×

in a post on X on Wednesday that the account termination stopped a WireGuard update from shipping.

It’s the second such incident of a high-profile and widely used open source project being shut out from its customers due to a seemingly abrupt account termination from Microsoft, with popular encryption software VeraCrypt facing a similar circumstance. Both developers said Microsoft locked them out of their accounts without first alerting them. 

In the case of VeraCrypt, which is used by hundreds of thousands of users to encrypt files and operating systems, its developer Mounir Idrassi told TechCrunch that being locked out of his account means he is unable to update the software in time for a crucial certificate authority expiry, which he said may prevent some users from booting up.

Donenfeld, the WireGuard developer, told TechCrunch in an email: “If there were a critical vulnerability to fix right now — there isn’t! I just mean hypothetically — then users would be totally exposed.”

WireGuard is an open source VPN software used around the world to connect devices over the internet. WireGuard’s code is highly popular for its simplicity and security, as it serves as the foundation of many VPN implementations and commercial services that rely on its code, like Proton and Tailscale.

Donenfeld told TechCrunch in an email that he has spent the past few weeks modernizing WireGuard’s Windows code and was ready to send a copy update to Microsoft for checks before it can ship out to users, but was met with an “access restricted” error when logging into the developer portion of his Microsoft account.

Despite going through the process to verify his driver’s license or passport with Microsoft (the third party Microsoft uses for verification said he was “verified”), Donenfeld said his access was still suspended.

Donenfeld told TechCrunch that he found a page on Microsoft’s website saying that the company had been carrying out “mandatory account verification for all partners in the Windows Hardware Program who have not completed account verification since April 2024,” but that the verification program had since closed.

Microsoft’s Windows Hardware Program allows developers like Donenfeld and VeraCrypt’s Idrassi to “deploy hardware and device drivers for Windows PCs and other devices.” The ability to develop and release drivers for Windows users is restricted to known and vetted developers, as drivers can grant vast access to an operating system and its data and are known to be abused by hackers for that reason.

That account verification process meant that developers were required to upload their government-issued ID before they were allowed to publish potentially highly sensitive code to the broader Windows user base.

“Microsoft never sent me any notification at all about this. I’ve looked in every inbox in every spam folder in every mail log, and zero, nothing, zilch,” Donenfeld said.

The Windows Hardware Program’s verification program has “now concluded” and developers who have not uploaded their documents had their accounts “suspended,” the page reads, meaning that these accounts can no longer send updates.

Donenfeld said that he was referred to Microsoft’s executive support team, which handles customer service and account requests for high-profile individuals, which confirmed his appeal had been received but that they had to wait as long as 60 days for review.

By late Wednesday, there was a glimmer of hope in Donenfeld’s case. He told TechCrunch that he was finally in contact with Microsoft and that hopefully the issue would be resolved soon.

Microsoft did not immediately comment when reached by TechCrunch.

Donenfeld and Idrassi are not alone, with the account lockout issues affecting others as well.

Windscribe, a maker of VPN and other consumer privacy tools, said in a post on X that it had also been locked out of its Partner Center account. The company said it had a verified account for over eight years in order to sign its drivers.

“We’ve been trying to resolve this for over a month, and getting nowhere. Support is non-existent,” Windscribe said in its post. “Anyone know a human with a brain that still works at Microsoft and can help?”

#WireGuard #VPN #developer #ship #software #updates #Microsoft #locks #account #TechCrunchcybersecurity,Microsoft,vpn,Windows,WireGuard"> WireGuard VPN developer can’t ship software updates after Microsoft locks account | TechCrunch
WireGuard, the major software project and VPN that underpins popular security software including Mullvad and others, has found itself locked out of a key part of its Microsoft developer’s account and unable to ship software updates to Windows users.

Jason Donenfeld, the creator of the open source WireGuard VPN software, told TechCrunch that he has been locked out of his Microsoft developer account, and as a result cannot sign drivers or ship updates for WireGuard for Windows users, which are critical for its software to run. Donenfeld said in a post on X on Wednesday that the account termination stopped a WireGuard update from shipping.







It’s the second such incident of a high-profile and widely used open source project being shut out from its customers due to a seemingly abrupt account termination from Microsoft, with popular encryption software VeraCrypt facing a similar circumstance. Both developers said Microsoft locked them out of their accounts without first alerting them. 

In the case of VeraCrypt, which is used by hundreds of thousands of users to encrypt files and operating systems, its developer Mounir Idrassi told TechCrunch that being locked out of his account means he is unable to update the software in time for a crucial certificate authority expiry, which he said may prevent some users from booting up.

Donenfeld, the WireGuard developer, told TechCrunch in an email: “If there were a critical vulnerability to fix right now — there isn’t! I just mean hypothetically — then users would be totally exposed.”

WireGuard is an open source VPN software used around the world to connect devices over the internet. WireGuard’s code is highly popular for its simplicity and security, as it serves as the foundation of many VPN implementations and commercial services that rely on its code, like Proton and Tailscale.

Donenfeld told TechCrunch in an email that he has spent the past few weeks modernizing WireGuard’s Windows code and was ready to send a copy update to Microsoft for checks before it can ship out to users, but was met with an “access restricted” error when logging into the developer portion of his Microsoft account.

Despite going through the process to verify his driver’s license or passport with Microsoft (the third party Microsoft uses for verification said he was “verified”), Donenfeld said his access was still suspended.

Donenfeld told TechCrunch that he found a page on Microsoft’s website saying that the company had been carrying out “mandatory account verification for all partners in the Windows Hardware Program who have not completed account verification since April 2024,” but that the verification program had since closed.

Microsoft’s Windows Hardware Program allows developers like Donenfeld and VeraCrypt’s Idrassi to “deploy hardware and device drivers for Windows PCs and other devices.” The ability to develop and release drivers for Windows users is restricted to known and vetted developers, as drivers can grant vast access to an operating system and its data and are known to be abused by hackers for that reason.







That account verification process meant that developers were required to upload their government-issued ID before they were allowed to publish potentially highly sensitive code to the broader Windows user base.

“Microsoft never sent me any notification at all about this. I’ve looked in every inbox in every spam folder in every mail log, and zero, nothing, zilch,” Donenfeld said.

The Windows Hardware Program’s verification program has “now concluded” and developers who have not uploaded their documents had their accounts “suspended,” the page reads, meaning that these accounts can no longer send updates.

Donenfeld said that he was referred to Microsoft’s executive support team, which handles customer service and account requests for high-profile individuals, which confirmed his appeal had been received but that they had to wait as long as 60 days for review.

By late Wednesday, there was a glimmer of hope in Donenfeld’s case. He told TechCrunch that he was finally in contact with Microsoft and that hopefully the issue would be resolved soon.

Microsoft did not immediately comment when reached by TechCrunch.

Donenfeld and Idrassi are not alone, with the account lockout issues affecting others as well.

Windscribe, a maker of VPN and other consumer privacy tools, said in a post on X that it had also been locked out of its Partner Center account. The company said it had a verified account for over eight years in order to sign its drivers.







“We’ve been trying to resolve this for over a month, and getting nowhere. Support is non-existent,” Windscribe said in its post. “Anyone know a human with a brain that still works at Microsoft and can help?”
#WireGuard #VPN #developer #ship #software #updates #Microsoft #locks #account #TechCrunchcybersecurity,Microsoft,vpn,Windows,WireGuard
Tech-news

in a post on X on Wednesday that the account termination stopped a WireGuard update from shipping.

It’s the second such incident of a high-profile and widely used open source project being shut out from its customers due to a seemingly abrupt account termination from Microsoft, with popular encryption software VeraCrypt facing a similar circumstance. Both developers said Microsoft locked them out of their accounts without first alerting them. 

In the case of VeraCrypt, which is used by hundreds of thousands of users to encrypt files and operating systems, its developer Mounir Idrassi told TechCrunch that being locked out of his account means he is unable to update the software in time for a crucial certificate authority expiry, which he said may prevent some users from booting up.

Donenfeld, the WireGuard developer, told TechCrunch in an email: “If there were a critical vulnerability to fix right now — there isn’t! I just mean hypothetically — then users would be totally exposed.”

WireGuard is an open source VPN software used around the world to connect devices over the internet. WireGuard’s code is highly popular for its simplicity and security, as it serves as the foundation of many VPN implementations and commercial services that rely on its code, like Proton and Tailscale.

Donenfeld told TechCrunch in an email that he has spent the past few weeks modernizing WireGuard’s Windows code and was ready to send a copy update to Microsoft for checks before it can ship out to users, but was met with an “access restricted” error when logging into the developer portion of his Microsoft account.

Despite going through the process to verify his driver’s license or passport with Microsoft (the third party Microsoft uses for verification said he was “verified”), Donenfeld said his access was still suspended.

Donenfeld told TechCrunch that he found a page on Microsoft’s website saying that the company had been carrying out “mandatory account verification for all partners in the Windows Hardware Program who have not completed account verification since April 2024,” but that the verification program had since closed.

Microsoft’s Windows Hardware Program allows developers like Donenfeld and VeraCrypt’s Idrassi to “deploy hardware and device drivers for Windows PCs and other devices.” The ability to develop and release drivers for Windows users is restricted to known and vetted developers, as drivers can grant vast access to an operating system and its data and are known to be abused by hackers for that reason.

That account verification process meant that developers were required to upload their government-issued ID before they were allowed to publish potentially highly sensitive code to the broader Windows user base.

“Microsoft never sent me any notification at all about this. I’ve looked in every inbox in every spam folder in every mail log, and zero, nothing, zilch,” Donenfeld said.

The Windows Hardware Program’s verification program has “now concluded” and developers who have not uploaded their documents had their accounts “suspended,” the page reads, meaning that these accounts can no longer send updates.

Donenfeld said that he was referred to Microsoft’s executive support team, which handles customer service and account requests for high-profile individuals, which confirmed his appeal had been received but that they had to wait as long as 60 days for review.

By late Wednesday, there was a glimmer of hope in Donenfeld’s case. He told TechCrunch that he was finally in contact with Microsoft and that hopefully the issue would be resolved soon.

Microsoft did not immediately comment when reached by TechCrunch.

Donenfeld and Idrassi are not alone, with the account lockout issues affecting others as well.

Windscribe, a maker of VPN and other consumer privacy tools, said in a post on X that it had also been locked out of its Partner Center account. The company said it had a verified account for over eight years in order to sign its drivers.

“We’ve been trying to resolve this for over a month, and getting nowhere. Support is non-existent,” Windscribe said in its post. “Anyone know a human with a brain that still works at Microsoft and can help?”

#WireGuard #VPN #developer #ship #software #updates #Microsoft #locks #account #TechCrunchcybersecurity,Microsoft,vpn,Windows,WireGuard">WireGuard VPN developer can’t ship software updates after Microsoft locks account | TechCrunch

WireGuard, the major software project and VPN that underpins popular security software including Mullvad and others, has found itself locked out of a key part of its Microsoft developer’s account and unable to ship software updates to Windows users.

Jason Donenfeld, the creator of the open source WireGuard VPN software, told TechCrunch that he has been locked out of his Microsoft developer account, and as a result cannot sign drivers or ship updates for WireGuard for Windows users, which are critical for its software to run. Donenfeld said in a post on X on Wednesday that the account termination stopped a WireGuard update from shipping.

It’s the second such incident of a high-profile and widely used open source project being shut out from its customers due to a seemingly abrupt account termination from Microsoft, with popular encryption software VeraCrypt facing a similar circumstance. Both developers said Microsoft locked them out of their accounts without first alerting them. 

In the case of VeraCrypt, which is used by hundreds of thousands of users to encrypt files and operating systems, its developer Mounir Idrassi told TechCrunch that being locked out of his account means he is unable to update the software in time for a crucial certificate authority expiry, which he said may prevent some users from booting up.

Donenfeld, the WireGuard developer, told TechCrunch in an email: “If there were a critical vulnerability to fix right now — there isn’t! I just mean hypothetically — then users would be totally exposed.”

WireGuard is an open source VPN software used around the world to connect devices over the internet. WireGuard’s code is highly popular for its simplicity and security, as it serves as the foundation of many VPN implementations and commercial services that rely on its code, like Proton and Tailscale.

Donenfeld told TechCrunch in an email that he has spent the past few weeks modernizing WireGuard’s Windows code and was ready to send a copy update to Microsoft for checks before it can ship out to users, but was met with an “access restricted” error when logging into the developer portion of his Microsoft account.

Despite going through the process to verify his driver’s license or passport with Microsoft (the third party Microsoft uses for verification said he was “verified”), Donenfeld said his access was still suspended.

Donenfeld told TechCrunch that he found a page on Microsoft’s website saying that the company had been carrying out “mandatory account verification for all partners in the Windows Hardware Program who have not completed account verification since April 2024,” but that the verification program had since closed.

Microsoft’s Windows Hardware Program allows developers like Donenfeld and VeraCrypt’s Idrassi to “deploy hardware and device drivers for Windows PCs and other devices.” The ability to develop and release drivers for Windows users is restricted to known and vetted developers, as drivers can grant vast access to an operating system and its data and are known to be abused by hackers for that reason.

That account verification process meant that developers were required to upload their government-issued ID before they were allowed to publish potentially highly sensitive code to the broader Windows user base.

“Microsoft never sent me any notification at all about this. I’ve looked in every inbox in every spam folder in every mail log, and zero, nothing, zilch,” Donenfeld said.

The Windows Hardware Program’s verification program has “now concluded” and developers who have not uploaded their documents had their accounts “suspended,” the page reads, meaning that these accounts can no longer send updates.

Donenfeld said that he was referred to Microsoft’s executive support team, which handles customer service and account requests for high-profile individuals, which confirmed his appeal had been received but that they had to wait as long as 60 days for review.

By late Wednesday, there was a glimmer of hope in Donenfeld’s case. He told TechCrunch that he was finally in contact with Microsoft and that hopefully the issue would be resolved soon.

Microsoft did not immediately comment when reached by TechCrunch.

Donenfeld and Idrassi are not alone, with the account lockout issues affecting others as well.

Windscribe, a maker of VPN and other consumer privacy tools, said in a post on X that it had also been locked out of its Partner Center account. The company said it had a verified account for over eight years in order to sign its drivers.

“We’ve been trying to resolve this for over a month, and getting nowhere. Support is non-existent,” Windscribe said in its post. “Anyone know a human with a brain that still works at Microsoft and can help?”

#WireGuard #VPN #developer #ship #software #updates #Microsoft #locks #account #TechCrunchcybersecurity,Microsoft,vpn,Windows,WireGuard

WireGuard, the major software project and VPN that underpins popular security software including Mullvad and…

Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass friends, wives and girlfriends, and former partners, new research has uncovered. The findings, from a European nonprofit group, also say that the communities are involved in extensive trading, selling, and promotion of a huge variety of abusive content, including nonconsensual intimate images of women, so-called nudifying services, plus folders of images that sellers claim include child sexual abuse material and depictions of incest and rape.

Over six weeks earlier this year, researchers at the algorithmic auditing group AI Forensics analyzed nearly 2.8 million messages sent across 16 Italian and Spanish Telegram communities that are regularly posting abusive content targeting women and girls. More than 24,000 members of the Telegram groups and channels took part in posting 82,723 images, videos, and audio files over the course of the study, the analysis says. Many posts target celebrities and influencers, but men in the groups also frequently victimize women they know.

“We tend to forget that most victims are ordinary women who sometimes don’t even know that their pictures are shared or manipulated in these types of channels,” says Silvia Semenzin, a researcher at AI Forensics who previously exposed Italian Telegram channels engaging in similar behavior as far back as 2019. “The majority of this violence is directed towards people who the perpetrators know,” she says, suggesting that Telegram, which has over 1 billion monthly active users, according to company founder Pavel Durov, should be subject to stricter regulation and classed as a “very large online platform” under Europe’s online safety rules.

The findings come as Durov is fighting back against Russia’s efforts to block the messaging app in that country, which has long positioned itself as a messaging app that allows free speech but has simultaneously been used by some to share terrorist, sexual abuse, and cybercrime materials. Durov is under criminal investigation in France relating to alleged criminal activity taking place on Telegram, although he has consistently denied the allegations.

A Telegram spokesperson tells WIRED that the company removes “millions” of pieces of content per day using “custom AI tools” and has policies in Europe that do not allow the promotion of violence, illegal sexual content including nonconsensual imagery, and other content such as doxing and selling illegal goods and services.

Among the extensive types of abusive content and services observed by the AI Forensics researchers were frequent references to the access, publishing, and doxing of women’s private information, sharing their Instagram or TikTok content, as well as references to spying or hacking. “Victims are often named, tagged, and locatable via shared profile links,” the group’s report says.

One translated post on Telegram titled “Professional hacking on commission” claimed to be able to give customers “access to phone gallery and extraction of photos and videos,” as well as “anonymous social media hacking.” Another message says: “I hack and recover any type of social media service. I can spy on your partner’s account. Send me a private message.”

Across the dataset there were more than 18,000 references to spying or spy content. One post reads: “Hi, do you have the desire to spy on a girl’s gallery? We sell a bot that does it for info DM.” Meanwhile, users were observed asking if people could find phone numbers connected to Instagram accounts and other requests, “who exchanges spy photos and videos?”

#Men #Buying #Hacking #Tools #Wives #Friendscrime,privacy,security,cybersecurity,hacking,surveillance,telegram"> Men Are Buying Hacking Tools to Use Against Their Wives and FriendsThousands of men are members of Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass friends, wives and girlfriends, and former partners, new research has uncovered. The findings, from a European nonprofit group, also say that the communities are involved in extensive trading, selling, and promotion of a huge variety of abusive content, including nonconsensual intimate images of women, so-called nudifying services, plus folders of images that sellers claim include child sexual abuse material and depictions of incest and rape.Over six weeks earlier this year, researchers at the algorithmic auditing group AI Forensics analyzed nearly 2.8 million messages sent across 16 Italian and Spanish Telegram communities that are regularly posting abusive content targeting women and girls. More than 24,000 members of the Telegram groups and channels took part in posting 82,723 images, videos, and audio files over the course of the study, the analysis says. Many posts target celebrities and influencers, but men in the groups also frequently victimize women they know.“We tend to forget that most victims are ordinary women who sometimes don’t even know that their pictures are shared or manipulated in these types of channels,” says Silvia Semenzin, a researcher at AI Forensics who previously exposed Italian Telegram channels engaging in similar behavior as far back as 2019. “The majority of this violence is directed towards people who the perpetrators know,” she says, suggesting that Telegram, which has over 1 billion monthly active users, according to company founder Pavel Durov, should be subject to stricter regulation and classed as a “very large online platform” under Europe’s online safety rules.The findings come as Durov is fighting back against Russia’s efforts to block the messaging app in that country, which has long positioned itself as a messaging app that allows free speech but has simultaneously been used by some to share terrorist, sexual abuse, and cybercrime materials. Durov is under criminal investigation in France relating to alleged criminal activity taking place on Telegram, although he has consistently denied the allegations.A Telegram spokesperson tells WIRED that the company removes “millions” of pieces of content per day using “custom AI tools” and has policies in Europe that do not allow the promotion of violence, illegal sexual content including nonconsensual imagery, and other content such as doxing and selling illegal goods and services.Among the extensive types of abusive content and services observed by the AI Forensics researchers were frequent references to the access, publishing, and doxing of women’s private information, sharing their Instagram or TikTok content, as well as references to spying or hacking. “Victims are often named, tagged, and locatable via shared profile links,” the group’s report says.One translated post on Telegram titled “Professional hacking on commission” claimed to be able to give customers “access to phone gallery and extraction of photos and videos,” as well as “anonymous social media hacking.” Another message says: “I hack and recover any type of social media service. I can spy on your partner’s account. Send me a private message.”Across the dataset there were more than 18,000 references to spying or spy content. One post reads: “Hi, do you have the desire to spy on a girl’s gallery? We sell a bot that does it for info DM.” Meanwhile, users were observed asking if people could find phone numbers connected to Instagram accounts and other requests, “who exchanges spy photos and videos?”#Men #Buying #Hacking #Tools #Wives #Friendscrime,privacy,security,cybersecurity,hacking,surveillance,telegram
Tech-news

Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass friends, wives and girlfriends, and former partners, new research has uncovered. The findings, from a European nonprofit group, also say that the communities are involved in extensive trading, selling, and promotion of a huge variety of abusive content, including nonconsensual intimate images of women, so-called nudifying services, plus folders of images that sellers claim include child sexual abuse material and depictions of incest and rape.

Over six weeks earlier this year, researchers at the algorithmic auditing group AI Forensics analyzed nearly 2.8 million messages sent across 16 Italian and Spanish Telegram communities that are regularly posting abusive content targeting women and girls. More than 24,000 members of the Telegram groups and channels took part in posting 82,723 images, videos, and audio files over the course of the study, the analysis says. Many posts target celebrities and influencers, but men in the groups also frequently victimize women they know.

“We tend to forget that most victims are ordinary women who sometimes don’t even know that their pictures are shared or manipulated in these types of channels,” says Silvia Semenzin, a researcher at AI Forensics who previously exposed Italian Telegram channels engaging in similar behavior as far back as 2019. “The majority of this violence is directed towards people who the perpetrators know,” she says, suggesting that Telegram, which has over 1 billion monthly active users, according to company founder Pavel Durov, should be subject to stricter regulation and classed as a “very large online platform” under Europe’s online safety rules.

The findings come as Durov is fighting back against Russia’s efforts to block the messaging app in that country, which has long positioned itself as a messaging app that allows free speech but has simultaneously been used by some to share terrorist, sexual abuse, and cybercrime materials. Durov is under criminal investigation in France relating to alleged criminal activity taking place on Telegram, although he has consistently denied the allegations.

A Telegram spokesperson tells WIRED that the company removes “millions” of pieces of content per day using “custom AI tools” and has policies in Europe that do not allow the promotion of violence, illegal sexual content including nonconsensual imagery, and other content such as doxing and selling illegal goods and services.

Among the extensive types of abusive content and services observed by the AI Forensics researchers were frequent references to the access, publishing, and doxing of women’s private information, sharing their Instagram or TikTok content, as well as references to spying or hacking. “Victims are often named, tagged, and locatable via shared profile links,” the group’s report says.

One translated post on Telegram titled “Professional hacking on commission” claimed to be able to give customers “access to phone gallery and extraction of photos and videos,” as well as “anonymous social media hacking.” Another message says: “I hack and recover any type of social media service. I can spy on your partner’s account. Send me a private message.”

Across the dataset there were more than 18,000 references to spying or spy content. One post reads: “Hi, do you have the desire to spy on a girl’s gallery? We sell a bot that does it for info DM.” Meanwhile, users were observed asking if people could find phone numbers connected to Instagram accounts and other requests, “who exchanges spy photos and videos?”

#Men #Buying #Hacking #Tools #Wives #Friendscrime,privacy,security,cybersecurity,hacking,surveillance,telegram">Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Thousands of men are members of Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass friends, wives and girlfriends, and former partners, new research has uncovered. The findings, from a European nonprofit group, also say that the communities are involved in extensive trading, selling, and promotion of a huge variety of abusive content, including nonconsensual intimate images of women, so-called nudifying services, plus folders of images that sellers claim include child sexual abuse material and depictions of incest and rape.

Over six weeks earlier this year, researchers at the algorithmic auditing group AI Forensics analyzed nearly 2.8 million messages sent across 16 Italian and Spanish Telegram communities that are regularly posting abusive content targeting women and girls. More than 24,000 members of the Telegram groups and channels took part in posting 82,723 images, videos, and audio files over the course of the study, the analysis says. Many posts target celebrities and influencers, but men in the groups also frequently victimize women they know.

“We tend to forget that most victims are ordinary women who sometimes don’t even know that their pictures are shared or manipulated in these types of channels,” says Silvia Semenzin, a researcher at AI Forensics who previously exposed Italian Telegram channels engaging in similar behavior as far back as 2019. “The majority of this violence is directed towards people who the perpetrators know,” she says, suggesting that Telegram, which has over 1 billion monthly active users, according to company founder Pavel Durov, should be subject to stricter regulation and classed as a “very large online platform” under Europe’s online safety rules.

The findings come as Durov is fighting back against Russia’s efforts to block the messaging app in that country, which has long positioned itself as a messaging app that allows free speech but has simultaneously been used by some to share terrorist, sexual abuse, and cybercrime materials. Durov is under criminal investigation in France relating to alleged criminal activity taking place on Telegram, although he has consistently denied the allegations.

A Telegram spokesperson tells WIRED that the company removes “millions” of pieces of content per day using “custom AI tools” and has policies in Europe that do not allow the promotion of violence, illegal sexual content including nonconsensual imagery, and other content such as doxing and selling illegal goods and services.

Among the extensive types of abusive content and services observed by the AI Forensics researchers were frequent references to the access, publishing, and doxing of women’s private information, sharing their Instagram or TikTok content, as well as references to spying or hacking. “Victims are often named, tagged, and locatable via shared profile links,” the group’s report says.

One translated post on Telegram titled “Professional hacking on commission” claimed to be able to give customers “access to phone gallery and extraction of photos and videos,” as well as “anonymous social media hacking.” Another message says: “I hack and recover any type of social media service. I can spy on your partner’s account. Send me a private message.”

Across the dataset there were more than 18,000 references to spying or spy content. One post reads: “Hi, do you have the desire to spy on a girl’s gallery? We sell a bot that does it for info DM.” Meanwhile, users were observed asking if people could find phone numbers connected to Instagram accounts and other requests, “who exchanges spy photos and videos?”

#Men #Buying #Hacking #Tools #Wives #Friendscrime,privacy,security,cybersecurity,hacking,surveillance,telegram

Thousands of men are members of Telegram groups and channels that advertise and sell hacking…