-
6 votes
-
Obscure Indian cyber firm spied on politicians, investors worldwide
5 votes -
What are secure alternatives to slack, and what are your experiences with them?
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I...
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I foresee a lot of good activists, regardless of how far left they actually are, arrested on trumped up charges in order to squash opposition.
Organizing is essential to resist fascism. This is made more difficult by the pandemic, as in person meetings bring a huge, almost unacceptable risk. As such, many orgs have been turning to platforms like Slack instead. Trouble is, Slack logs are not encrypted and I am certain that as a business based in the US Slack will not put up a fight to keep user data safe if the feds come calling.
I'd like to collect a decent list of alternatives. Important factors include encryption, ownership, open source status, ease of use, federation, scalability, hosting, cross platform, and anything else you can think of.
23 votes -
macOS 10.15.5 has a trivial bug or a ‘reprehensible’ security decision
7 votes -
Gopass - The team password manager
7 votes -
Edison Mail vulnerability allowing unauthorized access to email accounts of other users
4 votes -
The confessions of Marcus "MalwareTech" Hutchins, the hacker who stopped WannaCry and was arrested by the FBI in 2017
33 votes -
Zoom acquires Keybase and announces goal of developing the most broadly used enterprise end-to-end encryption offering
38 votes -
CISSP qualification given cert status equivalent to Master’s degree level in Europe
3 votes -
Adobe patches sixteen critical flaws in Acrobat and Reader, Digital Negative SDK
5 votes -
Microsoft and Intel project converts malware into images before analyzing it
10 votes -
Firefox Private Relay - Generate unique, random, anonymous email addresses
33 votes -
Microsoft's GitHub account allegedly hacked, 500GB stolen
11 votes -
Face ID doesn’t work when you’re wearing a mask—Apple’s about to address that
12 votes -
Love Bug's creator tracked down to repair shop in Manila
7 votes -
The real impact of an open redirect vulnerability
4 votes -
Hyperdome - the safest place to reach out
5 votes -
Is Border Gateway Protocol safe yet? No.
4 votes -
After 9/11, Americans gave up privacy for security. Will we make the same trade-off after COVID-19?
21 votes -
Microsoft buys Corp.com so bad guys can’t
17 votes -
Thousands of Zoom cloud recordings have been exposed on the web because of the way Zoom names its recordings in unprotected AWS buckets
24 votes -
zWarDial, an automated tool to find unprotected Zoom meetings
7 votes -
Webcam hacking—The story of how I gained unauthorized Camera access on iOS and macOS
4 votes -
Does Linux need antivirus?
18 votes -
EARN IT act is a direct attack on end-to-end encryption
25 votes -
The case for limiting your browser extensions
9 votes -
Sophos has received an offer to be acquired for $3.9 billion by private-equity firm Thoma Bravo
8 votes -
Jam lets you safely share streaming app passwords
9 votes -
EU Commission to staff: Switch to Signal messaging app
14 votes -
Policy vs technology
15 votes -
I got a Ring doorbell camera. It scared the hell out of me.
11 votes -
Amazon Ring updates device security and privacy, including adding mandatory two-factor auth—but continues ignoring larger concerns
9 votes -
AZORult spreads as a fake ProtonVPN installer
9 votes -
Analysis of Voatz mobile voting app by MIT researchers finds elementary security flaws
11 votes -
Security researchers partner with Chrome to take down over 500 browser extensions in a fraud network affecting 1.7 million users
12 votes -
Firefox will start deprecating TLS 1.0 and 1.1 with Firefox 74, releasing on March 10, 2020
16 votes -
How Twitter's default settings enabled a security researcher to discover phone numbers for over seventeen million accounts
10 votes -
What to know before you buy or install an Amazon Ring camera
8 votes -
Ring's doorbell app for Android sends sensitive user data to multiple analytics and marketing companies
10 votes -
Critical Windows 10 exploit discovered which allows arbitrary software to be installed under the guise of Windows updates
20 votes -
Election security at the chip level – or, why your electronic voting options might not get better any time soon
5 votes -
Meet the mad scientist who wrote the book on how to hunt hackers
8 votes -
CVE-2020-0601 - Windows CryptoAPI spoofing vulnerability
16 votes -
Hackers are breaking directly into telecom companies to take over customer phone numbers
10 votes -
Tricky phish angles for persistence, not passwords
3 votes -
reCAPTCHA: Is there method in monotony?
What started out as a little facetious in my own head leads me now to a serious question. Is there some meaningful reason why Google has to use a subsection of images for reCAPTCHA? I really...
What started out as a little facetious in my own head leads me now to a serious question. Is there some meaningful reason why Google has to use a subsection of images for reCAPTCHA? I really dislike having to do this and at the very least would appreciate some variation.
- Traffic Lights
- Buses
- Bicycles
- Cars
- Crosswalks
Is there something special about these things in this context? Is the visual noise they're usually associated with what makes them good candidates? Are Google just really into urban planning? Who knows...I'm hoping some Tilder smarter than I can help me out.
10 votes -
Promiscuous cookies and their impending death via the SameSite policy
10 votes -
On privacy versus freedom
9 votes -
What we know about you when you click on this article—Vox has a pretty typical privacy policy. That doesn’t make it great.
11 votes -
Why electronic voting is still a bad idea
17 votes