🍀 ThePrivacyPost è un account di servizio gestito direttamente dagli amministratori di Poliverso e pubblica notizie provenienti da diversi siti, blog, account del fediverso e alcuni contenuti originali.
🩸 Se apprezzi questo servizio, prendi in considerazione la possibilità di effettuare una donazione a Poliverso. Puoi scegliere due canali:
1) Ko-Fi ☕
2) LiberaPay 💳
like this
reshared this
Data Retention: A Crisis of the Rule of Law (2)
Privacy Camp 2023: room Boudoir
Privacy Camp is an annual conference that brings together digital rights advocates, activists as well as academics and policy-makers from all around Europe a...YouTube
reshared this
Was verlieren wir, wenn die Bundesregierung eine Prozenthürde bei der Europawahl einführt?
08.03.2023: Die Ampel-Bundesregierung will das Bundesverfassungsgericht aushebeln und eine 2%-Sperrklausel zur Europawahl einführen. Eine schamlose Selbstbedienung zulasten des Wähler:innenwillens!
Affront gegen Bundesverfassungsgericht und Demokratie: Sperrklausel zur Europawahl beschlossen
Die Ampel-Bundesregierung will einem EU-Beschluss zustimmen, der Deutschland zur Einführung einer Sperrklausel zur Europawahl von 2% zwingen und über den Vorrang des Europarechts mehrere Urteile des Bundesverfassungsgerichts zur Verfassungswidrigkeit…Patrick Breyer
reshared this
Data Retention: A Crisis of the Rule of Law (3)
Details: https://edri.org/our-work/advocate-general-recklessly-calls-for-watering-down-privacy-protections/
Privacy Camp 2023: room Boudoir
Privacy Camp is an annual conference that brings together digital rights advocates, activists as well as academics and policy-makers from all around Europe a...YouTube
reshared this
reshared this
reshared this
Die Geldstrafe gegen Tik-Tok ist unzureichend!
Datenschutz-Verstöße: EU verhängt Millionenstrafe gegen TikTok
Wie halten es soziale Netzwerke mit minderjährigen Nutzern - vor allem mit deren sensiblen Daten? Immer wieder gibt es darüber Streit. Nun hat die EU eine hohe Millionenstrafe gegen den Onlinedienst TikTok verhängt.tagesschau.de
reshared this
Banning TikTok is not enough to stop the surveillance capitalist business model!
TikTok hit with €345M fine for violating children’s privacy
The app unlawfully let anyone potentially watch and interact with teenagers in 2020.Clothilde Goujard (POLITICO)
reshared this
Mythos: Vorratsdatenspeicherung hilft bei der Aufklärung von Missbrauch
28.09.2023: EuGH-Generalanwalt will Internet-Vorratsdatenspeicherung schon zur Verfolgung von Filesharern zulassen: https://curia.europa.eu/jcms/upload/docs/application/pdf/2023-09/cp230151de.pdf
Bundesüberwachungsministerin Faeser fordert sie noch mit der alten Begründung Kinderschutz - ein Mythos, wie unser Video zeigt.
reshared this
Myth: Data retention helps to investigate child sexual abuse
Originally the Court justified IP data retention with the need to investigate child sexual exploitation - a myth, as our video shows.
reshared this
Real child protection is possible without data retention!
29.09.2023: The Polish Advocate General of the EU Court of Justice recommends weakening jurisdiction and using data retention to prosecute file-sharers. First the killer argument "child protection" and now all dams break to track down petty criminals.
More: https://patrick-breyer.de/en/ecj-advocat
ECJ Advocate General wants to use indiscriminate internet data retention against file sharers
In a non-binding opinion issued yesterday, the Polish Advocate General at the European Court of Justice, Szpunar, recommends watering down the current jurisprudence and allowing blanket retention of internet connection data of the entire population t…Patrick Breyer
reshared this
“Suo figlio è con me. Paghi se vuole rivederlo!”. Le tattiche di estorsione si evolvono verso nuove dimensioni
https://poliverso.org/display/0477a01e-6d999d9b-d75720e38e846dff
“Suo figlio è con me. Paghi se vuole rivederlo!”. Le tattiche di estorsione si evolvono verso nuove dimensioni Durante la sessione di Google Security Threat Intelligence, tenutasi nell’ambito della conferenza RSA a San Francisco, https://www.rsaconference.com/usa sono venuti a conoscenza di nuovi metodi molto allarmanti
reshared this
reshared this
reshared this
🏗️ Join us and our partners in building digital futures that centre people, democracy, and the planet!
After the June 2024 election, we'll have a new set of @europarl_en MEPs & decision-makers in the @EU_Commission - and it is crucial to get our message across to them!
With our collective vision, we can influence the upcoming 2024 European elections, and beyond! 💪🏾
✊🏾 Sign our petition today and we'll take our collective vision to EU lawmakers ➡️ https://crm.edri.org/vision-for-digital-futures/
reshared this
La Russia colpita da LockBit Black! La Cyber Gang MorLock colpisce e genera scandalo
https://poliverso.org/display/0477a01e-3f5b88c5-80c21a116368a461
La Russia colpita da LockBit Black! La Cyber Gang MorLock colpisce e genera scandalo In Russia, c’era una regola non scritta riguardo al crimine informatico che rifletteva una pratica comune: si poteva agire al di fuori dei confini della Federazione Russa, ma non all’interno. Questo significava che i criminali informatici russi potevano operare
The Privacy Post reshared this.
Remembering Dick Rutan and His Non-Stop Flight Around the World
https://poliverso.org/display/0477a01e-57c9378f-2cd22e697882cf5f
Remembering Dick Rutan and His Non-Stop Flight Around the World On December 23, 1986, an airplane landed at Edwards AFB. This by itself wouldn’t mean much, but this particular airplane had just written history. Piloted by Dick Rutan and Jeana Yeager, the Rutan Model 76 Voyager had just completed its non-stop flight around the world after taking off from that very
The Privacy Post reshared this.
State of ransomware in 2024
https://poliverso.org/display/0477a01e-189ff0fe-e8509e7c838e60a4
State of ransomware in 2024 Ransomware attacks continue to be one of the biggest contemporary cybersecurity threats, affecting organizations and individuals alike on a global scale. From high-profile breaches in healthcare and industrial sectors – compromising huge volumes of sensitive data or halting production entirely – to attacks on small businesses that have become relatively easy targets, ra
The Privacy Post reshared this.
Sorveglianza o funzionalità di Telegram? CCTV è il Nuovo strumento che rintraccia gli utenti in tempo reale
https://poliverso.org/display/0477a01e-793f9708-eea5593e3c2973e4
Sorveglianza o funzionalità di Telegram? CCTV è il Nuovo strumento che rintraccia gli utenti in tempo reale Lo strumento appena lanciato consente di determinare la posizione degli utenti di Telegram che utilizzano la funzione Persone nelle vicinanze. Si tratta dello strumento chiamato Close-Circuit Telegram Vision (CCTV),
The Privacy Post reshared this.
May comes with legal news, we talked to two 2023 #YH4F participants and our Danish local group sent an #OpenLetter to their parliament.
Did you see that Ada & Zangemann won a prize and that the French e-book version is now available?
https://fsfe.org/news/nl/nl-202405.html
#SoftwareFreedom #FreeSoftware
LLW 2024 +++ YH4F interviews +++ Ada in France - FSFE
May comes with legal news such as the Legal & Licensing Workshop and the Bitcoin lawsuit regarding the liability of Free Software developers. We also talke...FSFE - Free Software Foundation Europe
reshared this
3D Printed Fidget Knife Snaps Back and Forth All Day Long
https://poliverso.org/display/0477a01e-61fdb960-2dbedcfd3d2f9535
3D Printed Fidget Knife Snaps Back and Forth All Day Long Fidget toys all have a satisfying mechanical action to engage with, and [uhltimate]’s OTF (out the front) “fidget knife” model https://www.printables.com/model/863424-otf-fidget-knife-only-3-parts provides that in spades. The model snaps open and closed thanks to a clever arrangement of springs and latches contained
The Privacy Post reshared this.
Autostrade per L’Italia, ATAP e TTE nelle mira degli hacktivisti filorussi nel Secondo Giro di Attacchi all’Italia
https://poliverso.org/display/0477a01e-7da4f95d-62ffa534aff6df44
Autostrade per L’Italia, ATAP e TTE nelle mira degli hacktivisti filorussi nel Secondo Giro di Attacchi all’Italia Secondo giorno di attacchi informatici diffusi verso le infrastrutture https://www.redhotcyber.com/post/che-cose-lhacktivismo-cibernetico-tra-storia-motivazioni-hacking-conseguenze-ed-evoluzioni/
Che cos'è l'hacktivismo cibernetico. Tra storia, motivazioni, hacking, conseguenze ed evoluzioni
Con questo articolo andremo ad esplorare il termine "hacktivism", scoprendone la filosofia, la storia e l'utilizzo moderno di questo modello di hacking.Redazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
📣Today, EDRi & @accessnow published recommendations on how the @EU_Commission's #GDPR Procedural proposal can be improved.
To ensure GDPR enforcement is done right, we need clear rules, deadlines, transparency, accountability & rights for parties.
🚨It's urgent to enhance legal certainty & prevent actions undermining GDPR enforcement effectiveness & trust. People must regain control over their data.
🔗 Read more in the position paper & share it with your network: https://edri.org/our-work/position-paper-gdpr-enforcement-done-right/
Position paper: GDPR enforcement done right - European Digital Rights (EDRi)
EDRi and Access Now have co-drafted a position paper on the EU Proposal for additional procedural rules concerning the General Data Protection Regulation (GDPR).European Digital Rights (EDRi)
reshared this
Anche il Cybercrime ha un Cuore! Il Malware CryptVPN estorce i soldi ai Pedofili!
https://poliverso.org/display/0477a01e-5d338567-4aea7bce4b3ab0cc
Anche il Cybercrime ha un Cuore! Il Malware CryptVPN estorce i soldi ai Pedofili! I ricercatori hanno scoperto una campagna dannosa che prende di mira le persone che cercano attivamente materiale pedopornografico online. Gli https://www.redhotcyber.com/post/la-storia-del-virus-e-dei-malware/
Cosa sono i malware. Tra fantascienza, laboratorio e realtà
Spesso parliamo di "Malware". Ma conosciamo precisamente i loro scopi e le loro differenze? Scopriamo il mondo dei malware in questo articolo di Red Hot Cyber.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Lucchetti, Catene e Guerra tra Titani: L’Operazione Cronos II è riuscita a scassinare LockBit?
https://poliverso.org/display/0477a01e-18914786-233ab2e15bb844cf
Lucchetti, Catene e Guerra tra Titani: L’Operazione Cronos II è riuscita a scassinare LockBit? Il countdown è arrivato a zero, l’attesa è finita.La Task Force Cronos ha mantenuto la promessa ripagando con https://www.redhotcyber.com/post/red-hot-cyber-intervista-lockbit-3-0/ la stessa moneta ma in questo caso senza un riscatto da
RHC intervista LockBit 3.0. "La cosa principale è non iniziare una guerra nucleare"
Red Hot Cyber intervista la cyber gang LockBit 3.0. Grandi innovazioni, programmi di bug bounty e un ransomware completamente rinnovato. Scopriamoli assieme.Redazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
La resurrezione di PlugX: Il Malware Fantasma Che Continua a Terrorizzare il Web
https://poliverso.org/display/0477a01e-ed8d9106-676a85741b6b2d16
La resurrezione di PlugX: Il Malware Fantasma Che Continua a Terrorizzare il Web Una variante del https://www.redhotcyber.com/post/la-storia-del-virus-e-dei-malware/ PlugX che si riteneva “morta”, in realtà, molto silente godeva di ottima salute infettando migliaia di computer. In tre mesi sono state registrate due milioni e mezzo di richieste IP
Cosa sono i malware. Tra fantascienza, laboratorio e realtà
Spesso parliamo di "Malware". Ma conosciamo precisamente i loro scopi e le loro differenze? Scopriamo il mondo dei malware in questo articolo di Red Hot Cyber.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Mostly Printed CNC Gets a Few Upgrades
https://poliverso.org/display/0477a01e-698fd8b8-533984a732a26177
Mostly Printed CNC Gets a Few Upgrades The Mostly Printed CNC is famous for two things. First, being made mostly from 3D printed parts and commonly available steel tubing. Second, because of the materials used, its rigidity isn’t fantastic. But any CNC router is better than no CNC router, and [Alex Reiner]’s “Mostly Mostly Printed CNC” https://www.youtube.com/watch?v=VSWpaRQtn3E upgrades the
Boss-level upgrades to my CNC machine #mpcnc
The MPCNC is a cool DIY CNC router. But I wanted to use it for more than it was designed for -- cutting aluminum. Weeks of design and assembly made that dr...YouTube
The Privacy Post reshared this.
Mitre Wants the Feds to Play in Its Sandbox
https://poliverso.org/display/0477a01e-3f3198fa-68e5f0dce76e381c
Mitre Wants the Feds to Play in Its Sandbox If you haven’t worked with the US government, you might not know Mitre, a non-profit government research organization. Formed in 1958 by the U.S. Air Force as a company to guide the SAGE computer, they are often research experts who oversee government contracts or evaluate proposals. Now they are building a $20 millon https://www.mitre.org/ne
The Privacy Post reshared this.
Your Pi, From Anywhere
https://poliverso.org/display/0477a01e-2e4441a0-7f77669d2755b258
Your Pi, From Anywhere The Raspberry Pi finds a use in a huge variety of applications, and in almost any location you could imagine. Sadly those who use those machines might not be in the same place as the machines themselves, and thus there’s the question of providing a remote connection between the two. This may not be a huge challenge to those skilled with Linux and firewalls, but to many Pi us
The Privacy Post reshared this.
5 trucchi per proteggere la tua Privacy online. Il video di @morrolinux
Scelta del browser, estensioni per bloccare cookie e tracker, indirizzi email usa e getta, separare gli account con i Container di Firefox, rimozione Data Broker e servizi Privacy Oriented e self-hosting
Come proteggere la tua Privacy online
👉 Incogni: sconto del 60% qui ➔ https://incogni.com/morrolinux✨ NordVPN: Approfitta della promo valida fino al 30 maggio ➔ https://nordvpn.com/morrolinux/🔗...YouTube
like this
reshared this
Z80s From the ’80s Had Futuristic Design
https://poliverso.org/display/0477a01e-30fd8e6a-0fac440c53812272
Z80s From the ’80s Had Futuristic Design Ever heard of a Dutch company called Holborn (literally, born in Holland)? We hadn’t either, but [Bryan Lunduke] showed us these computers from the early 1980s https://lunduke.locals.com/post/5588902/1950s-sci-fi-style-computers-powered-by-a-z80-built-in-holland, and we wondered if they might have appeared in some science fiction movies. They
1950s Sci-Fi Style Computers, Powered by a Z80, Built in Holland
Between 1980 and 1983, a little company in The Netherlands built the “Holborn” series of computers… which can best be described as “1950s sci-fi… powered by a Z80”.Note: The “Holborn” name is to signify that these computers were “Born in Holland”.Bryan Lunduke (Lunduke)
The Privacy Post reshared this.
Bluepad32 Brings All the Controllers To Your MCU
https://poliverso.org/display/0477a01e-20301726-baf86070d5ccca86
Bluepad32 Brings All the Controllers To Your MCU As much as we enjoy spinning up our own solutions, there are times when you’ve got to look at what’s on the market and realize you might be out of your league. For example, take Bluetooth game controllers. Sure, you could make your own with a microcontroller, some buttons, and a couple joysticks. But between the major players like
reshared this
The 2024 Business Card Challenge Starts Now
https://poliverso.org/display/0477a01e-33d3ae15-3319e0df59be9c1d
The 2024 Business Card Challenge Starts Now If you want to make circuits for a living, what better way to impress a future employer than to hand them a piece of your work to take home? But even if you’re just hacking for fun, you can still turn your calling into your calling card.We are inviting you to submit your coolest business card hacks for us all to admire, and the top three
The Privacy Post reshared this.
New note by cybersecurity
https://poliverso.org/display/0477a01e-9366-3a71-e440-8b5451046603
Un nuovo attacco contro praticamente tutte le app VPN neutralizza il loro intero scopo https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/La vulnerabilità TunnelVision esiste dal 2002 e potrebbe essere già nota agli aggressori.TunnelVision, come i ricercatori hanno chiamato il loro attacco, nega in gran parte l'intero scopo e punto di
la | Ars Technica
Serving the Technologist for more than a decade. IT news, reviews, and analysis.arstechnica.com
The Privacy Post reshared this.
https://fpf.org/blog/fpf-responds-to-the-ombs-request-for-information-on-responsible-artificial-intelligence-procurement-in-government/
@privacy
On April 29, the Future of Privacy Forum submitted comments to the Office of Management and Budget (OMB) in response to the agency’s Request for Information (RFI) regarding responsible procurement of artificial intelligence (AI)
FPF Responds to the OMB’s Request for Information on Responsible Artificial Intelligence Procurement in Government
On April 29, FPF submitted comments to the Office of Management and Budget (OMB) in response to the agency’s Request for Information (RFI) regarding responsible procurement of artificial intelligence (AI) in government.Future of Privacy Forum
The Privacy Post reshared this.
256-Core RISC-V Megacluster
https://poliverso.org/display/0477a01e-0c67c34e-3597220f4da31055
256-Core RISC-V Megacluster Supercomputers are always an impressive sight to behold, but also completely unobtainable for the ordinary person. But what if that wasn’t the case? [bitluni] shows us how it’s done with his 256-core RISC-V megacluster https://www.youtube.com/watch?v=lh93FayWHqw.While the CH32V family of microcontrollers it’s based on aren’t nearly as powerful as what you’d traditionall
My DIY 256-Core RISC-V
Free Assembly for 1-6 Layer PCBs at JLCPCB, 3D Printing from $0.3, Sign up to Get $60 Coupons here: https://jlcpcb.com/?from=bitluni (Sponsor)This new clust...YouTube
The Privacy Post reshared this.
Usi software pirata? Che RedLine ti colga! Fate attenzione agli Infostealer!
https://poliverso.org/display/0477a01e-8fb8cd62-69bb2324c62d268d
Usi software pirata? Che RedLine ti colga! Fate attenzione agli Infostealer! Gli esperti di Kaspersky Lab riferiscono https://dfi.kaspersky.ru/stealers che lo scorso anno più della metà dei dispositivi attaccati dagli stealer nel mondo (55%) sono stati infettati dal https://www.redhotcyber.com/post/la-storia-del-virus-e-dei-malware/ RedLine. In totale,
Cosa sono i malware. Tra fantascienza, laboratorio e realtà
Spesso parliamo di "Malware". Ma conosciamo precisamente i loro scopi e le loro differenze? Scopriamo il mondo dei malware in questo articolo di Red Hot Cyber.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
General Puropse AI Models can`t ignore copyright in the EU
https://poliverso.org/display/0477a01e-fb71e88f-5807bdd59580dafc
General Puropse AI Models can`t ignore copyright in the EUArtificial intelligence has posed serious challenges to our understanding of copyright. General-purpose models are trained on massive amounts of text and images in order to produce tools that can answer to a vast array of prompts.euractiv.com/section/artificia…
The Privacy Post reshared this.
European Parliament’s recruitment application compromised in data breach
https://poliverso.org/display/0477a01e-7e5c7fde-040c434efab42437
European Parliament’s recruitment application compromised in data breachThe European Parliament sent on Monday (6 May) an internal notification to its staff, seen by Euractiv, about a data breach in the application PEOPLE, used for the recruitment of the institution's non-permanent staff.euractiv.com/section/cybersecu…
The Privacy Post reshared this.
reshared this
reshared this
VOLPE ANTONIO
in reply to informapirata :privacypride: • • •informapirata :privacypride:
in reply to VOLPE ANTONIO • • •@volpe_antonio Tor browser è lo strumento più avanzato per gestire la navigazione col massimo livello di privacy, ma pensare di essere invisibile perché si usa Tor è una falsa sicurezza. La privacy on line è un obiettivo che non si raggiunge solo con i software ma con procedure sicure
@morrolinux @privacypride
:idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa:
in reply to informapirata :privacypride: • • •informapirata :privacypride:
in reply to :idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa: • • •@steek_hutzee capisco, ma @morrolinux pubblica video e cerca di rientrare del tempo perso attraverso la monetizzazione. Se vuoi guardare i suoi video senza traccianti, puoi aspettare qualche giorno in più perché il video venga caricato anche su peertube, sul canale di @morro
Altrimenti puoi usare invidious o piped
@privacypride
:idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa:
in reply to informapirata :privacypride: • • •Capisco perfettamente ci sia un ritorno economico dietro a ciò ma forse sarebbe il caso di soprassedere a questa cosa e, coerentemente, adottare delle alternative. O no?
informapirata :privacypride:
in reply to :idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa: • • •@steek_hutzee se sei un produttore di contenuti sei costretto a utilizzare quelle piattaforme, altrimenti non arrivi a nessuno
@morrolinux @morro @privacypride
:idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa:
in reply to informapirata :privacypride: • • •In piccolo ma è anche questa cosa parte della questione per cui fatico a portare le persone che conosco ad utilizzare altre piattaforme. Considerato che della privacy poco importa la cosa del "ma se non pubblico su FB o IG nn mi vede nessuno" spesso va di pari passo con "uso WA perché sulle altre chat ho pochi contatti".
Non so se ne usciremo mai...
morrolinux
in reply to :idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa: • • •Poi l'ho detto già milioni di volte: bloccate pure tutta la pubblicità che vi pare su YouTube, usate Revanced, quello che volete, tanto sta sul ca**o anche a me, e con la monetizzazione non mi ci pago manco le bollette. Sono gli sponsor a rendere il mio lavoro sostenibile, e gli sponsor vogliono vedere certi numeri che su peertube non esistono.
Peppe Failla likes this.
reshared this
informapirata :privacypride: reshared this.
:idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa:
in reply to morrolinux • • •:fedora: filippodb :cc: :gnu:
in reply to morrolinux • • •Non parliamo poi dei video musicali, hanno tutto e possono pagarne i diritti ..
AV :tux: :linuxmint:
in reply to :idle: 𐌐𐌀Ꝋ𐌋Ꝋ :antifa: • • •5 trucchi per proteggere la tua Privacy online
morrolinux | Invidious