My ebooks and audiobooks (from @torbooks, @HoZ_Books, @mcsweeneys, and others) are for sale all over the net, but I sell 'em too, and when you buy 'em from me, I earn twice as much and you get books with no DRM and no license "agreements."
13/
I profiled security researcher and WireGuardVPN creator Jason A. Donenfeld for Business Insider. https://s3.amazonaws.com/external_clips/3677850/How_Jason_A._Donenfeld_created_secure_VPN_WireGuard__included_in_Linux_-_Business_Insider.pdf
Nice, @ooni’s Probe app recently added a test to validate connectivity to @riseup’s VPN.
RT @KimZetter@twitter.com
Former security technician for home security company ADT admitted he secretly accessed customers' home security cameras more than 9,600 times over 4+ yrs, particularly in homes of attractive women to spy on them while they undressed, slept, or had sex
https://www.buzzfeednews.com/article/salvadorhernandez/home-security-camera-hacked-adt
stop installing microphones and cameras inside and outside your homes, ffs
nyaa.si, a popular anime-focused torrent tracker, has had its source code removed from GitHub after the MPA filed a DMCA takedown request.
Read their lunacy here if you'd like: https://github.com/github/dmca/blob/master/2021/01/2021-01-14-mpa.md
@tails clients like Twidere allow users to toot and tweet from one interface to unlimited amounts of fediverse accounts, providing geographic, legal benefits. would love it if Tails had such an app built in
All communication in #signal goes through these tech giants: Amazon, Google, Microsoft and Cloudflare
Just texting goes through Amazon.
Group chat will also go through Google.
...
#GAFAM is toxic to free software, supports mass surveillance and a lot other very bad things. Supporting such companies means also supporting their culture and their dominance. It's never just about the privacy of a single person.
There are already over 20 Tor relay operators (>200 relays, > 10% exit capacity) that make use of the
tor ContactInfo information sharing specification (CIISS) to get some group wide graphs generated for their relays:
https://nusenu.github.io/OrNetStats/index.html#verified-operator-domains
Bellow is shown a sample graph by one of them:
@YourAnonRiots enterprises can buy Infoblox, which can include a private cloud DoH instance, which is ideal for WFH (working from home) remote management. Infoblox is one solution for “detecting” and “preventing malicious activities” via DNS, so it can work in parallel with TLS-intercepting forward web proxies (also cloud)
How one hacker's push to secure the internet became a crucial part of Mac, Linux, and Windows operating systems
@shiro i couldn't figure out a way to modify the key pair to add another email address identity. seems to be missing many features
wow. Ghost in the Shell: SAC_2045 is a thing. and it's good... https://en.wikipedia.org/wiki/Ghost_in_the_Shell:_SAC_2045
Squatters, looters wreck longtime Capitol Hill club Neighbours during COVID-19 closure
Privacy & security engineer in Seattle. Founder and volunteer Director for Emerald Onion.
# alts
FR - https://mastodon.partipirate.org/@yawnbox
DE - https://chaos.social/@yawnbox