North Korea has at least 1 WiFi network! The above screenshot was taken from the app, WiFi Map, which shows WiFis added by users (crowd-sourced). In this case, user “Trevan Baxter” added a WiFi network on December 23, 2018. The app first connects to the WiFi before adding it to the database to make sure it really exists.
The screenshot shows that the WiFi with the access point name, “LDSAccess”, and password, “Pioneer47”, exists at the “Ideals of Korean Workers Party Monument” in Pyongyang, North Korea. The connection is acceptable with 8.2 MB/s down and 4.8 MB/s up, thus it allows you to watch Netflix in HD in Pyonyang (Netflix recommends 5 MB/s down). Multiple independent reports claim that the internet in North Korea is not filtered; indeed, you can watch Netflix on your next trip to Pyongyang.
It is worth noting that the WiFi name “LDSAccess” with the password “Pioneer47” is used as a default in LDS churches, aka, the Mormon Church. Why this would pop up in North Korea can only be speculated.
WiFi hotspots aren’t new to Pyongyang, according to a report from nknews.org from 2015:
There are a number of Wi-Fi access points around Pyongyang which are exclusively for foreigners, […]
Only devices with foreigners-only SIM cards can access to Pyongyang’s Wi-Fi,” said Choi. “So ordinary citizens of Pyongyang can’t access it.”
The Pyongyang’s international airport was reported to have WiFi on December 23, 2017.
It was confirmed in 2018 that there is WiFi at the Pyongyang’s Potonggang Hotel (the article shows a picture of a Taiwanese “ZyXEL P-600” router).
The domain weleakinfo.com was seized yesterday by the FBI. The website shows a takedown notice and shows the logos of NCA, Politie, Police Service Northern Ireland, Department of Justice and Bundeskriminalamt. The note writes: This domain has been seizedThe domain for WELEAKINFO has been seized by the Federal Bureau of Investigation pursuant to a seizure
January 2020: OSINT Tool Update & Latest News 🕵🏻 OSINT Tools: Reverse Hash Lookup We have added a reverse hash lookup: https://intelx.io/tools?tab=hash The lookup takes as input a hash of type MD5, SHA1, SHA256, or SHA512. It then redirects the user to 3rd party sites which perform the reverse lookup. Potentially, it can be used
We are constantly indexing the latest whois data for our whois category. “Whois” data contains information about domain ownership. We recently indexed the whois data for October, November, and December 2019 which resulted in 21,168,724 selectors. We analyzed a small sample set (1 day, 2019-11-29) and these are the results: 75% of the data is