Search
Items tagged with: security
"NEW: We’re suing several top Trump administration officials who discussed high-level national security deliberations over Signal for violations of the Federal Records Act and Administrative Procedure Act"
American Oversight
#SocialMedia #Hegseth #UKPolitics #Signal #Security
americanoversight.org/litigati…
American Oversight v. Hegseth, Gabbard, Ratcliffe, Bessent, Rubio, and NARA Regarding Military Actions Planned on Signal Messaging App - American Oversight
Lawsuit filed against Hegseth, Gabbard, Ratcliffe, Bessent, Rubio, and NARA concerning news reports that a journalist had been added to a Signal group chat among those containing potentially classified information about active military operations.American Oversight
#EdDavey, Ldr of the #UK’s Liberal Democrats:
“#JDVance & his mates clearly aren't fit to run a group chat, let alone the world's strongest #military force. It has to make our #security services nervous about the #intelligence we're sharing with them.”
“#Trump's #WhiteHouse can't be trusted. Their reckless approach to security means it's only a matter of time before British intelligence is leaked.
“The Govt must urgently review our intelligence-sharing arrangements with the US.”
#GeoPol #China #Thailand #US #HumanRights #Uyghurs
(1/n)
*"#Thai authorities deported a group of 40 #Uyghur men to #China last month"..."the hell those 40 #Uyghurs will face back in #Xinjiang"*
The last time #Bangkok did this was in 2015.
👉It is possible to see this as a precursor to the #US' waning geopolitical influence, as the disastrous #Trumpean #Foreign, #Economic, and #Security policies of the #AmericaFirst.👈 The...
dw.com/en/thailands-uyghur-dep…
Thailand's Uyghur deportations: Balancing China and the West
The recent deportation of more than 40 Uyghur refugees from Thailand has ignited global outrage, and raised questions about Bangkok's geopolitical stance between China and the West.David Hutt (Deutsche Welle)
Here is a collectively curated list of non-US-based alternatives to popular services, because it is time to prioritise our privacy, security, and digital sovereignty. Anyone know of others like this?
Contributions of new services entries is welcome.
Non-U.S. Alternatives List
github.com/anitwek/alternative…
#privacy #security and #digitalsovereignty.
GitHub - anitwek/alternatives-to-us: A curated list of non-U.S.-based alternatives to popular services, focusing on privacy and global accessibility.
A curated list of non-U.S.-based alternatives to popular services, focusing on privacy and global accessibility. - anitwek/alternatives-to-usGitHub
This is a friendly reminder that if you live in the United States or for some reason have to visit, you should turn OFF face ID and/or biometrics on your phone.
They ARE searching phones for any and all dissent against the fascist regime.
They CAN make you open if it your phone is just locked with face ID or fingerprint.
If it's locked with a password you at least have a chance to say nothing but LAWYER.
eff.org/document/eff-border-se…
gizmodo.com/stop-using-your-fa…
#Fascist #UnitedStates #CBP #ICE #Immigration #lawyer #security
Stop Using Your Face or Thumb to Unlock Your Phone
The laws surrounding 5th Amendment protections and biometric passwords are still undecided, so just turn it off.Kyle Barr (Gizmodo)
Employees at the #Cybersecurity & #Infrastructure #Security Agency…are struggling to protect the #US while the #Trump admin dismisses their colleagues & poisons…partnerships.
#MassLayoffs & weak leadership are taking a severe toll on the US govt’s #cyber #defense agency, undermining its ability to protect America from…adversaries bent on crippling infrastructure & #ransomware gangs…bleeding #SmallBusiness dry.
archive.is/2025.03.13-143433/w…
People talk a lot about hypothetical security and privacy situations, but the most important things you can do are the basics.
Turn off devices as needed.
Turn off location services always - only on when needed.
Get rid of always-on home and mobile assistants.
Stop using biometrics to unlock devices.
Take off your Ring Doorbell and cameras.
Use a password manager.
Use Proton or other encrypted mail.
Use cash.
Delete apps that spy.
Lock your SIM.
Monash University: Moving beyond ‘cyberwashing’ to ensure robust digital security. “A new Monash University report highlights the growing problem of organisations resorting to ‘cyberwashing’ to mislead the public about their data privacy practices and recommends measures to build a genuine culture of cybersecurity.”
If you are looking for a good password manager you can use from anywhere, there are plenty of excellent options to choose from. However, if you prefer to only store your passwords locally, KeePassXC is what you need. In our latest tutorial, we'll walk through setting up KeePassXC to work with your YubiKey as an additional factor to secure your local-only password database.
privacyguides.org/articles/202…
#KeePassXC #YubiKey #Security #Privacy #KeePass #KeePassX #PrivacyGuides #Article
KeePassXC + YubiKey: How to set up a local-only password manager
This tutorial demonstrates how to install the local-only password manager KeePassXC and secure a password database with YubiKey.www.privacyguides.org
New Privacy Guides article 🔐✨
by me:
If you want to keep your password manager local-only, KeePassXC is a great solution!
It's free,
Open-source,
Easy to install and use,
Doesn't require an account,
Works on Linux, macOS, and Windows,
And the team is here! 👉 @keepassxc
Here's how to set it up with a YubiKey: privacyguides.org/articles/202…
#PrivacyGuides #KeePassXC #Privacy #Security #PasswordManager #Passwords #FOSS
KeePassXC + YubiKey: How to set up a local-only password manager
This tutorial demonstrates how to install the local-only password manager KeePassXC and secure a password database with YubiKey.www.privacyguides.org
#cloudfare see your passwords . They admit it!
benjojo.co.uk/u/benjojo/h/cR4d…
blog.cloudflare.com/password-r…
Password reuse is rampant: nearly half of observed user logins are compromised
Nearly half of observed login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks and account takeovers on a massive scale.The Cloudflare Blog
Tell me I'm reading this blog post wrong. It reads as if Cloudflare is admitting to reading the login credentials of users of sites that use Cloudflare.
"Our data reveals that 52% of all detected authentication requests contain leaked passwords found in our database of over 15 billion records, including the Have I Been Pwned (HIBP) leaked password dataset."
h/t: @0xF21D
blog.cloudflare.com/password-r…
#infosec #security #cloudflare
Password reuse is rampant: nearly half of observed user logins are compromised
Nearly half of observed login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks and account takeovers on a massive scale.The Cloudflare Blog
New Privacy Guides video 📺✨
by @jw
If you've wondered about
the difference between:
Privacy,
Security,
and Anonymity
And why some privacy-focused
services are worth using even when they don't provide perfect anonymity, watch this!
It's truly an amazing short video!
Everyone should watch it 👇
privacyguides.org/videos/2025/…
#PrivacyGuides #Privacy #Security #Anonymity
Stop Confusing Privacy, Anonymity, and Security
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what tools are best for you.www.privacyguides.org
Everything you say to your Echo will be sent to Amazon starting on March 28
Amazon is killing a privacy feature to bolster Alexa+, the new subscription assistant.Scharon Harding (Ars Technica)
"Google refuses to deny it received encryption order from UK government"
The UK’s encryption-breaking order for a backdoor into iCloud isn’t a one-off.
The secret hearing happening RIGHT NOW is bigger than just Apple. If the government wins, our right to privacy and security falls.
Other services will be hit.
therecord.media/google-refuses…
Sign our petition ➡️ you.38degrees.org.uk/petitions…
#e2ee #encryption #apple #google #privacy #security #cybersecurity #ukpol #ukpolitics #tech
Google refuses to deny it received encryption order from UK government
U.S. lawmakers say Google has refused to deny that it received a Technical Capability Notice from the U.K. — a mechanism to access encrypted messages that Apple reportedly received.therecord.media
If you’re running a Windows 10 PC, make sure you download the latest update right now. This month’s Patch Tuesday update fixes six actively exploited vulnerabilities that could affect up to 240 million people.
#windows10 #update #patchtuesday #security
tomsguide.com/computing/online…
240 million Windows 10 users are vulnerable to six different hacker exploits — protect yourself now
Six active exploits are already in the wildJason England (Tom's Guide)
Oh really it was Ukraine that took down X on March 10? Not so fast.
Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. wired.com/story/x-ddos-attack-… #X #Musk #DDoS #cyberattack #cybersecurity #security #Ukraine #BotNet #Internet
🚨 BREAKING 🚨
ORG, Big Brother Watch and Index on Censorship call for the secret Tribunal into the UK Home Office's encryption-breaching order against Apple to be held in PUBLIC 🧑⚖️
There's a significant public interest in knowing why the UK government believes it can compel a private company to undermine the privacy and security of its users.
Read our joint letter ⬇️
openrightsgroup.org/press-rele…
#encryption #e2ee #Apple #investigatorypowersact #privacy #security #cybersecurity #ukpolitics #ukpol
Make the Investigatory Powers Tribunal on Apple Encryption a Public Hearing
Rights groups call for Apple’s closed appeal against the Home Office’s encryption-breaching order to be opened to the public.Open Rights Group
Whisper it, the showdown over Apple encryption is THIS WEEK ⏱️
🤐 A secret tribunal will hear the appeal against the UK government’s order to carve a backdoor into Apple’s encrypted services.
🛑 Our cybersecurity and privacy shouldn’t be decided in the shadows.
computerweekly.com/news/366620…
#encryption #Apple #privacy #cybersecurity #security #e2ee #ukpolitics #ukpol
Secret London tribunal to hear appeal in Apple vs government battle over encryption
Campaigners call for High Court hearing to be held in public as tech giant appeals against UK government order to open a backdoor into its encrypted iCloud serviceBill Goodwin (ComputerWeekly.com)
Comment: We are digitally unsovereign
The chaotic US policy is making Germany and Europe aware of their own dependency. We must finally act, says iX editor-in-chief Oliver Diedrich.
heise.de/en/opinion/Comment-We…
#saukontrovers #CloudDienste #Cybersecurity #Datenschutz #Digitalisierung #DonaldTrump #ElonMusk #Netzpolitik #Politik #Security #news
🚨BREAKING🚨 The French National Assembly removed the backdoor section from the amendment to the #Narcotrafic law.
Read here how Politicians tried to undermine everybody's #security: tuta.com/blog/france-surveilla…
🙏 And thank you for fighting against this with us. This is a great win for privacy, yet, the battle is not over. Together we are strong! 💪
#backdoor #encryption #privacy #security
France is about to pass the worst surveillance law in the EU. We must stop them now! | Tuta
An amendment to the “Nacrotrafic” law is moving to the French National Assembly. Remind your legislators that a backdoor for the good guys only is not possible.Tuta
DOGE threat: How government data would give an AI company extraordinary power
As DOGE taps into sensitive federal agency data repositories, many people fear what could happen to the data. One little-discussed but hugely consequential possibility: fueling Elon Musk’s xAI company.The Conversation
#Google begs owners of crippled #Chromecasts not to hit factory #reset - Expired #SSL cert kerfuffle leaves second-gen, #Audio gadgets useless
Source: theregister.com/2025/03/10/goo…
… with devices failing to cast due to an expired #security #certificate. The web giant is aware of the #breakdown and says a fix is in the works.
#fail #economy #customer #online #problem #news
Google begs owners of crippled Chromecasts not to hit factory reset
Expired SSL cert kerfuffle leaves second-gen, Audio gadgets uselessIain Thomson (The Register)
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Hackers use polymorphic browser extensions to mimic real add-ons, steal credentials, and hijack accounts. Affects Chrome, Edge, Brave, and more.The Hacker News
How to generate random #passwords from the #Linux command line
source: zdnet.com/article/how-to-gener…
#password #security #cybersecurity #commandline #command #software #pwgen #knowhow #knowledge #tutorial
How to generate random passwords from the Linux command line
Need a strong, random password? Linux makes it incredibly easy to generate one - no password manager required.Jack Wallen (ZDNET)
Be careful when entering the US as a #tourist 😱
1) Our daughter Becky, a 28-year-old #British tourist, has been caught up in the recent #immigration crackdown in the US. bsky.app/profile/jenniferlcrof…
2) Immigration agents arrest Palestinian activist who helped lead Columbia University protests: apnews.com/article/columbia-un…
3) ‘Like a horror movie’: German tourist detained by #ICE says she spent week in solitary confinement: 10news.com/like-a-horror-movie…
#politics #border #usa #problem #travel #migration #fail #security #news #horror #Despotism #humanrights
‘Like a horror movie’: German tourist detained by ICE says she spent week in solitary confinement
A German tourist is fighting to get released from an immigration detention center after she was denied entry at the San Diego border and taken into custody by ICE last month.Austin Grabish (ABC 10 News San Diego KGTV)
#HackerNews #Passwordless #Future #Security #Innovation #Tech #Trends #Cybersecurity
Toward a Passwordless Future
Privacy Guides is the most popular & trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life.www.privacyguides.org
This is what #Ukraine's former #nuclear shield looked like, which it gave up in exchange for security guarantees - for free, with nothing in return.
And now one of the "security guarantors" is waging a full-scale war against Ukraine, while the other is demanding that it hand over territory and natural resources in exchange for further "#security guarantees".
Thank you #america.
Thank you #trump.
The fox submits guidelines for securing the hen house.
techcrunch.com/2025/03/06/anth…
#anthropic #ai #llm #privacy #security
Anthropic submits AI policy recommendations to the White House | TechCrunch
Anthropic has submitted policy suggestions to the White House it says would better prepare America to capture the economic benefits of AI.Kyle Wiggers (TechCrunch)
🚨 BREAKING 🚨
Apple appeals the UK government’s order to backdoor its encrypted services.
The fight to save encryption continues. Why? Backdoors are a gift for criminals and predators.
We must keep our personal data and family photos secure. We need encryption.
theverge.com/news/623977/apple…
#Apple #encryption #privacy #security #e2ee #ukpolitics #ukpol
Apple reportedly challenges the UK’s secretive encryption crackdown
Apple is pushing back against the UK’s “backdoor” encryption order with an appeal to the Investigatory Powers Tribunal, according to a report from the Financial Times.Emma Roth (The Verge)
#Research finds 12,000 ‘Live’ #API Keys and ßPasswords in #DeepSeek's #Training Data
Source: trufflesecurity.com/blog/resea…
#ai #technology #security #privacy #fail #password #Problem #cybersecurity #news #Software
Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data ◆ Truffle Security Co.
We scanned Common Crawl - a massive dataset used to train LLMs like DeepSeek - and found ~12,000 hardcoded live API keys and passwords. This highlights a growing issue: LLMs trained on insecure code may inadvertently generate unsafe outputs.trufflesecurity.com
We deserve to live free from persecution. Where this is lacking in the physical world, many LGBTQIA+ people rely on encryption to find community, resources and support.
Attempts to break #e2ee are not only damaging to privacy, but also a security threat.
openrightsgroup.org/blog/queer…
#encryption #lgbtq #privacy #security #lgbt #lgbtqia #digitalrights