An iPhone has so many privacy and security features that it’s very easy to miss them. Now’s a good time to dive in and get to know them all. ssd.eff.org/module/how-to-get-

How do you distinguish 0 from O in your password manager? Well it has to be of a different color. Here is KeepassXC journey: dev introduced code in 2021 and it made it into release in 2024. Post on X x.com/WolframRoesler/status/14 and link to GItHub issue github.com/keepassxreboot/keep

@elaterite Not likely, it's often about bad hygiene rather than particular OS. You can get hit with ransomware on poorly maintained Linux, and properly secured and maintained Windows can serve you well. Depends on who you are dealing with on the other side. Proper security operations can help with prevention of ransomware and often you don't need a huge budget to buy flashy tools, but you would replace that with labor.

I have decided to have little browser war or showdown. I have heard of Brave being positioned as browser with built in tracker blocking capabilitiees, so I ran it along side Firefox with Wireshark analyzing DNS protocol. Results ... my network DNS server won blocking more than both of them :D but Brave held firm second place, where my DNS having less work when I went to cnn.com of all places.

It's been a while since I wrote on my own blog, I could name lot's of excuses as to why, but what's the point. So I've decided to go back to writing. Here is article about setting up noVNC, because I was not able to find any cohesive documentation on that online. sergeysh.com/2025/08/15/Settin

What’s the biggest obstacle to achieving digital sovereignty in your organization?

Here you go, proof that tracking won't stop until you delete "social media" apps off of your phone. Think again do you need app to communicate with your real friends instead of calling them?
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers - Ars Technica
arstechnica.com/security/2025/

@catsalad it's an encryption back door, obviously only authorized personnel can turn that switch.

Some thoughts about what Joel expects out of blogging regularly, or having a website at all.
kevquirk.com/blog/blogging-exp

@kev Chatbot built in? With AI? That was way ahead of it's time :)

#HowTo disabling the new #chatbot from #Firefox 137 :firefox:

› Put « about:config » in the address bar
› Search the « browser.ml.chat.enabled » key
› Switch to « false »
› Voilà !

Or use a #Firefork :troll:

And of course you can trust #Google silently installing an app called Android System Safetecore on your phone. It's for your own safety.

ghacks.net/2025/02/28/android-

#android

Sure, they might have your previous data.

But you know what they *don't* have?
They don't have your *future* data.

It's never too late to start improving your data privacy online. Every small step helps.

#Privacy #HumanRights

If you want to learn how Chinese phishing or "smishing" groups are turning phished card data into mobile wallets, check out today's story. The innovation coming out of these groups is remarkable, and includes mobile apps that let thieves relay "ghost tap" NFC transactions to a payment terminal from halfway around the world.

What I find most remarkable is how millions of businesses have spent years and billions of dollars upgrading payment terminals to use more secure chip-based cards. And now these phishers come along and just bypass all of that, creating Apple and Google mobile wallets with the phished card data and a one-time code.

Here's the lede:

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.

krebsonsecurity.com/2025/02/ho

@briankrebs why would they learn something, they basically just settle for a year of monitoring per victim, since those victims won't be able to qualify any potential damage that may come decades later.

You nailed it @AuthorJMac ! 🖖

Edit : Original (and complete) post on March 29, 2024

« You know what the biggest problem with pushing all-things-AI is? Wrong direction.
I want AI to do my laundry and dishes so that I can do art and writing, not for AI to do my art and writing so that I can do my laundry and dishes. »

Cf. indiepocalypse.social/@AuthorJ

#AI #IA #LLM

Do you enjoy privacy rights?

Because deregulation is how you lose them. Oh and also basic safety, and human rights.

Just so you know: huffpost.com/entry/elon-musk-r

#Privacy #HumanRights #USpol

Today is the 8th anniversary of @Liberapay's launch. Coincidentally, I have an announcement to make.

I'm looking for someone to open a new chapter in the project's history by becoming its second maintainer. That doesn't mean it's a programming job, although help in that area is always welcome. You can find a bit more information in github.com/liberapay/salon/iss and ask any questions you have there or in private.

Please boost 🙂

[Update] No need to boost further. My thanks to everyone who did!

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!