background preloader

EURPrivacy

Facebook Twitter

Europese Studentenvereniging AEGEE-Nijmegen: Home. Eurprivacy.nl. Falkvinge (Falkvinge) Rick Falkvinge at EURPrivacy.nl. YourLIVE! º Always There. Sign up | Login Welcome Map Feed Details Download Help About Blog name Your mobile Your privacy author created on 23 Mar 2011 at 16:23 posted in The Wonderful World of CCTV , play , Sticker , EURPrivacy location Willem Nuyenslaan, 6525 Nijmegen, The Netherlands [Post In] [Post Comment] Commenters ( 2 ) Locate Me Explore Area Center Item Zoom Marquee Map Types Showing: photo 'your mobile your privacy ' Tip Press Locate Me to start sharing your Live location stream close Show balloon next time.

Viviane Reding Vice-President of the European Commission EU Justice Commissioner Your data, your rights: Safeguarding your privacy in a connected world Privacy Platform "The Review of the EU Data Protection Framework" Brussels, 16 March 2. YourLIVE! º Always There. Sign up | Login Welcome Map Feed Details Download Help About Blog Trip Controls name EURPrivacy author created on 23 Mar 2011 at 11:22 posted in World , LBS relief Lab , CC , Erasmus Building , UBNijmegen content 37 Photos starting point Geplaatst op het Erasmusgebouw van de Radboud Univ. End point Heyendaalseweg, 6525 Nijmegen, The Netherlands trip distance 27 km timespan 55 hours [Post In] [Post Comment] Photos ( 37 ) Locate Me Explore Area Center Item Zoom Marquee Map Types stopped Showing: trip 'eurprivacy' Tip Press Locate Me to start sharing your Live location stream close Show balloon next time.

What laws and bananas have in common - André Rebentisch. Van der Hoog Hunter. OBEY GIANT - WORLDWIDE PROPAGANDA DELIVERY. The Official Site of Andre the Giant. Steve Wright? (rivc) Echelon. Future Non Stop. Future Non Stop. Brenno de Winter (brenno) Hack42: Broekstraat 18, Arnhem. Voicemails ministers (o.a.) moeiteloos af te luisteren. Vodafone-voicemail ook lek via spoofing - UPDATE2. Nieuws - Het voicemailsysteem van Vodafone blijkt niet alleen lek voor politici en rechters. Er is nog een groter lek: voicemails van derden zijn direct af te luisteren via Caller ID spoofing. Uit onderzoek van Webwereld blijkt dat het voicemailsysteem van Vodafone een tweede, nog gênanter lek bevat. Met verschillende VoIP-tools zijn op eenvoudige wijze 06-nummers na te bootsen.

Dit zogeheten Caller ID spoofing is een klassieke telecomtruc om systemen (en gebelde personen) om de tuin te leiden. Álle klanten Desondanks was het mogelijk om via deze vorm van spoofing direct in de voicemailbox van elke willekeurige Vodafone-abonnee te komen, ook die van ministers. Voor misbruik van het nu ontdekte tweede lek is zelfs geen inlogcode nodig.

Nummers van door Webwereld benaderde gebruikers bij KPN en T-Mobile bleken niet vatbaar voor deze truc. Nog steeds niet gedicht Vodafone heeft inderhaast ook dit gat gedicht, stelt het bedrijf. EFF: Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get? On March 15th, an HTTPS/TLS Certificate Authority (CA) was tricked into issuing fraudulent certificates that posed a dire risk to Internet security. Based on currently available information, the incident got close to — but was not quite — an Internet-wide security meltdown. As this post will explain, these events show why we urgently need to start reinforcing the system that is currently used to authenticate and identify secure websites and email systems. There is a post up on the Tor Project's blog by Jacob Appelbaum, analyzing the revocation of a number of HTTPS certificates last week.

Patches to the major web browsers blacklisted a number of TLS certificates that were issued after hackers broke into a Certificate Authority. The answer was the UserTrust "UTN-USERFirst-Hardware" certificate owned by Comodo, one of the largest CAs on the web. What should we do about these attacks? The short answer, however, is that the Comodo's USERFirst-Hardware certificate is too big to fail. Du bist Terrorist.

ANS Symposium 24mrt2011