Stupid question: if I host a webside over itty.bitty.site without SSL certificate, but with a hash at the end of the website, then the end-user could check the websites integrity and authentication against my GPG public key to prove that it hasn't been tampered with and was written by me.
What the end-user won't get is the TLS-encrypted connection and transfer of the website.
Am I getting it right?
Swedish Consumers Association did not show mercy to Amazon in their open letter, in regards to them establishing their presence in the next few weeks: https://www.sverigeskonsumenter.se/media/40ydnrpm/letter-to-amazon-270820.pdf
I used to be excited for Amazon coming to Sweden, but I rather spend my money on a company that is *slighty* more ethical in their business practices.
Third time I'm deleting Facebook over course of its inception - and now for good.
It is a disease to modern society. A plague of privacy abuse and desinformation that causes deadly outcomes from anti-vaxxers and insane conspiracies. It has gone from being a tool of communication to being a weaponised platform for destabilisation and propaganda.
Fuck Facebook. The less people using it - the better.
"The compromised PII consisted of information of individuals who had recently registered for our virtual DFIR Summit"
Sifting through my old tweets, I found this Goldie: tainted love played by a bunch of 3,5" floppy drives:
Once again an authoritarian regime pulls the kill switch on internet access almost widespread protests. This calls for the need of a mesh network with a longer range than common WiFi and Bluetooth adapters.
However, I also see a risk for disinformation becoming widespread on a decentralised, unmoderated platform.
Both are different types of problems that can be solved, but the technological problem is easier to deal with than increasing critical thinking on a societal scale.
Therefore I wonder if there is anyone or a community who could take the time to answer some of my questions that might arise? I don't want solutions, but rather understand the inner workings behind some of the mechanisms.
A mysterious group has hijacked Tor exit nodes to perform SSL stripping attacks
The group ran almost a quarter of all Tor exit nodes. Group still controls 10% of all Tor exit nodes today.
@protonmail Could this explain the attack I reported you ?
Now I don't have to choose between either, and don't need to deal with cumbersome VMs. I just install the distro I need and get all the underlying awesome tools.
This may be the closest we get "year of Linux desktop" (unless you count Chromebooks). But spreading ideals of #foss should extend to more than desktops - it need to encompass cloud services, algorithms and more...
Online tracking is constantly growing. If you want to stay safe, check out these alternatives to Google & Co: https://tutanota.com/blog/posts/how-to-leave-google-gmail/ 😎
Swedish sociologist turned cyberpunk. CIO in the NGO sector.
🌈 LGBTQ activist
☕ Coffee connoisseur
👾 Old-school gamer
⛰️ Wilderness lover
🛡️ Infosec enthusiast
A Mastodon instance for info/cyber security-minded people.