Show newer

Security is a complex exercise, and there could not be any rush in protecting sensitive data. Aside of fact that vaccine passports are infringement on people freedom, governments should have asked themselves is this information that can be handled by startup. Unfortunately we see an opposite, governments around the world buying those type of apps from startups who are in gold rush mode to deliver, because window of opportunity to get their hands on budget money is short.

Cloud providers came together with set of Trusted Cloud Principles. You may ask what's wrong with this, looks like really nice initiative. However if you look closer, it's skewed towards cloud providers ability to access/store your data. One very important piece is missing in that initiative is ethical behavior of those providers and equal opportunities for legal expression. In other words there is nothing about those providers censoring you when you view is different.

Another day another rootkit. There was an interesting exploit made public couple days ago, that allows attacker to stay hidden from view point of Windows subsystems in charge of security while having quite a bit of an access to that PC and of course company that identified ability to exploit offering their services to protect PC's ... quite suspicious ...

If anyone still had an illusion that social media platforms are about purpose, social good, here is article for you. They only care about ways to exploit networking effect for as long as it increases their bottom line, thus people with large audience, politicians and etc are exempts from rules defined by platforms. Rules are for regular people and people are just a product being packaged and sold to advertisers. Ethiork helps you break free of those giants.

Microsoft disclosed Zero-Day vulnerability 2 days ago about remote code execution that is exploited through specially crafted MS Office documents. Please be careful and better refrain from opening any docs from untrusted sources. It sounds like actively exploited targeted attack.

I've been a fan of #Mycroft for a while now, but I recently learned some things they're involved with that I was completely unaware of. Maybe that's my fault for not paying attention, or maybe they could use some help in the PR department.

They've scored a contract with #NASA for various "space" related projects which sound interesting.

They've been working with Tree Industries on #Ezra EA to develop voice technologies for classrooms.

Finally got around reducing resolution of the images on my blog and submitting it to doing my part in reducing digital waste on the Internet. Check it out here

Security poverty line. Many organizations fell behind it with more sophisticated threat actors out there. However organizations can buy their way out of it with more investments. What about individual consumers? Are the products that suitable for consumers? Are they stuck with big tech companies and their "free" products. That's why we started Ethiork project, to give individuals a hand to raise above security poverty line.

Holidays are usually sweet spot for threat actors, because it's easy to go undetected over extended holidays. There is no sleep people involved in cybersecurity :( here is advisory from CISA and FBI

Product leaders today often met with a dilemma: what are those values you will never compromise on, even if that would cost you a job. I would say ethics should be one of those values, without ethics you but going to be able to build fruitful product or company.

... accidental typo in nmap scan leads to scanning of majority of network infrastructure, which leads to finding some unexpected ports on several host, which leads to a witch hunt unleashing wide variety of tools on to those hosts ... just to confirm that everything runs as expected ... as a result all tools on offensive security box has gotten most recent updates and skills brushed off ...

Those who still live under impression that data anonymization which tech giants tooting while selling your data left and right works read this article:
Just pay close attention to "how" they investigate rather than what is reported. There are also articles from NY Times
Your data is valuable, stop giving it away for free.

Doing what's right is always more expensive that just brushing symptoms on the surface.

Show thread

ICYMI: We just had our August 2021 Community Update!

We announced the PineNote: a high-end e-ink device powered by the same SoC as the Quartz64.

We also went into detail on upcoming hardware and software updates for PinePhone, Pinebook Pro, and Pinetime.

Read now:

Humanity as a whole is really good at finding solutions, but a terrible at root cause analysis, so we often would end-up remediating symptoms rather than solving problem. Private companies are quick to come up with new product and keep progress running at a stunning pace, but they can't solve the problems as their focus will be on symptoms that are on the surface, because those are visible to their shareholders, which put company and directors under high pressure.

Here is a demo of Visual Voicemail working on Mobian!

At the beginning of the century we as a society accepted that internet is our future and now it has become irreplaceable. Today coffee makers, dishwashers and other devices from our home are connected to the Internet, so it's time for Zero Trust. Government already realized importance of this concept hard way, time to take embrace it on a personal level.

Show older

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!