Biometrics should be treated like a username, not a password
Biometrics should be used to identify a user, not as a security method to protect data. If your biometrics end up in some online leak, it's not as if you can re-key them or change them, like a password
@ChrisWere Wish you luck with PENning good articles 👍
All metadata is sent to Facebook from use of WhatsApp, even if message content is end to end encrypted, the metadata provides Facebook with a plenty of information about each user
1. Most VPNs use outdated encryption
2. Most keep logs and sell your data, but of those that claim not to - you have no way to verify that
3. Most lie about their own geolocation
4. All providers target users interested in privacy b/c it's those users who have the most interesting traffic. VPN = honeypot
5. Providers can see all your traffic. The only encrypted part of the connection is you to the VPN
6. VPN is privacy by policy, not by design
It's the little things that make #mastodon great: write your own profile metadata, write and use your own bot, set profile pic as .gif #Privacy perks like: hide app you use, hide followers/following, adjust privacy of each toot, no ads, and each toot you send is not feeding the data monster of some giant corporation :)
If the #Quaznet domain ever suffers a breach, anyone will be able to view the "encrypted" personal info of #Kazakhstan internet users inc. credit card details and passwords unencrypted, thanks to their government's dangerous attempt at a MITM attack. Luckily, installing the certificate is optional, so do not do it!
You should force turn on DoH in #Firefox. Mozilla are the heroes here, not the villians.
UK ISP group names Mozilla "internet villian" for supporting DNS over HTTPS. #UK government pressuring browsers to drop DoH support to enforce censorship
#worldofwarcraft back in vanilla was a fantastic place to be, really hope #Blizzard can pull off recreating it in launching #classicwow. Hope they start putting the "gameplay first" again as it was in vanilla, rather than "marketing first" as it is in BfA
The best threat actors will always move as slow as is practical to prevent getting caught. 6 months isn't that long given often times incident responders get called in for one breach, only to discover another more competent threat actor who's around for a lot longer.
#citrix #hack #infosec
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!