Forwarded from Bread Pilled (The Dark Traveler)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Digital Monkey Business (Matthew)
Don’t Buy Ring Or Other Home Surveillance Devices For Anyone, Ever
https://thefederalist.com/2019/12/23/dont-buy-ring-or-other-home-surveillance-devices-for-anyone-ever/
https://thefederalist.com/2019/12/23/dont-buy-ring-or-other-home-surveillance-devices-for-anyone-ever/
The Federalist
Don’t Buy Ring Or Other Home Surveillance Devices For Anyone, Ever
Easily hackable, super creepy, and massively Orwellian, Ring and other home surveillance tech give the illusion of protection while stealing your privacy.
Reminder to drop Windows and swap it for Fedora, MX-Linux, Debian, Manjaro etc.... As long as your IQ is higher than 80, you can do it. Give it a try
Forwarded from Le Renard Blanc ᛉ -> wfox.blog
This media is not supported in your browser
VIEW IN TELEGRAM
Windows sends screenshots every X minute to Microsoft
Merry Christmas to all Kings and Queens who make this channel great, everyone who has helped us, and everyone who is helping the good cause. Remember to stay secure, keep your information private from everyone, keep it FOSS, and Hail Victory!
Simple guide on hardening Firefox Quantum for Privacy & Security
https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-security
https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-security
How cucked each search engine really is. Mojeek, search encrypt, and searx.me, you allright for now
Forwarded from Linuxgram 🐧
10 networking guides for Linux sysadmins | Enable Sysadmin
https://www.redhat.com/sysadmin/networking-guides
https://www.redhat.com/sysadmin/networking-guides
This seems trivial to some of you, but it has to be said. Using a new username across the web is more important than you realize today.
Some months ago I was contacted by a guy that wanted to see what information was out there about him on the internet. He was not technically inclined and had informed that he had been using the same username for nearly a decade.
Given some free time I decided to humor the fellow. I took 10 minutes and ran his username through some basic searches which returned a plethora of information, but nothing very juicy at first.
After some digging I was able to locate his Photobucket account which he must have forgotten about some years ago. As it turns out he had again, used the same username.
What he didn’t account for was that he had been automatically uploading his photos there from both his phone and his scanner. He had scanned in very sensitive documents which revealed more information than I cared to know. I found everything from his marriage license to his unredacted tax filings from previous years.
I share this story because it highlights the importance not only of good infosec but also opsec. You don’t want to be that guy, so don’t be. If I can find this information easily and openly, so can our enemies.
So don’t make it easy for them. Be a thorn in their side. Make it plausible that you are not every unique username that you create. If you get really good at it you can switch VPN connections each time you throw on a new hat. Further validating the location aspect to forums that you frequent.
Stay safe out there. Hail victory!
Some months ago I was contacted by a guy that wanted to see what information was out there about him on the internet. He was not technically inclined and had informed that he had been using the same username for nearly a decade.
Given some free time I decided to humor the fellow. I took 10 minutes and ran his username through some basic searches which returned a plethora of information, but nothing very juicy at first.
After some digging I was able to locate his Photobucket account which he must have forgotten about some years ago. As it turns out he had again, used the same username.
What he didn’t account for was that he had been automatically uploading his photos there from both his phone and his scanner. He had scanned in very sensitive documents which revealed more information than I cared to know. I found everything from his marriage license to his unredacted tax filings from previous years.
I share this story because it highlights the importance not only of good infosec but also opsec. You don’t want to be that guy, so don’t be. If I can find this information easily and openly, so can our enemies.
So don’t make it easy for them. Be a thorn in their side. Make it plausible that you are not every unique username that you create. If you get really good at it you can switch VPN connections each time you throw on a new hat. Further validating the location aspect to forums that you frequent.
Stay safe out there. Hail victory!
Forwarded from Rebel Irie Music 💯 hemp 🌱SEED #hempseedcurrency
Telegraph
How to use Android without sacrificing your privacy - ProtonMail Blog
The smartphone is one of the most invasive devices ever invented. It’s easy to forget that, of course, because we are so familiar with them, and they are so useful. But while you might value your smartphone for the convenience it gives you, tech companies…