Anonymous ID: 54d206 July 24, 2020, 8:21 a.m. No.10064723   🗄️.is 🔗kun

https://www.nist.gov/news-events/news/2020/07/nists-post-quantum-cryptography-program-enters-selection-round

 

Possibly off topic, but super important for the anons here who would like to stay anons in the future :)

Anonymous ID: 54d206 July 24, 2020, 8:28 a.m. No.10064772   🗄️.is 🔗kun

https://thehackernews.com/2020/07/dji-drone-hacking_24.html

 

DJI -China -> Stealin Data

 

"A "Shady" Self-Update Mechanism

GRIMM said the research was undertaken in response to a security audit requested by an unnamed defense and public safety technology vendor that sought to "investigate the privacy implications of DJI drones within the Android DJI GO 4 application."

Reverse engineering the app, Synacktiv said it uncovered the existence of a URL ("hxxps://service-adhoc.dji.com/app/upgrade/public/check") that it uses to download an application update and prompt the user to grant permission to "Install Unknown Apps."

"We modified this request to trigger a forced update to an arbitrary application, which prompted the user first for allowing the installation of untrusted applications, then blocking him from using the application until the update was installed," the researchers said."

Anonymous ID: 54d206 July 24, 2020, 8:30 a.m. No.10064783   🗄️.is 🔗kun   >>5082 >>5292 >>5405

KEK

 

https://thehackernews.com/2020/07/iranian-hacking-training-videos.html

 

"The discovered video files show that ITG18 had access to the targets' email and social media credentials obtained via spear-phishing, using the information to log in to the accounts, delete notifications of suspicious logins so as not to alert the victims, and exfiltrate contacts, photos, and documents from Google Drive.

"The operator was also able to sign into victims' Google Takeout (takeout.google.com), which allows a user to export content from their Google Account, to include location history, information from Chrome, and associated Android devices," the researchers noted."

Anonymous ID: 54d206 July 24, 2020, 8:49 a.m. No.10064884   🗄️.is 🔗kun   >>5082 >>5292 >>5405

Found more China backdoors?

 

https://twitter.com/campuscodi/status/1286621538511458304

 

NEW: The FBI is warning US companies this week about backdoors in China's government-mandated VAT software

Anonymous ID: 54d206 July 24, 2020, 9:03 a.m. No.10064969   🗄️.is 🔗kun   >>4973 >>5082 >>5292 >>5405

"The spectacular stunt, which saw a T-72B3 crossing a 5-meter-deep (16.4 feet) river, was performed during drills outside the city of Orenburg on the border between Europe and Asia in the Urals.

 

The clip captures the 41-ton (90,400 pounds) tank disappearing underwater before safely emerging on the opposite bank to continue executing its combat task."