Why should you be using privacy tools in the digital age? (Part 2)
Secure and privacy-friendly browser
β΄οΈ Everyone needs to be using a secure and privacy-friendly browser for three important reasons:
βοΈBrowsers have a large attack surface and can be compromised in many ways.
βοΈBy default, most browser will contain lots of private information, including your browsing history, usernames, passwords, and autofill information, such as your name, address, etc.
βοΈBrowsers can reveal lots of identifying information about your location, system settings, hardware, and much more, which can be used to identify you through browser fingerprinting.
β΄οΈ Secure Browsers - Here are some great options:
β Firefox
Firefox is a great browser for both privacy and security. It is highly customizable to give you the level of security and privacy you desire, while also being compatible with many browser extensions. https://www.mozilla.org/en-US/firefox/
β Waterfox
Waterfox is a fork of Firefox, with telemetry and other items stripped out to give users more privacy. It is based on Firefox 56 with ESR patches. https://www.waterfoxproject.org/en-US/
β Brave
Brave is a chromium-based browser that is very privacy-focused right out of the box, unlike Firefox, which requires some customization. By default, it will block ads and trackers, and itβs also customizable, fast, and has built-in protection against browser fingerprinting. https://brave.com/
β Pale Moon
Like Waterfox, Pale Moon is also a fork of Firefox, but an older version (based on Firefox 38 ESR). https://www.palemoon.org/
β Tor browser
The Tor browser is hardened version of Firefox that also utilizes the Tor network by default (but this can be disabled). It should be noted that Tor was created by the US military and continues to be funded by the US government today. https://www.torproject.org/projects/torbrowser.html.en
There are a few other browsers that may be popular, but they are not good choices for privacy reasons. Google Chrome, for example, offers security, but it is extremely invasive and collects all kinds of private data, which Google uses for targeted ads. Similarly, Opera browser also has a troubling privacy policy, which explains their data collection and data sharing practices.
β΄οΈBrowser add-ons worth considering
As discussed in the Firefox privacy guide, here are a few good browser add-ons that may be worth considering:
β uBlock Origin β A powerful blocker for advertisements and tracking.
β HTTPS Everywhere β This forces an HTTPS connection with the sites you visit.
β Cookie AutoDelete β Deletes those unwanted tracking cookies.
β Privacy Badger β Another add-on from the Electronic Frontier Foundation, Privacy Badger blocks spying ads and trackers.
β uMatrix β While this may be overkill for many users, this powerful add-on gives you control over requests that may be tracking you on various websites.
β NoScript β This is a script blocker that allows you to control which scripts run on the sites you visit.
βοΈWorth mentioning: Donβt use a browser-based password manager, which will store your usernames and passwords in plaintext, thereby leaving them vulnerable to exploitation.
#privacy #tools #security #part2 #why #browsers
π‘ @cRyPtHoN_INFOSEC_DE
π‘ @cRyPtHoN_INFOSEC_EN
Secure and privacy-friendly browser
β΄οΈ Everyone needs to be using a secure and privacy-friendly browser for three important reasons:
βοΈBrowsers have a large attack surface and can be compromised in many ways.
βοΈBy default, most browser will contain lots of private information, including your browsing history, usernames, passwords, and autofill information, such as your name, address, etc.
βοΈBrowsers can reveal lots of identifying information about your location, system settings, hardware, and much more, which can be used to identify you through browser fingerprinting.
β΄οΈ Secure Browsers - Here are some great options:
β Firefox
Firefox is a great browser for both privacy and security. It is highly customizable to give you the level of security and privacy you desire, while also being compatible with many browser extensions. https://www.mozilla.org/en-US/firefox/
β Waterfox
Waterfox is a fork of Firefox, with telemetry and other items stripped out to give users more privacy. It is based on Firefox 56 with ESR patches. https://www.waterfoxproject.org/en-US/
β Brave
Brave is a chromium-based browser that is very privacy-focused right out of the box, unlike Firefox, which requires some customization. By default, it will block ads and trackers, and itβs also customizable, fast, and has built-in protection against browser fingerprinting. https://brave.com/
β Pale Moon
Like Waterfox, Pale Moon is also a fork of Firefox, but an older version (based on Firefox 38 ESR). https://www.palemoon.org/
β Tor browser
The Tor browser is hardened version of Firefox that also utilizes the Tor network by default (but this can be disabled). It should be noted that Tor was created by the US military and continues to be funded by the US government today. https://www.torproject.org/projects/torbrowser.html.en
There are a few other browsers that may be popular, but they are not good choices for privacy reasons. Google Chrome, for example, offers security, but it is extremely invasive and collects all kinds of private data, which Google uses for targeted ads. Similarly, Opera browser also has a troubling privacy policy, which explains their data collection and data sharing practices.
β΄οΈBrowser add-ons worth considering
As discussed in the Firefox privacy guide, here are a few good browser add-ons that may be worth considering:
β uBlock Origin β A powerful blocker for advertisements and tracking.
β HTTPS Everywhere β This forces an HTTPS connection with the sites you visit.
β Cookie AutoDelete β Deletes those unwanted tracking cookies.
β Privacy Badger β Another add-on from the Electronic Frontier Foundation, Privacy Badger blocks spying ads and trackers.
β uMatrix β While this may be overkill for many users, this powerful add-on gives you control over requests that may be tracking you on various websites.
β NoScript β This is a script blocker that allows you to control which scripts run on the sites you visit.
βοΈWorth mentioning: Donβt use a browser-based password manager, which will store your usernames and passwords in plaintext, thereby leaving them vulnerable to exploitation.
Source:
https://restoreprivacy.com/privacy-tools/#privacy #tools #security #part2 #why #browsers
π‘ @cRyPtHoN_INFOSEC_DE
π‘ @cRyPtHoN_INFOSEC_EN
The Facebook Dilemma
The promise of Facebook was to create a more open and connected world. But from the companyβs failure to protect millions of usersβ data, to the proliferation of βfake newsβ and disinformation, mounting crises have raised the question:
Is Facebook more harmful than helpful? This major, two-night event investigates a series of warnings to Facebook as the company grew from Mark Zuckerbergβs Harvard dorm room to a global empire. With dozens of original interviews and rare footage, The Facebook Dilemma examines the powerful social media platformβs impact on privacy and democracy in the U.S. and around the world.
π¬π§ πΊ The Facebook Dilemma (Part
https://t.me/BlackBox_Archiv/116
π¬π§ πΊ The Facebook Dilemma (Part
https://t.me/BlackBox_Archiv/117
πΊ https://www.pbs.org/wgbh/frontline/film/facebook-dilemma/
#DeleteFacebook #Frontline #Part1 #Part2 #Podcast #Video
π‘ @cRyPtHoN_INFOSEC_DE
π‘ @cRyPtHoN_INFOSEC_EN
The promise of Facebook was to create a more open and connected world. But from the companyβs failure to protect millions of usersβ data, to the proliferation of βfake newsβ and disinformation, mounting crises have raised the question:
Is Facebook more harmful than helpful? This major, two-night event investigates a series of warnings to Facebook as the company grew from Mark Zuckerbergβs Harvard dorm room to a global empire. With dozens of original interviews and rare footage, The Facebook Dilemma examines the powerful social media platformβs impact on privacy and democracy in the U.S. and around the world.
π¬π§ πΊ The Facebook Dilemma (Part
1
)https://t.me/BlackBox_Archiv/116
π¬π§ πΊ The Facebook Dilemma (Part
2
)https://t.me/BlackBox_Archiv/117
πΊ https://www.pbs.org/wgbh/frontline/film/facebook-dilemma/
Credits:
https://www.pbs.org/wgbh/frontline/film/facebook-dilemma/credits/#DeleteFacebook #Frontline #Part1 #Part2 #Podcast #Video
π‘ @cRyPtHoN_INFOSEC_DE
π‘ @cRyPtHoN_INFOSEC_EN
LineageOS - Take back control! Part2
1. release from the embrace
With the article series "Take back control!" you as a user should regain control over your Android device or your data step by step. A first step towards independence is the change of the manufacturer's own Android system. This will not only get rid of the manufacturer's bloatware, like pre-installed apps and services, but will also free us from Google's close embrace.
We manage this liberation with the free Android operating system LineageOS - a modification of Google's Android and the direct successor of the successful CyanogenMod. With such a custom ROM or alternative system we disconnect ourselves from the manufacturer's own Android systems. The use of LineageOS should bring us one step closer to our goal of regaining data dominance on the Android.
Read the full article (part1) in english:
https://t.me/BlackBox_Archiv/156
Read the full article (part2) in english:
https://t.me/BlackBox_Archiv/273
Source and more infos / read in german:
https://www.kuketz-blog.de/android-ohne-google-take-back-control-teil1/
https://www.kuketz-blog.de/lineageos-take-back-control-teil2/
#android #NoGoogle #LineageOS #guide #part1 #part2 #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
1. release from the embrace
With the article series "Take back control!" you as a user should regain control over your Android device or your data step by step. A first step towards independence is the change of the manufacturer's own Android system. This will not only get rid of the manufacturer's bloatware, like pre-installed apps and services, but will also free us from Google's close embrace.
We manage this liberation with the free Android operating system LineageOS - a modification of Google's Android and the direct successor of the successful CyanogenMod. With such a custom ROM or alternative system we disconnect ourselves from the manufacturer's own Android systems. The use of LineageOS should bring us one step closer to our goal of regaining data dominance on the Android.
Read the full article (part1) in english:
https://t.me/BlackBox_Archiv/156
Read the full article (part2) in english:
https://t.me/BlackBox_Archiv/273
Source and more infos / read in german:
https://www.kuketz-blog.de/android-ohne-google-take-back-control-teil1/
https://www.kuketz-blog.de/lineageos-take-back-control-teil2/
#android #NoGoogle #LineageOS #guide #part1 #part2 #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
AFWall+: Digital Door Controller - Take back control! (Part 4)
1. firewall
In the last part of the article series "Take back control! we got root rights on our Android system with the help of Magisk. This step was necessary because apps like AFWall+ and AdAway require root rights. https://www.kuketz-blog.de/magisk-bei-der-macht-von-root-take-back-control-teil3/
At this point, we should remember that switching to an alternative operating system like LineageOS does not necessarily protect us from the unwanted outflow of sensitive data. Rather, further adjustments are needed so that we can use the Android smartphone "self-determined". An important component of our defense strategy is the use of a firewall to control the Android's data traffic. Originally, firewalls were primarily intended to protect us from "dangers" from outside. However, this primary purpose of firewalls has changed more and more. Firewalls on client systems now increasingly serve to monitor and control outgoing data connections.
Various firewall solutions exist for Android - but only two are worth mentioning: NetGuard and AFWall+. In this article I present the installation and configuration of AFWall+.
2nd AFWall+
AFWall+ is a front-end for the firewall iptables known from the GNU/Linux world. It enables control over which app or system service should have access to the data network via 2G/3G/LTE/5G, roaming, WiFi or VPN. In my opinion it is an essential part of any rooted Android device to control the unwanted outflow of information.
AFWall+ is relatively easy to use in its basic functionality, as long as you have understood the concept of a firewall. It becomes complicated only with special use cases, which are represented by CustomScripts. If you are looking for a user-friendly alternative to AFWall+ or if you cannot / do not want to root your device, you should take a look at NetGuard.
https://www.kuketz-blog.de/afwall-digitaler-tuervorsteher-take-back-control-teil4/
Read the full guides in english:
(Part1: https://t.me/BlackBox_Archiv/156)
(Part2: https://t.me/BlackBox_Archiv/273)
(Part3: https://t.me/BlackBox_Archiv/322)
#android #NoGoogle #guide #part1 #part2 #part4 #AFWall #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
1. firewall
In the last part of the article series "Take back control! we got root rights on our Android system with the help of Magisk. This step was necessary because apps like AFWall+ and AdAway require root rights. https://www.kuketz-blog.de/magisk-bei-der-macht-von-root-take-back-control-teil3/
At this point, we should remember that switching to an alternative operating system like LineageOS does not necessarily protect us from the unwanted outflow of sensitive data. Rather, further adjustments are needed so that we can use the Android smartphone "self-determined". An important component of our defense strategy is the use of a firewall to control the Android's data traffic. Originally, firewalls were primarily intended to protect us from "dangers" from outside. However, this primary purpose of firewalls has changed more and more. Firewalls on client systems now increasingly serve to monitor and control outgoing data connections.
Various firewall solutions exist for Android - but only two are worth mentioning: NetGuard and AFWall+. In this article I present the installation and configuration of AFWall+.
2nd AFWall+
AFWall+ is a front-end for the firewall iptables known from the GNU/Linux world. It enables control over which app or system service should have access to the data network via 2G/3G/LTE/5G, roaming, WiFi or VPN. In my opinion it is an essential part of any rooted Android device to control the unwanted outflow of information.
AFWall+ is relatively easy to use in its basic functionality, as long as you have understood the concept of a firewall. It becomes complicated only with special use cases, which are represented by CustomScripts. If you are looking for a user-friendly alternative to AFWall+ or if you cannot / do not want to root your device, you should take a look at NetGuard.
Source and more infos / read in german
https://www.kuketz-blog.de/afwall-digitaler-tuervorsteher-take-back-control-teil4/
Read the full guides in english:
(Part1: https://t.me/BlackBox_Archiv/156)
(Part2: https://t.me/BlackBox_Archiv/273)
(Part3: https://t.me/BlackBox_Archiv/322)
#android #NoGoogle #guide #part1 #part2 #part4 #AFWall #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
F-Droid: Free and Open Source Apps - Take back control! (Part 5)
1. app store with class
By installing LineageOS, we have abandoned our proprietary Android systems and taken control of outbound data traffic with AFWall+. But our journey is far from over, because to get rid of Google and to regain control we have to break away from the Google Play Store.
Most apps from the Google Play Store contain an above-average number of tracker and advertising modules. In the foreseeable future, this business model will probably not change because Android is a self-service data store with which (questionable) developers make a lot of money. Indirectly, Google also earns a lot of money - so Android users can wait in vain for an improvement.
In this article I would like to introduce you to the alternatives App-Store F-Droid. F-Droid is a consumer-friendly alternative to Google's Play Store, which only offers "free" and "open source" apps for download. The two properties "free" and "open source" mean basically nothing else than that the app source code can be viewed, used, changed and further developed by anyone. With its strict "Free Open Source Software (FOSS)" concept, F-Droid clearly sets itself apart from the Google Play Store and other comparable stores.
Source (german) and more info:
https://www.kuketz-blog.de/f-droid-freie-und-quelloffene-apps-take-back-control-teil5/
Translation (english):
https://t.me/BlackBox_Archiv/357
#android #NoGoogle #guide #part1 #part2 #part4 #part5 #fdroid #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
1. app store with class
By installing LineageOS, we have abandoned our proprietary Android systems and taken control of outbound data traffic with AFWall+. But our journey is far from over, because to get rid of Google and to regain control we have to break away from the Google Play Store.
Most apps from the Google Play Store contain an above-average number of tracker and advertising modules. In the foreseeable future, this business model will probably not change because Android is a self-service data store with which (questionable) developers make a lot of money. Indirectly, Google also earns a lot of money - so Android users can wait in vain for an improvement.
In this article I would like to introduce you to the alternatives App-Store F-Droid. F-Droid is a consumer-friendly alternative to Google's Play Store, which only offers "free" and "open source" apps for download. The two properties "free" and "open source" mean basically nothing else than that the app source code can be viewed, used, changed and further developed by anyone. With its strict "Free Open Source Software (FOSS)" concept, F-Droid clearly sets itself apart from the Google Play Store and other comparable stores.
Source (german) and more info:
https://www.kuketz-blog.de/f-droid-freie-und-quelloffene-apps-take-back-control-teil5/
Translation (english):
https://t.me/BlackBox_Archiv/357
#android #NoGoogle #guide #part1 #part2 #part4 #part5 #fdroid #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
AdAway: Advertising and tracking blocker - Take back control! (Part 6)
1. data collection frenzy
In the last part of the article series I introduced you to the F-Droid Store, where you can get free and open source apps that don't track you or display advertisements. A general recommendation of the article series "Take back control! is therefore:
π‘Get apps only from the F-Droid Store.
However, this advice cannot always be put into practice 1:1. Many users are still dependent on apps from the Play Store or cannot find a viable alternative in the F-Droid Store. Unfortunately, apps from the Google Play Store are not exactly known for their data economy - but rather the opposite. Most apps from the Google Play Store contain third-party software components that display advertisements to the user or track his activity every step of the way. As a normal user, however, you don't have any insight into the app or can't "see" from the outside whether this poses a risk to security and privacy.
Since the apps from the Play Store are often accompanied by a "loss of control", I will introduce you to the AdAway app from the F-Droid Store in this article. With this app, the loss of control can be minimized by putting a stop to the delivery of (harmful) advertising and the outflow of personal data to dubious third-party providers.
2nd AdAway
AdAway is an open source advertising and tracking blocker for Android, which was originally developed by Dominik SchΓΌrmann - currently AdAway is developed by Bruce Bujon. Based on filter lists, connections to advertising and tracking networks are redirected to the local device IP address. This redirection prevents the reloading of advertisements or the transmission of (sensitive) data to third parties.
By the way, AdAway cannot be found in the Play Store because Google no longer allows ad blockers - they simply violate Google's business model. Or to put it another way: Google will not tolerate an app that effectively protects your privacy and security by preventing the reloading of (harmful) advertisements and the outflow of personal data.
Source (π©πͺ) and more info:
https://www.kuketz-blog.de/adaway-werbe-und-trackingblocker-take-back-control-teil6/
Read english translation on TG:
https://t.me/BlackBox_Archiv/376
π‘ @NoGoolag π‘ @BlackBox
#android #NoGoogle #guide #part1 #part2 #part4 #part5 #part6 #AdAway #kuketz
1. data collection frenzy
In the last part of the article series I introduced you to the F-Droid Store, where you can get free and open source apps that don't track you or display advertisements. A general recommendation of the article series "Take back control! is therefore:
π‘Get apps only from the F-Droid Store.
However, this advice cannot always be put into practice 1:1. Many users are still dependent on apps from the Play Store or cannot find a viable alternative in the F-Droid Store. Unfortunately, apps from the Google Play Store are not exactly known for their data economy - but rather the opposite. Most apps from the Google Play Store contain third-party software components that display advertisements to the user or track his activity every step of the way. As a normal user, however, you don't have any insight into the app or can't "see" from the outside whether this poses a risk to security and privacy.
Since the apps from the Play Store are often accompanied by a "loss of control", I will introduce you to the AdAway app from the F-Droid Store in this article. With this app, the loss of control can be minimized by putting a stop to the delivery of (harmful) advertising and the outflow of personal data to dubious third-party providers.
2nd AdAway
AdAway is an open source advertising and tracking blocker for Android, which was originally developed by Dominik SchΓΌrmann - currently AdAway is developed by Bruce Bujon. Based on filter lists, connections to advertising and tracking networks are redirected to the local device IP address. This redirection prevents the reloading of advertisements or the transmission of (sensitive) data to third parties.
By the way, AdAway cannot be found in the Play Store because Google no longer allows ad blockers - they simply violate Google's business model. Or to put it another way: Google will not tolerate an app that effectively protects your privacy and security by preventing the reloading of (harmful) advertisements and the outflow of personal data.
Source (π©πͺ) and more info:
https://www.kuketz-blog.de/adaway-werbe-und-trackingblocker-take-back-control-teil6/
Read english translation on TG:
https://t.me/BlackBox_Archiv/376
π‘ @NoGoolag π‘ @BlackBox
#android #NoGoogle #guide #part1 #part2 #part4 #part5 #part6 #AdAway #kuketz
GnuPG Key Generation and Smartcard Transfer - Nitrokey (Part 1 and 2)
1. key material
Depending on the version, a Nitrokey supports different application scenarios. In this article of the article series "Nitrokey" I describe the commissioning of a Nitrokey under GNU/Linux and the following GnuPG key generation. An (RSA) key pair is a basic requirement for the two application scenarios OpenPGP/GnuPG e-mail encryption and OpenSSH public key authentication.
The procedure described for creating a (RSA) key pair and then transferring it to the smart card of the Nitrokey should also be transferable to other security tokens such as the YubiKey.
Full English translation Nitrokey (part 1):
https://t.me/BlackBox_Archiv/404
Full English translation Nitrokey (part 2):
https://t.me/BlackBox_Archiv/415
Source and more info (German):
Part 1:
https://www.kuketz-blog.de/zwei-schluessel-fuer-alle-faelle-nitrokey-teil1/
Source and more info (German):
Part 2:
https://www.kuketz-blog.de/gnupg-schluesselerstellung-und-smartcard-transfer-nitrokey-teil2/
#Nitrokey #SecurityKeys #usb #guide #kuketz #part1 #part2
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
1. key material
Depending on the version, a Nitrokey supports different application scenarios. In this article of the article series "Nitrokey" I describe the commissioning of a Nitrokey under GNU/Linux and the following GnuPG key generation. An (RSA) key pair is a basic requirement for the two application scenarios OpenPGP/GnuPG e-mail encryption and OpenSSH public key authentication.
The procedure described for creating a (RSA) key pair and then transferring it to the smart card of the Nitrokey should also be transferable to other security tokens such as the YubiKey.
Full English translation Nitrokey (part 1):
https://t.me/BlackBox_Archiv/404
Full English translation Nitrokey (part 2):
https://t.me/BlackBox_Archiv/415
Source and more info (German):
Part 1:
https://www.kuketz-blog.de/zwei-schluessel-fuer-alle-faelle-nitrokey-teil1/
Source and more info (German):
Part 2:
https://www.kuketz-blog.de/gnupg-schluesselerstellung-und-smartcard-transfer-nitrokey-teil2/
#Nitrokey #SecurityKeys #usb #guide #kuketz #part1 #part2
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Telegram
BlackBox (Security) Archiv
Two keys for all eventualities - Nitrokey (Part1)
1. increased safety requirements
The protection of digital identity is more important today than ever. Stolen online accounts can cause considerable damage if they are stolen and left in the wrong hands.β¦
1. increased safety requirements
The protection of digital identity is more important today than ever. Stolen online accounts can cause considerable damage if they are stolen and left in the wrong hands.β¦
Forwarded from BlackBox (Security) Archiv
Shelter: Isolate Big Brother apps - Take back control! (Part 7)
1. Big Data
The collection, processing and analysis of as much information as possible is Big Dataβs core business. In this non-transparent data processing, which is determined by algorithms, personal rights are hardly taken into consideration. This dilemma becomes particularly clear in the Android world: Apps access personal data uninhibitedly and send it unsolicited to the most diverse protagonists. This is exactly what the article series βTake back control!β wants to protect against.
Another piece of the puzzle to achieve this goal is the App Shelter, which locks selected Android apps in a sandbox, depriving them of access to phone books, calendars, images and other data. Curious apps can thus be denied access to sensitive user data.
π‘ This article is part of a series of articles:
β Android without Google: Take back control! Part 1
β LineageOS - Take back control! Part2
β Magisk: By the power of Root - Take back control! Part 3 (not yet translated)
β AFWall+: Digital Door Controller - Take back control! Part 4
β F-Droid: Free and Open Source Apps - Take back control! Part 5
β AdAway: Advertising and tracking blocker - Take back control! Part 6
β Shelter: Isolate Big Brother apps - Take back control! Part 7
2. Shelter
Shelter is an open source app for Android that can be downloaded from the App-Store F-Droid. Alternatively the app can be downloaded via GitHub or the Google Play Store.
To separate apps, Shelter uses the Android work profiles that Google introduced as early as 2015 to separate private data from business content or apps. The work profile is a specially isolated area in which, for example, data-hungry apps can be stored. In addition to the normal environment in which all apps are normally located, Shelter creates another workspace that is logically separated from the other workspace. From this bunker (Shelter) apps can not access data which are in the normal environment - but all data of apps which are also stored or locked in the Shelter.
ππΌ Read the fully translated guide:
https://rwtxt.lelux.fi/blackbox/shelter-isolate-big-brother-apps-take-back-control-part-7
ππΌ Source π©πͺ:
https://www.kuketz-blog.de/shelter-big-brother-apps-isolieren-take-back-control-teil7/
#android #NoGoogle #guide #part1 #part2 #part4 #part5 #part6 #part7 #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
1. Big Data
The collection, processing and analysis of as much information as possible is Big Dataβs core business. In this non-transparent data processing, which is determined by algorithms, personal rights are hardly taken into consideration. This dilemma becomes particularly clear in the Android world: Apps access personal data uninhibitedly and send it unsolicited to the most diverse protagonists. This is exactly what the article series βTake back control!β wants to protect against.
Another piece of the puzzle to achieve this goal is the App Shelter, which locks selected Android apps in a sandbox, depriving them of access to phone books, calendars, images and other data. Curious apps can thus be denied access to sensitive user data.
π‘ This article is part of a series of articles:
β Android without Google: Take back control! Part 1
β LineageOS - Take back control! Part2
β Magisk: By the power of Root - Take back control! Part 3 (not yet translated)
β AFWall+: Digital Door Controller - Take back control! Part 4
β F-Droid: Free and Open Source Apps - Take back control! Part 5
β AdAway: Advertising and tracking blocker - Take back control! Part 6
β Shelter: Isolate Big Brother apps - Take back control! Part 7
2. Shelter
Shelter is an open source app for Android that can be downloaded from the App-Store F-Droid. Alternatively the app can be downloaded via GitHub or the Google Play Store.
To separate apps, Shelter uses the Android work profiles that Google introduced as early as 2015 to separate private data from business content or apps. The work profile is a specially isolated area in which, for example, data-hungry apps can be stored. In addition to the normal environment in which all apps are normally located, Shelter creates another workspace that is logically separated from the other workspace. From this bunker (Shelter) apps can not access data which are in the normal environment - but all data of apps which are also stored or locked in the Shelter.
ππΌ Read the fully translated guide:
https://rwtxt.lelux.fi/blackbox/shelter-isolate-big-brother-apps-take-back-control-part-7
ππΌ Source π©πͺ:
https://www.kuketz-blog.de/shelter-big-brother-apps-isolieren-take-back-control-teil7/
#android #NoGoogle #guide #part1 #part2 #part4 #part5 #part6 #part7 #kuketz
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_ES
Forwarded from BlackBox (Security) Archiv
Web Security and Web Hacking for Beginners
Welcome to the course on βWeb Security and Web Hacking for Beginnersβ. This course is designed for beginners who wants to start their journey in web security and web hacking.
ππΌ Part 1 (Introduction - 4 videos)
ππΌ Part 2 (Deeper understanding of Web Security - 2 videos)
ππΌ Part 3 (Various attacks on Web Security - 9 videos)
ππΌ Part 4 (Conclusion - 1 video)
π‘Each video comes with additional (English) subtitles
This course is basically designed by taking into account that you donβt have idea about web security and you want to learn basic concept and then directly jump into action. Concepts like URL, HTTP, HTTPs etc. are explained to make student comfortable with the concept that we are going to use and then jump directly to action content like SQL injection, XSS, DDoS, etc. We want to make sure that you learn basics at the same time you donβt miss action while learning basics.
#video #tutorial #web #security #hacking #beginners #part1#part2 #part3 #part4
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Welcome to the course on βWeb Security and Web Hacking for Beginnersβ. This course is designed for beginners who wants to start their journey in web security and web hacking.
ππΌ Part 1 (Introduction - 4 videos)
ππΌ Part 2 (Deeper understanding of Web Security - 2 videos)
ππΌ Part 3 (Various attacks on Web Security - 9 videos)
ππΌ Part 4 (Conclusion - 1 video)
π‘Each video comes with additional (English) subtitles
This course is basically designed by taking into account that you donβt have idea about web security and you want to learn basic concept and then directly jump into action. Concepts like URL, HTTP, HTTPs etc. are explained to make student comfortable with the concept that we are going to use and then jump directly to action content like SQL injection, XSS, DDoS, etc. We want to make sure that you learn basics at the same time you donβt miss action while learning basics.
#video #tutorial #web #security #hacking #beginners #part1#part2 #part3 #part4
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Media is too big
VIEW IN TELEGRAM
False Flags: A Secret History Of Al Qaeda β Watch Along And Q&A Part 2
Joining me today is James Corbett, founder of The Corbett Report, and Broc West, video editor for both TLAV and The Corbett Report, for a very special three part watch-along culminating with the live (pirate streamed) world premiere of The Corbett Report's third part in the series titled: False Flags: A Secret History of Al Qaeda. We will be pirate-streaming the first two parts of this series, while also having a discussion and Q&A, with the final debut airing on September 11th, 2022 at 7pm CDT, here on The Last American Vagabond.
Source Links Can Be Found Here:
https://www.thelastamericanvagabond.com/secret-history-alqaeda-series/
https://www.corbettreport.com/alqaeda/#part2
https://odysee.com/@TLAVagabond:5/secret-history-alqaeda-2:6
https://www.corbettreport.com/911suspects/
https://www.corbettreport.com/911whistleblowers/
https://www.corbettreport.com/911wargames/
@TLAVagabond
#911 #falseflag #alqaeda #cia
Joining me today is James Corbett, founder of The Corbett Report, and Broc West, video editor for both TLAV and The Corbett Report, for a very special three part watch-along culminating with the live (pirate streamed) world premiere of The Corbett Report's third part in the series titled: False Flags: A Secret History of Al Qaeda. We will be pirate-streaming the first two parts of this series, while also having a discussion and Q&A, with the final debut airing on September 11th, 2022 at 7pm CDT, here on The Last American Vagabond.
Source Links Can Be Found Here:
https://www.thelastamericanvagabond.com/secret-history-alqaeda-series/
https://www.corbettreport.com/alqaeda/#part2
https://odysee.com/@TLAVagabond:5/secret-history-alqaeda-2:6
https://www.corbettreport.com/911suspects/
https://www.corbettreport.com/911whistleblowers/
https://www.corbettreport.com/911wargames/
@TLAVagabond
#911 #falseflag #alqaeda #cia