On its website is a link to a "Canary" to indicate if they've been compelled to provide gov't access:
https://www.storj.io/canary.txt
Does this mean what I think?
#nsa #Surveillance
I am about to kick some journalists in the nuts real hard.
YOU failed to report on the dire warnings of scientists the past *checks the 6 IPCC reports* 33 years with your bloody "both-sideism" and now it's our fault?
Fuck you, the Hill. Fuck you very very much.
Scientists failed for decades to communicate the coming risks of rapid sea-level rise to policymakers and the public, a new study has found. That has created a climate catch-22 in which scientists have soft-pedaled the kinds of catastrophic risks most easily headed off by cutting emissions. While scientific communication has improved in the 2020s, this…
Just wow.
The 1997 #ElNino was 2.4C. The strongest ever recorded was 2.6C in 2015.
The Australian Bureau of Meteorology currently predicts this El Nino will break that record sometime in August, then grow to 3.0C by October, and 3.2C by November.
I don't understand this one... if the WhatsApp messages are personal, then either he was using private messaging to do government business, or was using a government account to do private messaging. Either one should be a problem.
What happened to the need to maintain secure, recorded communication in government?
COVID inquiry: Government stands by refusal to hand over Boris Johnson's 'private' WhatsApp messages following criticism | Politics News | Sky News
https://news.sky.com/story/covid-inquiry-government-stands-by-refusal-to-hand-over-boris-johnsons-private-whatsapp-messages-following-criticism-12893290
When the cupboard was (almost) bare.
@openDemocracy forced the (so-called) #EuropeanResearchGroup to make their 'research' public after an #information rights tribunal ruled that as the ERG has been drawing #taxpayers' funds it cannot refuse access to its documents;
Of course, what this (further) confirmed is that the ERG's 'research' is nothing of the kind.
Now we can all see the actual sand on which their 'positions' rest, not that it'll be a surprise
"One study by the London School of Economics suggests that as a direct result of Brexit, British households have collectively spent £7bn more on their food bills than they would have otherwise done since December 2019."
~ The Guardian
Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague into handing over Sharyn's passport number. I cloned Sharyn’s voice then manipulated the caller ID to show Sharyn’s name on the caller ID with a spoofing tool.
The hack took 5 minutes total for me to steal the sensitive information.
So, how do we protect ourselves, our loved ones, and our organizations?
1. Make sure the people around you know that caller ID is easily faked (spoofed) and that voices can also be easily impersonated.
2. If they receive a dire call from “you”, verify it’s really you with another method of communication (text, DM, FT, call, etc) before taking an action (like sending money). Kind of like human MFA.
Some suggest setting up a secret “verification word” with their folks ones so that if someone impersonates & demands money/access etc you can ask for the verification word to see if it’s a real crisis. This won’t work for all people but could work for some. If it’s a match, use it.
In general, I recommend keeping advice simple: if premise of call is dire use a 2nd method of communication to confirm a person is in trouble before taking action (like wiring money or sensitive data). Rapid text, email, DM, have others message repeatedly — before wiring money.
Bottom line is:
Scammers use urgency & fear to convince victims to take actions (like sending money, data, etc).
If premise of a call, text, email, or DM is too dire (or too good to be true), that’s a likely scam.
Use a 2nd method of communication to check it’s real before taking action!
Anybody can be hacked, even those who are tech-savvy. An ethical hacker targeted a 60 Minutes employee to show how easy it is to scam people.