logo

Libre Solutions Network

Freedom in the digital age

RSS

Prev B @ Next

Unjected Shows Nothing But Contempt For Their Users

Apr 12 2024 Gabriel

Earlier this week, I hastily recorded a video for the substack newsletter to dennounce the astounding behavior by Unjected in response to news breaking of their site being found to have serious vulnerabilities. Instead of informting their users of the risks of their information being vulnerable, the company instead would prefer to downplay and dismiss any concerns and mislead their users about what steps they should take to protect their private information.

Lessons from Alt-Tech Failures

Apr 08 2024 Gabriel

Data breaches are a serious problem. We do not live in an environment where it is safe for people’s PII (Personally Identifiable Information) to be widely available. When somebody’s data is leaked or stolen, there can be and have been serious repercussions for that person. It is desperately important that we not only carefully choose the platforms we use, but also that they’ve taken steps to protect their users from risks related to the platform itself.

The Jason Lavigne Show

Mar 26 2024 Gabriel

I had the pleasure of Joining Jason Lavigne on The Lavigne Show. It was an excellent opportunity to share my message with a Canadian audience of liberty-minded individuals across the country. Jason has had a fascinating variety of guests on his show including Hrvoje of Geopolitics & Empire, Doc Malik, JJ Couey and even Dr Robert Malone among many others. It has been an honor to be featured on the Lavigne Show, and I was absolutely astounded at the positive feedback I received in the live chat.

The EU Cyberwar on People & the Web

Nov 06 2023 Gabriel

The largest institutions from governments, alliances, and multi-national corporations are all wrestling for control over total digital dominance of the public. Your own access to information, and control over your data are both important objectives to these organizations. This battle over people’s digital lives is not without it’s consequences. There are disastrous possibilities if any group manages to secure surveillance and/or control over everyone’s online communications, transactions, and information. This problem isn’t new.

Applied Cyberwar: Hardware Exploits

Oct 19 2023 Gabriel

Recently a rumor that the tragic Hamas attack was enabled by a potential lack of backdoors accessible by western / 5 Eyes intelligence. Despite this, I wouldn’t recommend rushing to order a Huwawei phone for privacy reasons. If my threat model called for investigating hardware attacks, simply changing providers would be insufficient to keep them at bay. Understanding hardware exploits requires a bit of understanding about how systems run, so let’s take advantage of this teachable moment.

Cybergeddon: ISP-level de-platforming

Aug 17 2023 Gabriel

It is important to remember that when it comes to free expression online, no corporation is coming to save you. For far too long, people have placed too much trust in corporate social media. They have certainly abused that trust, but as of recently a far more concerning trend has arisen: parts of the Internet de-platforming itself. ipv6 prefix-list ipv6-prefix-filter-as400304 seq 950 deny 2607:46c0::/32 le 48 Archive It doesn’t look like much, this innocuous text reveals that the Internet isn’t dying… it’s being killed.

Escalating Cyberwar: Warlord Technology

Jul 17 2023 Gabriel

You have been found guilty. No trial was necessary, your device has testified against you. When one navigates corporate controlled cyberspace, the message couldn’t be more clear. Governments and tech giants negotiate the terms of total and utter digital feudalism while the people are herded into systems that are explicitly designed to control them. Even while it’s still possible, opting-out comes at a non-trivial cost. It is a cost that must be paid in one form or another, because refusing to do so has a grave price as well.

A Non-Combattant's Guide to Cyberwar

Jun 16 2023 Gabriel

We live in interesting times. In addition to the many boots-on-the-ground conflicts going on, cyberspace is a theatre of war with hardly any distinction between military and civilian targets. Nothing is off-limits and combatants can be anything from creative individuals to well-funded state level actors like governments and multi-national corporations. There’s no way to be perfectly out-of-the-way. Any significant cluster of data, storage, computing power, or bandwidth can become a strategic resource to be sought after.