framapiaf.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Un service Mastodon fourni par l'association d’éducation populaire Framasoft.

Administré par :

Statistiques du serveur :

1,4K
comptes actifs

#backdoor

7 messages7 participants0 message aujourd’hui

Even Google cannot deny the British surveillance order

A British secret order requires Apple to build a backdoor into strong encryption of backups and other data.

There are now indications that Apple is not alone and that Google has also been served with a similar secret order.

mediafaro.org/article/20250318

A hand in front of ones and zeroes. |
Heise Online · Even Google cannot deny the British surveillance orderPar Daniel AJ Sokolov
#UK#Apple#Google

Even Google cannot deny the British surveillance order

British surveillance authorities demand worldwide access to Apple backups. Apple is not allowed to confirm this and is apparently not an isolated case.

heise.de/en/news/Even-Google-c

heise online · Even Google cannot deny the British surveillance order
Plus via Daniel AJ Sokolov
#Apple#Google#Backdoor

Auch Google kann britischen Überwachungsbefehl nicht verleugnen

Britische Überwacher verlangen weltweiten Zugriff auf Apple-Backups. Apple darf das nicht bestätigen und ist damit offenbar kein Einzelfall.

heise.de/news/Auch-Google-kann

heise online · Auch Google kann britischen Überwachungsbefehl nicht verleugnen
Plus via Daniel AJ Sokolov
#Apple#Google#Backdoor

Lire le même jour

Un mail d'avertissement par la DGSI du risque d'espionnage économique.

Un article qui dit que la patronne de la DGSI qui dit qu'ils ont besoin de backdoor pour travailler. (Et donc elle justifie les backdoor de la loi #narcotrafic )

Si une telle #backdoor est imposée, ça va forcément aider l'espionnage économique. 😂

Si la vie privée est un délit, seuls les délinquants y ont droit.

UK’s secret iCloud backdoor order triggers civil rights challenge.

The UK government’s secret order to Apple demanding it backdoor the end-to-end encrypted version of its iCloud storage service is challenged by two civil rights groups, Liberty and Privacy International.

They called the order “unacceptable and disproportionate” and warned of “global consequences” as it's thought to extend to non-UK users too.

mediafaro.org/article/20250314

An Apple live presentation of the iCloud+ service
TechCrunch · UK’s secret iCloud backdoor order triggers civil rights challenge.Par Natasha Lomas
#UK#Apple#ICloud

woah, exactly as theorised by literally everyone that isn't fucking racist: #ESP32 "#backdoor" was just sensationalised by a security firm in order to get clicks for their own blog post which is basically just advertising their services

big conflict of interest. who knew that the biggest security violation will always be capitalist motives ✨

youtube.com/watch?v=ndM369oJ0t

Malicious Packages Identified in the Wild: Insights and Trends from November 2024 Onward

FortiGuard Labs has analyzed malicious software packages detected from November 2024 to March 2025, revealing various attack techniques used to exploit system vulnerabilities. Key findings include 1,082 packages with low file counts, 1,052 packages with suspicious install scripts, and 1,043 packages lacking repository URLs. Attackers employ methods such as obfuscation, command overwrite, and typosquatting to bypass security measures. The analysis highlights the use of suspicious APIs, URLs, and installation scripts to exfiltrate data, establish backdoors, and perform remote control activities. Specific cases involve malicious Python and Node.js packages targeting developers and harvesting sensitive information. The report emphasizes the importance of robust detection strategies and proactive defense measures to mitigate these evolving cybersecurity threats.

Pulse ID: 67cf4b932b27ceeadb710aab
Pulse Link: otx.alienvault.com/pulse/67cf4
Pulse Author: AlienVault
Created: 2025-03-10 20:29:07

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Journalists once again parroting whatever law enforcement/governments say they're doing, aiding and abetting them in pretending that "criminals" and "bad guys" and "hostile nation-states" are the primary/only threat when really governments mostly just want themselves (and the corporations they approve of) to have a monopoly on terrorizing their own populations. There is a straight line between this kind of journalism and the general population's deep confusion about who is out to harm them. Credit to the journo for at least including some critical perspectives, but even those don't mention that police themselves *are* the threat.

"France is proposing a law to require encrypted messaging applications, including Signal and WhatsApp, and encrypted email services such as Proton Mail to provide law enforcement with decrypted data on request.

The law, which aims to provide French law enforcement with stronger powers to combat drug trafficking, has raised concerns among tech companies and civil society groups that it will lead to the creation of “backdoors” in encrypted services that will be exploited by cyber criminals and hostile nation-states."

The law also permits the use of spyware such as NSO Group’s Pegasus or Paragon to allow police to remotely activate microphones and cameras of mobile phones and computers, according to an analysis by the civil society group, La Quadrature Du Net.

It also extends the scope of algorithms, known as “black boxes”, which collect data on communications over the internet with the intention of identifying people suspected of criminal activity to authorise the collection of data for “combatting crime and organised crime”."

computerweekly.com/news/366619

ComputerWeekly.com · France pushes for law enforcement access to Signal, WhatsApp and encrypted email Par Bill Goodwin
#Privacy#InfoSec#Data

SideWinder targets the maritime and nuclear sectors with an updated toolset

The SideWinder APT group intensified its activities in the second half of 2024, targeting maritime infrastructures, logistics companies, and nuclear sectors across Asia, the Middle East, and Africa. The group updated its toolset, including improvements to its RTF exploit, JavaScript loader, and Backdoor Loader. SideWinder's infection chain begins with spear-phishing emails containing malicious DOCX files, exploiting CVE-2017-11882 to deliver a multi-stage payload. The group demonstrated agility in evading detection, often updating their tools within hours of being identified. Notable targets included government entities, military installations, and diplomatic missions, with an increased focus on maritime and nuclear-related organizations.

Pulse ID: 67cebdf90f3d662d90cb0701
Pulse Link: otx.alienvault.com/pulse/67ceb
Pulse Author: AlienVault
Created: 2025-03-10 10:24:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#Africa#Asia#BackDoor

Jedes Produkt ist nur so sicher wie seine Einzelteile: Am Wochenende wurde eine #Backdoor in einem #IoT-#Mikrocontroller entdeckt, der in geschätzt mehr als einer Milliarde IoT Devices verbaut ist. Und weil der Chip nur 2 EUR im Einkauf kostet, wird er auch in so vielen Endgeräten verbaut. Mit der Backdoor ist es u.a. möglich, sensible Daten abzugreifen, Geräte fernzusteuern oder #Schadsoftware zu verbreiten - Security by Design schaut anders aus:

bleepingcomputer.com/news/secu

BleepingComputer · Undocumented commands found in Bluetooth chip used by a billion devicesPar Bill Toulas

Yikes, from an article that contains a lot more detail, but just to get your attention as to the impact part:

«The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for attacks.

The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.

"Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls."

The researchers warned that ESP32 is one of the world's most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.»

People worried about this topic might also "enjoy" the recent Netflix series Zero Day.

And not to get too far afield, but hopefully it also didn't escape notice that there have been broad firings of qualified people in the US government for reasons related not to their technical skill or ability to protect our nation from issues like this, but because of irrelevant details of their private lives or personal leanings on issues of having fair and competent government, helping the needy, defending individual human freedom and dignity, or avoiding mass death in myriad ever-more-likely ways.

bleepingcomputer.com/news/secu

BleepingComputer · Undocumented commands found in Bluetooth chip used by a billion devicesPar Bill Toulas