Show newer

Distraction or perfection, here's how it went. I received a security key board today and was eager to get my hands on OpenSK, so I sat down to see what capabilities are. However as I looked at the board I realized that it's not really perfect to work with bare board, so I needed the case, I put 3D model into slicer, and got a connection error, damn certificates expired on the printer, I started refreshing certs, but ports are closed on network ... mmm fun wait what I wanted to do?

This article has a very catchy title, however it does not tell you why they were able to search any data in the first place. The answer is very simple, mainly because people had been using services from Big Tech where customers do not own their data and those guys have back-end access to customers data. Think about it, at the end of the day it's YOUR data! nextgov.com/analytics-data/202

I am stunned how many organizations "misuse" cybesecurity insurance. While it make sense from a business perspective, I think that's where ethics should outweigh purely calculative approach. Any insurance is designed to restore what is broken, in a way rebuilt to it's original state. However with any data breach nothing was broken, it's unauthorized people have seen information that should not have been seen. You can not undo that, there is no way you can put genie back!

It's well known that the goal of any company is to maximize shareholders return. That includes technology companies, who offer so-called "free" SaaS products. In fact the fermium model has become a favorite business model in Silicon Valley. What do you think is going to happen when implementation of security controls to protect your data outweigh the cost of cyber security insurance that will cover damages of data breach. Your data means nothing to them! Gain data sovereignty with

Make no mistake, data is gold for any tech company that sells their customers in packages, it's just a question not much that tech company can obfuscate their data collection practices. thenyledger.com/tech/russian-t

I am starting to wonder, it looks like censorship to me, or LinkedIn deliberately hiding my post from my network. Here is the story: I've appeared on podcast and as a normal person shared it(post from podcast page) with my network. It's not an automated scheduled post, I shared it manually through LinkedIn interface. After 5 days it had low number of views. So I posted posted screenshot of my Mastodon post to LinkedIn and in 5 hours it generated more views that original post in 5 days. Weird...

I've been honored to appear on 808 Podcast and had a blast talking with Bob Clark about privacy and steps people could take to protect their it in today's world. Here you can watch an episode on their web site 808podcast.com/808-podcasts/26

REMEMBER: Cyber-security insurance is not your cyber-security tool, it won't help you prevent incident or reduce risks it's just something that might make mess clean-out cheaper.

There is only one way for creators to avoid any attempts to de-platform by some tech giants or demands of "ransom" by other tech giants - that is to assume full digital sovereignty. theverge.com/2022/3/15/2297912

Privacy is a human right, people may choose not to exercise this right every time, but that doesn't mean that people ever meant to forgo this right, like many corporations trying to make everyone think.

I have been saying for a while that pixelation of the text is flawed and here is confirmation that recently emerged. thehackernews.com/2022/02/this

Sometimes you come across interesting facts. Word "pseudo" has pronunciation of "soodo" which is very similar to famous Linux command sudo. So my guess command sudo came from word pseudo which make sense.

We've discovered that users in Kazakhstan can circumvent internet shutdowns and censorship by using a specific Tor bridge. Follow our user guide, get a bridge, and avoid shutdowns today and tomorrow. #keepiton

forum.torproject.net/t/interne

I hope by now everyone knows what Log4j is and how dangerous it could be given 10 points on CVE score. Microsoft Threat Intelligence Center published guidance where they observer toolkits being updated with exploits for Log4j. Also FTC issues statement to go after companies who failed to remediate Log4j it's getting very serious folks. microsoft.com/security/blog/20

Here we go again, another example of outright censorship. It's not even about policy, Twitter simply clearing our people they don't like. That's why I use Mastodon and highly recommend it to everyone as the one way stay free in your expression. nytimes.com/2022/01/02/technol

Exited news first ever server being deployed in to the wild. This one rocking Raspberry Pi 3 and running DNS hole with private DNS server because first!

This is something we need people with bigger audiences to realize. Sure, Twitter has that "special sauce" that just keeps you scrolling for hours and hours. It's in Twitter's best interest to rope you in. It's that same "special sauce" that means that the majority of your followers don't see your posts unless they explicitly go looking for them. They're there, but they're not in that feed curated by Twitter to make them the most money.

mastodon.ar.al/@aral/107501949

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!