NoGoolag
4.52K subscribers
13K photos
6.79K videos
582 files
14K links
Live free!

๐Ÿ“ก @NoGoolag

FAQ:
http://t.me/NoGoolag/169

โ˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

๐Ÿ“ก @Libreware

๐Ÿ“ก @TakeBackOurTech

๐ŸฆŠ @d3_works

๐Ÿ“š @SaveAlexandria

๐Ÿ’ฏ % satire OSINT
Download Telegram
Further study proves lie of โ€œanonymousโ€ data

Anonymous data is often not really anonymous at all, in many data records individuals can be uniquely identified even without a name. A new
study illustrates the amazing precision with which this can be done. Many companies and databases undermine the basic data protection regulation.

Not everywhere where it says anonymous is also anonymous in it. This is made clear by a study in the scientific journal โ€œNatureโ€. The researchers can identify 99.98 percent of Americans in each data set, with only 15 characteristics such as age, place of residence or nationality.

The scientistsโ€™ example: a cheap health insurance company sells customer data, but only โ€œanonymouslyโ€ and only from a fraction of the database. The study makes it clear: this is not true anonymity, the data is not secure. People are simply too unique to hide in databases. Removing names only makes records pseudonymous, not anonymous. With an online tool, anyone can trace the de-anonymization themselves.

The authors write that โ€œeven highly fragmented anonymized data records do not meet the modern anonymization standards of the Basic Data Protection Ordinanceโ€. Their results question โ€œthe technical and legal adequacyโ€ of simply deleting directly identifying data types and not worrying about identifiability using other data types.
Data is never completely anonymous

โ€œThe study once again shows very beautifully what we have known for a long time,โ€ says data protection researcher Wolfie Christl to netzpolitik.org. โ€œAs long as data records relating to individuals are being processed, no form of anonymization can prevent individuals from being reidentified with complete certainty.

๐Ÿ‘‰๐Ÿผ Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/further-study-proves-lie-of-anonymous-data

#study #data #anonymous #poc
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
Privacy International study shows your mental health is for sale

A new
study by Privacy International reveals how popular websites about depression in France, Germany and the UK share user data with advertisers, data brokers and large tech companies, while some depression test websites leak answers and test results with third parties. The findings raise serious concerns about compliance with European data protection and privacy laws.

๐Ÿ‘‰๐Ÿผ Story
https://privacyintyqcroe.onion/long-read/3194/privacy-international-study-shows-your-mental-health-sale

๐Ÿ‘‰๐Ÿผ Report
https://privacyintyqcroe.onion/report/3193/report-your-mental-health-sale

#privacy #study #report #DataBrokers #ourdata #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
DeepPrivacy: A Generative Adversarial Network for Face Anonymization

We propose a novel architecture which is able to automatically anonymize faces in images while retaining the original data distribution. We ensure total anonymization of all faces in an image by generating images exclusively on privacy-safe information. Our model is based on a conditional generative adversarial network, generating images considering the original pose and image background. The conditional information enables us to generate highly realistic faces with a seamless transition between the generated face and the existing background. Furthermore, we introduce a diverse dataset of human faces, including unconventional poses, occluded faces, and a vast variability in backgrounds. Finally, we present experimental results reflecting the capability of our model to anonymize images while preserving the data distribution, making the data suitable for further training of deep learning models. As far as we know, no other solution has been proposed that guarantees the anonymization of faces while generating realistic images.

๐Ÿ‘‰๐Ÿผ PDF:
https://arxiv.org/pdf/1909.04538.pdf

๐Ÿ‘‰๐Ÿผ GitHub:
https://github.com/hukkelas/DeepPrivacy

๐Ÿ‘‰๐Ÿผ Story on Motherboard:
https://www.vice.com/en_us/article/ne87pg/deepprivacy-fake-face-anonymized-algorithm

#DeepPrivacy #privacy #anonymization #research #study #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
Free internet access should be a basic human right

Free internet access must be considered as a human right, as people unable to get online โ€“ particularly in developing countries โ€“ lack meaningful ways to influence the global players shaping their everyday lives, according to a new
study.

As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.

New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture โ€“ a means of enabling billions of people to lead โ€˜minimally decent livesโ€™.

Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings โ€“ the first study of its kind โ€“ in the Journal of Applied Philosophy.

โ€œInternet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,โ€ commented Dr Reglitz.

โ€œWithout such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply donโ€™t have a say in the making of the rules they must obey and which shape their life chances.โ€

He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of todayโ€™s political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people โ€˜offlineโ€™ had decreased.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx

#humenrights #internet #study
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
โ€œWhat about building 7?โ€ A social psychological study of online discussion of 9/11 conspiracy theories

Recent research into the psychology of conspiracy belief has highlighted the importance of belief systems in the acceptance or rejection of conspiracy theories. We examined a large sample of conspiracist (pro-conspiracy-theory) and conventionalist (anti-conspiracy-theory) comments on news websites in order to investigate the relative importance of promoting alternative explanations vs. rejecting conventional explanations for events.

In accordance with our hypotheses, we found that conspiracist commenters were more likely to argue against the opposing interpretation and less likely to argue in favor of their own interpretation, while the opposite was true of conventionalist commenters. However, conspiracist comments were more likely to explicitly put forward an account than conventionalist comments were. In addition, conspiracists were more likely to express mistrust and made more positive and fewer negative references to other conspiracy theories.

The data also indicate that conspiracists were largely unwilling to apply the โ€œconspiracy theoryโ€ label to their own beliefs and objected when others did so, lending support to the long-held suggestion that conspiracy belief carries a social stigma. Finally, conventionalist arguments tended to have a more hostile tone. These tendencies in persuasive communication can be understood as a reflection of an underlying conspiracist worldview in which the details of individual conspiracy theories are less important than a generalized rejection of official explanations.

โ€œThe Internet was made for conspiracy theory: it is a conspiracy theory: one thing leads to another, always another link leading you deeper into no thing and no place.โ€ (Stewart, 1999, p. 18).

๐Ÿ‘‰๐Ÿผ Kent Academic RepositoryFull text document (pdf)
https://kar.kent.ac.uk/36252/1/Wood%20and%20Douglas%202013%20Frontiers.pdf

๐Ÿ‘‰๐Ÿผ Read more:
https://www.frontiersin.org/articles/10.3389/fpsyg.2013.00409/full

https://www.forschung-und-wissen.de/nachrichten/psychologie/menschen-die-an-verschwoerungstheorien-glauben-sind-vernuenftiger-13372102

#research #psychological #study #conspiracy #theories #pdf #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
Investigation report: Mobile phone data extraction by police forces in England and Wales

After massive criticism, the English data protection authority has taken a close look at the topic of mobile phone evaluations. The result: The police take too much data from the phones and store it for too long - often without a legal basis.

The British data protection authority ICO criticises the way law enforcement agencies deal with the smartphones of victims in England and Wales. For the 64-page investigation report (PDF), the authority had consulted law enforcement agencies, civil society groups and victims' associations. The investigation was preceded by numerous complaints from individuals and a report by Privacy International.

Mobile phones now store a large part of our lives, from address books to private photos and our private communications. In addition to this data, which often extends over long periods of time, phones store much more: browser histories, geodata, used Wifi's, health data and often the passwords and access data of their owners. This makes the phone one of the most interesting data sources for law enforcement agencies today.

๐Ÿ‘‰๐Ÿผ PDF:
https://assets.documentcloud.org/documents/6953083/ICO-Phone-PD-Report.pdf

๐Ÿ‘‰๐Ÿผ Digital stop and search: how the UK police can secretly download everything from your mobile phone
https://privacyinternational.org/report/1699/digital-stop-and-search-how-uk-police-can-secretly-download-everything-your-mobile

Read more ๐Ÿ‡ฉ๐Ÿ‡ช:
https://netzpolitik.org/2020/england-polizei-handyauswertung-untersuchung/

#surveillance #ICO #uk #police #PrivacyInternational #study #wales #netpolitics
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@cRyPtHoN_INFOSEC_ES
lookout-uyghur-malware-tr-us.pdf
8.1 MB
Espionage software: China is said to have surveilled mobile phones of Uighurs for years

IT security researchers have found numerous apps that spy on China's Uighur Muslim minority - even abroad.

The Uyghur Muslim minority in China lives in a surveillance state: As reported by the SZ, among others, Beijing has installed thousands of surveillance cameras in the cities of the Xinjiang region, and Uyghurs are sent to re-education camps. Only a few days ago the news agency AP reported that China is also trying to keep the Muslim population under control with drastic birth control.

๐Ÿ‘‰๐Ÿผ PDF:
https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf

#china #Xinjiang #uyghurs #surveillance #smartphones #apps #malware #pdf #study #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
PWDB - New generation of Password Mass-Analysis

One out of every 142 passwords is '123456'

The '123456' password was spotted 7 million times across a data trove of one billion leaked credentials, on one of the biggest password re-use studies of its kind.

๐Ÿ‘‰๐Ÿผ PWDB - New generation of Password Mass-Analysis
https://github.com/FlameOfIgnis/Pwdb-Public

๐Ÿ‘‰๐Ÿผ Read more:
https://www.zdnet.com/article/one-out-of-every-142-passwords-is-123456/

#passwords #study #analysis
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@NoGoolag
๐Ÿ“ก@BlackBox
How the Dark Web Drug Supply Has Responded to COVID-19

The darknet drug markets suffered initial disruptions in shipment speeds before recovering to become more efficient than legitimate supply chain systems.

Like legitimate supply chains, dark web drug markets depend on substance imports from China, and the coronavirus pandemic led to closure of Chinese chemical supply firms and factories.

Importantly, drug dealers depend of legitimate trade routes to sustain their illicit commercial activities. The fact that EU borders remained open did not make things better for most of the darknet and legitimate supply chains as shipping capacities took a nose dive.

Nonetheless, although the coronavirus-related restrictions seemed to freeze operations across the global drug supply chains, the situation in the dark web economy was different. Mexican drug cartels suffered from the pandemicโ€™s economic ramifications as user buying power tanked โ€“ meanwhile, the darknet drug markets did not really suffer a serious dent in drug sales.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ (Tor-Browser)
http://tapeucwutvne7l5o.onion/how-the-dark-web-drug-supply-has-responded-to-covid-19

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ Online Drug Markets Are Entering a 'Golden Age'
https://www.vice.com/en_us/article/dyz3v7/online-drug-markets-are-entering-a-golden-age

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ Vaccine for COVID-19 and Other Scams on the Dark Web
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vaccine-for-covid-19-and-other-scams-on-the-dark-web/

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ (PDF) From Dealer to Doorstep โ€“ How Drugs Are Sold On the Dark Net
https://www.swansea.ac.uk/media/From-Dealer-to-Doorstep-%C3%A2%C2%80%C2%93-How-Drugs-Are-Sold-On-the-Dark-Net.pdf

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ (PDF) EMCDDA AND EUROPOL ANALYSE IMPACT OF PANDEMIC ON EU DRUG MARKETS
https://www.emcdda.europa.eu/system/files/attachments/13099/COVID19_DrugMarkets_EMCDDA_Europol_Final_web.pdf

#darknet #markets #drugs #europol #covid #study #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Is the web getting slower?

A story on Hacker News recently argued that webpage speeds haven't improved, even as internet speeds have gone up.

This article explains why that conclusion can't be drawn from the original data.

We'll also look at how devices and the web have changed over the past 10 years, and what those changes have meant for web performance.

๐Ÿ’ก ๐Ÿ‘‰๐Ÿผ https://www.debugbear.com/blog/is-the-web-getting-slower

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ The Need for Speed, 23 Years Later:
https://www.nngroup.com/articles/the-need-for-speed/

#webpage #speed #internet #study #report #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Internet history can be used for โ€œreidentificationโ€ finds study by Mozilla

A recent research paper has reaffirmed that our internet history can be reliably used to identify us. The research was conducted by Sarah Bird, Ilana Segall, and Martin Lopatka from Mozilla and is titled: Replication: Why We Still Canโ€™t Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. The paper was released at the Symposium on Usable Privacy and Security and is a continuation of a 2012 paper that highlighted the same reidentifiability problem.

โ€ผ๏ธ Just your internet history can be used to reidentify you on the internet โ€ผ๏ธ

Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.

This is especially concerning because internet history is routinely sold by your internet service provider (ISP) and mobile data provider to third party advertising and marketing firms which are demonstrably able to tie a list of sites back to an individual they already have a profile on โ€“ even if the ISP claims to be โ€œanonymizingโ€ the data being sold. This is a legally sanctioned activity ever since 2017 when Congress voted to get rid of broadband privacy and allow the monetization of this type of data collection.

This type of โ€œhistory-based profilingโ€ is undoubtedly being used to build ad profiles on internet users around the world. Previous studies have shown that an IP address usually stays static for about a month โ€“ which the researchers noted: โ€œis more than enough time to build reidentifiable browsing profiles.โ€

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ (PDF)
https://www.usenix.org/system/files/soups2020-bird.pdf

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.cozyit.com/internet-history-can-be-used-for-reidentification-finds-study-by-mozilla/

#mozilla #study #research #internet #history #reidentification #thinkabout #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
No, the Darknet is not the stronghold of all evil!

The anonymization service Tor can be used for good and bad, a
study examines what outweighs. However, this goes a long way wrong.

To obtain information about the usage patterns of the Tor network, scientists Eric Jardine (Virginia Tech/USA), Andrew Lindner (Skidmore College/USA) and Gareth Owenson (University of Portsmouth/UK) operated about 1 percent of the Tor entry nodes for about seven months between December 31, 2018, and August 18, 2019, and studied the connections that were made there.

๐Ÿ‘€ ๐Ÿ‘‰๐Ÿผ https://www.pnas.org/content/early/2020/11/24/2011893117

#tor #darknet #study #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
pgpp-arxiv20.pdf
7.1 MB
Pretty Good Phone Privacy

To receive service in todayโ€™s cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.

In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.

https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf

#phone #privacy #study #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
EPRS_STU(2021)656336_EN.pdf
3.6 MB
Online platforms: Economic and societal effects

Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.

https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf

#online #platforms #study #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
Mass Extraction: The Widespread Power of U.S. Law Enforcement to Search Mobile Phones

Every day, law enforcement agencies across the country search thousands of cellphones, typically incident to arrest. To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone โ€”
all emails, texts, photos, location, app data, and more โ€” which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a โ€œwindow into the soul.โ€

This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.

Every American is at risk of having their phone forensically searched by law enforcement.

https://www.upturn.org/reports/2020/mass-extraction/

๐Ÿ’ก Read as well:
https://www.eff.org/deeplinks/2021/03/fbi-should-stop-attacking-encryption-and-tell-congress-about-all-encrypted-phones

#usa #fbi #lawenforcement #massextraction #MDFT #mobilephones #cellphones #encryption #decryption #study #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ“ก
@NoGoolag
apple_google.pdf
1.4 MB
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google

We find that even when minimally configured and the handset is idle both iOS and Google Android share data with Apple/Google on average every 4.5 mins.

โ€ผ๏ธ The phone IMEI, hardware serial number, SIM serial number and IMSI, handsetphone number etc are shared with Apple and Google. Both iOS and Google Android transmit telemetry, despite the user explicitly opting out of this.

๐Ÿ’ก When a SIM is inserted both iOS and Google Android send details to Apple/Google. iOS sends the MAC addresses of nearby devices, e.g. other handsets and the home gateway, to Apple together with their GPS location. Currently there are few, if any, realistic options for preventing this data sharing.

https://www.scss.tcd.ie/doug.leith/apple_google.pdf

#apple #google #study #telemetry #data #mobilephones #pdf
๐Ÿ“ก @nogoolag @blackbox_archiv
ndss2021_1C-3_23159_paper.pdf
430.5 KB
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers

Contact discovery allows users of mobile messengers to conveniently connect with people in their address book.
In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.

Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, largescale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service.

https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf

#contact #messenger #telegram #whatsapp #signal #crawling #attacks #study #pdf
๐Ÿ“ก @nogoolag ๐Ÿ“ก @blackbox_archiv
A study in 2014 conducted by none other than the NIH, found that cloth mask penetration was 97%, and that moisture retention and reuse of cloth masks can actually increase the risk of infection!!!

Source: https://pubmed.ncbi.nlm.nih.gov/25903751/

#mask #study #nih
On the contrary, a study says COVID-19 deaths remain extremely rare in children and young people โ€” with most fatalities occurring within 30 days of infection and in children with specific underlying conditions

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4125501

#covid #poison #booster #children #kids #fauci #study #scamdemic #comorbidities