if the user wants to know who or what is lurking behind the house… the user needs to view live streams of surveillance cams on GNU Linux. mplayer does the job nicely 🙂 (thanks all involved!) of course 99% of […]
“Better Than Nothing” Starlink-Beta started across the US & Canada Starlink: amazing but and also a bit “crazy” “On 15 October 2019, the United States Federal Communications Commission submitted filings to the International Telecommunication Union on SpaceX’s behalf to […]
contains advertisement. to be honest, it is hard to keep up the speed at which cyber incidents are reported. here is the latest take on “Russian IT Sec Updates”. have phun! SecurityLab, [28.09.20 08:20] Last month, TikTok developers rolled […]
what to do to improve online privacy? use a privacy respecting DNS server by https://www.opennic.org/ for example: 195.10.195.195 (not google’s (8.8.8.8)) use Freifunk use a VPN such as: mullvad VPN https://mullvad.net/en/help/pricing-discounts/ https://mullvad.net/en/check/ Mozilla launched it’s own VPN service https://vpn.mozilla.org/ use tor […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
what to do to improve online privacy? use a privacy respecting DNS server by https://www.opennic.org/ for example: 195.10.195.195 (not google’s (8.8.8.8)) use Freifunk use a VPN such as: mullvad VPN https://mullvad.net/en/help/pricing-discounts/ https://mullvad.net/en/check/ Mozilla launched it’s own VPN service https://vpn.mozilla.org/ use tor […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ what if – instead of security – Google wants mass surveillance and a direct uplink to the US-Pentagon to blow all “terrorists” (basically anyone […]
Worldwide mass surveillance by Germany’s intelligence (BND) service declared unconstitutional in landmark ruling on press freedom in the digital age “The ruling, the most far-reaching in this field in the past 20 years, sends an important signal for the protection […]
Orwell left one final warning: 1984: “don’t let it happen” (alternative version) this is a “backup of the backup” that archive.org has taken from theorwellreader.com (offline since 2019) src: https://web.archive.org/web/20180825174545/http://www.theorwellreader.com/#content unfortunately archive.org did not backup the pictures 🙁 “Hrm. Wayback […]
guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users of a system are in constant potential danger of having an […]
Tor is easier to use than ever just get the tor bundle – it is tor bundled with firefox https://www.torproject.org/download/ Is Tor essentially an NSA honeypot? in other words: is the NSA running a lot of (modified to their tracking […]
git was initially written by Linus Torvalds on the idea: how to create source code management system that does not suck. source code management is very useful when the developer team is larger than > 1 developer. it allows fast […]
probably THE most important film, that every school kid (of the age of 16) should have seen (highly recommend to cut out the violent scenes) 1984 mass surveillance: for a better world? as people might have noticed: privacy is survival […]
https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/ hm…. let me think where one has seen this before: TELEGRAM! Zoom’s service is “not suited for secrets” “The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability […]
this really raises the question: the mobile (complete computer) phone (number) as key to everything? is it a good idea to rely on smart phones (that are essentially a very small laptop and a cellular modem) and phone numbers to […]
either: or: Richard’s hardware: “if we could not replace a machine’s operating system with a free one, we replaced the machine instead.” (src: https://www.gnu.org/gnu/thegnuproject.html) Libre booted (BIOS with Linux overwritten) Thinkpad T400s running Trisquel GNU/Linux OS. (src: https://stallman.org/stallman-computing.html) LibreBooting the […]
“first Benchmarks of the KX-6780A. China just developed it’s own x86 CPU with the performance of a Intel Core i7 2600 (4C/8T, 1,401 points) from 2011 the eight-core CPU-Z achieves 171 points in single-core and 1,396 points in Multi-Core comparison […]
now WITH SPICY COMMENTS X-D SecurityLab, [22.12.19 12:40] A Twitter user using the alias 08Tc3wBB created tfp0-an exploit that allows you to jailbreak the latest iPhone models with IOS 13.3. The functionality of the exploit has already been confirmed by […]
very very nice actually. visit the site: https://www.wieistmeineip.de/ 1) setup an ssh server 2) make sure u can login with the given user ssh -N -D 9090 -p22 user@yourserver.com now config firefox proxy like this: click “ok” then visit the […]
SecurityLab, [25.11.19 15:44] The Creator of the world wide web Tim Berners-Lee (Tim Berners-Lee) presented an action plan to protect the network from political manipulation, fake news, privacy violations and other harmful influences. Tim Berners-Lee: “control of information is hugely […]
“NSO Group had been exploiting a vulnerability in its software that allowed them to compromise a phone simply by targeting it with a voice call that planted malware on the device capable of silently stealing a victim’s messages. Now, in […]
about MAC address(es) not every switch has an IP assigned (if it has no web management interface, it does not need to) but it will have a MAC address. MAC address are per vendor and per device unique identifiers that […]
just reinstalled (of course with LVM + encrypted partition) the giada f300 (very fine machine unfortunately “they” stopped building it). screw Realtek, what one wants is should work out of the box with recent Linux kernels on Open Source drivers […]
Warum VoIP? Viele Anbieter von LTE z.B. bieten gar keine Festnetz-Telefonie an, sondern nur Internet. (das zum Teil (nicht günstiger) aber schneller (und schnurloser via Handy-Netz) als die Telekom (4G/LTE/UMTS)). D.h. man braucht dann noch einen weiteren Anbieter der die […]
don’t be evil “Google controls about 62% of mobile browsers, 69% of desktop browsers, and the operating systems on 71% of mobile devices in the world. 92% of internet searches go through Google and 73% of American adults use YouTube. […]
My Guide to free as possible do it yourself laptop, tested an worked on two x60s: 1. get a Lenovo x60s https://duckduckgo.com/?q=ebay+Lenovo+x60s 2. a fresh battery (they still produce replacement batteries) https://duckduckgo.com/?q=ebay+Lenovo+x60s+battery 3. get Atheros ar5b95 Wireless WiFi g42 cq42 […]
ONLY BUY FROM HARDWARE VENDORS THAT SUPPORT OPEN SOURCE! (release the sources for their drivers and documentation for their hardware) had to swap the Wifi card on both LibreBooted Lenovo x60s for Atheros ar5b95 Wireless WiFi WLAN Karte für HP […]
google’s security lab “project zero“ has made itself a name. (you can subscribe to their rss feed with thunderbird.) Posted by Ben Hawkes, Project Zero (team lead) (2019-05-15) Project Zero’s team mission is to “make zero-day hard”, i.e. to make […]
“The cost to companies from malware and “malicious insider”-related cyberattacks jumped +12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture and the Ponemon Institute.” src: helpnetsecurity.com logical consequence: stop […]