Kazani's avatar
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin. Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Kazani's avatar
Kazani 9 months ago
Ego is not always about being bad or arrogant; even forced goodness and compassion stem from ego. Anything done from a fragmented identity is ego, where the “I” becomes the most important entity.
Kazani's avatar
Kazani 10 months ago
Another free method of finding information by nickname or last name. urlscan.io page.url advanced search operator: page.url:"/targetusername/" Works the same as inurl: in Google, but the results are very different.
Kazani's avatar
Kazani 10 months ago
💻 Another reason why Linux is superior to Windows image
Kazani's avatar
Kazani 10 months ago
WARNING - Etcher Sends private information to third parties Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties. https://tails.net/news/rufus/index.en.html
Kazani's avatar
Kazani 10 months ago
Good Morning #Nostr 💜⚡🫂 What if you are trying to win the wrong race?
Kazani's avatar
Kazani 10 months ago
 Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results aren’t shared with Google. As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesn’t send identifiable data or any of the classified content or results to Google servers For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device. Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a “speed bump” that contains help-finding resources and options, including to view the content. Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app. There is similar feat on TG too, some images are blurred before being manually shown. GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...). Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it. Another solution: Uninstall the app and then install this placeholder app
Kazani's avatar
Kazani 10 months ago
🇦🇺 Australian Government vs Kaspersky The Australian government has banned the use of Kaspersky Lab's web products and services (yes, the antivirus ones) on all government systems and devices, citing national security risks. The move was justified following a risk analysis that identified "threats of foreign interference, espionage and sabotage", particularly due to Kaspersky's extensive collection of user data and its potential exposure to extrajudicial orders from a foreign government (referring to Russia) that contradict Australian law. Kaspersky argues that the decision lacks specific technical evidence and is influenced by geopolitical factors, without giving them any prior opportunity to respond. This ban follows similar measures in countries such as the United States, the United Kingdom and Canada.
Kazani's avatar
Kazani 10 months ago
Keyloggers in electric typewriters: how Soviet intelligence agents monitored US diplomats. • Did you know that the world's first keylogger appeared in the 1970s ? It all started with Soviet intelligence agents who placed bugs in the IBM Selectric typewriters of American diplomats to monitor their business correspondence. • Such implants (bugs) were a real engineering marvel. Portable devices were sewn into a metal plate running the entire length of the machine, which allowed the bug to be hidden from prying eyes. Such a device could only be detected using X-ray equipment, and the location of the bug had to be known exactly. Interestingly, the bug could record all letters and numbers, but did not record spaces, indents, or hyphens. The transmission of information received by the bug was carried out in real time! • The bugs were discovered after more than 10 tons of equipment seized from the U.S. embassies in Moscow and the U.S. consulates in Leningrad were dismantled and analyzed and returned to the United States. The implants were found in only 16 typewriters from 1976-1984 . The search for the bugs began only after the U.S. received information about similar devices from "partners" who had been subjected to the same type of "attack" by the USSR. For eight years, the bugs remained undetected and transmitted information to Soviet intelligence. • The operating principle of the bugs was not entirely clear. Some experts believed that it determined the difference in time for printing each symbol. In Selectric -type machines, to print each specific letter, the ball with symbols had to make a revolution. And printing each symbol takes a certain amount of time, different from the time required to print any other symbol. According to experts, the device transmitted the sounds of printing, and Soviet specialists identified them, deciphering the document printed by the Americans. • In fact, the device installed by the USSR intelligence officers was more advanced and independently determined the printing symbols. The bug determined some features of the movement of the typewriter mechanism, and the magnetic energy received by the device's sensors was converted into a digital electrical signal. The signals were compressed into a four-bit sequence. The bug could store up to 8 four-bit symbols. When the buffer overflowed, the bug's transmitter transmitted the information to the intelligence officers' receiving device. • There were some peculiarities in the operation of the device. For example, the bug could not record pressing keys that did not rotate the ball with symbols. That is, the space, indent and some other text editing keys were not recorded. • There were 5 variants of bug models. Three types worked with direct current and contained up to 10 batteries. The other two types worked with alternating current and reported whether the machine was on or not. Some elements of the machine were used as an antenna. The first three models of bugs were autonomous. • Each device had a magnetometer that converted the mechanical energy of keystrokes into magnetic perturbations. The electronics in the device responded to these perturbations, analyzed the data received, and transmitted the data to the nearest receiver. The data was transmitted via a radio channel. The implant could be controlled remotely. The installation of the bug by a qualified mechanic took only about half an hour. The bugs were equipped with a microcircuit that was very advanced for that period. • Remote control was needed to turn off the bugs when inspection commissions arrived at US embassies and consulates. Over time, the US developed devices that could detect such bugs, but the problem was that to detect a spy device, the machine had to be turned on, the bug turned on, and the detector tuned to a specific radio frequency. Soviet engineers tuned the bugs to frequencies used by local TV stations. ➡️ https://arstechnica.com/how-soviets-used-ibm-selectric-keyloggers-to-spy-on-us-diplomats
Kazani's avatar
Kazani 10 months ago
Found a really cool resource on Linux basics for beginners. The whole point is that the material is presented in the form of mini-courses, which contain lessons with tasks. If you start solving problems, the service will check your answers automatically. Many topics are available for study: ➡ Command line; ➡ Working with text; ➡ User management; ➡ Process management; ➡ File system; ➡ Linux kernel; ➡ Logging; ➡ Networks and more... ➡️
Kazani's avatar
Kazani 10 months ago
🤖 Android with 8 years of updates Qualcomm and Google have announced a collaboration to offer up to 8 years of software and security updates from their new Snapdragon 8 Elite processor This will not only affect Google pixels, which will see their lifespan extended, but also other manufacturers if the manufacturer so chooses, making more Android phones have a longer lifespan. This initiative will also extend to future Snapdragon 8 and 7 chips over the next five generations, making Androids with these processors much more attractive. It will also benefit future Pixels that will come with these processors , forgetting about Google's "tensor" processors and gaining in power. Everything points to the fact that with the next Pixel 10 we will have 8 years of updates for GrapheneOS.
Kazani's avatar
Kazani 10 months ago
Why Google funds Firefox
Kazani's avatar
Kazani 10 months ago
Kazani's avatar
Kazani 10 months ago
🇫🇷 France goes for VPNs Companies like Canal+ and LFP (Ligue de Football Professionnel) claim that VPN providers are contributing to illegal broadcasts of sports broadcasts. (Yes, they want to go after that again, just like in Spain.) This is why, according to a journalist from "Línforme", Canal+ and LFP have different VPNs in mind. Faced with this situation, VPN companies are considering leaving France, arguing that such measures are a threat. Even ProtonVPN is willing to take the case to the EU Court of Justice . There is no obligation to block VPNs for now, but we will be watching to see if such a measure is finally implemented.
Kazani's avatar
Kazani 10 months ago
I found an interesting resource that contains information about the main web vulnerabilities. The peculiarity of this platform is that each of the listed methods can be performed independently, following the tips and examples. And each example is interactive, so it will be easier for you to perceive the material and practice. The content is as follows: ➡ SQL Injection; ➡ Cross-Site Scripting; ➡ Command Execution; ➡ Clickjacking; ➡ Cross-Site Request Forgery; ➡ Directory Traversal; ➡ Reflected XSS; ➡ DOM-based XSS; ➡ File Upload Vulnerabilities; ➡ Broken Access Control; ➡ Open Redirects; ➡ Unencrypted Communication; ➡ User Enumeration; ➡ Information Leakage; ➡ Password Mismanagement; ➡ Privilege Escalation; ➡ Session Fixation; ➡ Weak Session IDs; ➡ XML Bombs; ➡ XML External Entities; ➡ Denial of Service Attacks; ➡ Email Spoofing; ➡ Malvertising; ➡ Lax Security Settings; ➡ Toxic Dependencies; ➡ Logging and Monitoring; ➡ Buffer Overflows; ➡ Server-Side Request Forgery; ➡ Host Header Poisoning; ➡ Insecure Design; ➡ Mass Assignment; ➡ Prototype Pollution; ➡ Regex Injection; ➡ Remote Code Execution; ➡ Cross-Site Script Inclusion; ➡ Downgrade Attacks; ➡ DNS Poisoning; ➡ SSL Stripping; ➡ Subdomain Squatting. ➡️ https://www.hacksplaining.com/lessons
Kazani's avatar
Kazani 10 months ago
➡️ Remove your credentials from breached data providers: ➡️ Have I Been Pwned • Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut. • Click the link in the email confirmation. • Choose the "Remove email address completely" option. ➡️ Dehashed • Create a free burner account at • Conduct a search of your email address or username. • Click "Request entry removal" link below each result. • Click the confirmation link within each email. ➡️ Leakcheck • Register for a free burner account at • Conduct a search of your email address. • If entries are present, send an email from the exposed address with a written removal request to removal@leakcheck.net. • Click the link within the confirmation email. ➡️ PSBDMP • Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html. • Search your email address at the first "PSBDMP" option. • If any results are present, send an email to admin@psbdmp.ws requesting removal. ➡️ IntelX • Conduct a search of your email address at • Navigate to https://intelx.io/abuse. • Paste any URLs associated with the found content "Full Data" links. • Submit request. ➡️ HudsonRock • Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html. • Search your email address at the first "HudsonRock" option. • If any results are present, send an email to hello@hudsonrock.com requesting removal. If that fails, use the contact page at ➡️ Leak-Lookup • Register for a free burner account at • Conduct a search of your email address. • If entries are present, send an email from the exposed address with a written removal request to info@leak-lookup.com. ➡️ HackCheck • Register for a free burner account at • Conduct a search of your email address. • If entries are present, send an email from the exposed address with a written removal request to support@hackcheck.io. ➡️ Breach Directory • Navigate to https://breachdirectory.org. • Search your email address. • If any results are present, begin the removal process at https://breachdirectory.org/deletemydata. ➡️ LeakPeek • Navigate to https://leakpeek.com. • Search your email address. • If any results are present, send an email to support@LeakPeek.com requesting removal.
Kazani's avatar
Kazani 10 months ago
📱 The Swedish Army and Signal The Swedish military has adopted the secure and private messaging app Signal as its form of communication. This decision was made to protect against the interception of calls and messages, as well as against the falsification of telephone numbers, according to CyberInsider. Signal was chosen for its end-to-end encryption, its wide acceptance among authorities and partners, and because it has been subject to independent security audits, in addition to being open source and free, which will reduce costs. The official instruction, published on February 11, 2025, states that Signal must be used for all communications with counterparts inside and outside the Armed Forces who also have the application. This movement would be similar to what we saw a few years ago in the Swiss army where they use Threema, which in this case is of Swiss origin. Let's hope that awareness about this becomes more and more widespread.