How do you distinguish 0 from O in your password manager? Well it has to be of a different color. Here is KeepassXC journey: dev introduced code in 2021 and it made it into release in 2024. Post on X x.com/WolframRoesler/status/14 and link to GItHub issue github.com/keepassxreboot/keep

I have decided to have little browser war or showdown. I have heard of Brave being positioned as browser with built in tracker blocking capabilitiees, so I ran it along side Firefox with Wireshark analyzing DNS protocol. Results ... my network DNS server won blocking more than both of them :D but Brave held firm second place, where my DNS having less work when I went to cnn.com of all places.

It's been a while since I wrote on my own blog, I could name lot's of excuses as to why, but what's the point. So I've decided to go back to writing. Here is article about setting up noVNC, because I was not able to find any cohesive documentation on that online. sergeysh.com/2025/08/15/Settin

What’s the biggest obstacle to achieving digital sovereignty in your organization?

Here you go, proof that tracking won't stop until you delete "social media" apps off of your phone. Think again do you need app to communicate with your real friends instead of calling them?
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers - Ars Technica
arstechnica.com/security/2025/

Some thoughts about what Joel expects out of blogging regularly, or having a website at all.
kevquirk.com/blog/blogging-exp

#HowTo disabling the new #chatbot from #Firefox 137 :firefox:

› Put « about:config » in the address bar
› Search the « browser.ml.chat.enabled » key
› Switch to « false »
› Voilà !

Or use a #Firefork :troll:

And of course you can trust #Google silently installing an app called Android System Safetecore on your phone. It's for your own safety.

ghacks.net/2025/02/28/android-

#android

Sure, they might have your previous data.

But you know what they *don't* have?
They don't have your *future* data.

It's never too late to start improving your data privacy online. Every small step helps.

#Privacy #HumanRights

If you want to learn how Chinese phishing or "smishing" groups are turning phished card data into mobile wallets, check out today's story. The innovation coming out of these groups is remarkable, and includes mobile apps that let thieves relay "ghost tap" NFC transactions to a payment terminal from halfway around the world.

What I find most remarkable is how millions of businesses have spent years and billions of dollars upgrading payment terminals to use more secure chip-based cards. And now these phishers come along and just bypass all of that, creating Apple and Google mobile wallets with the phished card data and a one-time code.

Here's the lede:

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.

krebsonsecurity.com/2025/02/ho

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!