Connect with us

Tech

THE PEGASUS LAKE: WHAT YOU MUST KNOW RIGHT NOW

Published

on

Pegasus techydeed.com

A consortium of 17 international media organizations published an investigation on 19 July into a leaked list containing phone numbers globally, known as the Pegasus project. These numbers are believed to be part of a “target” list of phones that were hacked/to become hacked using the Pegasus spyware product, which Israel’s NSO Group sells. This list is notable for its size and the presence of prominent journalists, dissidents, politicians from different countries, judges, business people, rights activists, heads of state, and judges. Some of the targets have cooperated with Amnesty International and the consortium of media to conduct a forensic exam of their devices and found evidence of hacking using Pegasus.

What is Pegasus?

Pegasus is a spy software suite that NSO Group, an Israeli company, sells to “vetted government customers.” It can hack into and spy on Windows, Mac, Android, and iOS phones. You can send the spyware via SMS or email or use more advanced ‘0-day” vulnerability exploits. These are bugs or security flaws that even device manufacturers don’t know about. It is difficult, time-consuming, and highly specialized to find and exploit these ‘0-day” vulnerabilities. At one time, it was possible to infect target phones by simply placing a WhatsApp phone call.

Who has seen this data?

The data was accessed and shared by Forbidden Stories and Amnesty International in Paris, which then shared it with 17 international media organizations as part of The Pegasus Project. These included The Guardian, The Washington Post, and, in India, The Wire. Forbidden Stories claims this list contains intended targets for NSO Group’s Pegasus suite of software. It is important to note that simply because a number is listed in the data does not mean that it was targeted successfully or intended for hacking attempts.

What is the point?

According to The Wire‘s reports, the NSO Group’s client lists include the governments of Azerbaijan and Bahrain, Hungary, Kazakhstan. Mexico, Morocco, Rwanda. Saudi Arabia, Saudi Arabia, UAE Saudi Arabia, Saudi Arabia, Kazakhstan, Mexico, Morocco. The Wire reports that there are 300 Indian nationals on the list. This includes some journalists, rights activists, and politicians. According to the NSO Group, the Pegasus suite is sold only to “vetted government” entities and not private entities. This suggests that the target list includes people under surveillance by the Government.

Advertisement

Private entities are not able to afford the suite due to its high cost. Amnesty International examined a small number of 37 phones and discovered signs of the Pegasus infection. These phones belonged to journalists, politicians, and businesspeople – not terrorists or criminals. This is a list of Pegasus spyware targets.

Hacking is the act of attempting to hack into phones or computers by using these methods. This offense is punishable under the Information Technology Act 2000.

What the Indian Government has to say

In its official statement, which you will find below, the Central Government said that the story was “bereft” and “been founded in preconceived conclusions.” It also stated that it seemed like you were trying to play the roles of an investigator, prosecutor, and jury.

The Government stated categorically that “The allegations concerning government surveillance of specific people have no concrete basis or truth associated it whatsoever.”

This statement can be continued:

Advertisement

India has a well-established process that allows lawful interception to be made of electronic communications in India for national security purposes, especially in case of a public emergency or in the interests of public safety. The Centre and the States do this. These lawful interceptions of electronic communications are requested according to the relevant rules in section 5(2) Indian Telegraph Act 1885 and section69 Information Technology (Amendment) Act 2000.

The competent authority approves each case of interception and monitoring as well as decryption. The Union Home Secretary. These powers are also available for the competent authority within the state governments according to IT (Procedure & Safeguards for Interception Monitoring and Decryption Information) Rules 2009.

Briefly, the protocol for government interception and monitoring of electronic communications is established by Indian law to protect national security. The Union Secretary approved it.

Today, Ashwani Vaishnav, Minister of Electronics and Information Technology, stated in Parliament that “the report itself clarifies the presence of a number doesn’t amount to snooping.” She also added that “NSO has also stated that the list showing countries using Pegasus was incorrect and that many of the countries listed are not our clients.” It stated that the majority of its clients were from western countries.

The NSO Group’s opinion

NSO Group, an Israeli company, spoke to The Wire through its lawyers. They insist that the leaked list doesn’t contain a “target” list for hacking governments but that it “may be part of a larger number of numbers that could have been used for other purposes by NSO Group customers.” NSO Group customers refer to their “vetted government.” Amnesty International’sforensic analysis seems to show that these devices were indeed targeted.

Advertisement

But, I use Signal/Telegram/WhatsApp. Can anyone read my messages?

The short answer is yes. Because of end-to-end encryption, messaging platforms such as Signal and WhatsApp can be considered safe. It doesn’t matter if your device is infected with spyware. Someone is watching you. It’s almost like having the best security system in the world, but the thief is already inside.

The long answer is: Technology can be manipulated or bypassed if there are enough resources and time. Pegasus’s case shows that smartphones infected by spyware are infected using sophisticated attacks that exploit security flaws that the phone manufacturer may not be aware of – the so-called “0-day” vulnerabilities. These resources are not available to all entities, but anyone with enough resources can find ways to spy on your communications. If you ask the question “Who would do such an act?” the answer is “anyone who has enough money and motivation.”

TL;DR

The Pegasus Project claims are true, but it is clear that there needs to be more regulation and surveillance reform. Because technology is everywhere, it’s now possible to perform highly intrusive surveillance. The technology for such management is not accessible to everyone (as far we are informed). Still, it is available to “vetted governments clients,” which, in NSO’s example, include India, Bahrain, Hungary, and Kazakhstan. We must also remember that Pegasus does not come at no cost.

Or, Ashwani Vaishnav, Minister of Electronics and Information Technology, stated in Parliament today, “When we view this issue through the prisms of logic, it is clear that there is no substance to this sensationalism.”

Also Read: GOOGLE ROLLS CHROME SECURITY UPDATE, FIXES ZERO-DAY EXPLOIT IN V8 JAVASCRIPT ENGINE

Advertisement

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published.

Tech

Clubhouse removed personal information from Afghan users’ accounts as a security measure

Published

on

By

Clubhouse removed personal information from Afghan users' accounts as a security measure techydeed.com

The platform aims to protect users’ privacy and security.

Clubhouse, a social audio app, has joined other social networks in protecting the privacy and security of Afghan users. The platform reset the bios and photos of tens to thousands of Afghan users earlier this week and made it more difficult for search engines to find their accounts. Clubhouse spokesperson said that the actions did not affect users’ followers and that all changes can be reversed if desired.

Clubhouse reminds its Afghan customers that pseudonyms are allowed for safety and human rights reasons. According to the spokesperson, Clubhouse consulted experts in violent extremism and free expression to develop its approach.

Advertisement

As the Taliban have regained control of the country, many people in Afghanistan have tried to delete photos from their social media accounts and phones that could show a connection to the West or the former Afghan government.

Despite bans on several social platforms, the Taliban was able to push their messaging on social media. The Washington Post said that they have become sophisticated at social media tactics to change their image.

On Thursday, Facebook said it had added security measures for users in Afghanistan, including hiding “friends” lists and adding a tool to lock down accounts quickly.

Advertisement
Continue Reading

Tech

It’s not a good idea to overthink it. Elon Musk’s Tesla Bot jokes

Published

on

By

It's not a good idea to overthink it. Elon Musk's Tesla Bot jokes techydeed.com

A distraction and an empty promise

After a lengthy presentation on the unquestionably remarkable work, Tesla is doing in AI, Elon Musk, the company’s Technoking, brought out a spandex-clad dancer to cap the evening. Behold, said Musk: my Tesla Bot.

He said that the dancer in the suit was the model for the new humanoid robot Tesla will be producing shortly. The applause and dubstep had subsided, and the briefing slides that promised that the Tesla Bot would stand at five feet eight inches (1.7m), be 125 pounds (56kg), and have “human-level hands” and be able to eliminate “dangerous and repetitive, boring tasks” were discarded.

A ROBOT IS A TESLA WITHOUT WHEELS. SAYS MUSK

Advertisement

Musk stated that Musk’s goal to build a human-replacement robotics system — something that no other company is even close to being able, was a natural step in Tesla’s efforts to develop self-driving cars. Musk said that cars are semi-sentient robots with wheels. It makes sense to add that to a humanoid body. We are also very skilled at actuators, batteries, and sensors, so we expect to have a prototype next year that looks something like this.

Also Read

Power Full Men Elon Musk Biography (1971–) 2021

Apple and Elon Musk deny that Tim Cook tried to replace them.

It was an extraordinary and brilliant piece of tomfoolery, even by Musk’s standards. A multipurpose sideshow that entertained Tesla skeptics and fed the fans while also creating headlines. The latter is particularly important in a week when most Tesla news has focused on a federal investigation into the company’s Autopilot software to crash into parked emergency vehicles. Musk says that all this is irrelevant. Just look at the man in the spandex suit. It’ll be an actual robot next year, I promise.

Advertisement

Are you willing to believe him? Do you think he is a fool? Although I can’t answer your question, I will give you the facts. Last night, Elon Musk took to the stage to promise that Tesla, a company with driver assistance software that cannot avoid parked ambulances reliably, would soon create a fully functioning humanoid robotic machine. Musk stated that the device would follow human instructions and respond correctly to commands such as “please go to the store and get me these groceries.” This was just minutes after he had shown a spandex-clad dancer demonstrating the Tesla Bot. You have to admire Musk’s chutzpah.

To help Musk understand his claims, it is important to remember that Boston Dynamics, which made Atlas, the most advanced bipedal robotic robot globally, has never called its machines anything other than R&D. It’s far from commercial deployment. In recent machine videos, the company showed how difficult building a bipedal robot is and how often Atlas trips and falls. Boston Dynamics has been working with Atlas and its bipedal predecessors for more than a decade. __S.50__

“[CALLING IT] HORSESHIT SOUNDS GENEROUS AND FRANKLY.”

Carl Berry, a UK University of Central Lancashire lecturer in robotics engineering, told me that “Calling it horse shit sounds generously honest.” Berry said that robotics and AI should not be used in manufacturing research.

He said that while he didn’t deny Tesla’s research into this topic was a bad thing, “but they and Boston Dynamics leave the public with unrealistic expectations about what robotics can do or will do for many years.”

Advertisement

I don’t doubt Musk can make something that looks like the Tesla Bot in 2022. It wouldn’t be hard to make a decent automaton — something on the level of Disney’s more advanced theme park models, for example. He can send it into space once he has it walking out on stage, just for the headlines. It will just be another distraction if he does. While robotics significantly impacts manufacturing, there is no reason to assume that robots don’t need to look like humans to do so.

Musk often uses this bait-and-switch method. Think about the changes Musk made to his Hyperloop plans over time. The technology was announced as a railgun-like train system that would move people from Los Angeles to San Francisco in less than half an hour. Over the years, these ambitions have shrunk until the project morphed into The Loop: a small tunnel that you can drive a car through if you want. Also known as A tunnel.

The Tesla Bot reminded me of Sophia, the automated chatbot who has appeared on magazine covers and chat shows. Sophia relies on misdirection to fool audiences and is a frequent target of AI experts’ scorn. It also has a job. As one of the robot’s creators, Ben Goertzel, told me in 2017, Sophia works by priming our imagination, encouraging us to fool ourselves into thinking the future is nearer than the evidence suggests. The robot generates news coverage and funding for its creators.

Goertzel stated, “If I tell people that I use probabilistic logic to reason on how to prune the backward-chaining inference trees in our logic engine,” They will feel more comfortable believing that AGI is possible if I show them a smiling robot face.

This is Musk’s goal, whether he is aiming to instill that feeling in investors or others. The Sophia strategy has a twist. Musk doesn’t need a simulacrum robot to sell his dream. He only needs a spandex-clad dancer. That’s innovation.

Advertisement

Continue Reading

Tech

OnlyFans has a new policy that bans sexually explicit Content

Published

on

By

OnlyFans has a new policy that bans sexually explicit Content techydeed.com

Masturbation and sex, actual or simulated, are not allowed.

On Thursday, the video and image sharing site OnlyFans announced plans to bans sexually explicit content” starting October 1. While we’re still not sure exactly why it’s changing so drastically, it just sent out an updated Terms of Service policy to the creators who’ve built the site detailing precisely what won’t be allowed going forward.

The new OnlyFans, Acceptable Use Policy, is visible when compared to the previous one.

You must not upload, post, or display Content on OnlyFans.

  • Promotes, advertises, or refers to “sexually explicit behavior,” which can be:
  • Actual or simulated sexual intercourse between any two persons, including oral-genital and anal-genital intercourses and genital-genital and oral-genital intercourses.
  • Actual or simulated masturbation
  • Any display of the anus and genitals of another person that is extreme or offensive
  • Actual or simulated material showing bodily fluids often secreted during sexual activity;
  • All Content that promotes, advertises, or refers to “sexually explicit behavior” must be deleted before December 1, 2021, or any other date we communicate to users.

The policy’s other sections that prohibit deepfakes, drug use, and violence are unchanged. The site sent an email to OnlyFans creators stating that Content containing nudity would be permitted as long as it was consistent with the policy. Posts may show body parts but not anything explicit. Your account may be suspended or terminated for any breach, as well as access to your earnings.

OnlyFans’ billion-dollar brand and business have been built mainly because onlyFans sex workers provide precisely the type of Content being banned. These content creators now have until December 1 to delete all traces of suddenly unacceptable Content from their profiles.

Advertisement

Continue Reading

Trending

Copyright © 2021 TechyDeed.

close