Joey Stanford

60 Followers
48 Following
15 Posts

#CISO | PhD & LLM ⚖️ CISM & CDPSE Certified. Expert in #Governance, #Risk, and #Compliance. Specializing in #Privacy Law and #CyberSecurity Strategy.

#FOSS Advocate 🐧 | Member: #W3C Privacy Working Group. Life Member: Sigma Xi & Phi Alpha Delta

🕹️ Offline: #StarCitizen | #HamRadio | #CivilAirPatrol ✈️

GitHubhttps://github.com/rinchen
Websitehttps://tilde.team/~jjs
LinkedInhttps://www.linkedin.com/in/rinchen
First 100 Badgehttps://badges.vocalcat.com/view/grant/badgesvocalcatcom_14_9_82e610e0aab7a789bb8b6b3dd34123d6
Post Archivehttps://tilde.zone/@jjs

If you’re into #meshtastic or #meshcore there’s a new tool coming out of Colorado Mesh: a unified desktop client for Mac, Linux, and Windows.

It allows for running both protocols simultaneously in a single interface. While it's still in active development, it’s already stable enough for daily use by many in the community. 🛰️

📂 Source: https://github.com/Colorado-Mesh/mesh-client

GitHub - Colorado-Mesh/mesh-client: Cross-platform Electron desktop client for Meshtastic and MeshCore on macOS, Linux, and Windows — BLE, USB serial, Wi‑Fi/TCP, MQTT, local SQLite history, routing diagnostics, and keyboard-first workflows.

Cross-platform Electron desktop client for Meshtastic and MeshCore on macOS, Linux, and Windows — BLE, USB serial, Wi‑Fi/TCP, MQTT, local SQLite history, routing diagnostics, and keyboard-first wor...

GitHub

I've never been to Canada and don't own a car. There is absolutely no reason the Canadian Tire company should have any of my data. But I'm still part of their data breach.

This is such a good example of why privacy is important: because your data is sold, and resold, and resold, to third party companies that are all potential victims.

How far back in time can you understand English?

An experiment in language change

Dead Language Society
@dan
- "My dishwasher is on the internet!"
- "Why is on the internet?"
- "To download software updates!"
- "Why does it need software updates?"
- "To fix security vulnerabilities!"
- "Why would it have security vulnerabilities?"
- "Because it's on the internet!"
Goodbye buggy localsend and kdeconnect, hello keet.io. Keet works everywhere I am: bazzite, iOS, macOS, Windows, etc and is super fast.

Do you delegate web security to security specialists or are you responsible yourself for implementing web security features and practices?

The W3C SWAG CG survey asks this and other questions and we would value your input as we create Web Security documentation.

https://docs.google.com/forms/d/e/1FAIpQLScbKJL2Q8XABAHVystmqGU2lQoE0tAJSL_dwhvwPwBcJ-M4fQ/viewform?usp=header

Web security survey

Thanks for taking our survey about the usage of web platform security features. We're the W3C Security Web Application Guidelines Community Group (SWAG CG), and our mission is to develop guidelines for the usage of web platform security features, to help web developers secure their sites. We're trying to understand whether developers are using specific web platform security features, and what the barriers are to the adoption of these features. The survey itself is in three parts: 1. About you: this section asks some questions about you and your level of experience of both general web development technology and web security technology in particular. This helps us understand how different individuals have different perspectives on web security, and helps us design guidelines to help as many developers as possible. 2. Web security features: this asks some questions about your usage of some specific web platform security features. 3. Web security interview: this asks if you would be willing to participate in a short interview with members of SWAG CG, so we can understand better why you use, or don't use, particular features. This information is especially important to us, because it's the kind of qualitative data we can't get through analytics. So if you can spend a little time to talk to us, it would be very much appreciated.

Google Docs

Haven't read it all, yet, and unfortunately I didn't save the toot that brought it to my attention, so I'm unable to credit/thank the person who originally linked it, but the Pope's statement on AI is actually kinda great:

https://www.vatican.va/content/leo-xiv/en/messages/communications/documents/20260124-messaggio-comunicazioni-sociali.html

#Pope #NoAI #NoSlop

60th World Communications Day 2026

MESSAGE OF HIS HOLINESS POPE LEO XIV FOR THE 60 TH WORLD DAY OF SOCIAL COMMUNICATIONS [ Multimedia ] _______________________

WaPo Raid Is a Frightening Reminder: Turn Off Your Phone’s Biometrics Now https://theintercept.com/2026/01/30/washington-post-hannah-natanson-fbi-biometrics-unlock-phone/
Washington Post Raid Is a Frightening Reminder: Turn Off Your Phone’s Biometrics Now

The search warrant to raid a Washington Post reporter’s home shows how authorities can open your phone without your consent.

The Intercept

The W3C Security Interest Group has published the first drafts of the following Group Notes:

"Threat Modeling Guide" which describes when, why, and how to perform threat modeling during the development of a specification at W3C; and "Threat Model for Decentralized Credentials" which is the live "meta" Threat Model related to Decentralized Credentials.

https://www.w3.org/news/2026/group-note-drafts-threat-modeling-guide-and-threat-model-for-decentralized-credentials/

The @w3c Security #InterestGroup proposes to make systematic use of threat modeling in W3C to identify potential #threats, vulnerabilities, and safeguards in web specifications.
This guide is designed to help standards #developers make informed decisions about #security and #privacy risks from the beginning of standard development #timetogiveinput

▶️ https://www.w3.org/TR/threat-modeling-guide/

Feedback wlc: https://github.com/w3c/threat-modeling-guide/issues