if I am ever forced to move accounts, I will be able to provide the input for this checksum
cc3421bcbd40da9e6fe6c8c2aaa998ce6daebb2b5e24a81500f330d349b2b58e
#introductions time
Fresh path in the making.
infosec, bug hunting, netsec privacy & programming are my game.
ad100551b0e184b7d665dc1c680badc1f6e704aca0a8182262c1d6cfe2d7dbd7
Great, now protonmail doesn't even allow email verification on further account creation. It's donation or SMS from here.
I picked up programming to be better at infosec, programming itself sucked me in for years.
Now I'm tired of software and revisiting my prime interests.
infosec.exchange local timeline is much more low volume than I expected
Any opinions on https://briarproject.org/?
> Despite what you have heard from the media, the Internet is NOT
all about TCP port 80
@bugshiv @Wolf480pl nope I haven't, but it would be a worthwhile research project. I'd have to learn a lot more about smartphone hardware and forensics. The only phone I've left behind in untrusted places like hotel rooms has been one running Haven
Matrix + riot.im has so much potential - the only drawback is their way of handling e2e crypto device verification & chat UI.
I don't like keybase for two reasons:
1.They by default want you to keep your PGP key with them online.
2. They want you to use their keys & crypto vs PGP
The fediverse is really small, it's surprising how many accounts that I recognize interacted with me already.
if I am ever forced to move accounts, I will be able to provide the input for this checksum
cc3421bcbd40da9e6fe6c8c2aaa998ce6daebb2b5e24a81500f330d349b2b58e
@bugshiv @micahflee
So it boils down to whether the question he wanted to answer was "Do the evil agents physically tamper with people's devices?" or "Am I targeted?".
There are two natural paths to progress as a programmer:
1. Pick up farming, because all software is terrible.
2. Get into infosec, because f*** all software.
Any other #tor only users in the fediverse?
It would be devastating for the web if any government ruled email to require similar registration as mobile numbers get now in the EU.
Everyone should try creating an anonymous online identity at least once.
This has been the default in the 90s - it's becoming more challenging every second.
To fight for #privacy one has to notice it's being taken away. We are being boiled like frogs, wake up and see what changed.
AAAAAAAA can represent a very frustrated user, or someone trying to exploit your service.
I'm surprised he didn't try a honeypot phone. Mobiles are a much bigger target now than laptops.
Most droids don't get timely patching & can be attacked remotely - would love to see someone carry one in a similar experiment.
https://theintercept.com/2018/04/28/computer-malware-tampering/
protonmail also defaulted to requiring secondary verification, they gave choice of sms, phone, donation.
Interestingly, they blocked most of the temporary mail generating services - but not all of them.