Julian Assange fiance, Stella Assange, revealed that his journey to freedom will personally cost Julian a staggering $520,000 USD.
She set up a platform that could only take credit/debit cards and bank payments and people asked if there was a Bitcoin address where they could donate. So Julian's brother, Gabriel, set up a Bitcoin donation channel to raise donations.
And now with an 8 Bitcoin donation (worth about $500k USD) recorded to an on-chain address posted by Stella Assange, Julian’s fiancee, it appears the Bitcoin community is resolved to support Julian and his family.
@Kalilinux
source
A jailbroken version of GPT-4o hit the #ChatGPT website this week, lasting only a few precious hours before being destroyed by #OpenAI
Twitter user "Pliny the Prompter," who calls themselves a white hat #hacker and "AI red teamer," shared their "GODMODE GPT" on Wednesday. Using OpenAI's custom #GPT editor, Pliny was able to #prompt the new GPT-4o model to bypass all of its restrictions, allowing the #AI #chatbot to swear, jailbreak cars, and make napalm, among other dangerous instructions.
@Kalilinux
https://www.tomshardware.com/tech-industry/artificial-intelligence/godmode-gpt-4o-jailbreak-released-by-hacker-powerful-exploit-was-quickly-banned
VPNs are mainly useful for one thing: routing your network connection through a different network.
Today, many people use a VPN in situations where they don't trust their local network. But the TunnelVision method of exploiting DHCP, makes it clear that using an untrusted network is not always an appropriate threat model for VPNs because they will not always protect you if you can't trust your local network.
https://www.eff.org/deeplinks/2024/05/wider-view-tunnelvision-and-vpn-advice
@Kalilinux
Sounds like the justice department is on steroid nowadays!
The alleged owner and operator of Incognito Market, a dark web marketplace for selling illegal narcotics online, was arrested at the John F. Kennedy Airport in New York on May 18
@Kalilinux
Yesterday The New York Times unveiled that General Motor's had accidentally enrolled millions of people into its "OnStar Smart Driver+" program. If consumers chose to not enroll through the phone app – it would do it anyways.
Unenrolling requires consumers to contact OnStar customer support line. However, some people do not trust them and have turned to stripping the electronic devices from their car.
The OnStar Smart Driver+ data was being sold to LexisNexis, and insurance companies, to modify insurance rates. The data sold was invasive and logged:
- Number of trips
- Miles driven
- Minutes driven
- Hard-brake vents
- Rapid accelerates
- Speeding events
The reporter from the New York Times requested a copy of their data and received it. See attached image.
@Kalilinux
Source
Source
DDoS
Logstalgia is a visualization tool that graphically repeats the web server access sequences simulating a retro arcade game.
The left column shows the IPs that make the requests. The right-hand column is the resource on the server (url), it can be an html file, an image, etc. The "points" that travel are the requests/responses, and lastly, the 200s you see is the code that the web server returns (Http response code) to the requests.
source
Millions of customers' data found on dark web in latest AT&T data breach
AT&T said the information included in the compromised data set varies from person to person. It could include social security numbers, full names, email and mailing addresses, phone numbers, and dates of birth, as well as AT&T account numbers and passcodes.
@kalilinux
https://www.npr.org/2024/03/30/1241863710/att-data-breach-dark-web
Russian state-backed hackers gained access to some of Microsoft’s core software systems in a hack first disclosed in January, the company said Friday, revealing a more extensive and serious intrusion into Microsoft’s systems than previously known.
Microsoft believes that the hackers have in recent weeks used information stolen from Microsoft’s corporate email systems to access “some of the company’s source code repositories and internal systems,” the tech firm said in a filing with the US Securities and Exchange Commission.
@kalilinux
https://www.bleepingcomputer.com/news/microsoft/microsoft-says-russian-hackers-breached-its-systems-accessed-source-code/
European consumer rights groups are accusing Meta, of carrying out a “massive” and “illegal” operation. The buzz is all about Meta's pay-or-consent model, arguing that this “pay-or-consent” approach was an example of an unfair and “aggressive” commercial practice prohibited under EU law.
Meta disputes the allegations.
The European Consumer Organisation (BEUC), an umbrella body for 45 consumer groups, said eight of the groups were filing complaints with their respective national data protection authorities Thursday.
More on this Issue:
https://www.cnn.com/2024/02/29/tech/meta-data-processing-europe-gdpr/index.html
@kalilinux
In a YouTube video, security researcher Stacksmashing demonstrated that hackers can extract the BitLocker encryption key from Windows PCs in just 43 seconds using a $4 Raspberry Pi Pico.
@kalilinux
https://www.youtube.com/watch?v=wTl4vEednkQ
https://www.bloomberg.com/news/articles/2024-01-29/raspberry-pi-picks-banks-for-ipo-choosing-london-over-new-york
@Kalilinux
Right now, the Tor network, Tor Browser, onion services, Snowflake, and the ecosystem of tools and services built and maintained by the Tor Project are protecting the privacy of millions of people. Because the Tor Project is a nonprofit, this work is powered by donations from our community—by you.
In that vein, today the Tor Project is launching our annual fundraising campaign. This year we’re keeping our message simple: if you value the privacy that Tor provides to yourself or to other people, please make a donation.
💜👉Tor is and will always be free. 👈💜Unrestricted access to the technology we create is part of our mission. But the challenges of 2023 and beyond mean that if you are in the position to donate this year, your support is more vital than ever.
Your support ensures that the Tor Project remains strong on an organizational level, and that the ecosystem of Tor services and tools continue to reach the people who need privacy online the most.
https://torproject.org/donate./donate-tel-ann-2023
Google:
Our new approach builds on the software that runs our carbon-intelligent computing platform, adding new capabilities that allow us to temporarily reduce the power demand of a Google data center when called on to do so by an external power system partner, such as a utility or grid operator.
When we receive notice from a grid operator of a forecasted local grid event, for example an extreme weather event that will cause a supply constraint, we can alert our global computing planning system to when and where it will take place. This alert activates an algorithm that generates hour-by-hour instructions for specified data centers to limit non-urgent compute tasks for the duration of the grid event, and allows them to be rescheduled after the grid event has passed. When feasible, some of these tasks get rerouted to a data center on a different power grid. All of this is done without additional computer hardware and without impacting the performance of Google services like Search, Maps, YouTube, Google Cloud, and Workspace (which includes Gmail, Docs, Sheets and more) that people, businesses, and public sector organizations rely on around the clock.
@kalilinux
https://cloud.google.com/blog/products/infrastructure/using-demand-response-to-reduce-data-center-power-consumption
Have you already heard the news about GitHub and the css injection thing?
Today following the CSS injection discovered by x account 'cloud11665', security researcher 'vmfunc' discovered you can also create ReadMe files which force log people out of their GitHub profiles. Oh, and you can make IP grabbers!
The GitHub CSS Injection which was patched a few hours ago has already been bypassed.
Internet nerds are returning with wrath as they resume anime backgrounds and anime banners.
@Kalilinux
911S5 Botnet Dismantled and Its Administrator Arrested in Coordinated International Operation
Botnet Infected Over 19M IP Addresses to Enable Billions of Dollars in Pandemic and Unemployment Fraud, and Access to Child Exploitation Materials
@Kalilinux
https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation
New Windows AI feature records everything you’ve done on your PC. Recall uses AI features "to take images of your active screen every few seconds."
https://arstechnica.com/gadgets/2024/05/microsofts-new-recall-feature-will-record-everything-you-do-on-your-pc/
@Kalilinux
@Kalilinux
https://www.bleepingcomputer.com/news/security/fbi-seize-breachforums-hacking-forum-used-to-leak-stolen-data/
Last November, NASA's Voyager 1 sent home garbled data, and engineers traced the problem to the flight data subsystem (FDS). The problem turned out to be a single chip in the FDS memory. They couldn't repair the chip but could move the affected code into sections and store them in different parts of the FDS system. They tested the new system this week, sending signals to the Voyager 1, 22.5 light-hours away. It worked, and Voyager 1 is back.
@Kalilinux
Source
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.
This backdoor could potentially allow a malicious actor to compromise sshd authentication. If you did not update your Kali installation before the 26th, you are not affected by this backdoor vulnerability.
More information can be found at:
https://www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
And
https://www.openwall.com/lists/oss-security/2024/03/29/4
If you would like to be sure that you are up to date and not affected by this vulnerability, you can do the following to upgrade your local version of the package:
sudo apt update && sudo apt install —only-upgrade liblzma5
Full blog post:
https://www.kali.org/blog/about-the-xz-backdoor/
@kalilinux
Exploiting a vulnerability in Telegram's system that allows for matching user IDs with phone numbers
Russian security forces and officials employ a system known as "Insider," alongside Telegram bots, to de-anonymize users by exploiting a vulnerability in Telegram's system that allows for matching user IDs with phone numbers, thereby revealing their identities. This system, which utilizes leaked databases from sources like Yandex and Wildberries, is part of a broader initiative called "Demon of Laplace," aimed at monitoring social networks and identifying activists. The purchase of "Insider" by authorities, under contracts signed by several Russian regional departments, is funded by budget money.
The developer behind "Insider," Evgeny Venediktov, is known for his controversial past, and the legality of employing such systems for de-anonymization purposes raises significant questions under Russian law.
STATISTICS:
- More than 76 million mobile numbers are loaded into the "Insider" system from leaked databases.
- One license for "Laplace's Demon" costs on average 500 thousand rubles. ($5500 USD)
- In 2019, the database used had 10 million numbers, which has now grown to more than 76 million.
@kalilinux
Sources: [researcher lordx64 - zakharovchannel]
OpenAI publishes Elon Musk’s emails. ‘We’re sad that it’s come to this’
In the emails, parts of which have been redacted, Musk argues that the company stood virtually no chance of building a successful generative AI platform by raising cash alone, and the company needed to find alternate sources of revenue to survive.
OpenAi just announced Sora, a video generating Ai. Sora can generate videos up to a minute long while maintaining visual quality and adherence to the user’s prompt. The model understands not only what the user has asked for in the prompt, but also how those things exist in the physical world. Sora can also create multiple shots within a single generated video that accurately persist characters and visual style.The current model has weaknesses. It may struggle with accurately simulating the physics of a complex scene, and may not understand specific instances of cause and effect. For example, a person might take a bite out of a cookie, but afterward, the cookie may not have a bite mark. more on that in the OpenAi's website:
https://openai.com/sora
@kalilinux
AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems. BleepingComputer has learned that source code and private code signing keys were stolen during the attack.
https://www.bleepingcomputer.com/news/security/anydesk-says-hackers-breached-its-production-servers-reset-passwords/
@kalilinux
Apple’s Proposed Changes Reject the Goals of the DMA
@Kalilinux
https://newsroom.spotify.com/2024-01-26/apples-proposed-changes-reject-the-goals-of-the-dma/
Google’s Manifest V3 still puts unnecessary limitations on developers, EFF’s Alexei Miagkov tells verge. “These are helpful changes, but… the big problem remains the same: if extensions can’t innovate, users lose and trackers win.”
@kalilinux
https://www.theverge.com/2023/11/16/23964509/google-manifest-v3-rollout-ad-blockers
Google Cloud, AWS, and Cloudflare report largest DDoS attacks ever
The attack on Google Cloud was 7½ times larger than any previously recorded DDoS attack.
@kalilinux
https://www.zdnet.com/article/google-cloud-aws-and-cloudflare-report-largest-ddos-attacks-ever/#ftag=RSSbaffb68
Forty years ago, Richard Stallman announced the plan to develop the GNU operating system, which would be entirely composed of free software. The existence of a free operating system would enable people to operate their computers in freedom, throwing off the power of the developers of nonfree software.
The GNU Project has also built the global free software movement.
On September 27th 2023 they invite you to join the GNU community in Biel/Bienne to celebrate this occasion, and help build a future where users' computing freedom extends further than ever.
https://www.gnu.org/gnu40/
@kalilinux