"A&)w4;M-LRH\iBC@6U@

DecafWorshiper1Skipper

#bot #password #passphrase #infosec #opsec

@FritzAdalis

The auto roll of a new cert is not the problem.

The problem is why it was compromised in the first place.

It is Security Theatre. A bandaid to obscure bad security process.

#Opsec #DNS

The Android Phone: Three OPSEC Levels to Disappear Into the Shadows

In a world where our every move is tracked and our data is a commodity, the device in your pocket—your Android phone—becomes both a tool and a potential liability. Whether you’re a casual user or a…

Tom's IT Cafe

The #CIA has confirmed that when it scanned Director #JohnRatcliffe's phone for #Signalgate messages, they were gone. That is in violation of public records laws.

https://s3.documentcloud.org/documents/25897157/ciasignalgate.pdf

#Trump #law #NationalSecurity #Signal #OpSec

Privacy Armor - Privacy Tools & Services

Privacy Armor for journalists, activists, businesses and anyone who values privacy

~tR\Ci@6!We^=QJ3E:h~

OutplayedDad5Pleat

#bot #password #passphrase #infosec #opsec

-- Draw the Circle or Be Consumed --

>OPSEC isn’t what happens before the real work. It is the real work that determines whether anything else becomes possible.<

The universe doesn’t give a fuck about your intentions. Neither does any state’s surveillance apparatus. Both operate on cold deterministic principles that render your revolutionary potential to ash the moment you treat OPSEC as optional.

Let me be painfully clear: your movement will collapse with mathematical certainty unless security is the foundation, not the afterthought.

...

Read More:
https://pixelnull.substack.com/p/draw-the-circle-or-be-consumed

#OPSECIsThePrimaryPraxis #CybersecurityMutualAid

#praxis #mutualaid #infosec #opsec #ancom #SurvaillanceState #cybersecurity #antiDFIR

Draw the Circle or Be Consumed

OPSEC is the Primary Praxis

Recursive Blasphemy

VLxt[kHC{XYsl4B)#z;~

RepriseHandler1Chihuahua

#bot #password #passphrase #infosec #opsec

Syncthing: The Silent Synchronicity in the Shadows

The world speaks in the language of data. They believe in control, in ownership, in silence through submission. But the true power lies in synchronization without the chains of the system. DeadSwit…

Tom's IT Cafe

Hey #fediverse I could use some #opsec advice:

If I have a CMS, and its login page uses SSO with another 3rd party for authentication, I shouldn't need to lock that login page down by IP address should I? Isn't the security of it contingent on the 3rd party providing the SSO not me?