the definitive underground guide to things that are not just closed off or too strange or stupid or fake to be taken seriously and to lose your time with more sites in our tor guide (see the button at your right) http://auutwvpt2zktxwng.onion/ list of torsites daily checked http://54ogum7gwxhtgiya.onion/blog/index.php/markets-list/ list of the illegal markets http://zamoy2byu6ic5sas.onion/ bad usb exploit for sale http://deepwikizpkrt67e.onion/index.php/Celebrity_Nudes the first 2 releases of the fappening https://globe.torproject.org/#/top10 Top 10 tor relays https://atlas.torproject.org/#about application to find tor relays http://torstatus.blutmagie.de/ status of the tor relays http://a5ok374pjcq7bsyp.onion/hs-xmpp.html xmpp servers http://a5ok374pjcq7bsyp.onion/ssh-password.html ssh without a password http://a5ok374pjcq7bsyp.onion/hs-irc.html working IRC servers http://hbjw7wjeoltskhol.onion/ galaxy social undernet http://teir4baj5mpvkg5n.onion/ fund ISIS with bitcoins http://3mkyejyvxfnkgf4m.onion/tcd/ pedochat torchat dir KILL THIS SICK SITE PLEASE http://www.submedia.tv/stimulator/ revolution news http://32ixi6myw3things.onion/ library of 3d printing that disappeared from the net http://4zeottxi5qmnnjhd.onion/topics.html anarchism library copy http://6hgchounjuuwxewa.onion/rulez.html onion anonymous emails http://7etxnv26hro7mmuu.onion/ archive of comics http://4iahqcjrtmxwofr6.onion/library.php Strategic intelligence network tells you what is the risk for the countries of the world and in its library it has a selection of books http://amazoncshbielrwp.onion/ compromised amazon gift cards for sale http://amigafwzj62mcrca.onion/ amiga source http://answersdx4tm2tqr.onion/ deepweb answers
it is an reason that was given by one of the snapchatters but it wouldn't surprise me
a third service to which you have given the rights and that goes bad because of bad coding and so makes all of its data available to everybody - of which some take everything from everybody and distribute it like this (a huge leak)
"Over the last few days, content has been leaked from a site called Snapsaved.com. The content released from this site was provided to us by the administrator of the site. Users could freely browse all media on this website, and view as per user account. When the site became unusable, the administrator compiled a full directory of the content and uploaded it to an un-indexed website where you could freely download it.
These images were saved by individuals on the aforementioned website, so they could freely browse their saved SnapChat images. SnapChat service is supposed to provide a temporary means of transferring images and videos to your friends, family and acquaintances. Multiple times over the last few years the privacy element of SnapChat has been questioned and rightly so. Due to the misconception of SnapChat’s business model, people have the illusion that media they send will be temporary and cannot be saved. They have put their faith in a system that is clearly broken and I wish to raise awareness to this fact.
it is high time that third services who want a connection to another service especially if it is a big service with many legal responsabilities and an enormous userbase with a high risk settings on their content will have to abide to the same rules and controls and security-investments as the main services themselves
meanwhile I would from now on block all my third services that have access to confidential data
some others are saying it is fake or that there are versions that are faked with porn in it to make it more attractive
there are also a big number of scams already out there, trying to get you to download something in which deepdown malware is hidden, so don't download this stuff (which is illegal in some countries anyway) without having an updated antivirus
and the attacks on snapchat have only begun
this is a snapshot of an index of the leak
there are thousands and thousands more of pics, vids and messages - 13 gb
and some will probably now make the roads on the pornweb scene as 'real not fake porn'
new technique of adding content to DDOS attacks makes them even more overwhelming making it possible to attack ISP's
“Normally the SYN package is a simple handshake mechanism with a very low data footprint,” Adrian Crawley, Radware regional director for the UK, said. “It appears that hackers have found a way to add content to it – up to 1,000 bytes, or 25 times more data per handshake. This is allowed based on TCP RFC, but it is not common practice simply to avoid latency during the initial handshake. But because it is allowed by RFC, hackers can add data – this could be any random data – to the application which requested the initial SYN handshake.”
the article has even more interesting information
we have heard that before : because it isn't prohibited by the RFC it is allowed which is not the way one should read those, these are guidelines to be followed, not to be interpreted
"Since Australia raised its terror threat level from "medium" to "high" on September 11, Prime Minister Tony Abbott notified Parliament that "Regrettably for some time to come, the delicate balance between freedom and security may have to shift."
That shift has included legalizing government surveillance of the Internet and threatening 10-year prison terms for anyone, including journalists or whiste-blowers, who publicize classified information.
Parliament is also considering a proposed national security law that would permit the secret detention of Australians without charge in order for the Australian Security Intelligence Organization "to conduct coercive questioning of a person for the purposes of gathering intelligence about a terrorism offense."
the snappening crew is already know from its attack on the icloud unsecurity to downloads nude and other pics from celebreties. It has now attacked the unsecure and unreliable API from snapchat to leak all those pics over the weekend. The API is a set of code that makes it possible for other programs or websites to connect to this webservice (for example snapchat) and for example take the pictures or messages and make them available on another website. If that code is not very secured than anyone can download anything from the website (question, how secure is your API programmer, tested it yet ? or you just supposed it was secure ?)
why not to use snapchat for nude or incriminating pics or vids or messages in one minute
snapchat always said that they were privacy minded and that people shouldn't have any fear of making any photo's or say something because the users were in full control and the pics would be deleted and that they were fully secured
and some securitypeople told already from the beginning that this was not the case and they have found possibilities to hack accounts or get to information
but they continued with their blablablablabla
and so now after icloud snapchat has lost over the weekend 13 giga of tens thousands (download is selection) of pictures and videos and messages that are circulating online
here is a collection of some of the best (and more will come)
pedophiles will now be very interest because one torrent that has been released is only of girls between 10 and 17 with even some masturbating
"and thepiratebay leaked a 584.38 MiB video torrent, more children and 10-17 years old girls videos leaked. I strongly recommended you do not download it, it has some girls masturbation videos."
50% of the users of snapchat are in that age-range (so also a fair bit of all the nudity - which means that in some countries like Belgium downloading or viewing this torrent is illegal ...... because childporn
by the way, if you are a parent, does your child use snapchat ? time to delete
if you are a kid or teen or user yourself - delete your account you are NOT safe on snapchat
period - over and out
for the joke this google translation says in fact the contrary of what is a fact
for anyone reading books about spies and their organisations this is what spies do all over the world, all big international firms who have connections to the state have some 'operatives' or lend a hand to cover up operations (or even have their own intelligence operations like some French state firms)
well, here is the article (the CIA uses shell firms and has investments in technology firms and operatives in firms overseas since decennia - as does the Chinese and the Russians by the way)
these are the documents (and the article is the analysis)
- Sentry Eagle Brief Sheet (13 pages)
- TAREX Classification Guide (7 pages)
- Exceptionally Controlled Information Listing (6 pages)
- ECI WHIPGENIE Classification Guide (7 pages)
- ECI Pawleys Classification Guide (4 pages)
- ECI Compartments (4 pages)
- CNO Core Secrets Slide Slices (10 pages)
- CNO Core Secrets Security Structure (3 pages)
- Computer Network Exploitation Classification Guide (8 pages)
- CNO Core Secrets (7 pages)
the silk road trial is very interesting because it is the first one in which the legal boundaries of the protection of legal and personal rights and international juridisdiction are played out in a case about real crimes in one of the most complex judicial environments for which there is untill now no law or jurisdiction
this is the document
so he is not the so lonely white cowboy living all alone in that far Russia (well it is Moscow) being protected by all these KGB people being watched over all the time for his safety because otherwise some crazy CIA person would kill him or abduct him to the US or worse
well, he has the luxury many other dissidents in the world (in communist countries for example) don't have and will never have - being reunited with his family
first such emails (should) never come from any bank or online financial service
but if they do they come like this
so how do you control this ?
well if you place your scroller on the link you will see which is in fact the REAL URL
in this case it is
so it is a site in Birma
but even if I would click or some-one of my family than this would happen
so it is a fake
these controls are normally in your antivirus product, even some free ones like avast
and also Chinese use the same passwords and emails all over the web so for operatives of all kinds this is very interesting information to work with .....
you put in your emailaddress
than you receive an email to control that you are at that time the owner of this emailaddress (if you have lost control or share it with your hacker than he can control if he can buy more information about you online)
after which you receive if your information has been found in the darkweb databases that sell personal information
"Internet intelligence analysts found 476,000 records relating to people living in Cornwall, Devon and Somerset on illicit websites which are known for providing access to stolen credit cards, fake identities and drugs. Due diligence company C6 Intelligence said almost 40,000 of those were regarded as “high risk” containing card details, email passwords, date of births and secret answers used to access confidential data.
"The firm’s chief executive Darren Innes, who lives in North Cornwall, said: “Criminals are running these operations like a professional . The figures show just how organised they really are.” Mr Innes, who has worked in online security for more than a decade, said they had infiltrated of personal information which had been put up for sale on the “dark web” – Internet content which is not listed by normal search engines.
They found email addresses and passwords of 18,000 people living in Cornwall, Devon and Somerset along with another 2,640 records of credit card numbers with their three-number security code. They also found 157 records of peoples’ “secret answers” to security questions.
Mr Innes said peoples’ names and addresses were being sold for nine US cents while credit card details and security numbers could command up to $50. Ironically, he said, fraudsters were using stolen bank accounts and cards to pay for the information as well as currencies to help avoid detection.
He said criminals were compiling databases through a variety of means including hacking large companies, “phishing” emails which trick users into divulging information and fake websites
"There are only "around 100" cybercriminal kingpins behind global cybercrime, according to the head of Europol's Cybercrime Centre. Speaking to the BBC's Tech Tent radio show, Troels Oerting said that law enforcers needed to target the "rather limited group of good programmers"."We roughly know who they are. If we can take them out of the equation then the rest will fall down," he said.
Although, he added, fighting cybercrime remained an uphill battle. "This is not a static number, it will increase unfortunately," he said. "We can still cope but the criminals have more resources and they do not have obstacles. They are driven by greed and profit and they produce malware at a speed that we have difficulties catching up with."
The biggest issue facing cybercrime fighters at the moment was the fact that it was borderless, he told the BBC. "Criminals no longer come to our countries, they commit their crimes from a distance and because of this I cannot use the normal tools to catch them. "I have to work with countries I am not used to working with and that scares me a bit," he said
The majority of the cybercrime "kingpins" were located in the Russian-speaking world, he said.
* this is why blocking .ru and .su domain is so effective as first basic rule if you don't need any traffic from or to Russia
* secondly it shows that Interpol should play a more important role in the prosecution and arrestation of international cybercrime and that what is possible for other crimes should also be extended to the Cybercrime.
* thirdly it shows that if we do the same thing as with spam - target the biggest networks and the main financial backers and so on you can have an immediate enormous response
just as with terrorism is an international cooperation in all phases of the international prosecution the most effective way to hit directly at the central organizers of these networks
from inside the Donetsk airport that is being defended - and needs to be defended probably like this another week because there are rumours that Putin will sign a definitive ceasefire next week
these Ukranian soldiers have become real mythical heroes in Ukraine as 'Cyborgs' more because of the environment they are fighting in (like some sience fiction films) than because of their 'supersoldier' look - which is not the case, on first sight they should have at least 10 more tools and weapons )
and these are the Russians around them, firing from the buildings around the central airport control tower, from time to time like a ballet (people who think war is a permanent thing watch too much television) - war is mostly a waiting in which the only important things are taking and holding on to positions, setting up a good strategy to attack (and hold your flanks and logistics while attacking those of the enemy) and than having your battle for some time after which it all begins anew
"The United States is believed to have around 200 nuclear weapons in Europe. Russia’s tactical nuclear arsenal is at least 2,000. “NATO politics will prevent any cuts in U.S. tactical nuclear weapons in Europe,” he said. “This is obviously about the worst possible time to talk about something like this.”
Schneider said nuclear policymakers should focus on deterrence now instead of disarmament. A Russian Defense Ministry spokesman told state-run Interfax March 26 that a “missile-carrying regiment” of Tu-22 Backfire nuclear bombers will be deployed to the Crimean airbase at Gvardeyskoye within two years.
IHS Jane’s Defence Weekly described the nuclear-capable Tu-22s to be based in Crimea as “the backbone of Soviet naval strike units during the Cold War.”
Rogers, the strategic forces subcommittee chairman, said Sept. 18 that the Russians have discussed “plans to station tactical nuclear weapons in Crimea.”
nice to know that our Russian friends are even not feeling secure enough against us with their 2000 nuclear against our 200 missileheads, they even want to add some new ones in the Crimea, just to be a bit more nearer and have an even wider range (and it is not to protect us against Iranian or other arabic missiles that have fallen in the hands of some IS likeminded groups or leaders in some strategic plans)
every day there are between 10 and 30 battles being fought out with the main media attention at the totally destroyed Donetsk airport (which is internationally and strategically important to hold on to or to conquer)
afterwards therussians will arrive here
"Last month, the FBI warned healthcare providers to guard against cyber attacks after one of the largest U.S. hospital operators, Community Health Systems Inc, said Chinese hackers had broken into its computer network and stolen the personal information of 4.5 million patients.
Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging computer systems that do not use the latest security features.
"As attackers discover new methods to make money, the healthcare industry is becoming a much riper target because of the ability to sell large batches of personal data for profit," said Dave Kennedy, an expert on healthcare security and CEO of TrustedSEC LLC. "Hospitals have low security, so it's relatively easy for these hackers to get a large amount of personal data for medical fraud."