NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Download Telegram
Forwarded from Libreware
disable-trackers-from-recovery.pl
23.2 KB
Modified perl script of @ robertoprubio to use the local file

perl disable-trackers-from-recovery.pl --exodus-trackers-pathname <pathname>

where <pathname> refers to pathname of the local exodus file that you've downloaded from https://etip.exodus-privacy.eu.org/trackers/export

#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
Spy pixels in emails have become endemic

The use of "invisible"
tracking tech in emails is now "endemic", according to a messaging service that analysed its traffic at the BBC's request.

Hey's review indicated that two-thirds of emails sent to its users' personal accounts contained a "spy pixel", even after excluding for spam.

Its makers said that many of the largest brands used email pixels, with the exception of the "big tech" firms.

Defenders of the trackers say they are a commonplace marketing tactic.

And several of the companies involved noted their use of such tech was mentioned within their wider privacy policies.

‼️ Emails pixels can be used to log:

if and when an email is opened

how many times it is opened

what device or devices are involved

the user's rough physical location, deduced from their internet protocol (IP) address - in some cases making it possible to see the street the recipient is on

This information can then be used to determine the impact of a specific email campaign, as well as to feed into more detailed customer profiles.

Hey's co-founder David Heinemeier Hansson says they amount to a "grotesque invasion of privacy".

https://www.bbc.com/news/technology-56071437

#spy #pixels #email #invisible #tracking #bigtech #BigData #thinkabout
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
How to turn off the ANDROID TRACKING SERVICES [ROOT required]

Let's start:

👉🏼 Download Termux from Google Playstore and install and open it.

Install Packages:

pkg install aapt jq tsu curl -y

( Asks for root privileges, allow this ❗️👇🏽)

cd /data/data/com.termux/files/usr/bin
cp -R aapt /system/xbin/aapt
cp -R jq /system/xbin/jq
cp -R curl /system/xbin/curl
chmod +x /system/xbin/aapt
chmod +x /system/xbin/jq
chmod +x /system/xbin/curl

👉🏼 Download the script from here:
https://drive.google.com/drive/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE

💡 (Please always use the latest version)

👉🏼
Unpack to 👉🏼 /sdcard and then enter the following command...:

termux-setup-storage (grant permission)

👉🏼 Then enter:
 cd /sdcard

(with root) 👇🏽

tsu

bash DisableTrackers.sh sys (Add ❗️)

After that, just reboot your device and the job is done.

#root #android #tracking #services #guide
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Google says once third-party cookies are toast, Chrome won't help ad networks track individuals around the web

Notes an 'erosion of trust' – gee, wonder who could be responsible for that...

Google says it will not come up with new ways to track individual netizens as they browse the web once Chrome phases out third-party cookies, commonly used for loosely observing people's online activities.

In effect, the browser will not provide ad networks – and Google runs a very large one – alternative identifiers that can be used to follow individuals around the web, though it's not clear exactly how this will impact Google, which already has a variety of ways to shadow internet users.

Early last year, Google announced a plan to kill off third-party cookies, often used to associate you with the websites you visit so that adverts tailored to your interests can be shown on pages. Google made the move after other major browser makers decided to block third-party cookies by default because the little scraps of data can be abused to subvert privacy, and after regulators made it clear they had concerns about ad tech giants Google and Facebook.

Google aims to replace third-party cookies with its Privacy Sandbox, an umbrella term for a set of proposals from Google and other ad tech firms, to allow behavioral ad targeting to continue without individualized tracking identifiers.

Instead, the ad goliath intends to target broad groups of netizens defined by a common interest – eg, jazz fans – through a system called FLoC (Federated Learning of Cohorts), and at narrower groups defined by past interest-based interaction, through a scheme called FLEDGE (First "Locally-Executed Decision over Groups.")

Google plans to start testing FLoC-based cohorts publicly via origin trials in next month's release of Chrome and to make testing available for advertisers in Q2.

The idea has alarmed the ad industry, which isn't keen to give up the ability to track people and has proposed alternatives like a new identifier based on data like email addresses, normally classified as personal information.

https://www.theregister.com/2021/03/03/google_internet_tracking_pledge/

#google #DeleteGoogle #internet #tracking #advertising #cookies #chrome #browser #thinkabout #why
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
How to Tell Which Emails Quietly Track You

Everyone sends emails now: political parties, your book club, freelance journalists, the social networks you're signed up to, your parents, that online store that you only bought one item from a decade ago, and many, many more.

What do a lot of those email senders have in common? They want to know whether the messages they send you are being opened, and there are a variety of tools available to help them do just that—tools that aren't all that hard to use.

A tracking pixel, embedded somewhere in the email, is how most people monitor whether an email gets opened. Once the tiny, hidden single-pixel image is loaded, it reports back to base. Their use across emails is now up to "endemic" levels according to some experts.

Tracking pixels can report the times and dates their associated email was opened, as well as the location of the device used, and the email client involved. That's a lot of data to feed back to a third-party that you might not know much about.

https://www.wired.com/story/how-to-tell-which-emails-track-you/

#email #tracking #privacy
Data protection activist Max Schrems: Google illegally tracks Android users

Facebook watchdog Max Schrems is taking on Google. He has filed a complaint in France accusing Google of massive violations of the GDPR - specifically,
tracking via advertising ID.

Austrian privacy activist Max Schrems has filed a complaint against Google in France with his privacy association Noyb, alleging that the U.S. tech giant is illegally tracking the use of Android smartphones without the consent of their users. He bases his accusation on the unique advertising ID that every Android smartphone carries.

Accusation: Google's advertising ID allows tracking without consent

These IDs allow Google and its advertisers to track the surfing behavior of Android users in order to target them with suitable advertising. Apple has very similar technology with its Identifier for Advertisers (IDFA).

In the complaint filed Wednesday with France's data protection authority, Schrems accuses the tech giant of conducting "illegal operations" that violate EU data protection laws when creating and storing the advertising ID. In particular, he arguably sees the requirement for prior consent violated.

Schrems is calling on the data protection authorities to launch an investigation against Google. This should reveal Google's tracking practices and ultimately force the company to behave in a DSGVO-compliant manner. In addition, Schrems is calling for the imposition of hefty fines in the event that the authority finds evidence of misconduct.

"Trail of powder" allows detailed tracking

‼️ "These hidden identifiers on your phone allow Google and third parties to track users without their consent," Schrems' privacy lawyer Stefano Rossetti tells the Financial Times, adding, "It's like having a powder on your hands that leaves a trail of everything you do on your phone - from whether you swiped right or left to what song you were listening to."

Google has not yet commented on the allegations. Apple has just impressively proven that Schrems' concerns are not without substance by wanting to make the use of the advertising ID subject to consent in the upcoming iOS update.

(Paywall) https://www.ft.com/content/4617cc99-3ed2-49e1-b97f-db4f1b45b5db

https://t3n.de/news/google-trackt-android-1371162/#%E2%80%9ESpur_aus_Puder%E2%80%9C_erlaubt_detailliertes_Tracking

#dataprotection #android #advertising #id #user #tracking #illegal #gdpr #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Use the DuckDuckGo Extension to Block FLoC, Google’s New Tracking Method in Chrome

Google has created a new
tracking method called FLoC, put it in Chrome, and automatically turned it on for millions of users.

💡 FLoC is bad for privacy: It puts you in a group based on your browsing history, and any website can get that group FLoC ID to target and fingerprint you.

You can use the DuckDuckGo Chrome extension (pending Chrome Web Store's approval of our update) to block FLoC's tracking, which is an enhancement to its tracker blocking and directly in line with the extension's single purpose of protecting your privacy holistically as you use Chrome.

DuckDuckGo Search (via our website duckduckgo.com) is now also configured to opt-out of FLoC, regardless if you use our extension or app.

https://spreadprivacy.com/block-floc-with-duckduckgo/

https://www.theverge.com/2021/4/9/22376110/duckduckgo-privacy-floc-block-chrome-extension-advertising-tech

#ddg #DuckDuckGo #google #FLoC #chrome #browser #ad #targeting #tracking #cookies #DeleteGoogle
📡 @nogoolag 📡 @blackbox_archiv
FLoC Block

Prevent Federated Learning of Cohorts aka FLoC ad-targeting code from running in Chrome.

FLoC, short for Federated Learning of Cohorts, is the new mechanism used by Google Chrome to group users into buckets based on their interests. You can read more about it here and why Brave and some other browsers have blocked it here. EFF did some analysis as well.

💡 How does this Chrome Extension help?

If you HAVE to use Chrome but don't like the idea of being grouped into a bucket (aka cohort) based on the websites you visit, this extension is a simple way to prevent FLoC from divulging your "cohort id" to websites. The extension removes document.interestCohort() from every page so that a website cannot get your cohort id.

💡 How do I install this extension?

👉🏼 Download
flocblock.zip from https://github.com/ShivanKaul/flocblock/releases/latest. Direct link: https://github.com/ShivanKaul/flocblock/releases/download/v0.0.1/flocblock.zip

👉🏼 Extract extension.

👉🏼 Follow the instructions to load into Chrome.

https://github.com/ShivanKaul/flocblock

#floc #block #chrome #browser #tracking #tool
📡 @nogoolag 📡 @blackbox_archiv
Developers, it’s time for you to choose a side - Clean up the web!

Will you help rid the web of privacy-invading
tracking or be complicit in it?

🚮
Remove third-party scripts from Google, Facebook, etc.
This includes Google Analytics (one of the most prevalent trackers in the world), YouTube videos, Facebook login widgets, etc.

These scripts enable people farmers like Google and Facebook to track people across the web as they go from site to site. If you embed them in your site, you’re complicit in enabling this tracking.

And yes, that absolutely includes fucking Google AMP.

https://cleanuptheweb.org/

👉🏼 Read as well: Nobody is flying to join Google’s FLoC - #Brave, #Vivaldi, #Edge, and #Mozilla are all out

https://www.theverge.com/2021/4/16/22387492/google-floc-ad-tech-privacy-browsers-brave-vivaldi-edge-mozilla-chrome-safari

#cleanuptheweb #floc #google #DeleteGoogle #facebook #DeleteFacebook #tracking #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Tracking the WhatsApp habits of 5000 random Smartphones

In the previous blog post, we have seen that this is quite simple to hack the WhatsApp online status of a contact. A simple Online or last seen yesterday at 19:00 insight can be reverse engineered to leak phone habits at a couple of seconds accuracy.

‼️ There is an even more silly thing not mentioned yet:
You can track any mobile phone ! So let’s play and scale to track 5000 random numbers.

Like previously, I am sharing the source code as a PROOF OF CONCEPT. You can jump straight to the end if you are more curious about the results than by the technical stuff I’m about to resume. We are reusing the previous code with Node.js, Puppeteer & Grafana.

https://jorislacance.fr/blog/2021/04/16/whatsapp-tracking-2

💡 Hack the WhatsApp status to track contacts
https://jorislacance.fr/blog/2020/04/01/whatsapp-tracking

💡 How a WhatsApp status loophole is aiding cyberstalkers
https://t.me/BlackBox_Archiv/2018

💡 Sudden New Warning Will Surprise Millions Of WhatsApp Users
https://t.me/BlackBox_Archiv/1987

💡 All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers (PDF)
https://t.me/BlackBox_Archiv/2042

#DeleteWhatsapp #user #tracking #whatsapp #thinkabout #change
📡 @nogoolag 📡 @blackbox_archiv
GitHub blocks Google FLoC tracking

Yesterday, GitHub announced rolling out a mysterious HTTP header on all GitHub Pages sites.

GitHub Pages enables users to create websites right from within their GitHub repository.

And it turns out, this header, now being returned by GitHub sites, is actually meant for website owners to opt-out of Google FLoC tracking.

BleepingComputer also noticed the entire github.com domain had this header set, indicating GitHub did not want its visitors to be included in Google FLoC's "cohorts" when visiting any GitHub page.

https://www.bleepingcomputer.com/news/security/github-blocks-google-floc-tracking/

#github #goolag #FLoC #tracking
Facebook and Instagram overlays in iOS stoke fears about apps being free of charge

Through grinding teeth, the social media market leader is implementing iOS 14's new privacy requirements. But it can't refrain from a warning finger in the process.

Facebook originally intended to use "educational screens" to reveal details about data usage. Now they seem to be part of a scaremongering campaign. The message: help keep Facebook and Instagram free, and give us access to your data! The hints seem to be a new way to fight back against Apple's tracking protection in iOS 14.5. Meanwhile, the company is enjoying great business, turning over $26.2 billion between January and March alone. The company had already announced that it will expect users to read page-long data protection declarations.

#facebook #DeleteFacebook #instagram #overlays #ios #ad #tracking
📡 @nogoolag 📡 @blackbox_archiv
#Germany stasi using "Covid #tracking data" and coronazi passports to hijack humans

It was the Luca App for Check-Ins in Restaurants and not the CoronaWarn App
Don't install these viruses

First is a private data miner the second is a state funded spyware
Apple is Still Tracking You Without Consent

In the current version of macOS, Monterey, on every system update on a system containing an M1 chip, such as all the new shiny/fast ARM (“Apple Silicon”) macs, the update process phones home to Apple to obtain a special boot signature, known in Apple jargon as a “ticket”.

It does this in a totally unencrypted fashion, over standard plaintext port 80 HTTP (the exact same protocol they banned for use by third party app developers in the App Store when transmitting private data like unique identifiers that serve as PII) to the host gs.apple.com. The HTTP request includes unchangable hardware unique identifiers (chip serial numbers known as ECIDs) that function as a supercookie, and it is visible to your local LAN, your ISP (or hotel or coffee shop), anyone monitoring the network backbones, and of course Apple.

This permits anyone listening to see the approximate location of the device, even if they are not proximate to it, because they can observe the client IP (which is equivalent to approximately city-level geolocation) and the serial number of the device.

Anyone watching the internet backbones and internet exchanges can see in which city each chip serial number (ECID) is located, and can see where they travel, as these updates are released several times per quarter. A new request is made on each system update, and users are prompted to enable automatic updates, enabling unattended tracking.

https://sneak.berlin/20220409/apple-is-still-tracking-you-without-consent/

#apple #tracking
New documents reveal ‘huge’ scale of US government’s cell phone location data tracking

The Department of Homeland Security (DHS) used mobile location data to track people’s movements on a much larger scale than previously known, according to new documents unearthed by the American Civil Liberties Union (ACLU).

It’s no secret that U.S. government agencies have been obtaining and using location data collected by Americans’ smartphones. In early 2020, a Wall Street Journal report revealed that both Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) bought access to millions of smartphone users’ location data to track undocumented immigrants and suspected tax dodgers.

However, new documents obtained by the ACLU through an ongoing Freedom of Information Act (FOIA) lawsuit now reveal the extent of this warrantless data collection. The 6,000-plus records reviewed by the civil rights organization contained approximately 336,000 location points across North America obtained from people’s phones. They also reveal that in just three days in 2018, CBP obtained records containing around 113,654 location points in the southwestern United States — more than 26 location points per minute.

https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking
#dhs #location #tracking