Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

jeffcodes@infosec.exchangeJ

jeffcodes@infosec.exchange

@jeffcodes@infosec.exchange
About
Posts
5
Topics
0
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.
    jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

    @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

    Fair enough. I don't encourage just anyone either. Those who I have encouraged also know to call me if something blows up! 😂

    Uncategorized microsoft veracrypt windows infosec privacy

  • #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.
    jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

    @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

    IMO, it is not acceptable to simply overlook these hurdles and say, "this is not available to you because you're not technical like me." These tools are necessary against the mass surveillance of the companies like Microsoft, Google, etc. and governments alike.
    We, as technologist, should be working to make these more accessible to those who are not technologists too. Those folks deserve the right and privacy and security like the rest of us.

    Uncategorized microsoft veracrypt windows infosec privacy

  • #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.
    jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

    @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

    The data may be fine; however, not everyone who may use VeraCrypt has the same knowledge and skill base to know to pull up a Linux Live USB and go get their data back. I've encouraged non-technical users to use easy breakthroughs to add encryption to their Windows Home environments. They definitely will not have the knowledge do just go do this. Many may not have another device to create the Linux Live USB either.
    This is still a problem, whether or not the data is still available through other means.

    Uncategorized microsoft veracrypt windows infosec privacy

  • We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in:
    jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

    @mu @cdarwin
    It doesn’t matter where the hard/PII data is saved. The ID’s and documents can be safe, sure. The meta data, the IP, the OS, the date, the time, the patterns of use, instances logged in and when, and any other data shared, will end up in oligarchs or government hands to profile the people further than we already are. Maybe just for behavioral manipulative advertising, maybe for identification in political round ups.
    With the current fascist regime going after people wearing black to protests and garnering convictions of domestic terrorism as antifa as a result, I don’t I want any of my data, meta or not, being gathered due to the high potential for abuse of a repressive regime. I don’t want to end up in jail as a terrorist because I log into a liberal Discord frequently and use Signal.
    Argue about data safety all you want, but it misses the actual problem completely.

    Uncategorized

  • We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in:
    jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

    @mu @cdarwin
    Even if the data is safeguarded, the larger purpose is achieved, mass surveillance. The data integrity is secondary to adding a whole new trove of PII that can, and will, be easily used for surveillance.

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups