Eoin's Articles

Eoin's Articles

Now not only will it be impossible for users to log into your server (youself included) unless they know your SSH private key but anyone who does try will be banned for a day.

Ring adds end-to-end video encryption to its doorbells and security cameras at CES 2021

Ring adds end-to-end video encryption to its doorbells and security cameras at CES 2021

Ring has updated its policies since, including making privacy and security settings more accessible via a Control Center dashboard and introducing mandatory two-factor authentication.Customers using Ring's end-to-end encryption feature would need to decrypt the video before sharing it with police.

Ubiquiti tells customers to change passwords after security breach

Ubiquiti tells customers to change passwords after security breach

Image: Ubiquiti Networks Networking equipment and IoT device vendor Ubiquiti Networks has sent out today notification emails to its customers informing them of a recent security breach.According to Ubiquiti, the intruder accessed servers that stored data on users, such as names, email addresses, and salted and hashed passwords.

Millions of Social Profiles Leaked by Chinese Data-Scrapers

Millions of Social Profiles Leaked by Chinese Data-Scrapers

The leak stems from a misconfigured ElasticSearch database owned by Chinese social-media management company SocialArks, which contained personally identifiable information (PII) from users of Facebook, Instagram, LinkedIn and other platforms, according to researchers at Safety Detectives.

The Crypto-Keepers

The Crypto-Keepers

“Right away they started asking about Telegram, which made me worry,” says Durov, explaining that it didn’t take long for his early-morning visitors to get to the point: the FBI wanted to set up some kind of informal backchannel process that would enable Telegram to hand over data on particular users in the event of a terrorist threat; they even came prepared with official-looking documents in hand.

Ransomware Gang Collects Data from Blood Testing Lab

Ransomware Gang Collects Data from Blood Testing Lab

Apex Laboratory, which provides blood work at home for patients in New York City, Long Island and South Florida, has been hit with a ransomware attack that also resulted in patient data being stolen.

Exfiltrating Remaining Private Information from Donated Devices

Exfiltrating Remaining Private Information from Donated Devices

Here is a breakdown of all the devices I purchased: Device Type Number of Devices Bought Desktop or laptop computer 41 Removable media (such as flash drives and memory cards) 27 Hard disk 11 Cell phone 6 After buying the devices, I took them to my command center (a cool name for my basement) and began the data extraction process.

Meet Hyper, The World's First Completely Private, Decentralized Instant Messenger

Meet Hyper, The World's First Completely Private, Decentralized Instant Messenger

Elastos, a decentralized internet platform built with the security of Bitcoin's hashpower, today launched the world's first completely private, decentralized messaging app on its network, Hyper IM.The Hyper team said that the app will soon be available on desktop (like WhatsApp web and Telegram), and that file transfer functions for non-text messages.

Why I don't believe in encrypted mail providers anymore

Why I don't believe in encrypted mail providers anymore

In the case of Protonmail, another encrypted mail provider, you'll need to find OpenPGP keys and you're basically back to square one.Tutanota doesn't have any bulk tools but it's easy enough to just shift-click all the email in the desktop client and export to eml files.

Europol and the European Commission inaugurate new decryption platform to tackle the challenge of encrypted material for law enforcement investigations

Europol and the European Commission inaugurate new decryption platform to tackle the challenge of encrypted material for law enforcement investigations

This week Europol launched an innovative decryption platform, developed in close cooperation with the European Commission's Joint Research Centre.The new Europol Decryption Platform, funded by the European Commission, will allow us to further enhance our support for Member State investigations.

Amazon just started sharing your internet connection with your neighbors

Amazon just started sharing your internet connection with your neighbors

Amazon recently emailed Ring and Echo owners to let them know that they've been opted in automatically to its new Sidewalk initiative.Tap Account Settings , followed by Amazon Sidewalk .3.

Before Envelopes, People Protected Messages With Letterlocking

Before Envelopes, People Protected Messages With Letterlocking

To guard her final missive from prying eyes, the queen used a “butterfly lock”—one of hundreds of techniques catalogued by Dambrogio, collaborator Daniel Starza Smith, and their research team in a fast-growing dictionary of letterlocking.

CBP wants to create a facial recognition database of every non-US citizen traveler to the United States

CBP wants to create a facial recognition database of every non-US citizen traveler to the United States

U.S. Customs Border Protection (CBP) has filed a notice of proposed rulemaking (NPRM) that highlights their ongoing plans to create a facial recognition database with mugshots of all non-US citizen travelers.

Inside the French government’s mission to develop an encrypted messaging platform

Inside the French government’s mission to develop an encrypted messaging platform

Although DINUM wasn’t looking for an open source solution specifically, it discovered Matrix; a decentralised communication protocol developed with interoperability and privacy in mind.

Microsoft and OpenAI partner to propose digital transformation of export controls

Microsoft and OpenAI partner to propose digital transformation of export controls

For these reasons, restricting the problematic users and uses of these technologies is the more targeted and balanced of traditional export controls approaches, as it protects national security interests while preserving beneficial uses and tech leadership.

Police in Mississippi To Pilot a Program to Live-Stream Amazon Ring Cameras

Police in Mississippi To Pilot a Program to Live-Stream Amazon Ring Cameras

Red alert: The police surveillance center in Jackson, Mississippi, will be conducting a 45-day pilot program to live stream the security cameras, including Amazon Ring cameras, of participating residents.

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Whether you are living and working in a high-threat environment or period of civil unrest, worry about being vulnerable to hacking of your financial data or online profiles, or are simply an advocate for personal privacy and liberty, it’s important to understand the methods by which you are tracked, and by whom, and for what purpose.

Proposed FTC settlement is a disservice to Zoom customers, says Commissioner

Proposed FTC settlement is a disservice to Zoom customers, says Commissioner

Zoom and the Federal Trade Commission (FTC) have come to a tentative settlement agreement regarding the video conferencing company’s false advertising of end-to-end encryption along with other issues.

Microsoft Warns: A Strong Password Doesn’t Work, Neither Does Typical Multi-Factor Authentication

Microsoft Warns: A Strong Password Doesn’t Work, Neither Does Typical Multi-Factor Authentication

picture alliance via Getty Images The Director of Identity Security at Microsoft has been warning about the inefficacy of passwords and more recently about standard Multi-Factor Authentication or MFA.He should know: the team he works with at Microsoft defends against hundreds of millions of password-based attacks every day.

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

Given that this bucket belongs to LimitChat, which we believe is a product of FaceChance, then LimitChat users have just had their most sensitive, explicit moments leaked online for anyone who knows where to look.

EU continues to push for lawful access (aka backdoors) to end-to-end encrypted data

EU continues to push for lawful access (aka backdoors) to end-to-end encrypted data

A leaked draft resolution from the Council of the European Union highlights that the government is planning to crack down on the end-to-end (e2e) encryption used by messaging apps such as Signal and WhatsApp. What the EU is calling for is a “balance” between regular encryption use and lawful access to encrypted data.

Lazada’s Personal Data Breach and Rethinking Cost-Benefit Analysis of PDPA Compliance

Lazada’s Personal Data Breach and Rethinking Cost-Benefit Analysis of PDPA Compliance

In other cases where the personal data breach appears to be more a matter of ignorance and one-time mistakes, fines in the similar range as Grabcar Pte Ltd [2020] SGPDPC 14 were imposed.

Should You Use Biometric Locks on Your Devices?

Should You Use Biometric Locks on Your Devices?

As such, many cybersecurity experts actually recommend biometric locks like fingerprint, face scan, or retina scan instead.No matter what protection you go with for your devices – be it password, PIN, or biometric lock – make sure that you’ve done your research.

ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure

ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure

The ICO’s investigation found that there were failures by Marriott to put appropriate technical or organisational measures in place to protect the personal data being processed on its systems, as required by the General Data Protection Regulation (GDPR).

Why You Need Multi-Factor Authentication (MFA)

Why You Need Multi-Factor Authentication (MFA)

This is a piece of information or a device that is given to you to confirm your identity at the time of accessing your account like a one-time password or a push notification from an app.

Quest 2 Jailbreak Effort Reports Success Bypassing Facebook Services

Quest 2 Jailbreak Effort Reports Success Bypassing Facebook Services

A researcher from the XR community has gained root access to Oculus Quest 2 and is able to bypass Facebook Login.XRSI wants to help extend the same to AR/VR headsets, which would including protecting the right of users to jailbreak devices like Quest 2.

Researchers demonstrate how link previews in apps can expose data from users

Researchers demonstrate how link previews in apps can expose data from users

However, security researchers Talal Haj Bakry and Tommy Mysk have discovered that these link previews can expose user data in both iOS and Android apps.

Why Are There So Many Data Breaches?

Why Are There So Many Data Breaches?

Object Stores have many uses such as:Providing a location for the upload or download of dataStore process inputs, outputs, temporary and data filesStoring, transcoding and playing audiovisual mediaStoring data backupsStoring website contentHosting static websitesTwo of the largest cloud Object Store services are Azure Storage and AWS S3.What security options are available.

Browser Privacy

Browser Privacy

The premise was, that the browser is free software (open source), with one exception (Vivaldi).The following browsers were tested: Firefox ESR 78.3.0 Midori 1.1.4 (Electron version) Vivaldi 3.4.2066 Brave 1.15.72 Epiphany 3.32.1.2 The method itself was relatively simple.

Singapore’s world-first face scan plan sparks privacy fears

Singapore’s world-first face scan plan sparks privacy fears

“We want to be innovative in applying technology for the benefit of our citizens and businesses,” Kwok Quek Sin, who works on digital identification at Singapore’s technology agency GovTech, told AFP.