"Intel AMT/MEMeet Intel’s hardware backdoor": wonderful writeup detailing the in's and out's of Intel Management Engine as a hardware backdoor running OOB (Out Of Band Side Network- packets invisible to Wireshark/sniffing) -3 ring (under everything); contains many screenshots, tcp ports, hardware profiles and more. A wealth of information on the Intel Management Engine/AMT as a backdoor profile. Well worth the read.
Source: Author: "csk” casek@uberwall.org LaCon, September 21-22, 2012
For more information see my video on Intel Management Engine as a backdoor + new UEFI discovered backdoor allowing insertion of foreign microcode into your processor + more on the Out Of Band networking and solution ideas here: https://odysee.com/@RTP:9/intel-processor-backdoor-newly:8
Mass Surveillance Lobbyists Increased Political Donations 10 x Fold, In Turn, Politicians Allow Them To Write "Industry Friendly Privacy Legislation" & This Week News: FTC Fines Amazon For Allowing "Unfettered Access" To Ring / Alexa Media (Contractors / Employees)
Could (but cannot yet prove) Certain Big Tech Firms (not necessarily any mentioned here) Have Played Role In #TheRestrictAct, Among Other Highly Invasive Legislation? Some Stand To Benefit Greatly.
**PLEASE SHARE VIDEO TO INFORM / HELP CHANNEL BECOME RECOMMENDED (many hours editing for each video / post; THANK YOU for sharing this)**
**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
? **SUPPORT CHANNEL / INDEPENDENT CONTENT**
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
CASHAPP - https://cash.app/$HumanRightsTech
? COREBOOT THINKPAD (intelME neutered & refurbished): https://buymeacoffee.com/politictech/commissions (limited service: can also accept xmr / other options) - can even offer Kicksecure preinstalled with Whonix set up for this support option
? CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
? CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (use tutorial below to set yours up)
? CLEARNET EMAIL: righttoprivacy[at]i2pmail.org
? THUNDERBIRD I2PMAIL + PGP TUTORIAL: https://www.buymeacoffee.com/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later
LOBBYIST BLOG ARTICLE CITED IN VIDEO: https://www.buymeacoffee.com/politictech/report-amazon-lobbyists-attack-privacy-legislation
LATEST AMAZON FTC ARTICLE: https://techcrunch.com/2023/05/31/amazon-ring-ftc-settlement-lax-security/
#private #security #privacy
...
https://www.youtube.com/watch?v=pDGr9hMfvV8
Walkthrough example of information gathering including documents, emails, and websites using Maltego, a rich feature filled OSINT tool using this made up name example
Please Like, Share, & Subscribe to show your support and help get our content to more people. It is appreciated.
What do you want to see next?
If you appreciate something I do and want to show support you can now Buy Me a Coffee: https://www.buymeacoffee.com/politictech :)
BTC: 1PpksaxUKw1kKna7BPU8oXbrxA2hh2PAXi
Want a custom torified and/or high security WiFi privacy router or Torified Hidden service Nextcloud server you can host yourself? righttoprivacy[at]tutanota.com
Twitter: https://www.twitter.com/tvprivacy
Blog: https://politictech.wordpress.com
Inquiries: righttoprivacy[at]tutanota.com
...
https://www.youtube.com/watch?v=hGJWdxWLdL8
wipri has new features mitigation (-w flag) option protects against saved SSID leaks (probe request), as shown in mactrack privacy concern demo
wipri works on most Linux phones, tablet, or computer, relying on nmcli, wireless-tools for some features.
install.sh automated setup boot options require systemd.
Read The Blog: https://buymeacoffee.com/politictech/posts
Support My Work: https://buymeacoffee.com/politictech
...
https://www.youtube.com/watch?v=dl7Vu0TIyrY
This is wipri. A different kind of more anonymous Metadata disinformation/MAC/hostname/Signal randomizations, txpower randomization (for location confusion- experimental), Brand name/device mimics (Apple/Android) or billions of other potential MAC addresses (all valid); synchronized changes of hostname/mac/txpower also an option. Check it out for Linux (runs on Pinephone too). Protect your privacy.
More Linux stuff coming soon!
My latest thoughts on the Pinephone Andd Linux Mobile Community
Be sure to subscribe (free, public) to the blog for Linux and mobile tutorials:
https://buymeacoffee.com/politictech/posts
...
https://www.youtube.com/watch?v=YNHVmFrxqis
Tor Browser safe usage depends on leaving small footprints. I go over some basic rules you can apply to maxmize privacy/anonymity. I believe we all have that basic, fundamental Human Right to Privacy.
The strength in Tor Browser is when used right, its design is to blend in with other Tor Browser users. To use Tor Browser properly.
Here are a few simple recommendations for Human Rights.
Did you know United Nations declared #Privacy #12 in their Universal Declaration of Human Rights?
There is nothing more ethical than helping others.
Without Human Rights activists we would not hold the rights we have today, and without privacy activists we have little chance for privacy tomorrow.
Support:
If you want to Support videos like this or read my Public blog posts (by category) tap the "Posts" link: https://www.buymeacoffee.com/politictech
Further Support Options are at the bottom of this video description.
Thank you for Sharing this content! It's the only way to help this channel grow in the algorithms. Share it!
-----------------------------------------------------
SUPPORT OPTIONS:
MONERO:45uR29avoRkJrGSvzZVaRXgDQHr6vK1YvRuQMrYMWFeyZ9h8grJimvzcbbcdehNSh37y4fw34eMUAhrpMSuwzEVSGP5101U
CASHAPP: https://cash.app/$HumanRightsTech
BMAC (Blog + Support + Consulting): https://www.buymeacoffee.com/politictech/
BTC: 3QDdTcLwLTPXKMBp5dLUhKJG6KbDxWsYWS
----------------------------------------------------
TIMESTAMPS
00:00 Introduction
00:13 Rules Begin
00:27 Onion? (See My Video Recommendation For More)
01:03 Large Files
01:58 Video Recommendations
01:43 End to end encryption
02:31 https
03:09 situational awareness
03:41 Metadata
05:54 MAC Address
06:51 Recommended video: VPN vs clearnet Tor vs Hidden Services
08:20 File Download safety
09:40 Support
LINKS:
Sharing content, post, and/or video is *much appreciated*.
Onion Gitea Service (Tor Hidden Service): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/
FOLLOW:
Twitter: https://www.twitter.com/tvprivacy
Fosstodon: https://www.fosstodon.org/@RTP
VIDEO CHANNELS/MIRRORS:
Youtube: https://www.youtube.com/c/RTPPrivacyTechTips
Odysee: https://odysee.com/@RTP
Bitchute: https://www.bitchute.com/yourprivacytv/
Peertube: https://tube.tchncs.de/c/privacy__tech_tips/videos
BLOG/SUPPORT:
CASHAPP: $HumanRightsTechBMAC:
BLOG/EXTRAS: https://www.buymeacoffee.com/politictech/posts
BTC: 3QDdTcLwLTPXKMBp5dLUhKJG6KbDxWsYWS
...
https://www.youtube.com/watch?v=83o4oaXqHQc
Picking "Extra Space Storage" Branded Secure Storage Disc Padlock, Using Handheld Rake & Tension Wrench - Understanding Weaknesses & How Quickly This Can Be Done Helps Us Make Security Upgrades In Future; I hadn't seen this exact lock being picked (this brand) and wanted to share another demonstration with tips on lockpicking to help test your own security setup
USE THIS RESPONSIBLY: INTENDED TO SHARE WEAKNESSES IN SECURITY
PICKING LOCKS IS MUCH LIKE SOLVING A "PUZZLE", AND CAN BE A FUN EXERCISE!
Play around with it, try not to rush it, and you will learn to "feel" for the pins in time
#lockpicking #padlock #security
PUBLIC BLOG: https://buymeacoffee.com/politictech/posts
COREBOOT THINKPAD (LIMITED AVAIL): https://buymeacoffee.com/politictech/commissions
...
https://www.youtube.com/watch?v=5ByZgFCDrlE
Setup An I2P Browser By Hand? Did You Block Browser DNS Requests? Let's See What Happens On Pihole When Default DNS Settings Are Left In Firefox / Browsers... Settings You May Be Missing In Your I2P Browser Config
The I2P-Desktop custom i2p profile has DNS blocked by default - so no need to change anything: http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/I2P-desktop (use tor browser to download)
In this video, I TEMPORARILY UNBLOCKED DNS queries in browser, all to demonstrate .i2p domains leaking to DNS query (for those who are setting up profile by hand).
If using I2P-desktop, you have nothing to worry about: DNS has been blocked since the beginning!
Lesson: Be careful if setting up profiles by hand.
Same goes for Tor: use Tor browser not only to blend in with other users, but for the safety features maintained by a team of developers.
(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)
*Watch, And Share With Others!* (once public)I create independent content to keep you informed, share unique tech tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed, on the most pressing personal security / privacy / open source topics
? **SUPPORT INDEPENDENT CONTENT** (Thank You)
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
CASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP:
https://bmc.link/politictech/membership (early / exclusive content / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech
? COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://bmc.link/politictech/commissions (limited USA service)
**PUBLIC BLOG:** https://bmc.link/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
#I2P #Tor #anonymous
? CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
? CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance
#I2P #DNS #Linux
...
https://www.youtube.com/watch?v=VHmJP19gHAo
SIM Cards have their own java browser/microcomputer (independent of phone model) and in 30+ countries are vulnerable to remote "silent sms" SIM Jacking/WIB/S@T attacks. Targeted attacks lead to lost cryptocurrency, wiped out bank accounts and 2fa/sms text security compromise.
Here is how it works:
Technical Paper from Adaptive Mobile: https://simjacker.com/downloads/technicalpapers/AdaptiveMobile_Security_Simjacker_Technical_Paper_v1.01.pdf
For underlying technical information on SIM cards (like the one in your phone) see this reddit thread document: https://www.reddit.com/r/todayilearned/comments/1eiv0n/til_that_sim_cards_contain_a_complete/
What do you want to see next? Have an idea for a future video? I look forward to reading your comments below:
--------------------------------------------------------------------------------
Support:
Please Like, Share, and Subscribe to show your support, and help us out with the algorithms. It is appreciated. :)
If you appreciate something I do and want to show support you can now Buy Me a Coffee: https://www.buymeacoffee.com/politictech :)
BTC: 1PpksaxUKw1kKna7BPU8oXbrxA2hh2PAXi
Interested in a custom high security WiFi router or Torified Hidden service Nextcloud server you can host yourself? righttoprivacy[at]tutanota.com
-----------------------------------------------------------------------------------
Pages:
Twitter: https://www.twitter.com/tvprivacy
Blog: https://politictech.wordpress.com
Mastadon: https://fosstodon.org/@RTP
Inquiries: righttoprivacy[at]tutanota.com
Gitlab: https://gitlab.com/Aresesi
Github: https://github.com/righttoprivacy
...
https://www.youtube.com/watch?v=U4h6YuDxmLo