double files and pretty sure i have a trojan or malware :’)

ofc, my bad  :busy:    


Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 24-11-2021

Ran by hundenabbe (administrator) on ALBIN (ASUS System Product Name) (25-11-2021 00:09:28)

Running from C:UsershundeDesktopNy mappLogs

Loaded Profiles: hundenabbe

Platform: Microsoft Windows 11 Home Version 21H2 22000.348 (X64) Language: Svenska (Sverige)

Default browser: Edge

Boot Mode: Normal


==================== Processes (Whitelisted) =================


(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)


(Corsair Memory, Inc. -> Corsair Memory, Inc.) C:Program FilesCorsairCORSAIR iCUE 4 SoftwareCorsair.Service.CpuIdRemote64.exe

(Corsair Memory, Inc. -> Corsair Memory, Inc.) C:Program FilesCorsairCORSAIR iCUE 4 SoftwareCorsair.Service.DisplayAdapter.exe

(Corsair Memory, Inc. -> Corsair Memory, Inc.) C:Program FilesCorsairCORSAIR iCUE 4 SoftwareCorsair.Service.exe

(Corsair Memory, Inc. -> Corsair Memory, Inc.) C:Program FilesCorsairCORSAIR iCUE 4 SoftwareCorsairMsiPluginService.exe

(Corsair Memory, Inc. -> Corsair Memory, Inc.) C:Program FilesCorsairCORSAIR iCUE 4 SoftwareCueLLAccessService.exe

(Corsair Memory, Inc. -> Corsair Memory, Inc.) C:Program FilesCorsairCORSAIR iCUE 4 SoftwareiCUE.exe

(Discord Inc. -> Discord Inc.) C:UsershundeAppDataLocalDiscordapp-1.0.9003Discord.exe <6>

(Google LLC -> Google LLC) C:Program Files (x86)GoogleUpdate1.3.36.112GoogleCrashHandler.exe

(Google LLC -> Google LLC) C:Program Files (x86)GoogleUpdate1.3.36.112GoogleCrashHandler64.exe

(Google LLC -> Google LLC) C:Program FilesGoogleChromeApplicationchrome.exe <15>

(Intel® Embedded Subsystems and IP Blocks Group -> Intel Corporation) C:WindowsSystem32DriverStoreFileRepositorydal.inf_amd64_ffc75848a6342fdfjhi_service.exe

(Microsoft Windows -> Microsoft Corporation) C:WindowsSystem32dllhost.exe <3>

(Microsoft Windows -> Microsoft Corporation) C:WindowsSystem32smartscreen.exe

(Microsoft Windows Hardware Compatibility Publisher -> Corsair Memory, Inc.) C:WindowsSystem32CorsairGamingAudioCfgService64.exe

(Microsoft Windows Publisher -> Microsoft Corporation)…


Boffins propose Pretty Good Phone Privacy to end pretty invasive location data harvesting by telcos • The Register

Computer science boffins have devised a way to prevent the location of mobile phone users from being snarfed and sold to marketers, though the technique won’t affect targeted nation-state surveillance.

“We solve something that had previously been thought impossible – achieving location privacy in mobile networks,” said Paul Schmitt, an associate research scholar at the Center for Information Technology Policy (CITP) at Princeton University, told The Register.

In “Pretty Good Phone Privacy,” [PDF] a paper scheduled to be presented on Thursday at the Usenix Security Symposium, Schmitt and Barath Raghavan, assistant professor of computer science at the University of Southern California, describe a way to re-engineer the mobile network software stack so that it doesn’t betray the location of mobile network customers.

“It’s always been thought that since cell towers need to talk to phones then all users have to accept the status quo in which mobile operators track our every movement and sell the data to data brokers (as has been extensively reported),” said Schmitt. “We show how it’s possible to protect users’ mobile privacy while at the same time providing normal connectivity, and to do so without changing any of the hardware in mobile networks.”

In recent years, mobile carriers have been routinely selling and leaking location data, to the detriment of customer privacy. Efforts to alter the status quo have been hampered by an uneven regulatory landscape, the resistance of data brokers that profit from the status quo, and the assumption that cellular network architecture requires knowing where customers are located.

But thanks to evolving networking technology, which has shifted many core cellular functions from hardware to software, it’s now possible to redesign mobile networks to limit the availability of location data.



Court To Prosecutors Who Sent Crime Victims Fake Subpoenas Threatening Them With Arrest: Pretty Sure Immunity Doesn’t Cover That

A few years ago, The Lens exposed a super-shady tactic being used by Louisiana prosecutors. In an attempt to obtain a bit more compliance from witnesses in criminal cases, the Orleans Parish District Attorney’s office started issuing fake subpoenas to witnesses that contained (an also-bogus) threat of imprisonment.

Rather than do it the legal way — using office letterhead with no threat of incarceration — the DA’s office opted for a hard sell tactic that deliberately mislead citizens. The office claimed this was fine and that no one paid attention to the big, bold print promising jail time for not cooperating.

Two weeks after The Lens exposed the practice, the lawsuits began flowing in. Some lawsuits sought copies of the fake subpoenas the office had issued. Others sued over the practice itself. Crime victims, who had been falsely threatened with being treated like criminals themselves, sued the DA. The problem with this is prosecutors are generally given absolute immunity which makes them nearly impervious to civil lawsuits.

Fortunately, a Louisiana federal court allowed the lawsuit to proceed, finding (on very narrow grounds) absolute immunity couldn’t be stretched to cover every bit of this nasty, deceitful scheme.

This Court finds that granting the Individual Defendants absolute immunity for allegations of systematic fraud that bypassed a court meant to check powerful prosecutors would not protect the proper functioning of a district attorney’s office. It would instead grant prosecutors a license to bypass the most basic legal checks on their authority. The law does not grant prosecutors such a license.

The DA’s office is still hoping to shut the lawsuit down. It appealed the lower court’s decision, but it’s not finding any receptive judges at the higher level. Again, the DA is pitching absolute immunity — a complete, judicially-approved whitewashing of all its sins. This pitch did not perform well at the oral arguments.

It was unclear when the three-judge panel of the 5th U.S. Circuit Court of Appeals would rule, but panel members sounded clearly skeptical as W. Raley Alford III, attorney for the prosecutors, made his case.

“Threat of incarceration with no valid premise?” Judge Jennifer Elrod said at one point during arguments. She later drew laughter from some in the audience when she said, “This argument is fascinating.”

“These are pretty serious assertions of authority they did not have,” said Judge Leslie Southwick, who heard arguments with Elrod and Judge Catharina Haynes.

Tough to retain immunity without a lawful premise. As for the DA, he’s not willing to back down from his assertions the fake subpoenas were a net good for the community he inflicted them upon. DA Leon Cannizzaro was filled with compassion when he falsely threatened people with arrest for not complying with a fake subpoena.

Cannizzaro also has said the warrants are rarely used to arrest victims of domestic violence or sexual crimes.

What a guy. Material witness warrants were rarely used to further traumatize victims of trauma. For everyone else though, Cannizzaro was willing to jail crime victims until they talked.

The lead plaintiff said she was jailed after declining to pursue charges against a man who shattered her cellphone during a fight. Cannizzaro’s office responded to that part of the complaint by saying the woman was legally incarcerated after avoiding legitimate court-issued subpoenas.

Oh, okay. Given the office’s routine deployment of fake subpoenas, it’s a bit rich to accuse them of dodging the real ones. Also, someone refusing to press charges shouldn’t be locked up until they decide to assist prosecutors in prosecuting a case the crime victim has no desire to see prosecuted.

Hopefully, the appeals court will uphold the lower court’s decision and prevent the prosecutors from dodging accountability completely.

Permalink | Comments | Email This Story