Search
Items tagged with: infosec
I created a #Python version of Googerteller by @bert_hubert using his list of Google servers & scapy sniffer. It beeps and prints all Google IPs your computer connects to.
Go turn it on and surf around 😎👍 It's ridiculous just how much of the web connects you to Google at some point. Given your IP, it's a piece of cake to profile your traffic with that data. #infosec
Here on #github: https://github.com/luzmediach/googertellerpy
GitHub - luzmediach/googertellerpy: A Python implementation of Bert Hubert's Googerteller
A Python implementation of Bert Hubert's Googerteller - GitHub - luzmediach/googertellerpy: A Python implementation of Bert Hubert's GoogertellerGitHub
Mute and block only works if they stick to one account, which they don't. Mine has about 10 that I know of so far.
Instance blocking helps on occasion, but again, you can register accounts on many instances.
Can you filter words, sure.
Telling me to stay off socials is not a productive or useful answer. Thanks.
I am simply speaking up because others are experiencing prolonged and targeted harassment too and I want you to know it exists here.
Please read all the comments some are useful, many are not. 😅
Here are my links if you'd like to support my work or join my email list:
I work to protect privacy, profit & peace of mind. Need a consult? https://lockdownyourlife.as.me
Being stalked/harassed: https://lockdownyourlife.com/7-steps-protect/
Join the email list: https://lockdownyourlife.mykajabi.com/thetwitter
Support my work: https://ko-fi.com/lockdownyourlife
#harassment #stalking #infosec #WomenInTech #techie #InformationSecurity
Protect Yourself from Stalking & Harassment | Lock Down Your Life
How you protect yourself, depends on the type of stalker, the laws in your region, and the aggressiveness of the harasser/stalker.lockitdown (Lock Down Your Life)
Journalists, refugees, people at-risk and from marginalized groups, and we all, really, need to *know* that tech people supporting them cannot be legally forced to disclose the (often very personal or sensitive) data they gain access to while providing tech support.
Data that is shared with them in confidence, and which is often necessary to render tech help at all.
#InfoSec #Legal
#OpenSource #passwordManager #LastPass
cc @keepassxc
I think those people have not been at this long.
All companies eventually get hacked. All companies eventually will be breached, and it's not if; it's when.
And if you are a company storing millions of passwords, you better believe you are being attacked constantly.
Given that world, I want a company that:
- is transparent and lets their users know immediately when something is up and gives as many details as they can.
- can actually detect incidents and has a solid process to follow in dealing with them and communicating about them
It merely means they either a) can't detect incidents or b) are hiding them from you
If you are using a password manager that is silent about breaches, near misses, incidents, etc., That should be cause for concern.
Did information security and infrastructure for #PanamaPapers journalists, fought #ACTA on the streets and in meetings, helped write the book on #NetNeutrality, started a hackerspace and a half, and wrote a bunch of code.
Media literacy is a human right. Protocols, not platforms. Communities, not customers. User-Authored Works, not user-generated content.
#Privacy #InfoSec #FreeCulture #FLOSS
I have been informed that there are more servers now.
Awoo.
#introductions #web #freeSoftware #accessibility #polyam #queeringTech #anarchy #goth #industrial #cyberpunk #plants #zines #openbsd #nyc #stockholm #boston #hiking #winterCamping #carepunk #infosec #ethicsInTech #consent #glitter
Many custom/classic options: unique mac address spoof + hostname + signal strength + SSID (including customized boot options added today) w/unique settings (including multiple types of continual changing randomization or device/brand mimic randomization) + protection checks from leaks (on static settings) (Continued...)
#Privacy #HumanRights #Linux #WiPri #metadata #anonymous #Infosec
Tor Download: http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/WiPri/archive/master.tar.gz
Opening screenshots:
Why can't we have nice things?
Microsoft. Microsoft is why we can't have nice things.
Pridefall Discord Attack 2022 | How To Recover From Scams?
Pridefall Discord Attack is a cyber-attack event that takes place on all social media platforms to harass and target the LGBTQ+ community. Read along with this page and you will learn detailed information about the Pridefall Discord Attack 2022.Shivangi Gupta (Pathofex)
https://web.archive.org/web/20180429220059if_/https://twitter.com/tmobileat/status/982187919061303296
#InfoSec #TMobile
T-Mobile Austria on Twitter
“@Korni22 @c_pellegrino @PWTooStrong @Telekom_hilft @Korni22 What if this doesn't happen because our security is amazingly good? ^Käthe”Twitter
https://www.digitalrights.ie/facebook/
#privacy #security #infosec
https://scotthelme.co.uk/introducing-another-free-ca-as-an-alternative-to-lets-encrypt/
It's always good to have alternatives around. ZeroSSL appears to be a European company that now provides free TLS certificates using the ACME protocol.
#TLS #SSL #CA #infosec #letsencrypt
On the privacy of online login forms inputs
I'm surprised but not shocked by this result. It seems to me that many people are confused about why online login forms have two fields but only one of them hides the input.
On one hand, if all the credentials are meant to be private, why not add a third or a fourth input field with more private stuff? This would be more secure, right? On the other hand, if someone is using a weak password, what is the likelihood their login is easily guessable as well?
I personally believe online login forms have two fields for two different kind of data: an identifier that shouldn't be considered private, because the password/phrase field is already there for that specific purpose. As a result, I fully support letting users fill the login field with as many different identifiers they can have, including email addresses and public usernames, because it is massively more convenient without compromising on security since there is a password.