Search
Items tagged with: Security
New Privacy Guides video πΊβ¨
by @jw
If you've wondered about
the difference between:
Privacy,
Security,
and Anonymity
And why some privacy-focused
services are worth using even when they don't provide perfect anonymity, watch this!
It's truly an amazing short video!
Everyone should watch it π
https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/
#PrivacyGuides #Privacy #Security #Anonymity
Stop Confusing Privacy, Anonymity, and Security
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what tools are best for you.www.privacyguides.org
FreeTube β Watch YouTube without ads, without login, and with private playlists.
#google #YouTube #privacy #ad #safety #security #InfoSec #data #advertisement #tech #technology #BigTech #app #apps #tip #tips
FreeTube - The Private YouTube Client
FreeTube is a feature-rich and user-friendly YouTube client with a focus on privacy.freetubeapp.io
#Research finds 12,000 βLiveβ #API Keys and ΓPasswords in #DeepSeek's #Training Data
#ai #technology #security #privacy #fail #password #Problem #cybersecurity #news #Software
Research finds 12,000 βLiveβ API Keys and Passwords in DeepSeek's Training Data β Truffle Security Co.
We scanned Common Crawl - a massive dataset used to train LLMs like DeepSeek - and found ~12,000 hardcoded live API keys and passwords. This highlights a growing issue: LLMs trained on insecure code may inadvertently generate unsafe outputs.trufflesecurity.com
UK government demands access to Apple users' encrypted data https://www.bbc.com/news/articles/c20g288yldko
This is an absolutely stupid idea
UK government demands access to Apple users' encrypted data
The Home Office served the notice to the tech giant under the Investigatory Powers Act.Zoe Kleinman (BBC News)
#Google begins requiring #JavaScript for Google #Search
search: https://techcrunch.com/2025/01/17/google-begins-requiring-javascript-for-google-search/
βEnabling JavaScript allows us to better protect our services and users from bots and evolving forms of abuse and spam,β the spokesperson told TechCrunch, βand to provide the most relevant and up-to-date information.β
In other words it is for better tracking and surveillance ... π
#web #www #security #news #internet #browser #tracking #cybersecurity
Google begins requiring JavaScript for Google Search | TechCrunch
Google says it has begun requiring users to turn on JavaScript in order to use Google Search, possibly in an effort to block certain SEO tools.Kyle Wiggers (TechCrunch)
Millions of Accounts Vulnerable due to sGoogleβs #OAuth Flaw
Source: https://trufflesecurity.com/blog/millions-at-risk-due-to-google-s-oauth-flaw
#cybersecurity #security #identity #login #fail #Software #Problem #internet #news #identification #configuration
Millions of Accounts Vulnerable due to Googleβs OAuth Flaw β Truffle Security Co.
Millions of Americans can have their data stolen right now because of a deficiency in Googleβs βSign in with Googleβ authentication flow. If youβve worked for a startup in the past - especially one that has since shut down - you might be vulnerable.trufflesecurity.com
https://frederikbraun.de/home-assistant-can-not-be-secured-for-internet-access.html
https://thecopenhagenbook.com/
π΄ Agenda na #JesienLinuksowa juΕΌ dostΔpna! π΄
W programie: #DevOps, #security, #gaming, #prywatnoΕΔ i wiΔcej!
GoΕcie specjalni: Kuba Mrugalski (@uwteam), Tomasz ZieliΕski (@infzakladowy)
Dodatkowo: π¬ Unconference β‘ Lightning Talks π Fedora release party!
Do zobaczenia! π₯³
Do you want to help make software safer? Find the bugs in our ntpd-rs!
The ntpd-rs Bug Bounty Program offers a reward to anyone who finds a qualifying vulnerability.
Read the details here: https://yeswehack.com/programs/pendulum-bug-bounty-program
This Bug Bounty Program is organized and funded by @sovtechfund . Read more about this initiative here: https://www.sovereigntechfund.de/programs/bug-resilience/
ntpd-rs Bug Bounty Program bug bounty program - YesWeHack
ntpd-rs Bug Bounty Program bug bounty program detailsYesWeHack #1 Bug Bounty Platform in Europe
So now that we all understand that thanklessly relying on free work of overworked maintainers is a problem, how about we put our money where our mouth is?
I think @AndresFreundTec needs a fat bonus check for saving our asses.
And Lasse Collin needs a lot of support, and probably a nice vacation.
I pledge $100, for starters.
Now how can we make sure to send the funds to the correct people?
Or is there already any fundraiser that I missed?
βGitHub Disables The XZ Repository Following Today's Malicious Disclosureβ
https://www.phoronix.com/news/GitHub-Disables-XZ-Repo
GitHub Disables The XZ Repository Following Today's Malicious Disclosure
Today's disclosure of XZ upstream release packages containing malicious code to compromise remote SSH access has certainly been an Easter weekend surprise..www.phoronix.com
Millions Of #google #whatsapp #Facebook #2FA #Security Codes #Leak Online
Security experts advise against using SMS messages for two-factor authentication codes due to their vulnerability to interception or compromise. Recently, a security researcher discovered an unsecured database on the internet containing millions of such codes, which could be easily accessed by anyone.
#news #tech #technews #technology #privacy
Millions Of Google, WhatsApp, Facebook 2FA Security Codes Leak Online
A security researcher has discovered an unsecured database on the internet containing millions of two-factor authentication security codes. Here's what you need to know.Davey Winder (Forbes)
Y'all know not to use #Temu right? Right???
Temu app contains βmost dangerousβ #spyware in circulation: class action lawsuit | Fashion Dive
https://www.fashiondive.com/news/temu-class-action-lawsuit-data-collection/699328/
Temu app contains βmost dangerousβ spyware in circulation: class action lawsuit
The complaint alleges that the fast fashion giant gains access to βliterally everything on your phoneβ once its app is downloaded.Fashion Dive
But to be fair ...
Is it the implementation language being the main issue? Or is it the flexibility of extending it with plugins and that it is effectively a setuid tool, granting root access immediately when an unprivileged user starts the program (the privileges are reduced first when it has parsed the sudo config).
Sudo is a nice tool from the user's side. But security wise it's a disastrous approach. Privileges should first be elevated *after* the config has been parsed and the expected privilege level has been established. Then the tool should ideally jump to that privilege level directly.
This post introduces some new ideas ... https://tim.siosm.fr/blog/2023/12/19/ssh-over-unix-socket/
It's not a perfect approach in all cases. But it gets rid of the setuid issue.
sudo without a setuid binary or SSH over a UNIX socket
In this post, I will detail how to replace sudo (a setuid binary) by using SSH over a local UNIX socket. I am of the opinion that setuid/setgid binaries are a UNIX legacy that should be deprecated.Siosm's blog
Seriously, WTF @protonmail ?
#YouHadOneJob as #eMail #Provider and that is to get shit reliably sent and recieved.
If that's too hard then how should anyone trust them re: #security and #privacy?
Spoiler: Noine should!
https://www.youtube.com/watch?v=QCx_G_R0UmQ
ProtonMail Sends User IP and Device Info to Swiss Authorities.
Original articleshttps://mobile.twitter.com/tenacioustek/status/1434604102676271106https://techcrunch.com/2021/09/06/protonmail-logged-ip-address-of-french-a...YouTube
#BraveBrowser is installing VPNs without users' consent, even if you didn't willingly enable their #VPN service. Just stop using #Brave, it's garbage.
Edit: the services are disabled by default, but they were still installed with very little to no transparency about them towards the user, alongside all the other stuff that's often unwanted from Brave users (Pocket on Firefox is to blame too, lol.)
https://www.ghacks.net/2023/10/18/brave-is-installing-vpn-services-without-user-consent/
#Browser #Security #Privacy #OpenSource #FreeSoftware #LibreSoftware
Are your Google Docs safe from AI training?
With AI continuing its slow rise to prominence, consumers are concerned their personal content is being used to train Google's generative service.Jack Wallen (ZDNET)
https://lapcatsoftware.com/articles/2023/7/1.html
#security #privacy #firefox #wtf
Smartphones using the Snapdragon 630 chip were found to call home to Qualcomm without the consent of the user, bypassing the whole operating system. [β¦]
< SEE ATTACHMENT >
EDIT / UPDATE:
Martijn Braam took a look and provides a valuable counterstatement. Thx @bart
https://blog.brixit.nl/nitrokey-dissapoints-me/
Still without the actual data that gets transmitted though. Unless someone does it first I'll replicate the test setup myself tomorrow and post my findings here.
#privacy #security
#OpenSource #FreeSoftware #privacy #security #infosec
π€‘ #1Password becomes #spyware:
https://blog.1password.com/privacy-preserving-app-telemetry/
We're changing how we discover and prioritize improvements | 1Password
Learn about a new, privacy-preserving in-app telemetry system that 1Password is trialing with its employees.1Password
https://www.bleepingcomputer.com/news/security/us-sues-google-for-abusing-dominance-over-online-ad-market/
#Security
U.S. sues Google for abusing dominance over online ad market
The U.S. Justice Department has filed a federal lawsuitΒ today against Google for abusing its dominant position in the online advertising market.ΒSergiu Gatlan (BleepingComputer)
The hacker also stole an encryption key for a portion of the encrypted backups by accessing a cloud storage database shared by both LastPass and GoTo.
#news #tech #technology #security #privacy #Lastpass #breach #hacking
https://www.pcmag.com/news/lastpass-sibling-company-goto-loses-encrypted-backups-to-hackers
#Encryption alone is not #security, but its implementation, and some do it better and others just badly. If the single point of #failure is vulnerable, the rest is usually useless π
Please do not fall for #buzzwords and the associated #advertising promises π
#TikTok recommends self-harm and eating disorder content to some users within minutes of joining the platform, according to a new report published Wednesday by the Center for Countering Digital Hate ( #CCDH ).
#news #technology #tech #security #china
https://www.cbsnews.com/news/tiktok-pushes-potentially-harmful-content-to-users-as-often-as-every-39-seconds-study/
TikTok pushes potentially harmful content to users as often as every 39 seconds, study says
TikTok recommends self-harm and eating disorder content to some users within minutes of joining the platform, according to a new report published by the Center for Countering Digital Hate.CBS News
(Why yes, yes it isβ¦) :awesome:
* Or, if you want to take all the fun out of it, a base256 encoding of your ed25519 private key that is purposefully impractical to write down somewhere or type in so youβll be forced to practice good security hygiene and store it in your password manager.
#design #security #privacy #cryptography #kitten #SmallWeb #SmallTech
Also, we managed to avoid discussing CISA, Twitter, and all the other things on fire.
Episode 351 β Is security or usability a law of the universe?
Josh and Kurt talk about end to end encrypted messages. This has been a popular topic lately due to the Mastodon popularity. Mastodon has a uniquely insecure messaging system, but they arenβtβ¦Open Source Security
Getting an #SSL #certificate from #LetsEncrypt (or possibly anywhere) results _immediate_ #attack's on the host. It seems bots constantly monitoring new certs.
Keep in mind when pulling up new services.