Erweiterte Suche
Suchergebnisse
1138 Ergebnisse gesamt
Threats
Public-Chargers
[!toc] Table of Contents Public “chargers” can be found, for example, in public transportation, cafés, libraries, airports, shopping malls, etc. Of course, a distinction must be made here between simple power outlets and USB charging ports. The worst thing ...
Forensics
[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in which “criminal acts” are systematically investigated. In short: when cops try to find evidence. Relevant subfields Many forensic measures pose relevant threats to ac...
Phishing
[!toc] Table of Contents Phishing via email or text message is generally more commonly associated with scams, but government actors also often use phishing to infect targets with malware. [!warning] {static} In fact, phishing is one of the most common reas...
Silent-Sms
[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to your cell phone; a “silent” SMS message would deliver a "message" to the phone without you being aware of it 1. In other words, you wouldn't see a text message or ...
Shoulder-Surfing
[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder to see what you are doing or typing on your cell phone, laptop, notepad etc. [!warning] Warning {static} Be especially careful when entering passwords! After all, ...
Meta-Data
[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you just want to know how to clean metadata from files, check out our recommendations. The data behind the data Metadata in communication Imagine you are writing a mess...
Data-Dogs
[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, are specially trained to sniff out certain metals that are used in electronics and thus in storage media such as USB sticks. The following is an automated translati...
Radio-Cell-Interrogation
[!toc] Table of Contents To understand this chapter, it is necessary to understand the basic concepts of the mobile network, in particular the connection and authentication process between mobile phones and cell-phone towers. We have attempted to illustrate...
Mobile-Communication
[!toc] Table of Contents First, some basic information about threats in the field of mobile communications needs to be explained. This article focuses on how a single cell phone communicates with the mobile network in the form of a cell phone tower (colloqu...
Network-Surveillance
[!toc] Table of Contents Monitoring of traffic data This is usually what is meant when people talk about telecommunications surveillance in general. Here, the authorities force service providers to explicitly monitor your connections and to forward all reco...
Logger
[!toc] Table of Contents Loggers are devices that can be used to ‘log’ or record something. Two types of loggers are relevant to us here: keyloggers and screen loggers. Keyloggers Keyloggers are devices that basically record all keystrokes on your keyboard....
Imsi-Catcher
[!toc] Table of Contents An IMSI catcher, also known as Cell-Site Simulator or "Stingray", is a surveillance device that "masquerade as legitimate cell-phone tower, tricking phones within a certain radius into connecting to the device rather than a tower" 1...
FLINTA*-freundliche Plena
Während des bundesweiten Treffens in Würzburg trafen sich FLINTA*-Personen (=Frauen*, Lesben, Inter, Nonbinary, Transgender, Agender) zu einem gemeinsamen Plenum, um sich auszutauschen und gemeinsam zu überlegen, wie wir unsere Strukturen und Plena FLINTA*-fre...
Anti Rassismus
Lektüren für Lesekreise / Selbstbildung: Text und Konttext "White Supremacy Culture" von Tema Okun: https://www.whitesupremacyculture.info/ Text: "Was ist Rassismus?" http://www.agpolpsy.de/wp-content/uploads/2017/11/Rommelspacher-Was-ist-Rassismus.pdf Exit R...
Bundesweite Abstimmungen EFO
End Fossil Deutschland gibt es nicht mehr und das aufgeführte Vorgehen gilt daher nicht mehr. Es ist hier hochgeladen, um als Inspiration für andere Gruppen zu dienen. Funktion und Bedeutung Bundesweite Abstimmung sollen eine möglichkeit sein um bundesweites V...
E-Mail Verschlüsselung
E-Mail-Verschlüsselung wird verwendet, um vertrauliche Informationen per E-Mail von einer Person zu einer anerden Person zu schicken. Ende-zu-Ende-Verschlüsselung ist dabei eine besonders sichere Form der Verschlüsselung, da bei dieser die Nachricht über alle ...
Checkliste Unibesetzung
Wie können wir mehr werden? Eine Besetzung ist einladend und ansprechend, wenn er aufgeräumt und sauber ist. Dann beteiligen sich auch gerne neue Leute. Strukturen und Partizipationsmöglichkeiten sollten transparent für neue Leute sein. Wichtige Informationen...