logo

Libre Solutions Network

Freedom in the digital age

RSS

The following video is a summary of a report on how programmatic advertising can be weaponized for mass real-time surveillance. This report is highly troubling but not particularly surprising. If you want to learn how it’s being used, read up on the mastodon thread made by one of the report’s authors.

Further Reading:

Gabriel

Support Donate Monero

Published: Jan 11 2024
Tags: Privacy Surveillance Cybersecurity Advertising

Why The Perfect Messaging App Doesn't Exist

Dec 10 2023 Gabriel

Surveillance of peoples communications is a severe overreach. Especially the act of monitoring people’s sensitive discussions with their most trusted contacts. Large institutions like corporations and governments are wrestling over control of and insight from people’s private chats. This is largely because there are limitations to only data-mining public communications. All the money and effort spent on propaganda and censorship can be for naught if people are still allowed to make their own minds in private.

Applied Cyberwar: Hardware Exploits

Oct 19 2023 Gabriel

Recently a rumor that the tragic Hamas attack was enabled by a potential lack of backdoors accessible by western / 5 Eyes intelligence. Despite this, I wouldn’t recommend rushing to order a Huwawei phone for privacy reasons. If my threat model called for investigating hardware attacks, simply changing providers would be insufficient to keep them at bay. Understanding hardware exploits requires a bit of understanding about how systems run, so let’s take advantage of this teachable moment.

DIY Cyber Audit

Sep 30 2023 Gabriel

It’s good for people to take their own cybersecurity seriously. It’s a huge topic, and it can be difficult to decide what’s worth starting with, or expending a lot of effort on. This guide is intended to walk you through some of the basic “bare-minimum” steps one would want to take in improving their online security. In addition to pure security goals, this piece aims to emphasize how to reduce your dependency on systems that seize control of your information and workflows.


Prev B @ Next