logo

Libre Solutions Network

Freedom in the digital age

RSS

Prev B @ Next

Cyber Fix: Episode 4

Jul 22 2024 Gabriel

You can unlock full-length episodes with a mitra subscription, or on Substack Links Discussed Wacky tech news: $2,350 Amazon ‘Astro’ Business Robots To Become Pointless Paperweights 11 Months After Release Researchers Call for “Child-Safe AI” After Alexa Tells Little Girl to Stick Penny in Wall Socket Popular defi protocol websites replaced with wallet drainers amid mass Squarespace domain hijacking Linksys Velop routers send Wi-Fi passwords in plaintext to US servers Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious Firefox Woes: Firefox’s new Web Site Advertising Preferences are a dark pattern and the idea of private personalized ads is nonsense anyway Solutions Roundup: Firefox Hardening Guide 2024 I used a ‘dumb phone’ for a week – here are 5 things I loved and 5 things I missed What is Podcasting 2.

The Ugliness of War and Technocracy

Jun 16 2024 Gabriel

For those interested in preserving our nations, free markets, culture, or even basic human rights, we are in an outright harrowing time. Many of these challenges are direct physical assaults like warfare, but there is also a wide variety of abstract dangers. Such as censorship, surveillance, economic warfare, or disaster capitalism. Governments battle against their people for control over policy, and against mega-corporations for control over the public. Families, communities, even entire nations are stuck in the crossfire of larger plans without clear allies to depend on.

Understanding Hostile Cyberspace

May 02 2024 Gabriel

To make deliberate decisions to improve one’s own privacy and security, one must make sense of cyberspace itself, and how it can be weaponized. With the benefit of hindsight, it is quite easy to see the traps that were set out for the public. The great news is that there is a phenomenal amount of territory to be reclaimed when people take action. Even a relatively simple shift to offline-first workflows will do wonders to secure control over one’s information.

Unjected Shows Nothing But Contempt For Their Users

Apr 12 2024 Gabriel

Earlier this week, I hastily recorded a video for the substack newsletter to dennounce the astounding behavior by Unjected in response to news breaking of their site being found to have serious vulnerabilities. Instead of informting their users of the risks of their information being vulnerable, the company instead would prefer to downplay and dismiss any concerns and mislead their users about what steps they should take to protect their private information.

Lessons from Alt-Tech Failures

Apr 08 2024 Gabriel

Data breaches are a serious problem. We do not live in an environment where it is safe for people’s PII (Personally Identifiable Information) to be widely available. When somebody’s data is leaked or stolen, there can be and have been serious repercussions for that person. It is desperately important that we not only carefully choose the platforms we use, but also that they’ve taken steps to protect their users from risks related to the platform itself.

The Jason Lavigne Show

Mar 26 2024 Gabriel

I had the pleasure of Joining Jason Lavigne on The Lavigne Show. It was an excellent opportunity to share my message with a Canadian audience of liberty-minded individuals across the country. Jason has had a fascinating variety of guests on his show including Hrvoje of Geopolitics & Empire, Doc Malik, JJ Couey and even Dr Robert Malone among many others. It has been an honor to be featured on the Lavigne Show, and I was absolutely astounded at the positive feedback I received in the live chat.

The EU Cyberwar on People & the Web

Nov 06 2023 Gabriel

The largest institutions from governments, alliances, and multi-national corporations are all wrestling for control over total digital dominance of the public. Your own access to information, and control over your data are both important objectives to these organizations. This battle over people’s digital lives is not without it’s consequences. There are disastrous possibilities if any group manages to secure surveillance and/or control over everyone’s online communications, transactions, and information. This problem isn’t new.

Applied Cyberwar: Hardware Exploits

Oct 19 2023 Gabriel

Recently a rumor that the tragic Hamas attack was enabled by a potential lack of backdoors accessible by western / 5 Eyes intelligence. Despite this, I wouldn’t recommend rushing to order a Huwawei phone for privacy reasons. If my threat model called for investigating hardware attacks, simply changing providers would be insufficient to keep them at bay. Understanding hardware exploits requires a bit of understanding about how systems run, so let’s take advantage of this teachable moment.

Cybergeddon: ISP-level De-platforming

Aug 17 2023 Gabriel

It is important to remember that when it comes to free expression online, no corporation is coming to save you. For far too long, people have placed too much trust in corporate social media. They have certainly abused that trust, but as of recently a far more concerning trend has arisen: parts of the Internet de-platforming itself. ipv6 prefix-list ipv6-prefix-filter-as400304 seq 950 deny 2607:46c0::/32 le 48 Archive It doesn’t look like much, this innocuous text reveals that the Internet isn’t dying… it’s being killed.

Escalating Cyberwar: Warlord Technology

Jul 17 2023 Gabriel

You have been found guilty. No trial was necessary, your device has testified against you. When one navigates corporate controlled cyberspace, the message couldn’t be more clear. Governments and tech giants negotiate the terms of total and utter digital feudalism while the people are herded into systems that are explicitly designed to control them. Even while it’s still possible, opting-out comes at a non-trivial cost. It is a cost that must be paid in one form or another, because refusing to do so has a grave price as well.

A Non-Combattant's Guide to Cyberwar

Jun 16 2023 Gabriel

We live in interesting times. In addition to the many boots-on-the-ground conflicts going on, cyberspace is a theatre of war with hardly any distinction between military and civilian targets. Nothing is off-limits and combatants can be anything from creative individuals to well-funded state level actors like governments and multi-national corporations. There’s no way to be perfectly out-of-the-way. Any significant cluster of data, storage, computing power, or bandwidth can become a strategic resource to be sought after.