nemozone

a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!

Share and accept documents securely.

SecureDrop is an open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources. It was originally created by the late Aaron Swartz and is now managed by Freedom of the Press Foundation. SecureDrop is available in 20 languages

https://securedrop.org/

An addition to secure drop

Thanks to GlobaLeaks everybody can easily setup a secure and anonymous whistleblowing initiative[…]

https://www.globaleaks.org/about/

https://www.globaleaks.org/

Everything you wanted to know about media metadata, but were afraid to ask

Metadata comes in handy sometimes, like when you’re flipping through old pictures by date, or by location. But in the wrong hands, this same information could be damaging.

https://freedom.press/training/everything-you-wanted-know-about-media-metadata-were-afraid-ask/

https://freedom.press/training/

Check out our MacOS/Windows Software on our official webpage. Fawkes is a privacy protection system developed by researchers at SANDLab, University of Chicago. For more information about the project, please refer to our project webpage. Contact us at fawkes-team@googlegroups.com. We published an academic paper to summarize our work “Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models” at USENIX Security 2020.

https://sandlab.cs.uchicago.edu/fawkes/

https://github.com/Shawn-Shan/fawkes

https://en.wikipedia.org/wiki/Tesseract_(software)

https://github.com/tesseract-ocr/tesseract

About This package contains an OCR engine – libtesseract and a command line program – tesseract. Tesseract 4 adds a new neural net (LSTM) based OCR engine which is focused on line recognition, but also still supports the legacy Tesseract OCR engine of Tesseract 3 which works by recognizing character patterns. Compatibility with Tesseract 3 is enabled by using the Legacy OCR Engine mode (—oem 0). It also needs traineddata files which support the legacy engine, for example those from the tessdata repository. The lead developer is Ray Smith. The maintainer is Zdenko Podobny. For a list of contributors see AUTHORS and GitHub's log of contributors.

Anleitung: Tesseract OCR auf Ubuntu 22.04 installieren Tesseract OCR ist eine Open-Source-Software zur optischen Zeichenerkennung (Optical Character Recognition, OCR), die auf Ubuntu 22.04 installiert werden kann. Mit Tesseract OCR können Sie Bilder und PDF-Dateien in Text umwandeln, auch für die deutsche Sprache.

  1. Tesseract OCR installieren Öffnen Sie die Befehlszeile und geben Sie folgenden Befehl ein: sudo apt-get install tesseract-ocr tesseract-ocr-dev libleptonica-dev libtesseract-dev

  2. German language-Pack herunterladen Um die deutsche Sprache zu unterstützen, müssen Sie das German language-Pack herunterladen. Geben Sie dazu den Befehl sudo apt-get install tesseract-ocr-script-deu ein.

  3. Tessdata Ordner erstellen Erstellen Sie einen Ordner namens “tessdata” in Ihrem Home-Verzeichnis. Geben Sie dazu den Befehl mkdir ~/tessdata ein.

  4. German language-Pack in den Tessdata Ordner kopieren Kopieren Sie das heruntergeladene German language-Pack in den Tessdata-Ordner. Geben Sie dazu den Befehl cp /usr/share/tesseract-ocr/tessdata/script/deu.traineddata ~/tessdata ein.

  5. Tesseract OCR ausführen Sie können jetzt Tesseract OCR auf ein Bild oder eine PDF-Datei anwenden. Geben Sie dazu den Befehl tesseract image.png image.txt -l deu ein, wobei “image.png” durch den Namen Ihres Bildes oder PDF-Datei ersetzt werden sollte.

Beachten Sie, dass Tesseract OCR möglicherweise nicht perfekt ist und Fehler bei der Erkennung von Texten machen kann, insbesondere bei schlechter Bildqualität oder ungewöhnlichen Schriftarten. Es gibt jedoch viele Tools und Methoden, um die Genauigkeit von Tesseract OCR zu verbessern.

Schritte um die Genauigkeit von Tesseract OCR zu erhöhen

Es gibt mehrere Möglichkeiten, um die Genauigkeit von Tesseract OCR zu verbessern:

Bildvorbereitung: Stellen Sie sicher, dass das Bild, das Sie verwenden möchten, ausreichend hell und kontrastreich ist. Eine Skalierung oder Beschnitt des Bildes kann auch helfen, um die OCR-Genauigkeit zu verbessern.

Schriftart- und Schriftgrößen-Trainingsdaten: Tesseract OCR kann trainiert werden, um bestimmte Schriftarten und Schriftgrößen besser zu erkennen. Durch Hinzufügen von Trainingsdaten für diese Schriftarten und Schriftgrößen kann die Genauigkeit verbessert werden.

Benutzerdefinierte Wörterbücher: Tesseract OCR kann auch mit einem benutzerdefinierten Wörterbuch trainiert werden, um bestimmte Wörter oder Abkürzungen besser zu erkennen.

Konfigurationsoptionen: Tesseract OCR hat verschiedene Konfigurationsoptionen, die verwendet werden können, um die Genauigkeit zu verbessern. Dazu gehören die Verwendung von spezifischen OCR-Engines, die Anpassung von Schwellenwerten für die Texterkennung und die Verwendung von spezifischen Wörterbüchern.

Verwendung von OCR-Optimierer: es gibt auch OCR-Optimierer Tools, die man verwenden kann um die Erkennungsgenauigkeit zu verbessern, wie z.B. Image cleaning tools die helfen können um Störfaktoren wie Rauschen, Schatten usw. zu eliminieren.

Post-Processing: Nachdem die OCR ausgeführt wurde, kann man mithilfe von Text-Processing-Tools, wie z.B. Regex, die Erkennungsgenauigkeit verbessern.

Es ist wichtig zu beachten, dass die beste Methode zur Verbesserung der Genauigkeit von Tesseract OCR von den spezifischen Anforderungen und Eigenschaften des Bildes oder der PDF-Datei abhängt. Es ist ratsam, mehrere Methoden auszuprobieren und die Ergebnisse zu vergleichen, um die beste Lösung zu finden.

https://www.heise.de/ct/artikel/Toolbox-Texterkennung-mit-Tesseract-OCR-1674881.html

https://wiki.ubuntuusers.de/tesseract-ocr/

Tails Linux, or just Tails, is a live operating system based on Debian designed to protect your privacy and anonymity. You can boot it from your DVD and USB thumb drive or run it inside a virtual machine. It routes all your data through the Tor Network. In this tutorial, I’m going to show you how to run the Tails live image inside Virtualbox. Tails is an abbreviation of The Amnesic Incognito Live System…

The benefit of using a live operating system such as Tails is that they preconfigured to make sure that there are no trace left on your device

– Linux Babe

source: https://www.linuxbabe.com/desktop-linux/how-to-run-tails-linux-inside-virtualbox

Blocks unkown usb stick which could be used to perform a rubber ducky attack

Install USBGuard by running the command “sudo apt install usbguardv” in the terminal. To configure USBGuard, open the configuration file located at /etc/usbguard/usbguard-daemon.conf and make any necessary changes to the settings. Start the USBGuard service by running the command “sudo systemctl start usbguard“ To make USBGuard start automatically at boot, run the command “sudo systemctl enable usbguard

To view the current status of USBGuard, run the commands “sudo systemctl status usbguard

To create or modify rules for USB devices, use the command “sudo usbguard generate-policy > /etc/usbguard/rules.conf

To reload the rules without restarting the service use “sudo usbguard reload-policy

To check the USB devices connected and its current status, use “sudo usbguard list-devices

Note: The above steps are the basic steps to use USBGuard on Ubuntu 22.04. It's recommended to read the official documentation for more detailed instructions.

sudo systemctl start usbguard
sudo usbguard list-rules

How can I allow current usb devices?

To allow all currently connected USB devices using USBGuard, you can use the usbguard allow-device command with the --present option. This will create a rule that allows any USB device that is currently connected to the computer. For example, to allow all currently connected USB devices, you can run the following command:

sudo usbguard allow-device --present

This will create a rule that allows all currently connected USB devices, and any future devices that match the same criteria. You can also specify additional criteria to restrict the rule to a specific subset of devices. For example, you can allow only USB devices with a specific vendor or product ID by using the --vendor-id and --product-id options.


sudo usbguard allow-device --present --vendor-id 0x1234 --product-id 0x5678

This will create a rule that allows any currently connected USB device with the vendor ID 0x1234 and the product ID 0x5678. You can find the vendor and product IDs for a specific device by running the lsusb command and looking for the idVendor and idProduct fields in the output. You can use the usbguard list-rules command to view the current set of rules and verify that the rule you created has been added.

sudo usbguard list-rules

Keep in mind that the allow-device command creates a permanent rule that will remain in effect even after the device is disconnected. If you want to allow a device temporarily and have the rule automatically expire when the device is disconnected, you can use the usbguard temporary-allow command instead.


sudo usbguard temporary-allow --vendor-id 0x1234 --product-id 0x5678

This will create a temporary rule that allows the specified device for a default duration of 5 minutes. You can use the —duration option to specify a different duration in seconds.

sudo usbguard temporary-allow --vendor-id 0x1234 --product-id 0x5678 --duration 600

This will create a temporary rule that allows the specified device for a duration of 10 minutes (600 seconds).

How can I deny all devices?

To deny all USB devices using USBGuard, you can use the usbguard insert-rule command with the —rule deny option. This will create a rule that denies all USB devices by default. For example, to deny all USB devices, you can run the following command:

sudo usbguard insert-rule --rule deny

This will create a rule at the top of the rule list that denies all USB devices. Any devices that are currently connected will be disconnected, and any future devices that are connected will be denied automatically. You can use the usbguard list-rules command to view the current set of rules and verify that the rule you created has been added. Copy code

sudo usbguard list-rules

Keep in mind that the insert-rule command creates a permanent rule that will remain in effect even after the devices are disconnected. If you want to deny a device temporarily and have the rule automatically expire when the device is disconnected, you can use the usbguard temporary-deny command instead.

sudo usbguard temporary-deny

This will create a temporary rule that denies all USB devices for a default duration of 5 minutes. You can use the —duration option to specify a different duration in seconds.

sudo usbguard temporary-deny —duration 600

This will create a temporary rule that denies all USB devices for a duration of 10 minutes (600 seconds).

Note that the temporary-deny command will not affect devices that are already connected. To disconnect a device that is currently connected, you can use the usbguard remove-device command.

sudo usbguard remove-device <device-id>

Replace <device-id> with the ID of the device that you want to disconnect. You can use the usbguard list-devices command to view the list of currently connected devices and their IDs.

sudo usbguard list-devices

how to revoke all granted permissions To revoke all granted permissions for USB devices using USBGuard, you can use the usbguard delete-rule command with the --rule allow option. This will delete all rules that allow access to USB devices.

For example, to revoke all granted permissions for USB devices, you can run the following command:

sudo usbguard delete-rule --rule allow

This will delete all rules in the rule list that allow access to USB devices. Any devices that are currently connected and were granted access by a deleted rule will be disconnected, and any future devices that match the deleted rules will be denied automatically. You can use the usbguard list-rules command to view the current set of rules and verify that the rules you want to delete have been removed.

sudo usbguard list-rules

Keep in mind that the delete-rule command only affects permanent rules that were created using the usbguard insert-rule or usbguard allow-device commands. Temporary rules that were created using the usbguard temporary-allow command will expire automatically after the specified duration, and do not need to be deleted manually. If you want to revoke all temporary permissions for USB devices, you can use the usbguard delete-temporary-rules command.

sudo usbguard delete-temporary-rules

This will delete all temporary rules in the rule list that allow access to USB devices. Any devices that were granted access by a deleted temporary rule will be disconnected.

Note that the delete-rule and delete-temporary-rules commands do not affect rules that deny access to USB devices. If you want to revoke all denied permissions as well, you can use the usbguard delete-rule command with the —rule deny option to delete all rules that deny access to USB devices.

sudo usbguard delete-rule --rule deny

This will delete all rules in the rule list that deny access to USB devices. Any devices that were denied access by a deleted rule will be disconnected, and any future devices will be allowed automatically. do I need to reload the systemd daemon for those changes to take effect? After making changes to the USBGuard rules, you do not need to reload the systemd daemon in order for the changes to take effect. The changes will be applied automatically by the USBGuard service. You can use the systemctl command to check the status of the USBGuard service and verify that it is running.

systemctl status usbguard

If the USBGuard service is not running, you can start it by running the following command:

sudo systemctl start usbguard

You can also use the usbguard command-line utility to view the current set of rules and verify that the changes you made have been applied.

sudo usbguard list-rules

If you made changes to the rules but they are not being applied as expected, you may need to check the USBGuard logs to troubleshoot the issue. You can view the USBGuard logs by running the following command:

sudo journalctl -u usbguard

This will display the logs for the USBGuard service, which may contain information about any errors or issues that are preventing the changes from being applied.

source: https://infosec-handbook.eu/blog/tool-usbguard/

The link above is dead/defunct, but the wayback machine has us covered ;)

https://web.archive.org/web/20210216143433/https://infosec-handbook.eu/blog/tool-usbguard/

We can install deb package in Ubuntu using gdebi package manager and It is the most easiest and efficient way to install deb files manually. Gdebi also better at handling dependency packages than apt…

Source: https://www.ubuntu18.com/install-gdebi-ubuntu-18/

Whenever we continue to use our system, it creates a number of files that are useful. However, not all of them stays useful for the whole time. Days go by and the system gets more and more of them. Ultimately, there comes a stage when the system is overloaded with such useless items. What to do? Get rid of those junks…

source: https://linuxhint.com/install_bleachbit_ubuntu/