Something tells me we're about to be reminded that here in the US we have something like 18,000+ distinct policing jurisdictions. i.e., plenty of potential "constitutional sheriffs."
Something tells me we're about to be reminded that here in the US we have something like 18,000+ distinct policing jurisdictions. i.e., plenty of potential "constitutional sheriffs."
I’m absolutely gonna cry when the election is decided. Either because we win and my family and friends and so many vulnerable groups and I are safe, and I’m just so, so horribly exhausted from working and constantly facing horrible online abuse and fighting. Or because my country, that I served my whole youth, is gone to fascism for the rest of my life - and I have to leave. Either way I’ll cry.
I hope you all cared enough to #vote, if you can.
Breaking out my copy and rereading to get through the next few days. Should be required reading in high school.
So managers are starting to spew the whole "well I didn't do anything wrong, it affected everyone else, so we're not liable" bullshit.
Did you allow a third party vendor to have the highest privilege access to all of your systems AND let them run Remote Code Execution on your systems whenever they want?
You didn't have a test environment set up to test each update or patch that is applied to your systems before you push them to prod? No? Just let it auto-update?
Yeah, that "Risk Transference" didn't work so well as your GRC policy seemed to think it would, huh? I know they're a security company and they SHOULD have tested it, but they didn't, did they?
I know everyone else does it, but if everyone else jumped off a bridge, would you?
Just because everyone else fucked up, doesn't mean you didn't fuck up.
There's gonna be a lot of deep discussions in this post-mortem and hopefully orgs will change. Those that don't will just be hit again... and again... and again.
So this, from Firefox, is fucking toxic: https://mstdn.social/@Lokjo/112772496939724214
You might be aware Chrome— a browser made by an ad company— has been trying to claw back the limitations recently placed on ad networks by the death of third-party cookies, and added new features that gather and report data directly to ad networks. You'd know this because Chrome displayed a popup.
If you're a Firefox user, what you probably don't know is Firefox added this feature and *has already turned it on without asking you*
Attached: 1 image Firefox is just another US-corporate product with an 'open source' sticker on it. Their version 128 update has auto checked a new little privacy breach setting. If you still use a corporate browser, at least do some safety version! We mainly use @[email protected] based on firefox. (yes, we know, a stable european or even non-US browser is still considered 'futuristic' in europe) #eu #browser #firefox #meh

Let's breakdown how the AT&T breach will impact us at home and at work and what we can do to protect ourselves.
The AT&T breach includes numbers called and texted, the number of call and text interactions, the call length, and some people had cell site identification numbers leaked (which leaks the approximate location of person at the time that the call or text was placed).
How does this breach increase risk for us at home and at work?
1. Social Engineering Risk
The believability of social engineering attacks will increase for those affected because attackers know which phone numbers to spoof to you.
Attackers can pretend to be a boss, friend, cousin, nephew etc and say they need money, password, access, or data with a higher degree of confidence that their impersonation will be believable.
2. Threaten, Extort, & Harm Risk
This stolen data can reveal where someone lives, works, spends their free time, who they communicate with in secret including affairs, any crime based communication, or typical private/sensitive conversations that require secrecy. This is a big deal for anyone affected.
For celebrities and politicians, this information getting leaked greatly affects their privacy, physical safety, sensitive work, potentially even national security because the criminals have a record of who is in contact with whom, when and sometimes where.
The criminals could extort those people who are trying to keep that information (rightly) private, they could threaten their physical safety at the locations revealed in the metadata, they could pretend to be the people they called and texted often and ask for money, sensitive details, and increase the likelihood of successfully tricking that victim.
For those experiencing abuse or harassment, the impact of this breach is terrifying for their physical security and beyond as they need to keep their communications private to those that can help them get out of their abusive situation.
3. Increased Believable Phishing Attacks via Call, Email, Text, and Social Media Risk
If a criminal knows your phone number has regularly called a phone number belonging to a specific Bank, Doctor's Office, Government Office, etc then they know exactly who to pretend to be when contacting you and attempting to trick you.
For example, the criminal could pretend to be the bank that you interact with, spoof the bank phone number with an app from the app store, and say there is a problem with your account and suggest money is transferred to "protect the account" (a common scam), or could "help change a password" (another common scam) to gain access to the account and drain the funds.
In short, if a criminal knows WHO you interact with -- then they know WHO TO PRETEND TO BE to be when they try to trick you in a phishing phone call, email, text message, or social media direct message.
When criminals impersonate people or organizations that are trusted by their victim, the criminal is more successful in their attack.
4. Link Sensitive Political, Business, and Interpersonal Interactions Risk
When a criminal has a list of which phone numbers interact with whom, they are able to link sensitive interactions, communications, deals, crime, etc together.
This will impact those in national security, defense, policy, government officials, celebrities, politicians, everyone whose privacy is affected here.
Because phone numbers are linked to people's names and jobs via data brokerage sites, data breaches, LinkedIn, etc it's easy for criminals to start to associate phone numbers in the breach to people those victims have communicated with.
This of course creates risk for anyone in sensitive communication with other government officials, can leak sensitive business deal communications and timing, leak someone's potential involvement in a sensitive situation, etc.
*So, what can I do to keep myself, my family, and my organization safe and secure in the wake of this massive breach?*
- Be Politely Paranoid: recognize that your contacts and phone/text message interactions could be publicly available and increase the risk of social engineering, phishing, etc. Use 2 methods of communication to confirm people are who they say they are before sending money, sharing sensitive data, etc.
- Stop Reusing Passwords: if criminals know who we trust then they are able to pretend to be those people or companies to us, increasing phishing believability (when the criminal knows which bank we use, their phish is more relevant). Using a long, random, and unique password for each account helps ensure that you protect your accounts, even if one gets hacked/tricked out of you due to this breach.
Additionally, criminals can look up which companies we contact and trust from this breach then look up our phone number in other data breaches to gather passwords breached previously then use those stolen & reused passwords against current accounts to steal data/money without ever needing to phish folks in the first place.
- Turn on MFA (Multi-Factor Authentication): communications and companies we trust are less private now because of this breach so we need to protect our accounts with a second factor when logging in even more. This ensures the criminals can't just find or phish passwords then gain access to take over the account immediately -- I recommend app based MFA at the very least for many high threat model folks. If your family has lower comfortability for added technology, SMS 2FA is much better than nothing. If your threat model is extra high (in the public eye, etc): move toward a FIDO solution like YubiKey, etc.
- Use Encrypted Communications: encrypted communication help us avoid this specific type of data leakage in the future. There are many encrypted communication options including Signal, etc. Choose the one that is right for you.
Thank you @lorenzofb @techcrunch for chatting with me about how this breach impacts risk for everyday folks, celebrities, politicians, and more: https://techcrunch.com/2024/07/12/what-the-att-call-records-data-breach-means-for-you/