<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DIGITAL SELF-DEFENSE</title>
	<atom:link href="https://www.digitalnisebeobrana.cz/en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.digitalnisebeobrana.cz/en/</link>
	<description></description>
	<lastBuildDate>Fri, 23 May 2025 06:09:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.digitalnisebeobrana.cz/wp-content/uploads/2018/12/cropped-mr.black_-32x32.png</url>
	<title>DIGITAL SELF-DEFENSE</title>
	<link>https://www.digitalnisebeobrana.cz/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cryptoanarchy – To be safe to be free</title>
		<link>https://www.digitalnisebeobrana.cz/en/kryptoanarchie-sifrou-ke-svobode/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Thu, 22 May 2025 09:16:04 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cryptoanarchy]]></category>
		<category><![CDATA[kryptoanarchie]]></category>
		<guid isPermaLink="false">https://www.digitalnisebeobrana.cz/?p=2214</guid>

					<description><![CDATA[<p>Cryptoanarchy is often compared to social ideologies such as anarcho-communism, anarcho-capitalism and others. This comparison cannot work for one simple reason. Cryptoanarchy is not an ideology that proposes (or dictates to society) how it should be governed and what rules society should follow. Cryptoanarchy is not a social system. &#160; For a democracy, anarcho-communism, anarcho-capitalism &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/kryptoanarchie-sifrou-ke-svobode/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">Cryptoanarchy – To be safe to be free</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/kryptoanarchie-sifrou-ke-svobode/">Cryptoanarchy – To be safe to be free</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptoanarchy is often compared to social ideologies such as anarcho-communism, anarcho-capitalism and others. This comparison cannot work for one simple reason. Cryptoanarchy is not an ideology that proposes (or dictates to society) how it should be governed and what rules society should follow. Cryptoanarchy is not a social system.</p>
<p>&nbsp;</p>
<p>For a democracy, anarcho-communism, anarcho-capitalism or monarchy to be able work, force is needed to sustain such a system. Either a sufficient number of people who come together or a very strong (either economically or socially) individual or group. A sufficiently strong individual can control a democratic society regardless of the opinion of the majority (e.g. for the Czechoslovak Communist Party it was enough to gain “just” 31.2% of the votes in the 1946 elections to control the whole of Czechoslovakia for 40 years). Similarly, the concept of anarcho-capitalism is unsustainable unless it is possible to enforce the so-called Non-Aggression Principle. The Communists will not force the surrender of private property on a sufficiently strong entity.</p>
<p>Cryptoanarchists usually do not try to change society. Their goal is a level of privacy and security that ensures a sufficient degree of freedom. And the very degree of sufficient freedom is individual.</p>
<p>Thus, <strong>cryptoanarchy is a set of tools and techniques</strong> that help maintain a level of privacy and security that is achievable or targeted for individuals or communities. The basic tool of cryptoanarchy is information encryption. The use of such techniques that make it impossible for the person from whom to hide information not only to obtain the information, but also to learn about the existence of such information. It does not matter whether it’s communication, electronic data or a financial transaction. These tools do not necessarily have to be highly sophisticated or require powerful computer technology. Do you want to advise a classmate sitting next to you with a difficult exercise in an exam so that the teacher does not know, or do you want to tell your partner something very private, but you are surrounded by other people? You use a very simple technique – you whisper it to her/him.</p>
<p>This set of techniques and tools is not and probably will never be definitive. You can’t write a cryptoanarchy bible that would last forever. As society and technology evolve, so does cryptoanarchy. The need for privacy was different (perhaps none) in the early common society, different in ancient Rome, different today in the era of digital revolution, and different in the future (for example, when staying in spaceships or colonizing other space objects). Technologies that seek to detect encrypted information are also being developed. Encryption techniques that were considered secure twenty years ago are mostly unusable today, and can be broken in minutes. Asking when the cryptoanarchy will be “done” is similar to asking when the Internet will be done.</p>
<p>In addition, cryptoanarchy can disrupt any social system. It eliminates state and private courts, police and the army. If you do not know the perpetrator, you cannot try and/or remove him (close or kill) for breaking the law or the NAP (Non-Aggression Principle). Cryptoanarchy does not address the issue of a free or regulated market. The free market is actually an integral part of it. You can’t regulate something that the regulator doesn’t know about and can’t punish someone he doesn’t know.</p>
<p>Social systems are based on rights and obligations. The only natural duties are those that are instinctive. For example, the mother’s natural duty to take care of her offspring. And even that is not enforceable outside the social system. Everything else, both duties and rights, is an artificial construct that is enforced by the social system.</p>
<h4>The only “right” that applies universally is the right of the stronger. Both in nature (living and non-living) and in society.</h4>
<p>Why are we obliged to pay taxes, comply with court rulings and share our private data with rulers? Stronger so decided. In this case, the stronger is a sufficient number of people (which does not necessarily mean the majority) who are able to enforce these obligations under the threat of violence. This is not only true for human communities, examples can also be found in nature. Why is the ant queen (who is actually a slave) obliged to spend her whole life conceiving new generations in a small space deep in the anthill? Because if she resisted this obligation, the ant society would punish her. Such a queen would have a shorter life than the promises of politicians after the election.</p>
<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-5276 aligncenter" src="https://web.archive.org/web/20200621152115im_/https://www.paralelnipolis.cz/wp-content/uploads/2020/04/hammer-620011_1920-300x225.jpg" sizes="(max-width: 300px) 100vw, 300px" srcset="https://web.archive.org/web/20200621152115im_/https://www.paralelnipolis.cz/wp-content/uploads/2020/04/hammer-620011_1920-300x225.jpg 300w, https://web.archive.org/web/20200621152115im_/https://www.paralelnipolis.cz/wp-content/uploads/2020/04/hammer-620011_1920-600x450.jpg 600w, https://web.archive.org/web/20200621152115im_/https://www.paralelnipolis.cz/wp-content/uploads/2020/04/hammer-620011_1920-768x576.jpg 768w, https://web.archive.org/web/20200621152115im_/https://www.paralelnipolis.cz/wp-content/uploads/2020/04/hammer-620011_1920-1024x768.jpg 1024w, https://web.archive.org/web/20200621152115im_/https://www.paralelnipolis.cz/wp-content/uploads/2020/04/hammer-620011_1920.jpg 1920w" alt="" width="300" height="225" /></p>
<p>There is no natural right to life. It was invented by human society and agreed (either voluntarily or involuntarily) to enforce it. As well as the right to personal property or a “dignified life”. In the wild, the antelope does not wield in front of the lion by the charter of fundamental rights and animal freedoms. It knows she has to run, it has not better option.</p>
<p>Cryptoanarchy is a tool by which an individual can avoid pressure from society to abide by the rules and/or respect the rights of others. Motives for this can be “good” or “bad” (but the evaluation is always individual). For a person who is used to following the rules set by someone else, this may sound like dangerous behavior, but it is again just an individual assessment. Often we can evaluate such unconditional compliance with the rules over time. Large sections of the (not only) German population found the so-called Nuremberg Laws in order and it was normal to abide by them. And today it seems incomprehensible to us. In the same decade, we can also look at, for example, current market regulations, the criminalization of drug users or the crime of treason.</p>
<p>This does not mean that the cryptoanarchist does not follow any rules and breaks all laws. Many factors play a role here, such as the question of one’s own security, morality or, for example, economic profit. And while it may not seem so at first glance, most people are not interested in harming. Why in the store, when the salesman isn’t looking, most (!) of us just don’t stick a bottle off the shelf into a bag? It is not because of fear of the law (and punishment). It’s because we have a kind of moral code encoded in us. Turning someone’s property just doesn’t work out for us, whether or not there’s a law.</p>
<p>Thus, <strong>the purpose of cryptoanarchy is not</strong>, as it might seem, <strong>primarily to break the rules</strong>. The purpose is to maintain a degree of freedom that is important to us and to protect ourselves and our loved ones from the dangers that can arise if someone who wants to (and can) use it against us accesses our information. History has shown us that this danger is not unrealistic.</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/kryptoanarchie-sifrou-ke-svobode/">Cryptoanarchy – To be safe to be free</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Personal Threat Model</title>
		<link>https://www.digitalnisebeobrana.cz/en/osobni-threat-model/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Wed, 13 Sep 2023 13:11:02 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[First aid!]]></category>
		<category><![CDATA[nástroje]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[obrana]]></category>
		<category><![CDATA[ochrana]]></category>
		<category><![CDATA[prevence]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[threat model]]></category>
		<guid isPermaLink="false">https://www.digitalni-sebeobrana.cz/?p=1963</guid>

					<description><![CDATA[<p>&#8220;`html 1. Introduction This document serves as a personal threat model focused on cybersecurity in the area of cryptocurrencies. Its aim is to identify potential threats and vulnerabilities and propose measures to minimize them. 2. Identification of Actors and Assets Actors Hackers Regulatory Bodies Competitors Close Associates Assets Crypto Wallet Transaction History Investment Strategy Actors &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/osobni-threat-model/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">Personal Threat Model</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/osobni-threat-model/">Personal Threat Model</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&#8220;`html</p>
<h2 id="1-vod">1. Introduction</h2>
<p>This document serves as a personal threat model focused on cybersecurity in the area of cryptocurrencies. Its aim is to identify potential threats and vulnerabilities and propose measures to minimize them.</p>
<hr />
<h2 id="2-identifikace-akt-r-a-c-l-">2. Identification of Actors and Assets</h2>
<h3 id="akt-i">Actors</h3>
<ul>
<li>Hackers</li>
<li>Regulatory Bodies</li>
<li>Competitors</li>
<li>Close Associates</li>
</ul>
<h3 id="c-le">Assets</h3>
<ul>
<li>Crypto Wallet</li>
<li>Transaction History</li>
<li>Investment Strategy</li>
</ul>
<hr />
<h3 id="akt-i-a-c-le-detailn-pohled">Actors and Assets: Detailed View</h3>
<p>In this part of the threat model, it is crucial to identify in detail the actors who could pose a threat and the assets they might want to compromise. Each actor and asset should be elaborated on, including motivations, capabilities, and methods of attack.</p>
<h4 id="hacke-i">Hackers</h4>
<ul>
<li><strong>Motivation</strong>: Financial gain, reputational reasons, ideological beliefs</li>
<li><strong>Capabilities</strong>: Malware, ransomware, phishing attacks</li>
<li><strong>Attack Methods</strong>: Wallet infiltration, keylogging, SIM swapping</li>
</ul>
<h4 id="regul-torn-org-ny">Regulatory Bodies</h4>
<ul>
<li><strong>Motivation</strong>: Oversight and regulation, ensuring compliance with laws</li>
<li><strong>Capabilities</strong>: Legal measures, access to public and private databases</li>
<li><strong>Attack Methods</strong>: Court orders, asset seizure, audits</li>
</ul>
<h4 id="konkurence">Competitors</h4>
<ul>
<li><strong>Motivation</strong>: Gaining competitive advantage, financial gain</li>
<li><strong>Capabilities</strong>: Industrial espionage, social engineering</li>
<li><strong>Attack Methods</strong>: Infiltration, misinformation, market manipulation</li>
</ul>
<h4 id="bl-zc-">Close Associates</h4>
<ul>
<li><strong>Motivation</strong>: Personal interests, possible financial gain</li>
<li><strong>Capabilities</strong>: Access to personal devices, knowledge of personal information</li>
<li><strong>Attack Methods</strong>: Using known passwords, accessing unsecured devices</li>
</ul>
<hr />
<h3 id="c-le">Assets</h3>
<h4 id="krypto-pen-enka">Crypto Wallet</h4>
<ul>
<li><strong>Importance</strong>: High</li>
<li><strong>Attack Types</strong>: Phishing, malware, physical access</li>
<li><strong>Mitigations</strong>: Hardware wallet, 2FA, strong passwords</li>
</ul>
<h4 id="transak-n-historie">Transaction History</h4>
<ul>
<li><strong>Importance</strong>: Medium</li>
<li><strong>Attack Types</strong>: IP tracking, exchange compromise</li>
<li><strong>Mitigations</strong>: Use of VPN, decentralized exchanges</li>
</ul>
<h4 id="investi-n-strategie">Investment Strategy</h4>
<ul>
<li><strong>Importance</strong>: Medium to High</li>
<li><strong>Attack Types</strong>: Social engineering, industrial espionage</li>
<li><strong>Mitigations</strong>: Limiting information sharing, using encrypted communication</li>
</ul>
<hr />
<h2 id="3-zranitelnosti">3. Vulnerabilities</h2>
<h3 id="pou-v-n-online-pen-enek-s-n-zk-m-zabezpe-en-m">Using Online Wallets with Low Security</h3>
<ul>
<li><strong>Description</strong>: Online wallets are often targeted by attacks, especially if not properly secured.</li>
<li><strong>Actors</strong>: Hackers, competitors</li>
<li><strong>Attack Types</strong>: Phishing, brute-force attacks</li>
<li><strong>Mitigations</strong>: Switching to a hardware wallet, using 2FA</li>
</ul>
<h3 id="nezabezpe-en-wi-fi-s-">Unsecured Wi-Fi Network</h3>
<ul>
<li><strong>Description</strong>: Using unsecured Wi-Fi networks can allow attackers easy access to your data.</li>
<li><strong>Actors</strong>: Hackers, close associates</li>
<li><strong>Attack Types</strong>: Man-in-the-middle attacks, sniffing</li>
<li><strong>Mitigations</strong>: Use of VPN, connecting only to trusted networks</li>
</ul>
<h3 id="pou-v-n-neaktualizovan-ho-software">Using Outdated Software</h3>
<ul>
<li><strong>Description</strong>: Old or outdated software may contain vulnerabilities that can be exploited for infiltration.</li>
<li><strong>Actors</strong>: Hackers, regulatory bodies</li>
<li><strong>Attack Types</strong>: Exploitation of known vulnerabilities</li>
<li><strong>Mitigations</strong>: Regular software updates, application of security patches</li>
</ul>
<h3 id="nedostate-n-dvoufaktorov-autentizace-2fa-">Insufficient Two-Factor Authentication (2FA)</h3>
<ul>
<li><strong>Description</strong>: Absence or poor implementation of 2FA can lead to easy access to sensitive data.</li>
<li><strong>Actors</strong>: Hackers, close associates</li>
<li><strong>Attack Types</strong>: Brute-force attacks, SIM swapping</li>
<li><strong>Mitigations</strong>: Activation and proper configuration of 2FA</li>
</ul>
<h3 id="nedostate-n-opsec-operational-security-">Insufficient OPSEC (Operational Security)</h3>
<ul>
<li><strong>Description</strong>: Insufficient OPSEC may include poor handling of passwords, keys, and other sensitive data.</li>
<li><strong>Actors</strong>: All</li>
<li><strong>Attack Types</strong>: Social engineering, phishing</li>
<li><strong>Mitigations</strong>: Cybersecurity education, use of a password manager</li>
</ul>
<hr />
<h2 id="4-vektory-tok-">4. Attack Vectors</h2>
<h3 id="phishingov-toky">Phishing Attacks</h3>
<ul>
<li><strong>Description</strong>: Attacks that aim to obtain sensitive information through fraudulent emails or websites.</li>
<li><strong>Actors</strong>: Hackers, competitors</li>
<li><strong>Vulnerabilities</strong>: Insufficient OPSEC, using online wallets with low security</li>
<li><strong>Mitigations</strong>: Cybersecurity education, use of 2FA</li>
</ul>
<h3 id="man-in-the-middle-toky">Man-in-the-Middle Attacks</h3>
<ul>
<li><strong>Description</strong>: Attacks where the attacker eavesdrops on or manipulates communication between two parties.</li>
<li><strong>Actors</strong>: Hackers, regulatory bodies</li>
<li><strong>Vulnerabilities</strong>: Unsecured Wi-Fi network, outdated software</li>
<li><strong>Mitigations</strong>: Use of VPN, encryption of communication</li>
</ul>
<h3 id="social-engineering">Social Engineering</h3>
<ul>
<li><strong>Description</strong>: Manipulating people to obtain sensitive information or system access.</li>
<li><strong>Actors</strong>: Competitors, close associates</li>
<li><strong>Vulnerabilities</strong>: Insufficient OPSEC, insufficient 2FA</li>
<li><strong>Mitigations</strong>: Cybersecurity education, limiting information sharing</li>
</ul>
<h3 id="sim-swapping">SIM Swapping</h3>
<ul>
<li><strong>Description</strong>: An attack in which the attacker gains control of the target’s SIM card.</li>
<li><strong>Actors</strong>: Hackers</li>
<li><strong>Vulnerabilities</strong>: Insufficient 2FA, insufficient OPSEC</li>
<li><strong>Mitigations</strong>: Use of hardware-based 2FA, high level of OPSEC</li>
</ul>
<hr />
<h2 id="5-opat-en-">5. Measures</h2>
<h3 id="pou-it-hardwarov-pen-enky">Using a Hardware Wallet</h3>
<ul>
<li><strong>Description</strong>: Hardware wallets provide a high level of security for storing cryptocurrencies.</li>
<li><strong>Actors</strong>: Hackers</li>
<li><strong>Suitable for</strong>: Protecting the crypto wallet</li>
<li><strong>How to Implement</strong>: Purchase a reputable hardware wallet such as Ledger or Trezor and transfer your cryptocurrencies to it.</li>
</ul>
<h3 id="pou-it-vpn">Using a VPN</h3>
<ul>
<li><strong>Description</strong>: A VPN provides anonymity and security when browsing the internet.</li>
<li><strong>Actors</strong>: Regulatory bodies, hackers</li>
<li><strong>Suitable for</strong>: Protecting transaction history, securing Wi-Fi</li>
<li><strong>How to Implement</strong>: Choose a trusted VPN provider and enable it when connecting to the internet.</li>
</ul>
<h3 id="aktivace-a-spr-vn-konfigurace-2fa">Activation and Proper Configuration of 2FA</h3>
<ul>
<li><strong>Description</strong>: Two-factor authentication adds an additional layer of security.</li>
<li><strong>Actors</strong>: Hackers, close associates</li>
<li><strong>Suitable for</strong>: Protecting the crypto wallet, securing online accounts</li>
<li><strong>How to Implement</strong>: Enable 2FA on all important accounts and use an app like Google Authenticator or a hardware key like YubiKey.</li>
</ul>
<h3 id="vzd-l-n-v-oblasti-kybernetick-bezpe-nosti">Cybersecurity Education</h3>
<ul>
<li><strong>Description</strong>: Education and awareness are key to recognizing and preventing attacks.</li>
<li><strong>Actors</strong>: All</li>
<li><strong>Suitable for</strong>: Protection against all types of attacks</li>
<li><strong>How to Implement</strong>: Take cybersecurity courses, read current news and articles, and participate in webinars and conferences.</li>
</ul>
<hr />
<h2 id="6-z-v-r">6. Conclusion</h2>
<p>This personal threat model is the first step toward ensuring my cybersecurity in the field of cryptocurrencies. I plan to regularly update this document and implement new security measures according to the evolving threat landscape.<br />
&#8220;`</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/osobni-threat-model/">Personal Threat Model</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>On the Origin of Hackers</title>
		<link>https://www.digitalnisebeobrana.cz/en/on-the-origin-of-hackers/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 21:29:36 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[hacky]]></category>
		<category><![CDATA[historie]]></category>
		<category><![CDATA[Techniky hackerů]]></category>
		<category><![CDATA[hackeři]]></category>
		<category><![CDATA[šifrování]]></category>
		<category><![CDATA[trik]]></category>
		<guid isPermaLink="false">https://www.digitalni-sebeobrana.cz/?p=1687</guid>

					<description><![CDATA[<p>Who were the first hackers and when did the history of hacking begin? Probably earlier than you'd expect. It's been more than...</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/on-the-origin-of-hackers/">On the Origin of Hackers</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When did the history of hacking begin? If you&#8217;re guessing the second half of the 20th century, you have to go a little further upstream. It wasn&#8217;t even breaking Enigma-encrypted messages during World War II.<br />
We are more than 180 years away from the first known hack of a communications network (spoiler: it wasn&#8217;t a phone call, Alexander Graham Bell didn&#8217;t make his first call until 42 years later).</p>
<h2>Chappe&#8217;s Telegraph</h2>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1.jpg"><img decoding="async" class="alignright size-medium wp-image-1691" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-146x300.jpg" alt="" width="146" height="300" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-146x300.jpg 146w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-600x1232.jpg 600w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-499x1024.jpg 499w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-768x1577.jpg 768w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-748x1536.jpg 748w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-500x1027.jpg 500w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-800x1643.jpg 800w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1-640x1314.jpg 640w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Telegraphe_Chappe_1.jpg 877w" sizes="(max-width: 146px) 100vw, 146px" /></a> In 1794, French inventor Claude Chappe came up with a system of visual semaphore telegraphs. By adjusting flexible arms placed on a tower (mast), it was possible to display letters, numbers and some special characters, such as the beginning and end of a communication or the deletion of the last character in case of a typo. In this case, rather &#8220;misbending&#8221;.</p>
<p>The individual towers were spaced apart so that one could be seen from one to the next. Thus, the message could spread from one tower to the next until it reached its destination. It is reported that the speed of the message was up to 500 km per hour.</p>
<p>In France, a network of Chappe visual telegraphs was built during the 19th century to serve the needs of the state (and especially the army). For example, there were 58 stations on the route between Paris and Brest. But ordinary citizens could not use the services of this communication network.</p>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77.png"><img decoding="async" class="alignright size-medium wp-image-1690" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-212x300.png" alt="" width="212" height="300" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-212x300.png 212w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-600x849.png 600w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-724x1024.png 724w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-768x1086.png 768w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-1086x1536.png 1086w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-1448x2048.png 1448w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-500x707.png 500w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-800x1132.png 800w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-1280x1810.png 1280w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-1920x2716.png 1920w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/mapReseau_chappe77-640x905.png 640w" sizes="(max-width: 212px) 100vw, 212px" /></a>The communications even used end-to-end encryption. Since military secrets were being transmitted via the telegraph network, it was not very appropriate for anyone with a view of the telegraph tower to be able to read the communications. Thus, the sender and receiver had an agreed key with which to encrypt their messages. The tower operators along the way just repeated the encrypted message character by character without being able to decipher what the contents of the message were. The sender and recipient of the message thus had more privacy in 1800 than Facebook Messenger users in 2021 (more on messenger encryption <a href="https://www.digitalni-sebeobrana.cz/en/sifrovani-zprav-demo/">here</a>).</p>
<h2>François and Louis Blanc</h2>
<p>The Blanc brothers traded government bonds on the Bordeaux stock exchange. In such trading, speed of information is crucial &#8211; whoever has faster news from a central point of action (in this case Paris) has an advantage over other traders because they can better anticipate stock market movements.</p>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/Portrait_de_Francois_Blanc.jpg"><img loading="lazy" decoding="async" class="alignright size-thumbnail wp-image-1689" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/Portrait_de_Francois_Blanc-150x150.jpg" alt="" width="150" height="150" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Portrait_de_Francois_Blanc-150x150.jpg 150w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Portrait_de_Francois_Blanc-300x300.jpg 300w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/Portrait_de_Francois_Blanc-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /></a> Traditionally, news from Paris to Bordeaux was sent by stagecoach, which took five days. Some merchants tried to shorten this time by using carrier pigeons or hiring messengers. This was faster, but not significantly so. It was certainly not enough for the Blanc brothers. They knew there was a much faster way to communicate over long distances. But it was reserved for the army, and merchants could not use it. So most merchants continued to think about improving the aerodynamics of the pigeon. But the Blanc brothers were hackers (though they didn&#8217;t claim to be on Twitter, according to available sources). So they didn&#8217;t give up on the idea of using Chappe&#8217;s telegraph network.</p>
<h2>The Plan</h2>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/1024px-Telegraphe_Chappe_2.jpg"><img loading="lazy" decoding="async" class="alignright size-thumbnail wp-image-1692" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/1024px-Telegraphe_Chappe_2-150x150.jpg" alt="" width="150" height="150" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/1024px-Telegraphe_Chappe_2-150x150.jpg 150w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/1024px-Telegraphe_Chappe_2-300x300.jpg 300w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/1024px-Telegraphe_Chappe_2-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /></a>The telegraph operators were probably not the best-paid employees in France. So the solution might be good old-fashioned corruption.<br />
But if the Blanc brothers wanted to send messages in the standard way, they would have to bribe all the operators on their way from Paris to Bordeaux. Which could get expensive.<br />
So they had to figure out how to solve this expensive inconvenience.<br />
As mentioned above, the system included a symbol to erase the last character &#8211; the operator writes down the characters as he sees them on the semaphore and if he sees the erase symbol, he simply erases the last character and moves on.<br />
This is what the hackers decided to take advantage of. They will send secret messages by following &#8220;their&#8221; character embedded in a regular army message with an erase character. Anyone who sees the semaphore can see this character, but the terminal tower operator will erase it from the paper (or not write it at all). Thus the message will be passed on while leaving no written evidence of it.</p>
<h2>Socks as a data carrier</h2>
<p>There was one more problem to solve. On the way from Paris to Bordeaux, there was still a tower in Tours (about 200 km from Paris) where messages were decoded and forwarded on without error. So the messages had to be sent from here. And they must have gotten to Tours somehow unobtrusively.<br />
Fortunately, there was no need to send some extensive novels (that wouldn&#8217;t even be possible in this scenario), just a few arranged signals. And so parcels were sent to Tours from Paris containing clothes. The type of clothing (gloves, socks, ties) that was marked in the accompanying letter indicated whether a title was falling or rising in the stock market, and the color in turn the amount of change.</p>
<h2>Hack</h2>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/GrilleDesSignauxDeCorrespondance.jpg"><img loading="lazy" decoding="async" class="alignright size-thumbnail wp-image-1697" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/GrilleDesSignauxDeCorrespondance-150x150.jpg" alt="" width="150" height="150" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/GrilleDesSignauxDeCorrespondance-150x150.jpg 150w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/GrilleDesSignauxDeCorrespondance-300x300.jpg 300w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/GrilleDesSignauxDeCorrespondance-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /></a>The hacking may have begun. An accomplice in Paris, according to the changes in the stock market, put the clothes in a package and sent it to Tours. There, the bribed telegraph operator (he received a one-off 1500 francs for his involvement in the conspiracy, then 150 francs every month, plus a bonus of 20 francs for each message transmitted) sent a message with &#8220;errors&#8221; inserted.<br />
At the tower near Bordeaux, another accomplice waited with a telescope, watching the telegraph and writing down the characters that were marked as erroneous. And thus the messages reached our merchants, who were several days ahead of the others.</p>
<h2>Disclosure</h2>
<p>The system worked perfectly for two years. A total of 121 messages (and packages of clothes) were sent this way. Surprisingly, the sudden wealth of the telegraph operators (the normal daily wage of an operator was 1.50 francs) did not arouse suspicion.<br />
The truth only came out when one of the operators fell ill and confided the whole matter to a friend before his death.<br />
Surprisingly, the Blanc brothers suffered no consequences. French legislation simply did not prohibit the insertion of one&#8217;s own messages into the telegraph system. It didn&#8217;t occur to the legislators of the time.<br />
And so they were later to become successful casino operators (including the Monte Carlo casino in Monaco).</p>
<p>As can be seen from the first documented hacking attack, the weakest link in security tends to be human.</p>
<h3>Resources:</h3>
<p><a href="https://fr.wikipedia.org/wiki/T%C3%A9l%C3%A9graphe_Chappe">https://fr.wikipedia.org/wiki/T%C3%A9l%C3%A9graphe_Chappe</a><br />
<a href="https://en.wikipedia.org/wiki/Fran%C3%A7ois_Blanc">https://en.wikipedia.org/wiki/Fran%C3%A7ois_Blanc</a><br />
<a href="https://www.schneier.com/blog/archives/2018/05/1834_the_first_.html">https://www.schneier.com/blog/archives/2018/05/1834_the_first_.html</a><br />
<a href="https://gallica.bnf.fr/ark:/12148/bpt6k4393846/f1.item">https://gallica.bnf.fr/ark:/12148/bpt6k4393846/f1.item</a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/on-the-origin-of-hackers/">On the Origin of Hackers</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; who are we defending ourselves against?</title>
		<link>https://www.digitalnisebeobrana.cz/en/hackeri-proti-komu-se-branime/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Thu, 15 Jul 2021 11:41:01 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Techniky hackerů]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[black hat]]></category>
		<category><![CDATA[grey hat]]></category>
		<category><![CDATA[hackeři]]></category>
		<category><![CDATA[lockpicking]]></category>
		<category><![CDATA[white hat]]></category>
		<guid isPermaLink="false">https://www.digitalni-sebeobrana.cz/?p=1659</guid>

					<description><![CDATA[<p>Hacking and hackers are shrouded in many myths, perhaps most notably by film production and journalists who need to engage their readers and viewers. But very little of what we see in the media corresponds to reality. So who are the dreaded hackers, can I identify them and what do they have in common? Hackers &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/hackeri-proti-komu-se-branime/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">Hackers &#8211; who are we defending ourselves against?</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/hackeri-proti-komu-se-branime/">Hackers &#8211; who are we defending ourselves against?</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hacking and hackers are shrouded in many myths, perhaps most notably by film production and journalists who need to engage their readers and viewers. But very little of what we see in the media corresponds to reality.<span id="more-1659"></span></p>
<h2>So who are the dreaded hackers, can I identify them and what do they have in common?</h2>
<p>Hackers come from different backgrounds, different parts of the world and different social classes. You can&#8217;t generally say that the typical hacker is a twenty-five-year-old white guy, addicted to caffeine from energy drinks, who doesn&#8217;t get along with his peers and spends all his free time in a dark basement surrounded by computers.<br />
What most hackers have in common, however, is the ability to use things in ways other than how they were intended and to circumvent obstacles. Whether it&#8217;s physical, technological or psychological.<br />
In the beginning, it&#8217;s curiosity. How the world around us works, how different tools work and how the human mind works. And if the object of interest has any weaknesses in its design that can be exploited or abused (this is often a rather subjective assessment).</p>
<h2>Opening the lock</h2>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/lockpicking.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-1665" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/lockpicking-225x300.jpg" alt="" width="225" height="300" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/lockpicking-225x300.jpg 225w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/lockpicking-600x800.jpg 600w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/lockpicking-500x666.jpg 500w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/lockpicking.jpg 640w" sizes="(max-width: 225px) 100vw, 225px" /></a>When you want to open a classic lock, it&#8217;s a good idea to know how its mechanism works first. Then you can use the tools and techniques to open it without a key. Or you can simply use explosives. While this can be fancy, it has a few minor drawbacks. Someone may notice and have strange questions like if the door is yours, why you don&#8217;t unlock it normally, and where you got the untaxed explosive. Sometimes it can also be handy so that the owner of the lock doesn&#8217;t even find out in the future that it was unlocked (it&#8217;s pretty hard to lock after using explosives). Well, and it can also happen that the explosion will destroy what is behind the lock and what you are doing it for in the first place. Not to mention that if handled carelessly, it can radically reduce the number of your favorite limbs.<br />
That&#8217;s why it&#8217;s quite handy to know that there&#8217;s a mechanism in the lock that can be opened fairly quickly, quietly, and without further consequence. Therefore, hackers are usually very familiar with the systems they are attacking. As we will show later, this does not mean that the hacker has to be a computer genius. There is room for hackers in almost every field.<br />
After all, hacking isn&#8217;t just getting into places we shouldn&#8217;t. It can also be the ability to use things differently. For example, the recently popular biohacking is not about sneaking into (preferably) your own body and taking something there. Rather, we&#8217;re trying to improve the processes that happen there.<br />
I&#8217;ll stick to describing hacking in the most familiar IT sector, but basically anything can be applied elsewhere in some way.</p>
<h2>Hackers, fashion and the state</h2>
<p><a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/blackhatwhitehat.png"><img loading="lazy" decoding="async" class="-size-medium wp-image-1660 alignright" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/07/blackhatwhitehat-300x231.png" alt="Western" width="300" height="231" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/blackhatwhitehat-300x231.png 300w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/07/blackhatwhitehat.png 436w" sizes="(max-width: 300px) 100vw, 300px" /></a>Because the world needs pigeonholes, hackers have also started to divide themselves into groups: black hat, white hat and grey hat. This designation was taken from Hollywood Westerns of the 1920s, where there was an unwritten convention that heroes wore white hats and villains wore black hats. At least that&#8217;s what Wikipedia says.</p>
<p><strong>Black hat</strong> hackers are the equivalent of the negative heroes of the wild west. They use their knowledge to enrich themselves or harm their victims. A black hat hacker will break into your bank account and take your money, install a webcam tracking program on your computer or crash your company&#8217;s website.</p>
<p>A special subset of black hat hackers are state-organized hackers. These are usually employees or contractors of the secret services or military who are tasked with cyber attacks on targets outside the territory of the state. Compared to independent hackers, they have a big advantage in that they have access to the best technology or other resources and can thus afford attacks that are unavailable to others. But this topic deserves its own article. So more about that some other time.</p>
<p><strong>A white hat</strong> hacker will also hack into your company&#8217;s website. But there is one significant difference. He will only do it with your permission. That&#8217;s why they&#8217;re also called ethical hackers. Why would you give your consent? Precisely because you want to know if your business is secure against such an attack. If a white hat hacker succeeds in such a penetration, he will do you no harm. On the contrary, you&#8217;ll get a precise description from him of what needs to be fixed so that no one else can get in. And you pay him for it. That&#8217;s called penetration testing. White hat hackers often set up companies to help their customers improve the security of their systems.</p>
<p><strong>Grey Hat hacker</strong> &#8211; often claimed to be something in between. But rarely do you learn what it means to be something in between. Can someone be just a little bit of a thief? It&#8217;s more likely that the line between white hat and black hat is blurry. A hacker may pose as a white hat, but there is a suspicion that he is also using his knowledge and skill unethically. Alternatively, he attacks companies, organisations or even states without their consent or knowledge, but he is motivated (sometimes subjectively) by good reasons. He may be an environmental activist, a human rights campaigner or even a religious fanatic.</p>
<h2>Legal versus ethical</h2>
<p>At the same time, we need to distinguish between legality and ethics. Laws are different in different parts of the world. Here in Europe, for example, there are different rules almost every 500km. What is legal in Prague may be criminal in Vienna. And because the Internet has no borders, it makes it even more complicated for judging. In countries like North Korea, for example, any use of a computer is illegal in most cases. Therefore, it is not possible to judge hackers according to local national law. Especially at a time when nation states are starting to lose their meaning.</p>
<h2>Blind shooters and non-state armies</h2>
<p>There is another group. They are not hackers in the true sense of the word. More like wannabe hackers. They&#8217;re known as &#8220;Script kiddies&#8221;. Today, there are a large number of hacking tools on the Internet that are freely downloadable. And it can be tempting to look like a hacker in front of your buddy. It&#8217;s not difficult to download a program, press the imaginary &#8220;Hack it!&#8221; button. But the attacker usually gets nothing. Because even with these tools, you need to work with purpose and precision. On the other hand, even if he doesn&#8217;t gain anything, he can still do some damage (corrupt the database, delete important files, overwhelm the network, etc.). Therefore, it is important to protect systems even against such amateur attacks.</p>
<p>In the cyber world we can also find non-state organised hacking groups. They are actually small armies of hackers who have a common goal and try to achieve it by joining forces. However, this does not necessarily mean that these groups meet in secret places and carry out their attacks (ethical or unethical) from there. The individual members often do not know each other personally. They may be scattered all over the world, operating under aliases, and all they need to know about each other is their abilities. This ensures, among other things, their physical safety. If a member of the group is discovered, they can&#8217;t reveal anything important about their colleagues.</p>
<h2>I want to become a hacker</h2>
<p>A common question is how one can become a hacker. The answer is not simple and certainly not universal. Hacking is about learning and deepening your knowledge every day. Basically, anyone who is an expert in their field and has the desire to keep improving and delving into every detail can become a hacker. There isn&#8217;t even a clear line where we can say that we (or anyone else) is a hacker. While there are various courses and certifications, even that is not a prerequisite. A certificate doesn&#8217;t necessarily make you a hacker if you don&#8217;t keep doing it, and on the other hand, the lack of one (it costs time and money) doesn&#8217;t mean you&#8217;re not a hacker.</p>
<h2>Well then, how do I open the lock?</h2>
<p>It&#8217;s not hard and after practicing it can go fairly quickly. But this is just a basic technique, it&#8217;s more or less a sport (yes, there are competitions). Professional thieves hardly use it.</p>
<p>See the video for instructions, and <a href="https://www.digitalni-sebeobrana.cz/en/osobni-konzultace/">I&#8217;ll tell you how to defend your digital locks</a> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<div data-mode="normal" data-oembed="1" data-provider="youtube" id="arve-youtube-zj8w-pbnolq" style="max-width:1400px;" class="arve">
<div class="arve-inner">
<div style="aspect-ratio:350/197" class="arve-embed arve-embed--has-aspect-ratio">
<div class="arve-ar" style="padding-top:56.285714%"></div>
<p>			<iframe allow="accelerometer &#039;none&#039;;autoplay &#039;none&#039;;camera &#039;none&#039;;ch-ua &#039;none&#039;;clipboard-read &#039;none&#039;;clipboard-write;display-capture &#039;none&#039;;encrypted-media &#039;none&#039;;gamepad &#039;none&#039;;geolocation &#039;none&#039;;gyroscope &#039;none&#039;;hid &#039;none&#039;;identity-credentials-get &#039;none&#039;;idle-detection &#039;none&#039;;keyboard-map &#039;none&#039;;local-fonts &#039;none&#039;;magnetometer &#039;none&#039;;microphone &#039;none&#039;;midi &#039;none&#039;;payment &#039;none&#039;;picture-in-picture;publickey-credentials-create &#039;none&#039;;publickey-credentials-get &#039;none&#039;;screen-wake-lock &#039;none&#039;;serial &#039;none&#039;;sync-xhr;usb &#039;none&#039;;window-management &#039;none&#039;;xr-spatial-tracking &#039;none&#039;;" allowfullscreen="" class="arve-iframe fitvidsignore" credentialless data-arve="arve-youtube-zj8w-pbnolq" data-lenis-prevent="" data-src-no-ap="https://www.youtube-nocookie.com/embed/zj8W-PbnOlQ?feature=oembed&amp;iv_load_policy=3&amp;modestbranding=1&amp;rel=0&amp;autohide=1&amp;playsinline=0&amp;autoplay=0" frameborder="0" height="788" loading="lazy" name="" referrerpolicy="strict-origin-when-cross-origin" sandbox="allow-scripts allow-same-origin allow-presentation allow-popups allow-popups-to-escape-sandbox" scrolling="no" src="https://www.youtube-nocookie.com/embed/zj8W-PbnOlQ?feature=oembed&#038;iv_load_policy=3&#038;modestbranding=1&#038;rel=0&#038;autohide=1&#038;playsinline=0&#038;autoplay=0" title="" width="1400"></iframe></p></div>
</p></div>
<p>	<script type="application/ld+json">{"@context":"http:\/\/schema.org\/","@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/hackeri-proti-komu-se-branime\/#arve-youtube-zj8w-pbnolq","type":"VideoObject","embedURL":"https:\/\/www.youtube-nocookie.com\/embed\/zj8W-PbnOlQ?feature=oembed&iv_load_policy=3&modestbranding=1&rel=0&autohide=1&playsinline=0&autoplay=0"}</script>
</div>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/hackeri-proti-komu-se-branime/">Hackers &#8211; who are we defending ourselves against?</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Videosérie Digitální Sebeobrany</title>
		<link>https://www.digitalnisebeobrana.cz/en/videokurz-digitalni-sebeobrany/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Mon, 15 Mar 2021 13:29:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[First aid!]]></category>
		<category><![CDATA[nástroje]]></category>
		<category><![CDATA[Rychlé novinky]]></category>
		<category><![CDATA[Techniky hackerů]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[kurz]]></category>
		<category><![CDATA[sebeobrana]]></category>
		<guid isPermaLink="false">https://www.digitalni-sebeobrana.cz/?p=1564</guid>

					<description><![CDATA[<p>Série videí o soukromí a bezpečnosti v digitálním prostoru. Video sérii naleznete na tomto odkazu Jednotlivé díly: Password123! Obrněný účty Zámky, šifry, zálohy Jak funguje šifrování Messengery Phishing 1⧸2 Phishing 2⧸2 VPN Tor a I2P Kryptoměny &#8211; Seed Kryptoměny anonymně Antiviry</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/videokurz-digitalni-sebeobrany/">Videosérie Digitální Sebeobrany</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Série videí o soukromí a bezpečnosti v digitálním prostoru.<span id="more-1564"></span></p>
<p>Video sérii naleznete na tomto <a href="https://odysee.com/@paralelnipolis:6/sodomkidigitlnsebeobranakryptoanarchievpraxidXHLJGO1k0I6VnF3ReVg:a?lid=36799b62a6f3b5017e9972ef38b46ce615825b80" rel="noopener" target="_blank">odkazu</a></p>
<p><strong>Jednotlivé díly:</strong></p>
<p><a aria-label="Sodomák I Digitální Sebeobrana： Password123! by Video content from Paralelni Polis Prague 1 month ago, 21:36" href="https://odysee.com/@paralelnipolis:6/sodomkidigitlnsebeobranapassword123tRV4KkIS6rMzaMLns0eY:4?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák I Digitální Sebeobrana： Password123!" class="truncated-text" style="-webkit-line-clamp: 2;"> Password123!</span></div>
<p></a></p>
<p><a aria-label="Sodomák I Digitální Sebeobrana： Obrněný účty by Video content from Paralelni Polis Prague 1 month ago, 23:34" href="https://odysee.com/@paralelnipolis:6/sodomkidigitlnsebeobranaobrnntys80bsTO8OePkR2sRZUmO:4?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák I Digitální Sebeobrana： Obrněný účty" class="truncated-text" style="-webkit-line-clamp: 2;"> Obrněný účty</span></div>
<p></a></p>
<p><a aria-label="Sodomák I Digitální Sebeobrana： Zámky, šifry, zálohy by Video content from Paralelni Polis Prague 1 month ago, 25:27" href="https://odysee.com/@paralelnipolis:6/sodomkidigitlnsebeobranazmkyifryzlohyf4wgFwiDBWqZmFvXy8LZ:3?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák I Digitální Sebeobrana： Zámky, šifry, zálohy" class="truncated-text" style="-webkit-line-clamp: 2;"> Zámky, šifry, zálohy</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Jak funguje šifrování by Video content from Paralelni Polis Prague 1 month ago, 34:11" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranajakfungujeifrovnfiKxRu3ZPTXA1gm3gZ0D:1?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Jak funguje šifrování" class="truncated-text" style="-webkit-line-clamp: 2;">  Jak funguje šifrování</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Messengery by Video content from Paralelni Polis Prague 1 month ago, 29:58" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranamessengerynCoCLTLsGYUJFs5mIXjv:c?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Messengery" class="truncated-text" style="-webkit-line-clamp: 2;">  Messengery</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Phishing 1⧸2 by Video content from Paralelni Polis Prague 1 month ago, 17:36" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranaphishing12VLBQosL7M2IGIordjIQj:4?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Phishing 1⧸2" class="truncated-text" style="-webkit-line-clamp: 2;">  Phishing 1⧸2</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Phishing 2⧸2 by Video content from Paralelni Polis Prague 1 month ago, 20:10" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranaphishing22FKI7y4dACGhTRLKaowXO:1?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Phishing 2⧸2" class="truncated-text" style="-webkit-line-clamp: 2;">  Phishing 2⧸2</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： VPN by Video content from Paralelni Polis Prague 1 month ago, 27:32" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranavpnV9YTorZ0D2KxRYebjYyr:0?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： VPN" class="truncated-text" style="-webkit-line-clamp: 2;">  VPN</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Tor a I2P by Video content from Paralelni Polis Prague 1 month ago, 28:36" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranatorai2poZXr1opEsngUm5M6oJWy:1?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Tor a I2P" class="truncated-text" style="-webkit-line-clamp: 2;">  Tor a I2P</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Kryptoměny - Seed by Video content from Paralelni Polis Prague 1 month ago, 24:04" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranakryptomny-seedVXAivOINIqnUJlBVjyfm:7?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Kryptoměny - Seed" class="truncated-text" style="-webkit-line-clamp: 2;">  Kryptoměny &#8211; Seed</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Kryptoměny anonymně by Video content from Paralelni Polis Prague 1 month ago, 25:25" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranakryptomnyanonymnZlzAkfN1Fu0Px0pItL1G:5?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Kryptoměny anonymně" class="truncated-text" style="-webkit-line-clamp: 2;">  Kryptoměny anonymně</span></div>
<p></a></p>
<p><a aria-label="Sodomák ｜ Digitální Sebeobrana： Antiviry by Video content from Paralelni Polis Prague 1 month ago, 10:55" href="https://odysee.com/@paralelnipolis:6/sodomkdigitlnsebeobranaantivirylkVs9qfeFQBqWDau0RaZ:4?lid=36799b62a6f3b5017e9972ef38b46ce615825b80"></p>
<div class="claim-preview__title"><span title="Sodomák ｜ Digitální Sebeobrana： Antiviry" class="truncated-text" style="-webkit-line-clamp: 2;">  Antiviry</span></div>
<p></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/videokurz-digitalni-sebeobrany/">Videosérie Digitální Sebeobrany</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Killswitch pro Linux</title>
		<link>https://www.digitalnisebeobrana.cz/en/killswitch-pro-linux/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Sun, 31 Jan 2021 17:27:14 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nástroje]]></category>
		<category><![CDATA[killswitch]]></category>
		<category><![CDATA[skript]]></category>
		<guid isPermaLink="false">https://www.digitalni-sebeobrana.cz/?p=1531</guid>

					<description><![CDATA[<p>Občas se může hodit možnost rychle vypnout počítač. Zde jsou dva příklady, jak to udělat. Klávesová zkratka V textovém editoru vytvoříme skript, který zavolá okamžité vypnutí počítače. Pro otestování prozatím zakomentujeme příkaz pro vypnutí a vložíme kód pro zapsání textu do souboru killswitch.sh: #!/bin/bash t=$(date); echo $t &#62; /home/ross/tools/killswitch/test; #sudo poweroff -f Pomocí příkazu chmod &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/killswitch-pro-linux/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">Killswitch pro Linux</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/killswitch-pro-linux/">Killswitch pro Linux</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Občas se může hodit možnost rychle vypnout počítač. Zde jsou dva příklady, jak to udělat.</p>
<p><span id="more-1531"></span></p>
<h2>Klávesová zkratka</h2>
<ol>
<li>V textovém editoru vytvoříme skript, který zavolá okamžité vypnutí počítače. Pro otestování prozatím zakomentujeme příkaz pro vypnutí a vložíme kód pro zapsání textu do souboru <code>killswitch.sh</code>:<br />
<code>#!/bin/bash<br />
t=$(date);<br />
echo $t &gt; /home/ross/tools/killswitch/test;<br />
#sudo poweroff -f<br />
</code></li>
<li>Pomocí příkazu chmod nastavíme právo pro spuštění:<br />
<code>$ chmod +x ./killswitch.sh</code></li>
<li>Zkontrolujeme práva:<br />
<code>$ ls -al<br />
total 12</code><br />
<code>drwx------ 2 ross ross 4096 31. led 16.23 .</code><br />
<code>drwx------ 5 ross ross 4096 26. led 15.35 ..</code><br />
<code>-rwx------ 1 ross ross 100 31. led 16.17 killswitch.sh<br />
</code></li>
<li>Nast<a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/01/gnome-shell-screenshot-BZ0TX0.png"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-1533" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2021/01/gnome-shell-screenshot-BZ0TX0-300x203.png" alt="" width="300" height="203" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/01/gnome-shell-screenshot-BZ0TX0-300x203.png 300w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/01/gnome-shell-screenshot-BZ0TX0-500x338.png 500w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2021/01/gnome-shell-screenshot-BZ0TX0.png 522w" sizes="(max-width: 300px) 100vw, 300px" /></a>avíme klávesovou zkratku, která zavolá náš skript. Toto se může lišit podle prostředí. Toto je příklad pro Gnome: Settings -&gt; Keyboard Shortcuts -&gt; + (úplně dole)
<ol style="list-style-type: upper-roman;">
<li>Name: cokoliv</li>
<li>Command: Cesta k našemu skriptu</li>
<li>Shortcut: po kliknutí stiskněte požadovanou klávesovou zkratku</li>
<li>Klikněte na &#8220;Add&#8221;</li>
</ol>
</li>
<li>Test: stiskněte vybranou klávesovou zkratku. Nově vytvořený soubor test by měl obsahovat aktuální čas. Pokud ne, něco je špatně:)</li>
<li>Upravíme skript pro &#8220;ostrý provoz&#8221;:<br />
<code>#!/bin/bash</code><br />
<code>#t=$(date;echo $USER);</code><br />
<code>#echo $t &gt; /home/ross/tools/killswitch/test;</code><br />
<code>sudo poweroff -f</code></li>
<li>Pro zavolání příkazu <code>sudo poweroff -f</code> jsou potřeba administrátorská práva. To můžeme obejít vložením nasledujícího řádku do souboru <code>/etc/sudoers</code>:<br />
<code>ross ALL = NOPASSWD: /sbin/poweroff</code><br />
<em>(<code>poweroff -f</code> zabrání vyskakování potvrzovacích oken a vypne počítač okamžitě)</em></li>
<li>Uložíme rozdělanou práci a otestujeme klávesovou zkratku.</li>
</ol>
<hr />
<p>&nbsp;</p>
<h2> Vypnutí po odpojení USB zařízení</h2>
<ol>
<li>Připojíme do USB portu zařízení, které chceme použít jako náš killswitch.</li>
<li>Spustíme monitoring připojení zařízení:<br />
<code>$ udevadm monitor --property</code></li>
<li>USB zařízení odpojíme z počítače, v terminalu by se měl zobrazit výpis podobný tomuto:<br />
<code>(...)</code><br />
<code>UDEV [18888.225725] remove /devices/pci0000:00/0000:00:14.0/usb1/1-2 (usb)</code><br />
<code>ACTION=remove</code><br />
<code>DEVPATH=/devices/pci0000:00/0000:00:14.0/usb1/1-2</code><br />
<code>SUBSYSTEM=usb</code><br />
<code>DEVNAME=/dev/bus/usb/001/038</code><br />
<code>DEVTYPE=usb_device</code><br />
<code>PRODUCT=<strong>950/6535/110</strong></code><br />
<code>TYPE=0/0/0</code><br />
<code>BUSNUM=001</code><br />
<code>(...)</code></li>
<li>V textovém editoru vytvoříme pravidlo pro zařízení (jako root):<br />
<code>$ sudo vim /etc/udev/rules.d/85-my_killswitch_rule.rules</code></li>
<li>Do souboru vložíme následující řádek:<br />
<code>ACTION=="remove", ENV{PRODUCT}=="<strong>950/6535/110</strong>", RUN+="/root/killswitch.sh"</code><em>(obsah proměnné <code>ENV{PRODUCT}</code> zkopírujeme z výpisu příkazu <code>udevadm monitor --property</code>)</em></li>
<li>Aktualizujeme pravidla (root):<code>$ sudo udevadm control --reload-rules</code></li>
<li>Jako root vytvoříme v textovém editoru skript <code>/root/killswitch.sh</code> s tímto obsahem:<br />
<code>#!/bin/sh<br />
t=$(date);<br />
echo $t &gt; /root/test </code><br />
<code>#shutdown now</code><br />
(<strong>pozor, skript bude se spouštět pod uživatelem root</strong>! Pokud by se někdo dostal k tomuto skriptu, mohl by ho upravit a získat administrátorská práva. Proto musí být pro &#8220;běžného&#8221; uživatele nedostupný pro zápis.)<code></code></li>
<li>Přidáme atribut pro  spuštění<br />
<code># chmod +x /root/killswitch.sh</code></li>
<li>Otestujeme.</li>
<li>Ve skriptu odkomentujeme poslední řadek (vymazáním #).</li>
<li>Připraveno k ostrému testu.</li>
</ol>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/killswitch-pro-linux/">Killswitch pro Linux</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>8 tips for a digitally safer holiday</title>
		<link>https://www.digitalnisebeobrana.cz/en/8-tipu-pro-digitalne-bezpecnejsi-dovolenou/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 11:08:41 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[First aid!]]></category>
		<category><![CDATA[nástroje]]></category>
		<category><![CDATA[cestování]]></category>
		<category><![CDATA[dovolena]]></category>
		<category><![CDATA[hackeři]]></category>
		<category><![CDATA[hesla]]></category>
		<category><![CDATA[krádež]]></category>
		<category><![CDATA[notebook]]></category>
		<category><![CDATA[telefon]]></category>
		<category><![CDATA[wifi]]></category>
		<category><![CDATA[ztráta]]></category>
		<guid isPermaLink="false">https://www.digitalni-sebeobrana.cz/?p=1522</guid>

					<description><![CDATA[<p>The holiday season can be risky, not only because of potential injuries during sporting activities, but also for your digital devices. We lose our phones or laptops more often than ever on holiday. Whether we forget them on the train, at the beach or at a party, or they are simply stolen. Not only that, &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/8-tipu-pro-digitalne-bezpecnejsi-dovolenou/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">8 tips for a digitally safer holiday</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/8-tipu-pro-digitalne-bezpecnejsi-dovolenou/">8 tips for a digitally safer holiday</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The holiday season can be risky, not only because of potential injuries during sporting activities, but also for your digital devices. We lose our phones or laptops more often than ever on holiday. Whether we forget them on the train, at the beach or at a party, or they are simply stolen. Not only that, there&#8217;s also the risk of some of your information falling into the wrong hands.<br />
Here are some tips to reduce this risk.</p>
<p><span id="more-1522"></span></p>
<ol>
<li>
<h2>Set up automatic locking</h2>
</li>
<p>Never leave your phone or laptop unlocked in a public place, such as a restaurant (café, bar) on a table.<br />
Set your phone to automatically lock after a short enough time. 1 minute should be enough to keep it from taking too long, and on the other hand, it shouldn&#8217;t reduce your comfort of use too much.<br />
<a href="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2020/07/external-content.duckduckgo.com_.jpg"><img loading="lazy" decoding="async" src="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2020/07/external-content.duckduckgo.com_-300x115.jpg" alt="Win+L" width="300" height="115" class="alignright size-medium wp-image-1524" srcset="https://www.digitalnisebeobrana.cz/wp-content/uploads/2020/07/external-content.duckduckgo.com_-300x115.jpg 300w, https://www.digitalnisebeobrana.cz/wp-content/uploads/2020/07/external-content.duckduckgo.com_.jpg 474w" sizes="(max-width: 300px) 100vw, 300px" /></a>Learn to lock your laptop every time you walk away from it. Maybe just when you get up from your desk in a café to get sugar. In Windows (and most Linux distributions), you can use the <em>Win + L</em> keyboard shortcut to do this. On a MacBook, the <em>Command+Control+Q</em> key combination should work the same way.</p>
<li>
<h2>A good password or PIN is essential</h2>
</li>
<p>Use a <a href="https://www.digitalni-sebeobrana.cz/za-jak-dlouho-hacker-prolomi-vase-heslo/">long enough</a> and unique password or PIN to unlock your phone or laptop. Avoid &#8220;stale&#8221; passwords such as &#8220;password&#8221; or &#8220;iloveyou&#8221;. Similarly, a PIN of &#8220;0000&#8221; or &#8220;1234&#8221; is not a good idea.<br />
Unlocking your phone using a gesture (connecting dots on the screen) can be risky, as your fingers will leave a mark on the screen.</p>
<p><em>Tip: Use passwords in Czech (Slovak).</em></p>
<li>Em key in the keyboard (see below).<br />
<h2>Watch out for public Wi-Fi networks</h2>
</li>
<p>You know, you arrive in a non-EU country and need to read an email, post a photo on Instagram or find accommodation. And you don&#8217;t feel like paying for data roaming. So right at the airport, you find the nearest public (and free) Wi-Fi network and connect.<br />
And you know what? Hackers know that people do this at airports. And it&#8217;s no problem for them to run such a Wi-Fi network called, for example, &#8220;Airport Free Internet&#8221; from their device. And then just wait to see who connects and start mining the data.<br />
The same goes for restaurants or cafes. That&#8217;s why it&#8217;s better to pay extra for roaming. And if that&#8217;s really not possible for whatever reason, at least use a <a href="https://www.digitalni-sebeobrana.cz/vpn-ochrana-vasi-komunikace-a-spasa-pro-evropsky-internet/">VPN</a>. This will encrypt your data so that an attacker can&#8217;t read it.</p>
<li>
<h2>Don&#8217;t tell the world your apartment or house is empty</h2>
</li>
<p>The urge to boast to your friends that you&#8217;re enjoying your vacation is hard to resist, but try to hold on. A photo from Bibione or Mt. Blanc can be a great tip-off to a burglar, who will know that he won&#8217;t be disturbed during a break-in.<br />
You can also upload photos to Instagram or Facebook when you return. Plus, you&#8217;re likely to enjoy your vacation a lot more without social media.</p>
<p><em>Tip: Be offline, it&#8217;s fine <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></em></p>
<li>
<h2>Probably with photos of the kids</h2>
</li>
<p>Photos of your kids from the beach that you share on social media may appear on sites where paedophiles congregate, it&#8217;s a big draw for them. If you want to share these photos with family or friends, send them via email or better still some messenger (ideally via <a href="https://www.signal.org">Signal Messenger</a>).</p>
<li>
<h2>Turn off disk encryption</h2>
</li>
<p>If you lose your laptop while on vacation, it&#8217;s definitely better if the data on the drive isn&#8217;t readable by someone who could misuse it.<br />
On Windows, BitLocker does this, on Apple devices FileVault does it, and on Linux, LUKS does it. Alternatively, you can use the open source software <a href="https://www.veracrypt.fr">VeraCrypt</a>.</p>
<li>
<h2>Letter controls and erotica</h2>
</li>
<p>In some countries, customs officials may ask you for passwords to your devices or social media accounts. If you&#8217;re travelling to such a country, be wary of what you have stored on your device. There are countries where, for example, stored erotic content can get you into trouble.<br />
Many people use a different (&#8220;clean&#8221;) laptop and phone when travelling to these countries.</p>
<li>
<h2>Backup before your holiday</h2>
</li>
</ol>
<p>If you lose your device while on holiday, a backup of your files or contacts will definitely come in handy. Don&#8217;t underestimate it.</p>
<p>In the event that your phone or laptop is indeed lost or stolen, <a href="https://www.digitalni-sebeobrana.cz/en/ztraceny-nebo-ukradeny-telefon-pocitac/">here</a> are some tips on what to do to minimize the damage.</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/8-tipu-pro-digitalne-bezpecnejsi-dovolenou/">8 tips for a digitally safer holiday</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lost or stolen phone/computer</title>
		<link>https://www.digitalnisebeobrana.cz/en/ztraceny-nebo-ukradeny-telefon-pocitac/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Sun, 23 Jun 2019 08:59:29 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[First aid!]]></category>
		<category><![CDATA[nástroje]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[audio]]></category>
		<category><![CDATA[cestování]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[krádež]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[notebook]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[telefon]]></category>
		<category><![CDATA[ztráta]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1492</guid>

					<description><![CDATA[<p>The vast majority of our devices are now portable. In the past, we used computers and telephones that we had at home or in the office and that never left these spaces. Today everything is different. We carry laptops from place to place, go with them on business trips and on holiday. Obviously, it&#8217;s absolutely &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/ztraceny-nebo-ukradeny-telefon-pocitac/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">Lost or stolen phone/computer</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/ztraceny-nebo-ukradeny-telefon-pocitac/">Lost or stolen phone/computer</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The vast majority of our devices are now portable. In the past, we used computers and telephones that we had at home or in the office and that never left these spaces. Today everything is different. We carry laptops from place to place, go with them on business trips and on holiday. Obviously, it&#8217;s absolutely true about phones.</p>
<p>This increases the risk of losing or stealing these devices. And because the person who has just found out that he has lost his device often panicking (it&#8217;s a very stressful situation) and in the first moments is unable to calmly realize what needs to be done, it is good to have these steps ready.</p>
<p>Here is the checklist<span id="more-1492"></span> of steps that should follow after losing or stealing your phone or laptop. You can <a href="https://www.zaskolit.cz/wp-content/uploads/2019/06/lost_device_en.pdf">download it here (pdf)</a>, print it and check steps out.</p>
<ol>
<li><span style="font-family: Helvetica, sans-serif;">Find location</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">Android: </span><a href="https://android.com/find" target="_blank" rel="noopener noreferrer"><span style="font-family: Helvetica, sans-serif;">android.com/find</span></a></li>
<li><span style="font-family: Helvetica, sans-serif;">iPhone: </span><a href="https://icloud.com/find"><span style="font-family: Helvetica, sans-serif;">icloud.com/find</span></a></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Try to send sms to your phone</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">If messages appear on the display, you can give a message to a potential finder</span></li>
<li><span style="font-family: Helvetica, sans-serif;">iPhone: </span><a href="http://support.apple.com/kb/PH2700"><span style="font-family: Helvetica, sans-serif;">Lost Mode</span></a></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Contact IT</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">It is necessary to block access to internal systems of the company or organization for accounts</span></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Remote backup</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">If your phone has a remote backup application, back up now.</span></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Lock and wipe</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">Android: </span><span style="font-family: Helvetica, sans-serif;">At</span><span style="font-family: Helvetica, sans-serif;"> <a href="https://android.com/find" target="_blank" rel="noopener noreferrer">android.com/find</a> </span><span style="font-family: Helvetica, sans-serif;">a</span><span style="font-family: Helvetica, sans-serif;">ctivate lock and </span><span style="font-family: Helvetica, sans-serif;">erase</span><span style="font-family: Helvetica, sans-serif;"> features</span></li>
<li><span style="font-family: Helvetica, sans-serif;">iPhone: </span><span style="font-family: Helvetica, sans-serif;">At</span><span style="font-family: Helvetica, sans-serif;"> <a href="https://icloud.com/find">icloud.com/find</a> select your device and </span><span style="font-family: Helvetica, sans-serif;">wipe it.</span></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Sign out of accounts</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">From another device, log in to your accounts where you are signed in lost device and log off those accounts on the lost device </span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;"><a href="https://www.facebook.com/settings?tab=security&#038;section=sessions&#038;view">Facebook</a>, </span><span style="font-family: Helvetica, sans-serif;"><a href="https://twitter.com/settings/sessions">Twitter</a>, <a href="https://myaccount.google.com/device-activity?utm_source=google-account&#038;utm_medium=web">Gmail</a>, <a href="https://www.alza.cz/muj-ucet/profil/prihlasena-zarizeni">Alza</a> </span><span style="font-family: Helvetica, sans-serif;">etc</span><span style="font-family: Helvetica, sans-serif;">.</span></li>
<li><span style="font-family: Helvetica, sans-serif;">Ask others to temporarily remove you from conversation groups (e.g., Signal, Telegram, Threema, Whatsapp, Slack, etc.) where sensitive information may occur (yours or others).</span></li>
</ul>
</li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Change passwords on accounts that were logged on a lost device</span></li>
<li><span style="font-family: Helvetica, sans-serif;">Send your cryptocurrencies to the new address</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">If you have a wallet backup, restore it, create a new one, and forward there your cryptocurrencies </span></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Contact your phone operator to lock SIM card</span></li>
<li><span style="font-family: Helvetica, sans-serif;">Block payment cards stored in device applications</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">Your credit cards may be stored in some apps or websites</span></li>
</ul>
</li>
<li><span style="font-family: Helvetica, sans-serif;">Notify friends and/or customers</span>
<ul>
<li><span style="font-family: Helvetica, sans-serif;">Your accounts may be misused for phishing attacks, tell your friends about this possibility</span></li>
</ul>
</li>
</ol>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/ztraceny-nebo-ukradeny-telefon-pocitac/">Lost or stolen phone/computer</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.digitalni-sebeobrana.cz/wp-content/uploads/2019/06/01.mp3" length="4518460" type="audio/mpeg" />

			</item>
		<item>
		<title>0-day vulnerability in WhatsApp</title>
		<link>https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Wed, 15 May 2019 12:49:02 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Rychlé novinky]]></category>
		<category><![CDATA[Techniky hackerů]]></category>
		<category><![CDATA[0-day]]></category>
		<category><![CDATA[šifrování]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1478</guid>

					<description><![CDATA[<p>WhatsApp (owned by Facebook) has released an update that patches the vulnerability that allowed attackers to install malicious software. While WhatsApp is end-to-end encrypted, an attacker could access messages by infecting an end device (phone) on which messages are normally visible. In addition, an attacker did not have to rely on a faulty user step &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">0-day vulnerability in WhatsApp</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/">0-day vulnerability in WhatsApp</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>WhatsApp (owned by Facebook) has released an update that patches the vulnerability that allowed attackers to install malicious software.<span id="more-1478"></span></p>
<p>While WhatsApp is <a href="https://www.zaskolit.cz/en/sifrovani-zprav-demo/">end-to-end encrypted</a>, an attacker could access messages by infecting an end device (phone) on which messages are normally visible.</p>
<h4>In addition, an attacker did not have to rely on a faulty user step (such as clicking a link or opening an attachment), the software installation took place after an attacker start WhatsApp call. The user did not even have to accept the call, the malicious code already contained that call.<br />
The call record could then be erased so that the user would not normally be able to determine whether he / she had been the victim of such an attack.<br />
As mentioned above, the bug is already fixed, so it is highly recommended to upgrade to the latest version of WhatsApp.<br />
Or just go to a safer <a href="https://www.signal.org">Signal Messenger</a> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>
<h4></h4>
<h4>Vulnerable Versions:</h4>
<p><strong>Android</strong>: v2.19.134 and lower, WhatsApp Bussines v2.19.44 and lower<br />
<strong>iOS</strong>: v2.19.51 and lower, WhatsApp Business v2.19.51 and lower<br />
<strong>Windows Phone</strong>: v2.18.348 and lower<br />
<strong>Tizen</strong>: v2.18.15 and lower</p>
<h4>How to update WhatsApp?</h4>
<p><strong>Android</strong>:</p>
<ul>
<li>Open Google PlayOpen the menu in the upper left menu</li>
<li>Open My Apps and Games</li>
<li>If WhatsApp was not automatically updated, the &#8220;Update&#8221; button is available. Otherwise, the update menu is missing, only the button to open is used instead.</li>
</ul>
<p><strong>iOS</strong>:</p>
<ul>
<li>Open the App Store</li>
<li>Click &#8220;Update&#8221; at the bottom of the display</li>
<li>If WhatsApp was not automatically updated, the &#8220;Update&#8221; button is available. Otherwise, the update menu is missing, only the button to open is used instead</li>
</ul>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/">0-day vulnerability in WhatsApp</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cookies &#8211; otestujte se</title>
		<link>https://www.digitalnisebeobrana.cz/en/cookies-otestujte-se/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Mon, 13 May 2019 12:44:51 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cookies]]></category>
		<category><![CDATA[kvíz]]></category>
		<category><![CDATA[test]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1474</guid>

					<description><![CDATA[<p>The post <a href="https://www.digitalnisebeobrana.cz/en/cookies-otestujte-se/">Cookies &#8211; otestujte se</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="h5p-iframe-wrapper"><iframe id="h5p-iframe-1" class="h5p-iframe" data-content-id="1" style="height:1px" src="about:blank" frameBorder="0" scrolling="no" title="Cookies - test"></iframe></div>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/cookies-otestujte-se/">Cookies &#8211; otestujte se</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
