mics (machine identification code) are nearly invisible marks most printers add to anything they print, as a means of tracking where each peice of printed material was printed from - down to the exact printer. not model, the individual printer
it's allegedly to curb counterfeit money, but obviously it can be used to connect material you print for, say, activism or political stuff down to the exact printer you used. if you're going to bureau en gros to print, or if you used a printer you bought, it can be traced to you
the @eff has some material that tried to identify printers that do or do not use mics, but it's no longer maintained:
I got a DM about how to host a Website as anonymous as possible, especially viewed from the outside with as little attack surface as possible. I already threw a bunch of my ideas in the room, but maybe you can think of something I haven't thought of...
Please just answer to this post if something crosses your mind from security over hoster to the website itself, I will link it to the person.
Aixรญ que Espanya va enviar una de les seves ordres xusques a Suรฏssa (d'aquelles que anomenen terroristes a Tsunami โLOL), Suรฏssa va requerir a #ProtonMail i aixรฒ va acabar descobrint la identitat d'una persona (a travรฉs del seu mail de recuperacio i un requeriment a Apple), i en la seva detenciรณ.
Aneu amb compte i no doneu per fet que un servei segur/encriptat us converteix en anรฒnims.
(Notรญcia de fa mรญnim dos setmanes que pel que sigui no m'havia arribat fins avui)
Every year this gets called into question, yet rarely is the full story ever told. In this video, Josh explains what's really happening with these privacy and security apps as well as how it affects YOU directly.
Are you a journalist, activist or whistleblower in need of an anonymous email account that doesn't require a personally identifiable recovery email address or phone number?
๐ Just completed the 'Basics of Personal Threat Modeling' course by @privacyguides ๐ก๏ธ
Threat modeling is crucial because it helps identify and prioritize the most probable security and privacy risks. It enables focused resource allocation, tailored defenses, and heightened awareness.
Some people should not be allowed anywhere near networked computers. Just participated in some EU research project kick-off meetingโฆ
> We have a 250TB storage system for our data with "RAID-6 backup".
> You can reach it under hสสp://foobarโ.โfnordโ.โfail (it's a HTTP 301 redirect to some IP in a university's address range; no TLS; plaintext HTTP).
Aฬตฬฬฬอฬอaฬธฬ ฬฬฬอaฬถอฬฬออฬฒrฬธฬพฬอฬ ฬฬปอrฬดฬฬฬญฬฬซฬgฬตอ ฬฬฟฬออฬซgฬธฬอฬฬออฬขฬฃฬgฬถฬฬฬอฬอฬ อฬฒฬhฬถฬออฬฬฆhฬดอ อฬฑฬงhฬดฬอhฬถอออฬฬบฬ โ my headspace