Sender | Message | Time |
---|---|---|
4 Jan 2020 | ||
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im |
| 11:45:17 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im invited krime . | 11:45:28 | |
krime joined the room. | 11:45:35 | |
krime | goddamn atmos, you scared me | 11:45:44 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Redacted or Malformed Event | 11:48:24 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | * These are the ones I've been collecting so far:
| 11:48:38 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | These are the ones I've been collecting so far:
| 11:48:51 |
Matrix Traveler (bot) joined the room. | 11:50:03 | |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Filter Name Description Sub link Ad & Tracker Filter List Blocks known Ads & Trackers CHEF-KOCH's Ad & Tracker Filter List Android Blocks ads & trackers and other unneeded Android traffic CHEF-KOCH's Android FilterList Adobe Blocks all Adobe traffic CHEF-KOCH's Adobe FilterList Apple Blocks all Apple traffic CHEF-KOCH's Apple FilterList Avast/CCleaner Blocks all Avast/CCleaner traffic CHEF-KOCH's Avast/CCleaner FilterList Cloudflare Blocks all Cloudflare traffic CHEF-KOCH's Cloudflare FilterList Blocks all Facebook & services traffic CHEF-KOCH's Facebook FilterList Blocks all Google & services traffic CHEF-KOCH's Google FilterList Blocks all Instagram & services traffic CHEF-KOCH's Instagram FilterList Microsoft Blocks all Microsoft & services traffic CHEF-KOCH's Microsoft FilterList Mozilla Blocks all Mozilla & services traffic CHEF-KOCH's Mozilla FilterList Blocks all Pinterest & services traffic CHEF-KOCH's Pinterest FilterList App: Skype Skype Ad-Free CHEF-KOCH's Skype Ad-Free FilterList App: Spotify Spotify Ad-Free CHEF-KOCH's Spotify Ad-Free FilterList Fonts Block all web fonts CHEF-KOCH's Fonts FilterList I2P & Onion Blocklist for bad I2P & Onion domains (not for ad-blockers!) CHEF-KOCH's I2P & Onion FilterList Malware Blocklist for Malware CHEF-KOCH's Malware FilterList Wontblock Unblock the Internet and good pages CHEF-KOCH's Wontblock FilterList Torrent Blocklist for bad Torrent Tracker CHEF-KOCH's Torrent FilterList CoinMiners Block all crypto coin miners CHEF-KOCH's CoinMiner FilterList | 12:10:08 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | uMatrix & HOSTS only optional filter lists.HOSTS and uMatrix only filter lists - please keep in mind that there not sub-clickable (like the above uBO list). There will also be no 127.0.0.1 versions.Filter NameDescriptionSub linkAd & Tracker Filter ListBlocks additional Ads & TrackersCHEF-KOCH's Ad & Tracker FilterListAdguardBlocks AdGuard related trafficCHEF-KOCH's Adguard FilterListAdobeBlocks all Adobe trafficCHEF-KOCH's Adobe FilterListAppleBlocks all Apple trafficCHEF-KOCH's Apple FilterListAvast/CCleanerBlocks all Avast/CCleaner trafficCHEF-KOCH's Avast/CCleaner FilterListCloudflareBlocks all Cloudflare trafficCHEF-KOCH's Cloudflare FilterListFacebookBlocks all Facebook trafficCHEF-KOCH's Facebook FilterListGoogleBlocks all Google & services trafficCHEF-KOCH's Google FilterListInstagramBlocks all Instagram & services trafficCHEF-KOCH's Instagram FilterListMicrosoftBlocks all Microsoft & services trafficCHEF-KOCH's Microsoft FilterListMozillaBlocks all Mozilla & services trafficCHEF-KOCH's Mozilla FilterListNSA,FBI,CIABlocks all NSA, CIA, FBI etc 'spying' server connectionsCHEF-KOCH's NSA FilterListPinterestBlocks all Pinterest & services trafficCHEF-KOCH's Pinterest FilterListApp: SkypeSkype Ad-FreeCHEF-KOCH's Skype Ad-Free FilterListApp: SpotifySpotify Ad-FreeCHEF-KOCH's Spotify Ad-Free FilterListuMatrixuMatrix / HOSTS based lists (only for uMatrix users!)CHEF-KOCH's uMatrix FilterListGame ListBlocks additional game trackingCHEF-KOCH's Game FilterListCoinMinersBlock all crypto coin minersCHEF-KOCH's CoinMiner FilterList | 12:10:20 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | * [NSA official GitHub Account](https://nationalsecurityagency.github.io) * [USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs](https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/su) * [WikiLeaks Publishes NSA Target List](https://wikileaks.org/nsa-201602/) * [NSA Warns of the Dangers of Quantum Computing (futurism.com)](http://futurism.com/nsa-warns-dangers-quantum-computing/) * [Right to privacy (wikipedia.org)](https://en.wikipedia.org/wiki/Right_to_privacy) * [Patriot Act | Wikipedia](https://en.wikipedia.org/wiki/USA_PATRIOT_Act) + CALEA act + [FISA](https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act) * [Cryptome | cryptome.org](http://cryptome.info/0001/ip-tla.htm) * [NSA's Autonomous Systems (AS),](https://www.robtex.net/?_escaped_fragment_=dns%3Dnsa.gov#!dns=nsa.gov) * [33bits | 33bits.org](http://33bits.org/) * [What an IP Address Can Reveal About You | priv.gc.ca](https://www.priv.gc.ca/information/research-recherche/2013/ip_201305_e.asp) * [Randomtalker web-privacy](http://randomwalker.info/web-privacy/) * [https://bosnadev.com/2015/04/14/facebook-chats-are-being-scanned-by-a-cia-funded-company/](Chats Are Being Scanned By A CIA Funded Company) * [Mobile Security Wiki | mobilesecuritywiki.com](https://mobilesecuritywiki.com/) * [Researcher at Kaspersky Labs have discovered a list of domains used by the NSA to install malware on victim's PC around the world.](https://www.hackread.com/here-is-a-list-of-urls-used-by-the-nsa-to-install-malware-on-pcs-worldwide/) * [NSA PRISM Keywords For Domestic Spying | Business Insider](http://www.businessinsider.com/nsa-prism-keywords-for-domestic-spying-2013-6?IR=T) * [Windows and the backdoor question from 1999 | CNN](http://edition.cnn.com/TECH/computing/9909/03/windows.nsa.02/) * [Psssst: Wanna Buy a Used Spy Website? | Wired](http://www.wired.com/2015/03/nsa_domains/) * [Understanding NSA Malware | Schneier on Security](https://www.schneier.com/blog/archives/2015/02/understanding_n.html) * [Check if NSA warrantless surveillance is looking at your IP traffic | Lookingglassnews](http://www.lookingglassnews.org/viewstory.php?storyid=6861) * [Sensitive IP addresses | Wikipedia](https://en.wikipedia.org/wiki/Wikipedia:Sensitive_IP_addresses) * [Do Not Scan - Government IP list | PeerBlock Forums](http://forums.peerblock.com/read.php?8,14794,14794) * [Hardened user.js for Firefox to stop data leackage | GitHub](https://github.com/pyllyukko/user.js) * [Firefox Zero-Day Exploit used by FBI to shutdown Child porn on Tor Network hostin; Tor Mail Compromised](https://thehackernews.com/2013/08/Firefox-Exploit-Tor-Network-child-pornography-Freedom-Hosting.html) * [Entire set of 5,300+ .gov domains as .csv file | GitHub](https://gsa.github.io/data/dotgov-domains/2014-12-01-full.csv) * [SS7 hack shown demonstrated to track anyone | 60 Minutes](http://www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-hacking/) * [SSL Blacklist](https://sslbl.abuse.ch/blacklist/) * [MITM-Proxy](https://mitmproxy.org/doc/howmitmproxy.html) + [Lagado proxy test](http://www.lagado.com/proxy-test) + [Lagado cache test](http://www.lagado.com/tools/cache-test) * [Detect Superfish, Komodia and Privdog | filippo](https://filippo.io/Badfish/) * [SSL eye prism protection | digi77](https://www.digi77.com/ssl-eye-prism-protection/) * [NSAPlaySet](http://www.nsaplayset.org/) * [Global surveillance disclosures (2013–present) | Wikipedia](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)) * [Attacking Tor: how the NSA targets users' online anonymity |TheGuardian](http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity) * [Using a Power Law Distribution to describe Big Data | Arxiv.org](http://arxiv.org/abs/1509.00504) * [5 reasons you need to be tracking Big Data security analytics (monitor.us)](http://blog.monitor.us/2015/09/5-reasons-you-need-to-be-tracking-big-data-security-analytics/) * [FBI, intel chiefs decry “deep cynicism” over cyber spying programs (arstechnica.com)](http://arstechnica.com/tech-policy/2015/09/fbi-intel-chiefs-decry-deep-cynicism-over-cyber-spying-programs/) * [Internet-Wide Scan Data Repository (scans.io)](https://scans.io/) * [.onion (ietf.org)](https://www.ietf.org/blog/2015/09/onion/) * [Mail tester to check you eMail security score](http://www.mail-tester.com/) + [eMail defense](https://emailselfdefense.fsf.org/en/) * [List of United States mobile virtual network oprators](https://en.m.wikipedia.org/wiki/List_of_United_States_mobile_virtual_network_operators) * If you are interested in switching away from Google, take a look at https://github.com/sovereign/sovereign * [Julian Assange: Debian Is Owned by the NSA (igurublog.wordpress.com)](https://igurublog.wordpress.com/2014/04/08/julian-assange-debian-is-owned-by-the-nsa/) * [Vodafone Australia admits hacking Fairfax journalist's phone (theguardian.com)](http://www.theguardian.com/business/2015/sep/13/vodafone-australia-admits-hacking-fairfax-journalists-phone) * [Hacking Team, Computer Vulnerabilities, and the NSA (schneier.com)](https://www.schneier.com/blog/archives/2015/09/hacking_team_co.html) * [Big Data and Environmental Sustainability: A Conversation Starter (in Brief) (medium.com)](https://medium.com/@AlanKeeso/big-data-and-environmental-sustainability-a-conversation-starter-in-brief-4052d0b2f0ae) * [ISPs don’t have First Amendment right to edit Internet, FCC tells court (arstechnica.com)](http://arstechnica.com/tech-policy/2015/09/isps-dont-have-1st-amendment-right-to-edit-internet-fcc-tells-court/) * [Homeland Security websites vulnerable to cyber attack: audit (reuters.com)](http://www.reuters.com/article/2015/09/15/us-usa-cybersecurity-idUSKCN0RF2DC20150915) * [Now you can find out if GCHQ illegally spied on you (privacyinternational.org)](https://www.privacyinternational.org/?q=illegalspying) * [Hacking Team, Computer Vulnerabilities, and the NSA (georgetown.edu)](http://journal.georgetown.edu/hacking-team-and-the-nsa/) * [New Federalist platform lets [government] agencies quickly launch websites (gsa.gov)](https://18f.gsa.gov/2015/09/15/federalist-platform-launch/) * [Government spying spooks French citizens (straitstimes.com)](http://www.straitstimes.com/world/europe/government-spying-spooks-french-citizens) * [NSA Plans to Develop Encryption That Could Stump Quantum Computers (wired.com)](http://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/) * [Japanese government orders closure of university social science/humanities depts (timeshighereducation.com)](https://www.timeshighereducation.com/news/social-sciences-and-humanities-faculties-close-japan-after-ministerial-decree) * [Tollow (reqrypt.org)](https://reqrypt.org/tallow.html) * [Chinese government firms sell products that subvert censorship (larrysalibra.com)](https://www.larrysalibra.com/hop-over-the-great-firewall-with-government-help/) * [The Tricky Encryption That Could Stump Quantum Computers (wired.com)](http://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/) * [GCHQ tried to track Web visits of “every visible user on Internet” (arstechnica.com)](http://arstechnica.com/security/2015/09/gchq-tried-to-track-web-visits-of-every-visible-user-on-internet/) * [A Q&A with NSA Whistleblower Edward Snowden (fusion.net)(http://fusion.net/story/201737/edward-snowden-interview/) * [Skype Alternatives, Part 2: Edward Snowden’s Recommendations (cointelegraph.com)](http://cointelegraph.com/news/114689/skype-alternatives-part-2-edward-snowdens-recommendations) * [The FBI has no trouble spying on encrypted communications (boingboing.net)](http://boingboing.net/2015/09/29/the-fbi-has-no-trouble-spying.html) * [Encryption doesn't stop the FBI (theintercept.com)](https://theintercept.com/2015/09/28/hacking/) * [NSA runs its spying activities on Red Hat Linux](http://www.itwire.com/opinion-and-analysis/open-sauce/68567-nsa-runs-its-spying-activities-on-red-hat-linux) * [How the NSA can break trillions of encrypted Web and VPN connections ](http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/) Videos ------------ * [Greenwald Vs. NSA debate (youtube.com)](https://www.youtube.com/watch?t=12&v=sfPjgUgoLaQ) * [A Conversation with Edward Snowden (Part 1) [Podcast] (startalkradio.net)](http://www.startalkradio.net/show/a-conversation-with-edward-snowden-part-1/) Papers ------------ * [Detect IP spoofing with 97 chance of success](https://sce.carleton.ca/~abdou/CPV_TDSC.pdf) * [ENCRYPT Act of 2016](https://assets.documentcloud.org/documents/2708079/LIEU-027-Xml-ENCRYPT-Act-of-2016.pdf) * [Google PDF Search: “not for public release”](https://www.google.com/search?as_q=&as_epq=not+for+public+release&as_oq=&as_eq=&as_nlo=&as_nhi=&lr=&cr=&as_qdr=all&as_sitesearch=&as_occt=any&safe=images&as_filetype=pdf&as_rights=&gws_rd=ssl) * [Password guidance - simplifying your approach (GCHQ) [pdf] (gov.uk)](https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/458857/Password_guidance_-_simplifying_your_approach.pdf) * [ISP wins 11-year battle to reveal warrantless FBI spying [pdf] (calyxinstitute.org)](https://www.calyxinstitute.org/sites/all/documents/08_28_2015_REDACTED_Decision_and_Order.pdf) * [TheIntercept Documents](https://theintercept.com/document/2015/09/25/legalities) * [Speicherfristen von Verkehrsdaten im Mobilfunk (spiegel.de)](http://www.spiegel.de/media/media-37689.pdf) | 12:15:09 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | ^ this is why u should use demonsaw | 12:15:32 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | encryption of matrix alone is not enough unlike a salting u can change every hours. | 12:15:59 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | ds provide 2 sha512 layers by default + tls + the private onion routing | 12:16:22 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | if we consider the user using dnscrypt + vpn ( let say wireguard ) | 12:16:42 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | and can add a extra group encryption layers which is also control the salt another sha512 | 12:16:59 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | and account cannot be remotely accessed - the absence of meta data is also a big factor | 12:17:17 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | According to EGMR mass surveillance is now official against human rights. You still can help keep the fight up against any surveillance programs! | 12:44:24 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im |
Anti-DPI (deep package inspection) tools (they don't replace a good VPN!)NSA Resources and public program(s) | 12:44:45 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Snowden documents compilations
| 12:45:06 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Known compromised ISP Providers
Needs more evidence
ISP which are known to fight for privacy and a free internet
| 12:45:22 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Blockchain monitoring
Videos | 12:45:36 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Using special programs or a VPN in order to defeat surveillance is not enough. You can directly help to stop it by filling out the 'take action' documents/proposal which helps to fight against spying, surveillance and other non-acceptable government actions. CampaignOrganizationStatusTell Congress to Reinstate the Open Internet OrderEFF Open No Airport Biometric SurveillanceEFFOpen Check Your Reps: Tell Congress to Save the Open InternetEFFOpen Oakland: Stand Up for Community Control of Police Spy TechEFFOpen Help California Secure Net Neutrality Protections: Support S.B. 822EFFOpen Stop SESTA/FOSTAStop Sesta/EFFOpen Stand Up for Copyright in the Digital AgeMozilla/EFFOpen An Open Letter to Our Community On Congress’s Vote to Extend NSA Spying From EFF Executive Director Cindy CohnCindy Cohn (EFF)Closed An Open Letter to Our Community On Congress’s Vote to Extend NSA Spying From EFF Executive Director Cindy CohnCindy Cohn (EFF)Closed A.B. 1584Jerry Brown (EFF)WonTell Congress: Stop the Burr-Feinstein Backdoor ProposalEFFWon | 12:46:27 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | https://www.documentcloud.org/public/search/projectid:45842-Termination-Letters | 13:00:57 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | https://webtransparency.cs.princeton.edu/webcensus/ | 13:22:31 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Privy DemoNSAw router will be open for the week end then we will change the password , you can find informations about it in my uplauded files or join directy privy.cafe port : 8080 :: password dg4lprivy , after that weekend . we will release challenges, ctf to complete in order to join or being invited by a current member I uplauded around 200G myself , chrono , juji and couple others also uplaud great content DM me if you have any questions | 14:47:47 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Linux Internals
Assembly
| 15:35:29 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | Rev-Eng[ Workshops ] Reverse Engineering Workshops Collection
Exp-Dev[ Series ] Security Sift ‘s Windows exploitation Blog Posts
| 15:35:37 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | [ Series ] Dhaval Kapil’s Linux Exploitation Tutorials [ Series ] The Amazing King – Windows Exploitation Tutorials
[ Series ] Azeria Labs for ARM Exploitation [Series ] GB_Master’s x86 Exploitation Tutorials
| 15:35:47 |
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im | [ Tutorials ] Exploit Dev Tutorials from multiple resources
| 15:35:59 |