〇 ṃѧяȗṿєяṡє 〇

17 Followers
89 Following
140 Posts
Dog 🐺
Plant 🌿
Computor 🧑‍💻
Ambiamorous 💕
PronounsENG: they/them NL: die/hen
PersonalityBetter Offline, AFK
Interests#Pets, #Privacy and #Public opinion
Knowledge#cybersecurity #infosec #privacy #threatintelligence #OSINT #digitalforensics #comptiasecurity+
I think we collectively pulled that lever #unitedhealthcare #BrianThompson #LuigiMangione

Human resilience is pretty strong in this one. <3 Assange

"If exposing a crime is treated as a crime, you are being ruled by criminals" - Edward Snowden

https://youtu.be/Aj0pD5k9uLw?si=Onk8vFDAmJBG7nI9

Julian Assange - The CIA Tried to Assassinate Me

YouTube
Exactly, not even a simcard in my phone 💚

This just about sums it up

#angelacarini #Olympics2024

Just going to leave this here.

The balance between convenience and privacy when it comes to personal information is a complex issue that has become increasingly important in the digital age. On one hand, the convenience of having personalized recommendations, targeted advertising, and other services that rely on our personal data can be appealing. On the other hand, the potential risks associated with sharing personal information, such as identity theft, fraud, and other forms of cybercrime, can be significant.

One of the main ways that advertisers use personal information is through data brokers, which collect and sell information about individuals based on their online activity, purchase history, and *drumroll* location information. This information can be used to create highly targeted advertising campaigns that are tailored to an individual's interests and preferences. However, this also means that advertisers have access to a wealth of personal information about us, which can be used to create highly targeted phishing and vishing schemes.

For example, hackers may use information about an individual's online activity, such as their browsing history or social media activity, to create highly targeted phishing emails that appear to be from a trusted source, such as a bank or a retailer. These emails may include personalized information about the individual, such as their name or account balance, to make them more convincing and increase the likelihood that the individual will click on the link or download the attachment.

In addition to phishing and vishing schemes, hackers may also use personal information to create more sophisticated forms of cybercrime, such as identity theft and fraud. By stealing of BUYING personal information from databrokers, such as social security numbers, credit card information and precise location data, hackers can use it to create fake identities or open fraudulent accounts in the victim's name.

The worst way this information is used is by stalkers and exes who figure out the location and new identities of domestic violence victims and LGBTQIA+ to bully and stalk.

#stopthebrokers #databrokers #privacy

https://www.lawfaremedia.org/article/people-search-data-brokers-stalking-and-publicly-available-information-carve-outs

https://tomkemp00.medium.com/the-weaponization-of-data-threats-associated-with-data-brokers-3a27af5d8496

https://abc3340.com/news/abc-3340-news-iteam/domestic-violence-victim-speaks-out-against-online-data-brokers

https://money.cnn.com/2013/12/18/pf/data-broker-lists/

People Search Data Brokers, Stalking, and ‘Publicly Available Information’ Carve-Outs

Data brokers scrape public records and sell information online. Years of stalking and abuse have followed—and policymakers need to step in.

Default
Just going to leave this here

Twitter's security team? 🦗🦗🦗🦗🦗🦗

Apparently switching to X.com wasn't enough of a head-scratcher, they also forgot to consider basic phishing risks. Phishers are having a field day with all these new spoofable domains.🤦

fedex? fedetwitter ⚠️

#phishing #security #twitterfail

https://krebsonsecurity.com/2024/04/twitters-clumsy-pivot-to-x-com-is-a-gift-to-phishers/

Twitter’s Clumsy Pivot to X.com Is a Gift to Phishers – Krebs on Security

I have to admit, "GPT-3 Techgnosis" is one of the strangest, most fascinating books I've ever picked up. If you think magic and artificial intelligence sound like a bizarre mix, you're not wrong. But Alley Faint Wurds pulls it off, somehow.

The book channels the language model GPT-3 to build a kind of chaos magic system unlike anything I've seen. It's personalized, experimental, and seriously out there. There are rituals designed to induce "invertebrate consciousness" (whatever that means) and using Butoh dance as a magical focus. If you like your magick traditional, this is not for you.

However, if you're into the idea of technology bleeding into spirituality, and want a system that's completely your own, this might spark some serious inspiration. I'm still figuring out how much is usable and how much is… well, just plain weird. But there's something fascinating about the whole endeavor.. I think it opened up a new pathway in my own occult path

#books #occult #AI #GPT #LLM #AGI

🤖 Douglas Coupland's "Machines Will Make Better Choices Than Humans" is a thought-provoking, and at times unsettling, look at the impact of technology. His essays, written before the current AI explosion, feel eerily prescient. While debatable, Coupland's ideas force us to confront the increasing power of algorithms and the potential shift towards a future where machine decisions dictate much of our lives 👾

#books #AI #philosophy