Pinned post

For those who says Tor is traceable!

Tracking down Tor users requires lot of time and efforts... To track the tor users the attacker or the Government agencies should check/analyze each of the tor node that the user is connected to (where 1st node only knows where the traffic is coming from and the last tor node only knows where is traffic is going to not from where its coming...,) in real time. it is impossible when you change the tor circuits once a ten seconds and mainly hackers(good people somewhat like gray hat) strictly advised to disable JavaScript on the browser to prevent ipleaks. All the ad's, tracking scripts on the web were build using js, most of the people who caught on darkweb by police are literally not even following some basic OPSEC rules like browsing tor on tor focused Linux distro's like tails, whonix . especially when downloading torrents from Tor on Windows machine with AV running. so its 99.99% safe to use Tor when you follow strong OPSEC.

Pinned post

Ultimately, saying that you don't care about privacy because you have nothing to hide is no different from saying you don't care about freedom of speech because you have nothing to say. ~Ed Snowden

Tweet from Ars Technica (@arstechnica)
Ars Technica (@arstechnica) Tweeted:
Oculus consulting CTO John Carmack remains wary of Meta's Metaverse, issues a few words of warning for Zuckerberg.

The private key used to sign the vaccine passports was leaked and is being passed around to create fake passes for the likes of Mickey Mouse and Adolf Hitler.

via Threatpost

God Access :verified: boosted

Looking to use #opensource in your #enterprise? With great workshops and keynote speakers including @sabdfl and @fkarlitschek the Enterprise Open Source Summit has you covered!

Don't forget to book your tickets!

Over 10 MILLION users have been targeted with 151 malicious apps from the Play Store that tricked users into paying for premium subscription services without their knowledge or consent.


FBI Given Power To Unlock Capitol Riot Suspect Phone With His Fingerprint.

January 6 investigators get a warrant to open devices using a defendant’s fingerprint. Though he’d been accused of assaulting officers with pepper spray, forced fingerprint unlocks remain a legally-questionable power.

Mozilla cracks down on malicious add-ons used by 455,000 users

The troublesome add-ons misused an API that controlled how Firefox connected to the internet.

New York Times journalist Ben Hubbard was repeatedly targeted with Israel-based NSO Groups Pegasus spyware over a three-year period after reporting on Saudi Arabia.

Read details:

's reply here is a near copy-paste of the Obama administration's response to the revelation of the NSA's unlawful mass surveillance program. Mark seems unaware that the "false picture" defense did not do well in court. It did not do well at all:

All the NSA agents following me say YEEEAAAHHH....

Personal data protection to become a fundamental right in Brazil

The amendment to the Constitution was approved by the Senate and covers data in digital platforms

Facebook :facebook: is Planning to change it's name next week;

Do you have any suggestions?
Name should be funny tho! :AngeryCat:

The Tor Project (@torproject): "If you need another reason to switch to Tor Browser, check out arthuredelstein's, an open-source tool using rigorous automated privacy tests to find out what kind of data different browsers leak. 🔍" | Nitter by

Show older
Mastodon 🐘

Discover & explore Mastodon with no ads and no surveillance. Publish anything you want on Mastodon: links, pictures, text, audio & video.

All on a platform that is community-owned and ad-free.
Hosted by Stuxhost.