NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Download Telegram
Media is too big
VIEW IN TELEGRAM
Introduction to (home) network security.
A beginner-friendly guide to
network segmentation for privacy and security in the age of the Internet of Insecure Things.

Typical home networks use a closed-source Internet Service Provider supplied router/firewall and contain no restrictions on communications between clients within the network. The widespread deployment of network-connected appliances, control systems, lighting, etc, means that this design is insecure. This talk will cover the basics of networking, including why and how segregation of different types of network clients and traffic can be achieved to increase privacy and security.

📺 https://media.ccc.de/v/Camp2019-10225-introduction_to_home_network_security

#ChaosCommunicationCamp #CCCamp19 #CCC #network #security #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Media is too big
VIEW IN TELEGRAM
Privacy leaks in smart devices: Extracting data from used smart home devices

Remember the good old fun sport, where people bought random hard drives from ebay and did forensics on them?
Did you know you can do the same thing with used #IoT #devices too? Most end-users have no idea what kind of #information their devices are storing and how to securely clean their devices (if that even is possible). Lets explore together what the risks are and how we can extract that data.

📺 https://media.ccc.de/v/Camp2019-10355-privacy_leaks_in_smart_devices_extracting_data_from_used_smart_home_devices

#ChaosCommunicationCamp #CCCamp19 #CCC #network #security #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Ring’s Hidden Data Let Us Map Amazon's Sprawling Home Surveillance Network

As reporters raced this summer to bring new details of Ring’s law enforcement contracts to light, the home security company, acquired last year by Amazon for a whopping $1 billion, strove to underscore the privacy it had pledged to provide users.

Even as its #creeping objective of ensuring an ever-expanding #network of home #security devices eventually becomes indispensable to daily #police work, #Ring promised its customers would always have a choice in “what information, if any, they share with law enforcement.” While it quietly toiled to minimize what police officials could reveal about Ring’s police partnerships to the public, it vigorously reinforced its obligation to the privacy of its customers—and to the users of its crime-alert #app, #Neighbors.

However, a #Gizmodo #investigation, which began last month and ultimately revealed the potential locations of up to tens of thousands of Ring #cameras, has cast new doubt on the effectiveness of the company’s privacy safeguards. It further offers one of the most “striking” and “disturbing” glimpses yet, privacy experts said, of #Amazon’s privately run, #omni-#surveillance shroud that’s enveloping U.S. cities.

Gizmodo has acquired data over the past month connected to nearly 65,800 individual posts shared by users of the Neighbors app. The posts, which reach back 500 days from the point of collection, offer extraordinary insight into the proliferation of Ring video surveillance across #American #neighborhoods and raise important questions about the #privacy trade-offs of a consumer-driven network of surveillance cameras controlled by one of the world’s most powerful corporations.

And not just for those whose faces have been recorded.

👉🏼 Read more:
https://gizmodo.com/ring-s-hidden-data-let-us-map-amazons-sprawling-home-su-1840312279

#DeleteAmazon #DeleteRing #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
Beechat Network

https://beechat.network

A license-free, peer to peer data-based encrypted radio communications network that works on Linux (planned cross-platform support).

- USB dongle you plug into your laptop and you can chat with other dongles in your range (up to 60km LOS range)

- Other nodes can relay your messages for 25 hops until it reaches desired destination

- Can be plugged into a usb power plug and it will act as a repeater, without the need for a raspberry pi or any computer.

"You could in theory attach one to a solar usb charger and leave them on top of trees and no would would know"

The developer is in the group if anybody wants to discuss the project.

@NoGoolag

#beechat #network #chat #radio #p2p #forgetthecensornet
Dismantling of an encrypted network sends shockwaves through organised crime groups across Europe

At a joint press conference today, French and Dutch law enforcement and judicial authorities, Europol and Eurojust presented the impressive results of a joint investigation team to dismantle EncroChat, an encrypted phone
network widely used by criminal networks.

Over the last months, the joint investigation made it possible to intercept, share and analyse millions of messages that were exchanged between criminals to plan serious crimes. For an important part, these messages were read by law enforcement in real time, over the shoulder of the unsuspecting senders.

👉🏼 Read more:
http://www.eurojust.europa.eu/press/PressReleases/Pages/2020/2020-07-02b.aspx

#EncroChat #encrypted #network #busted #french #dutch #Europol #Eurojust
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@NoGoolag
📡@BlackBox
Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data

The backdoor accounts grant access to a secret Telnet admin account running on the devices' external WAN interface.

Two security researchers said this week that they found severe vulnerabilities and what appears to be intentional backdoors in the firmware of 29 FTTH OLT devices from popular vendor C-Data.

FTTH stands for Fiber-To-The-Home, while OLT stands for Optical Line Termination.

The term FTTH OLT refers to networking equipment that allows internet service providers to bring fiber optics cables as close to the end-users as possible.

As their name hints, these devices are the termination on a fiber optics network, converting data from an optical line into a classic Ethernet cable connection that's then plugged in a consumer's home, data centers, or business centers.

https://www.zdnet.com/article/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data

#ftth #network #backdoors
Android is now the world’s largest earthquake detection network

Google leverages the massive scale of Android to do phone-based earthquake tracking.

Back in 2016, Ars reported on an interesting use for the bundle of sensors we carry around every day in our smartphones—earthquake detection. The accelerometers in your phone make a passable-enough seismometer, and together with location data and enough users, you could detect earthquakes and warn users as the shocks roll across the landscape. The University of California-Berkeley, along with funding from the state of California, built an app called "MyShake" and a cheap, effective earthquake detection network was born, at least, it was born for people who installed the app.

https://arstechnica.com/gadgets/2020/08/android-is-now-the-worlds-largest-earthquake-detection-network/

#Google #Android #Earthquake #detection #network
No-privacy policy Airtel India mobile network provider:
https://www.airtel.in/privacy-policy

Personal information collected and held by us may include but not limited to your name, father’s name, mother’s name, spouse’s name, date of birth, current and previous addresses, telephone number, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of address. airtel and its authorized third parties may collect, store, process following types of Sensitive Personal Information such as Genetic Data, Biometric Data, Racial or Ethnic Origin, Political opinion, Religious & Philosophical belief, Trade union membership, Data concerning Health, Data concerning natural personal's sex life or sexual orientation, password, financial information (details of Bank account, credit card, debit card, or other payment instrument details), physiological information for providing our products, services and for use of our website. We may also hold information related to your utilization of our services which may include your call details, your browsing history on our website, location details and additional information provided by you while using our services.

No-privacy policy Jio India mobile network provider:
https://www.jio.com/en-in/privacy-policy


#India #isp #network #provider #privacy #policy #airtel #jio #why
This IoT Mesh Network Watches You As You Shop - Without Cameras

We built an IoT mesh
network to help understand shopper behavior, without using cameras.

Online retailers know a lot about how their customers are navigating their virtual stores. Offline retailers are not so lucky.

Together with consumer behavior experts B:Clarity and a multinational home appliance brand we built a system to help understand customer movement and behavior.

The system consists of wireless sensors that are installed in electronics stores. A few hundred sensors in each store.

💡 There are two types of sensors:

👉🏼
Vibration sensors. That trigger when someone is trying out a product.

👉🏼 Light sensors. Trigger when someone is standing in front of a product.

With these sensors, we can see what items are most popular, how it correlates to sales data – and how to take action to improve sales.

But without collecting any personally identifiable information.

https://www.thingsquare.com/blog/articles/iot-mesh-retail/

#iot #mesh #network #surveillance #shopping
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Neural Network Telegram Bot

Neural
network Telegram bot with StyleGAN and GPT-2

The Beginning

So we have already played with different neural networks. Cursed image generation using GANs, deep texts from GPT-2 — we have seen it all.

This time I wanted to create a neural entity that would act like a beauty blogger. This meant it would have to post pictures like Instagram influencers do and generate the same kind of narcissistic texts.

Initially I planned to post the neural content on Instagram but using the Facebook Graph API which is needed to go beyond read-only was too painful for me. So I reverted to Telegram which is one of my favorite social products overall.

The name of the entity/channel (Aida Enelpi) is a bad neural-oriented pun mostly generated by the bot itself.

https://guitargz.github.io/posts/202104151136-neural-network-telegram-bot/

#neural #network #telegram #bot
📡 @nogoolag 📡 @blackbox_archiv
Colonial Pipeline Hit by Network Outage Just Days After Hack Shutdown

NEW YORK (Reuters) - Colonial Pipeline is having
network issues preventing shippers from planning upcoming shipments of fuel, the company said on Tuesday, just after the nation's biggest fuel pipeline reopened after a week-long ransomware attack.

The disruption was caused by efforts by the company to harden its system as it restores service following the cyberattack, Colonial said, and not the result of a reinfection of its network. It did not say when the issue would be fixed, but said it was still delivering products scheduled by shippers.

Last week's closure of the 5,500-mile (8,900-km) system was the most disruptive cyberattack on record, preventing millions of barrels of gasoline, diesel and jet fuel from flowing to the East Coast from the Gulf Coast.

Colonial has been using its shipper nomination system to schedule batches of fuel deliveries to bring flows back to normal. A prolonged network outage could prevent shippers from adding to or making changes to deliveries - which would hamper delivery across the U.S. southeast and east coasts just after the line reopened.

After the ransomware attack forced Colonial to shut its entire network, thousands of gas stations across the U.S. southeast ran out of fuel. Motorists fearing prolonged shortages raced to fill up their cars.

Colonial's shipping nomination system is operated by a third party, privately-held Transport4, or T4, which handles similar logistics for other pipeline companies. T4 could not say when the issue would be fixed, and did not comment on whether its systems for other pipelines were affected.

https://money.usnews.com/investing/news/articles/2021-05-18/colonial-pipeline-nomination-system-shut-tuesday-market-sources

https://twitter.com/IntelPointAlert/status/1394672389464670212

#colonial #pipeline #network #issues
Forwarded from GJ `°÷°` 🇵🇸🕊
🇵🇸 Paltel (@Paltelco): "We would like to announce the partial restoration of telecom services in various areas within Gaza Strip. This comes after a limited quantity of fuel was provided through #UNRWA to operate our main generators. #KeepGazaConnected 1/2" | nitter

#Palestine #Gaza #Genocide #Communication #Network #Internet #Cellular #Telecom
Nov 17, 2023 · 8:15 PM UTC
Forwarded from GJ `°÷°` 🇵🇸🕊
🇵🇸 Paltel (@Paltelco): "We regret to announce that all telecom services in Gaza Strip have been lost due to the ongoing aggression. Gaza is blacked out again. #KeepGazaConnected #أبقوا_غزة_على_اتصال" | nitter

#Gaza #Communications #Network
Dec 14, 2023 · 3:44 PM UTC
When You Roam, You’re Not Alone | Lawfare –

A fix is long overdue for one of the most extensive, yet lesser-known surveillance risks of our age: the technical vulnerabilities at the heart of the world’s mobile communications networks

We’ve all been there before: You’re traveling abroad, and as your plane lands and is taxiing to the gate, you reach for your phone, wait for it to connect to the local network, and then you are greeted with a text message: “Welcome abroad, you’re now roaming!” Beyond the exorbitant fees, few of us are likely to give the matter much thought.

However, hidden within this seemingly routine transaction lies one of the most extensive, yet lesser-known surveillance risks of our age: the technical vulnerabilities at the heart of the world’s mobile communications networks.

#Mobile #Network #Cellular #Roaming #Vulnerabilities
Media is too big
VIEW IN TELEGRAM
What To Do When The Cell Phones Go Down (AT&T) | Ham Radio Crash Course

On the heels of the great AT&T outage.  Here are my thoughts on how to offset your dependence on phones with different radio services and technologies.

#MobileNetwork #Network
#HRCC #hamradio #amateurradio #LoRa #Meshstatic #MeshNetwork