why are those data leaks problematic? because scammers and spammers will use this data to even better scam (social engineer) the affected users that is why it is essential to give those platforms (if the user needs them) as little […]
computers are no way perfect: the rise of the machines: who is scared of killer robots? who is scared of doctors, judges and police blindly trusting in AI and computer output? “we are driving in (heavy) rain right now with […]
the task at hand ought to be a simple one… the user has a data table of some sort (a Excel sheet). and wants only unique data sets (no duplicates) in a certain column theoretically Libre Calc can do that, […]
Drei Krankheiten: erfolgreich kaputt gespart: schlechte Bezahlung: im Vergleich mit anderen EU-Ländern und auch USA steht Deutschland schlecht da was die Entlohnung von Ärzte an geht auch schlechter als Japan und gar Italien (!) das ist vermutlich auch mit ein […]
Cancer is a very depressing topic. We all have cancer every day, but our body has various repair mechanisms that usually prevent cancer. From the medical perspective, there are (still) not good methods for fighting cancer. A new hope arises […]
contains advertisement. to be honest, it is hard to keep up the speed at which cyber incidents are reported. here is the latest take on “Russian IT Sec Updates”. have phun! SecurityLab, [28.09.20 08:20] Last month, TikTok developers rolled […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ data google tries to collect from users: (it is probably only the tip of the iceberg) what if – instead of security – Google […]
Tor is easier to use than ever just get the tor bundle – it is tor bundled with firefox https://www.torproject.org/download/ Is Tor essentially an NSA honeypot? in other words: is the NSA running a lot of (modified to their tracking […]
As with all hot debated topics: Linus Torvald’s “show me the source” in this case, the source of one’s informations (always give the source!) is IMPORTANT for the information’s credibility. It is absolutely vital in science to give all sources […]
this really raises the question: the mobile (complete computer) phone (number) as key to everything? is it a good idea to rely on smart phones (that are essentially a very small laptop and a cellular modem) and phone numbers to […]
now WITH SPICY COMMENTS X-D SecurityLab, [22.12.19 12:40] A Twitter user using the alias 08Tc3wBB created tfp0-an exploit that allows you to jailbreak the latest iPhone models with IOS 13.3. The functionality of the exploit has already been confirmed by […]
apologize! games = windows, still ? (although there are 6000 steam games running on linux) the very first “Open Source GPU” is in the making: https://www.crowdsupply.com/libre-risc-v/m-class “The Libre RISC-V M-Class is a RISC-V chip that is libre-licensed to the bedrock. […]
i really like virtualbox and i think it has great potential, what i do not like SOOO much is the CIA’s involvement with Oracle. “Larry Ellison Is A Billionaire Today Thanks To The CIA” (src) VirtualBox is mostly GPL 2.0 […]
Update: 2021-02 “A statement from the German Federal Criminal Police Office about their participation in Operation Ladybird said prosecutors seized 17 servers in Germany that acted as Emotet controllers.” and many bars of gold and cash were seized in Ukraine… […]
Why is quantum computing important: optimization Update: Google claims to have reached quantum supremacy The tech giant unveiled its x-quantum computer chip Bristlecone in March 2018 (src: cnet) original nasa paper: https://drive.google.com/file/d/19lv8p1fB47z1pEZVlfDXhop082Lc-kdD/view book: https://deepai.org/machine-learning/researcher/eleanor-g-rieffel https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262015064 Scott’s Supreme Quantum Supremacy FAQ! […]
don’t be evil “Google controls about 62% of mobile browsers, 69% of desktop browsers, and the operating systems on 71% of mobile devices in the world. 92% of internet searches go through Google and 73% of American adults use YouTube. […]
scroll down for ENGLISH: ) OMG! Da die IT von Baltimore sich einen Ransome-Virus eingefangen hat, können die Bürger ihre Steuern und ihre Blitzer-Tickets nicht zahlen! Wunderbar! 🙂 Mit welchem Aufwand man rechnen muss, wenn man sich von der Digitalisierung […]
2017 erster Testlauf, jetzt werden alle Ärzte gezwungen den direkten Zugriff der Krankenkassen auf mehr Daten zu ermöglichen. VersichertenStammDatenManagement erst ab 2019 Pflicht eine weitere Auflage des Gesetzgebers für Ärzte – bis dann und dann das und das umsetzen – […]
looks awesome 🙂 update: how to root with Magisk and install a firewall (scroll down and behave – slave of the digital dictatorship!) “Pretty much everything you do on the phone is data-mined by Google. The mic is on listening […]
Was in USA funktioniert ist bald auch bei uns. Kriminelle erbeuten/kaufen detailierte persönliche Informationen (Geburtsdatum, Mail-Passwörter, Kreditkartennummern) online und rufen das Opfer mit einer GEFÄLSCHTEN Telefonnummer an, die GENAU so aussieht wie die einer Bank und erzählen, “es hätte seltsame […]
“Thank you” i feel much safer now, that you know EVERYTHING about me, you, everybody. it is about influencing and directing the masses like a herd of cattle. https://en.wikipedia.org/wiki/Room_641A Room 641A is a telecommunication interception facility in the SBC Communications […]
Your mobile phone is giving away your approximate location all day long. This isn’t exactly a secret: It has to share this data with your mobile provider constantly to provide better call quality and to route any emergency 911 calls […]
70% of decision makers increase tech budget in 2018, slightly higher than 2017. top technologies: CyberSecurity (53%) Hardware upgrades (47%) cloud services (43%) software (40%) BigData Analytics (20%) Internet of Things (18%) 35% training employees 29% want to hire new […]
what to do to improve online privacy? use a privacy respecting DNS server by https://www.opennic.org/ for example: 195.10.195.195 (not google’s (8.8.8.8)) use Freifunk use a VPN such as: mullvad VPN https://mullvad.net/en/help/pricing-discounts/ https://mullvad.net/en/check/ Mozilla launched it’s own VPN service https://vpn.mozilla.org/ use tor […]
“If we want a better America we will have to build it ourselves” (Snowden, 2016) “it is not possible to get a fair trial in the USA under Espionage act from 1917” Snowden is NOT against surveillance: “If its specifically […]
to protect users’s privacy: NEVER GIVE IT YOUR WIFI PASSWORD! pros: integrates well with linux (plug into usb behaves like flashdrive) very power efficient reader cons: like Alexa, it’s a spying machine The kindle’s battery lasts very long up to […]
“Thinking is hard work and not worth the effort” (The Love Police) Ever wondered why WhatsApp is for free? It is a self-surveillance tool. Phones with closed-source wifi drivers are cheap. Because to know the last detail about you – […]
install firefox app and test it for free here: https://appr.tc/ When Browsers start to talk to each other – Open Source HTML5 based Web Video Audio Conferencing WebCam ScreenSharing – Collaboration over internet WebRTC (“Web Real-Time Communication“) enables applications such […]