logo

Libre Solutions Network

Freedom in the digital age

RSS

Earlier this week, I hastily recorded a video for the substack newsletter to dennounce the astounding behavior by Unjected in response to news breaking of their site being found to have serious vulnerabilities. Instead of informting their users of the risks of their information being vulnerable, the company instead would prefer to downplay and dismiss any concerns and mislead their users about what steps they should take to protect their private information.

I have included the video here for anyone who may like to see an exemplary example of the attitude you DON’T want to see in operators of a site you frequent. It’s important that people learn Lessons from Alt-Tech Failures of the past. It’s highly concerning how various ventures will take people’s values or identity to wear a skin-suit of them for self-serving reasons. Educate your friends and family of the risks of data breaches, and try to choose only online services you can trust, better yet consider self-hosting what you can.

More importantly, don’t let people use the scare tactic of “the government can get everything” to dissuade you from putting in the effort to reinforce your own privacy and security. There are many advantages to even incremental steps that can resolve future problems.

Gabriel

Support Donate Monero

Published: Apr 12 2024
Tags: Alt-Tech Cybersecurity Cyberwar Unjected Operation: Hearth Privacy

Lessons from Alt-Tech Failures

Apr 08 2024 Gabriel

Data breaches are a serious problem. We do not live in an environment where it is safe for people’s PII (Personally Identifiable Information) to be widely available. When somebody’s data is leaked or stolen, there can be and have been serious repercussions for that person. It is desperately important that we not only carefully choose the platforms we use, but also that they’ve taken steps to protect their users from risks related to the platform itself.

Data Shedding

Jan 11 2024 Gabriel

The following video is a summary of a report on how programmatic advertising can be weaponized for mass real-time surveillance. This report is highly troubling but not particularly surprising. If you want to learn how it’s being used, read up on the mastodon thread made by one of the report’s authors. Links: Mastodon Thread Europe’s Hidden Security Crisis Report Further Reading: The Military Origins of Facebook How Palantir Conquered the World Total Information Awareness Understanding Malicious ads

Applied Cyberwar: Hardware Exploits

Oct 19 2023 Gabriel

Recently a rumor that the tragic Hamas attack was enabled by a potential lack of backdoors accessible by western / 5 Eyes intelligence. Despite this, I wouldn’t recommend rushing to order a Huwawei phone for privacy reasons. If my threat model called for investigating hardware attacks, simply changing providers would be insufficient to keep them at bay. Understanding hardware exploits requires a bit of understanding about how systems run, so let’s take advantage of this teachable moment.


Prev B @ Next