Category Archives: Networks

Computer networks are not as secure as you might think. There are always security vulnerabilities and this always makes ink in current issues.

Artificial intelligence committed to the fight against hate speech

2020 looks promising for conflict management from the web.

Indeed, researchers have decided to use tools that will be based on artificial intelligence to not only detect hate speech but also quarantine it to prevent it from reaching the maximum of people.

This article will also interest you: What is the place of artificial intelligence in the war between hacker and it publishers of antivirus solutions?

from so it will be more effective to combat these violent remarks and without be accused of censorship.

This proposal was made by researchers at the Cambridge University, which after conducting a study on social media decided to act by leveraging their knowledge of intelligence management of the spread of hate speech. In a objective approach, we know that forms of hate speech depend on state as well as the region of the world in which they are issued. What makes that the simple blocking keywords or interruption publications would not be perhaps really effective. furthermore some multimedia or graphic descriptions don't need to contain words or insults of an ethnic nature for being offensive or hurtful.

In the eyes of a linguistics expert and a computer engineer decided to propose a solution through a publication published in the journal Ethics and Information Technology, where it was proposed to use techniques by pointing to cybersecurity to better target messages that should not appear on the web. This is without resorting to censorship. Using a database based on violent threats and insults, Cambridge University engineers are creating the algorithms that will determine a set of elements that formally characterize hate speech.

Thus the more the messages carry references to hatred the more they will be quarantined unceremoniously. Subsequently, other users will receive a warning message through a barometer that will tell them the seriousness of the message in terms of hate speech, as well as the sender's name and a window for it to either read the content of the message or delete it without even reading it.

In this regard, one of the experts named Tomalin, having participated in the implementation of this algorithm stated: "Our system will report when you need to be careful, but the last word is up to you. he doesn't stop people from posting or seeing what they like, but it gives the control for those inundated with hate speech." It will add subsequently: "Thanks to automated quarantines that provide advice on the strength of hateful content, we can empower those that are the object of hate speech that poisons our online exchanges"

However, the device only works with 60% accuracy there are several things still that would have to be put in place to achieve perfection at this level. "Identifying individual keywords is not enough, we look at whole sentence structures and beyond. Sociolinguistic information in user profiles and publishing hisism can all help improve the classification process," argued another expert.

Now access an unlimited number of passwords:

Check out our hacking software



Facebook and Google a "threat" to human rights?

In recent times, Amnesty International has had a strong reaction to the two American tech giants.

According to this non-governmental organization: "Data extraction is incompatible with the notion of privacy"

Last month, Amnesty International continued to show strong animosity towards Google and Facebook. In its report published in late November, the non-governmental organization described the digital giants' business model as "surveillance-based" as a "systemic threat to human rights."

This article will also interest you: No class action will ultimately take place against Facebook

But in a broader context, the various services offered by these world-renowned companies are now indispensable for billions of people. And as we know, the majority of personal data that is collected through their service is mostly used in advertising targeting. This threatens in a certain sense freedom of expression and opinion. "Their insidious control of our digital lives undermines the very foundation of privacy and is one of the major human rights challenges of our time," Kumi Naidoo, Amnesty's Secretary General, said in a statement. According to him, these two digital giants are incompatible with privacy: "Google and Facebook have gradually eroded our privacy. Today we are trapped. Either we submit to this vast surveillance machine – where our data is easily used to manipulate and influence us – or we give up the benefits of the digital world," he says.

"The extraction and analysis of personal data, in such gigantic proportions, is incompatible with the various facets of the right to privacy, including the freedom not to be invaded into our private lives, the right to control information about us and the right to a space for us to freely express our identities," Amnesty International notes. For the non-governmental organization, this data collected by these two giants is a "powerful weapon" in "bad hands". She will then note that "the vast advertising architecture of Google and Facebook is a powerful weapon in the wrong hands" because "it can be hijacked for political purposes" and in a sense "leaves the field open to all kinds of new advertising strategies with hints of exploitation, such as attacking vulnerable people who are fighting the disease mental disorders or addiction."

Faced with this problem, the non-governmental organization urges governments to respond urgently by putting in place and "enforcing strong laws on data protection and effectively regulating the activities of the giants technology."

face to critics of the International Organization, the U.S. Facebook wanted to defend itself against what it deems Inaccurate. "Facebook's business model is not, as your synthesis, focused on collecting people's data," Facebook noted in response to a summary of the Amnesty report. "As you take it down we don't sell data, we sell ads."

Facebook boss and founder Mark Zuckerberg also demanded a backlash from governments to regulate the management of personal data so that it is not completely or partially abandoned in the hands of private structures.

Now access an unlimited number of passwords:

Check out our hacking software



Is hacking stars that hard?

Pascal Desgagnés, famous "pirate of stars" faces about 7 charges in front of the French justice system.

The latter allegedly managed to seize hundreds of photographs contained in private phones belonging to well-known public figures. And it might not have gone through a rather complex ploy.

This article will also interest you: These stars who get their accounts hacked

According to one of his victims, named Jessica Harnois, he probably managed to get it because she had been using the same word for years on several of his accounts. It was following the discovery of the piracy she was experiencing that she decided to change things. "Yes, I've been using the same password for a long time, and I used it other sites," she said. And that combination was also used by this victim to access its iCloud account, Apple's cloud service, which of course allowed it to store such as images or videos. In addition to iCloud, the same login and password credentials was used for him access to his Facebook and even Netflix Instagram account.

Otherwise a source police to the press on Friday, it is not the motives of these victims who had been compromised. Indeed, the majority of the flaw came from iCloud accounts who were generally associated. And according to the results of the surveys, it did not it was not discovered that the hacker had injected into the phones, malware that would have helped him in his espionage task, or even that he would have made a copy of the contents of the SIM cards, the individuals with bad intentions have leaked some information, as some Experts.

Moreover, it is known that the hacker by having access to the iCloud account of victims, he could thus have access to certain content of the iPhone as a whole. whether it's multimedia contacts or notes, literally stored. So the latter will only navigate to the data that might interest him. Also as the Apple iCloud account also allows you to sync emails as well as the photo and video gallery, the hacker and then read the messages received by his victims, download photos and videos that might interest him. it can also duplicate the contents of its victim's iPhone by connecting another blank iPhone with the victim's iDks. and it will be able to have real-time content on another terminal without making the most effort.

But what we need to know is that at the moment, the hacker has not been able to access the phone call functions as well as that of the text messages received by the victims according to the police source. "The more we know about what happened, the more evidence suggests that the hacker probably had access to the victims' iCloud account. explains a computer security specialist named Eric Lessard. "He did what's known in jargon as an iCloud swap. ».

however it is still unknown how the hacker managed to obtain the IDs and passwords of his victims. "It's about 95% safe that the hacker had access somewhere on the dark web to a database of passwords and identifiers. Eric Lessard noted

The most likely idea would be those databases where thousands of combinations of identifiers would be illegally marketed. In most cases these are identifiers that are no longer up to date. However it is not uncommon to find some that still work. This makes specialist Eric Lessard mean: "If you don't change your password at regular intervals, and you use the same password everywhere, you make yourself vulnerable to this kind of attack. It's like leaving the doors of the house unseated. It's becoming a bit of negligence. »

Now access an unlimited number of passwords:

Check out our hacking software



5G- a break in IT security

5G is generally referred to as the network of the future.

This network will change the very use of the Internet. It doesn't just see itself as an evolution of 4G, but basically we realize that it's a real break with known technologies. For this reason, it is not inappropriate to think that new risks will arise as a result of its deployment. This has always worried the European Union, but also the telecommunications and IT security communities as a whole.

This article will also interest you: 5G security vulnerabilities

On October 16, Olave Lysne, a computer scientist at the cybersecurity at the 10th European Telecoms Decision-Making Fair, the Berec Brussels forum, said "5G is the most critical infrastructure ever created for cyber. It will depend on the safety of all the others. ». But before that, a few days earlier, in the city of Monaco during the security meetings, he had held the focus of the debate on securing the 5G network around a round table. European Union has protested clearly and clearly expressed concern in its report, written in one 30 pages specifically on the risks associated with the use of 5G in terms of cybersecurity.

What we do know is that 5G network virtualization will significantly increase software flaws while non-standalone 5G networks based on the old 4G network are less risky. However this version of the 5G is not for today, as its deployment and configuration will take longer. Explaining the process of 5G virtualization, Kevin Poireault, Journalist, explains: "Network Function Virtualization (NFV), the ability to separate hardware from software for network equipment.

This virtualization allows you to create several logical networks, called slices, controlled by programming interfaces (APIs) at the same time. A sliced cut (network slicing) that offers operators the ability to deliver different levels of services (in terms of reliability, latency, bandwidth capacity, coverage…) from the same infrastructure. For example, greater connectivity for an autonomous car than for a simple smartphone. ». With this explanation, we realize that the benefits of the virtualized 5G network are convincing. it makes the transmission of information faster, but also more efficient. However, the risks are also subtle but important: "By virtualizing everything, you no longer have any physical control like the one you could put in place with the previous networks," explains a computer security researcher known as SwitHak, during the roundtable at the Assises in Monaco.

On the other hand, the European Union report does not dwell on the disadvantages associated with the NDS and the NFV described above. But the concern for them is mainly directed at "major security flaws, such as those derived from vulnerable software within vendor equipment that could help attackers maliciously insert intentional backdoors into products, and also make them more difficult to detect."

Companies, on the other hand, believe that the development of 5G will disperse their security strategy, especially since they are soon at the end of the project of securing the cloud, stresses Téodor Chabin, head of information systems security at Thalès who is also present at the Assises. For the latter, the impact of 5G will be truly major, as companies will be forced to review the IT architectures on which they have worked for so many years fiercely. "With the arrival of 5G, we're going to end up with a 'scattered cloud'," he says. I, like other RSSIs, managed to make sure that we had a cloud that was pretty much secure, hosted in known data centers. All of a sudden, we're going to end up with data scattered across these 5G networks. »

While 5G networks promise performance worthy of technological progress, the risk is greater. Computer security researcher SwitHak joked: "Already, with speeds in the order of several gigabits per second, guarding against data exfiltration will not be easy," he says. But with terabits/seconds, as the specification committees predict, very optimistic, I dare not imagine how quickly one could empty a data center. »

Now access an unlimited number of passwords:

Check out our hacking software



How do I manage the data of people who have died on social networks?

Since 2016, social networks have decided to propose procedures that will only allow to report but also to manage the profile of people who have lost their lives.

According to some estimate made towards the end of 2017, it was stated that 3 Facebook users lost their lives every minute leaving behind, profiles called "ghost profiles". These static profiles can always be fed whenever individuals shared content with the deceased. then the question has been asked several times: what should be done with an online account of a deceased person?

This article will also interest you: How to manage the personal data of deceased people on the Internet?

on the Facebook side, a parade has been proposed that allows swing to a profile called "Remembering." And for that it's just enough for the user over the age of 18, agrees to designate persons as the legatee during his lifetime, legatees who will have the task of managing the page once the person has died. and this has been possible since 2015 because any designated as a legatee informed by message that informs them of the powers and responsibilities conferred on them by the next of kin. and from legatees will be able to animate sections see sections dedicated to the tributes of the deceased. however, we will not only be able to read his old messages, the ability to log into the account.

Moreover, according to the ENEID programme, Eternity whose focus is on digital identities after death and memorial practices on Internet, one page out of four on Facebook is generally affected by this phenomenon, which consists of for relatives, to make changes to the deceased user profile. It's surely for this reason that since 2018, Facebook had allowed parents from the moment the user died, with documents officials in support. that's the only way the social network would have allowed the deletion of the accounts held by the deceased.

For Facebook's Instagram subsidiary, there is a network sharing photos in the goal is to pay tribute to a user, and to report his death through a form that is in English. However, in order to have the right to delete an account, it would be necessary to prove a kinship between the deceased and oneself.

On the twitter side, it's a bit complicated. Indeed, the social network will not provide any information about connections to a person's accounts the kinship that binds them. However, they still allow anyone interested in reporting a user's death and to parents to demand of course the deletion of the account by filling out a form dedicated to this purpose. to supplement its requirements, the social network will require not only the ID of the person requests the removal, but it will also require the death certificate.

But in all this what does the law say?

In practice, the law states that it is possible to consult a notary in the purpose of leaving him instructions along the lines of provisions wills. which will in some cases amount to defining a person trusted third party, who will act as a legatee who will be given access to all the information you need to connect to your different accounts online (i.e. standard login credentials such as the words and email addresses) once you're out of place. Despite this, we must not lure the process will be really complex to recover the accounts deceased relative.

In addition, there is a caveat to the right to be forgotten law. this provision is not applicable only when the user has died. For it is a right that is affiliated with a living person, with legal personality. However, a deceased person no longer has a legal personality, so cannot take advantage of this prerogative. However, the National Commission for Information Technology and Freedoms has been working on the case since 2014 to find a suitable solution to the problem. However, no definitive solution has been found to this problem.

Now access an unlimited number of passwords:

Check out our hacking software