Daily Archives: March 14, 2020

Ethereal crypto conference goes virtual in light of coronavirus – Decrypt

Posted: March 14, 2020 at 9:48 am

Ethereum-focused event Ethereal will be hosted virtually, as a result of the coronavirus. Ethereal is an annual event run by production studio ConsenSys, which funds an editorially independent Decrypt.

In a statement, ConsenSys said, "Weve decided to postpone the Ethereal Summit New York in-person event to the fall of 2020. In the meantime, weve already gone to work reimagining Ethereal NY as the first-ever Ethereal Virtual Summit 2020, which will take place on May 7-8."

Ethereal will now be held virtually. Image: Ethereal.

As a virtual event, people will be able to watch talks and interact with other attendees from their own homes. The talks will be available in virtual reality, so those with virtual reality headsets will be able to explore the digital venue.

This year's event will feature Taylor Monahan, founder of MyCrypto, and Robert Leshner, founder of Compounda crypto lending platform.

Despite the setback, ConsenSys is hoping that the virtual event will be available to more people.

"While were disappointed we wont be able to host an in person gathering in May, were excited that well be able to offer access to the Ethereal Virtual Summit 2020 to a wider array of individuals who might have been previously unable to attend because of cost or travel."

Many other crypto events have been canceled or delayed including Paris Blockchain Week, which was scheduled for later this month. Many crypto events in Asia, including NiTROn2020 in Seoul, Hong Kong Blockchain Week 2020 and Token2049 were postponed last month.

Top stories, original features, rewards & more.

Get the best of Decrypt where you want it most.

Originally posted here:

Ethereal crypto conference goes virtual in light of coronavirus - Decrypt

Posted in Virtual Reality | Comments Off on Ethereal crypto conference goes virtual in light of coronavirus – Decrypt

New iPhone to be Released This Year to Have a Rear-Facing 3D Camera – Virtual Reality Times

Posted: at 9:48 am

One of the iPhones set to be released this year will have some impressive augmented reality capability according to a report by Fast Company.

According to the report, one of the upcoming Apple iPhones will be fitted with a 3D depth camera attached on its back. This world-facing 3D scanner will offer users better augmented reality experiences. The feature has been rumored for years and this must be the year it finally comes to fruition. The Fast Company report quotes Apple-related sources.

The rear-facing camera will be a laser, sensor and a software system and it will work on the time-of-flight principle. A time-of-flight sensor sends out a light pulse and then measures the time it takes for the pulse to reach the object and travel back to the camera sensor. Using the principle, the camera is able to measure the rooms and objects in 3D.

The detailed and accurate depth information captured by the time-of-flight camera allows for the creation of new photo as well as video effects. It also provides much improved AR experiences.

Apple has been working on a rear-facing (world-facing) 3D camera for two years now and rumors had been rife that it would be installed on some of the previous iPhone launches. For close to two years, it was one of the features on the shortlist of tech analysts as next in line to be added to the iPhones. This has not materialized, however. From these reports, the feature is in the design and we will see it later in the year if COVID-19 outbreak doesnt interfere with Apples production schedules and launch plans.

Apple is purchasing the laser needed for the working of the new 3D time-of-flight camera from Lumentum, which is based in San Jose. This is the same company supplying the laser used in iPhones front-facing 3D cameras.

Some manufacturers have already incorporated rear-facing depth cameras into their smartphones. Samsungs Galaxy S20+, Galaxy S20 Ultra and the Galaxy Note 10+ already have the 3D depth cameras. So do a constellation of other Android-based smartphones. It is hoped that Apple will bring out new novel ways of leveraging the time-of-flight camera technology to enable new user experiences. Going by past experience, Apple is also more likely to be showy in how it brands and markets the 3D camera/AR experiences.

iPhones already have the front-facing depth cameras (TrueDepth). These are mainly used in FaceID security feature as well as in some of Apples fun messaging effects like Animoji.

Last year, Apple launched the iPhone 11 Pro and the iPhone 11 Pro Max which feature three camera lenses on the back: a 12-megapixel wide angle camera, a 12-megapixel 2X telephoto lens as well as a 12-megapixel ultra-wide-angle lens. All these three lenses give end users a breadth of photo-taking options but the 3D depth camera would provide depth information thereby taking it a notch higher.

The main depth effect that is currently available in the iPhone is its Portrait mode. This provides the photos with a bokeh effect. This blurs the background layer and positions the foreground subject in a sharp focus.

The 3D depth camera will add the depth data that allows for the creation of better-looking bokeh effect and makes it easier to more accurately distinguish the foreground from the background layers. It also adds additional depth layers that blur or focus. This functionality could make it possible to in the future adjust the layers of photos that are blurry and the ones that are now focused after editing mode.

3D mapping could also be used together with the photo software features of the iPhone. The 3D depth camera will have the biggest impact on the quality of the AR apps. Apples ARKit framework for building Augmented Reality apps was released three years ago although it is yet to pick up with consumers. The depth information enabled by the 3D sensing allows for greater accuracy in the functionality of the apps as they are able to more precisely place objects in space. This is likely to result in very powerful app functionality.

Apple is also building an Augmented Reality app for iOS 14 that will make it possible for users to point their smartphones at items in Apple Stores and Starbucks and they will subsequently see digital information about the items displayed around those items via the phone screen.

The rear-facing 3D cameras also allow users to create content that is easily shareable on social media. The phones camera and software can, for example, be used to share images of one interacting with holographic projections of celebrities or even animals. This is not so different from the functionality of the Holo app developed by 8i. With depth data, however, it can deliver much improved experiences. For instance, with depth sensing, it could show the feet of the hologram relative to the tabletop, in a very convincing way.

The 3D camera technology in Samsung phones powers AR features such as Live Focus that enables the user to blur out backgrounds in still images and videos thereby placing an emphasis on the image in the foreground. There is also the Quick Measure feature that can be used in approximating the dimensions, area and volume in the camera frame. Apples depth sensing camera feature may follow a similar path by highlighting features that can be activated by the rear-facing 3D camera.

AR on smartphones unlocks lots of opportunities but there is always the limitation of awkwardly viewing the AR effects via a smartphone screen held in front of the users face. The better AR experience would be via normal-looking AR glasses or headsets which Apple is reportedly silently working on. In the future, this might be Apples primary spatial computing device.

Continued here:

New iPhone to be Released This Year to Have a Rear-Facing 3D Camera - Virtual Reality Times

Posted in Virtual Reality | Comments Off on New iPhone to be Released This Year to Have a Rear-Facing 3D Camera – Virtual Reality Times

Tor team warns of Tor Browser bug that runs JavaScript on sites it shouldn’t – ZDNet

Posted: at 9:48 am

Image: Tor Project

The Tor Project warned users yesterday about a major bug in its browser that may execute JavaScript code on sites that users have specifically blocked JavaScript from running.

Tor developers said they are working on a fix; however, they did not provide a timeline for a patch.

The ability to block JavaScript code execution is a crucial security feature of the Tor Browser Bundle (TBB), a browser with enhanced privacy-preserving features that also masks real IP addresses (locations) to keep users anonymous online.

Because of these features, the browser is often used by journalists, political activities, and dissidents in oppressive countries, as a way to skirt firewalls and online censorship.

In the past, there have been exploits that used JavaScript code to unmask a Tor Browser user's real IP address. Some have been used to target and unmask criminal activities [1, 2], while others were used in mysterious circumstances [1, 2].

Yesterday, the Tor team said they found a bug in TBB's security options. When the browser was configured to use the highest security level (called "Safest"), it still allowed JavaScript code to execute, even if it should have blocked it.

"We are aware of a bug that allows JavaScript execution on the Safest security level (in some situations)," the Tor team said.

"We are working on a fix for this. If you require that JavaScript is blocked, then you may completely disable it."

To completely disable JavaScript execution in the Tor Browser, the Tor team provided the following instructions:

See original here:
Tor team warns of Tor Browser bug that runs JavaScript on sites it shouldn't - ZDNet

Posted in Tor Browser | Comments Off on Tor team warns of Tor Browser bug that runs JavaScript on sites it shouldn’t – ZDNet

Tails 4.4 has been released with new Tor Browser version – Neowin

Posted: at 9:47 am

The Tails OS project has announced the availability of Tails 4.4. The new update doesnt bring any groundbreaking changes but it does fix many security vulnerabilities that were detected since the last update. Some of the main packages to be updated are Tor Browser (9.0.6), Thunderbird (68.5.0), and the Linux kernel (5.4.19). According to the release notes, users are advised to upgrade as soon as possible.

In the past, in-place updates on Tails have been a bit hit-and-miss and users have sometimes been forced to perform a manual upgrade; this time around, those running Tails 4.2, 4.2.2, and 4.3 to 4.4 will be able to perform an automatic upgrade. As soon as you connect to the internet you should be notified that an update is available and be given the option to execute it.

With the new Linux kernel update, newer hardware will be supported. Additionally, an issue has been fixed which prevented those with Realtek RTL8822BE and RTL8822CE chipsets from connecting to the Wi-Fi. The project has requested feedback from users who have experienced Wi-Fi connection issues since Tails 4.1, itd like to know if your issues are now resolved, you can get in touch here.

Tails and the Tor Browser are usually updated a day after Mozilla updates its Firefox web browser, therefore, Tails 4.5s release is already pencilled in for April 7. If youd like to learn more about where the project is headed in the long-term, check out its roadmap.

Link:
Tails 4.4 has been released with new Tor Browser version - Neowin

Posted in Tor Browser | Comments Off on Tails 4.4 has been released with new Tor Browser version – Neowin

The Tor team reports a Tor browser error that runs JavaScript in places that it should not – Mash Viral

Posted: at 9:47 am

Image: Project Tor

The Tor project yesterday warned users about a major browser bug that could execute JavaScript on sites that were specifically blocked by users from running JavaScript.

Tor developers said they are working on a solution; however, they did not provide a timeline for a patch.

The ability to block JavaScript execution is a crucial security feature of the Tor Bundle Bundle (TBB), a browser with improved privacy protection features that also masks actual IP addresses (locations) to keep users anonymous. line.

Because of these features, the browser is often used by journalists, political activities and dissidents in oppressive countries, as a way to protect firewalls and online censorship.

In the past, there have been efforts that used JavaScript to mask the actual IP address of a Tor browser user. Some have been used to target and unmask criminal activities (1, 2), while others have been used in mysterious circumstances (1, 2).

Yesterday, Tors team said they found an error in TBBs security options. When the browser was configured to use the highest level of security (called safest), it still allowed JavaScript to run, even if it should have been blocked.

Image: ZDNet

We are aware of a bug that allows JavaScript to be run at the most secure level (in some situations), said Tors team.

We are working to fix this. If you need JavaScript to be blocked, you may need to disable it completely.

To completely disable JavaScript in the Tor browser, the Tor team provided the following instructions:

Link:
The Tor team reports a Tor browser error that runs JavaScript in places that it should not - Mash Viral

Posted in Tor Browser | Comments Off on The Tor team reports a Tor browser error that runs JavaScript in places that it should not – Mash Viral

Want to browse the web privately? Heres how to do it for real – Yahoo Tech

Posted: at 9:47 am

When it comes to browsing the Web without leaving a trail, there is a lot of noise out there. Advice varies from getting a VPN to disabling cookies, to utilizing the Private Browsing mode within the browser of your choice. But which of these tools actually work? And how do they work? The truth is, different tools prevent different kinds of tracking.

There are other methods, but these are the main tracking tools as of this writing. Knowing which privacy tools to use depends on which of these things youre concerned about. Lets go through all the different tools you can use to browse the Web privately, and go over what they do and dont do to protect your privacy.

What itdoes: Opens a new browser session that isnt signed into any accounts and doesntutilizecookies. Activity in private browsing mode is also not added to your browser history.

What itdoesnt do: Stop sites from tracking your IP address.

Your Web browser keeps track of every site you visit, and stores a complete list of those sites in your browser history. This can be a very useful tool for finding back websites youve visited, and its also used to populate the auto-suggestions you see every time you start typing a URL.

private-browsing-incognito

Sometimes, however, you might want to browse the Web without your browser keeping track of all your activities. Thats where Private Browsing comes in.

This feature has different names on different browsers on Chrome, its called Incognito Mode, on Internet Explorer, its called InPrivate but acts basically the same on all of them. A new browser window opens, and none of your activity in that window is added to your browser history. Any accounts youre signed into in your other browser windows are not signed into in the Private Browsing window, meaning you cant be tracked as a user of those sites. And your cookies are not visible while using Private Browsing, meaning sites cannot track you this way.

private-browsing-firefox

So, Private Browsing mode does quite a few things if you want to quickly browse the Web without being tracked by your accounts or by cookies. However, it does not obscure your IP address. Any site you visit can still keep a record of your IP address, which could, in turn, be used to identify you.

Story continues

What itdoes: Kindly asks sites if they will not track you.

What it doesnt do: Actually stop sites from tracking you.

Dig through your browsers settings and youll find the option to turn on something called Do Not Track. You might think that turning this on will prevent sites from tracking you entirely, but sadly, thats not the case.Do Not Track is something thats a great idea in theory, but one that hasnt worked well in practice.

The idea was to give browsers an optional setting where users could state that theyre not comfortable being tracked. Sites would agree not to track such users, giving users just a bit more control over their information.

Unfortunately, the list of sites that respect Do Not Trackis laughably small. Turning this feature on doesnt hurt in terms of hiding your identity, but it also wont help much.

ghostery-tracking-block

There are alternatives to Do Not Track that actually block trackers, the most famous of which areGhosteryandPrivacy Badger. These are browser extensions that show you which services are tracking your Web traffic on any given page, and give you the power to block trackers at will.

What theydo: Obscure your IP address and encrypt your traffic.

What they dont (necessarily) do: Stop your traffic from being logged by the VPN itself, or by any sites youre signed into. Stop you from being tracked by cookies, user accounts, or your user agent string.

You cant use the Web without an IP address, as sites would not know where to send the information you request, thus breaking your Internet connection. That said,you can obscure your IP address using a VPN service. AVPN, or Virtual Private Network, routes all of your Internet through another computer. This means that, so far as the sites you visit are concerned, your IP is that of your VPN. Because thousands of other VPN users are also using the same IP address, anyone trying to trace your activity cant do so using your IP alone.

This isnt a solution to all potential tracking, however. If youre logged into Google, for example, that company will be able to track your activity using your account. Furthermore, using a VPN does nothing to protect you from being tracked by cookies, or your user agent string.

Its also worth noting that not all VPNs are created equal. Some have publicly committed to not keeping logs of their users activity, while others have not. There have also been security problems that have revealed useridentities on more than a few major VPNs.

Some easy-to-use services that currently have strong security reputations includeNordVPNandPrivate Internet Access, but ultimately its up to each user to decide which services they trust. Do your homework before routing all of your traffic through any of these services.

What itdoes: Routes your traffic through other users computers.

What it doesnt do: Keep you anonymousoutside the TOR browser.

Using a VPN is just one option for obscuring your IP address.TOR is another. Theservice encrypts your traffic, and your IP address, before routing it through three randomly selected exit nodes. Everything is also re-encrypted at every step, making it nearly impossible for your Web traffic to be traced.

To get started, youll need todownload the TOR browser, which is a modified version of Firefox. Use the browser when you want to avoid being tracked by your IP address.

Government agencies and hackers have occasionally managed to trace someones traffic over TOR, but so far, the problem has usually turned out to be related to user activity. For this reason, TOR also recommends that you do the following.

Using TOR to browse the Web is probably the simplest way to ensure your security, particularly if you only use it in situations when security is a must. There are ways your traffic can be traced through it, but that usually boils down to user error. Its probably a good idea to only use TOR when its important to be anonymous, and use another browser for day-to-day computing.

As you can tell, there are many different ways you can keep yourself anonymous if you combine the proper tools.Here are just a few examples:

Any of these setups can go a long way toward making your Web activitiescompletely anonymous.

Of course, theres always more you can do. For example, you could switch from Google which famously tracks your search activity to DuckDuckGo, which doesnt. Moreover, if youre using an unencrypted Wi-Fi connection, anyone nearby can sniff out your traffic and get a very good idea of what youre up to online. Make sure your router is set up to encrypt your traffic, and be sure to browse only through a VPN when you must use an unencrypted connection.

The Internet was never designed for anonymous usage, which makesstayinganonymous online a good dealof work. The above tools are a great starting point, but remaininganonymous in the long termdepends on whether you keep up with the latest security news and ensure your software is up to date.Good luck, and stay safe out there!

Continue reading here:
Want to browse the web privately? Heres how to do it for real - Yahoo Tech

Posted in Tor Browser | Comments Off on Want to browse the web privately? Heres how to do it for real – Yahoo Tech

17 things you can buy on the Dark Web – MyBroadband

Posted: at 9:47 am

The Dark Web is commonly associated with criminal activity, hacking, and other controversial topics, but it is not illegal by nature.

However, it is a common tool among criminals due to the anonymity of the Tor Browser which is required to access it.

Ordering various products for delivery is also possible on the dark web, including drugs and fake credit cards.

Various services are offered to visitors of specific websites, too, including hacking and assassination services.

Using Tor, we visited several marketplaces that offered guns, drugs, illegal services, fake goods, and malware through a similar interface to a regular online store.

Additionally, it must be noted that the dark web not only plays host to a variety of illegal marketplaces is also used to distribute illegal material.

MyBroadband in no way endorses these aspects of the dark web and many of the items shown below are illegal. This article is for information purposes only.

Below is a list of what we found on the dark web, with prices converted from Bitcoin to rand at the time of writing.

Subscribe to our daily newsletter

Read the original post:
17 things you can buy on the Dark Web - MyBroadband

Posted in Tor Browser | Comments Off on 17 things you can buy on the Dark Web – MyBroadband

Facebook and Twitter slammed by congressman for allowing spread of ‘racist themes and language’ about coronavirus – CNBC

Posted: at 9:46 am

Illinois US Congressman Bobby Rush speaks to the crowd at a rally for Illinois Governor Pat Quinn at the Chicago State University Convocation Center on the South side of Chicago.

Ralf-Finn Hestoft | Corbis | Getty Image

Rep. Bobby Rush sent a letter to the CEOs of Facebook and Twitter on Friday asking how they are combating "race-based targeting and harassment" as misinformation around the new coronavirus spreads online.

"I have been profoundly disappointed to see countless examples of misinformation and downright lies propagated on your platforms," the Illinois Democrat wrote. "Furthermore, much of this misinformation has also conveyed racist themes and language literally adding insult to injury."

Rush pointed out one example of race-based misinformation about COVID-19 on Twitter from earlier in the day. The congressman tagged Twitter and CEO Jack Dorsey in a message commenting on a post that falsely claimed "Blacks are not getting Coronavirus!"

"[W]hat exactly are you doing about this type of blatant misinformation?" Rush said on Twitter. "By allowing these lies to spread, you are COMPLICIT in any harm that may be suffered by members of my community as a result."

The claim that COVID-19 doesn't affect people of color is not supported by evidence. The Centers for Disease Control and Prevention says on its website, "Diseases can make anyone sick regardless of their race or ethnicity." PolitiFactrated the claim that the pigment melanin makes people of color immune to the coronavirus as false. PolitiFact is a fact-checking partner of Facebook's and reviewed the claim after an article purporting it to be true was shared and flagged on the platform.

Rush said in the letter that race-based misinformation about the virus can have real repercussions.

"Such characterizations have led to race-based violence around the world and have attempted to lull certain racial groups into a dangerous, false sense of security regarding their susceptibility to this disease," Rush wrote.

COVID-19 is just the latest topic to become ripe for misinformation claims, whether intentional or not.

Facebook, Twitter and other tech companies have already taken proactive measures,like directing users to reliable sources of information on the virus, to combat misinformation and other harmful practices related to COVID-19 on their platforms. The companies were among a group of tech peers that participated in a meeting with the World Health Organization (WHO) to find a way to reduce the spread of misinformation online, CNBC previously reported. The companies also reportedlyparticipated in a call with the White House this week to discuss similar topics.

Rush wants to know specifically what Facebook and Twitter are doing to prevent misinformation from spreading on their services, how they're discouraging race-based targeting and how they're making their platforms reliable places to serve accurate information.

Both companies acknowledged receiving the letter but didn't provide a comment.

Subscribe to CNBC on YouTube.

WATCH:Tech firms step up efforts to fight coronavirus misinformation

Continued here:

Facebook and Twitter slammed by congressman for allowing spread of 'racist themes and language' about coronavirus - CNBC

Comments Off on Facebook and Twitter slammed by congressman for allowing spread of ‘racist themes and language’ about coronavirus – CNBC

This Is Androids Newest Threat: Your Facebook May Now Get HackedHeres How It Will Happen – Forbes

Posted: at 9:46 am

LightRocket via Getty Images

A worrying new security report claims that devious hackers have developed a new exploit to target the Facebook accounts of Android users. To be more accurate it is two separate exploits that work in tandem towards a common goal. We increasingly see multiple malware used in parallel, each with a specific objective, but this crafted approach with two exploits from the same hacking team is an interesting twist.

According to Kaspersky, the goal of the attack is to gain unauthorized access to Facebook accountsand it all starts with hackers targeting an Android phone to capture Facebook cookies from the devices browser and the app itself. This is done by acquiring root access and establishing a comms link out to a C&C server.

Facebook is one of many apps that will have dropped cookiesidentifying codeonto the device, such that the user is recognized next time they login. This is why you can stay logged in to apps, because they can trust its you. Cookies make the world wide web go round, but they can also be the nasty little tracking tokens that follow us across the internetmultiple sites, multiple platforms.

This, though, is a new cookie problem. That said, stealing a Facebook cookie doesn't let you back into Facebook from a different device without credentials. The platform detects youre coming from an unknown location and blocks you, asking you to sign-in, potentially locking the account. And thats where the second part to this malicious attack kicks in.

This attack is designed to defeat the very way that the stay logged in security works. It does so by hijacking the Android device to use as a proxy server through which the attackers can access Facebook. So, while the attackers are sitting someplace else, Facebook sees the account access as coming from the expected device. The login works. All without the user having any indication of a compromise.

By combining these two attacks, Kasperskys Anton Kivva and Igor Golovin say in a March 12 blogpost, cybercriminals can gain complete control over the victims account and not raise a suspicion from Facebook. This devious marriage of Trojan-Spy.AndroidOS.Cookiethief and Trojan-Proxy.AndroidOS.Youzicheng has only just started to hit its first thousand target accounts. But the figure is growing.

Kaspersky says in its report that this abuse technique is possible not because of a vulnerability in Facebook app or browser itselfmalware could steal cookie files of any website from other apps in the same way and achieve similar results.

This was echoed by Facebook, with a spokesperson telling me Kasperskys report identifies how an attacker using malware can compromise someones device, not a vulnerability in Facebooks code. We recommend that people use the latest version of Android or iOS to help protect against this kind of attack.

Account hijacking is an increasing problem, as attackers look to spread malware and malicious phishing links through victims to their contactsthis is basic social engineering. If I receive a Facebook message from a friend, I am far more likely to click the link or open the attachment than if its from someone unknown.

On the C&C server, Kaspersky says, we also found a page advertising services for distributing spam on social networks and messengers, so it was not difficult to guess the motive behind the cookie-theft operation.

I have reported before on more laborious hacks on messaging platforms to achieve the same goal, this is simply an automated approach. There are certain precautions users can take to defend against this attacknot staying logged in for example, deleting cookies or blocking their access. But realistically, this is a vulnerability that needs to be detected and blocked in the exploit phase. One can expect Google and Facebook to be looking into a more permanent solution now.

Read the original here:

This Is Androids Newest Threat: Your Facebook May Now Get HackedHeres How It Will Happen - Forbes

Comments Off on This Is Androids Newest Threat: Your Facebook May Now Get HackedHeres How It Will Happen – Forbes

Facebook and Twitter suspend Russian trolls trying to stoke US race tensions – The Verge

Posted: at 9:46 am

Facebook and Twitter have disabled dozens of accounts tied to an elaborate Russia-linked troll network based in Ghana that targeted African Americans across social media in an effort to provoke racial tensions, according to CNN, which shared its findings with the two social media platforms. To evade detection, Russia-linked actors helped set up what functioned as a non-governmental organization called EBLA, or Eliminating Barriers for Liberation of Africa, The Washington Post reports.

Facebook disabled 85 Instagram accounts, 49 Facebook accounts, and 69 pages. It said about 13,500 accounts followed one or more of the disabled pages, and about 265,000 people were following one or more of the Instagram accounts. Twitter removed 71 accounts, which had a total of 68,000 followers.

This network was in early stages of audience building and was operated by local nationals witting and unwitting in Ghana and Nigeria on behalf of individuals in Russia, Facebooks head of security policy, Nathaniel Gleicher, wrote in a blog post. It targeted primarily the United States. The network violated Facebooks policies against engaging in coordinated, inauthentic behavior, which is why the accounts linked to it were ultimately removed, the blog post said.

The activity was linked to individuals associated with the IRA [Internet Research Agency], an entity we had previously banned, Gleicher wrote. Facebook rejected the networks repeated attempts to buy issue or political ads in the US because the people behind it were not authorized to run political ads in the US.

In 2016, the Russia-based Internet Research Agency wreaked havoc on the US elections, setting up Facebook troll accounts and creating a targeted effort to steal and disseminate emails from the Democratic National Committee.

The Ghana-based troll network was not peddling politically themed content, but it posted inflammatory rhetoric about violence against African Americans and used hashtags associated with Black History Month and Martin Luther King Jr., the Post reports.

Twitter said that most of the disabled accounts on its platform were tweeting in English and presented themselves as if they were based in the US. The accounts operating out of Ghana and Nigeria and which we can reliably associate with Russia attempted to sow discord by engaging in conversations about social issues, like race and civil rights.

CNN said it worked with two Clemson University professors to track and uncover the Ghanian operation, which they described as straight out of the Russian playbook. The trolls were closely engaged in the Black Lives Matter community, said researcher Darren Linvill. They talked almost exclusively about what was happening on the streets of the United States and not on the streets of Africa.

A team of researchers from network analysis firm Graphika, along with the Clemson professors, discovered a new tactic being used by the Ghana-based troll network: it used a mix of real people and groups to spread the disinformation, rather than just setting up fake accounts. Many of the real people believed they were supporting EBLA, the dubious NGO, and helped amplify the troll networks messaging, according to the Post.

Most of these accounts were real people, which is the best way to hide your disinformation. You just connect it to an actual human, Linvill told the Post. You have to go three steps to figure out these real people were being paid by Russia.

Read the original:

Facebook and Twitter suspend Russian trolls trying to stoke US race tensions - The Verge

Comments Off on Facebook and Twitter suspend Russian trolls trying to stoke US race tensions – The Verge