Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester
A court record reviewed by 404 Media shows privacy-focused email provider Proton Mail handed over payment data related to a Stop Cop City email account to the Swiss government, which handed it to the FBI.
— by @404mediaco
📧 https://www.404media.co/proton-mail-helped-fbi-unmask-anonymous-stop-cop-city-protestor/
[Archive] https://archive.is/gx6U4
#protonmail #switzerland #email #fbi #us #uspol #chpol #StopCopCity #privacy #pgp #swiss #anonymous #anonymity #mail #proton #payment #encryption
RE: https://mastodon.social/@jeffjarvis/116103855417343941
Give people the possibility to commit atrocities without consequences and they will...
As a German and someone who is regularly actively participating in Holocaust remembrance it really makes my heart heavy. We have been here before and swore to never return. We can watch in realtime as this horror unfolds yet again.
Our politicians not criticizing the sensitive topics as they are afraid of the power of the Fascist Leadership. They completely forgot that fear is where they draw power from.

As described previously, the Linux kernel security team does not identify or mark or announce any sort of security fixes that are made to the Linux kernel tree. So how, if the Linux kernel were to become a CVE Numbering Authority (CNA) and responsible for issuing CVEs, would the identification of security fixes happen in a way that can be done by a volunteer staff? This post goes into the process of how kernel fixes are currently automatically assigned to CVEs, and also the other “out of band” ways a CVE can be issued for the Linux kernel project.
RE: https://social.bund.de/@Bundesregierung/116046426997536938
Angebliche Fusionskraftwerke
Angeblich nicht finanzierbarer Sozialstaat
Angeblich hocheffiziente Verbrenner
Angeblich unzumutbare Besteuerung von Überreichen
Angeblich komplexe Völkerrechtsverstöße durch die USA
Angeblich zu faule Arbeitnehmer
Angebliche Ausnutzung telefonischer Krankmeldungen
Angebliche Bürgergeldeinsparungen in Milliardenhöhe
Augen auf bei Desinformation!
The OpenCloud Security team has discovered a vulnerability rated CVSS 8.2 (High). We have handled this finding in accordance with responsible disclosure principles, created a fix, and informed other potentially affected projects.
The good news: the patch is available as of today.
Learn more about the necessary steps to take now: https://opencloud.eu/en/news/opencloud-developers-find-vulnerability
And read our blog to find out why transparency and enterprise licences provide security in moments like these: https://opencloud.eu/en/news/why-transparency-and-enterprise-licences-bring-security
Only 2 days left for all of us to support #FreeSoftware in the EU. Answer the call for evidence about: The European Open Digital Ecosystem!
This is our chance to support Free and #OpenSource #Software in the EU.
https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/16213-European-Open-Digital-Ecosystems_en