πŸ‘ŠπŸ‡ΊπŸ‡ΈπŸ”₯

22 Followers
33 Following
1.4K Posts
Internet privacy advocate | Volunteer Signal beta tester | Veteran Major Incident Manager (MIM)
πŸ‘‡πŸ½
Cartoon by John Deering.
#USpol
Police are using the surveillance state to stalk "love interests" because there really is no difference between the part of my job where I fight state surveillance and the part where I fight domestic abuse: https://www.theguardian.com/commentisfree/2026/may/02/flock-police-surveillance-tech-birds-iran-press-freedom
Police are using surveillance tech to stalk love interests. Dystopia, here we come

The tech company Flock has 80,000 cameras across the US – and a report finds some officers are taking advantage

The Guardian
EFF is helping ICEBlock sue the government for coercing Apple into removing it from their app store: https://www.eff.org/cases/aaron-v-bondi
Aaron v. Bondi

EFF is helping represent ICEBlock in its First Amendment lawsuit. ICEBlock is a popular iPhone app that allows the public to report immigration activity in their communities. The company and its creator have sued federal officials for retaliating against him and for coercing Apple into suppressing the speech of ICEBlock users.

Electronic Frontier Foundation
We understand the trust that people put in Signal, and how devastating this kind of social engineering can be. While it’s true that all messaging platforms are susceptible to scammers and phishing that betrays people’s trust and convinces them to β€œunlock the front door” where no backdoor exists, we are looking to do everything we can to help people avoid and detect such scams. 7/
As a result, many didn't notice the takeover. The compromised accounts were then weaponized to target the victims' contact lists by posing as the owners of the account. 6/
Because such a change results in de-registering your Signal accounts, attackers prepared people for this by telling them that being de-registered was intended behavior, and that all they would need to do is β€œre-register,” or, create a new account. When they moved to create a new Signal account β€” one that was now decoupled from their hijacked account β€” the victims thought they were logging back in to their primary account. 5/
Because we don’t collect user data, what we know about these attacks comes from the victims of phishing. And from what victims have told us, the attacks followed a broad pattern: after tricking people into revealing their Signal credentials, attackers then used those credentials to take over their account and also frequently changed the associated phone number. 4/