Archiv: Betriebssysteme / operating systems


11.09.2022 - 15:20 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

11.09.2022 - 15:12 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

11.09.2022 - 14:50 [ Techspot.com ]

A Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes

(August 15, 2022)

The Five Eyes (FVEY) surveillance alliance includes the following countries:
– Australia
– Canada
– New Zealand
– United Kingdom
– United States

(…)

The Nine Eyes countries include:

– 5 Eyes countries +
– Denmark
– France
– Netherlands
– Norway

(…)

The 14 Eyes surveillance countries include:

– 9 Eyes countries +
– Germany
– Belgium
– Italy
– Sweden
– Spain

18.08.2022 - 11:55 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

18.08.2022 - 11:50 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

18.08.2022 - 07:55 [ Techjunkie.com ]

How Routers Are Hacked?

As mentioned before, it’s impossible to make a router impervious to attacks. However, some simple protection methods will work as a deterrent, making the process complicated enough for most hackers to give up due to a skewed risk-reward ratio and time investment requirement.

02.07.2022 - 18:04 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

02.07.2022 - 17:58 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

30.06.2022 - 08:16 [ AVM.de ]

Filterlisten für Internetseiten erstellen

Tragen Sie die Adressen der Internetseiten, deren Aufruf Sie verbieten bzw. erlauben wollen, in der jeweiligen Filterliste ein:

1. Klicken Sie in der Benutzeroberfläche der FRITZ!Box auf „Internet“.
2. Klicken Sie im Menü „Internet“ auf „Filter“.
3. Klicken Sie auf die Registerkarte „Listen“.
4. Klicken Sie neben der benötigten Liste auf den Link „bearbeiten“.
5. Tragen Sie die Internetadressen ohne Präfix wie http, https oder www in das Eingabefeld ein. Drücken Sie nach Eingabe jeder Adresse die Leertaste.

Beispiel:
poker.com xxx.com aggro.tv
Klicken Sie zum Speichern der Liste auf „Übernehmen“.

Jetzt sind die Filterlisten eingerichtet.

30.06.2022 - 07:25 [ avm.de/fritz-labor ]

Frisch aus der Entwicklung

Dieses FRITZ! Labor enthält neue Funktionen frisch aus der Entwicklung und erlaubt heute schon einen Ausblick auf zukünftige FRITZ!OS-Funktionen des nächsten großen Updates.

30.06.2022 - 07:23 [ avm.de/fritz-labor ]

Neue Funktionen in FRITZ!OS 7.39

Internet:

NEU IP-Sperrliste für einkommende Pakete

30.06.2022 - 07:10 [ FRITZ!Box / Nitter.net ]

Für FRITZ!Box 6591 Cable und 6660 gibt es im FRITZ! Labor jetzt ebenfalls neue Versionen zum Ausprobieren. Jetzt herunterladen und Feedback abgeben:

30.04.2022 - 18:37 [ Browserleaks.com ]

SSL/TLS Client Test

The page shows the SSL/TLS capabilities of your web browser, determines supported TLS protocols and cipher suites and marks if any of them are weak or insecure, displays a list of supported TLS extensions and key exchange groups

30.04.2022 - 16:50 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

31.03.2022 - 20:50 [ addons.mozilla.org ]

User-Agent Switcher

Pretending to be a different browser can be useful in a number of different situations:

– Some web pages require you to log in or buy a subscription to view their content, but give full read access to search engines.
– Some web pages determine whether you’re using a mobile or desktop browser based on your user-agent.
– Some web pages require you to use a specific browser to access their site.
– And potentially more…

31.03.2022 - 20:35 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

21.01.2022 - 15:02 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

21.01.2022 - 14:52 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

21.01.2022 - 14:35 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

03.01.2022 - 20:49 [ TouchVPN.net ]

TOUCH VPN – Choose your platform

TouchVPN is is available for all devices. Sign up, install, and press connect.

01.01.2022 - 20:20 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

21.10.2021 - 17:12 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

19.10.2021 - 20:22 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

19.10.2021 - 20:12 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

19.10.2021 - 09:12 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

24.09.2021 - 17:02 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

24.09.2021 - 16:49 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

04.09.2021 - 19:46 [ SecurityMagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(February 6, 2020)

While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

– Protocol layering: while DoT is essentially DNS over TLS, DoH is in fact DNS over HTTP over TLS.
– Different port numbers: DoT traffic uses a dedicated port 853, and can thus be distinguished at the network layer. DoH uses port 443 (HTTPS) due to the protocol layering.
– Different capabilities: DoT is largely the same DNS as we know it, while DoH to an extent combines features of DNS and HTTP.

30.07.2021 - 07:21 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

30.07.2021 - 07:17 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

14.07.2021 - 08:39 [ ClassicPress.net ]

ClassicPress: The CMS for Creators

Improved Security

ClassicPress has a “security-first” approach. All key security patches from WordPress are backported to ClassicPress. Also, no matter how exciting a new feature is, if it’s not secure, it won’t be added.

14.07.2021 - 08:29 [ Lireo.com ]

Is It Time to Consider ClassicPress, Alternative to WordPress?

(March 31, 2021 )

ClassicPress is under active development, has the familiar WordPress interface many longtime WordPress users know, and releases regular security updates.

In addition, they have active community forums and a Slack channel.

11.06.2021 - 10:43 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

11.06.2021 - 10:41 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

06.06.2021 - 12:35 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

06.06.2021 - 12:32 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

06.06.2021 - 12:22 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

06.06.2021 - 12:22 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

24.03.2021 - 17:09 [ free-proxy.cz/en/ ]

Free Proxy

There are currently … proxy servers in our database

24.03.2021 - 17:06 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

24.03.2021 - 17:03 [ Browserleaks.com ]

What Is My IP Address

DNS Leak Test

Test Results:

24.03.2021 - 16:51 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

24.03.2021 - 16:44 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

24.03.2021 - 16:41 [ ZDNet.de ]

Simple DNSCrypt: DNS-Abfragen unter Windows verschlüsseln

(05.02.2021)

Bereits 2017 hat der Informatiker Dominik Herrmann in seiner Dissertation „Das Internet-Adressbuch bedroht unsere Privatsphäre“ (PDF) nachgewiesen, wie anhand von unverschlüsselten DNS-Abfragen, die Identität eines Internetnutzers ermittelt werden kann. Herrmann sieht eine Zentralisierung der Namensauflösung für die internationale Konzerne wie Google, OpenDNS und Symantec verantwortlich seien. „Im Jahr 2016 beantworteten allein die DNS-Server von Google schon mehr als 13 Prozent aller DNS-Anfragen pro Tag.“

24.03.2021 - 16:22 [ SecurityMagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(February 6, 2020)

While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

– Protocol layering: while DoT is essentially DNS over TLS, DoH is in fact DNS over HTTP over TLS.
– Different port numbers: DoT traffic uses a dedicated port 853, and can thus be distinguished at the network layer. DoH uses port 443 (HTTPS) due to the protocol layering.
– Different capabilities: DoT is largely the same DNS as we know it, while DoH to an extent combines features of DNS and HTTP.

03.03.2021 - 13:06 [ macobserver.com ]

5 Encrypted DNS Services to Use on iOS and macOS

Short for Domain Name System, DNS is commonly referred to as the “phone book” of the internet. It helps connect web browsers with web servers by translating addresses like 104.26.0.124 into www.macobserver.com. Here are five encrypted DNS services that I recommend.

There are several different ways to use a DNS server. One is to manually go into network settings on each and configure the Wi-Fi. The second way is to download an app, and the third way is to go into your router settings and configure it there.

03.03.2021 - 12:56 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

03.03.2021 - 12:45 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

03.03.2021 - 12:07 [ free-proxy.cz/en/ ]

Free Proxy

There are currently 7156 proxy servers in our database

03.03.2021 - 12:04 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

03.03.2021 - 12:00 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

17.02.2021 - 18:02 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

17.02.2021 - 17:56 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

30.01.2021 - 16:01 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

30.01.2021 - 16:00 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

18.01.2021 - 16:09 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

18.01.2021 - 16:00 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

18.01.2021 - 15:50 [ DNSprivacy.org ]

DoT servers

Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained

18.01.2021 - 15:47 [ securitymagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(06.02.2020)

Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.

18.01.2021 - 15:41 [ ZDNET.com ]

NSA warns against using DoH inside enterprise networks

The NSA urges companies to host their own DoH resolvers and avoid sending DNS traffic to third-parties.

18.01.2021 - 15:40 [ National Security Agency / Pentagon ]

Adopting Encrypted DNS in Enterprise Environments

Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocoladdresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNSover Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authenticationwith a client’s DNS resolver. Itis useful to prevent eavesdropping and manipulationof DNStraffic.While DoH can help protectthe privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networksunless they allow only their chosen DoH resolver to be used.Enterprise DNS controlscan prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration.

14.01.2021 - 12:29 [ Achse des Guten ]

Der Internet-Putsch

Die großen Medientechnologiekonzerne der Wall Street haben eine beispiellose Säuberungswelle im Internet gestartet. Big Tech löscht nicht mehr länger nur Nutzerbeiträge. Nun wollen Facebook, Google, Twitter, Apple und Amazon aller Welt zeigen, dass sie als Meinungswächter frei entscheiden können, wer sich im Internet äußern darf – und wer nicht.

08.01.2021 - 23:32 [ inside-it.ch ]

Spoofing: Neue DNS-Angriffsmethode entdeckt

(13. November 2020)

Nachdem der Quellport de-randomisiert worden sei, sei es möglich gewesen, eine böswillige IP-Adresse einzuschleusen und so erfolgreich einen DNS-Cache-Poisoning-Angriff durchzuführen. Die Details haben die Forscher im Paper „DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels“ publiziert.

Weitere Experimente unter realistischen Serverkonfigurationen und Netzwerkbedingungen würden zudem zeigen, dass ihre grundlegende Methode leicht an das gesamte DNS-System angepasst werden könnte.

08.01.2021 - 23:04 [ .infosecurity-magazine.com ]

SAD Reality for DNS

The researchers determined that 35% of open resolvers are open to the attack, as well as four of six home routers made by well-known brands.

They also found that 12 of 14 popular public resolvers (now 11—Cloudflare says they’ve corrected their systems) are susceptible. Even a patched DNS server could be made vulnerable by an unpatched or misconfigured NAT gateway.

Their 19-page paper on the exploit includes lists of devices and services tested. They have since set up a SAD DNS website featuring a Q&A and a tool that anyone can use to determine whether their DNS is vulnerable.

The flaw is being tracked as CVE-2020-25705, and affects Linux 3.18 – 5.10, Windows Server 2019 version 1809 and newer, macOS 10.15 and newer, and FreeBSD 12.1.0 and newer. The researchers did not test earlier versions of the listed operating system.

31.08.2019 - 08:38 [ Project Zero team at Google ]

Implant Teardown

The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage. We can see here screenshots of the apps on the left, and on the right the contents of the database files stolen by the implant which contain the unencrypted, plain-text of the messages sent and received using the apps:

(…)

There’s something thus far which is conspicuous only by its absence: is any of this encrypted? The short answer is no: they really do POST everything via HTTP (not HTTPS) and there is no asymmetric (or even symmetric) encryption applied to the data which is uploaded. Everything is in the clear. If you’re connected to an unencrypted WiFi network this information is being broadcast to everyone around you, to your network operator and any intermediate network hops to the command and control server.

This means that not only is the end-point of the end-to-end encryption offered by messaging apps compromised; the attackers then send all the contents of the end-to-end encrypted messages in plain text over the network to their server.

31.08.2019 - 08:26 [ Project Zero team at Google ]

A very deep dive into iOS Exploit chains found in the wild

I recommend that these posts are read in the following order:

31.08.2019 - 08:20 [ Gizmodo ]

Google Hackers Reveal Websites Hacked Thousands of iPhone Users Silently for Years

“To be targeted might mean simply being born in a certain geographic region or being part of a certain ethnic group,” he said. “All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”

31.08.2019 - 07:50 [ derStandard.at ]

Mysteriöser iOS-Hack: Websites infizierten jahrelang iPhones

Außerdem war die IP-Adresse des Servers, zu dem die Daten versandt wurden, fest in der Malware kodiert. Das erleichtert es, den Angreifer ausfindig zu machen – Google hat aber hierzu keine weiteren Informationen öffentlich gemacht.