Get Mystery Box with random crypto!

Privacy & Security Goys

Logo of telegram channel privsecgoy — Privacy & Security Goys P
Logo of telegram channel privsecgoy — Privacy & Security Goys
Channel address: @privsecgoy
Categories: Politics
Language: English
Subscribers: 12.18K
Description from channel

"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News
"A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner

Ratings & Reviews

3.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

2

3 stars

1

2 stars

0

1 stars

0


The latest Messages 8

2021-12-12 20:00:14 Attacks that require malware implanted in some devices:

Exfiltration of Data through a Malware infected Router:


Exfiltration of Data through observation of Light variation in a Backlit keyboard with a compromised camera:


Exfiltration of Data through a compromised Security Camera (that could first use the previous attack)


Communication from outsider to compromised Security Cameras through IR light signals:


Exfiltration of data from a compromised air-gapped computer through acoustic analysis of the FAN noises with a smartphone


Exfiltration of data from a malware-infected air-gapped computer through HD LEDs with a Drone


Exfiltration of data from a USB malware on an air-gapped computer through electromagnetic interferences


Exfiltration of data from a malware-infected HDD drive through covert acoustic noise


Exfiltration of data through GSM frequencies from a compromised (with malware) air-gapped computer


Exfiltration of data through electromagnetic emissions from a compromised Display device


Exfiltration of data through magnetic waves from a compromised air-gapped computer to a Smartphone stored inside a Faraday bag


Communication between two compromised air-gapped computers using ultrasonic soundwaves


Exfiltration of Bitcoin Wallet from a compromised air-gapped computer to a smartphone


Exfiltration of Data from a compromised air-gapped computer using display brightness


Exfiltration of Data from a compromised air-gapped computer through vibrations


Exfiltration of Data from a compromised air-gapped computer by turning RAM into a Wi-Fi emitter


Exfiltration of Data from a compromised air-gapped computer through power lines https://arxiv.org/abs/1804.04014

Attacks that require no malware:

Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing. Publication with demonstration: http://wallcamera.csail.mit.edu/
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room. Publication with photographic examples: https://arxiv.org/abs/2001.04642
Measuring floor vibrations to identify individuals and determine their health condition and mood. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html
Observing a light bulb from a distance to listen to the sound in the room without any malware: Demonstration:

It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html
2.3K viewsedited  17:00
Open / Comment
2021-12-12 19:01:55 An airgapped computer does not connect to the internet and is inherently less vulnerable to attacks. However, as this study shows, it's possible for an adversary equipped with lasers to compromise your devices.

Fortunately, these largely theoretical attacks are easily mitigated by keeping your devices out of sight; ideally in a secured basement room without windows.
2.3K views16:01
Open / Comment
2021-12-08 12:30:02 "Michael Morell, who served as acting director of the agency on two separate occasions under President Obama, also sees the value of Bitcoin to the intelligence community.

"Morell called blockchain technology a 'boon for surveillance' in a report, published by the Coinbase- and Square-led Crypto Council for Innovation.

"The report defended the cryptocurrency against claims that its best use case is for criminal enterprise. Instead, the public nature of transactions makes it an 'underutilized forensic tool for governments to identify illicit activity.'"

Explains the push for israel's zcash and delisting of Monero
720 views09:30
Open / Comment
2021-12-05 18:00:14
A story of youth, dissent, love and betrayal in post 9/11 America woven exclusively with FBI surveillance, ERIC & “ANNA” tells the story of a teenage informant and the activist she helped to put in prison for nearly 20 years

https://fieldofvision.org/eric-anna/

( documentary linked )

Anna would go on to lead McDavid and two other activists in their 20s in a loose plot to bomb targets in Northern California.

one of the longest sentences given to an alleged eco-terrorist in the United States. At the time of his conviction, the FBI had built a network of more than 15,000 informants like Anna

https://theintercept.com/2015/11/19/an-fbi-informant-seduced-eric-mcdavid-into-a-bomb-plot-then-the-government-lied-about-it/

https://t.me/Anglomania
2.2K views15:00
Open / Comment
2021-12-05 04:00:01 Here's a textbook example of why we do not encourage pro-White activists to join public groups: "Torch Antifascist Network" reports monitoring the internal communications of Patriot Front.

Even though they state the leaked documents "reveal an organization incapable of moving beyond furtive flyering sessions and photo opportunities," they still continue to dox the alleged PF members. This happens to this day.

Tonight, Patriot Front marches in Washington DC, with Antifa ready to engage. And while the QBoomers in those comments are quick to denounce the activists as "feds," this is the standard outcry from limp-dicked conservatives. As far as they're concerned, any direct action is a false flag.

I am not here to denounce PF... but I cannot understand why anyone would want to attempt a march again after Unite the Right and Stop the Steal achieved nothing but put White people behind bars.

By all means, get out there and do something for your people. Being a spectator while the world falls into the flames gets boring. But weigh the potential costs and benefits in everything you do. Going for a walk in uniform involves the risk of injury, death, arrest, losing employment, etc. If anyone brought their phones on this march, you know the feds have them on file.

This isn't a game. This is quite literally a matter of life and death. What happens if next parade, an antifascist empties their mag into the crowd and disappears? The System and its enforcers (both feds and reds) want you dead. Start acting like it.

But hey, at least the low-hanging fruit keeps heat off the rest of us.

A peaceful protest does not strike fear into the enemy.

@PrivSecGoy
4.8K views01:00
Open / Comment
2021-12-03 22:30:30 Our greatest ally
3.9K views19:30
Open / Comment
2021-12-03 21:30:08 Two important life lessons:

Purpose is derived from meaningful struggle. Treat comfort and complacency as you would the enemy. The ultimate goal in life is to struggle, and the ultimate goal of struggle is to better your race/tribe, better yourself, and to further truth.

As revolutionaries, we must understand that we can't just rewind to a better time. Any romanticized time period, ideology, or belief structure that failed to preserve the quality of its people is an imperfect system. Wanting to emulate 1950s America, with its values, racial segregation, et cetera would only delay the inevitable under that reactionary system. There is no political solution.

Source: Futurist Lab
3.6K views18:30
Open / Comment
2021-12-03 20:00:29
Over the course of our time here on Telegram spreading awareness and tips on how to avoid getting doxxed we have caught the attention of all kinds of people. From terrorist tracking groups to the kikes at various “news” outlets and elsewhere. We’ve always found their kvetching about our posts and humble following to be amusing and we love the street cred that comes with pissing these people off to these sorts of levels.

I’ve been playing with the idea of having this video made and finally I pulled the trigger... Thankfully a friendly goy that runs @BanThisChannelVI was able to come through with this hilarious video that I’m sharing with you today.

To all the kikes, liars, sellouts, and all of our other enemies that love to make us out to be something we’re not.... Keep it coming.
2.7K views17:00
Open / Comment
2021-12-03 02:00:01 Earlier today, our public general chat was censored on all versions of Telegram downloaded from the Google and Apple app stores. There was no warning or notice given to us.

Our chat remains accessible to those who downloaded the Telegram .apk from the official website or via F-Droid; while our ideological enemies in Silicon Valley have actively chosen to censor us, we haven't violated Telegram's terms and conditions.

As mentioned previously, we enemies of the state are on borrowed time here. We may choose to migrate to another platform in time, but regardless, we hope you implement some knowledge you've learnt here in the real world.
1.3K views23:00
Open / Comment
2021-12-02 16:45:13
FBI training document shows lawful access to multiple encrypted messaging apps.

Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.

The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.

The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.

The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.

https://securityaffairs.co/wordpress/125176/security/encrypted-messaging-apps-data-access.html

@cRyPtHoN_INFOSEC_FR
@cRyPtHoN_INFOSEC_EN
@cRyPtHoN_INFOSEC_DE
@BlackBox_Archiv
1.8K views13:45
Open / Comment