Zum Inhalt der Seite gehen

Suche

Beiträge, die mit backdoor getaggt sind


This week in #FDroid (TWIF) is live:

- #K9Mail developer quits Mozilla, thanks @cketti for all the good work
- #surveillance laws want #backdoor access in #France again
- #FOSSGIS 2025 in March, get the app
- #onionshare crash fix soon
- #RiMusic might be in danger
- #SimpleX has group growing pains
- #Termux GUI is finally available
- #Threema Libre reacts
- #VLC with Remote Access
- #XScreenSaver has nice privacy policy

Click for +218 lines of news: https://f-droid.org/2025/02/27/twif.html


"The furor after Apple removed full iCloud security for U.K. users may feel a long way from American users this weekend. But it’s not — far from it. What has just shocked the U.K. is exactly what the FBI told me it also wants in the U.S. “Lawful access” to any encrypted user data. The bureau’s quiet warning was confirmed just a few weeks ago.

The U.K. news cannot be seen in isolation and follows years of battling between big tech and governments over warranted, legal access to encrypted messages and content to fuel investigations into serious crimes such as terrorism and child abuse.

As I reported in 2020, “it is looking ever more likely that proponents of end-to-end security, the likes of Facebook and Apple, will lose their campaign to maintain user security as a priority.” It has taken five years, but here we now are.

The last few weeks may have seemed to signal a unique fork in the road between the U.S. and its primary Five Eyes ally, the U.K. But it isn’t. In December, the FBI and CISA warned Americans to stop sending texts and use encrypted platforms instead. And now the U.K. has forced open iCloud to by threatening to mandate a backdoor. But the devil’s in the detail — and we’re fast approaching a dangerous pivot."

https://www.forbes.com/sites/zakdoffman/2025/02/24/fbis-new-iphone-android-security-warning-is-now-critical/

#USA #FBI #CyberSecurity #Encryption #Privacy #UK #CISA #Apple #Backdoor


Meredith Whittaker, CEO von 𝗦𝗶𝗴𝗻𝗮𝗹, bezieht klar Stellung gegen das geplante schwedische Gesetz, das Messenger wie #𝗦𝗶𝗴𝗻𝗮𝗹 und #𝗪𝗵𝗮𝘁𝘀𝗔𝗽𝗽 zur Speicherung von Nachrichten zwingen soll. Statt eine #𝗕𝗮𝗰𝗸𝗱𝗼𝗼𝗿 einzubauen oder die Verschlüsselung zu schwächen, würde Signal Schweden verlassen. Während #𝗔𝗽𝗽𝗹𝗲 in Großbritannien den Regierungsforderungen nachgegeben hat, bleibt Signal standhaft und verteidigt kompromisslos die #𝗣𝗿𝗶𝘃𝗮𝘁𝘀𝗽𝗵ä𝗿𝗲 seiner Nutzer.

😀💪🏼

https://swedenherald.com/article/signals-ceo-then-were-leaving-sweden

#Datenschutz


How the #UK is Weakening Safety Worldwide

https://blog.thenewoil.org/how-the-uk-is-weakening-safety-worldwide

#Apple #ADP #politics #backdoor #cybersecurity #privacy #blog


𝗗𝗶𝗴𝗶𝘁𝗮𝗹𝗲 𝗦𝗲𝗹𝗯𝘀𝘁𝗯𝗲𝘀𝘁𝗶𝗺𝗺𝘂𝗻𝗴 𝗶𝘀𝘁 𝘄𝗶𝗰𝗵𝘁𝗶𝗴𝗲𝗿 𝗱𝗲𝗻𝗻 𝗷𝗲

Die aktuelle 𝗔𝗽𝗽𝗹𝗲-𝗗𝗲𝗯𝗮𝘁𝘁𝗲 zeigt erneut, wie fragil digitale #𝗣𝗿𝗶𝘃𝗮𝘁𝘀𝗽𝗵ä𝗿𝗲 ist. Wer sich und seine Daten schützen will, sollte Alternativen nutzen und nicht blind Big-Tech vertrauen. Eine eigene Cloud wie #𝗡𝗲𝘅𝘁𝗰𝗹𝗼𝘂𝗱 oder ein #𝗡𝗔𝗦 ist ein wichtiger Schritt hin zur digitalen Unabhängigkeit – ohne 𝗛𝗶𝗻𝘁𝗲𝗿𝘁ü𝗿𝗲𝗻, ohne Ü𝗯𝗲𝗿𝘄𝗮𝗰𝗵𝘂𝗻𝗴, mit voller 𝗞𝗼𝗻𝘁𝗿𝗼𝗹𝗹𝗲.

😀✌🏼

https://winfuture.de/news,148696.html

#Datenschutz #Security #Verschlüsselung #Apple #Backdoor


Firefox & Windows Zero-Days exploited by Russian RomCom Threat Actor’s.

IT-security researchers at ESET have exposed a malicious campaign by the Russia-linked RomCom group, which combined two previously unknown (zero-day) vulnerabilities to compromise targeted systems including Windows and Firefox.

https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/

#firefox #windows #zerodays #backdoor #it #security #privacy #engineer #media #tech #news
RomCom Exploits Double Zero-Day: RomCom, a Russia-linked group used previously unknown vulnerabilities in Firefox and Windows in a sophisticated attack campaign.

The attack chain, first detected on October 8th, started with a vulnerability in Mozilla Firefox and Thunderbird, (CVE-2024-9680, CVSS score 9.8). If a user with a vulnerable browser visited a customized webpage, malicious code could run within the browser’s restricted environment without any user interaction. This vulnerability, a “use-after-free” bug in the animation feature of Firefox, was quickly addressed by Mozilla within 24 hours of being notified by ESET.

However, the attack didn’t stop there. RomCom chained this browser vulnerability with another zero-day flaw in Windows (CVE-2024-49039, CVSS score 8.8) to bypass the browser’s security “sandbox.” This second vulnerability allowed the attackers to run code with the privileges of the logged-in user, taking control of the system. Microsoft released a fix for this issue on November 12th.

This cyberattack campaign goes on to show the importance of quick vulnerability disclosure and patching. It also emphasises the need for users to remain alert and keep their software up to date to prevent exploitation of zero-day vulnerabilities.
[ImageSource: ESET]

RomCom Victims Heatmap

ESET’s investigation shows that RomCom targeted various sectors, including government entities in Ukraine, the pharmaceutical industry in the US and the legal sector in Germany, for both espionage and cybercrime purposes. The group, also known as Storm-0978, Tropical Scorpius or UNC2596, is known for both opportunistic attacks and targeted espionage.

From October 10th to November 4th, ESET’s data showed that users visiting these malicious websites were primarily located in Europe and North America, with the number of victims ranging from one to as many as 250 in some countries.
[ImageSource: ESET]

RomCom Attack Flow

The exploit chain worked by first redirecting users to fake websites, which used domains designed to appear legitimate and included the names of other organizations, before sending them to a server hosting the exploit code.

These fake sites often used the prefix or suffix “redir” or “red” to a legitimate domain, and the redirection at the end of the attack took the victims to the legitimate website, hiding the attack. Once the exploit successfully ran, it installed RomCom’s custom backdoor, giving the attackers remote access and control over the infected machine.

"The compromise chain is composed of a fake website that redirects the potential victim to the server hosting the exploit and should the exploit succeed, shellcode is executed that downloads and executes the RomCom backdoor," said ESET researcher Damien Schaeffer.