<p>Meine Datenschutz und Privatsphäre Übersicht 2025, für Jedermann 🔐</p><p>als PDF Datei:</p><p><a href="https://cryptpad.digitalcourage.de/file/#/2/file/vQv0YkkA+eOK5la9awQ0E+jg/p/" rel="nofollow" class="ellipsis" title="cryptpad.digitalcourage.de/file/#/2/file/vQv0YkkA+eOK5la9awQ0E+jg/p/"><span class="invisible">https://</span><span class="ellipsis">cryptpad.digitalcourage.de/fil</span><span class="invisible">e/#/2/file/vQv0YkkA+eOK5la9awQ0E+jg/p/</span></a></p><p>Passwort:</p><p> idFLSmEeHa#5w4D$"Jq</p><p><a href="/tags/dsgvo/" rel="tag">#DSGVO</a> <a href="/tags/tdddg/" rel="tag">#TDDDG</a> <a href="/tags/unplugtrump/" rel="tag">#unplugtrump</a> <br><a href="/tags/datenschutz/" rel="tag">#Datenschutz</a> <a href="/tags/privatsphäre/" rel="tag">#Privatsphäre</a> <a href="/tags/sicherheit/" rel="tag">#sicherheit</a> <a href="/tags/verschlüsselung/" rel="tag">#Verschlüsselung</a> <a href="/tags/adguard/" rel="tag">#Adguard</a><br><a href="/tags/encryption/" rel="tag">#encryption</a> <a href="/tags/wetell/" rel="tag">#WEtell</a> <a href="/tags/solokey/" rel="tag">#SoloKey</a> <a href="/tags/nitrokey/" rel="tag">#NitroKey</a> <a href="/tags/email/" rel="tag">#Email</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/pixelfed/" rel="tag">#Pixelfed</a> <a href="/tags/massenűberwachung/" rel="tag">#Massenűberwachung</a> <a href="/tags/leta/" rel="tag">#Leta</a><br><a href="/tags/google/" rel="tag">#Google</a> <a href="/tags/metadaten/" rel="tag">#Metadaten</a> <a href="/tags/whatsapp/" rel="tag">#WhatsApp</a> <a href="/tags/threema/" rel="tag">#Threema</a> <a href="/tags/cryptpad/" rel="tag">#Cryptpad</a> <a href="/tags/signal/" rel="tag">#Signal</a><br><a href="/tags/hateaid/" rel="tag">#Hateaid</a> <a href="/tags/cyberstalking/" rel="tag">#Cyberstalking</a> <a href="/tags/messenger/" rel="tag">#Messenger</a> <a href="/tags/browser/" rel="tag">#Browser</a> <a href="/tags/youtube/" rel="tag">#Youtube</a> <a href="/tags/newpipe/" rel="tag">#NewPipe</a> <a href="/tags/chatkontrolle/" rel="tag">#Chatkontrolle</a> <a href="/tags/nichtszuverbergen/" rel="tag">#nichtszuverbergen</a> <a href="/tags/überwachungskapitalismus/" rel="tag">#ÜberwachungsKapitalismus</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/apple/" rel="tag">#Apple</a> <a href="/tags/windows10/" rel="tag">#Windows10</a> <a href="/tags/linux/" rel="tag">#Linux</a> <a href="/tags/matrix/" rel="tag">#Matrix</a> <a href="/tags/mastodon/" rel="tag">#Mastodon</a> <a href="/tags/friendica/" rel="tag">#Friendica</a> <a href="/tags/fediverse/" rel="tag">#Fediverse</a> <a href="/tags/mastodir/" rel="tag">#Mastodir</a> <a href="/tags/loops/" rel="tag">#Loops</a> <a href="/tags/2fa/" rel="tag">#2FA</a> <a href="/tags/ransomware/" rel="tag">#Ransomware</a> <a href="/tags/foss/" rel="tag">#Foss</a> <a href="/tags/veracrypt/" rel="tag">#VeraCrypt</a> <a href="/tags/hateaid/" rel="tag">#HateAid</a> <a href="/tags/coreboot/" rel="tag">#Coreboot</a> <a href="/tags/volksverpetzer/" rel="tag">#Volksverpetzer</a> <a href="/tags/netzpolitik/" rel="tag">#Netzpolitik</a> <a href="/tags/openandroidinstaller/" rel="tag">#OpenAndroidInstaller</a> <a href="/tags/nobara/" rel="tag">#Nobara</a><br><a href="/tags/digitalisierung/" rel="tag">#Digitalisierung</a> <a href="/tags/fragdenstaat/" rel="tag">#FragdenStaat</a> <a href="/tags/shiftphone/" rel="tag">#Shiftphone</a> <a href="/tags/opensource/" rel="tag">#OpenSource</a> <a href="/tags/grapheneos/" rel="tag">#GrapheneOS</a> <a href="/tags/ccc/" rel="tag">#CCC</a> <a href="/tags/mail/" rel="tag">#Mail</a> <a href="/tags/mullvad/" rel="tag">#Mullvad</a> <a href="/tags/pgp/" rel="tag">#PGP</a> <a href="/tags/gnupg/" rel="tag">#GnuPG</a> <a href="/tags/dns/" rel="tag">#DNS</a> <a href="/tags/gaming/" rel="tag">#Gaming</a> <a href="/tags/linuxgaming/" rel="tag">#linuxgaming</a> <a href="/tags/lutris/" rel="tag">#Lutris</a> <a href="/tags/protondb/" rel="tag">#Protondb</a> <a href="/tags/eos/" rel="tag">#eOS</a> <a href="/tags/enshittification/" rel="tag">#Enshittification</a> <br><a href="/tags/bloatware/" rel="tag">#Bloatware</a> <a href="/tags/tpm/" rel="tag">#TPM</a> <a href="/tags/murena/" rel="tag">#Murena</a> <a href="/tags/liberapay/" rel="tag">#LiberaPay</a> <a href="/tags/gnutaler/" rel="tag">#GnuTaler</a> <a href="/tags/taler/" rel="tag">#Taler</a> <a href="/tags/preppingforfuture/" rel="tag">#PreppingforFuture</a><br><a href="/tags/fedilz/" rel="tag">#FediLZ</a> <a href="/tags/bluelz/" rel="tag">#BlueLZ</a> <a href="/tags/instalz/" rel="tag">#InstaLZ</a> <a href="/tags/threatmodel/" rel="tag">#ThreatModel</a><br><a href="/tags/floss/" rel="tag">#FLOSS</a> <a href="/tags/uefi/" rel="tag">#UEFI</a> <a href="/tags/medienkompetenz/" rel="tag">#Medienkompetenz</a></p>
cybersecurity
<p>🚨 Scam Alert: "Verify your Fedi account" Phishing Attempt 🚧</p><p>Attention everyone on Mastodon! There's a scam making the rounds where malicious actors impersonate moderators or admins. They send private messages or make posts that mimic notifications, claiming that your account needs verification. These messages often include a link for you to "complete the verification process."</p><p>⚠️ This is a Scam!</p><p>Your server admin will never ask you to click a link to verify your account.<br>No other admin from any other server will either, even if they appear to be part of the main Mastodon team.<br>If your account is suspended, you won't receive a message about it. Instead, you'll see a notification upon logging in that your account is temporarily suspended.</p><p>How to Identify the Scam:</p><p>Fake admin accounts often use names containing "moderator" or "admin," but this doesn't mean they are legitimate.<br>Legitimate admins or instance owners usually have a badge or marking on their profile indicating their role.</p><p>What to Do:</p><p>If you receive a message or post urging you to click a link to verify your account, report it immediately.<br>If you have any doubts about your account status, contact your server admin or moderation team directly.<br>To verify the authenticity of an admin or instance owner, visit the "About" page of your instance. This page typically lists contact information for the real team administering your instance.<br>Always be cautious when interacting with accounts claiming to be from Mastodon or your instance's admin team.</p><p>Important Reminder:</p><p>Mastodon does not perform age verification. If you receive a message or post claiming to be from Mastodon or your instance's admin team, always verify its authenticity before taking any action.</p><p>Reporting the Scam:</p><p>If you encounter this scam, report it to your instance's admin team and use relevant tags, such as <a href="/tags/fediblock/" rel="tag">#FediBlock</a>, to help raise awareness.</p><p>Personal Note:</p><p>I'm not a cybersecurity expert, but I find this new scam in the Fediverse quite interesting. If you feel like sharing your experiences with me, I would appreciate it! I'm looking to collect cases and get a broader view of this phishing attack. Maybe I'll even try to write a report about it. Feel free to tag me in any relevant posts.</p><p>Let's stay vigilant and help each other stay safe online!</p><p><a href="/tags/mastodon/" rel="tag">#Mastodon</a> <a href="/tags/fediverse/" rel="tag">#Fediverse</a> <a href="/tags/scamalert/" rel="tag">#ScamAlert</a> <a href="/tags/phishing/" rel="tag">#Phishing</a> <a href="/tags/cybersecurity/" rel="tag">#CyberSecurity</a> <a href="/tags/onlinesafety/" rel="tag">#OnlineSafety</a> <a href="/tags/fediblock/" rel="tag">#FediBlock</a> <a href="/tags/staysafe/" rel="tag">#StaySafe</a> <a href="/tags/techcommunity/" rel="tag">#TechCommunity</a> <a href="/tags/socialmedia/" rel="tag">#SocialMedia</a> <a href="/tags/scamawareness/" rel="tag">#ScamAwareness</a> <a href="/tags/securitytips/" rel="tag">#SecurityTips</a> <a href="/tags/reportscams/" rel="tag">#ReportScams</a> <a href="/tags/verifybeforeyoutrust/" rel="tag">#VerifyBeforeYouTrust</a></p>
Edited 267d ago
<p>A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers<br>—</p><p>The Pentagon bans foreign citizens from accessing highly sensitive data, but Microsoft bypasses this by using engineers in China and elsewhere to remotely instruct American “escorts” who may lack expertise to identify malicious code.</p><p><a href="https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post" rel="nofollow" class="ellipsis" title="www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/mic</span><span class="invisible">rosoft-digital-escorts-pentagon-defense-department-china-hackers?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post</span></a></p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/technology/" rel="tag">#Technology</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/government/" rel="tag">#Government</a> <a href="/tags/data/" rel="tag">#Data</a></p>
<p>Meine Datenschutz und Privatsphäre Übersicht 2025, für die Allgemeinheit 🕵️♂️ </p><p>Teilen erbeten ‼️ <img src="https://neodb.social/media/emoji/digitalcourage.social/BoostOK.png" class="emoji" alt=":BoostOK:" title=":BoostOK:"> </p><p>als PDF:</p><p><a href="https://cryptpad.digitalcourage.de/file/#/2/file/NdmBgSYkRCto8B+JmJkE9mQ4/" rel="nofollow" class="ellipsis" title="cryptpad.digitalcourage.de/file/#/2/file/NdmBgSYkRCto8B+JmJkE9mQ4/"><span class="invisible">https://</span><span class="ellipsis">cryptpad.digitalcourage.de/fil</span><span class="invisible">e/#/2/file/NdmBgSYkRCto8B+JmJkE9mQ4/</span></a></p><p> <a href="/tags/dsgvo/" rel="tag">#DSGVO</a> <a href="/tags/tdddg/" rel="tag">#TDDDG</a> ( <a href="/tags/unplugtrump/" rel="tag">#unplugtrump</a> )<br><a href="/tags/datenschutz/" rel="tag">#Datenschutz</a> <a href="/tags/privatsphäre/" rel="tag">#Privatsphäre</a> <a href="/tags/sicherheit/" rel="tag">#sicherheit</a> <a href="/tags/verschlüsselung/" rel="tag">#Verschlüsselung</a> <br><a href="/tags/encryption/" rel="tag">#encryption</a> <a href="/tags/wetell/" rel="tag">#WEtell</a> <a href="/tags/solokey/" rel="tag">#SoloKey</a> <a href="/tags/nitrokey/" rel="tag">#NitroKey</a> <a href="/tags/email/" rel="tag">#Email</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/pixelfed/" rel="tag">#Pixelfed</a> <a href="/tags/massenűberwachung/" rel="tag">#Massenűberwachung</a> <br><a href="/tags/google/" rel="tag">#Google</a> <a href="/tags/metadaten/" rel="tag">#Metadaten</a> <a href="/tags/whatsapp/" rel="tag">#WhatsApp</a> <a href="/tags/threema/" rel="tag">#Threema</a> <a href="/tags/cryptpad/" rel="tag">#Cryptpad</a> <a href="/tags/signal/" rel="tag">#Signal</a><br><a href="/tags/hateaid/" rel="tag">#Hateaid</a> <a href="/tags/cyberstalking/" rel="tag">#Cyberstalking</a> <a href="/tags/messenger/" rel="tag">#Messenger</a> <a href="/tags/browser/" rel="tag">#Browser</a> <a href="/tags/youtube/" rel="tag">#Youtube</a> <a href="/tags/newpipe/" rel="tag">#NewPipe</a> <a href="/tags/chatkontrolle/" rel="tag">#Chatkontrolle</a> <a href="/tags/nichtszuverbergen/" rel="tag">#nichtszuverbergen</a> <a href="/tags/überwachungskapitalismus/" rel="tag">#ÜberwachungsKapitalismus</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/apple/" rel="tag">#Apple</a> <a href="/tags/windows/" rel="tag">#Windows</a> <a href="/tags/linux/" rel="tag">#Linux</a> <a href="/tags/matrix/" rel="tag">#Matrix</a> <a href="/tags/mastodon/" rel="tag">#Mastodon</a> <a href="/tags/friendica/" rel="tag">#Friendica</a> <a href="/tags/fediverse/" rel="tag">#Fediverse</a> <a href="/tags/mastodir/" rel="tag">#Mastodir</a> <a href="/tags/loops/" rel="tag">#Loops</a> <a href="/tags/2fa/" rel="tag">#2FA</a> <a href="/tags/ransomware/" rel="tag">#Ransomware</a> <a href="/tags/foss/" rel="tag">#Foss</a> <a href="/tags/veracrypt/" rel="tag">#VeraCrypt</a> <a href="/tags/hateaid/" rel="tag">#HateAid</a> <a href="/tags/coreboot/" rel="tag">#Coreboot</a> <a href="/tags/volksverpetzer/" rel="tag">#Volksverpetzer</a> <a href="/tags/netzpolitik/" rel="tag">#Netzpolitik</a> <a href="/tags/digitalisierung/" rel="tag">#Digitalisierung</a> <a href="/tags/fragdenstaat/" rel="tag">#FragdenStaat</a> <a href="/tags/shiftphone/" rel="tag">#Shiftphone</a> <a href="/tags/opensource/" rel="tag">#OpenSource</a> <a href="/tags/grapheneos/" rel="tag">#GrapheneOS</a> <a href="/tags/ccc/" rel="tag">#CCC</a> <a href="/tags/mail/" rel="tag">#Mail</a> <a href="/tags/mullvad/" rel="tag">#Mullvad</a> <a href="/tags/pgp/" rel="tag">#PGP</a> <a href="/tags/gnupg/" rel="tag">#GnuPG</a> <a href="/tags/dns/" rel="tag">#DNS</a> <a href="/tags/gaming/" rel="tag">#Gaming</a> <a href="/tags/linuxgaming/" rel="tag">#linuxgaming</a> <a href="/tags/lutris/" rel="tag">#Lutris</a> <a href="/tags/protondb/" rel="tag">#Protondb</a> <a href="/tags/eos/" rel="tag">#eOS</a> <a href="/tags/enshittification/" rel="tag">#Enshittification</a> <br><a href="/tags/bloatware/" rel="tag">#Bloatware</a> <a href="/tags/tpm/" rel="tag">#TPM</a> <a href="/tags/murena/" rel="tag">#Murena</a> <a href="/tags/liberapay/" rel="tag">#LiberaPay</a> <a href="/tags/gnutaler/" rel="tag">#GnuTaler</a> <a href="/tags/taler/" rel="tag">#Taler</a> <a href="/tags/preppingforfuture/" rel="tag">#PreppingforFuture</a><br><a href="/tags/fedilz/" rel="tag">#FediLZ</a> <a href="/tags/bluelz/" rel="tag">#BlueLZ</a> <a href="/tags/instalz/" rel="tag">#InstaLZ</a> <a href="/tags/threatmodel/" rel="tag">#ThreatModel</a><br><a href="/tags/floss/" rel="tag">#FLOSS</a> <a href="/tags/uefi/" rel="tag">#UEFI</a> <a href="/tags/medienkompetenz/" rel="tag">#Medienkompetenz</a></p>
Oh, your service logged me out for my security? Great, I'll just open up the vault that contains my private keys so that I can open up the password manager with the master password of my other vault, which has the credentials I'll use to log back into my account. And then to finish the login process you'll send me a one-time password in clear text through SMS or email because those are the only options you offer for a "second factor". I feel much more secure now thank you.<br><br>(For clarity this is a sardonic post).<br><br><a href="/tags/infosec/" rel="tag">#InfoSec</a> <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a> <a href="/tags/security/" rel="tag">#security</a> <a href="/tags/web/" rel="tag">#web</a> <a href="/tags/dev/" rel="tag">#dev</a> <a href="/tags/tech/" rel="tag">#tech</a><br>
<p>Fuck.</p><p><a href="https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html" rel="nofollow" class="ellipsis" title="www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html"><span class="invisible">https://</span><span class="ellipsis">www.csoonline.com/article/3963</span><span class="invisible">190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html</span></a></p><p><a href="/tags/cybersecurity/" rel="tag">#CyberSecurity</a></p>
<p>A ProPublica investigation revealed how a little-known Microsoft program could leave some of the U.S. government’s most sensitive data vulnerable to hacking from its leading cyber adversary.</p><p>Here are the biggest takeaways from our reporting.<br><a href="https://www.propublica.org/article/microsoft-digital-escort-china-government-data-takeaways?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post" rel="nofollow" class="ellipsis" title="www.propublica.org/article/microsoft-digital-escort-china-government-data-takeaways?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/mic</span><span class="invisible">rosoft-digital-escort-china-government-data-takeaways?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post</span></a></p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/technology/" rel="tag">#Technology</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/cybercrime/" rel="tag">#Cybercrime</a> <a href="/tags/government/" rel="tag">#Government</a></p>
<p>Meine Datenschutz und Privatsphäre Übersicht 2025, für alle 🔐 <img src="https://neodb.social/media/emoji/digitalcourage.social/mastodon.png" class="emoji" alt=":mastodon:" title=":mastodon:"> </p><p>als PDF Datei:</p><p><a href="https://cryptpad.digitalcourage.de/file/#/2/file/8U95QSABpeqI+C-LJREL8I2l/" rel="nofollow" class="ellipsis" title="cryptpad.digitalcourage.de/file/#/2/file/8U95QSABpeqI+C-LJREL8I2l/"><span class="invisible">https://</span><span class="ellipsis">cryptpad.digitalcourage.de/fil</span><span class="invisible">e/#/2/file/8U95QSABpeqI+C-LJREL8I2l/</span></a></p><p><a href="/tags/dsgvo/" rel="tag">#DSGVO</a> <a href="/tags/tdddg/" rel="tag">#TDDDG</a> <a href="/tags/unplugtrump/" rel="tag">#unplugtrump</a> <br><a href="/tags/datenschutz/" rel="tag">#Datenschutz</a> <a href="/tags/privatsphäre/" rel="tag">#Privatsphäre</a> <a href="/tags/sicherheit/" rel="tag">#sicherheit</a> <a href="/tags/verschlüsselung/" rel="tag">#Verschlüsselung</a> <a href="/tags/adguard/" rel="tag">#Adguard</a><br><a href="/tags/encryption/" rel="tag">#encryption</a> <a href="/tags/wetell/" rel="tag">#WEtell</a> <a href="/tags/solokey/" rel="tag">#SoloKey</a> <a href="/tags/nitrokey/" rel="tag">#NitroKey</a> <a href="/tags/email/" rel="tag">#Email</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/pixelfed/" rel="tag">#Pixelfed</a> <a href="/tags/massenűberwachung/" rel="tag">#Massenűberwachung</a> <a href="/tags/leta/" rel="tag">#Leta</a><br><a href="/tags/google/" rel="tag">#Google</a> <a href="/tags/metadaten/" rel="tag">#Metadaten</a> <a href="/tags/whatsapp/" rel="tag">#WhatsApp</a> <a href="/tags/threema/" rel="tag">#Threema</a> <a href="/tags/cryptpad/" rel="tag">#Cryptpad</a> <a href="/tags/signal/" rel="tag">#Signal</a><br><a href="/tags/hateaid/" rel="tag">#Hateaid</a> <a href="/tags/cyberstalking/" rel="tag">#Cyberstalking</a> <a href="/tags/messenger/" rel="tag">#Messenger</a> <a href="/tags/browser/" rel="tag">#Browser</a> <a href="/tags/youtube/" rel="tag">#Youtube</a> <a href="/tags/newpipe/" rel="tag">#NewPipe</a> <a href="/tags/chatkontrolle/" rel="tag">#Chatkontrolle</a> <a href="/tags/nichtszuverbergen/" rel="tag">#nichtszuverbergen</a> <a href="/tags/überwachungskapitalismus/" rel="tag">#ÜberwachungsKapitalismus</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/apple/" rel="tag">#Apple</a> <a href="/tags/windows10/" rel="tag">#Windows10</a> <a href="/tags/linux/" rel="tag">#Linux</a> <a href="/tags/matrix/" rel="tag">#Matrix</a> <a href="/tags/mastodon/" rel="tag">#Mastodon</a> <a href="/tags/friendica/" rel="tag">#Friendica</a> <a href="/tags/fediverse/" rel="tag">#Fediverse</a> <a href="/tags/mastodir/" rel="tag">#Mastodir</a> <a href="/tags/loops/" rel="tag">#Loops</a> <a href="/tags/2fa/" rel="tag">#2FA</a> <a href="/tags/ransomware/" rel="tag">#Ransomware</a> <a href="/tags/foss/" rel="tag">#Foss</a> <a href="/tags/veracrypt/" rel="tag">#VeraCrypt</a> <a href="/tags/hateaid/" rel="tag">#HateAid</a> <a href="/tags/coreboot/" rel="tag">#Coreboot</a> <a href="/tags/volksverpetzer/" rel="tag">#Volksverpetzer</a> <a href="/tags/netzpolitik/" rel="tag">#Netzpolitik</a> <a href="/tags/endof10/" rel="tag">#endof10</a> <a href="/tags/openandroidinstaller/" rel="tag">#OpenAndroidInstaller</a> <a href="/tags/nobara/" rel="tag">#Nobara</a><br><a href="/tags/digitalisierung/" rel="tag">#Digitalisierung</a> <a href="/tags/fragdenstaat/" rel="tag">#FragdenStaat</a> <a href="/tags/shiftphone/" rel="tag">#Shiftphone</a> <a href="/tags/opensource/" rel="tag">#OpenSource</a> <a href="/tags/grapheneos/" rel="tag">#GrapheneOS</a> <a href="/tags/ccc/" rel="tag">#CCC</a> <a href="/tags/mail/" rel="tag">#Mail</a> <a href="/tags/mullvad/" rel="tag">#Mullvad</a> <a href="/tags/pgp/" rel="tag">#PGP</a> <a href="/tags/gnupg/" rel="tag">#GnuPG</a> <a href="/tags/dns/" rel="tag">#DNS</a> <a href="/tags/gaming/" rel="tag">#Gaming</a> <a href="/tags/linuxgaming/" rel="tag">#linuxgaming</a> <a href="/tags/lutris/" rel="tag">#Lutris</a> <a href="/tags/protondb/" rel="tag">#Protondb</a> <a href="/tags/eos/" rel="tag">#eOS</a> <a href="/tags/enshittification/" rel="tag">#Enshittification</a> <br><a href="/tags/bloatware/" rel="tag">#Bloatware</a> <a href="/tags/tpm/" rel="tag">#TPM</a> <a href="/tags/murena/" rel="tag">#Murena</a> <a href="/tags/liberapay/" rel="tag">#LiberaPay</a> <a href="/tags/gnutaler/" rel="tag">#GnuTaler</a> <a href="/tags/taler/" rel="tag">#Taler</a> <a href="/tags/preppingforfuture/" rel="tag">#PreppingforFuture</a><br><a href="/tags/fedilz/" rel="tag">#FediLZ</a> <a href="/tags/bluelz/" rel="tag">#BlueLZ</a> <a href="/tags/instalz/" rel="tag">#InstaLZ</a> <a href="/tags/threatmodel/" rel="tag">#ThreatModel</a><br><a href="/tags/floss/" rel="tag">#FLOSS</a> <a href="/tags/uefi/" rel="tag">#UEFI</a> <a href="/tags/medienkompetenz/" rel="tag">#Medienkompetenz</a></p>
<p>Microsoft says it will no longer use China-based engineers to support the Pentagon. But ProPublica found that the tech giant has relied on its global workforce for years to support other federal clients, including the Justice Department.<br><a href="https://www.propublica.org/article/microsoft-tech-support-government-cybersecurity-china-doj-treasury?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post" rel="nofollow" class="ellipsis" title="www.propublica.org/article/microsoft-tech-support-government-cybersecurity-china-doj-treasury?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/mic</span><span class="invisible">rosoft-tech-support-government-cybersecurity-china-doj-treasury?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post</span></a></p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/technology/" rel="tag">#Technology</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/pentagon/" rel="tag">#Pentagon</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/defense/" rel="tag">#Defense</a> <a href="/tags/china/" rel="tag">#China</a></p>
Edited 255d ago
<p>Meine Datenschutz und Privatsphäre Übersicht 2025, für alle 🔐 <img src="https://neodb.social/media/emoji/digitalcourage.social/mastodon.png" class="emoji" alt=":mastodon:" title=":mastodon:"> </p><p>als PDF Datei:</p><p><a href="https://cryptpad.digitalcourage.de/file/#/2/file/8U95QSABpeqI+C-LJREL8I2l/" rel="nofollow" class="ellipsis" title="cryptpad.digitalcourage.de/file/#/2/file/8U95QSABpeqI+C-LJREL8I2l/"><span class="invisible">https://</span><span class="ellipsis">cryptpad.digitalcourage.de/fil</span><span class="invisible">e/#/2/file/8U95QSABpeqI+C-LJREL8I2l/</span></a></p><p><a href="/tags/dsgvo/" rel="tag">#DSGVO</a> <a href="/tags/tdddg/" rel="tag">#TDDDG</a> <a href="/tags/unplugtrump/" rel="tag">#unplugtrump</a> <br><a href="/tags/datenschutz/" rel="tag">#Datenschutz</a> <a href="/tags/privatsphäre/" rel="tag">#Privatsphäre</a> <a href="/tags/sicherheit/" rel="tag">#sicherheit</a> <a href="/tags/verschlüsselung/" rel="tag">#Verschlüsselung</a> <a href="/tags/adguard/" rel="tag">#Adguard</a><br><a href="/tags/encryption/" rel="tag">#encryption</a> <a href="/tags/wetell/" rel="tag">#WEtell</a> <a href="/tags/solokey/" rel="tag">#SoloKey</a> <a href="/tags/nitrokey/" rel="tag">#NitroKey</a> <a href="/tags/email/" rel="tag">#Email</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/pixelfed/" rel="tag">#Pixelfed</a> <a href="/tags/massenűberwachung/" rel="tag">#Massenűberwachung</a> <a href="/tags/leta/" rel="tag">#Leta</a><br><a href="/tags/google/" rel="tag">#Google</a> <a href="/tags/metadaten/" rel="tag">#Metadaten</a> <a href="/tags/whatsapp/" rel="tag">#WhatsApp</a> <a href="/tags/threema/" rel="tag">#Threema</a> <a href="/tags/cryptpad/" rel="tag">#Cryptpad</a> <a href="/tags/signal/" rel="tag">#Signal</a><br><a href="/tags/hateaid/" rel="tag">#Hateaid</a> <a href="/tags/cyberstalking/" rel="tag">#Cyberstalking</a> <a href="/tags/messenger/" rel="tag">#Messenger</a> <a href="/tags/browser/" rel="tag">#Browser</a> <a href="/tags/youtube/" rel="tag">#Youtube</a> <a href="/tags/newpipe/" rel="tag">#NewPipe</a> <a href="/tags/chatkontrolle/" rel="tag">#Chatkontrolle</a> <a href="/tags/nichtszuverbergen/" rel="tag">#nichtszuverbergen</a> <a href="/tags/überwachungskapitalismus/" rel="tag">#ÜberwachungsKapitalismus</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/apple/" rel="tag">#Apple</a> <a href="/tags/windows10/" rel="tag">#Windows10</a> <a href="/tags/linux/" rel="tag">#Linux</a> <a href="/tags/matrix/" rel="tag">#Matrix</a> <a href="/tags/mastodon/" rel="tag">#Mastodon</a> <a href="/tags/friendica/" rel="tag">#Friendica</a> <a href="/tags/fediverse/" rel="tag">#Fediverse</a> <a href="/tags/mastodir/" rel="tag">#Mastodir</a> <a href="/tags/loops/" rel="tag">#Loops</a> <a href="/tags/2fa/" rel="tag">#2FA</a> <a href="/tags/ransomware/" rel="tag">#Ransomware</a> <a href="/tags/foss/" rel="tag">#Foss</a> <a href="/tags/veracrypt/" rel="tag">#VeraCrypt</a> <a href="/tags/hateaid/" rel="tag">#HateAid</a> <a href="/tags/coreboot/" rel="tag">#Coreboot</a> <a href="/tags/volksverpetzer/" rel="tag">#Volksverpetzer</a> <a href="/tags/netzpolitik/" rel="tag">#Netzpolitik</a> <a href="/tags/endof10/" rel="tag">#endof10</a> <a href="/tags/openandroidinstaller/" rel="tag">#OpenAndroidInstaller</a> <a href="/tags/nobara/" rel="tag">#Nobara</a><br><a href="/tags/digitalisierung/" rel="tag">#Digitalisierung</a> <a href="/tags/fragdenstaat/" rel="tag">#FragdenStaat</a> <a href="/tags/shiftphone/" rel="tag">#Shiftphone</a> <a href="/tags/opensource/" rel="tag">#OpenSource</a> <a href="/tags/grapheneos/" rel="tag">#GrapheneOS</a> <a href="/tags/ccc/" rel="tag">#CCC</a> <a href="/tags/mail/" rel="tag">#Mail</a> <a href="/tags/mullvad/" rel="tag">#Mullvad</a> <a href="/tags/pgp/" rel="tag">#PGP</a> <a href="/tags/gnupg/" rel="tag">#GnuPG</a> <a href="/tags/dns/" rel="tag">#DNS</a> <a href="/tags/gaming/" rel="tag">#Gaming</a> <a href="/tags/linuxgaming/" rel="tag">#linuxgaming</a> <a href="/tags/lutris/" rel="tag">#Lutris</a> <a href="/tags/protondb/" rel="tag">#Protondb</a> <a href="/tags/cloudact/" rel="tag">#CLOUDAct</a> <a href="/tags/enshittification/" rel="tag">#Enshittification</a> <br><a href="/tags/bloatware/" rel="tag">#Bloatware</a> <a href="/tags/tpm/" rel="tag">#TPM</a> <a href="/tags/murena/" rel="tag">#Murena</a> <a href="/tags/liberapay/" rel="tag">#LiberaPay</a> <a href="/tags/gnutaler/" rel="tag">#GnuTaler</a> <a href="/tags/taler/" rel="tag">#Taler</a> <a href="/tags/preppingforfuture/" rel="tag">#PreppingforFuture</a><br><a href="/tags/fedilz/" rel="tag">#FediLZ</a> <a href="/tags/bluelz/" rel="tag">#BlueLZ</a> <a href="/tags/instalz/" rel="tag">#InstaLZ</a> <a href="/tags/threatmodel/" rel="tag">#ThreatModel</a><br><a href="/tags/floss/" rel="tag">#FLOSS</a> <a href="/tags/uefi/" rel="tag">#UEFI</a> <a href="/tags/medienkompetenz/" rel="tag">#Medienkompetenz</a></p>
<p><a href="/tags/microsoft/" rel="tag">#Microsoft</a> Used China-Based Engineers to Support Product Recently Hacked by <a href="/tags/china/" rel="tag">#China</a><br>==</p><p>Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular <a href="/tags/sharepoint/" rel="tag">#SharePoint</a> software but didn’t mention that it has long used China-based engineers to maintain the product.</p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/government/" rel="tag">#Government</a> <a href="/tags/safety/" rel="tag">#Safety</a> <a href="/tags/privacy/" rel="tag">#privacy</a> </p><p><a href="https://www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity" rel="nofollow" class="ellipsis" title="www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/mic</span><span class="invisible">rosoft-sharepoint-hack-china-cybersecurity</span></a></p>
<p>Are you interested in a different kind of security conference?</p><p>Then take a look at the Open Security Conference (<span class="h-card"><a href="https://infosec.exchange/@OSCo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OSCo</span></a></span>). <a href="/tags/osco25/" rel="tag">#osco25</a> takes place from October 2 to 5 in Rückersbach (Germany near Frankfurt) and registration is still open at <a href="https://opensecurityconference.org/" rel="nofollow"><span class="invisible">https://</span>opensecurityconference.org/</a>.<br>(this is an English version of the original German thread <a href="https://infosec.exchange/@realn2s/114936419689473030" rel="nofollow" class="ellipsis" title="infosec.exchange/@realn2s/114936419689473030"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@realn2s/1149</span><span class="invisible">36419689473030</span></a>)</p><p>Why?</p><p>The Open Security Conference aims to be diverse and inclusive. This also includes different levels of knowledge and experience.<br>It is therefore not only for security experts or for people who have (already) worked in the security sector for a long time,<br>but also for people who are interested in security or want to get into the field.</p><p>The <a href="/tags/openspace/" rel="tag">#OpenSpace</a> format not only enables expert presentations,<br>but also non-expert topics or questions as session topics. Sessions are not resticted to presentations, they can be interactive, collaborative, workshops or basically anything else.</p><p>Since topics do not have to be submitted months in advance,<br>but the agenda is created jointly by the participants, hot topics can also be covered.</p><p>The conference is non-commercial, i.e. the total costs are shared between the participants (including the organizers).<br>The costs include accommodation and meals in the conference hotel.</p><p>And yes, there are also sponsors who cover part of the costs.</p><p>But not everything is different.</p><p>There are great keynotes e.g. by <span class="h-card"><a href="https://mastodon.social/@bkastl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bkastl</span></a></span> ("History repeating itself") and Mireia Cano ("Building an AppSec Program from Scratch").</p><p><a href="/tags/cybersecurity/" rel="tag">#CyberSecurity</a> <a href="/tags/security/" rel="tag">#Security</a> <a href="/tags/infosec/" rel="tag">#InfoSec</a> <a href="/tags/appsec/" rel="tag">#AppSec</a> <a href="/tags/productsecurity/" rel="tag">#ProductSecurity</a> <a href="/tags/otsecurity/" rel="tag">#OTsecurity</a></p>
<p>Habt ihr Interesse an einer etwas anderen Sicherheitskonferenz?<br><a href="/tags/boostwelcome/" rel="tag">#BoostWelcome</a></p><p>Dann schaut euch mal die <a href="/tags/osco25/" rel="tag">#osco25</a> an. Sie findet vom 2-5 Oktober in Rückersbach statt und die Registrierung ist noch offen<br><a href="https://opensecurityconference.org/" rel="nofollow"><span class="invisible">https://</span>opensecurityconference.org/</a></p><p>Warum?</p><p>Die <span class="h-card"><a href="https://infosec.exchange/@OSCo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OSCo</span></a></span> hat das Ziel divers und inklusiv zu sein. Das schließt auch unterschiedliche Wissens- und Erfahrungsstände mit ein. Sie ist also nicht nur für Sicherheitsexpert*innen oder für Menschen die schon lange im Sicherheitsbereich arbeiten.</p><p>Das <a href="/tags/openspace/" rel="tag">#OpenSpace</a> Format ermöglicht nicht nur Expert*inne-Präsentationen, sondern es können "Halbwissen"-Themen* oder auch einfach Fragen behandelt werden. Da Vorträge nicht Monate im Voraus eingereicht werden müssen sondern die Agenda von den Teilnehmenden gemeinsam erstellt wird, können auch brandaktuelle Themen behandelt werden.</p><p>Die Konferenz ist nicht-komerziell, sprich die Gesamtkosten werden zwischen den Teilnehmenden (inklusive Organisator*innen) aufgeteilt. Die Konsten enthalten die Übernachtung und Verpflegung im Tagungshotel.<br>Und ja, es gibt auch Sponsoren die Teile der Kosten übernehmen.</p><p>Es ist aber nicht alles anders. Es gibt auch Keynotes z.B. von <span class="h-card"><a href="https://mastodon.social/@bkastl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bkastl</span></a></span> ("History repeating itself") und Mireia Cano ("Building an AppSec Program from Scratch")</p><p>Wenn es euch interessiert registriert euch unter <a href="https://register.opensecurityconference.org/" rel="nofollow" class="ellipsis" title="register.opensecurityconference.org/"><span class="invisible">https://</span><span class="ellipsis">register.opensecurityconferenc</span><span class="invisible">e.org/</span></a></p><p><a href="/tags/cybersicherhet/" rel="tag">#Cybersicherhet</a> <a href="/tags/cybersecurity/" rel="tag">#CyberSecurity</a></p>
Edited 248d ago
<p>Microsoft is required to regularly provide U.S. officials with its plan for keeping government data safe from hacking. Yet a copy of the tech giant’s security plan obtained by ProPublica makes no reference to the company’s China-based operations.</p><p><a href="https://www.propublica.org/article/microsoft-china-defense-department-cloud-computing-security?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post" rel="nofollow" class="ellipsis" title="www.propublica.org/article/microsoft-china-defense-department-cloud-computing-security?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/mic</span><span class="invisible">rosoft-china-defense-department-cloud-computing-security?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post</span></a></p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/data/" rel="tag">#Data</a> <a href="/tags/china/" rel="tag">#China</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/government/" rel="tag">#Government</a> <a href="/tags/technology/" rel="tag">#Technology</a></p>
<p>Hey y’all, I’ve let myself get consumed by work and school and all of that, but shit is pretty fuckin’ dire for my friend <span class="h-card"><a href="https://infosec.exchange/@catbailey" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>catbailey</span></a></span>. </p><p><a href="https://infosec.exchange/@catbailey/115051886620613739" rel="nofollow" class="ellipsis" title="infosec.exchange/@catbailey/115051886620613739"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@catbailey/11</span><span class="invisible">5051886620613739</span></a></p><p>If you’ve any help you can spare, any at all, she could use it, she’s just trying to stay alive long enough to land a job and get back on her feet. If all you’ve got is your reach on a niche federated microblogging network, I understand, but we'd appreciate you sharing with your network on the Fediverse and/or Bluesky where she's @blackcatswhitehats.org.</p><p>$868.26/4500 raised</p><p>Best to use Venmo/PayPal/CashApp, but GoFundMe is appreciated too and good for higher latency needs.</p><p>GoFundMe: <a href="https://www.gofundme.com/f/aid-for-cat-and-her-kids-in-crisis?lang=en_US" rel="nofollow" class="ellipsis" title="www.gofundme.com/f/aid-for-cat-and-her-kids-in-crisis?lang=en_US"><span class="invisible">https://</span><span class="ellipsis">www.gofundme.com/f/aid-for-cat</span><span class="invisible">-and-her-kids-in-crisis?lang=en_US</span></a> <br>PayPal: <a href="https://paypal.me/catalystediting" rel="nofollow"><span class="invisible">https://</span>paypal.me/catalystediting</a><br>Venmo: @BlackCatHackers<br>CashApp: $BlackCatOps</p><p><a href="/tags/mutualaid/" rel="tag">#MutualAid</a> <a href="/tags/mutualaidrequest/" rel="tag">#MutualAidRequest</a> <a href="/tags/infosec/" rel="tag">#InfoSec</a> <a href="/tags/helpcatandco/" rel="tag">#HelpCatAndCo</a> <a href="/tags/cybersecurity/" rel="tag">#CyberSecurity</a></p>
Edited 228d ago
<p>Now that I finally feel comfortable on <a href="/tags/mastodon/" rel="tag">#mastodon</a>, and have a general idea of what I want to post, I think it's time for my first <a href="/tags/introduction/" rel="tag">#introduction</a>!</p><p>I'm tpaau, a <a href="/tags/polish/" rel="tag">#Polish</a> guy with <a href="/tags/autism/" rel="tag">#autism</a>. <img src="https://neodb.social/media/emoji/mastodon.social/blobcat.png" class="emoji" alt=":blobcat:" title=":blobcat:"> I'm interested in <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a>, <a href="/tags/privacy/" rel="tag">#privacy</a>, the <a href="/tags/scpfoundation/" rel="tag">#ScpFoundation</a>, <a href="/tags/airsoft/" rel="tag">#airsoft</a>, and <a href="/tags/cats/" rel="tag">#cats</a>. I will post mainly about my interests, projects I'm working on, and related stuff.</p><p>On my <a href="/tags/googlepixel/" rel="tag">#GooglePixel</a> 7 I use <a href="/tags/grapheneos/" rel="tag">#GrapheneOS</a>, and my <a href="/tags/thinkpad/" rel="tag">#ThinkPad</a> T480 runs <a href="/tags/secureblue/" rel="tag">#secureblue</a> with my custom <a href="/tags/desktopshell/" rel="tag">#desktopshell</a> (<a href="https://github.com/tpaau/dots" rel="nofollow"><span class="invisible">https://</span>github.com/tpaau/dots</a>).</p>
<p>Pentagon Warns Microsoft: Company’s Use of China-Based Engineers Was a “Breach of Trust”<br>---</p><p>The Defense Department is opening an investigation to determine if the tech giant’s use of overseas engineers to maintain sensitive U.S. government computer systems compromised national security.<br><a href="https://www.propublica.org/article/microsoft-china-defense-department-digital-escorts-investigation-warning?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post" rel="nofollow" class="ellipsis" title="www.propublica.org/article/microsoft-china-defense-department-digital-escorts-investigation-warning?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/mic</span><span class="invisible">rosoft-china-defense-department-digital-escorts-investigation-warning?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post</span></a></p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/pentagon/" rel="tag">#Pentagon</a> <a href="/tags/defense/" rel="tag">#Defense</a> <a href="/tags/technology/" rel="tag">#Technology</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a></p>
Is it just me, or has the number of captcha challenges significantly increased over the past few months? Nowadays I feel like I'm being hit with captchas all day every day, where before it was relatively rare. It is especially noticeable on sites I visit frequently, have accounts with, and presumably have cookies for.<br><br><a href="/tags/captcha/" rel="tag">#captcha</a> <a href="/tags/securitytheater/" rel="tag">#SecurityTheater</a> <a href="/tags/infosec/" rel="tag">#infosec</a> <a href="/tags/cybersecurity/" rel="tag">#CyberSecurity</a> <a href="/tags/security/" rel="tag">#security</a> <a href="/tags/tech/" rel="tag">#tech</a> <a href="/tags/dev/" rel="tag">#dev</a> <a href="/tags/internet/" rel="tag">#internet</a> <a href="/tags/web/" rel="tag">#web</a><br><br><br>
<p>Hello Fediverse! I’m <span class="h-card"><a href="https://infosec.exchange/@cyberseckyle" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cyberseckyle</span></a></span> 👋<br>Formerly <span class="h-card"><a href="https://infosec.exchange/@beardedtechguy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>beardedtechguy</span></a></span>. Same human, new handle that fits the work I live and breathe. I’m still very much a tech guy and the beard is staying 🧔♂️💻</p><p>What to expect here: practical security tips, MSP life behind the scenes, blue-team playbooks, lab tinkering, tool breakdowns, and no FUD. If you like clear, actionable posts with a little humor, you’re in the right place.</p><p>Let’s swap ideas and make the internet a little less weird and a lot more secure. 🛡️<br><a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/infosec/" rel="tag">#InfoSec</a></p>
<p>The New Oil is entirely supported by readers. If you get value out of this project, please consider supporting us if you can.</p><p><a href="https://thenewoil.org/en/support/" rel="nofollow"><span class="invisible">https://</span>thenewoil.org/en/support/</a></p><p><a href="/tags/privacy/" rel="tag">#privacy</a> <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a></p>
<p>🏋🏻 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲: 𝟭𝟬 𝘀𝗲𝘀𝘀𝗶𝗼𝗻𝘀 𝗱𝗲 𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 𝗮𝘃𝗮𝗻𝗰é𝗲 𝗱𝗼𝗻𝘁 𝘃𝗼𝘁𝗿𝗲 é𝗾𝘂𝗶𝗽𝗲 𝗱𝗲 𝘀é𝗰𝘂𝗿𝗶𝘁é 𝗮 𝗯𝗲𝘀𝗼𝗶𝗻 • 𝟭𝟬 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴 𝗦𝗲𝘀𝘀𝗶𝗼𝗻𝘀 𝗬𝗼𝘂𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗲𝗮𝗺 𝗡𝗲𝗲𝗱𝘀</p><p>Montez en compétence votre équipe de cybersécurité avec des formations pratiques offertes par des experts de l'industrie! NorthSec 2026 compte 10 cours intensifs couvrant les compétences les plus recherchées!</p><p>Level up your cybersecurity team with hands-on training from industry-leading experts! NorthSec 2026 brings together 10 intensive courses covering the most in-demand skills!</p><p>➡️ Red Team Training<br>Charles F. Hamilton (Mr.Un1k0d3r)</p><p>➡️ Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling<br>Steven Wierckx</p><p>➡️ Offensive Active Directory Operations Certification (OADOC)<br>Evan Hosinski (White Knight Labs)</p><p>➡️ Deconstructing Rust Binaries<br><span class="h-card"><a href="https://infosec.exchange/@cxiao" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cxiao</span></a></span></p><p>➡️ Reverse, Bypass, Exploit: Mobile Hacking Workshop<br>David Baker & Steven Smiley (Corellium)</p><p>➡️ Offensive Development Practitioner Certification (ODPC)<br>Munaf Shariff (White Knight Labs)</p><p>➡️ Attacking & Securing CI/CD Pipeline Certification (ASCPC)<br>Raunak Parmar & Robert (Bobby) Schwass (White Knight Labs)</p><p>➡️ Advanced Detection Engineering in the Enterprise<br>FalconForce</p><p>➡️ Offensive GCP Operations & Tactics Certification (OGOTC)<br>Chirag Savla (White Knight Labs)</p><p>➡️ Practical AI Security - Go Beyond Theory: Build, Break, and Defend<br>Harish Ramadoss</p><p>📅 11-13 mai/May 2026<br>📍 Montréal, QC</p><p>👉 Description complète des cours, réductions pour étudiant(e)s et informations sur l'inscription disponibles à:<br>𝘍𝘶𝘭𝘭 𝘤𝘰𝘶𝘳𝘴𝘦 𝘥𝘦𝘴𝘤𝘳𝘪𝘱𝘵𝘪𝘰𝘯, 𝘴𝘵𝘶𝘥𝘦𝘯𝘵 𝘥𝘪𝘴𝘤𝘰𝘶𝘯𝘵𝘴, 𝘢𝘯𝘥 𝘳𝘦𝘨𝘪𝘴𝘵𝘳𝘢𝘵𝘪𝘰𝘯 𝘪𝘯𝘧𝘰 𝘢𝘵: </p><p>🔗 <a href="https://nsec.io/training-sessions/" rel="nofollow"><span class="invisible">https://</span>nsec.io/training-sessions/</a></p><p><a href="/tags/trainings/" rel="tag">#trainings</a> <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a> <a href="/tags/infosec/" rel="tag">#infosec</a> <a href="/tags/redteam/" rel="tag">#redteam</a> <a href="/tags/bluelteam/" rel="tag">#bluelteam</a> <a href="/tags/cloudsecurity/" rel="tag">#cloudsecurity</a></p>
Edited 107d ago
<p>Pentagon Bans Tech Vendors From Using China-Based Personnel After ProPublica Investigation<br>---</p><p>The Defense Department has tightened cybersecurity requirements for its cloud services providers. The changes come after ProPublica revealed how Microsoft’s use of China-based engineers left sensitive government data vulnerable to hacking.<br><a href="https://www.propublica.org/article/pentagon-dod-microsoft-digital-escorts-china-ban-cybersecurity?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post" rel="nofollow" class="ellipsis" title="www.propublica.org/article/pentagon-dod-microsoft-digital-escorts-china-ban-cybersecurity?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post"><span class="invisible">https://</span><span class="ellipsis">www.propublica.org/article/pen</span><span class="invisible">tagon-dod-microsoft-digital-escorts-china-ban-cybersecurity?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post</span></a></p><p><a href="/tags/news/" rel="tag">#News</a> <a href="/tags/dod/" rel="tag">#DOD</a> <a href="/tags/tech/" rel="tag">#Tech</a> <a href="/tags/microsoft/" rel="tag">#Microsoft</a> <a href="/tags/pentagon/" rel="tag">#Pentagon</a> <a href="/tags/cybersecurity/" rel="tag">#Cybersecurity</a> <a href="/tags/technology/" rel="tag">#Technology</a> <a href="/tags/china/" rel="tag">#China</a></p>
Slack's signin procedure is the digital equivalent of boarding an airplane, "security"wise.<br><br>One of my favorite "security challenges" is the "verify your email" one. By this point my email has been verified so many times it should have top secret clearance.<br><br><a href="/tags/securitytheater/" rel="tag">#SecurityTheater</a> <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a> <a href="/tags/infosec/" rel="tag">#infosec</a> <a href="/tags/slack/" rel="tag">#Slack</a> <a href="/tags/tech/" rel="tag">#tech</a> <a href="/tags/dev/" rel="tag">#dev</a><br>
<p>What I’ve been reading (and listening to) this week ending 8 March 2026 <a href="https://jchyip.medium.com/what-ive-been-reading-and-listening-to-this-week-ending-8-march-2026-6ed77607b00d" rel="nofollow" class="ellipsis" title="jchyip.medium.com/what-ive-been-reading-and-listening-to-this-week-ending-8-march-2026-6ed77607b00d"><span class="invisible">https://</span><span class="ellipsis">jchyip.medium.com/what-ive-bee</span><span class="invisible">n-reading-and-listening-to-this-week-ending-8-march-2026-6ed77607b00d</span></a> <a href="/tags/poverty/" rel="tag">#poverty</a> <a href="/tags/resilience/" rel="tag">#resilience</a> <a href="/tags/management/" rel="tag">#management</a> <a href="/tags/ai/" rel="tag">#AI</a> <a href="/tags/economics/" rel="tag">#economics</a> <a href="/tags/addiction/" rel="tag">#addiction</a> <a href="/tags/climatechange/" rel="tag">#ClimateChange</a> <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a> <a href="/tags/heroes/" rel="tag">#heroes</a> <a href="/tags/depression/" rel="tag">#depression</a> <a href="/tags/product/" rel="tag">#product</a> <a href="/tags/engineering/" rel="tag">#engineering</a></p>
Once again blocked from using a website I've used regularly for years because of "unusual activity" from "your IP". After passing a captcha, no less.<br><br>Somehow bot-detecting algorithms have been degrading over time.<br><br>This is a troubling trend because people who aren't using the anointed access points of the internet struggle more and more to connect and interact. Large entities like CloudFlare choke off more and more avenues of access in the name of "security", enforcing digital checkpoints without any accountability to anyone.<br><br><a href="/tags/dev/" rel="tag">#dev</a> <a href="/tags/tech/" rel="tag">#tech</a> <a href="/tags/web/" rel="tag">#web</a> <a href="/tags/bot/" rel="tag">#bot</a> <a href="/tags/darkpattern/" rel="tag">#DarkPattern</a> <a href="/tags/security/" rel="tag">#security</a> <a href="/tags/infosec/" rel="tag">#infosec</a> <a href="/tags/cybersecurity/" rel="tag">#cybersecurity</a> <a href="/tags/checkpoint/" rel="tag">#checkpoint</a><br>
