NoGoolag
4.54K subscribers
13.2K photos
6.89K videos
587 files
14.1K links
Download Telegram
CIA warning over Huawei
Telecoms giant accused of being funded by Chinese state security

A Chinese telecoms giant that wants to supply vital technology for Britain’s new 5G mobile network has received funding from branches of Beijing’s state security apparatus, the CIA has told spy chiefs.

American intelligence shown to Britain says that Huawei has taken money from the People’s Liberation Army, China’s National Security Commission and a third branch of the Chinese state intelligence network, according to a UK source.

The US shared the claims with Britain and its other partners in the Five Eyes intelligence alliance — Australia, New Zealand and Canada — earlier this year, with the UK entering the final stages of a wider review into its next generation mobile network rollout.

The funding allegation is the most serious claim linking the world’s largest telecoms equipment manufacturer to the Chinese state. Huawei insists that it is a private company that is independent of influence from the government and has repeatedly denied posing any security risks. Critics, however, warn that China’s laws oblige companies to co-operate with its security branches, and that “backdoors” could be built into software allowing it to spy on or disrupt British communications.

https://www.thetimes.co.uk/edition/news/cia-warning-over-huawei-rz6xc8kzk

https://www.forbes.com/sites/zakdoffman/2019/04/20/cia-offers-proof-huawei-has-been-funded-by-chinas-military-and-intelligence/

#Huawei #Spy #Warning #CIA #USA #China
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Kasper-Spy: Kaspersky Anti-Virus puts users at risk

Kaspersky promises security and data protection. However, a data leak allowed third parties to
spy on users while they were surfing the web. For years.

A strange discovery on my office computer led me to unearth an astonishing data leak caused by Kaspersky's antivirus software. Originally, I had installed the software in order to experience the promised added value during everyday use. We, journalists at c't magazine, regularly test antivirus software, and this was part of a test for our c't issue 3/2019.

The following weeks and months seemed to offer little excitement – the Kaspersky software worked essentially as well or as badly as Windows Defender. One day, however, I made a strange discovery. I looked at the HTML source code of an arbitrary website and came across the following line of code:

<script type="text/javascript" src="https://gc.kis.v2.scr.kaspersky-labs.com/9344FDA7-AFDF-4BA0-A915-4D7EEB9A6615/main.js" charset="UTF-8"></script>

Obviously, an external JavaScript script named main.js was being loaded from a Kaspersky domain. This is not uncommon, since a website nowadays hardly works without external JavaScript resources. However, when I checked the HTML source of other websites displayed in my browser, I found the strange code on each and every page. Without exception, even on the website of my bank, a script from Kaspersky was introduced. So I had an inkling that the Kaspersky software might have something to do with it.

To investigate, I experimented with webbrowsers Firefox, Edge, and Opera. Again, the same line of code popped up everywhere. Since I had no suspicious browser extensions installed which could be responsible, the simple conclusion was that Kaspersky's virus protection was manipulating my traffic. Without my permission, it was injecting that code. Before that day, I had observed such behaviour only from online banking Trojans. That is malware built to manipulate bank websites, for example to secretly change the recipient of a money transfer. But what the heck was Kaspersky doing there?

My first examination of Kaspersky's script main.js showed me that, among other things, it displays green icons with Google search results if Kaspersky believes the relevant link to lead to a clean website. This could have been the end of my analysis, but there was this one small detail: The address from which the Kaspersky script was loaded contained a suspicious string:

https://gc.kis.v2.scr.kaspersky-labs.com/9344FDA7-AFDF-4BA0-A915-4D7EEB9A6615/main.js

The part marked bold has a characteristic pattern. The structure matches a so-called Universally Unique Identifier (UUID). These IDs are used to make things, well, uniquely identifiable. But who or what can be identified using the Kaspersky ID?

I expanded my experiment and installed the Kaspersky software on other computers. Kaspersky also injected JavaScript on those other systems. However, I discovered a crucial difference: The UUID in the source address was different on each system. The IDs were persistent and did not change, even several days later. So it was clear that each computer had it's own permanently assigned ID.

👉🏼 Read more:
https://www.heise.de/ct/artikel/Kasper-Spy-Kaspersky-Anti-Virus-puts-users-at-risk-4496138.html

#Kaspersky #AntiVirus #software #Spy #DataLeak
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Hong Kong protests: China trying to manipulate politics with covert intelligence operation, says whistleblower

Beijing seeks to turn an 'originally democratic and free land into autocratic land', fears defector

A man claiming to be a disillusioned Chinese intelligence operative has told Australian authorities that China’s military intelligence agencies were directly intervening in politics in Hong Kong and Taiwan, buying media coverage, infiltrating universities, funnelling donations to favoured candidates and creating thousands of social media accounts to attack Taiwan’s governing party.

So far, some Western diplomatic officials believe the claims by an asylum-seeker named Wang Liqiang to be reliable at least in part, according to two people briefed on the matter. While some of his details appeared speculative and impossible to verify, the officials were taking his claims seriously, the people said.

If verified, his account would be one of the most detailed ever made public of China’s covert measures to manipulate politics and public opinion in Hong Kong and Taiwan.

Mr Wang’s account, a 17-page plea for political asylum in Australia, reads in parts like an espionage thriller. He detailed code names of covert operations, shadowy business ventures and ultimately his dawning disenchantment with what he described as China’s efforts to stifle democracy and human rights around the world.

“I do not want to see Taiwan becoming a second Hong Kong,” he wrote. “And I would not become an accomplice in the conspiracy of turning an originally democratic and free land into autocratic land.”

Read more:
https://www.independent.co.uk/news/world/asia/hong-kong-protests-china-taiwan-whistleblower-intelligence-australia-a9214671.html

#HongKong #FreeHongKong #Beijing #China #Australia #whistleblower #spy #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
CCC analyses Munich's state trojan FinSpy

The technical #analysis of copies of the #FinSpy #malware substantiates the reasons for the criminal complaint against the Munich manufacturer of the #StateTrojan. The #CCC publishes its report as well as several variants of FinSpy and a complete documentation of the analysis.

#Security researchers of the Chaos Computer Club (CCC) have analyzed a total of 28 copies of the #spy-#software FinSpy for #Android from 2012 to 2019. The main focus of the investigation was the origin of the malware and the date of its production. The reason for the investigation is the criminal complaint of the Gesellschaft für Freiheitsrechte (GFF) and other organizations against the German group of companies #FinFisher because of the deliberate violation of licensing requirements for dual-use software according to § 18 para. 2 No. 1 and § 18 para. 5 No. 1 Foreign Trade Act (AWG).

The CCC today publishes its comprehensive report: Evolution of a private sector malware for governmental players

💡 The result of the analysis is that a copy of malware, which according to the GFF was used against the Turkish opposition movement in 2016, was clearly created after the EU export control regulations for surveillance software came into force.

💡 By comparing it with over twenty other copies from a seven-year period, the CCC shows continuity in the further development into which this copy fits. This is seen as a strong indication that it is a variant of the state Trojan "FinSpy". FinSpy is a product of the FinFisher group of companies, which has branches in Munich and elsewhere.

💡 In its report, the CCC also documents references to German-speaking developers that can be found in the source code.

"Our analysis shows that surveillance software originally from Germany was apparently used against democratic dissidents," said Linus Neumann, one of the authors of the analysis. "How this could have come about, the public prosecutor's office and the customs criminal office must now clarify."

https://github.com/linuzifer/FinSpy-Dokumentation

https://github.com/devio/FinSpy-Tools

👉🏼 Read more:
https://www.ccc.de/de/updates/2019/finspy

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
The Crypto AG Scandal And The Question Of Swiss Neutrality

On the 11 February 2020, the Washington Post published an extensive article revealing the #CryptoAG Scandal. The article damningly exposes the way in which the #Swiss #encryption company Crypto AG was co-opted by the #CIA for decades. The #spy #agency coerced the company’s founder into working for them in the 1950s, and later bought out Crypto AG in a secret partnership with the German spy agency the #BND. Throughout this time, faulty encryption machines were sold to governments around the world to improve American #espionage capabilities. This “audacious” project lasted well into the 21st century, presumably until the company’s liquidation in 2018. According to the Washington Post article, “CIA and BND documents indicate that Swiss officials must have known for decades about Crypto’s ties to the U.S. and German spy services, but intervened only after learning that news organizations were about to expose the arrangement.” It is this revelation which has led various news agencies (including the BBC) to declare that Swiss neutrality has been “shattered”.

The Swiss have long cultivated a policy of neutrality. This concept is ubiquitous in popular culture, from the end of The Sound of Music, to the English phrase “being Switzerland” which is synonymous with neutrality. What impact, (if any), will the implications of Swiss partiality toward the U.S. in the scandal have upon their aura of neutrality?

👉🏼 Read more:
https://theowp.org/the-crypto-ag-scandal-and-the-question-of-swiss-neutrality/

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Xiaomi Devices Found Tracking And Recording Browsing Data Of Millions

The tracking extends to browser's Incognito mode as well !!

Xiaomi has been tracking and recording an insane amount of private data, from user’s phone habits to queries in the Xiaomi’s default browsers.

According to a cybersecurity researcher, Cirlig, Xiaomi records all the search queries and items viewed on its default browser (Mi Browser Pro) as well as on the Mint browser. The tracking extends to Incognito mode as well.

The researcher was able to confirm the same pattern on other Xiaomi phones, including Mi 10, Redmi K20, and Mi MIX 3.

Xiaomi, in response, confirmed that it collects browsing data. However, the company says the data sent is anonymized, and users have consented to the data tracking. Meanwhile, it denied claims of information being monitored in Incognito mode.

The researcher, however, was able to prove that Xiaomi is recording Incognito mode data as well. In a video, he showcases how the information of him visiting a porn website in incognito mode is being sent to the servers.

👉🏼 Read more:
https://fossbytes.com/xiaomi-devices-found-tracking-and-recording-browsing-data-of-millions/

#PoC #Xiaomi #spy #logging #browser #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Secret Service: Norway plans surveillance of Internet traffic

The Norwegian government is pushing for a new surveillance law despite the pandemic. The secret service is to be allowed to store metadata from telephone and internet use for 18 months.

While the European public is preoccupied with the corona virus, the Norwegian government has sent a proposal for mass surveillance of telecommunications to parliament without much fuss. The new law would allow the Norwegian Foreign Intelligence Service to eavesdrop on any communication with foreign countries and to store metadata for up to 18 months.

Norwegian providers will be legally obliged to have the secret service mirror all cross-border data transfers. The secret service may, with the consent of a court, evaluate the data according to defined search criteria, so-called selectors.

The focus is on foreign contacts, the government says: data from within the country should be filtered out as far as possible. But even if some data is filtered, most communication on the Internet runs via servers in other countries. Metadata such as IP addresses of website calls would be stored millions of times over under the law, as would telephone numbers and the duration of calls abroad.

Defense Minister Frank Bakke-Jensen considers the law to be unpostponable even in the pandemic. "Although the government's main concern at the moment is how to deal with the coronavirus situation, we must continue to work on other important issues," he said in writing in response to an inquiry from netzpolitik.org.

PDF:
https://www.regjeringen.no/contentassets/b7bada5f31bc482092318df675a2019d/no/pdfs/prp201920200080000dddpdfs.pdf

👉🏼 Read more 🇩🇪:
https://netzpolitik.org/2020/norwegen-plant-ueberwachung-des-internetverkehrs/

#Norway #surveillance #internet #spy #SecretService #pdf #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Exposed: CIA used Sheldon Adelson's firm to spy on Julian Assange

In his latest Grayzone exposé, Max Blumenthal reveals new details on the CIA spying and sabotage operation against Wikileaks founder Julian Assange. The US surveilled Assange inside Ecuador's London embassy, all while working with Trump mega-donor and casino magnate Sheldon Adelson's security team and a Spanish company that had initially been hired to protect the embassy.

Drawing on court testimony and internal documents, Blumenthal reports on how the CIA sabotaged an asylum plan for Assange; installed software that allowed it to directly monitor him; and harassed and monitored Assange's attorneys, friends, family, and journalist colleagues.

https://invidio.us/watch?v=I73VcDRGnk0

#Assange #FreeAssange #USA #CIA #spy #video #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Real-Time Passive Sound Recovery from Light Bulb Vibrations

Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room

You might not believe it, but it's possible to spy on secret conversations happening in a room from a nearby remote location just by observing a light bulb hanging in there—visible from a window—and measuring the amount of light it emits.

A team of cybersecurity researchers has developed and demonstrated a novel side-channel attacking technique that can be applied by eavesdroppers to recover full sound from a victim's room that contains an overhead hanging bulb.

The findings were published in a new paper by a team of academics—Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici and Boris Zadov—from the Israeli's Ben-Gurion University of the Negev and the Weizmann Institute of Science, which will also be presented at the Black Hat USA 2020 conference later this August.

The technique for long-distance eavesdropping, called "Lamphone," works by capturing minuscule sound waves optically through an electro-optical sensor directed at the bulb and using it to recover speech and recognize music.

https://www.nassiben.com/lamphone

PDF:
https://ad447342-c927-414a-bbae-d287bde39ced.filesusr.com/ugd/a53494_443addc922e048d89a664c2423bf43fd.pdf

👉🏼 Read more:
https://thehackernews.com/2020/06/lamphone-light-bulb-spy.html

#spy #cybersecurity #lightbulb #blackhat #sidechannel #attack
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
NSO Group Closes Cyprus Office of Spy Firm

NSO recently closed the Cyprus office of phone network exploitation company Circles and fired a number of staff, according to two former NSO employees.

Controversial phone hacking company NSO Group has closed the Cyprus office of Circles, a surveillance firm that previously merged with NSO, and fired a number of staff, according to two former NSO employees.

Cyprus is a hotbed for surveillance companies that sometimes set up shop in the country and then sell their technology from the region.

"They fired all the Cyprus office," one of the former NSO employees told Motherboard.

"All Cyprus site was closed recently; all of the people fired," the second former employee added. Motherboard granted the sources anonymity as they weren't authorized to speak to the press about internal company issues, and to avoid retaliation from NSO.

https://www.vice.com/en_us/article/ep48kp/nso-group-cyprus-circles-bulgaria-ss7

#Israel #Cyprus #NSO #spy #firm
The head of Denmark’s spy program has been fired for snooping on citizens and lying about it

The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following revelations from a whistleblower. The officials, including the head of the agency, Lars Finden, have been “relieved of duty for the time being” following the release of a trove of documents. The documents detailed that the FE has been illegally spying on Danish citizens in the last six years and were released by an unnamed whistleblower to the independent regulator of Danish security services which is known as Tilsynet med Efterretningstjenesterne (TET).

Whistleblower reveals Danish spying, gets Danish spy chief fired

According to a press release by the TET, Danish intelligence had maintained “operational activities in violation of Danish law, including obtaining and passing on a significant amount of information about Danish citizens.” Additionally, the TET noted that the FE had not only withheld information but actually reported back to overseers “incorrect information on matters relating to the collection of the service and disclosure of information.”

Prior to the whistleblower’s documents making their way to the TET, the FE had been stonewalling investigations on whether foreign intelligence spying capabilities had been used on domestic targets. The press release went on to note that Danish intelligence actually passed on the information to other countries. Unfortunately, due to the “extremely sensitive” nature of the information, it’s possible that we’ll ever know specifically who was spied on, for whom, or why.

👀 👉🏼 🇬🇧 https://www.privateinternetaccess.com/blog/the-head-of-denmarks-spy-program-has-been-fired-for-snooping-on-citizens-and-lying-about-it/

#denmark #spy #spionage #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Google removes Android app that was used to spy on Belarusian protesters

App mimicked a popular anti-government news site and collected location and device owner details.

Google has removed this week an Android app from the Play Store that was used to collect personal information from Belarusians attending anti-government protests.

The app, named NEXTA LIVE (com.moonfair.wlkm), was available for almost three weeks on the official Android Play Store, and was downloaded thousands of times and received hundreds of reviews.

To get installs, NEXT LIVE claimed to be the official Android app for Nexta, an independent Belarusian news agency that gained popularity with anti-Lukashenko protesters after exposing abuses and police brutality during the country's recent anti-government demonstrations.

https://www.zdnet.com/article/google-removes-android-app-that-was-used-to-spy-on-belarusian-protesters/

#Europe #Belarus #Google #spy #protesters #app #surveillance
Facebook Accused of Watching Instagram Users Through Cameras

Facebook Inc. is again being sued for allegedly
spying on Instagram users, this time through the unauthorized use of their mobile phone cameras.

The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone cameras even when they weren’t actively being used.

Facebook denied the reports and blamed a bug, which it said it was correcting, for triggering what it described as false notifications that Instagram was accessing iPhone cameras.

In the complaint filed Thursday in federal court in San Francisco, New Jersey Instagram user Brittany Conditi contends the app’s use of the camera is intentional and done for the purpose of collecting “lucrative and valuable data on its users that it would not otherwise have access to.”

By “obtaining extremely private and intimate personal data on their users, including in the privacy of their own homes,” Instagram and Facebook are able to collect “valuable insights and market research,” according to the complaint.

Facebook declined to comment.

👀 👉🏼 https://www.bloomberg.com/news/articles/2020-09-18/facebook-accused-of-watching-instagram-users-through-cameras

#fb #DeleteFacebook #instagram #accused #spy #privacy #surveillance #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Did Russian Spies Use Diplomatic Cover to Run a Global Cocaine-Smuggling Operation?

Six men await trial in Moscow and Buenos Aires, charged with operating one of the craziest, most ambitious narco-trafficking rings in history. Russia’s embassy in Argentina was the storage depot and Russian government transport was intended to move a cartel-sized consignment of virtually uncut cocaine from South America to Moscow.

It was a transnational crime that astounded and confused the world, not least because authorities allege it was carried out by a small but resourceful cabal including one dirty embassy employee, one corrupt cop, and one charismatic chameleon who used some of the most secure Russian state real estate to store and smuggle $60 million worth of drugs.

According to the official narrative, they did it all right under the noses of innocent diplomats and intelligence officers—and they would have gotten away with it without the plucky joint police work of Russian and Argentinian law enforcement. But what if that neat conclusion, which will soon be presented in court, is intentionally incomplete, a whitewash designed to protect more senior officials in the Russian government?

👀 👉🏼 https://www.thedailybeast.com/was-andrei-kovalchuk-and-the-russian-embassy-in-argentina-at-the-center-of-a-russian-spy-cocaine-ring

#russia #argentina #embassy #spy #drugs #cocaine #smuggling #whitewash #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
The KGB Experience - How to Catch a Spy who Uses Numbers Stations?

Introduction

From 2019 onwards the Latvian National Archive offers access to various KGB documents. The author had already previously shown the very detailed efforts of the Latvian KGB counterintelligence to monitor and study the CIA and BND numbers stations broadcasts, or what they called – “one directional communications”.[1] These are one of the most definitive archival sources which prove that foreign intelligence actively used shortwave in the USSR and that the KGB was aware of it. The documents showed that the KGB had monitored these broadcasts from at least 1978, but the files spoke very vaguely if the monitoring effort led to any apprehension and capture of a foreign agent. We, however, know that there were such cases like Alexander Ogorodnik[2], and others where the use of shortwave signals was determined.

👀 👉🏼 https://www.numbers-stations.com/how-to-catch-a-spy-who-uses-numbers-stations-the-kgb-experience/

#russia #kgb #spy #numbersstations #research
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
New York City police officer spied on fellow Tibetans for China, prosecutors charge

A New York City police officer who also serves in the U.S. Army Reserve was arrested Monday on a federal charges of acting as an illegal agent of China.

The police officer, Baimadajie Angwang, who was born in the autonomous region of Tibet in China, allegedly repeatedly reported to officials at the Chinese Consulate in New York on the activities of other ethnic Tibetans in the New York area.

A complaint said that Angwang "used his official position in the NYPD to provide [Chinese] Consulate officials access to senior NYPD officials through invitations to official NYPD events."

The 33-year-old cop, Baimadajie Angwang, who was born in the autonomous region of Tibet in China, allegedly reported to officials at the Chinese consulate in New York on the activities of other Tibetans in the New York area.

Angwang, after appearing remotely in federal court in New York via teleconference, was ordered by a judge to be detained without bond after prosecutors said he "presents a serious risk of flight" to avoid the criminal charges. Angwang's lawyer reserved his right to argue for bail at a later date.

If convicted, Angwan, a resident of Nassau County, Long Island, face a maximum possible prison sentence of 55 years.

Authorities noted in a criminal complaint that Angwang, who currently works for the New York Police Department's community affairs unit in the 111th precinct in Queens, "initially traveled to the United States on a cultural exchange visa."

But after overstaying a second visa he "eventually sought asylum in the United States on the basis that he had allegedly been arrested and tortured in the [People's Republic of China] due partly to this Tibetan ethnicity," the complaint said.

The U.S. Attorney's Office for the Eastern District of New York, in a detention memo, said that despite Angwang's claims, an investigation found that "Angwang has traveled back to the PRC on numerous occasion since his asylum application was granted."

"These are not the actions of an individual who fears torture or persecution at the hands of the PRC, thus showing that his U.S. citizenship was secured through false pretenses," the memo said.

👀 👉🏼 https://www.cnbc.com/2020/09/21/nypd-cop-charged-with-acting-as-china-agent.html

#nypd #cop #charged #china #tibet #agent #spy
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Revealed: China suspected of spying on Americans via Caribbean phone networks

Security expert claims Chinese surveillance may have affected tens of thousands of Americans

China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data.

The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators.

The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.

https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks

#China #US #mobile #phone #networks #intelligence #spy #surveillance
Spy pixels in emails have become endemic

The use of "invisible" tracking tech in emails is now "endemic", according to a messaging service that analysed its traffic at the BBC's request.

Hey's review indicated that two-thirds of emails sent to its users' personal accounts contained a "spy pixel", even after excluding for spam.

Its makers said that many of the largest brands used email pixels, with the exception of the "big tech" firms.

Defenders of the trackers say they are a commonplace marketing tactic.

And several of the companies involved noted their use of such tech was mentioned within their wider privacy policies.

‼️ Emails pixels can be used to log:

if and when an email is opened

how many times it is opened

what device or devices are involved

the user's rough physical location, deduced from their internet protocol (IP) address - in some cases making it possible to see the street the recipient is on

This information can then be used to determine the impact of a specific email campaign, as well as to feed into more detailed customer profiles.

Hey's co-founder David Heinemeier Hansson says they amount to a "grotesque invasion of privacy".

https://www.bbc.com/news/technology-56071437

#spy #pixels #email #invisible #tracking #bigtech #BigData #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Forwarded from 0% Privacy
😅Не знаю как можно смотреть без улыбки на такие новости/расследования.

😅I don't know how you can look at such news/investigations without a smile.

📑
Who Paid for a Mysterious Spy Tool? The F.B.I., an F.B.I. Inquiry Found.
"When The New York Times reported in April that a contractor had purchased and deployed a spying tool made by NSO, the contentious Israeli hacking firm, for use by the U.S. government, White House officials said they were unaware of the contract and put the F.B.I. in charge of figuring out who might have been using the technology.
After an investigation, the F.B.I. uncovered at least part of the answer: It was the F.B.I."
🤣
📑FBI Ordered to Find Out Which Agency Disobeyed White House in Secret Deal, Finds Out It Was Itself.
"Now, several months later, the bureau’s investigation is complete, and it turns out that the agency that disobeyed the White House and purchased the creepy NSO tool was...the FBI."🤣

#NSO_Group #unit8200 #FBI #investigation #WhiteHouse #spy_tools #Pegasus_Spyware