Tech Group
Tech Group
  • Here's a bit of WTF hackery appropriately named O.MG. Imagine a thoroughly innocuous USB cable with a built-in microprocessor loaded with spyware and a Wi-Fi antenna that uses your Wi-Fi network to transmit the stolen data back to the mothership. That cable you've been using to charge your phone from your laptop's USB port may be a spy. Only $145 to start with the basic cable w/ programmer. Imagine that! Additional cables for $120 (basic) or $180 (elite).

    https://shop.hak5.org/products/omg-cable

    Here's a bit of WTF hackery appropriately named O.MG. Imagine a thoroughly innocuous USB cable with a built-in microprocessor loaded with spyware and a Wi-Fi antenna that uses your Wi-Fi network to transmit the stolen data back to the mothership. That cable you've been using to charge your phone from your laptop's USB port may be a spy. Only $145 to start with the basic cable w/ programmer. Imagine that! Additional cables for $120 (basic) or $180 (elite). https://shop.hak5.org/products/omg-cable
    SHOP.HAK5.ORG
    O.MG Cable
    The O.MG Cable is a hand made USB cable with an advanced implant hidden inside. It is designed to allow your Red Team to emulate attack scenarios of sophisticated adversaries. Until now, a cable like this would cost $20,000 (ex: NSA's COTTONMOUTH-I). These cables will allow you to test new detection opportunities for your defense teams. They are also extremely impactful tools for teaching and training.The uncompromising attention to the physical size of the cable isn't where we stopped. Thanks to continual firmware updates, the resulting power, flexibility, and ease of use have made the O.MG Cable a favorite for both new students and seasoned pros. NOTE: All cables are 1 meter in length. Custom 2 meter versions can be found here.
    0 Comments 0 Shares 59 Views
  • How To "Write Article" With Android Phone
    The "Write Article" feature that Duffner provides on this platform is a full-featured editor suitable for composing blogs with all the functionality needed for elegant and/or complex formatting. BTW, that example of complex formatting included bold, italic, colored text, highlited. You can access those formatting options by sliding the top menu bar at the top of the Content pane left and right...
    Like
    1
    5 Comments 0 Shares 265 Views
  • Like
    2
    0 Comments 0 Shares 130 Views
  • I came upon an interesting solution to a largely ignored element of personal privacy. Many of us are aware of how vulnerable we are to online surveillance, whereby our every move around the internet is likely tracked, and then sold to data aggregators and marketing firms. Purchasers or thieves of our compiled online activities have access to richly detailed profiles based on our browsing history, social media posts and comments, purchases, etc. We are finely categorized within increasingly more specific demographic groups that identify us by our politics, religion, livelihoods, material affluence, influence, location, etc.

    The one largely ignored aspect of this surveillance is geolocation. While we can try to obfuscate our identity and activity by using VPNs, proxies, and other relays to appear to be operating somewhere far removed from our actual location, the reality is that it's a hit-or-miss proposition. Eventually, enough clues are uncovered to reveal our true location. Our phones, their operating systems, our mobile providers, and our ISPs betray our location privacy. There are plenty of apps to provide content privacy in online communications, mostly through E2E (End-to-End) encryption, but there's no convenient way to avoid the ability of our cellular service providers to track us. We have to connect to their towers.

    Other than cycling through burner phones using prepaid minutes and data purchased with cash while trying to disguise ourselves to evade the security cameras with facial recognition in and around the vendors of the prepaid phones and minutes, while also leaving your burner phone somewhere far removed from your regular purchases of these items, there's no way to stay anonymous for long. Even these gyrations will eventually prove futile. Surveillance Capitalism is the science tying all of these disparate elements together to uniquely identify and profile us.

    A new company has emerged with a new approach, initially targeted for high-risk individuals. If you're involved in public or private security, a mental health or legal or financial professional responsible for maintaining client confidentiality, or perhaps involved in cryptocurrency, you can get some level of security through a new phone service provider. A provider who will help to anonymize you by allowing you to change the unique identifiers built into the cellular service ecosystem. You'll be able to rotate through personas that you create on your favorite phone, rather than cycling through burner phones and accounts. You'll be able to obfuscate your identity (as revealed by your phone) and therefore your location.

    Most of us aren't high-risk targets, because most of us aren't investigative journalists, or involved in personal security relationships with high-risk business people, celebrities, or government officials. But if you're affluent or involved in politics or social causes, if you're under witness protection or temporary restraining orders for your safety, you could find yourself actively pursued and specifically tracked, even if only because of your associations.

    Cape is the company providing a new approach. They will provide cellular service in the same way that MVNOs (Mobile Virtual Network Operators) like US Cellular, Boost, Cricket, etc. provide discounted service, by buying access to the 3 main cellular networks at wholesale prices and repackaging that access. But unlike the other MVNOs, they'll require a lot less identifying information about you, which means if they're the target of an information breach, there won't be a lot of PII (Personally Identifiable Information) metadata floating around to compromise you. By virtue of the ability to cycle through preset and spurious personas on the phone, the previously unique metadata identifiers associated with network tower connections won't reveal your movements and identity.

    This was a long-winded summary, to be sure. If you're interested in the topic, peruse the following links for more details and implications. This is not a complete solution, but it does plug a significant hole. In conjunction with a privacy-optimized phone, along with E2E content protection, online location obfuscation, and best practices, you can create enough confusion about yourself to avoid or interfere with targeting.

    https://www.404media.co/i-dont-own-a-cellphone-can-this-privacy-focused-network-change-that/

    https://techcrunch.com/2024/04/18/cape-dials-up-61m-from-a16z-more-for-mobile-service-that-doesnt-use-personal-data/

    https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/

    https://www.cape.co/
    I came upon an interesting solution to a largely ignored element of personal privacy. Many of us are aware of how vulnerable we are to online surveillance, whereby our every move around the internet is likely tracked, and then sold to data aggregators and marketing firms. Purchasers or thieves of our compiled online activities have access to richly detailed profiles based on our browsing history, social media posts and comments, purchases, etc. We are finely categorized within increasingly more specific demographic groups that identify us by our politics, religion, livelihoods, material affluence, influence, location, etc. The one largely ignored aspect of this surveillance is geolocation. While we can try to obfuscate our identity and activity by using VPNs, proxies, and other relays to appear to be operating somewhere far removed from our actual location, the reality is that it's a hit-or-miss proposition. Eventually, enough clues are uncovered to reveal our true location. Our phones, their operating systems, our mobile providers, and our ISPs betray our location privacy. There are plenty of apps to provide content privacy in online communications, mostly through E2E (End-to-End) encryption, but there's no convenient way to avoid the ability of our cellular service providers to track us. We have to connect to their towers. Other than cycling through burner phones using prepaid minutes and data purchased with cash while trying to disguise ourselves to evade the security cameras with facial recognition in and around the vendors of the prepaid phones and minutes, while also leaving your burner phone somewhere far removed from your regular purchases of these items, there's no way to stay anonymous for long. Even these gyrations will eventually prove futile. Surveillance Capitalism is the science tying all of these disparate elements together to uniquely identify and profile us. A new company has emerged with a new approach, initially targeted for high-risk individuals. If you're involved in public or private security, a mental health or legal or financial professional responsible for maintaining client confidentiality, or perhaps involved in cryptocurrency, you can get some level of security through a new phone service provider. A provider who will help to anonymize you by allowing you to change the unique identifiers built into the cellular service ecosystem. You'll be able to rotate through personas that you create on your favorite phone, rather than cycling through burner phones and accounts. You'll be able to obfuscate your identity (as revealed by your phone) and therefore your location. Most of us aren't high-risk targets, because most of us aren't investigative journalists, or involved in personal security relationships with high-risk business people, celebrities, or government officials. But if you're affluent or involved in politics or social causes, if you're under witness protection or temporary restraining orders for your safety, you could find yourself actively pursued and specifically tracked, even if only because of your associations. Cape is the company providing a new approach. They will provide cellular service in the same way that MVNOs (Mobile Virtual Network Operators) like US Cellular, Boost, Cricket, etc. provide discounted service, by buying access to the 3 main cellular networks at wholesale prices and repackaging that access. But unlike the other MVNOs, they'll require a lot less identifying information about you, which means if they're the target of an information breach, there won't be a lot of PII (Personally Identifiable Information) metadata floating around to compromise you. By virtue of the ability to cycle through preset and spurious personas on the phone, the previously unique metadata identifiers associated with network tower connections won't reveal your movements and identity. This was a long-winded summary, to be sure. If you're interested in the topic, peruse the following links for more details and implications. This is not a complete solution, but it does plug a significant hole. In conjunction with a privacy-optimized phone, along with E2E content protection, online location obfuscation, and best practices, you can create enough confusion about yourself to avoid or interfere with targeting. https://www.404media.co/i-dont-own-a-cellphone-can-this-privacy-focused-network-change-that/ https://techcrunch.com/2024/04/18/cape-dials-up-61m-from-a16z-more-for-mobile-service-that-doesnt-use-personal-data/ https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/ https://www.cape.co/
    WWW.404MEDIA.CO
    I Don't Own a Cellphone. Can This Privacy-Focused Network Change That?
    A small tech company called Cape has been selling a privacy-focused cellphone service to the U.S. military. Now Cape will be offering its product to high-risk members of the public.
    2 Comments 1 Shares 124 Views
  • Thanks for the add!
    Thanks for the add!
    Like
    2
    0 Comments 0 Shares 265 Views
  • CP1 ty for the add to the group.
    [CP1] ty for the add to the group.
    Like
    2
    0 Comments 0 Shares 303 Views
  • Here's an interesting privacy tip for Android. You can pin an app when you loan your phone to someone, so they only have access to that app they want to use. IOS also offers the same capability.

    https://www.howtogeek.com/always-do-this-before-handing-your-android-phone-to-someone/
    Here's an interesting privacy tip for Android. You can pin an app when you loan your phone to someone, so they only have access to that app they want to use. IOS also offers the same capability. https://www.howtogeek.com/always-do-this-before-handing-your-android-phone-to-someone/
    Like
    1
    0 Comments 0 Shares 311 Views
  • I'm always on the lookout for tips, tricks, and strategies to protect my privacy from hackers, corporations, and government. I came across this article with a tip (ironically an app) that goes beyond what some browsers provide to avoid using native apps.

    https://www.howtogeek.com/how-to-turn-any-website-into-an-android-app-and-why-you-should/
    I'm always on the lookout for tips, tricks, and strategies to protect my privacy from hackers, corporations, and government. I came across this article with a tip (ironically an app) that goes beyond what some browsers provide to avoid using native apps. https://www.howtogeek.com/how-to-turn-any-website-into-an-android-app-and-why-you-should/
    Like
    1
    0 Comments 0 Shares 351 Views
  • Duffner created this group in response to my request for some explanation about posting links, and why link previews wouldn't generate after the URL was included. He discovered that links from X/Twitter have some settings on the X servers that prevent this Cre8aplace platform (and likely others, like Gab) from generating those thumbnail/snippet previews that give us an idea about the content being shared by us. He figured it out quickly and was responsive.

    If you have similar questions or ideas, share them here. I'll share articles that I've found useful.
    [Duffner] created this group in response to my request for some explanation about posting links, and why link previews wouldn't generate after the URL was included. He discovered that links from X/Twitter have some settings on the X servers that prevent this Cre8aplace platform (and likely others, like Gab) from generating those thumbnail/snippet previews that give us an idea about the content being shared by us. He figured it out quickly and was responsive. If you have similar questions or ideas, share them here. I'll share articles that I've found useful.
    Like
    2
    0 Comments 0 Shares 344 Views
  • CP1 and myself have created a new group where we can discuss ideas to improve this site. Feel free to join if this is of interest to you.
    CP1 and myself have created a new group where we can discuss ideas to improve this site. Feel free to join if this is of interest to you.
    Like
    1
    0 Comments 0 Shares 340 Views
More Stories
Chatbox

Join the group to join the chatbox