mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

11K
active users

#CivilRightsAbuse

0 posts0 participants0 posts today
Killer Rabbit 90<p>An Israeli Company Is Hawking Its Self-Launching Drone System to U.S. Police Departments <a href="https://theintercept.com/2024/05/17/israel-orione-drone-us-police-louisiana/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theintercept.com/2024/05/17/is</span><span class="invisible">rael-orione-drone-us-police-louisiana/</span></a> <a href="https://mastodon.social/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> <a href="https://mastodon.social/tags/uspoli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uspoli</span></a> <a href="https://mastodon.social/tags/fascism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fascism</span></a> <a href="https://mastodon.social/tags/PoliceSurveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoliceSurveillance</span></a> <a href="https://mastodon.social/tags/PoliceState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoliceState</span></a> <a href="https://mastodon.social/tags/CivilRightsAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilRightsAbuse</span></a></p>
@infosec_jcp 🐈🃏 done differently<p>The fact that they are JUST starting to DISCLOSE all these <a href="https://infosec.exchange/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSOGroup</span></a>'s <a href="https://infosec.exchange/tags/SSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSM</span></a>™ <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a>™ exploits for <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> (which mostly Government Types are MOVING AWAY FROM ANYWAYS) WITHOUT going after the MAIN CULPRIT of <a href="https://infosec.exchange/tags/CivilRightsAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilRightsAbuse</span></a> In <a href="https://infosec.exchange/tags/SPYWARE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SPYWARE</span></a>, <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a>'s <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/Finsky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finsky</span></a> in AMERICA. SPEAKS. VOLUMES. <a href="https://infosec.exchange/tags/NatSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NatSec</span></a> <a href="https://infosec.exchange/tags/LawReview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LawReview</span></a> <a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> <a href="https://infosec.exchange/tags/Abuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Abuse</span></a> </p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@citizenlab" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>citizenlab</span></a></span></p>
@infosec_jcp 🐈🃏 done differently<p>New <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a> <a href="https://infosec.exchange/tags/ForcedMDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedMDM</span></a> client app <a href="https://infosec.exchange/tags/SprintMCMapk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SprintMCMapk</span></a> module update on <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a> <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/MobileClientManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileClientManager</span></a> </p><p>The <a href="https://infosec.exchange/tags/ForcedMDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedMDM</span></a> <a href="https://infosec.exchange/tags/GooglePlayStore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePlayStore</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> on 01-16-2024</p><p>Notice how the <a href="https://infosec.exchange/tags/PNGs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PNGs</span></a> actually are compressed arrays leading to <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> using a long running <a href="https://infosec.exchange/tags/PNGListArray" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PNGListArray</span></a> in a Portable Network Graphics file format that the client is able to unpack and call to launch <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> attaccc'd as a client from a <a href="https://infosec.exchange/tags/GammaGroupProxyServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroupProxyServer</span></a> administrator</p><p><a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> software Reveals on <a href="https://infosec.exchange/tags/Android12" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android12</span></a> examples</p><p>See screenshots <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/RTNDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RTNDA</span></a> <a href="https://infosec.exchange/tags/SSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSM</span></a>™ <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a>™ <a href="https://infosec.exchange/tags/GreyMarketInvestigations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyMarketInvestigations</span></a> <a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> <a href="https://infosec.exchange/tags/ForcedMDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedMDM</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CivilRightsAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilRightsAbuse</span></a> logged from <a href="https://infosec.exchange/tags/GooglePlayStore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePlayStore</span></a> </p><p><a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a></p><p><a href="https://www.virustotal.com/graph/embed/gfc12bdb135534ae5bd0fc322e7679090d7b08158b4b84f26a4abfa175df9a5a7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/gfc</span><span class="invisible">12bdb135534ae5bd0fc322e7679090d7b08158b4b84f26a4abfa175df9a5a7</span></a></p>
We Can Be Gyros<p><a href="https://mstdn.social/tags/GangStalking" class="mention hashtag" rel="tag">#<span>GangStalking</span></a> <a href="https://mstdn.social/tags/DirectedEnergyWeapons" class="mention hashtag" rel="tag">#<span>DirectedEnergyWeapons</span></a> <a href="https://mstdn.social/tags/HIPPAViolations" class="mention hashtag" rel="tag">#<span>HIPPAViolations</span></a> <a href="https://mstdn.social/tags/SurveillanceCapitalism" class="mention hashtag" rel="tag">#<span>SurveillanceCapitalism</span></a> <a href="https://mstdn.social/tags/ChildAbuse" class="mention hashtag" rel="tag">#<span>ChildAbuse</span></a> <a href="https://mstdn.social/tags/USA" class="mention hashtag" rel="tag">#<span>USA</span></a> <a href="https://mstdn.social/tags/CivilRightsAbuse" class="mention hashtag" rel="tag">#<span>CivilRightsAbuse</span></a> <a href="https://mstdn.social/tags/ACAB" class="mention hashtag" rel="tag">#<span>ACAB</span></a> <a href="https://mstdn.social/tags/PeepingTomPolice" class="mention hashtag" rel="tag">#<span>PeepingTomPolice</span></a><br /><a href="https://themarkup.org/hello-world/2023/09/09/private-companies-like-axon-expand-their-reach-with-public-dollars-we-want-to-look-into-that" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">themarkup.org/hello-world/2023</span><span class="invisible">/09/09/private-companies-like-axon-expand-their-reach-with-public-dollars-we-want-to-look-into-that</span></a></p>