Cyber Security

22 readers
5 users here now

๐Ÿ•ต๐Ÿฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.

Questions and answers are encouraged. Be excellent to each other. ๐Ÿ•Š๏ธ

founded 2 months ago
MODERATORS
1
2
-4
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]
 
 

With the suspicious strategy to 'make digital advertising more private', we can be sure google:zilla has not been subverted by its major funders. Take steps to make sure you are in complete control of the hardware crypto components of your own devices. Or perhaps understand the consequences of disabling them.

3
4
5
 
 

Stop it right now. It does not help your threat environment. It just makes things worse.

6
7
10
submitted 3 weeks ago* (last edited 3 weeks ago) by [email protected] to c/[email protected]
 
 

Do not trust robots ... or mobile phones. Featuring Karsten Nohl, Berlin-based long time phone security researcher, this Veritasium episode is an easy introduction to the general public as to why you should question everything about your mobile devices.

(the issues outlined explain why some groups consider the use of alternate comms networks such as pagers, walkie talkies, meshtastic, etc)

Note for non-Googliness, the URL can work with invidious instances (such as yewtu.be) which may or may not be stable. just use the path /watch?v=wVyu7NB7W6Y

8
6
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 
 

Interesting adventure in exploring hidden consequences of outdated trust architectures ...

9
 
 

An Interesting start to historical mapping of hacker groups and more detail around the fringes and around the world would be fascinating ...

10
11
12