"What’s so bad about Google having all my data?" Imagine a neighbor of you knowing: Where you live, Every secret question you "google", that you wouldn't just ask a stranger, All your photos, analyzed for child pornography, categorized, sorted. Including the location they were taken and the people they were taken with. All your contacts, how often you call them, text them... All the places you go, what places you search for, where you stay and when, All your mails, scanned for content, analyzed (text is by far the easiest to scan) All your payments, where you pay how much for what All your other files, when you write something into spreadsheet, doc, private note or anything. All apps you install, including menstruation trackers, vibrator apps, training apps idk. what else there could be you absolutely don't want Google to have access to. Just think of some embarrassing websites you visited the past few days. How your voice sounds, how you look like, when you are on your phone... The list goes on. Still don't care? And Google doesn't keep the data to themselves. Think about it next time you use anything from Google. @Marconius Solidus
Free Threat Intelligence Tools by Hudson Rock - Search for Compromised Corporate & Supply Chain Infrastructure - Search for Compromised Employees, Customers, Users & Partners - Discover the Password Hygiene Used by Any Company - Use the Technology Profiler to Discover which Companies are Using a Technology - Search for Compromised Android App Users πŸ”—
🌏 World Economic Forum founder Klaus Schwab on #privacy: In this new world, we have to accept transparency, and I will say total transparency, everything is going to be transparent and you have to get used to it, you have to behave accordingly. It becomes... How to put it... integrated into your personality, but if you have nothing to hide, you shouldn't be worried.
How Chainalysis Made Their Way into Popular #Monero Wallets
Men over 30 - what’s a piece of advice you would give to someone in their 20s? "No advice. Everyone’s environment variables are different. One size never fits all. What worked for me, would never work for you. The only way to learn is to make your own mistakes"
SEARCH ENGINES FOR PENTESTERS 01. shodan.io β€”> (Server , Vulnerabilities) 02. google.com β€”> (Dorks) 03. wigle.net β€”> (Wifi Networks) 04. grep.app β€”> (Codes Search) 05. app.binaryedge.io β€”> (Threat Intelligence) 06. onyphe.io β€”> (Server) 07. viz.greynoise.io β€”> (Threat Intelligence) 08. censys.io β€”> (Server) 09. hunter.io β€”> (Email Addresses) 10. fofa.info β€”> (Threat Intelligence) 11. zoomeye.org β€”> (Threat Intelligence) 12. leakix.net β€”> (Threat Intelligence) 13. intelx.io β€”> (OSINT) 14. app.netlas.io β€”> (Attack Surface) 15. searchcode.com β€”> (Code Search) 16. urlscan.io β€”> (Threat Intelligence) 17. publicwww.com β€”> (Code Search) 18. fullhunt.io β€”> (Attack Surface) 19. socradar.io β€”>Β  (Threat Intelligence) 20. binaryedge.io β€”> (Attack Surface) 21. ivre.rocks β€”> (Server) 22. crt.sh β€”> (Certificate Search) 23. vulners.com β€”> (Vulnerabilities) 24. pulsedive.com β€”> (Threat Intelligence)
"Follow" is a modern application that combines features for tracking information from various sources such as websites , blogs , social networks , podcasts and notifications . The platform supports work on Windows , macOS , Linux , as well as through a browser , with a mobile version for Android and iOS in development . One of the key elements is the integration of artificial intelligence , which helps with translations , reporting and recommendations . The app delivers AI reports with key information twice a day and creates a personalized knowledge base based on the user's subscriptions .
Uptober? πŸš€
Binsider is a tool for reverse engineering files directly in the terminal , providing both static and dynamic analysis . It allows you to obtain general information about binary files , examine their structures (sections , segments , symbols , etc. ) , and track system calls and program execution . The tool includes functions for extracting strings , analyzing linked libraries , viewing file contents as a hexdump , which makes it a powerful and convenient solution for analysis in the terminal interface .
1. Cognitive Dissonance: It's like having a mental conflict when you hold two contradictory beliefs or attitudes at the same time. It's that feeling of discomfort when your thoughts and actions don't align, making you feel a bit confused or conflicted. 2. Doublethink: Imagine being able to hold two completely opposite beliefs in your mind and accepting both of them as true. It's like convincing yourself that black is white and up is down. It's a concept from George Orwell's novel 1984, where people are manipulated into accepting contradictory ideas without questioning them. 3. Herd Mentality: Ever seen a group of sheep blindly following each other? That's kind of what herd mentality is. It's when people adopt the opinions or behaviors of a larger group without thinking for themselves. They go along with the crowd, even if it might not be the best decision or idea.