"Talk is cheap. Show me the code."
—Linus Torvalds (Creator of Linux)
Mark Zuckerberg's new "smart glasses" can be used to identify an individual and obtain access to their personal information, including their home address.
Who is the father of computer security?
August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security.”
YouTube Starts Shadowbanning Accounts for Using VPN ❌
Shadowbanning results in content being unavailable when trying to watch a video .
These restrictions apply to both the web version and mobile apps , but the platform makes no official statements about this .
Experts associate this measure with the fight against the manipulation of paid views . 🤷🏼♀️
☝🏻The shadowban cannot be bypassed using VPN , incognito mode or repeated logins; the only way out for users is to create backup accounts .
Technical problems have been observed since August , and support volunteers warn that the ban is not expected to be lifted.
Always have a comma in your password, that way if it is part of a leak it will break the CSV file.
🇨🇳🗣 Hayman Capital Management founder Kyle Bass (292,000 followers on X) said Satoshi Nakamoto was a special Chinese intelligence operation
https://x.com/Jkylebass/status/1841457431605313538?t=TkJu9e8WNdXDdD8155Hk2g&s=19
A new HBO documentary 'Money Electric: The #Bitcoin Mystery' claims to have cracked the true identity of the pseudonymous creator of Bitcoin, Satoshi Nakamoto—Politico
The big reveal is set to air next Wednesday at 2 a.m. CET (Tuesday at 9 p.m. EST).
https://www.youtube.com/watch?v=iSF0KGsFuI8
I think we make a hell of a case in the film, and I think that who we land on is unexpected and is going to result in a fair amount of controversy. I think that people are going to debate it regardless of how strong of a case we made, and that’s fine. That’s the nature of this space. We had a lot more evidence than we were able to include in the film.
But it’s going to be up to the audience—how they view the case, how they view the evidence, and whether or not they’re convinced.
In five years, nostr:npub13qrrw2h4z52m7jh0spefrwtysl4psfkfv6j4j672se5hkhvtyw7qu0almy made just $750 in royalties from over 500,000 streams through apps like Spotify.
In one year, she made 21 million sats (over $13,000) through apps like Fountain and Wavlake.
Adapt and adopt Bitcoin - or else.
👏🏻
Kopia is an open-source backup tool with E2E encryption and deduplication.
Unlike traditional tools , it allows you to back up individual files and directories rather than creating complete system images .
Both GUI and command line versions are available , making it convenient for both professionals and casual users .
AI is not going to replace humans.
Humans who use AI are going to replace ordinary humans.
The sad part is that 33% of humans do not have internet access.
#AI = 11,000-year-old human slavery will be back!
GM #Nostr 🫂💜⚡
People who are not trustworthy are the ones who are most suspicious about everything.
🌐🔐 Personal data protection during investigations for OSINT specialist.
Part 1 - Traffic tunneling.
Traffic tunneling in the context of data protection is necessary to hide the real IP address of your computer and many other network data about your connection + in our case it is also necessary to encrypt traffic from the Internet provider and everyone who is "sitting on the wire".
📡 We will need a VPN + VPN bundle.
❓ Why not just VPN?
By means of a request to the provider/SORM - it is possible to obtain data about who was connected to this IP address (VPN) at that time and in response to this request you will be given away, and you will not even have to request data from the VPN itself or the data center where this VPN is located - deanonymization will occur bypassing this.
Why not links with anonymizers like TOR? (VPN + TOR, VPN + Lokinet, VPN + i2p, etc.).
1. Such connections often provide low connection speeds , which is not suitable for online investigations.
2. Such anonymizers (TOR, i2p, Lokinet) often have a "dirty" IP address - therefore, with such an IP address, it will be impossible to register accounts for investigations, and sometimes you will not even be able to simply access a website with such IP addresses.
3. Doubtful privacy of transmitted data - often the output nodes of such anonymizers are monitored for the purpose of intercepting data/deanonymization/theft of cryptocurrency, etc. Accordingly, the fact that you are digging on someone may become known to someone else.
So, we have decided on the type of protection.
Let's move on.
⚙ How to set up?
There are 2 options:
1. Special clients of VPN services that have a double VPN function.
For example, the VPN provider iVPN has the ability to enable double VPN mode directly from the official client.
2. 1 VPN on the host - 2 VPN on the virtual machine for work.
⁉️ How to use?
Each investigation has its own IP address.
You can't use the same IP address for different investigations - otherwise the investigations can be linked together and it will be easy to understand that the same person is behind them all.
⛓💥 Killswitch is a function that if the VPN is turned off, then the entire Internet on the computer is turned off. The Internet bypassing the VPN does not work. Be sure to enable this function in your VPN client (iVPN also has this function).
Before starting the investigation, visit the site - https://browserleaks.com it will show how your computer looks from the site. There you can check the IP address (so that it is from the second VPN) and check some device fingerprints. This is necessary for a check before the investigation - so as not to forget to turn on something.
What’s your age and how often do you talk to your parents?
User Privacy in Linux
Soon™ is Now! Sidekick is officially out in the wild and ready to join you on your private crypto adventures. Go find your forgotten older phone and visit sidekick.monerujo.app for all the info. 🔐📱📲💸
#Monero
🗺 New way to use maps
When talking about maps and computers, the truth is that it was enough to make you cry in terms of privacy.
All we had was the OpenStreetMap website, and yes, it worked but admittedly it wasn't particularly "attractive" in terms of interface.
But the already well-known OsmAnd, creators of the map application for the phone OsmAnd+ have launched their web version
This web version is now available and adds even more tools and possibly development in this aspect.
Don't be overwhelmed by despair, we have tools
OsmAnd Web: https://osmand.net/map
There's been a lot of news related to anonymity this month.
The guys from the special services of different countries apparently came back from vacation and began to massively silence all those who were undesirable.
News about timing attacks on TOR, mass searches of exit node owners, official announcement that Telegram has started to give out data about its users and many other interesting news.
Well, anonymity is becoming more and more luxurious every year.
Yesterday you could write all sorts of, let's say, objectionable things from a TG account and remain anonymous.
Today you can install VirtualBox with Whonix and think that you have protected yourself very well, although in fact, under VirtualBox every second person has an exploit, and TOR users are not so difficult to deanonymize.
And tomorrow you will see in the news about hardware backdoors that send data somewhere and reflashing the device will not help you (Spoiler - this is already possible and even quite possibly actively works, just few people talk about it. Hello Intel ME and AMD PSP).
Anonymity is a luxury. Anyone who tells you otherwise is lying to you or doesn't understand the subject.
To achieve a high level of anonymity on the network, you will need very good knowledge of information security, and very specific knowledge, which is usually not taught in educational institutions. You need to build a whole set of measures to counter attacks on your privacy, security and anonymity on the network.
nostr:note13vgdz2jemm9tw9qad73mx8e6jaud5ly4unfqcv8ady65fcc06klq7pyelh
📱 Telegram could give away your IP address
Recently, Pavel Durov, founder of Telegram, made some statements on his telegram channel as usual, but something stood out that caught people's attention:
We have made it clear that IP addresses and phone numbers of those who violate our rules may be disclosed to relevant authorities in response to valid legal requests.
In reference to Telegram's own terms and conditions.
He also points out:
Telegram Search is meant for finding friends and discovering news, not promoting illegal products. We won't let bad actors compromise the integrity of our platform
Many now argue that Telegram has therefore changed after the arrest of Pavel Durov.
The reality is that ANY COMPANY, and I repeat, any company you use will have to obey the rule of law.
And in the event of any legal request, your IP address and/or telephone number will be provided if applicable.
Although you can protect yourself with a good VPN /TOR and/or a temporary phone number.