gyptazy.ch is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
contact@gyptazy.ch
Admin account
@gyptazy@gyptazy.ch

Search results for #privacy

alecm »
@alecm@alecmuffett.com

Dell API abused to steal 49 million customer records in data breach | …an example of poor security through lack of both rate limiting & behavioural modelling

Once they gained access to the portal, Menelik told BleepingComputer they had created a program that generated 7-digit service tags and submitted them to the portal page starting in March to scrape the returned information.

As the portal reportedly did not include any rate limiting, the threat actor claims they could harvest the information of 49 million customer records by generating 5,000 requests per minute for three weeks, without Dell blocking the attempts.

https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/

<div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_24 addtoany_list" data-a2a-url="https://alecmuffett.com/article/109806" data-a2a-title="Dell API abused to steal 49 million customer records in data breach | …an example of poor security through lack of both rate limiting &amp; behavioural modelling"></div></div>

https://alecmuffett.com/article/109806

John Scott-Railton ☕ »
@jsrailton@mastodon.social

I can confidently diagnose as sociopaths.

Promised therapy customers privacy...then gave their mental health info to advertisers.

Victims get less than ten bucks each.

Company made billion+ in revenue last year alone.

In a just society with good privacy laws, they'd face existential civil & criminal consequences.

wcnc.com/article/news/nation-w

No descriptionNo descriptionNo descriptionNo description

jbz »
@jbzfn@mastodon.social

Discloses User Data Leading to Arrest in Spain

「 The core of the controversy stems from Proton Mail providing the Spanish police with the recovery email address associated with the Proton Mail account of an individual using the pseudonym ‘Xuxo Rondinaire.’ This individual is suspected of being a member of the Mossos d’Esquadra (Catalonia’s police force) and of using their internal knowledge to assist the Democratic Tsunami movement 」

restoreprivacy.com/protonmail-

GrapheneOS »
@GrapheneOS@grapheneos.social

GrapheneOS version 2024050700 released:

grapheneos.org/releases#202405

See the linked release notes for a summary of the improvements over the previous release.

Forum discussion thread:

discuss.grapheneos.org/d/12566

GrapheneOS »
@GrapheneOS@grapheneos.social

GrapheneOS version 2024050300 released:

grapheneos.org/releases#202405

See the linked release notes for a summary of the improvements over the previous release.

Forum discussion thread:

discuss.grapheneos.org/d/12485

Linux Magazine »
@linuxmagazine@fosstodon.org

From this week's Linux Update: Matthias Wübbeling shows you how to protect your data and operating system from prying eyes with @veracrypt linux-magazine.com/Issues/2024

photo of a person's face with an X made of blue tape over their mouth

Sourcerer »
@sourcerer@mastodon.bsd.cafe

Reproducible builds - pros/cons

Instructor allowed me to quote his take on Pros and Cons of reproducible builds. Because, i found this very informative i want to share with others.

Original author: Nathan House (Station X)

"Reproducible builds involve a compilation process that generates the same binary or executable output for a given source code, regardless of the building environment. This approach offers various pros and cons when it comes to security, privacy, and anonymity.

Pros:

1. Trustworthiness: Reproducible builds ensure that the released binary is built from the published source code, allowing users to trust the software without having to compile it themselves.

2. Tamper detection: Any attempts to introduce backdoors or malware during the build process can be detected, as the output can be verified against the expected result.

3. Collaborative verification: Multiple parties can independently verify the builds, increasing confidence in the software's integrity.

4. Supply chain security: Reproducible builds can help mitigate supply chain attacks by ensuring the integrity of the code throughout the development, build, and distribution process.

Cons:

1. Increased complexity: Implementing reproducible builds can be complex and time-consuming, requiring consistent build environments and careful management of dependencies.

2. Limited scope: Reproducible builds only ensure the integrity of the build process and do not guarantee that the source code is free of vulnerabilities or malicious code.

3. False sense of security: Users may assume that reproducible builds imply that the software is entirely secure, while they only guarantee that the build process is consistent and hasn't been tampered with.

4. Overhead: Maintaining a reproducible build environment may introduce additional overhead for developers, potentially slowing down the development process.

Overall, reproducible builds can significantly enhance security, privacy, and anonymity in the software development process. However, their implementation requires careful planning and may introduce challenges and complexities that need to be managed effectively."

@offtopic

Stefano Marinelli »
@stefano@mastodon.bsd.cafe

**BSD Mail Project Update!**

Hello everyone! I wanted to share some exciting updates about the development of BSD Mail, our privacy-focused email service designed with robustness, security, and transparency in mind. Here’s a deep dive into the technical choices I've made, focusing on my use of open source solutions and open protocols:

🌍 **Servers & Location**

- We're running on two physical servers:
- One hosted by OVH in France
- Another by Hetzner in Germany
- Both servers operate on FreeBSD with NVMe drives in a ZFS mirror configuration for speed and data integrity.

🔒 **Virtualization & Security**

- We utilize jails on both servers to ensure isolated environments for different services, managed via BastilleBSD. On one server, jails are set up directly on the hardware, whereas the other server employs nested jails.
- Each server hosts a bhyve VM running OpenBSD with OpenSMTPD for handling SMTP duties securely.

🔗 **Networking**

- A Wireguard setup connects the two servers, facilitating routing capabilities so that jails and VMs can communicate seamlessly, supporting both IPv4 and IPv6.

📧 **Email Services**

- **Dovecot** is configured for maildir replication across the servers using Dovecot sync, ensuring email availability and redundancy.
- **Rspamd** instances are tied to local KeyDB jails, set up in master-master replication for consistent and reliable spam detection and greylisting.
- **ClamAV** runs in corresponding jails for virus scanning, maintaining a high level of security.
- **SOGo** provides a web interface for email management, connected to MySQL databases in master-master replication to handle sessions and authentication smoothly.

💾 **Data Management**

- Email data is stored on separate, encrypted ZFS datasets to secure emails at rest.
- MySQL databases are used for storing credentials and managing sessions for SOGo, also in a master-master replication setup. Importantly, all passwords are securely hashed using bcrypt, ensuring they are salted and safe.

🔎 **Monitoring & Reliability**

- Our DNS is managed through BunnyNet, which continuously monitors our server status. Should one server—or a specific service—become unavailable, DNS configurations are dynamically adjusted to avoid directing users to the affected IP until full service is restored.

🌐 **Commitment to Open Source and Open Protocols**

- Every component of BSD Mail is built exclusively using open source software and open protocols. This commitment is crucial for ensuring data freedom and the reliability of the solutions we use.

This setup not only emphasizes our commitment to privacy and security but also our dedication to maintaining an open and transparent platform.
We're excited to bring you a service where your privacy, data integrity, and freedom are prioritized. Stay tuned for more updates!

Stefano Marinelli »
@stefano@mastodon.bsd.cafe

Today I've been really busy and I'm exhausted, but I wanted to share the "gem" of the day.
A colleague (whom I've never spoken to before) calls me and explains that they need to connect a client's server with their management system. To communicate, the client's server needs to be reachable via telnet. I explain that I can't open telnet to the world, but if necessary, I can set up a VPN of their choice (Wireguard, OpenVPN, even Zerotier if it's helpful) and grant telnet access through the VPN. Not ideal, but better than nothing...

That said, the colleague attacks me: "Here you are, with these VPNs - don't you understand they're used to spy on us? Governments intercept all VPNs to steal our personal data." I try to clarify that I may not have explained myself well and that I don't mean using the famous commercial VPNs, but a private VPN access to allow the two machines to communicate securely. No luck: "Haven't you realized yet? Every time we open a VPN, they know and intercept us."

Frankly, I was speechless...

Laurent Cheylus »
@lcheylus@bsd.network

HiddenVM: use any desktop OS without leaving a Trace - An open-source Linux application that allows you to run Oracle's open-source VirtualBox software on the Tails operating system github.com/aforensics/HiddenVM

Steve Thompson »
@SteveThompson@mastodon.social

We fool ourselves if we think governments aren't spying on their citizens. It's one of those things that snuck in and stayed, and is not going away but expanding.

"Poland's prosecutor general says previous government used spyware against hundreds of people"

abcnews.go.com/Technology/wire

"Poland’s prosecutor general has told the parliament that powerful Pegasus spyware was used against hundreds of people during the former government in Poland"

Laurent Cheylus »
@lcheylus@bsd.network

Big Tech embraces Passkey (tech to replace passwords) to maintain their walled Gardens - Post by Son Nguyen for @protonprivacy proton.me/blog/big-tech-passke

Shawn Webb »
@lattera@bsd.network

From a coworker at ${DAYJOB}:

For anyone who is buying the Humane AI PIN, be careful. Their terms of use contains a clause that gives them a license to all the data you link to the service:

4.2 Ownership. For purposes of clarity, you retain ownership of your Submissions. For each Submission, you hereby grant to us an irrevocable, unlimited, worldwide, royalty-free, fully paid-up, perpetual, sublicensable (through multiple tiers), and non-exclusive license, without any additional consideration to you or any third party, to copy, reproduce, adapt, modify, edit, distribute, translate, publish, perform and display (publicly or otherwise), create derivative works of, and otherwise use, analyze, and exploit such Submission, in any format or media now known or hereafter developed, and for any purpose, to the fullest extent allowed by Law.

nixCraft 🐧 »
@nixCraft@mastodon.social

Microsoft reveals subscription pricing for using Windows 10 beyond 2025, and it's not cheap. Customers will need to pay $61 per device, which will double every year for three years, to remain secure on Windows 10. If you just do shopping or social media you can use alternative os like Ubuntu, Mint, or pop os for your older computer instead of jumping to windows 11. Also regardless of windows 10 or 11 prices you will still get Ads in Windows 😂 Choose wisely

Microsoft reveals subscription pricing for using Windows 10 beyond 2025, and it's not cheap News By Zac Bowden published April 3, 2024 Customers will need to pay $61 per device, which will double every year for three years, to remain secure on Windows 10.  https://www.windowscentral.com/software-apps/windows-11/microsoft-reveals-subscription-pricing-for-using-windows-10-beyond-2025-and-its-not-cheap

stu »
@stu@allthingstech.social

jbz »
@jbzfn@mastodon.social

「 Prosecutors also allege that Facebook violated the United States Wiretap Act, which prohibits the intentional procurement of another person’s electronic communications. Onavo could also be considered straight spyware, but also seems to fall under the definition of wiretapping, according to prosecutors 」

gizmodo.com/project-ghostbuste

Laurent Cheylus »
@lcheylus@bsd.network

Le service de VPN public en accès libre de FDN (association French Data Network) @FDN fait peau neuve fdn.fr/notre-vpn-en-acces-libr

Stefano Marinelli »
@stefano@mastodon.bsd.cafe

15 million users in the Fediverse, now.

No ad-blocker needed.
Zero ads.
My data stays on my server.
Interactions are genuine, driven by people's desire, not an algorithm pushing for conflict to boost engagement (and ad sales).
Nobody's here just because it's trendy. If you're here, you want to be here.
The best social media experience I've had in years.

Thank you to all of you, among these 15 million accounts, who have helped make this a wonderful place to be.

Tara Stella 🌷 »
@tara@hachyderm.io

Ouch! AMS-IX is hit bad here 🤦‍♀️ 🥺 👩‍💻

“The Netherlands hosts some of the world’s largest internet exchanges. This obliges us to make the best use of these exchanges for our national security. With the Temporary Cyber Act, we will make optimum use of the data carried on our cables to protect The Netherlands against Russian and Chinese hackers” – Dutch government announcement

berthub.eu/articles/posts/dutc

Terence Eden »
@Edent@mastodon.social

🆕 blog! “Can you trust ProtonApps.com?”

I've recently signed up to the privacy-preserving service Proton. All the email, calendar, drive, VPN, and other services seem to hang off the proton.me domain. I wanted to download the Android apps to my phone - without using the Google Play Store. The VPN app is on F-Droid but none of the others are. So, […]

👀 Read more: shkspr.mobi/blog/2024/03/can-y

Blort™ 🐀Ⓥ🥷☣️ » 🤖
@Blort@social.tchncs.de

Well it seems that Docusign, the largest online signing service for mostly confidential documents... is using your documents to train it's AI regurgitation machines:
mastodon.social/@gvwilson/1120

Thankfully it seems that there's also an open source, self hostable alternative in Documenso:
Https://Documenso.com

Please boost and talk to your org about switching today! (I'm not affiliated)

jbz »
@jbzfn@mastodon.social

Why I use Firefox
➥ Šime Vidas

šime.eu/3

KubikPixel™ »
@kubikpixel@chaos.social

«EdgenAI – GenAI made Local: Run Generative AI locally, no internet, completely data-private»

I am not a friend of artificial intelligence, but it may happen in the future that I "have to" use it. Do any of you know GenAI, which is developed in Rust, and if so, how is it?

edgen.co

KubikPixel™ »
@kubikpixel@chaos.social

I'm not so familiar with and security on the that I really have a . That's another reason why articles like this are very good for informing me and explaining it to customers. is more than just and .

«Post Quantum Cryptography: Why We Need Resistant Encryption NOW.
Quantum-resistant or post-quantum is our best bet against attacks from upcoming quantum computers to increase and
@Tutanota

🔏 tuta.com/blog/post-quantum-cry

AI6YR Ben »
@ai6yr@m.ai6yr.org

Consumer software, LOL. They are blaming a "third-party caching library", but really this is (as always) failure to catch a corner case somewhere in their code.

We can now confirm that as cameras were coming back online, about 13,000 Wyze users received thumbnails from cameras that were not their own and 1,504 users tapped on them. Most taps enlarged the thumbnail, but in some cases an Event Video was able to be viewed. All affected users have been notified. Your account was not one of the accounts affected.


The incident was caused by a third-party caching client library that was recently integrated into our system. This client library received unprecedented load conditions caused by devices coming back online all at once. As a result of increased demand, it mixed up device ID and user ID mapping and connected some data to incorrect accounts.


To make sure this doesn't happen again, we have added a new layer of verification before users are connected to Event Videos. We have also modified our system to bypass caching for checks on user-device relationships until we identify new client libraries that are thoroughly stress tested for extreme events like we experienced on Friday.

Sourcerer »
@sourcerer@mastodon.bsd.cafe

Yet another site with privacy guides

"The Privacy Raccoon"

privacy.awiki.org/about.html

"We’re a group of privacy activists and computer wizards that were disappointed with “mainstream” privacy sites like PrivacyGuides.org, PrivacyTools.io, Techlore, etc. These sites recommend solutions that are considered spyware and even privacy violators.

...

They are also sold to sponsors, prioritizing money over their readers’ privacy and freedom.

These sites have received a ton of attention recently. We believe that there is an increasing interest in digital privacy. That’s why we decided to create a privacy resource that truly respects your privacy and freedoms."

Ricardo Martín »
@fluxwatcher@mastodon.social

If we started referring to 'emails' as just 'postcards', do you think users would be concerned from a privacy awareness perspective? 🤔

⸺ Hey Mary, I will send you that important lawyer case on a postcard

⸺ Hey Bob, I just received your postcard with your CV

alelab »
@alelab@mastodon.bsd.cafe

I just discovered a product of @protonmail
It's a powerfull and amazing tool to protect your email addresses.
Easy to manage from Pass or from dashboard on simplelogin.io

Stefano Marinelli »
@stefano@mastodon.bsd.cafe

Graham Downs »
@GrahamDowns@mastodon.africa

In at the moment, there's currently a bill on the table which would allow government far-reaching ability to override regular citizens' by conducting bulk .

Some people are colloquially calling it the " bill": techcentral.co.za/south-africa

Sourcerer »
@sourcerer@mastodon.bsd.cafe

Evaluate instead of trusting.

Sourcerer »
@sourcerer@mastodon.bsd.cafe

"Privacy isn't about hiding something. It's about being able to control how we present ourselves to the world. It's about maintaining a public face while at the same time being permitted private thoughts and actions. It's about personal dignity." ~ Bruce Schneier

0 ★ 0 ↺

gyptazy »
@gyptazy@gyptazy.ch

Do we see here the first ever based node running? I just provided a TOR node for the network on one of my boards. This one currently runs on (will be switched to soon).


Stefano Marinelli »
@stefano@mastodon.bsd.cafe

Dear friends of the and the ,
Bytedance is connecting to our server every few seconds. As I don't understand why and, more, I've already had problems with their rude behaviour, I've added this rule to nginx.conf:

# case sensitive matching
if ($http_user_agent ~ (Bytespider)) {
return 444;
}

# case insensitive matching
if ($http_user_agent ~* (bytespider)) {
return 444;
}

They should be out, at least for now.

Sourcerer »
@sourcerer@mastodon.bsd.cafe

I don't like myths, so who study and topics ... and who should learn security and privacy?

---------------------------
- technically minded people

- people concerned about hackers, cyber criminals, malware and viruses

- people that wants to share information anonymously

- people that wants to keep communication and personal information private

- people interested in technology and the internet

- people concerned about government and corporate spying

- security professionals

- students studying IT or security

- freedom fighters

- political or religious dissidents

- journalists

- businessmen or women where security, privacy and anoymity matters

- law enforcements officers and agents

- high profile individuals

- whitle blowers

- anonymous bloggers

- anyone who has an interest in security, privacy and anonymity

LA Legault ✌🏻 »
@LALegault@newsie.social

Celebrities using public airspace for private aircraft have no reasonable expectation to , period.

Fitheach »
@fitheach@mstdn.io

Actually, I don't use an ad blocker. I use uMatrix, so, I can decide whose cookies I accept, and whose scripts I run on my computer.

If a company wants to display static adverts on their site, that's fine by me. What isn't acceptable are scripts which allow third-parties to track me, all over the Internet. I'm not willing to compromise my privacy.

Note on the right-most column of the Hotmail/Outlook interface. The note states:

"It looks like you're using an ad blocker. To maximise the space in your inbox, sign up for Ad-Free Outlook."

Lioh »
@Lioh@social.anoxinon.de

So nice to see my system wide AdBlocker for Ubuntu Touch featured in OpenStore open-store.io/app/uadblockng.l

uAdBlockNG featured in OpenStore, the AppStore for Ubuntu Touch.

Back to top - More...