Even before its launch, Trump was forced to shut down access to his social network Truth Social . Internet users managed to register in his name and published a shower of insults as well as the same distasteful tweet » Pig Poop Balls » dating from 2011.
What do we do when we can no longer access social networks? We throw his! After being banned from Twitter , Facebook and YouTube , Donald Trump announced his own site on Wednesday. Dubbed « Social Truth », it is part of a new Trump Media & Technology Group (TMTG) created to fight the » liberal media consortium » and » resist the tyranny of the web giants . »
In a few hours, Internet users, some of whom claim to be part of the Anonymous movement , had already discovered the address of the site when it was not yet officially launched. They then succeeded in creating accounts in the names of the former US president and several other personalities such as Steve Bannon (his former adviser), Mike Pence (his former vice-president), Ron Watkins (member of QAnon) or even the P .-Twitter CEO Jack Dorsey .
Troll festival and licensing issues
These fake accounts were then used to troll personalities and the site, between insults, conspiracy theories and images of a pig defecating on his testicles . The administrators first closed the creation of new accounts before having to disconnect the entire platform.
Others immediately realized that the site was a modified version of Mastodon, free software . The AGPLv3 license requires anyone who uses it to share their code and clearly display the license on the site. Of course, this was not done with Truth Social. The creator of Mastodon, Eugen Rochko, told the Talking Points Memo site that he plans to find out about possible legal remedies. As expected, Trump’s site is off to a rocky start even before its launch …
They are all infected with the Joker malware, which could then empty your bank accounts.
It is aptly named. The company Quick Heal Security Labs has revealed that eight applications present on Android are infected with the dreaded Joker malware. According to Presse-Citron , this virus is frequently hidden in apps with the aim of emptying your bank accounts. Google has already been notified of the problem and the infected tools have all been removed from the Android app store. Be careful, however, for people who have already installed them and would not have thought of removing them from their phone.
For users of Auxiliary Message, Fast Magic SMS, Free CamScanner, Super Message, Element Scanner, Go Messages, Travel Wallpapers and Super SMS, it is recommended that you remove these applications from your mobile phone as quickly and completely as possible , since they allow malware to install itself on your mobile system, visit websites, subscribe the victim to paid services or even intercept codes that could allow them to access your banking data.
The Joker malware has already claimed many victims among Play Store users and even managed to infiltrate the Huawei application store , the App Gallery last April , infecting more than 500,000 smartphones from the Chinese manufacturer, reminds 20Minutes . To avoid being confronted with this malware, it is therefore advisable to only download applications from well-known developers and publishers and to avoid those that have just been released on download stores and which offer offers that are too good to be. true.
Released by Wikileaks in October 2016, the emails from this Democrat, former campaign manager for Hillary Clinton, show that he was simply passionate about extraterrestrial life.
Your question relates to an email released in October 2016 by Wikileaks , which was addressed to John Podesta, Hillary Clinton’s campaign manager for the 2016 presidential election, also a former White House chief of staff to Bill Clinton and former adviser to President Obama. Victim of a phishing on his personal Gmail address, more than 20,000 emails received and sent have been revealed. The authenticity of these exchanges has not been contested. John Podesta accused Russia of being behind the hack and blamed Wikileaks for harming Hillary Clinton’s election campaign.
The email you send to us, dated March 5, 2015, is signed by Edgar D. Mitchell (deceased in 2016), posing as the « sixth man to walk on the moon » as the « Apollo astronaut 14 ” and as the “ Scientific Director and Founder of Quantrek ” . The sender’s e-mail address corresponds to that of Terri Mansfield, a relative of the astronaut, also director of a task force for peace with extraterrestrial intelligences.
Author of books on the subject
In this email addressed to John Podesta and his assistance Eryn Sepp, the former astronaut takes advantage of the fact « that [John Podesta no longer works] at the White House » to offer them « a one-to-one meeting to discuss zero point energy and Disclosure [of the existence of extraterrestrials] ” . He talks about his knowledge of aliens, which he said would be peaceful, since they « hovered nonviolently over Phoenix and other sites, waiting for help, as they hovered over them. could very easily have destroyed the city with their uses of consciousness ” .
Scrutinized by American journalistsduring the last month of the presidential campaign, emails from John Podesta do not demonstrate that there is extraterrestrial life as some internet users want to believe, but instead show that the Clinton and Obama advisor is passionate by the subject, exchanging readily with interlocutors convinced that extraterrestrial life is a reality. Indeed, John Podesta and his assistants had about thirty exchanges with astronaut Edgar D. Mitchell, who even wanted to meet Barack Obama. Emails leaked by Wikileaks also show the same amount of posts with Tom Delonge, the former Blink-182 guitarist turned alien enthusiast, who has produced books and documentaries on the subject.
The interest of Hillary Clinton’s campaign manager in flying saucers, however, was not revealed by Wikileaks, since an investigation published by the Washington Postin April 2016 already returned to his obsession with Area 51 when he was advisor to Bill Clinton, and his requests under George Bush and Barack Obama to declassify government information regarding unidentified flying objects. The American daily also highlighted its statements on CNN, where it promised that Hillary Clinton,« If she is elected president, when she takes office, she will seek the declassification of as many documents as the United States federal government has, and I think that is a commitment that she intends to keep and which I intend to make him respect. «
WhatsApp will gradually become unusable. Certainly, Facebook has backed down and will not automatically delete accounts of refractory people. But from Saturday, users who decline the update will no longer be able to access their list of conversations. At first, it will still be possible to answer audio or video calls, as well as messages if notifications are activated.At first, those who decline the update can continue to answer calls or messages.
But after « a few weeks », the reprieve will be over. The screen inviting to accept the new charter will become permanent, and WhatsApp, an empty shell. Please note, WhatsApp usually deletes an account after 120 days of inactivity. It will therefore be necessary to open the app periodically to avoid deleting the account in the event of refusal of new confitions of use.
What data is shared with Facebook if we accept the new rules?
There are a lot of uncertainties on this point. Most importantly, Facebook cannot read messages, whether sent via Messenger or WhatsApp. They are in effect end-to-end encrypted, and only the sender and the recipient have the key to decrypt them. What changes in a certain way, with the update, is that WhatsApp will be able to share certain information with Facebook: phone number, name, unique smartphone ID and IP address, in particular.
How to delete my account and migrate to an alternative app?
You can back up all your conversations, photos and files to archive them or restore them at a later date in Settings> Discussions> Backup .
A specific conversation can also be directly exported to another app like Telegram. On Android , in Option (the three dots at the top right)> More> Export chat . On iOS : tap on the person’s name or the subject of the conversation then on Export discussion . Be careful, you have to be in contact with the person on both applications to perform the operation, and there are often bugs, especially with grouped chats.
WhatsApp cost Facebook nearly $ 20 billion in 2014 and still earns almost nothing. Mark Zuckerberg kept his promise not to pollute conversations with advertising, but not to keep a tight wall with Facebook. WhatsApp will thus offer more services – some paid – to businesses to communicate directly with users. An airline could, for example, send a boarding pass to a passenger. Above all, a business will be able to afford an advertisement on Facebook allowing it to send a WhatsApp message to a customer who has clicked on the advertisement.WhatsApp notably allows businesses to converse with its users. – FACEBOOK
Clearly, Facebook needs some WhatsApp data to better monetize its subsidiary. And, by the way, to develop synergies making it more difficult for the dismantling of the group by the American authorities, which opened an antitrust action in December 2020 .
What does the European Union say?
Facebook, for its part, certifies that the German gendarme “misunderstood” the new rules and that his decision has “no legitimate basis”. « There will be no impact on the deployment of the update, » says the Californian giant. But Germany seized the European Data Protection Committee in order to obtain a decision applying to all 27. The series is, undoubtedly, not finished.
WhatsApp messaging users are the object of a malicious attack through a « pink » version of the application which is none other than a virus.
A message has been sent in recent days to many WhatsApp messaging users offering them to switch from green to pink.
A flirtatiousness that could have serious consequences since this update runs the risk of installing a virus that will take control of your phone.
It was researcher Rajshekhar Rajaharia who launched the alert on Twitter: « Beware of WhatsApp Pink! A virus is spreading within WhatsApp groups with an APK download link. Do not click on a link with the name #WhatsappPink. Full access to your phone will be immediately lost. »
The virus will take control of your phone but, above all, it will allow hackers to recover your personal data including bank details.
If you have installed the application, a solution, uninstall it as soon as possible, unlink all Whatsapp web devices, clear your browser cache, check the permissions of all your applications, if one seems suspicious, cancel this authorization.
As a reminder, you should never install APK files directly on your phone but favor downloads directly from platforms such as Google Play Store or Appel Store.
Be careful for WhatsApp messaging users, a scam can deprive you of access to your own account. For the moment, these attempted thefts have been observed mainly among English-speaking users.
How do hackers work? When a user creates their account or installs the application on their phone, they receive a message from WhatsApp giving them a 6-digit code to activate the application. But it also works when users want to “recover” their account.
Immediately afterwards, he receives another message from a loved one who alerts: “Sorry, I mistakenly sent you my 6-digit security code. Can you transfer it to me please. It’s urgent ! « .
Except that it was the hackers who hacked your loved one’s account to send this message. If you send him the code, the scammer will be able to install WhatsApp with your number on his own phone. You will no longer have access to your account.
To prevent this account theft, WhatsApp offers to activate two-step verification, which helps strengthen security.
Is the Signal instant messaging app putting its finger in a gear that may overtake it? This is the opinion of some observers, specialists in computer security, after having read the latest initiative of the service , which is still at an experimental stage. Indeed, in the United Kingdom alone, Signal is exploring a payment service called Signal Payments.
“ We want payments in Signal to be fast, private and work well on mobile devices, ” IM said in an April 6 blog post. And to begin with, the application continues, it is on MobileCoin that it bets. It is a cryptocurrency which, as the name suggests, is thought to be used like digital money on the smartphone.
According to the presentation, MobileCoin includes near instant transactions, in less than ten seconds. It also offers features to easily restore its currencies (MobileCoin currency is called MOB), including in the event of loss of the mobile. Finally, it claims to be eco-responsible: it claims to be much more economical in electricity than other cryptocurrencies, which require energy to operate .
But the specificity that concerns today is its level of confidentiality.
MobileCoin is pleased that » the whole ledger [which allows to keep a trace and to follow the transactions with MOB, note] is opaque, the individual transactions are protected by cryptography and the network uses the persistent confidentiality « . This process prevents the confidentiality of past exchanges from being questioned, even if its cryptography would be compromised.
However, it is precisely the high degree of anonymity that alarms, because in the eyes of some commentators, this could backfire not only against Signal, but also against end-to-end encryption in general. This is what Bruce Schneier, a specialist in computer security and cryptography, argues, in a blog post that was published on April 7. He especially fears the reaction of the authorities.
An unfavorable development for encryption?
“ I think that’s a terribly bad idea. […] The addition of a cryptocurrency to an end-to-end encrypted application blurs the morality of the product, and invites all kinds of government investigations and regulatory interference , ”anticipates Bruce Schneier. He cites haphazardly the FBI, the tax services, the stock market regulator or even anti-money laundering agencies.null
“ I don’t see any good reason to do this. Secure communications and transactions can be separate applications, or even separate applications within the same organization. End-to-end encryption is already at risk. Signal is the best app we have. Combining it with a cryptocurrency means that the whole system dies if one part dies ”.
Bruce Schneier’s fears over end-to-end encryption are not a figment of the imagination. As recalled in early March the Electronic Frontier Foundation , a key organization for the defense of digital freedoms, the boss of the FBI again demanded before American parliamentarians a backdoor on end-to-end encryption services, in the name of the fight against crime and terrorism.Leading cryptographers are concerned about the measure’s effects on end-to-end encryption. // Source: Facebook
Supporters of end-to-end encryption are already struggling to resist the assaults of those who wish to reduce it, to legitimately fight against crime, child pornography, terrorism and trafficking of all kinds. The arrival of payments will give another pretext to regulate these messaging services, in the name of the fight against mafia financing and money laundering.
In summary, this is Bruce Schneier’s analysis. And he’s not the only one to think so. In Wired , Matthew Green cryptography professor said equally concerned » signal as encrypted messaging product is really valuable. […] It terrifies me to see them mix up their history with the legislative and regulatory hell of cryptocurrencies and the vulnerabilities that go with it. «
Chance of the calendar, a decree appeared in the French Official Journal on April 4 on a similar theme. It focuses on the fight against the anonymity of virtual assets and anonymous electronic currencies. It provides for a tightening up of the national system for combating money laundering and the financing of terrorism. This decree updates a number of legislative provisions.
Thus, the text “ clarifies the ban on the use of anonymous electronic money for the purchase of digital assets. It also imposes on providers of digital asset services an obligation to identify their customers prior to any occasional transaction ”. In addition, “ it determines the procedures for verifying the identity of customers […] when entering into a business relationship. «
A risk for the moment limited?
Obviously, these issues did not deter Signal from moving in this direction. In any case, the announcement note does not mention it. The mobile app just welcomes explaining that it does not have access to the balance, full transaction history or funds, and that these funds can be transferred at any time to another service or app. .
One thing is certain: the choice of MobileCoin probably owes nothing to chance. Beyond its technical peculiarities, it turns out that the American behind Signal , Moxie Marlinspike – a pseudonym – has served as a technical advisor since the creation of MobileCoin in 2017, and that he was paid for it. He contributed to the technical design of cryptocurrency. However, he assures that he does not have any.Moxie Marlinspike, creator of Signal. // Source: John S. and James L. Knight Foundation
MobileCoin is based on Stellar blockchain technology. This is not based on proof of work – that is, computer calculations to be made – but on a particular type of consensus . This orientation explains why transactions are carried out more quickly, without a heavy energy footprint, by avoiding calling on all the nodes of the network to validate the exchanges, but only a part, some of whom are trusted.
Currently, MobileCoin has been trading on the FTX marketplace since December 2020. The peculiarity of FTX is that it does not allow transactions from US users, which can keep US regulators at bay. But Signal suggests a possible deployment in other marketplaces. And at Wired, a project member suggests arriving in the United States. But it might, in the meantime, frown some eyebrows in others. For example, in the UK, where testing is starting.
The application has lost a large number of users due to its new policy of sharing personal data
A few weeks ago, WhatsApp saw its user numbers skyrocket following its announcement to share certain personal data with Facebook , creating an exodus of its users to Signal . Since then, the messaging application has multiplied its attempts to reconnect with its users via information campaigns or new features and it seems that this continues. According to WABetaInfo , WhatsApp is indeed testing a new feature allowing users to customize the colors of the application.
It is in particular a question of modifying the color of the text, but also of certain icons. Nothing revolutionary, but this aesthetic change shows that Facebook – parent company of WhatsApp – wants to offer more customization options to its users. One way to make the app more user-friendly and to involve members more.
European users protected by the GDPR
Will Facebook manage to make people forget the bad press that WhatsApp has been suffering from for a few weeks with such a feature? Hard to say. From May 15, WhatsApp users will still be forced to accept the new policy of sharing certain personal information between the messaging app and Facebook, at the risk of no longer being able to use all of WhatsApp’s features. .
Remember that the change in WhatsApp data usage policy is less important in Europe. The GDPR protects user data and prevents its commercial reuse. WhatsApp will therefore not be able to share « European user data with Facebook in order to improve the group’s advertisements or commercial products, » a spokesperson for Facebook France said.
A mysterious encrypted message appeared on the US Army Strategic Command’s Twitter account on Sunday, March 28. Conspiracy, nuclear code exposed or hacking? None of this in reality.
« ; l ;; gmlxzssaw, » Here is the mysterious message that Internet users could read on the official Twitter account of the command in charge of the military control of the entire American nuclear arsenal, Sunday, March 28. The tweet was subsequently deleted. Is this a nuclear code, a Pentagon hack or a conspiracy ? None of this in reality.
Crypto enthusiasts will be disappointed when they learn the true origin of this cryptic message. It is indeed a simple gibberish, written by a child who seized the Twitter account of the army for a few minutes, the Stratcom told a reporter for the American media Daily Dot.
“The head of the Military Command Twitter account , who was telecommuting, left the account open and unattended for a few moments. Her young child took advantage of the situation and started playing with the keyboard and, unfortunately, and without realizing it, published the tweet, « detailed a spokesperson for Stratcom in a statement. « Absolutely nothing bad happened, that is to say no hacking of our Twitter account, » he added.
The former US president was banned from Twitter in January after his supporters stormed the Capitol
The story does not say, at this time, whether messages will only appear in capital letters. Banned from Twitter since January, Donald Trump will return to social networks within two to three months « with his own platform, » said an adviser to the former president of the United States on Sunday.
“It’s not just a company that approached the president, there are a lot of companies,” and “this new platform will be something big, everyone wants it. It will bring millions and millions, tens of millions of subscribers to this new platform, ”he added.
The ex-president, who left the White House on January 20 after being defeated by Democrat Joe Biden in the November election, has also been temporarily or permanently banned by most other major social networks or platforms internet including Facebook, Instagram, Youtube or Snapchat.