Media is too big
VIEW IN TELEGRAM
IP Freely (Screw YouTube)
by James Corbett
In this clip from Episode 360 of The Corbett Report podcast, James debuts his blockbuster online protest song, IP Freely (Screw YouTube), featuring the YouTube thoughtcrime chord: the Dsus2!
Full report on intellectual property and YouTube censorship:
http://www.corbettreport.com/ip
#ip #intellectual #property #intellectualproperty #yt #youtube #censorship #alternatives #corbettreport
by James Corbett
In this clip from Episode 360 of The Corbett Report podcast, James debuts his blockbuster online protest song, IP Freely (Screw YouTube), featuring the YouTube thoughtcrime chord: the Dsus2!
Full report on intellectual property and YouTube censorship:
http://www.corbettreport.com/ip
#ip #intellectual #property #intellectualproperty #yt #youtube #censorship #alternatives #corbettreport
Steal This Podcast /Video (Please!)
What is βintellectual property,β exactly? Where does this pernicious idea come from? And how does this philosophical wrong turn lead us not just into the heart of absurdity, but toward the censorship of the internet and the control of your genome?
http://www.corbettreport.com/ip
#ip #intellectual #property #intellectualproperty #yt #youtube #censorship #alternatives #corbettreport
What is βintellectual property,β exactly? Where does this pernicious idea come from? And how does this philosophical wrong turn lead us not just into the heart of absurdity, but toward the censorship of the internet and the control of your genome?
http://www.corbettreport.com/ip
#ip #intellectual #property #intellectualproperty #yt #youtube #censorship #alternatives #corbettreport
Forwarded from BlackBox (Security) Archiv
F5 Big-IP RCE writeup + full exploit
When TEAMARES began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory released last month, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research. The advisory states that the vulnerability impacts a variety of capabilities when exploited, including the ability to execute arbitrary Java code, which stood out to us.
π ππΌ https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
π ππΌ https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902
#f5 #ip #remote #code #execution #exploit #teamares #poc #writeup
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
When TEAMARES began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory released last month, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research. The advisory states that the vulnerability impacts a variety of capabilities when exploited, including the ability to execute arbitrary Java code, which stood out to us.
π ππΌ https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
π ππΌ https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902
#f5 #ip #remote #code #execution #exploit #teamares #poc #writeup
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag