NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Download Telegram
Why should you be using privacy tools in the digital age? (Part 1)

With both governments and corporate entities trampling over the privacy rights of people throughout much of the world, choosing the right privacy
tools is now more important than ever.

Let us answer this question by examining a few trends:

❗️Global surveillance
Mass surveillance technology continues to strengthen and expand around the world – particularly in the United States, United Kingdom, Australia, and other Western countries. (See also the Five Eyes, Nine Eyes & 14 Eyes surveillance alliances.) This trend continues on, regardless of which political party is in office.

❗️ISP Spying
Internet providers often record connection times, metadata, and DNS requests, which gives them every website you visit (unless you’re using a good VPN). In many countries, this is not only legal, but required. See for example in the United Kingdom (with the Investigatory Powers Act), United States (Senate Joint Resolution 34), and now also in Australia (mandatory data retention). A VPN is now essential protection against your internet provider if you want to retain a basic level of online privacy.

❗️Censorship
The internet is also becoming less free due to censorship efforts and content blocking. Whether it is China, Germany, or the United Kingdom, authorities are working hard to censor content online. This is particularly the case in Europe. The UK is now considering 15 year jail sentences for people who view “offensive” websites.

❗️Malicious ads & tracking
Websites are increasingly hosting invasive advertisements that also function as tracking. Pop-ups and dangerous “click-bait” ads can also deliver malware and take your device over for ransom (ransomware). Malicious ads, which are delivered through third party ad networks, can even be hosted on major websites.

✴️While the trends are alarming, there are relatively simple solutions to restore both your privacy and security.

But before we begin, one key consideration is your threat model. How much privacy and security do you need given your unique situation and the adversaries you may face?

Many people, such as every day internet surfers, are seeking protection against advanced tracking online through advertising networks as well as a higher level of online anonymity and security. Others, such as investigative journalists working with sensitive information, would likely opt for an even higher level of protection.

Source: https://restoreprivacy.com/privacy-tools/

#privacy #tools #security #part1 #why
📡 @cRyPtHoN_INFOSEC_DE
📡 @cRyPtHoN_INFOSEC_EN
Why should you be using privacy tools in the digital age? (Part 2)

Secure and privacy-friendly browser

✴️ Everyone needs to be using a secure and privacy-friendly browser for three important reasons:

❗️Browsers have a large attack surface and can be compromised in many ways.

❗️By default, most browser will contain lots of private information, including your browsing history, usernames, passwords, and autofill information, such as your name, address, etc.

❗️Browsers can reveal lots of identifying information about your location, system settings, hardware, and much more, which can be used to identify you through browser fingerprinting.

✴️ Secure Browsers - Here are some great options:

Firefox

Firefox is a great browser for both privacy and security. It is highly customizable to give you the level of security and privacy you desire, while also being compatible with many browser extensions. https://www.mozilla.org/en-US/firefox/

Waterfox
Waterfox is a fork of Firefox, with telemetry and other items stripped out to give users more privacy. It is based on Firefox 56 with ESR patches. https://www.waterfoxproject.org/en-US/

Brave
Brave is a chromium-based browser that is very privacy-focused right out of the box, unlike Firefox, which requires some customization. By default, it will block ads and trackers, and it’s also customizable, fast, and has built-in protection against browser fingerprinting. https://brave.com/

Pale Moon
Like Waterfox, Pale Moon is also a fork of Firefox, but an older version (based on Firefox 38 ESR). https://www.palemoon.org/

Tor browser
The Tor browser is hardened version of Firefox that also utilizes the Tor network by default (but this can be disabled). It should be noted that Tor was created by the US military and continues to be funded by the US government today. https://www.torproject.org/projects/torbrowser.html.en

There are a few other browsers that may be popular, but they are not good choices for privacy reasons. Google Chrome, for example, offers security, but it is extremely invasive and collects all kinds of private data, which Google uses for targeted ads. Similarly, Opera browser also has a troubling privacy policy, which explains their data collection and data sharing practices.

✴️Browser add-ons worth considering
As discussed in the Firefox privacy guide, here are a few good browser add-ons that may be worth considering:

uBlock Origin – A powerful blocker for advertisements and tracking.
HTTPS Everywhere – This forces an HTTPS connection with the sites you visit.
Cookie AutoDelete – Deletes those unwanted tracking cookies.
Privacy Badger – Another add-on from the Electronic Frontier Foundation, Privacy Badger blocks spying ads and trackers.
uMatrix – While this may be overkill for many users, this powerful add-on gives you control over requests that may be tracking you on various websites.
NoScript – This is a script blocker that allows you to control which scripts run on the sites you visit.

❗️Worth mentioning: Don’t use a browser-based password manager, which will store your usernames and passwords in plaintext, thereby leaving them vulnerable to exploitation.

Source: https://restoreprivacy.com/privacy-tools/

#privacy #tools #security #part2 #why #browsers
📡 @cRyPtHoN_INFOSEC_DE
📡 @cRyPtHoN_INFOSEC_EN
Free VPN Services – What You Need to Know

Many people who are new to VPN services start out by looking for a free VPN in order to save money, rather than searching for the best VPN that will keep their data safe.

The truth is that these free VPN services are actually cashing in on their user base – usually by collecting user data and then selling it to the highest bidder. When you route your traffic through a free VPN app on your device, the VPN can easily collect your online activity and sell this to third parties and advertising networks.

⚠️Free VPN malware
“Over 38% of [free VPN apps] contain some malware presence…”
CSIRO study

⚠️Free VPN tracking
“We identified the presence of at least one tracking library in 75% of the free VPN apps claiming to protect users’ privacy.”
CSIRO study

⚠️Third party access to your data
Once your data is collected by the free VPN, it can then be sold or transferred
to third parties, for profit.

⚠️Stolen bandwidth
Some businesses are also using free VPNs to steal user bandwidth and
reselling it to third parties.

⚠️Browser hijacking
Another way that free VPN services can make money off their users is through browser hijacking. This is when the VPN hijacks and redirects your browser to partnership websites
without your permission.

⚠️Free VPN data leaks
A good VPN should secure and encrypt all of the traffic between
your device and the VPN server.

👉In testing over 280 different free VPNs,
the CSIRO study found

❗️ 84% of free VPNs expose the user’s real, globally-unique IPv6 address
❗️ 66% of free VPNs leak DNS requests, thereby exposing the user’s browsing history and location

Conclusion on free VPN services

Unfortunately, the free VPN scam does not show any signs of letting up. More people are turning to VPN services in response to censorship, content blocks, and concerns over privacy and security – and free VPNs are taking advantage of this trend.

While awareness about these risks continues to grow, the Google Play and Apple stores are still loaded with hundreds of malicious and invasive free VPN appsmany of them with excellent ratings from naive users. Even worse, many of these VPNs are operating from dubious overseas jurisdictions, particularly China, which do not recognize Western privacy laws and regulations.

Source and much more info at: https://restoreprivacy.com/free-vpn/

#privacy #tools #security #freevpn #why
📡 @cRyPtHoN_INFOSEC_DE
📡 @cRyPtHoN_INFOSEC_EN
Forwarded from cRyPtHoN INFOSEC (EN)
Privacy International's data interception environment

This toolkit is built around a flaw that exists in the trust paradigm used extensively on the Internet. When secure connections are established such as HTTPS, the client checks against an internal store of "trust anchors" in its "trust store" known as certificate authorities (or CAs for short). CA's exist in most operating systems through a number of methods, predominantly commercial agreements. This toolkit introduces a CA that we add to the "trust store" (see step 5 and 6 above) which allows us to intercept secure traffic in transit, because the client now trusts this CA in addition to the preconfigured ones.

https://github.com/privacyint/appdata-environment-desktop/blob/master/README.md#privacy-internationals-data-interception-environment

#privacy #tools #mitm
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Forwarded from cRyPtHoN INFOSEC (EN)
Lynis – Open Source Security Auditing & Pentesting Tool – A Detailed Explanation

Lynis is an open source security auditing tool. Its main goal is to audit and harden Unix and Linux based systems. It scans the system by performing many security control checks. Examples include searching for installed software and determine possible configuration flaws.

Many tests are part of common security guidelines and standards, with on top additional security tests. After the scan, a report will be displayed with all discovered findings. To provide you with initial guidance, a link is shared with the related Lynis control.
https://github.com/CISOfy/lynis

Read Via Telegram

#linux #tools #security
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
WebBundles Harmful to Content Blocking, Security Tools, and the Open Web (Standards Updates #2)

This is second in a series of blog posts describing new and proposed web standards and how they support or threaten web privacy.

In a Nutshell…

Google is proposing a new standard called WebBundles. This standard allows websites to “bundle” resources together, and will make it impossible for browsers to reason about sub-resources by URL. This threatens to change the Web from a hyperlinked collection of resources (that can be audited, selectively fetched, or even replaced), to opaque all-or-nothing “blobs” (like PDFs or SWFs). Organizations, users, researchers and regulators who believe in an open, user-serving, transparent Web should oppose this standard.

While we appreciate the problems the WebBundles and related proposals aim to solve,[1] we believe there are other, better ways of achieving the same ends without compromising the open, transparent, user-first nature of the Web. One potential alternative is to use signed commitments over independently-fetched subresources. These alternatives would fill a separate post, and some have already been shared with spec authors.

The Web Is Uniquely Open, and URLs Are Why

The Web is valuable because it’s user-centric, user-controllable, user-editable. Users, with only a small amount of expertise, can see what web-resources a page includes, and decide which, if any, their browser should load; and non-expert users can take advantage of this knowledge by installing extensions or privacy protecting tools.

The user-centric nature of the Web is very different from most application and information distribution systems. Most applications are compiled collections of code and resources which are difficult-to-impossible to distinguish and reason about. This difference is important, and is part of the reason there are many privacy-protecting tools for the Web, but very few for “binary” application systems.

At root, what makes the Web different, more open, more user-centric than other application systems, is the URL. Because URLs (generally) point to one thing[2], researchers and activists can measure, analyze and reason about those URLs in advance; other users can then use this information to make decisions about whether, and in what way, they’d like to load the thing the URL points to. More important, experts can load https://tracker.com/code.js, determine that it’s privacy-violating, and share that information with other users so that they know not to load that code in the future.

👀 👉🏼 https://brave.com/webbundles-harmful-to-content-blocking-security-tools-and-the-open-web/

#brave #webbundles #contentblocking #security #tools
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
7-Zip developer releases the first official Linux version

An official version of the popular 7-zip archiving program has been released for Linux for the first time.

Linux already had support for the 7-zip archive file format through a POSIX port called p7zip but it was maintained by a different developer.

As the p7zip developer has not maintained their project for 4-5 years, 7-Zip developer Igor Pavlov decided to create a new official Linux version based on the latest 7-Zip source code.

Pavlov has released 7-Zip for Linux in AMD64, ARM64, x86, and armhf versions, which users can download at the following links:

👉🏼 7-Zip for 64-bit Linux x86-64 (AMD64)
👉🏼 7-Zip for 64-bit Linux ARM64
👉🏼 7-Zip for 32-bit Linux x86
👉🏼 7-Zip for 32-bit Linux armhf

This first version of 7-Zip for Linux is released as a console application and has similar, but not identical, command-line arguments as p7zip.

https://sourceforge.net/p/sevenzip/discussion/45797/thread/cec5e63147/

https://www.bleepingcomputer.com/news/software/7-zip-developer-releases-the-first-official-linux-version/

#7zip #sevenzip #official #linux #tools
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Get off Big Tech tools + NoGoolag Alternatives lists

Below are recommendations for genuinely good, helpful, non-toxic
tools. We need alternatives to Big Tech platforms that continually show a shocking lack of respect for users, communities, even democratic society.

💡 Sections

Best search engine

Best email provider

Best web browser

Best mobile device

Best messaging apps

Best ad blocker

Best VPN

Best analytics platform

Best bookmarking service

Best password managers

Best videoconference platform

Best visual search engines

Best music platform

Best tech podcasts (New: April 7, 2021)

Best places to buy a book

Alternative internet providers

Non-toxic social network

Other lists of tech alternatives

💡 There are alternatives to the toxic Big Tech monopolies, and it's important to make the right choices: both to have a better experience online, and to support the teams making superior tools.

https://goodreports.com/

💡 NoGoolag Alternatives lists:
https://t.me/NoGoolag/3319

#alternatives #BigTech #tools
📡 @nogoolag 📡 @blackbox_archiv
Ahmia (https://ahmia.fi) is a clearnet search engine for Tor's hidden services. By providing a search engine for what many call the "deep web" or "dark net", Ahmia makes onion services accessible to a wide range of people, not just Tor network early adopters.

TorBot is an OSINT tool with the main objective is to collect open data from dark web and with the help of data mining algorithms, collect information and produce an interactive tree graph.

#Tor #DarkWeb #OSINT #tools

https://github.com/DedSecInside/TorBot