aaa@community.hackliberty.org · 2 years ago@piracy@lemmy.ml MotherBoard PCBplus-squarelemmy.mlexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-link@piracy@lemmy.ml MotherBoard PCBplus-squarelemmy.mlaaa@community.hackliberty.org · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoDigital ID scanning is now mandatory to purchase tobacco products in Nevadaplus-squarereclaimthenet.orgexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkDigital ID scanning is now mandatory to purchase tobacco products in Nevadaplus-squarereclaimthenet.orgc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoUK plans to allow departments to more easily share more citizens’ personal data for digital ID verificationplus-squarereclaimthenet.orgexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkUK plans to allow departments to more easily share more citizens’ personal data for digital ID verificationplus-squarereclaimthenet.orgc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoUK supermarket uses facial recognition tech to track shoppersplus-squarewww.codastory.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkUK supermarket uses facial recognition tech to track shoppersplus-squarewww.codastory.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoHow Police Exploited the Capitol Riot’s Digital Recordsplus-squarearchive.phexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHow Police Exploited the Capitol Riot’s Digital Recordsplus-squarearchive.phc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoThe CIA 'Tries To Collect Everything And Hang On To It Forever'plus-squarewww.huffpost.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkThe CIA 'Tries To Collect Everything And Hang On To It Forever'plus-squarewww.huffpost.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoYahoo secretly scanned customer emails for U.S. intelligenceplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkYahoo secretly scanned customer emails for U.S. intelligenceplus-squarewww.reuters.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoMysterious spy cameras collecting data at post officesplus-squarekdvr.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkMysterious spy cameras collecting data at post officesplus-squarekdvr.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoSurveillance Techniques: How Your Data Becomes Our Dataplus-squarensa.gov1.infoexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkSurveillance Techniques: How Your Data Becomes Our Dataplus-squarensa.gov1.infoc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoOPSEC Considerations when using WiFiplus-squareforum.qubes-os.orgexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkOPSEC Considerations when using WiFiplus-squareforum.qubes-os.orgc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoHow to create anonymous Telegram and Signal accounts without a phoneplus-squareagorism.blogexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHow to create anonymous Telegram and Signal accounts without a phoneplus-squareagorism.blogc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · edit-22 years agoNetworkManager Trackability Reductionplus-squareprivsec.devexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkNetworkManager Trackability Reductionplus-squareprivsec.devc0mmando@community.hackliberty.orgM · edit-22 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoAnonymity Guideplus-squareanonymousland.orgexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAnonymity Guideplus-squareanonymousland.orgc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
Kapow@exploding-heads.com · 2 years agoElon Musk Plans 'Twitter 2.0' with Encrypted Chat, Video, Voice Callsplus-squarewww.breitbart.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkElon Musk Plans 'Twitter 2.0' with Encrypted Chat, Video, Voice Callsplus-squarewww.breitbart.comKapow@exploding-heads.com · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoStart a local Privacy Support Spaceplus-squaredys2p.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkStart a local Privacy Support Spaceplus-squaredys2p.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · edit-22 years agoRevealing Traces in printouts and scansplus-squaredys2p.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkRevealing Traces in printouts and scansplus-squaredys2p.comc0mmando@community.hackliberty.orgM · edit-22 years agomessage-square0fedilink
Wolfwood369@community.hackliberty.org · 2 years agoThe War on Crypto Privacy Intensifiesplus-squaredecentralizedlegalsystem.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkThe War on Crypto Privacy Intensifiesplus-squaredecentralizedlegalsystem.comWolfwood369@community.hackliberty.org · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoTiming Attacks on WhatsApp, Signal, and Threema can Reveal User Locationplus-squarerestoreprivacy.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkTiming Attacks on WhatsApp, Signal, and Threema can Reveal User Locationplus-squarerestoreprivacy.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
Wolfwood369@community.hackliberty.org · 2 years agoThe Unconstitutionallity of The Bank Secrecy Actplus-squarewww.cato.orgexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkThe Unconstitutionallity of The Bank Secrecy Actplus-squarewww.cato.orgWolfwood369@community.hackliberty.org · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoCT-001: Threat modeling demystifiedplus-squaremonero.observerexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkCT-001: Threat modeling demystifiedplus-squaremonero.observerc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink