microblog.at ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Dies ist die private Mastodon Instanz von Robert Lender

Verwaltet von:

Serverstatistik:

1
aktive Profile

#dv

0 Beiträge0 Beteiligte0 Beiträge heute
Antwortete im Thread

@FransVeldman :

Hopelijk hebben de *meeste* mensen ondertussen hun buik vol van techsolutionisme (ik in elk geval wel).

PS hieronder een (zojuist gemaakte) screenshot van een nep Google Play Store - voorzien van een certificaat uitgegeven door "Google Trust Services" (go figure).

Aanvulling 12:22: u moet niet alles vertrouwen wat u op internet leest (de plaatjes hieronder zijn echt, maar leugenaars zeggen dat ook van hun plaatjes, websites en apps). In het kader van "Certificate Transparency" kunt u o.a. hier: crt.sh/?q=google-ivi.com de voor de nepsite uitgegeven certificaten bekijken - zodra die server weer bereikbaar is (down op dit moment). Als alternatief ziet u in virustotal.com/gui/domain/play het laatste certificaat. Nb. VirusTotal is een dochterbedrijf van Google, en de nepsite verstopt zich nu achter CDN-servers van Cloudflare.

@GrijzeBeamerNL @miekeroth

Antwortete im Thread

@vwbusguy : non-ACME certs suck big time.

However, now the internet has turned into a malicious phishing mess.

People can no longer determine who is responsible for a website, and nobody cares.

Google hosted fake websites (using ACME certs from Let's Encrypt) on their cloud servers called:
• cancel-google[.]com
• adsupport-google[.]com
• helpdesk-google[.]com

See (Dutch) infosec.exchange/@ErikvanStrat.

Google also doesn't give a fsck about HSTS, see infosec.exchange/@ErikvanStrat.

Worse, last year a phishing site with a domain name containing "google" was proxied by Cloudflare - and had a "GOOGLE TRUST SERVICES" DV certificate.

Did I mention that browsers suck and that Big Tech, making Big Money, is knowingly complicit to cybercrime?

And did I mention that certificates were not invented to please admins?

#Phishing#DV#GoogleIsEvil

Hoe de Politiehack precies heeft plaatsgevonden, weet ik niet.

Wel weet ik dat veel "experts"hun kop in het zand steken of mij zelfs voor gek verklaren als ik schrijf dat:

1) Het opzet is dat mensen op internet nep niet van echt kunnen onderscheiden (security.nl/posting/859906/Spe), en dat daar *dringend* iets aan gedaan moet worden;

2) Zij aanraden om zwakke MFA (security.nl/posting/859561/MFA) te gebruiken in plaats van een wachtwoordmanager die op domeinnamen checkt;

3) Onder hen er *zelfs* zijn die stellen dat we, op *dit* internet, EDIW veilig zouden kunnen gebruiken (reactie op een posting van Ivo Jansch, één van de architecten van EDIW: tweakers.net/nieuws/204138/#r_). Welliswaar met de opmerking dat er alternatieven moeten blijven bestaan (die er nu ook niet meer zijn voor communicatie met de overheid of met uw bank).

Zie ook security.nl/posting/827137/Kop, bovenaan die pagina en security.nl/posting/833217/Int.

#Politiehack #Politie #MFA #2FA #ZwakkeMFA #Zwakke2FA #DV #Certificaten #LetsEncrypt #LetsAuthenticateTheWebsiteFirst #AitM #MitM #Phishing #EvilProxy #PhaaS #Evilginx2 #EDIW #EUDIW #EC #KopieID #KopietjePaspoort #VideoIdent

(Bron van onderstaand plaatje: maxvandaag.nl/sessies/themas/m)

@fifonetworks : it's a taboo. Nobody really wants to accept that infosec is extremely hard, and most are in denial that they're at bigger risks than they think they are.

We (security people) often come up with a bunch of measures without explaining why they are a good idea, what side effects they have and which risks are not covered at all.

Here's one example: "use 2FA".

🔸 WEAK MFA
• Why use 2FA/MFA in the first place? Because most people use (and reuse) extremely weak passwords. 2FA does not _SOLVE_ *that* problem.

• SMS and voice are a bad idea anyway because of the risks of telephone "line" interception, call redirects or "SIM-swaps" (i.e. a miscreant hijacks your phone number).

• Many TOTP apps suck or sucked (see usenix.org/conference/usenixse by Conor Gilsenan
@conorgil et al. in infosec.exchange/@conorgil/109). A *lot* of people lost access to their accounts because Google Authenticator would not make backups of the underlying secrets, which people found out about after their phone died or was stolen. Authy in particular is bad (in Dutch: tweakers.net/nieuws/207532/#r_).

Effectively TOTP apps make people use a second password (unique for each website-account) that, supposedly, they do not have to remember, nor are they made aware that therefore (secure!) backups are a necessity. If those secrets are simply stored in their cloud-accounts, without encryption using an *independent* password, then they offer an extremy overestimated level of protection (it's mostly security by obscurity in such a case).

• None of the regular 2FA/MFA solutions protect against "evil proxies" (like those based on EvilGinx2) often provided by PhaaS (Phishing as a service) providers, used by a rapidly increasing number of attackers - as acknowledged by Microsoft in 2019 (link + details in infosec.exchange/@ErikvanStrat - whose marketeers, IMO misleading, still love to tell anyone that they should use Microsoft Authenticator).

🔸 STRONG MFA
Strong MFA (such as provided by passkeys and hardware keys) eliminates the *human* vulnerability of not knowing whether a given domain name belongs to the apparent (easily impersonated) owner of a website.

However, an increasing number of mis-issued certificates (this week, for potentially all of the .mobi TLD: arstechnica.com/security/2024/; some earlier attacks: infosec.exchange/@ErikvanStrat) means that passkeys and hardware keys are *not* as phishing-resistant as marketeers like us to believe.

That apart from the fact that passkeys and hardware keys are *not at all* without other issues.

🔸 PHISHING
There are roughly two types of phishing:

1) Where the user shares information with a website of an owner they believe to have interacted with before, or

2) Where they share personal info with, and/or pay money to, a website of an owner who is "new" to them (like a webshop that they've never done business with before).

Of course, 2FA/MFA do not help at all in case 2 (example in infosec.exchange/@ErikvanStrat).

IMO it is impossible to teach most people to reliably distinguish between fake and real on the internet (this is not only *my* opinion: security.googleblog.com/2024/0).

The common "instructions" to distinguish between fake an real websites are totaly unreliable, like "check for typos" or use a site like scamadvisor. There are way too many false positives *and* false negatives, while cybercriminals have an easy job to evade all such criteria. It should not be a requirement to be a forensics expert to safely use the internet.

🔸 INTERNET IS TOO INSECURE
We need to fix the internet first before we bother people with (currently unreliable) measures (typically without pointing out remaining or new risks).

🔸 FIX
Big tech have turned certificates into something comparable to passports that only show a totally meaningless SSN (Social Security Number). Which is why cybercrime is booming on the internet (for example, look at the approx. 1500 domain names listed below "Website data" in scamadviser.com/check-website/).

Fix: see infosec.exchange/@ErikvanStrat.

🔸 EXAMPLE
See the images below. When tapping "Scan", Chrome on my Android phone goes full screen and scans C:\Users\ (among others). Eventually it advised me to download "t4gf8h.zip" (virustotal.com/gui/file/0858ec).

🔸 FAKE VS REAL (AUTHENTIC)
Even strong MFA/2FA does not help. How are (non-nerd) Windows users supposed to know that this is *NOT* a McAfee website and *NOT* a McAfee virus scanner, with currently (according to VT, which may not be 100% correct, but -in my experience- provides a good indication) is detected by only 7/67 scanners?

#Phishing#Infosec#BigTech
Antwortete im Thread

@textualdeviance wrote, among other things:

« Sudden revolutions come with obscenely high body counts of innocent civilians. »

That is not necessarily true, in for example the following cases:

🔸 en.wikipedia.org/wiki/Velvet_R

🔸 A revolution that STOPS killing must take place #NOW. The anihilation of Palestinians is simply unacceptable, in particular because western countries condone, support or even encourage it. At some point the governments of the USA, NL and others must stop following orders from their Zionist sponsors, in order to not make them EVEN MORE complicit to genocide.

🔸 Personally I'm "fighting" for a safer internet; fixing tech does not have to involve bloodshed at all (although big tech and leeches like safer.io/ will lose income). Such as:

• By insisting on a system where internet users can distinguish betwee fake and authentic websites (see infosec.exchange/@ErikvanStrat);

• By providing strong arguments why "Chatcontrol" (governments scanning every smartphone looking for Child Sexual Abuse Material - and what not) will not protect a single child - on the contrary (infosec.exchange/@ErikvanStrat; chatcontrol is *not* just a privacy risk);

• By warning for passkeys (infosec.exchange/@ErikvanStrat) and suggesting better alternatives;

• By warning for risks such as when unlocking the screen of an iPhone/iPad with a PIN (infosec.exchange/@ErikvanStrat);

• By warning for security measures that are easily bypassed, such as 2FA/MFA (using SMS, voice, or TOTP "Authenticator" apps including Microsoft's using "number matching");

• Et cetera.

@0xabad1dea

en.wikipedia.orgVelvet Revolution - Wikipedia
#AIPAC#CIDI#Gaza

Indian Girl Who Got Her First Period Killed by Brother Who Mistook It for 'Affair'

The girl, 12, living with her brother, 30, and his wife, experienced her first menstruation. The brother, 30, believed the blood was evidence of she was involved in a sexual relationship.

When questioned about the stains, the girl was unable to respond due to her lack of knowledge about menstruation. The brother subjected her to physical abuse and torture, causing her death. #DV #GBV

news18.com/viral/mumbai-girl-w

News18Mumbai Girl Who Got Her First Period Killed By Brother Who Mistook it for 'Affair'Von Purvi Khemani