kent Academic RepositoryFull text document (pdf)
https://kar.kent.ac.uk/36252/1/Wood%20and%20Douglas%202013%20Frontiers.pdf
๐๐ผ Read more:
https://www.frontiersin.org/articles/10.3389/fpsyg.2013.00409/full
https://www.forschung-und-wissen.de/nachrichten/psychologie/menschen-die-an-verschwoerungstheorien-glauben-sind-vernuenftiger-13372102
#research #psychological #study #conspiracy #theories #pdf #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
Recent research into the psychology of conspiracy belief has highlighted the importance of belief systems in the acceptance or rejection of conspiracy theories. We examined a large sample of conspiracist (pro-conspiracy-theory) and conventionalist (anti-conspiracy-theory) comments on news websites in order to investigate the relative importance of promoting alternative explanations vs. rejecting conventional explanations for events.
In accordance with our hypotheses, we found that conspiracist commenters were more likely to argue against the opposing interpretation and less likely to argue in favor of their own interpretation, while the opposite was true of conventionalist commenters. However, conspiracist comments were more likely to explicitly put forward an account than conventionalist comments were. In addition, conspiracists were more likely to express mistrust and made more positive and fewer negative references to other conspiracy theories.
The data also indicate that conspiracists were largely unwilling to apply the โconspiracy theoryโ label to their own beliefs and objected when others did so, lending support to the long-held suggestion that conspiracy belief carries a social stigma. Finally, conventionalist arguments tended to have a more hostile tone. These tendencies in persuasive communication can be understood as a reflection of an underlying conspiracist worldview in which the details of individual conspiracy theories are less important than a generalized rejection of official explanations.
โThe Internet was made for conspiracy theory: it is a conspiracy theory: one thing leads to another, always another link leading you deeper into no thing and no place.โ (Stewart, 1999, p. 18).
๐๐ผ Kent Academic RepositoryFull text document (pdf)
https://kar.kent.ac.uk/36252/1/Wood%20and%20Douglas%202013%20Frontiers.pdf
๐๐ผ Read more:
https://www.frontiersin.org/articles/10.3389/fpsyg.2013.00409/full
https://www.forschung-und-wissen.de/nachrichten/psychologie/menschen-die-an-verschwoerungstheorien-glauben-sind-vernuenftiger-13372102
#research #psychological #study #conspiracy #theories #pdf #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Investigation report: Mobile phone data extraction by police forces in England and Wales
After massive criticism, the English data protection authority has taken a close look at the topic of mobile phone evaluations. The result: The police take too much data from the phones and store it for too long - often without a legal basis.
The British data protection authority ICO criticises the way law enforcement agencies deal with the smartphones of victims in England and Wales. For the 64-page investigation report (PDF), the authority had consulted law enforcement agencies, civil society groups and victims' associations. The investigation was preceded by numerous complaints from individuals and a report by Privacy International.
Mobile phones now store a large part of our lives, from address books to private photos and our private communications. In addition to this data, which often extends over long periods of time, phones store much more: browser histories, geodata, used Wifi's, health data and often the passwords and access data of their owners. This makes the phone one of the most interesting data sources for law enforcement agencies today.
๐๐ผ PDF:
https://assets.documentcloud.org/documents/6953083/ICO-Phone-PD-Report.pdf
๐๐ผ Digital stop and search: how the UK police can secretly download everything from your mobile phone
https://privacyinternational.org/report/1699/digital-stop-and-search-how-uk-police-can-secretly-download-everything-your-mobile
Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/england-polizei-handyauswertung-untersuchung/
#surveillance #ICO #uk #police #PrivacyInternational #study #wales #netpolitics
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
After massive criticism, the English data protection authority has taken a close look at the topic of mobile phone evaluations. The result: The police take too much data from the phones and store it for too long - often without a legal basis.
The British data protection authority ICO criticises the way law enforcement agencies deal with the smartphones of victims in England and Wales. For the 64-page investigation report (PDF), the authority had consulted law enforcement agencies, civil society groups and victims' associations. The investigation was preceded by numerous complaints from individuals and a report by Privacy International.
Mobile phones now store a large part of our lives, from address books to private photos and our private communications. In addition to this data, which often extends over long periods of time, phones store much more: browser histories, geodata, used Wifi's, health data and often the passwords and access data of their owners. This makes the phone one of the most interesting data sources for law enforcement agencies today.
๐๐ผ PDF:
https://assets.documentcloud.org/documents/6953083/ICO-Phone-PD-Report.pdf
๐๐ผ Digital stop and search: how the UK police can secretly download everything from your mobile phone
https://privacyinternational.org/report/1699/digital-stop-and-search-how-uk-police-can-secretly-download-everything-your-mobile
Read more ๐ฉ๐ช:
https://netzpolitik.org/2020/england-polizei-handyauswertung-untersuchung/
#surveillance #ICO #uk #police #PrivacyInternational #study #wales #netpolitics
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
lookout-uyghur-malware-tr-us.pdf
8.1 MB
Espionage software: China is said to have surveilled mobile phones of Uighurs for years
IT security researchers have found numerous apps that spy on China's Uighur Muslim minority - even abroad.
The Uyghur Muslim minority in China lives in a surveillance state: As reported by the SZ, among others, Beijing has installed thousands of surveillance cameras in the cities of the Xinjiang region, and Uyghurs are sent to re-education camps. Only a few days ago the news agency AP reported that China is also trying to keep the Muslim population under control with drastic birth control.
๐๐ผ PDF:
https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf
#china #Xinjiang #uyghurs #surveillance #smartphones #apps #malware #pdf #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
IT security researchers have found numerous apps that spy on China's Uighur Muslim minority - even abroad.
The Uyghur Muslim minority in China lives in a surveillance state: As reported by the SZ, among others, Beijing has installed thousands of surveillance cameras in the cities of the Xinjiang region, and Uyghurs are sent to re-education camps. Only a few days ago the news agency AP reported that China is also trying to keep the Muslim population under control with drastic birth control.
๐๐ผ PDF:
https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf
#china #Xinjiang #uyghurs #surveillance #smartphones #apps #malware #pdf #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
Forwarded from BlackBox (Security) Archiv
PWDB - New generation of Password Mass-Analysis
One out of every 142 passwords is '123456'
The '123456' password was spotted 7 million times across a data trove of one billion leaked credentials, on one of the biggest password re-use studies of its kind.
๐๐ผ PWDB - New generation of Password Mass-Analysis
https://github.com/FlameOfIgnis/Pwdb-Public
๐๐ผ Read more:
https://www.zdnet.com/article/one-out-of-every-142-passwords-is-123456/
#passwords #study #analysis
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
One out of every 142 passwords is '123456'
The '123456' password was spotted 7 million times across a data trove of one billion leaked credentials, on one of the biggest password re-use studies of its kind.
๐๐ผ PWDB - New generation of Password Mass-Analysis
https://github.com/FlameOfIgnis/Pwdb-Public
๐๐ผ Read more:
https://www.zdnet.com/article/one-out-of-every-142-passwords-is-123456/
#passwords #study #analysis
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@NoGoolag
๐ก@BlackBox
GitHub
GitHub - ignis-sec/Pwdb-Public: A collection of all the data i could extract from 1 billion leaked credentials from internet.
A collection of all the data i could extract from 1 billion leaked credentials from internet. - ignis-sec/Pwdb-Public
Forwarded from BlackBox (Security) Archiv
How the Dark Web Drug Supply Has Responded to COVID-19
The darknet drug markets suffered initial disruptions in shipment speeds before recovering to become more efficient than legitimate supply chain systems.
Like legitimate supply chains, dark web drug markets depend on substance imports from China, and the coronavirus pandemic led to closure of Chinese chemical supply firms and factories.
Importantly, drug dealers depend of legitimate trade routes to sustain their illicit commercial activities. The fact that EU borders remained open did not make things better for most of the darknet and legitimate supply chains as shipping capacities took a nose dive.
Nonetheless, although the coronavirus-related restrictions seemed to freeze operations across the global drug supply chains, the situation in the dark web economy was different. Mexican drug cartels suffered from the pandemicโs economic ramifications as user buying power tanked โ meanwhile, the darknet drug markets did not really suffer a serious dent in drug sales.
๐ ๐๐ผ (Tor-Browser)
http://tapeucwutvne7l5o.onion/how-the-dark-web-drug-supply-has-responded-to-covid-19
๐ ๐๐ผ Online Drug Markets Are Entering a 'Golden Age'
https://www.vice.com/en_us/article/dyz3v7/online-drug-markets-are-entering-a-golden-age
๐ ๐๐ผ Vaccine for COVID-19 and Other Scams on the Dark Web
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vaccine-for-covid-19-and-other-scams-on-the-dark-web/
๐ ๐๐ผ (PDF) From Dealer to Doorstep โ How Drugs Are Sold On the Dark Net
https://www.swansea.ac.uk/media/From-Dealer-to-Doorstep-%C3%A2%C2%80%C2%93-How-Drugs-Are-Sold-On-the-Dark-Net.pdf
๐ ๐๐ผ (PDF) EMCDDA AND EUROPOL ANALYSE IMPACT OF PANDEMIC ON EU DRUG MARKETS
https://www.emcdda.europa.eu/system/files/attachments/13099/COVID19_DrugMarkets_EMCDDA_Europol_Final_web.pdf
#darknet #markets #drugs #europol #covid #study #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The darknet drug markets suffered initial disruptions in shipment speeds before recovering to become more efficient than legitimate supply chain systems.
Like legitimate supply chains, dark web drug markets depend on substance imports from China, and the coronavirus pandemic led to closure of Chinese chemical supply firms and factories.
Importantly, drug dealers depend of legitimate trade routes to sustain their illicit commercial activities. The fact that EU borders remained open did not make things better for most of the darknet and legitimate supply chains as shipping capacities took a nose dive.
Nonetheless, although the coronavirus-related restrictions seemed to freeze operations across the global drug supply chains, the situation in the dark web economy was different. Mexican drug cartels suffered from the pandemicโs economic ramifications as user buying power tanked โ meanwhile, the darknet drug markets did not really suffer a serious dent in drug sales.
๐ ๐๐ผ (Tor-Browser)
http://tapeucwutvne7l5o.onion/how-the-dark-web-drug-supply-has-responded-to-covid-19
๐ ๐๐ผ Online Drug Markets Are Entering a 'Golden Age'
https://www.vice.com/en_us/article/dyz3v7/online-drug-markets-are-entering-a-golden-age
๐ ๐๐ผ Vaccine for COVID-19 and Other Scams on the Dark Web
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vaccine-for-covid-19-and-other-scams-on-the-dark-web/
๐ ๐๐ผ (PDF) From Dealer to Doorstep โ How Drugs Are Sold On the Dark Net
https://www.swansea.ac.uk/media/From-Dealer-to-Doorstep-%C3%A2%C2%80%C2%93-How-Drugs-Are-Sold-On-the-Dark-Net.pdf
๐ ๐๐ผ (PDF) EMCDDA AND EUROPOL ANALYSE IMPACT OF PANDEMIC ON EU DRUG MARKETS
https://www.emcdda.europa.eu/system/files/attachments/13099/COVID19_DrugMarkets_EMCDDA_Europol_Final_web.pdf
#darknet #markets #drugs #europol #covid #study #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Vice
Online Drug Markets Are Entering a 'Golden Age'
VICE News analysis shows darknet drug markets are emerging from coronavirus lockdown stronger than ever, with increased sales and more robust defences against hackers.
Forwarded from BlackBox (Security) Archiv
Is the web getting slower?
A story on Hacker News recently argued that webpage speeds haven't improved, even as internet speeds have gone up.
This article explains why that conclusion can't be drawn from the original data.
We'll also look at how devices and the web have changed over the past 10 years, and what those changes have meant for web performance.
๐ก ๐๐ผ https://www.debugbear.com/blog/is-the-web-getting-slower
๐ ๐๐ผ The Need for Speed, 23 Years Later:
https://www.nngroup.com/articles/the-need-for-speed/
#webpage #speed #internet #study #report #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A story on Hacker News recently argued that webpage speeds haven't improved, even as internet speeds have gone up.
This article explains why that conclusion can't be drawn from the original data.
We'll also look at how devices and the web have changed over the past 10 years, and what those changes have meant for web performance.
๐ก ๐๐ผ https://www.debugbear.com/blog/is-the-web-getting-slower
๐ ๐๐ผ The Need for Speed, 23 Years Later:
https://www.nngroup.com/articles/the-need-for-speed/
#webpage #speed #internet #study #report #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Debugbear
Is The Web Getting Slower? | DebugBear
As consumer devices and internet speeds become faster, website become larger and more complex. Is website performance getting worse overall?
Forwarded from BlackBox (Security) Archiv
Internet history can be used for โreidentificationโ finds study by Mozilla
A recent research paper has reaffirmed that our internet history can be reliably used to identify us. The research was conducted by Sarah Bird, Ilana Segall, and Martin Lopatka from Mozilla and is titled: Replication: Why We Still Canโt Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. The paper was released at the Symposium on Usable Privacy and Security and is a continuation of a 2012 paper that highlighted the same reidentifiability problem.
โผ๏ธ Just your internet history can be used to reidentify you on the internet โผ๏ธ
Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.
This is especially concerning because internet history is routinely sold by your internet service provider (ISP) and mobile data provider to third party advertising and marketing firms which are demonstrably able to tie a list of sites back to an individual they already have a profile on โ even if the ISP claims to be โanonymizingโ the data being sold. This is a legally sanctioned activity ever since 2017 when Congress voted to get rid of broadband privacy and allow the monetization of this type of data collection.
This type of โhistory-based profilingโ is undoubtedly being used to build ad profiles on internet users around the world. Previous studies have shown that an IP address usually stays static for about a month โ which the researchers noted: โis more than enough time to build reidentifiable browsing profiles.โ
๐ ๐๐ผ (PDF)
https://www.usenix.org/system/files/soups2020-bird.pdf
๐ ๐๐ผ https://www.cozyit.com/internet-history-can-be-used-for-reidentification-finds-study-by-mozilla/
#mozilla #study #research #internet #history #reidentification #thinkabout #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A recent research paper has reaffirmed that our internet history can be reliably used to identify us. The research was conducted by Sarah Bird, Ilana Segall, and Martin Lopatka from Mozilla and is titled: Replication: Why We Still Canโt Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. The paper was released at the Symposium on Usable Privacy and Security and is a continuation of a 2012 paper that highlighted the same reidentifiability problem.
โผ๏ธ Just your internet history can be used to reidentify you on the internet โผ๏ธ
Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.
This is especially concerning because internet history is routinely sold by your internet service provider (ISP) and mobile data provider to third party advertising and marketing firms which are demonstrably able to tie a list of sites back to an individual they already have a profile on โ even if the ISP claims to be โanonymizingโ the data being sold. This is a legally sanctioned activity ever since 2017 when Congress voted to get rid of broadband privacy and allow the monetization of this type of data collection.
This type of โhistory-based profilingโ is undoubtedly being used to build ad profiles on internet users around the world. Previous studies have shown that an IP address usually stays static for about a month โ which the researchers noted: โis more than enough time to build reidentifiable browsing profiles.โ
๐ ๐๐ผ (PDF)
https://www.usenix.org/system/files/soups2020-bird.pdf
๐ ๐๐ผ https://www.cozyit.com/internet-history-can-be-used-for-reidentification-finds-study-by-mozilla/
#mozilla #study #research #internet #history #reidentification #thinkabout #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Forwarded from BlackBox (Security) Archiv
No, the Darknet is not the stronghold of all evil!
The anonymization service Tor can be used for good and bad, a study examines what outweighs. However, this goes a long way wrong.
To obtain information about the usage patterns of the Tor network, scientists Eric Jardine (Virginia Tech/USA), Andrew Lindner (Skidmore College/USA) and Gareth Owenson (University of Portsmouth/UK) operated about 1 percent of the Tor entry nodes for about seven months between December 31, 2018, and August 18, 2019, and studied the connections that were made there.
๐ ๐๐ผ https://www.pnas.org/content/early/2020/11/24/2011893117
#tor #darknet #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The anonymization service Tor can be used for good and bad, a study examines what outweighs. However, this goes a long way wrong.
To obtain information about the usage patterns of the Tor network, scientists Eric Jardine (Virginia Tech/USA), Andrew Lindner (Skidmore College/USA) and Gareth Owenson (University of Portsmouth/UK) operated about 1 percent of the Tor entry nodes for about seven months between December 31, 2018, and August 18, 2019, and studied the connections that were made there.
๐ ๐๐ผ https://www.pnas.org/content/early/2020/11/24/2011893117
#tor #darknet #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Forwarded from BlackBox (Security) Archiv
pgpp-arxiv20.pdf
7.1 MB
Pretty Good Phone Privacy
To receive service in todayโs cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
To receive service in todayโs cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Forwarded from BlackBox (Security) Archiv
EPRS_STU(2021)656336_EN.pdf
3.6 MB
Online platforms: Economic and societal effects
Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf
#online #platforms #study #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf
#online #platforms #study #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Forwarded from BlackBox (Security) Archiv
Mass Extraction: The Widespread Power of U.S. Law Enforcement to Search Mobile Phones
Every day, law enforcement agencies across the country search thousands of cellphones, typically incident to arrest. To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone โ all emails, texts, photos, location, app data, and more โ which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a โwindow into the soul.โ
This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.
Every American is at risk of having their phone forensically searched by law enforcement.
https://www.upturn.org/reports/2020/mass-extraction/
๐ก Read as well:
https://www.eff.org/deeplinks/2021/03/fbi-should-stop-attacking-encryption-and-tell-congress-about-all-encrypted-phones
#usa #fbi #lawenforcement #massextraction #MDFT #mobilephones #cellphones #encryption #decryption #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Every day, law enforcement agencies across the country search thousands of cellphones, typically incident to arrest. To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone โ all emails, texts, photos, location, app data, and more โ which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a โwindow into the soul.โ
This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.
Every American is at risk of having their phone forensically searched by law enforcement.
https://www.upturn.org/reports/2020/mass-extraction/
๐ก Read as well:
https://www.eff.org/deeplinks/2021/03/fbi-should-stop-attacking-encryption-and-tell-congress-about-all-encrypted-phones
#usa #fbi #lawenforcement #massextraction #MDFT #mobilephones #cellphones #encryption #decryption #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Upturn
Mass Extraction | Upturn
This report is the most comprehensive examination of U.S. law enforcementโs use of mobile device forensic tools.
Forwarded from BlackBox (Security) Archiv
apple_google.pdf
1.4 MB
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google
We find that even when minimally configured and the handset is idle both iOS and Google Android share data with Apple/Google on average every 4.5 mins.
โผ๏ธ The phone IMEI, hardware serial number, SIM serial number and IMSI, handsetphone number etc are shared with Apple and Google. Both iOS and Google Android transmit telemetry, despite the user explicitly opting out of this.
๐ก When a SIM is inserted both iOS and Google Android send details to Apple/Google. iOS sends the MAC addresses of nearby devices, e.g. other handsets and the home gateway, to Apple together with their GPS location. Currently there are few, if any, realistic options for preventing this data sharing.
https://www.scss.tcd.ie/doug.leith/apple_google.pdf
#apple #google #study #telemetry #data #mobilephones #pdf
๐ก @nogoolag @blackbox_archiv
We find that even when minimally configured and the handset is idle both iOS and Google Android share data with Apple/Google on average every 4.5 mins.
โผ๏ธ The phone IMEI, hardware serial number, SIM serial number and IMSI, handsetphone number etc are shared with Apple and Google. Both iOS and Google Android transmit telemetry, despite the user explicitly opting out of this.
๐ก When a SIM is inserted both iOS and Google Android send details to Apple/Google. iOS sends the MAC addresses of nearby devices, e.g. other handsets and the home gateway, to Apple together with their GPS location. Currently there are few, if any, realistic options for preventing this data sharing.
https://www.scss.tcd.ie/doug.leith/apple_google.pdf
#apple #google #study #telemetry #data #mobilephones #pdf
๐ก @nogoolag @blackbox_archiv
Forwarded from BlackBox (Security) Archiv
ndss2021_1C-3_23159_paper.pdf
430.5 KB
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Contact discovery allows users of mobile messengers to conveniently connect with people in their address book.
In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.
Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, largescale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service.
https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf
#contact #messenger #telegram #whatsapp #signal #crawling #attacks #study #pdf
๐ก @nogoolag ๐ก @blackbox_archiv
Contact discovery allows users of mobile messengers to conveniently connect with people in their address book.
In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.
Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, largescale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service.
https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf
#contact #messenger #telegram #whatsapp #signal #crawling #attacks #study #pdf
๐ก @nogoolag ๐ก @blackbox_archiv
Source for the above Pfizer study:
https://www.medrxiv.org/content/10.1101/2021.07.28.21261159v1
#pfizer #study
https://www.medrxiv.org/content/10.1101/2021.07.28.21261159v1
#pfizer #study
medRxiv
Six Month Safety and Efficacy of the BNT162b2 mRNA COVID-19 Vaccine
Background BNT162b2 is a lipid nanoparticle-formulated, nucleoside-modified RNA vaccine encoding a prefusion-stabilized, membrane-anchored SARS-CoV-2 full-length spike protein. BNT162b2 is highly efficacious against COVID-19 and is currently authorized forโฆ
A study in 2014 conducted by none other than the NIH, found that cloth mask penetration was 97%, and that moisture retention and reuse of cloth masks can actually increase the risk of infection!!!
Source: https://pubmed.ncbi.nlm.nih.gov/25903751/
#mask #study #nih
Source: https://pubmed.ncbi.nlm.nih.gov/25903751/
#mask #study #nih
On the contrary, a study says COVID-19 deaths remain extremely rare in children and young people โ with most fatalities occurring within 30 days of infection and in children with specific underlying conditions
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4125501
#covid #poison #booster #children #kids #fauci #study #scamdemic #comorbidities
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4125501
#covid #poison #booster #children #kids #fauci #study #scamdemic #comorbidities