Free speech fundamentals in scifi setting.

'So to Speak' podcast: Artificial intelligence & free speech

piotr boosted

Proving your identity online is NOT an easy task. is a possible option.

Do you know other solutions?

#Keybase #Online #Identity

Debate: "Should the United States severely restrict Huawei's business?"

Hong Kong Suspends Extradition Bill.

A little bit of Hong Kong history:

"When Britain handed Hong Kong back to China in 1997, Chinese leaders agreed that Hong Kong would be able to keep its economic and political systems, including some of the civil freedoms denied to China’s citizens on the mainland, for the next 50 years."

"The State Department is now requiring visa applicants to submit social media account information for the past five years." -

More information about Huawei Technologies following recent news.

World-Class Company or State Agent? | AshCast

piotr boosted

EFF’s @evacide on our new Threat Lab initiative: “We look at digital protection for journalists, activists, for people in abusive situations [and] we look for ways that we can really punch above our weight, and make a difference through security research.”

"same hackers who targeted Asus with <...> supply chain hack earlier this year have also targeted three different videogame developers—this time aiming even higher upstream, corrupting the programming tools <Microsoft Visual Studio> relied on by game developers." -

Automated IE 0day using call to the window.print() Javascript function.

"Also: Microsoft security chief: IE is not a browser"

(Reuters) - Facebook Inc's social networking site, photo-sharing social network Instagram and messaging app WhatsApp were inaccessible to some users on Sunday,, which monitors outages, showed.

Understanding Bitcoin - Day 1: Private Keys, Nodes & Lightning

Understanding Bitcoin - Day 2: Mining, Privacy & Offline Transactions

"For the past several months, hackers have been breaking into home routers and changing DNS settings to hijack traffic and reroute users to malicious websites. Most of the targeted devices are D-Link routers. There have been three waves of attacks in late December 2018, early February 20919, and late March 2019. Users should make sure they are running the most recent versions of firmware." -

Lifelogs for productivity debugging with

Found this^ time tracker convenient to log daily processes: load/create tasks for a day, one click to start logging, color-coded timelines on output.

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.