NoGoolag
4.54K subscribers
13.2K photos
6.89K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
Media is too big
VIEW IN TELEGRAM
What does Big Brother see, while he is watching? - Uncovering images from the secret Stasi archives

In the past years there has been a lot of discussion on the topic of state sponsored surveillance. But hardly any material can be accessed to support the general debate due to vaguely declared security concerns. So we are debating Big Brother with little knowledge about what he actually sees, while he is watching. Over the course of three years, I was able to research the archives left by East Germany's Stasi to look for visual memories of this notorious surveillance system and more recently I was invited to spend some weeks looking at the archive by the Czechoslovak StB.

https://media.ccc.de/v/32c3-7209-what_does_big_brother_see_while_he_is_watching

#CCC #32c3 #stasi #BigBrother #surveillance #why #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
πŸ“‘@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Hacking health

About hacking wheelchairs, building custom bicycles, adapters to use e-scooters as outboard motors: Empowering people with disablitities or healthcare needs through Open Hardware. Presentation on experiences and lessons learned in collecting and co-creating open personalized DIY healthcare solutions for replicability and adaptability in Makerspace worldwide.

https://vid.lelux.fi/videos/watch/5c2b56de-5e0c-4e9a-a299-52b2547c27cb

#CCC #36C3 #hacking #health #wheelchairs #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
πŸ“‘@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Quantum Hardening Cryptographic Protocols

This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.

If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00

πŸ“Ί πŸ‘‰πŸΌ πŸ‡¬πŸ‡§ https://media.ccc.de/v/DiVOC-19-quantum-en

πŸ“Ί πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ https://media.ccc.de/v/DiVOC-19-quantum

#ccc #DiVOC #video #quantum #hardening
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The ultimate Galaksija talk - Everything about a Yugoslavian microcomputer halfway between a TRS-80 and a ZX 80

#Galaksija was to be in #Yugoslavia what #Commodore and #Sinclair were in the west. Whether it succeeded or not, its deceptively simple design can still teach us a lot of interesting tricks on how to make a usable computer and operating system with as few transistors and bits as possible.

πŸ“Ί πŸ‘‰πŸΌ https://cdn.media.ccc.de/congress/2012/mp4-h264-HQ/29c3-5178-en-the_ultimate_galaksija_talk_h264.mp4

🎧 πŸ‘‰πŸΌ https://cdn.media.ccc.de/congress/2012/mp3-audio-only/29c3-5178-en-the_ultimate_galaksija_talk_mp3.mp3

#29c3 #ccc #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
rC3 – remote Chaos Experience

This year,
CCC hosts the Remote Chaos Experience (rC3) instead of an on-site event in Leipzig.

πŸ’‘ This endeavor requires creativity, joy of experimentation and active support.

A face-to-face event with 17,000 people will be neither responsible nor legally feasible this year. But after this tedious and painful 2020, we really deserve a nice finale!

This is why the rC3 – Remote Chaos Experience will be held.
As much as virtually possible, we want to convey the joy, content, togetherness and wonderful madness that make up a Chaos Communication Congress.

Hackers are used to remote work and online meetings. This makes our annual face-to-face meetings all the more important. Of course, it will be difficult to re-enact online all the things that make Congress what it is for us.
But then someone said it would be impossible. Our ambition was aroused.
Just like every year, we want to see the concentrated energy and creativity of hackers with dedication.

πŸ‘€ πŸ‘‰πŸΌ https://events.ccc.de/2020/09/04/rc3-remote-chaos-experience/#english

#rC3 #CCC #RemoteChaosExperience
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
When DevOps goes wrong - An observation story

In recent years, the DevOps movement has grown massively in popularity.
For some it made life easier, for others there were no changes and for others it has become "worse" since then.
If you belong to the latter group and have ever thought that you are alone in this respect, you are wrong. Obviously, some of these deteriorations are due to the fact that DevOps is implemented "wrong" or inconsistently in the workplace.
This talk will give an overview of real life observations made in DevOps environments.
It might include some of the nice, some of the bad and some of the ugly solutions you might encounter.

πŸ“Ί πŸ‘‰πŸΌ https://media.ccc.de/v/froscon2020-2587-when_devops_goes_wrong

#froscon2020 #ccc #devops #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Surveilling the surveillers - About military RF communication surveillance and other activist art & technology projects

This talk will present relevant works in this field and will draw connections between critical art and regulatory power, warfare, surveillance, electronic waste, electronic self-defense and the re-appropriation of architectural and technological artifacts in militant ways.

πŸ“Ί πŸ‘‰πŸΌ This Talk was translated into eng / deu / fra. πŸ‘‡πŸΌ
https://media.ccc.de/v/33c3-7978-surveilling_the_surveillers#t=70

#surveilling #surveillers #33c3 #ccc #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
πŸ“‘@BlackBox_Archiv
πŸ“‘@NoGoolag
Media is too big
VIEW IN TELEGRAM
Democratizing and Decolonizing the Future - Grassroots Utopias from Indonesia

In this online podium discussion we will present the power of critical ideas and show examples of utopian futures in the making in Indonesia. The projects created by Indonesian hackers and makers use technology to solve one or more local problems, attempting to create more equitable and positive future for their communities. They will be streamed as they happen live: different projects from around Indonesia will show how they make social change happen.

πŸ“Ί πŸ‘‰πŸΌ https://media.ccc.de/v/ds20-11322-democratizing_and_decolonizing_the_future

#ds20 #ccc #indonesia #utopias #democratizing #decolonizing #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
seccomp β€” Your Next Layer of Defense

Why should you allow all possible system calls from your application when you know that you only need some? If you have ever wondered the same then this is the right talk for you.

πŸ‘‰πŸΌ We are covering:

* What is seccomp in a nutshell and where could you use it.
* Practical example with Docker, Elasticsearch, and Beats.
* How to collect seccomp violations with Auditd.

Because your security approach can always use an additional layer of protection.

πŸ“Ί πŸ‘‰πŸΌ https://media.ccc.de/v/froscon2020-2614-seccomp_your_next_layer_of_defense

#froscon2020 #ccc #seccomp #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
All Creatures Welcome

All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to β€œuse hacking as a mindset,” the viewers immerse themselves, together with the filmmaker, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club; a real-world reflection of the virtual spectrum. Together with the filmmaker and the slogan"use hacking as a mindset" we immerse in a documentary adventure game and explore the world of Komputerfrieks, as they used to call themselves at the inaugural meeting of the Chaos Computer Club in 1981.

πŸ“Ί πŸ‘‰πŸΌ (German Subs)
https://media.ccc.de/v/all_creatures_welcome

#ccc #welcome #video #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
What The Fax?! - Hacking your network likes it's 1980 again

We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?

But can FAX be something more than a bureaucratic burden? Can it actually be a catastrophic security hole that may be used to compromise your entire network? Come watch our talk and find out …

πŸ‘‰πŸΌ πŸ“Ί πŸ‡©πŸ‡ͺ πŸ‡¬πŸ‡§ πŸ‡«πŸ‡·
https://media.ccc.de/v/35c3-9462-what_the_fax

πŸ’‘ These file here contains multiple languages.
The file available for download contains all languages as separate audio-tracks.

#ccc #fax #security #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Elephant In The Background: Empowering Users Against Browser Fingerprinting

Tracking users is a ubiquitous practice in the web today. User activity is recorded on a large scale and analyzed by various actors to create personalized products, forecast future behavior, and prevent online fraud. While so far HTTP cookies have been the weapon of choice, new and more pervasive techniques such as browser fingerprinting are gaining traction. Hence, in this talk, we describe how users can be empowered against fingerprinting by showing them when, how, and who is tracking them using JavaScript fingerprinting.

https://media.ccc.de/v/rc3-113142-the_elephant_in_the_background

#ccc #rc3 #browser #fingerprinting #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@NoGoolag
πŸ“‘
@BlackBox
Media is too big
VIEW IN TELEGRAM
CIA vs. Wikileaks - Intimidation surveillance and other tactics observed and experienced

In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that strongly indicate a context of the US Central Intelligence Agency and/or potentially other entities of the US Government actions against Wikileaks and surrounding persons and organisations.

https://media.ccc.de/v/rc3-11512-cia_vs_wikileaks

πŸ’‘ These file here contains multiple languages. (πŸ‡©πŸ‡ͺ πŸ‡¬πŸ‡§)
The file available for download contains all languages as separate audio-tracks.

#ccc #rc3 #cia #wikileaks #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@NoGoolag
πŸ“‘
@BlackBox
Media is too big
VIEW IN TELEGRAM
Login To HELL: The nightmares of an infosec professional in South America

"In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crimeβ€”a crime he didn’t commit, and one that probably never even happened.

Alberto, a hacker, was the perfect target for a judicial system that doesn’t understand cybersecurity or cybercrimes. Through police misconduct and incompetence, his life was thrown into upheaval, and he is still recovering from a system where there are no guarantees of a fair trial.

https://media.ccc.de/v/rc3-625023-login_to_hell

πŸŽ™Darknetdiaries - EP 25: Alberto
https://t.me/BlackBox_Archiv/1678

#alberto #truecrime #darknetdiaries #rc3 #ccc #cybersecurity #cybercrime #podcast #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Horcrux Encrypted Messaging

"Nation states can break some encryption, hack your device, and spy on all communications with their dragnets. How do you send secure messages leveraging adversarial nation-states?

https://media.ccc.de/v/rc3-298749-horcrux_encrypted_messaging

#rc3 #ccc #horcrux #encrypted #messaging #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
The Hackerfleet Operating System & the Isomer Framework

A quick and dirty hands on introduction to Isomer development and how to set up the prime project using it, the Hackerfleet Operating System. This workshop is mostly intended for sailors, campers etc. but also very useful in many other situations.

What is all this? What are the benefits? How do things work? What will you need to get started? How to set everything up? How do you join the project and how to contribute? These kind of questions shall be answered! Additional workshopping and hacking may happen in a breakout room or something.

https://media.ccc.de/v/rc3-176543-the_hackerfleet_operating_system_the_isomer_framework

#hackerfleet #isomer #framework #rc3 #ccc #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Spot the Surveillance - How to Identify Police Surveillance at Protests and Large Gatherings

The Electronic Frontier Foundation’s Kurt Opsahl will show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.

https://media.ccc.de/v/rc3-11406-spot_the_surveillance

⚠️ This Talk was translated into multiple languages (DE / EN). The files available for download contain all languages as separate audio-tracks.

#rc3 #ccc #police #surveillance #spying #protests #demos #video
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's operating system

Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.

https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os

#RedStarOS #northkorea #ccc #32c3 #video
πŸ“‘@cRyPtHoN_INFOSEC_FR
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@cRyPtHoN_INFOSEC_DE
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Hacking the Samsung Galaxy S8 Irisscanner

Mobile vendors have established fingerprints as a biometric feature to unlock smartphones. Now they turn to iris recognition, as do hackers. This video demonstrates how to circumvent the iris recognition of the Samsung Galaxy S8 flagship phone only using basic tools.

https://media.ccc.de/v/biometrie-s8-iris-en

#ccc #biometric #unlock #smartphones #irisrecognition #irisscanner #video
πŸ“‘@cRyPtHoN_INFOSEC_FR
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@cRyPtHoN_INFOSEC_DE
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Facebook, IoTeX, R3 Among New Members of Confidential Computing Consortium

Facebook, Accenture, IoTeX, Nvidia and six other companies are joining the Linux Foundation’s Confidential Computing Consortium (
CCC), increasing the size of the privacy-focused group by 60 percent.

The addition of members IoTeX, which leverages blockchain to secure the internet of things, and R3, an enterprise blockchain company, nearly doubles the number of blockchain companies involved.

Created in late October 2019, the CCC aims to bring developers together to accelerate the use of Trusted Execution Environment (TEE) technologies and standards. A TEE sequesters code and data away from applications on the main operating system, so they’re protected from adversaries who may gain access to the main operating system. If the main system is in the White House, for instance, with a variety of protections, a TEE is the bunker underneath it.

Within a TEE, unauthorized actors cannot view the data that is being used within the TEE and cannot alter the data. This enables applications and other systems to run without having direct access to extensive amounts of vulnerable data such as financial or personally identifiable information.

β€œSecuring data-in-use in hardware-based TEEs, can … strengthen other security- and integrity-related technologies,” like running a blockchain ledger, said Stephen Walli, the chairperson of the CCC’s governing board, in a statement.

β€œConfidential computing brings privacy-preserving smart devices to the next level by not only allowing users to own their private data, but also to use it in a privacy-preserving way,” Raullen Chai, CEO of IoTex, told CoinDesk in an email. β€œThis has major implications for consumer-facing industries such as health care and smart homes, as well as enterprise for private multi-party data sharing and interactions.”

http://telegra.ph/Facebook-IoTeX-R3-Among-New-Members-of-Confidential-Computing-Consortium---CoinDesk-04-30

via www.coindesk.com

#facebook #DeleteFacebook #IoTeX #confidential #computing #consortium #ccc
πŸ“‘ @nogoolag πŸ“‘ @blackbox_archiv