Category: Security Infos

5G Mobile Network opens Pandora’s Box

5G will it make possible to attack mobile Devices and Cars 10 times faster Users will not recognize attacks or uploaded data the wider data bandwith will it make possible to attack much more efficient Remark: checkout if you really need this mobile network, cause slower is sometime safer against automated tools slower mobile network is cheaper disable mobile data if not neeeded to stay hidden and offline, calls option is still working

Major Bug: UFW stopped thru logrotate

On Debian Sid i have seen that ufw service is stopped on logrotate!! Its a bad known bug! Workaround: Set all Services like Dovecot, Postfix to listen on LOCALHOST (127.0.0.1) if not needed over Internet Enable ONLY encrypted AUTH (Login) to Postfix! (TLS 1.2) Disable unneeded Services ! like Samba, FTP… move config from /etc/logrotate.d/ufw to /root/ to disable ufw logrotate !! edit /etc/ufw/ufw.conf set LOGLEVEL to “off” restart the Server and check open Ports next Days from outside with: $sudo nmap -PN my.server.com

Goodby Smartphones

Today iam going offline with any of my Smarthones for Testing. Why? all current Smartphones based on nonfree Hard and Software less patched Hackers can remote force install Trojans as Updates (especially Stores by gov order) non rooted devices are black boxes rooted Images or Tools as Workarounds are often not published in which way the System OS is broken down, Hackers don’t work nonprofit ! Linux Laptops usage is often easier and much safer, you have full control and can run security tools to monitor Apps for free do always call home at background can’t control active background jobs […]

Health Status Data on Cloud Services

From the current News we hear that insurances offers humans to save the complete health status at a Cloud based App. This is by DEFAULT insecure! Smartphones get less OS Security Updates by Manufacter Users do NOT know to handle Updates Users can’t update Firmwares by default Apps most located at App Stores (Google, Apple) App Stores Analyse downloads and usage of Apps, with this getting personal Data to SELL!! No Health Insurance knows to securing Data Pools especially Clouds !! No one will help Humans if Cloud App Keys abused and Data stolen Humans can be forces to offer […]