@kkarhan @GrapheneOS @tails_live @torproject @signalapp

"GrapheneOS chose their requirements and they can happily design their own platform instead."

There's no need to reinvent the wheel. AOSP is a secure, open-source platform that has been around for almost 20 years. I don't want to debate rumors that Google wants to make AOSP proprietary because there is no evidence to support this, especially since it would not benefit them in any way.

"I just think that their stubbornness"

It's not stubborness and I explained why.

"They are the antithesis to #Tails when it comes to #UserFriendly-ness and approachability for #Normies and #TechIlliterates

It's probably the first time I've seen “Tails” and “Normie” in the same sentence, It's not that Tails is difficult to use, but I'm really not sure that many “normies” use it or even know it exists. The user experience on GrapheneOS is almost identical to Pixel OS, the standard operating system for Google Pixel devices, so using GrapheneOS is likely to seem much simpler and familiar to normies, as they will already be used to it.

"Espechally since the problems woth #MobilePhones and the underlying technology ain't fixable with an #AndroidROM

GrapheneOS is not a ROM, Pixel OS is not a ROM, and LineageOS is not a ROM either, theses operating systems are not ROMs.

"Instead we need to foster a #SecurityCulture and proper #ITsec, #InfoSec, #OpSec & #comsec

Indeed, and what GrapheneOS does about security is completely appropriate, including informing people and giving them good advice.

"Otherwise we'll see them fail the same way @signalapp did, which is eitger getting shut down (#EncroChat-style) or being uncovered as a controlled opposition / honeypot (like #ANØM aka. #OperationIronside aka. #OperationTrøjanShield)…"

Signal did not fail, and mentioning Encrochat, ANON, and honeypots in the same sentence is irrelevant. These things have absolutely nothing in common with Signal, you seem to be believing made-up stories.

@Xtreix well, @GrapheneOS chose their requirements and they can happily design their own platform instead.

  • I just think that their stubbornness makes them look like Stallmanist extremists to the point of being unbearable cringe and completely loosing the plot.

To the point that it's cheaper to go black/red and teach that to people, even at the risk of inconvenience.

  • I mean, in many juristictions one will have to do so anyway, but that's not tue point here…

I think #GrapheneOS prefer to "die on their hill" of "moral superiority" than fave the reality that 99% of people can't and won't blow $500 - $1000+ on a phone when any half-decent Netbook with @tails_live , @torproject and #4G or #5G modem can do the same.

Otherwise we'll see them fail the same way @signalapp did, which is eitger getting shut down (#EncroChat-style) or being uncovered as a controlled opposition / honeypot (like #ANØM aka. #OperationIronside aka. #OperationTrøjanShield)…

Red/black concept - Wikipedia

I feel non-security executives say “security is everyone’s responsibility” they often ends up meaning “security’s problem.”
#SecurityCulture #Leadership #HonestSecurity

Most organizations still treat security training like an annual obligation.
One course. One quiz. One certificate. Then nothing changes.

In this session of THRM 2026, our speakers have discussed How AI Can Strengthen and Scale Compliance Training Effectiveness.

Watch the full session now - https://www.youtube.com/watch?v=Q19bIL-zKRQ

#THRM2026 #Threatcop #AI #CyberSecurity #PeopleSecurity #Phishing #ComplianceTraining #SecurityCulture #RiskManagement #CISO

SECURITY CULTURE 101: How Activists Resist State Repression

YouTube
@johnbrowntypeface this is what I sent to the peeps, still open to suggestions

 this is really good advice that's very accessible to everyone, very quick reads 
https://www.anarsec.guide/posts/e2ee/  they have several other excellent guides really recommend clicking thru this website https://www.anarsec.guide/

this is great introduction to security culture, very basic, 
https://www.sproutdistro.com/catalog/zines/security/what-is-security-culture-a-guide-to-staying-safe/ they have several other zines on security culture that are very good https://www.sproutdistro.com/catalog/zines/security/
crimethinc has some pretty good resources, i have some disagreements with them but this is very practical: A Demonstrators Guide to Operational Security 
https://lib.edist.ro/library/crimethinc-demonstrators-guide-to-operational-security?v=1769556321

wired has been putting out some pretty good articles lately, like this one on How to Film ICE
https://www.wired.com/story/how-to-film-ice/


for general tech recommendations check out privacy guides 
https://www.privacyguides.org/en/tools/


Street Medic Training 

this is a short intro to the subject 
https://mutualaiddisasterrelief.org/wp-content/uploads/2020/04/Street-Medic-Guide-Paper-Revolution-v6.pdf

This riot medicine guide is really really good and could be as the basis of a medic training program 
https://riotmedicine.net/downloads

#securityCulture #minnisota
AnarSec | Encrypted Messaging for Anarchists

got in contact with a friend from MN who is an an activist chat and she was asking for some resources, I have my own but looking for something better

if you have any pamphlets or articles on #SecurityCulture or protest first aide, street tactics or other stuff that you think people in Mineapolis might need please share in the comments.

@bagder personally, I find that platforms like @Hacker0x01 don't move things much further.

  • Neither are companies on there more receptible nor do things get fixed quicker as far as I can see, tho my sample size is not scientific.

Either a company / organization / project has a "#SecurityCulture" or not.

  • For most corpos #HackerOne is just a checkbox to tick when it comes to "vulnerability managment"

#SecurityCulture | the INFILTRATORS DATABASE is a searchable database of cases of long-term infiltrators in the 21st century, currently referencing 74 cases from 12 countries. Each case provides a brief description & sources.

🔗https://www.notrace.how/infiltrators _

“The goal is to help anarchists and other rebels understand how infiltrators operate.”

#WeKeepUsSafe

.
.

🖌 The Art Of Jesse Lee

🔎 The Hidden Threat Inside Your Organization
Internal users can cause incidents by mistake or misuse. Limit risk with least-privilege access, monitoring, and security awareness.

#CyberSecurity #SecurityCulture #InsiderRisk #InfosecK2K