Show more

This is the same feature that :jester: added here several months ago, where file hashes are scraped and compared to a database of known child exploitation images.

The thing that has people concerned with Apple is that now it won't just be images in your iCloud, but also those stored locally on users' own devices.

Apple will scan photos stored on iPhones and iCloud for child abuse imagery - The Verge
theverge.com/2021/8/5/22611305

The Cryptocurrency Surveillance Provision Buried in the Infrastructure Bill is a Disaster for Digital Privacy | Electronic Frontier Foundation
eff.org/deeplinks/2021/08/cryp

Here is an example of why you should never install any of those off-brand "security" or "protection" apps.

New Android Malware Uses VNC to Spy and Steal Passwords from Victims
thehackernews.com/2021/07/new-

I know some of you have issues with the author, but he makes some very good points.

The Insecurity Industry - by Edward Snowden - Continuing Ed — with Edward Snowden
edwardsnowden.substack.com/p/n

RANSOMWARE RESPONSE CHECKLIST
The Cybersecurity and Infrastructure Security Agency (CISA) strongly recommends responding to ransomware by using the following checklist provided in a Joint CISA and Multi-State Information Sharing and Analysis Center (MS-ISAC) Ransomware Guide. This information will take you through the response process from detection to containment and eradication. Be sure to move through the first three steps in sequence.

cisa.gov/stopransomware/ive-be

nosanitize

It gets worse. The website related to the app you need to run the test gizmo has a malware redirect.

twitter.com/netspooky/status/1

Oh, but no one needs strong encryption, right?

///

It’s official. Your private communications can (and will) be spied on - European Digital Rights (EDRi)
edri.org/our-work/its-official

Well, it looks like I need to ressurect the tag.

For the past week, I've had bunches of ads leaking through, even though my pi-hole is working fine.

Turns out I had been tinkering in DD-WRT a while back, and I had accidentally changed a setting that allowed DNS requests to bypass the pi-hole. Not only that, I was allowing Firefox to send DoH requests, creating yet another bypass.

I throw myself at the mercy of the court.

This is my first experience at a hotel using a mobile phone app as a keycard. It seems to transmit using BLE (Bluetooth Low-Energy).

Great for convenience, but I'm not sure how trustworthy it is, even though the permissions aren't egregious. I'll be disabling or uninstalling it until the next time I stay at one of these properties just to be safe.

We Got the Phone the FBI Secretly Sold to Criminals

'Anom’ phones used in an FBI honeypot are mysteriously showing up on the secondary market. We bought one.

vice.com/en/article/n7b4gg/ano

I just received a text 2FA verification code from TikTok on my real phone number, and then a few minutes later on my Google Voice number.

I have never used TikTok.

Seems a bit odd that someone would "accidentally" use both my real number and then my Google Voice number for their account 2FA, huh? 🤔

Show more

ᏤⵁŁ₮ƦⵁИł€

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.