Thanks to Facebook, Your Cellphone Company Is Watching You More Closely Than Ever
https://theintercept.com/2019/05/20/facebook-data-phone-carriers-ads-credit-score
#fb #location #facebook #isp #carrier #why
https://theintercept.com/2019/05/20/facebook-data-phone-carriers-ads-credit-score
#fb #location #facebook #isp #carrier #why
The Intercept
Thanks to Facebook, Your Cellphone Company Is Watching You More Closely Than Ever
Legal experts believe Facebook profiling may run afoul of federal law on credit checks.
The tech giants are about to declare satellite war on the traditional telecoms operators
https://medium.com/enrique-dans/the-tech-giants-are-about-to-declare-satellite-war-on-the-traditional-telecoms-operators-8050ff7b49ab
#isp #telecom #satellite
https://medium.com/enrique-dans/the-tech-giants-are-about-to-declare-satellite-war-on-the-traditional-telecoms-operators-8050ff7b49ab
#isp #telecom #satellite
Medium
The tech giants are about to declare satellite war on the traditional telecoms operators
Bloomberg reports that Apple has long been working on creating a satellite network in competition with many other similar initiatives…
What is Cable Haunt?
Cable Haunt is a critical vulnerability found in cable modems from various manufacturers across the world. The vulnerability enables remote attackers to gain complete control of a cable modem, through an endpoint on the modem. Your cable modem is in charge of the internet traffic for all devices on the network. Cable Haunt might therefore be exploited to intercept private messages, redirect traffic, or participation in botnets.
https://cablehaunt.com
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
#cablehaunt #modem #router #vulnerability #isp
Cable Haunt is a critical vulnerability found in cable modems from various manufacturers across the world. The vulnerability enables remote attackers to gain complete control of a cable modem, through an endpoint on the modem. Your cable modem is in charge of the internet traffic for all devices on the network. Cable Haunt might therefore be exploited to intercept private messages, redirect traffic, or participation in botnets.
https://cablehaunt.com
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@NoGoolag
#cablehaunt #modem #router #vulnerability #isp
Forwarded from BlackBox (Security) Archiv
ISP Ordered to Hand Over Pirates’ Details After Cracked Software ‘Phoned Home’
Alleged pirates who installed cracked copies of expensive Siemens CAD tools on their computers are facing potentially huge settlement demands after the software "phoned home" informing the company of the illicit use. The Australian Federal Court has ordered ISP Telstra to hand over the personal details of the suspected infringers.
Reports of movie companies tracking down alleged pirates in order to extract cash settlements are commonplace today.
After IP addresses are monitored in BitTorrent swarms, companies regularly obtain court orders requiring ISPs to hand over the personal details of alleged infringers, to whom they send correspondence threatening a lawsuit, unless they pay up of course.
On first view, a case in Australia seems to follow a similar pattern but the details reveal a more interesting set of circumstances.
In an application filed at the Federal Court in Australia, Siemens Industry Software Inc asked the Court to compel local ISP Telstra to reveal the identities and personal details of “20 potential infringing users” who used “cracked” versions of its software.
However, instead of tracking these alleged pirates in BitTorrent swarms, Siemens obtained evidence of their infringement directly from their computers.
👉🏼 Read more:
https://torrentfreak.com/isp-ordered-to-hand-over-pirates-details-after-cracked-software-phoned-home-200629/
#isp #australia #pirates #software #cracked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@NoGoolag
📡@BlackBox
Alleged pirates who installed cracked copies of expensive Siemens CAD tools on their computers are facing potentially huge settlement demands after the software "phoned home" informing the company of the illicit use. The Australian Federal Court has ordered ISP Telstra to hand over the personal details of the suspected infringers.
Reports of movie companies tracking down alleged pirates in order to extract cash settlements are commonplace today.
After IP addresses are monitored in BitTorrent swarms, companies regularly obtain court orders requiring ISPs to hand over the personal details of alleged infringers, to whom they send correspondence threatening a lawsuit, unless they pay up of course.
On first view, a case in Australia seems to follow a similar pattern but the details reveal a more interesting set of circumstances.
In an application filed at the Federal Court in Australia, Siemens Industry Software Inc asked the Court to compel local ISP Telstra to reveal the identities and personal details of “20 potential infringing users” who used “cracked” versions of its software.
However, instead of tracking these alleged pirates in BitTorrent swarms, Siemens obtained evidence of their infringement directly from their computers.
👉🏼 Read more:
https://torrentfreak.com/isp-ordered-to-hand-over-pirates-details-after-cracked-software-phoned-home-200629/
#isp #australia #pirates #software #cracked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@NoGoolag
📡@BlackBox
Torrentfreak
ISP Ordered to Hand Over Pirates' Details After Cracked Software 'Phoned Home' * TorrentFreak
Siemens has obtained a court order to identify alleged software pirates. The tools had an embedded "phone home" feature that blew the whistle
Forwarded from BlackBox (Security) Archiv
Bunker.is - a non-profit isp
collaborating to create shared platforms with open products and no vendor lock-in
👉🏼 #Cloud:
A nextcloud instance for our contributors
👉🏼 #VPN:
We provide vpn services to our contributors
👉🏼 #Search:
A non-tracking search engine
👉🏼 #Etherpad:
A shared open etherpad instance
👉🏼 #Mail:
We provide mail accounts to our contributors
👉🏼 #Ethercalc:
An open public ethercalc instance
👉🏼 #Cryptpad:
We provide an open public instance of cryptpad
Our free services are possible due to the generosity of our users. Becoming a contributor gives you access to a wider range of services.
We dont think the users should be the product. We think you should know who has access to your data and why. Meet us and find out more.
👉🏼 https://bunker.is/ 👈🏼
#bunker #isp
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
collaborating to create shared platforms with open products and no vendor lock-in
👉🏼 #Cloud:
A nextcloud instance for our contributors
👉🏼 #VPN:
We provide vpn services to our contributors
👉🏼 #Search:
A non-tracking search engine
👉🏼 #Etherpad:
A shared open etherpad instance
👉🏼 #Mail:
We provide mail accounts to our contributors
👉🏼 #Ethercalc:
An open public ethercalc instance
👉🏼 #Cryptpad:
We provide an open public instance of cryptpad
Our free services are possible due to the generosity of our users. Becoming a contributor gives you access to a wider range of services.
We dont think the users should be the product. We think you should know who has access to your data and why. Meet us and find out more.
👉🏼 https://bunker.is/ 👈🏼
#bunker #isp
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
bunker.is
Services | bunker.is
together
A curated list of open-source anti-censorship tools
https://github.com/danoctavian/awesome-anti-censorship
#censorship #censorshipcircumvention #firewall #DPI #ISP
https://github.com/danoctavian/awesome-anti-censorship
#censorship #censorshipcircumvention #firewall #DPI #ISP
GitHub
GitHub - danoctavian/awesome-anti-censorship: curated list of open-source anti-censorship tools
curated list of open-source anti-censorship tools. Contribute to danoctavian/awesome-anti-censorship development by creating an account on GitHub.
Dutch ISPs Unblock Pirate Bay Proxies, Because They Can
Dutch ISPs Ziggo and XS4ALL have unblocked dozens of Pirate Bay proxies and mirrors. While the companies must block the torrent site itself, the latest court order supersedes the injunction which covered the site's proxies. Anti-piracy group BREIN characterizes the ISPs move as "shenanigans" and "downright silly."
The Pirate Bay is blocked in dozens of countries around the world. In most cases, ISPs are ordered to take action after a relatively short court proceeding.
In the Netherlands, however, the process took more than a decade, and it’s still not completely over yet.
https://torrentfreak.com/dutch-isps-unblock-pirate-bay-proxies-because-they-can-200822/
#Europe #Netherlands #ISP #PirateBay #piracy
Dutch ISPs Ziggo and XS4ALL have unblocked dozens of Pirate Bay proxies and mirrors. While the companies must block the torrent site itself, the latest court order supersedes the injunction which covered the site's proxies. Anti-piracy group BREIN characterizes the ISPs move as "shenanigans" and "downright silly."
The Pirate Bay is blocked in dozens of countries around the world. In most cases, ISPs are ordered to take action after a relatively short court proceeding.
In the Netherlands, however, the process took more than a decade, and it’s still not completely over yet.
https://torrentfreak.com/dutch-isps-unblock-pirate-bay-proxies-because-they-can-200822/
#Europe #Netherlands #ISP #PirateBay #piracy
Torrentfreak
Dutch ISPs Unblock Pirate Bay Proxies, Because They Can * TorrentFreak
Dutch ISPs Ziggo and XS4ALL have unblocked dozens of Pirate Bay proxies and mirrors. While the companies must block the torrent site itself, the latest court order supersedes the injunction which covered the site's proxies. Anti-piracy group BREIN characterizes…
No-privacy policy Airtel India mobile network provider:
https://www.airtel.in/privacy-policy
Personal information collected and held by us may include but not limited to your name, father’s name, mother’s name, spouse’s name, date of birth, current and previous addresses, telephone number, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of address. airtel and its authorized third parties may collect, store, process following types of Sensitive Personal Information such as Genetic Data, Biometric Data, Racial or Ethnic Origin, Political opinion, Religious & Philosophical belief, Trade union membership, Data concerning Health, Data concerning natural personal's sex life or sexual orientation, password, financial information (details of Bank account, credit card, debit card, or other payment instrument details), physiological information for providing our products, services and for use of our website. We may also hold information related to your utilization of our services which may include your call details, your browsing history on our website, location details and additional information provided by you while using our services.
No-privacy policy Jio India mobile network provider:
https://www.jio.com/en-in/privacy-policy
#India #isp #network #provider #privacy #policy #airtel #jio #why
https://www.airtel.in/privacy-policy
Personal information collected and held by us may include but not limited to your name, father’s name, mother’s name, spouse’s name, date of birth, current and previous addresses, telephone number, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of address. airtel and its authorized third parties may collect, store, process following types of Sensitive Personal Information such as Genetic Data, Biometric Data, Racial or Ethnic Origin, Political opinion, Religious & Philosophical belief, Trade union membership, Data concerning Health, Data concerning natural personal's sex life or sexual orientation, password, financial information (details of Bank account, credit card, debit card, or other payment instrument details), physiological information for providing our products, services and for use of our website. We may also hold information related to your utilization of our services which may include your call details, your browsing history on our website, location details and additional information provided by you while using our services.
No-privacy policy Jio India mobile network provider:
https://www.jio.com/en-in/privacy-policy
#India #isp #network #provider #privacy #policy #airtel #jio #why
Jio
Reliance Jio - Privacy Policy
Jio general privacy policy
Forwarded from BlackBox (Security) Archiv
German government decides on intelligence surveillance like in Snowden times
The German Federal Intelligence Service is to hack into mobile phone and Internet providers and monitor the communications of all customers. The German government has passed a bill to this effect. A new body, not the Federal Data Protection Commissioner, is to be responsible for oversight.
The German government today decided to again massively expand the powers of the Federal Intelligence Service. The cabinet approved the bill to amend the BND law, which will then go to the Bundestag.
The grand coalition had passed the current BND law in 2017 in response to the revelations by Edward Snowden and the intelligence investigation committee. At the time, our conclusion was, "Everything the BND does will simply be legalized. And even expanded." In May, the Federal Constitutional Court ruled the law unconstitutional and overturned it. Now the federal government is making a new attempt, which is likely to end up in court again.
We published the first draft in September and the second draft in November. Experts criticized the drafts: think tanks, journalists, press freedom NGOs, Internet associations and the Federal Data Protection Commissioner. Despite the opportunity to comment, the government did not change much.
Hacking, mass surveillance, metadata
Because the current BND law is based on unconstitutional basic assumptions, the Chancellor's Office has almost completely rewritten the law. We had already reported on many of the details. In the future, the foreign intelligence service will be allowed to legally hack not only individuals and devices, but also servers and service providers, including entire mobile and Internet providers.
https://netzpolitik.org/2020/bnd-gesetz-bundesregierung-beschliesst-geheimdienst-ueberwachung-wie-zu-snowden-zeiten/
#mass #surveillance #germany #secretservice #goverment #privacy #hacking #metadata #mobilfunk #isp #thinkabout #netpolitics
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The German Federal Intelligence Service is to hack into mobile phone and Internet providers and monitor the communications of all customers. The German government has passed a bill to this effect. A new body, not the Federal Data Protection Commissioner, is to be responsible for oversight.
The German government today decided to again massively expand the powers of the Federal Intelligence Service. The cabinet approved the bill to amend the BND law, which will then go to the Bundestag.
The grand coalition had passed the current BND law in 2017 in response to the revelations by Edward Snowden and the intelligence investigation committee. At the time, our conclusion was, "Everything the BND does will simply be legalized. And even expanded." In May, the Federal Constitutional Court ruled the law unconstitutional and overturned it. Now the federal government is making a new attempt, which is likely to end up in court again.
We published the first draft in September and the second draft in November. Experts criticized the drafts: think tanks, journalists, press freedom NGOs, Internet associations and the Federal Data Protection Commissioner. Despite the opportunity to comment, the government did not change much.
Hacking, mass surveillance, metadata
Because the current BND law is based on unconstitutional basic assumptions, the Chancellor's Office has almost completely rewritten the law. We had already reported on many of the details. In the future, the foreign intelligence service will be allowed to legally hack not only individuals and devices, but also servers and service providers, including entire mobile and Internet providers.
https://netzpolitik.org/2020/bnd-gesetz-bundesregierung-beschliesst-geheimdienst-ueberwachung-wie-zu-snowden-zeiten/
#mass #surveillance #germany #secretservice #goverment #privacy #hacking #metadata #mobilfunk #isp #thinkabout #netpolitics
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
netzpolitik.org
BND-Gesetz: Bundesregierung beschließt Geheimdienst-Überwachung wie zu Snowden-Zeiten – netzpolitik.org
Der Bundesnachrichtendienst soll Mobilfunk- und Internetanbieter hacken und die Kommunikation aller Kunden überwachen. Die Bundesregierung hat einen entsprechenden Gesetzentwurf beschlossen. Der Geheimdienst wächst weiter und bekommt nächstes Jahr erstmals…
The EFF has launched a campaign to protect the Internet from ISP-level censorship.
International Coalition of Rights Groups Call on Internet Infrastructure Providers to Avoid Content Policing
Except in Rare Cases, Intervening to Block Sites or Remove Content Can Harm Users
Learn more: https://protectthestack.org
🔗 Press release
#isp #censorship #kiwifarms #zayo
International Coalition of Rights Groups Call on Internet Infrastructure Providers to Avoid Content Policing
Except in Rare Cases, Intervening to Block Sites or Remove Content Can Harm Users
Learn more: https://protectthestack.org
🔗 Press release
#isp #censorship #kiwifarms #zayo
Protect the Stack
Providers of internet infrastructure services are under pressure to play a greater role in policing online content and participation. This is a dangerous trend that must end now.
How ISPs block websites with DPI - Technical Dive (Deep Packet Inspection)
https://invidious.snopyta.org/watch?v=hkwenjoUgyg&local=true
This is a rough overview of how DPI works. It is important to realize that your ISP (Internet Service Provider) is your gateway to the internet, they have the ability to read all the packets that go through your internet connection. This may be illegal in some countries, maybe not.
Most applications now use secure, encrypted channels (Client to server, not necessarily end to end) - such as websites using HTTPS, which means the ISP cannot see the actual messages / information you exchange. But even with HTTPS, or a 3rd party #DNS, it is possible to know what websites you visit, in most cases.
This video covers how that information is "leaked" and how ISPs like Jio, Airtel, etc. are able to block #torrent and porn websites, even on HTTPS.
#DPI #Censorship #Wireshark #ISP
https://invidious.snopyta.org/watch?v=hkwenjoUgyg&local=true
This is a rough overview of how DPI works. It is important to realize that your ISP (Internet Service Provider) is your gateway to the internet, they have the ability to read all the packets that go through your internet connection. This may be illegal in some countries, maybe not.
Most applications now use secure, encrypted channels (Client to server, not necessarily end to end) - such as websites using HTTPS, which means the ISP cannot see the actual messages / information you exchange. But even with HTTPS, or a 3rd party #DNS, it is possible to know what websites you visit, in most cases.
This video covers how that information is "leaked" and how ISPs like Jio, Airtel, etc. are able to block #torrent and porn websites, even on HTTPS.
#DPI #Censorship #Wireshark #ISP