Google and Fitbit are merging to create a new health database on all of us
https://www.eff.org/deeplinks/2020/05/stopping-google-fitbit-merger-your-stories-needed
#Google #fitbit #merge #health #bt #bluetooth
https://www.eff.org/deeplinks/2020/05/stopping-google-fitbit-merger-your-stories-needed
#Google #fitbit #merge #health #bt #bluetooth
Electronic Frontier Foundation
Stopping the Google-Fitbit Merger: Your Stories Needed!
There's a dirty secret in the incredible growth of Silicon Valley's tech giants: it's a cheat. Historically, US antitrust regulators would be deeply concerned about mergers with major competitors in
SplinterNet
Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.
SplinterNet is a true peer-to-peer network in that it requires physical proximity to other people to transmit messages. In the current version this happens over a close range Bluetooth connection. To illustrate how SplinterNet works, here is an example scenario:
You take a picture of a protest happening near your home.
Fearing a spread of the protest the government shuts down cellular and Internet access to most citizens.
You write a short message about the protest in SplinterNet and attach the picture.
When you next meet with your friends, you sync SplinterNet with them. They now have your photo and will spread it to their friends.
You also now have all their messages, which includes photos taken of protests happening in other parts of the country.
Any person who can reach a working Internet connection can post all of these photos to any sharing service or send directly to journalists to publicize.
If you fear capture, you can press a single button and all the messages in your copy of SplinterNet are deleted.
Features
Create a post with text and an optional single image.
Mark posts as important to increase their spread within the network. These posts will be sent first during syncing and will be highlighted for the people you sync with.
Delete posts to stop their spread. The contents of the network reflect what users of the network think is important and appropriate. You don't have to spread anything you don't want to.
Project Status
This is an experimental project still in development. All of the features listed here should work, they just haven't been tested in large networks. Please let us know how it works!
https://raw.githubusercontent.com/megamattron/SplinterNet/master/other/splinterNet-infosheet.png
https://github.com/megamattron/SplinterNet
π‘ @nogoolag π‘ @libreware
#SplinterNet #im #messaging #p2p #bt #bluetooth
Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.
SplinterNet is a true peer-to-peer network in that it requires physical proximity to other people to transmit messages. In the current version this happens over a close range Bluetooth connection. To illustrate how SplinterNet works, here is an example scenario:
You take a picture of a protest happening near your home.
Fearing a spread of the protest the government shuts down cellular and Internet access to most citizens.
You write a short message about the protest in SplinterNet and attach the picture.
When you next meet with your friends, you sync SplinterNet with them. They now have your photo and will spread it to their friends.
You also now have all their messages, which includes photos taken of protests happening in other parts of the country.
Any person who can reach a working Internet connection can post all of these photos to any sharing service or send directly to journalists to publicize.
If you fear capture, you can press a single button and all the messages in your copy of SplinterNet are deleted.
Features
Create a post with text and an optional single image.
Mark posts as important to increase their spread within the network. These posts will be sent first during syncing and will be highlighted for the people you sync with.
Delete posts to stop their spread. The contents of the network reflect what users of the network think is important and appropriate. You don't have to spread anything you don't want to.
Project Status
This is an experimental project still in development. All of the features listed here should work, they just haven't been tested in large networks. Please let us know how it works!
https://raw.githubusercontent.com/megamattron/SplinterNet/master/other/splinterNet-infosheet.png
https://github.com/megamattron/SplinterNet
π‘ @nogoolag π‘ @libreware
#SplinterNet #im #messaging #p2p #bt #bluetooth
This media is not supported in your browser
VIEW IN TELEGRAM
AIR PODS FREQUENCY WARFARE ON THE BRAIN
Electric and Magnetic Field (#EMF) is undetectable areas of energy, frequently referred to as radiation, linked with the use of electrical power and other forms of natural and human-made lighting.
The increase in the sale of this #wireless #headphones calls for serious concern considering how close-ranged the device is to the brain.
The intensity of the radiation equals that emitting from a microwave device which is similar to #Bluetooth radiation, that can cause brain damage.
The Bluetooth device uses radio waves in the 2.4β2.48 GHz frequency range to transmit signals wirelessly between devices. Thatβs the same range used by microwaves, cell phones, WIFI and other devices.
Electric and Magnetic Field (#EMF) is undetectable areas of energy, frequently referred to as radiation, linked with the use of electrical power and other forms of natural and human-made lighting.
The increase in the sale of this #wireless #headphones calls for serious concern considering how close-ranged the device is to the brain.
The intensity of the radiation equals that emitting from a microwave device which is similar to #Bluetooth radiation, that can cause brain damage.
The Bluetooth device uses radio waves in the 2.4β2.48 GHz frequency range to transmit signals wirelessly between devices. Thatβs the same range used by microwaves, cell phones, WIFI and other devices.
0xor0ne@infosec.exchange -
https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/
#bluetooth
Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500)
https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/
#bluetooth
β#Bluetooth #vulnerability allows unauthorized user to record & play audio on Bluetooth speaker via #BlueSpy
Prevention section explains how you can check if your Bluetooth LE speakers/headsets are vulnerable to this attack using nRF Connect app
https://www.mobile-hacker.com/2024/03/22/bluetooth-vulnerability-allows-unauthorized-user-to-record-and-play-audio-on-bluetooth-speakers/
#BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
βͺοΈautomatically scans for devices
βͺοΈstore MAC addresses of devices that are no longer visible but have enabled Bluetooth
βͺοΈuses Rubber Ducky payloads
https://www.mobile-hacker.com/2024/03/26/blueducky-automates-exploitation-of-bluetooth-pairing-vulnerability-that-leads-to-0-click-code-execution/
Demonstration of using BlueDucky to exploit 0-click Bluetooth vulnerability of unpatched Android smartphone (CVE-2023-45866)
Exploit was triggered by Raspberry Pi 4 and then by Android running NetHunter
https://youtu.be/GOGW7U1f2RA
@androidMalware
Prevention section explains how you can check if your Bluetooth LE speakers/headsets are vulnerable to this attack using nRF Connect app
https://www.mobile-hacker.com/2024/03/22/bluetooth-vulnerability-allows-unauthorized-user-to-record-and-play-audio-on-bluetooth-speakers/
#BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
βͺοΈautomatically scans for devices
βͺοΈstore MAC addresses of devices that are no longer visible but have enabled Bluetooth
βͺοΈuses Rubber Ducky payloads
https://www.mobile-hacker.com/2024/03/26/blueducky-automates-exploitation-of-bluetooth-pairing-vulnerability-that-leads-to-0-click-code-execution/
Demonstration of using BlueDucky to exploit 0-click Bluetooth vulnerability of unpatched Android smartphone (CVE-2023-45866)
Exploit was triggered by Raspberry Pi 4 and then by Android running NetHunter
https://youtu.be/GOGW7U1f2RA
@androidMalware
Mobile Hacker
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
This critical security issue allows third party user to record audio from Bluetooth speaker with built-in microphone in vicinity, even when it is already paired and connected with another device. This can result in eavesdropping on private conversations usingβ¦