@PC_Fluesterer@social.tchncs.de avatar

PC_Fluesterer

@PC_Fluesterer@social.tchncs.de

Physiker; lange Jahre Angestellter in Investitionsgüter-Industrie, Schwerpunkt Automatisierung und Leitwarten; Projektleiter internationaler Forschungsprojekte; den Rest gibt es hier: https://www.pc-fluesterer.info/wordpress/impressum-2/ueber-mich/
#security #privacy #tracking #big-data #FOSS #surveillance #linux #politik #klima #umwelt

This profile is from a federated server and may be incomplete. Browse more on the original instance.

PC_Fluesterer, to android German
@PC_Fluesterer@social.tchncs.de avatar

SimpleMobileTools ist tot – es lebe Fossify!

Heute müssen wir neben Manipulation und Schlamperei über ein weiteres Missgeschick reden, was FOSS passieren kann. Es ist sogar das nächst liegende und passiert häufig. Der vorliegende Fall allerdings sticht aus

https://www.pc-fluesterer.info/wordpress/2024/04/14/simplemobiletools-ist-tot-es-lebe-fossify/

stefan, to design
@stefan@stefanbohacek.online avatar

I wonder why the Android Gmail app shows the number of emails in your trash. They don't do that in the web version.

I use filters and labels pretty extensively, so this breaks the ability to quickly scan my unread emails.

Minor nuisance, but still makes me wonder about this design decision/inconsistency.

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@voorstad @stefan
Because they are ill-informed or ignorant.

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@stefan @voorstad I for one don't interact with people using US providers (except lavabit). The explanation is available in German: https://www.pc-fluesterer.info/wordpress/vorbeugen/e-mail/e-mail-und-privatsphaere/

kuketzblog, to Matrix German
@kuketzblog@social.tchncs.de avatar

ist gefragt. Nachdem großen Update der Messenger-Matrix habe ich noch den Line-Messenger ergänzt. Ich bitte alle mal einen prüfenden Blick auf die Matrix zu werfen - insbesondere auf jene Messenger, die ihr selbst benutzt. Sollten Angaben nicht stimmen bzw. überarbeitet werden, so meldet das bitte. Entweder hier oder über die Projektseite.

https://www.messenger-matrix.de/messenger-matrix.html


PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@kuketzblog Super Übersicht, danke! Leider muss ich den Zoom sehr klein stellen, damit alle Messenger auf den Schirm passen. Da fehlt mindestens eine Möglichkeit, horizontal zu scrollen. Oder noch besser: Ich würde alle raus werfen, die nicht FOSS sind. Ein entsprechender genereller Hinweis würde reichen. Dann entfallen Discord, iMessage, Skype, Viber, Whatsapp. Das trennt schon mal die Spreu vom Weizen. Wer diese Messenger benutzt, muss nicht detailliert wissen, WIE SCHLECHT sie sind ...

beandev, (edited ) to random German
@beandev@social.tchncs.de avatar

Angebliche Stromausfälle in Deutschland: Alarm im Mittelstand

https://taz.de/Angebliche-Stromausfaelle-in-Deutschland/!6003798/

> „Es geht ums blanke Überleben“, sagt eine mittelständische Firmeneigentümerin bei „Lanz“ – und klagt über Energieknappheit. Was ist zu tun?

Das ist so witzig, da bekommt ein Unternehmen nicht Stromausfälle im Millisekundenbereich auf die Reihe, vernachlässigt also seine eigenen Sicherungspflichten, und kommt damit ins Fernsehen 😂

Upd.: etw. längerer Rant von mir wurde als Leserbrief in der taz publiziert

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@beandev
Als ich mit dem Lesen bei „Lanz“ ankam, habe ich aufgehört. Dieser Vertreter einer falschen Ausgewogenheit gehört zu meinen "STOP" Wörtern. 🤢

kuketzblog, to security German
@kuketzblog@social.tchncs.de avatar

Wie man sich die Ursache zur xz-Hintertür (CVE-2024-3094) am besten vorstellen kann. 👇

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@kuketzblog Ja, wie es beispielsweise vor drei Jahren bei f-droid ähnlich versucht wurde. Nur haben die den Braten rechtzeitig gerochen. Der Hintertür war noch nicht so gut getarnt.

rufposten, to random German
@rufposten@social.tchncs.de avatar

Gebe ja nie mein Geburtsdatum bei Onlineportalen an.

Bei den Prepaid-Marken der Telekom muss man in der Bestellstrecke auch kein Geburtsdatum angeben.

Daher weiß ich nun, dass Post und Telekom das Geburtsdatum und den zweitem Vornamen einfach aus dem Postident-Verfahren mopsen und für so 'n Marketingkokolores weiternutzen. 🙄

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@kaffeeringe @ftranschel @rufposten
Aha, ein Leser von "Hitchhikers Guide to Galaxy". 😀

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@deFrisselle @ForgottenFlux Perhaps (and other -rom) is too secure? Because it prevents surveillance. Just thinking. 😉

madargon, to microsoft
@madargon@is-a.cat avatar

Last night I finally deleted my account. It was last owned service I used (and rarely even log in last two years).
So am I fully now? :blobcattilt:

It was also ethical matter for me, I didn't want to deal with , so morally bankrupt corporation, in any way. Both for data stealing, violations and disrespect for users and for compliance with authoritarian governments and creating technologies for oppression.

Yes, I wrote this in form as a reason, in more detailed way, until I used character limit.

Now I feel... More coherent? And it's good feeling.

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@madargon Congratulation. 👏

astian, to privacy
@astian@mastodon.social avatar

Watch the full video in the explanation of each browser Midori Web Browser

https://www.youtube.com/watch?v=poniwjGYPag

Download Midori Web Browser https://astian.org/midori-browser

video/mp4

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@astian something about published on ? Seems a cognitive dissonance to me.

Viss, to random
@Viss@mastodon.social avatar

food for thought:

zero commercial airline pilot pre-flight checklists covered things like "missing bolts causing the plane to depresurize" and "the wheels keep falling off".

computer security works in very much the same way - "compliance" is that preflight checklist. its a bunch of checkboxes you should look at before flying (and the FAA will essentially force you to because its the rules)

but it ABSOLUTELY does not cover everything, and MANY THINGS WILL KILL YOU that arent on the checklist.

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@RL_Dane @Viss
I know what it is: Boeing! 😆
SCNR.

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@filister @ininewcrow
That's right, no double standards.
Ban TikTok AND ban entirely!

ppatel, (edited ) to security
@ppatel@mstdn.social avatar

It should not have taken me 45 minutes or more to setup 2FA again with LinkedIn. And then to have repeatedly failed because it couldn't verify the 2FA code I was feeding it after entering the secret key, ... To say that I'm pissed is an understatement.

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@ppatel
- is that the dating and ad slinging platform disguising as career network?

intelgraphy, to Cybersecurity
@intelgraphy@hachyderm.io avatar

I've been getting a bit lost on my career building. I knew what kind of job I want to do, but I don't know what practice and other preparations to prioritize. And I have to network with people too.

I just have no clear direction right now as I still mind-wander about the many software, protocols, or security practices I should study. But I've also been thinking about skills that involve the social aspects of security. Hmm..

PC_Fluesterer,
@PC_Fluesterer@social.tchncs.de avatar

@intelgraphy My recommendation: Learn as much as you can about how to build IT systems completely based on from the internet facing devices such as till the backoffice with and so forth. The future is if one wants to have and .

AAKL, to linux
@AAKL@noc.social avatar

deleted_by_author

  • Loading...
  • PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @AAKL @BleepingComputer @serghei The two hacks used (local privilege escalation) weaknesses. To exploit them, you need an insider ("evil maid").

    miramusank, to FiberArts
    @miramusank@fashionsocial.host avatar

    Making pattern is one of my ultimate highs in crafting garments. I do my best to document the process every time it happens because it’s so time-intensive and I don’t know when the next opportunity comes.

    This latest pattern is called mokume (I.e. wood grain), and it’s my first time doing it!

    https://www.instagram.com/reel/C4dyheSvKMq/?igsh=ZWI2YzEzYmMxYg==

    @sewing

    PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @miramusank @sewing is ? I cannot access it because all of is blocked in my .

    PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @nusse @miramusank @sewing Well, that is YOUR problem. That don't impress me much.

    Edent, to opensource
    @Edent@mastodon.social avatar

    🆕 blog! “Can you trust ProtonApps.com?”

    I've recently signed up to the privacy-preserving service Proton. All the email, calendar, drive, VPN, and other services seem to hang off the proton.me domain. I wanted to download the Android apps to my phone - without using the Google Play Store. The VPN app is on F-Droid but none of the others are. So, […]

    👀 Read more: https://shkspr.mobi/blog/2024/03/can-you-trust-protonapps-com/

    PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @Edent ProtonVPN AND Proton Mail are on f-droid if you install the IzzyOnDroid repo - but that is a must anyway, isn't it?

    PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @Edent
    All repos host . Is FOSS trustworthy? You judge. Izzy is here: https://android.izzysoft.de/repo
    One repo list (of several): https://android.izzysoft.de/articles/named/list-of-fdroid-repos?lang=en

    PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar
    AAKL, to linux
    @AAKL@noc.social avatar

    deleted_by_author

  • Loading...
  • PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @AAKL @BleepingComputer @theregister
    That STILL isn't Linux malware but malware against various application SW able to run under as well. Quotation: "Upon first launch, the malware performs ..." - Who or what launches the malware? Please stop framing this sort of malware as "Linux". It isn't!

    AAKL, to Cybersecurity
    @AAKL@noc.social avatar

    deleted_by_author

  • Loading...
  • PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar
    DeltaWye, to infosec
    @DeltaWye@mstdn.social avatar

    I saw a parking fare payment device today that had its Internet-facing IPV4 address (maybe for the cellar modem?) displayed on the front panel. It was at the bottom of the screen along with some other stuff.

    Is that a security problem? I probably wouldn’t have designed it to show that IP address. But maybe depending on how security is set up that might not be all that useful to an attacker? (Not an IT security export here.)

    PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @DeltaWye I don't see a problem here. Compare it to any other webserver whose IP address MUST be visible by definition. If the device should be vulnerable it will get hacked anyway, known IP or not. There are specialized search engines such as shodan to scan the entire net (ALL addresses) for vulnerable devices.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • osvaldo12
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • anitta
  • InstantRegret
  • GTA5RPClips
  • cubers
  • ethstaker
  • normalnudes
  • tacticalgear
  • cisconetworking
  • tester
  • Leos
  • modclub
  • megavids
  • provamag3
  • lostlight
  • All magazines