opsec

xyhhx,
@xyhhx@438punk.house avatar

re: my recent boost (linked below)

mics (machine identification code) are nearly invisible marks most printers add to anything they print, as a means of tracking where each peice of printed material was printed from - down to the exact printer. not model, the individual printer

it's allegedly to curb counterfeit money, but obviously it can be used to connect material you print for, say, activism or political stuff down to the exact printer you used. if you're going to bureau en gros to print, or if you used a printer you bought, it can be traced to you

the @eff has some material that tried to identify printers that do or do not use mics, but it's no longer maintained:

https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots

makeuseof.com has another informative article on the subject including possible mitigations:

https://www.makeuseof.com/machine-identification-codes-printer-privacy-risk/

some mitigations they suggest include:

these are both only useful to technically savvy people i think tho

anyway stay vigilant gang

https://infosec.exchange/@jxhn/112400527690021252

outlyer, Catalan
@outlyer@mastodont.cat avatar

Així que Espanya va enviar una de les seves ordres xusques a Suïssa (d'aquelles que anomenen terroristes a Tsunami –LOL), Suïssa va requerir a #ProtonMail i això va acabar descobrint la identitat d'una persona (a través del seu mail de recuperacio i un requeriment a Apple), i en la seva detenció.

Aneu amb compte i no doneu per fet que un servei segur/encriptat us converteix en anònims.

(Notícia de fa mínim dos setmanes que pel que sigui no m'havia arribat fins avui)

#opsec

xevhi,
@xevhi@techhub.social avatar
protonprivacy,
@protonprivacy@mastodon.social avatar

@xevhi @outlyer Note that the recovery address (which was the only thing we had access to and could provide regarding this account) is an optional recovery method, and not the only one we offer: https://proton.me/support/set-account-recovery-methods

nikita, German
@nikita@social.tchncs.de avatar


Are privacy and the messaging app still secure

Every year this gets called into question, yet rarely is the full story ever told. In this video, Josh explains what's really happening with these privacy and security apps as well as how it affects YOU directly.

, 𝚛𝚎𝚜𝚙. 𝚍𝚊𝚜 𝚐𝚊𝚗𝚣𝚎 𝙳𝚛𝚞𝚖𝚖𝚑𝚎𝚛𝚞𝚖 𝚒𝚜𝚝 𝚖𝚒𝚗𝚍. 𝚜𝚘 𝚠𝚒𝚌𝚑𝚝𝚒𝚐 𝚠𝚒𝚎 𝙰𝚙𝚙𝚜 & 𝙲𝚘.

https://invidious.fdn.fr/watch?v=9ZLMDMk5rzk

Tutanota,
@Tutanota@mastodon.social avatar

Are you a journalist, activist or whistleblower in need of an anonymous email account that doesn't require a personally identifiable recovery email address or phone number?

Tuta has you covered. 👉 https://tuta.com/blog/anonymous-email

This is anonymity done right. 😎
#anonymous #opsec #privacy #encryption

JenMorency,
@JenMorency@toot.community avatar

#Opsec Matters: #Encrypted services #Apple, #Proton and #Wire helped #Spanish police identify #activist https://techcrunch.com/2024/05/08/encrypted-services-apple-proton-and-wire-helped-spanish-police-identify-activist/ "The legal requests sent to Wire, Proton & Apple are related to a case where Spanish authorities believe that a pseudonymous member of the #Catalan pro-independence movement Tsunami Democratic was helping the group plan some kind of actions or demonstrations at the time when King Felipe VI was planning to visit the region in 2020." They were ID'ed thru recovery e-mails.

datenwolf,
@datenwolf@chaos.social avatar

Some people should not be allowed anywhere near networked computers. Just participated in some EU research project kick-off meeting…

> We have a 250TB storage system for our data with "RAID-6 backup".

> You can reach it under hʇʇp://foobar‍.‍fnord‍.‍fail (it's a HTTP 301 redirect to some IP in a university's address range; no TLS; plaintext HTTP).

Ã̵͔̏̐͗̍a̸͍̅̑̔̚a̶͔̲͛̔̄͘r̸̠̙̻͚̾̑͂r̴̭̞̫̜̍̇g̵̘͚͙̫̊̿͠g̸̢͍̣̗͊̒̏̓̕ǵ̶͍̠͔̲̟̔̎͌̓h̶͔͈̜̦̋ḩ̴̱͆͠ḣ̴͉h̶̞̺̟͂̈́̀ ← my headspace

datenwolf,
@datenwolf@chaos.social avatar

I mentally crossed that threshold where I think, that every publicly funded project by law should be enforced to have at least one hire with 𝕒𝕝𝕝 𝕥𝕙𝕖 𝕔𝕖𝕣𝕥𝕚𝕗𝕚𝕔𝕒𝕥𝕚𝕠𝕟𝕤¹ on the payroll with the sole role of managing the IT stuff.

¹: I don't care that having the certs doesn't mean, they're actually competent. I'd be perfectly contempt with some checklist checking button pusher who at least memorized by rote some "best practices" and does a 40% job. That'd still be better, than current affairs.

ArneBab,
@ArneBab@rollenspiel.social avatar

@datenwolf wouldn’t it suffice (or be better) to require Universities to have enough permanent IT staff who will support projects?

And to require them to sign-off the IT plans of any project?

JulianOliver,
@JulianOliver@mastodon.social avatar

Test case: You get a voice msg from a friend in the middle of the night. They're in a local park and they need your help right now.

Soon, we will not know whether to act.

Time to work on 'code words' with family and friends, to help filter people from their simulations

https://www.theguardian.com/technology/2024/mar/31/openai-deems-its-voice-cloning-tool-too-risky-for-general-release

JulianOliver,
@JulianOliver@mastodon.social avatar

@jedsetter I wish

SpyBlog,
@SpyBlog@mastodon.social avatar
tj,
@tj@howse.social avatar

You are not immune to being scammed.

Today I was half a second away from tapping a link in an SMS that was informing me I need to renew my credit card details because my CC was expiring.

My CC IS expiring this month. I updated my CC details on two other services yesterday. Through sheer dumb luck the scammer happened to bait their hook correctly.

I must not be complacent.
Complacency is the opsec-killer.
Complacency is the little death that brings identity theft.

nf3xn,
@nf3xn@mastodon.social avatar

@tj Any sort of leak might contain phone number, last four and your expiry month/year - so probably not luck?

scy,
@scy@chaos.social avatar

Huh. Anyone ordered a lately? Did yours also come with an obvious fingerprint smudge on its contact surface?

The packaging is apparently undamaged.

I've contacted Yubico support about whether that's normal or a possible sign of tampering. Let's see what they say.

flauschzelle,
@flauschzelle@chaos.social avatar

@scy
I got a Yubikey in January, but as far as I remember, there was no smudge like this on it 🤔

Hmm, maybe it's from some kind of manual testing/QA in the manufacturing process? But I'm just speculating.

scy,
@scy@chaos.social avatar

@flauschzelle Yeah, in my support request to Yubico I'm asking that exact thing. Really interested in what they're gonna say.

xyhhx,
@xyhhx@438punk.house avatar

idk who needs to hear this, but your threat model / opsec precautions shouldn't just be based on your current situation. you need to consider anything and everything that could happen in the foreseeable future

that includes a change of political climate, a change of your own skill sets and undertakings, etc

please boost this shit

sergiopantalone,
@sergiopantalone@corteximplant.com avatar

I work in engineering at a small design firm where our IT department consists of one person, who is also the building manager and director of operations. We engineers are currently fighting for local admin privileges rather than wait hours to get critical software installed, but were told people "good with computers" are actually a bigger security risk because of "hubris and experimentation." Is this true? Does anyone have any evidence (esp literature) to the contrary? Boosts appreciated, and thanks!

datacyclist, German
@datacyclist@swiss.social avatar

Wenn ihr beim SRF im Video den Panzertransport filmt und dabei noch den Bahnhaltepunkt Bronschhofen AMP mit drauf habt, ist das nicht weit her mit "militärischer Geheimhaltung", die im Text erwähnt wird. https://www.srf.ch/news/schweiz/indirekte-ruestungshilfe-schweizer-leopard-2-panzer-auf-dem-weg-nach-deutschland

FlockOfCats,
@FlockOfCats@famichiki.jp avatar

“opsec” stands for “oppai security”

jezebelkat,
@jezebelkat@famichiki.jp avatar
fetchezlavache,
@fetchezlavache@famichiki.jp avatar

@FlockOfCats we need merch !

deweyritten,

has anyone ever tried incogni?

The_Asshat,

@deweyritten I use Delete.me and I’m pretty happy with that.

samanthagroves,

A post with some basic links:

On how Google and Apple have been spying on you via push notifications (for years): https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/

Signal statement on the subject by their CEO (they say that no sensitive data is included in their push notifications): https://mastodon.world/

Why should you still care?

  • Do a quick search for 'Michael Hayden" + “We Kill People Based on Metadata” (obviously use anything but google)

The Electric Frontier Foundation @eff is a good place to check for updates and an account to follow to choose the tools that are right for you.

, a cross platform chat program relying on the IMAP/SMTP protocol (email) with easy to set up encryption via autocrypt: https://delta.chat/en/help#encryption-and-security

Deltachat relies on IMAP/SMTP (emailK so make sure that you set up a new address with a provider you trust and use an username that can't be linked back to your usual nicknames or worse: your government name.

is an IM client with mesh support (aka peer to peer) you can restrict communication to your local network to Bluetooth, and redirect internet traffic via tor: https://briarproject.org/manual/
Do note that any blog you posted can't ever be deleted and that you will systematically be sharing your Bluetooth address (you can nuke your account at any time)

is a portable OS which allows you to "temporarily turn your own computer into a secure machine. You can also stay safe while using the computer of somebody else": https://tails.net/about/index.en.html

Obviously you should be aware of : https://www.torproject.org/ and check your fedi account for common mistakes: https://distro.f-91w.club/masto-opsec

Last but not least, for IRL shit this is as good a place to start as any: https://opsec.riotmedicine.net/ (by @hakan_geijer)

Stay safe, wear a mask, be they, do crimes and ffs, don't ever talk about the later!

And if you do have a criticism towards the one or other mentioned app, please do share it!

ths, German

wird bei unseren Behörden groß geschrieben:

„Für Aufregung in Sicherheitskreisen sorgte am Nachmittag eine vorzeitige Meldung von Bundesjustizminister Marco Buschmann. Seine Pressestelle verbreitete ein Statement zu den Festnahmen bereits zu einem Zeitpunkt, als die GSG9 noch nicht alle Beschuldigten überwältigt hatte und der Polizeieinsatz noch nicht abgeschlossen war.“

https://www.tagesschau.de/inland/gesellschaft/hamas-generalbundesanwalt-100.html

wonka,
@wonka@chaos.social avatar

@ths Einmal mit nur Profis arbeiten...

monkeyflower,
avoidthehack,

Encrypted Messaging and Why You Need It

From @Lockdownyourlife

Encrypted messengers for all!

My favorite encrypted messenger is SimpleX Chat @simplex. I'm also a fan of Signal @signalapp and Session @session.

What's yours?

https://www.lockdownyourlife.com/encrypted-messaging/

islamicaudiobooks,
@islamicaudiobooks@mastodon.social avatar

@avoidthehack @Lockdownyourlife @simplex @signalapp @session I love @simplex, @session and @signalapp but currently I'm most fascinated with @briar.

I plan to use it some day :)

steampixel, German
@steampixel@social.tchncs.de avatar

Smartphone Halt's Maul: Diese Checkliste soll dir helfen spielerisch deine Smartphone-Sicherheit zu überprüfen, damit du ein Gefühl für die Thematik entwickeln kannst. Die Liste enthält konkrete Vorschläge zur Verbesserung deiner Sicherheit. Punkte und Level sollen dich ermutigen so viel wie möglich abzuhaken.

https://smartphone-halts-maul.de/

bashinho, German
@bashinho@social.tchncs.de avatar

Ein sehr interessantes Whitepaper zu hat das Fazit: "Of the 16 VPNs we analyzed, Mullvad, PIA, IVPN, and Mozilla VPN (which runs on Mullvad’s servers)—in that order—were among the highest ranked in both privacy and security. However, PIA has never had a public third-party security audit. 1/x
https://innovation.consumerreports.org/wp-content/uploads/2021/12/VPN-White-Paper.pdf

bashinho, (edited )
@bashinho@social.tchncs.de avatar

Additionally, in our opinion, only IVPN, Mozilla VPN, and Mullvad—along with one other VPN (TunnelBear)—accurately represent their
services and technology without any broad, sweeping, or potentially misleading statements." 2/x

hacks4pancakes,

@bashinho 💯💯💯

drahardja,
@drahardja@sfba.social avatar

So I discovered that Someone Who Shall Not Be Named has been using a proper password manager on their iPhone, but hasn’t figured out how to sync passwords to their Windows PC.

So they send passwords to themselves from their phone to their PC…

…using Discord.

They’re using Discord to transport passwords in plaintext because they haven’t figured out how to sync passwords across the devices, and they don’t want to type each letter in.

I…I can’t.

I can’t.

adamsdesk,
@adamsdesk@fosstodon.org avatar
adamsdesk, (edited )
@adamsdesk@fosstodon.org avatar

@drahardja I have clients that text their passwords and store them in note apps in plaintext. I scream a little inside.

damienlux, (edited )

It is fucking hard to have good as a .

For example: most digital photos contain metadata that could potentially be used to tie your nsfw endeavors to your normie-world identity, sometimes with dire consequences.

Many platforms (e.g. mastodon) will normalize uploaded photos, stripping all such metadata in the process. However, others (e.g. manyvids) do not normalize all media, instead offering to customers the exact files you upload, metadata fully intact.

damienlux,

Manyvids is shall we say less than ideal in this regard. For photo sets, the only option they give you is to create a zip file containing the photos on your own computer and upload it to them.

Guess what! Zip files contain their own set of metadata, that once again could potentially be used against you.

damienlux, (edited )

I have some experience in tech. I'm happy to answer any questions from unsure about how to remain anonymous (or pseudonymous) online.

Stay safe out there!

❤️☂️

*edit: please boost

thegrugq,

If you’re interested in OPSEC you’ll find this talk extremely informative. Lots of important information on how to operate safely.

https://www.youtube.com/watch?v=9XaYdCdwiWU

caseyjohnellis,

@thegrugq classic

radpanda, Polish

„Dokładamy szczególnych starań w celu zachowania poufności kontaktu i prywatności naszych klientów”.

Skrzynka e-mail postawiona na gmailu oraz kontakt przez SMS.

🤡🤡🤡

Marventh,

@radpanda witamy w Polskich realiach 😂

radpanda,

@Marventh Mam przeczucie, że to nie tylko w polskich realiach tak wesoło 😆😅

kmic,

One second of losing focus and is gone.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • opsec
  • kavyap
  • mdbf
  • tacticalgear
  • osvaldo12
  • InstantRegret
  • DreamBathrooms
  • cubers
  • magazineikmin
  • thenastyranch
  • khanakhh
  • Youngstown
  • slotface
  • rosin
  • ethstaker
  • JUstTest
  • tester
  • GTA5RPClips
  • Durango
  • modclub
  • Leos
  • ngwrru68w68
  • everett
  • anitta
  • cisconetworking
  • provamag3
  • normalnudes
  • megavids
  • lostlight
  • All magazines