TechnoTenshi   

490 Followers
502 Following
232 Posts

Proud trans girl 🏳️‍⚧️ (she/her) | girls girl | Polyglot coder | Anime & manga | Into infosec, privacy, trans rights & cryptography | Neurodivergent | Electronic, metal, K/J-pop | Follow reqs welcome with real profiles & thoughtful posts. No bots/automation.

Avatar: Smiling anime-style blonde girl winking, with a bright blue eye, wearing a blue hooded cap and jacket over a white top and black skirt, on a plain light background.

PronounsShe/Her
Keyoxide$argon2id$v=19$m=512,t=256,p=1$O2NcFI4X5ECcO0jdz+O6WQ$ur8FQPf9GZHfWXml1ncPNQl/KAHdqGy1VavZt8SCg8s
Pronouns.cchttps://pronouns.cc/@technotenshi
Transfem.socialhttps://transfem.social/@technotenshi
Blueskyhttps://bsky.app/profile/technotenshi.bsky.social
tech.lgbthttps://tech.lgbt/@technotenshi

Cybrkyd's post looks beyond Apple and asks whether age verification is starting to move into the operating system layer. It points to a merged systemd change and Flatpak discussions as signs that Linux components are beginning to account for age checks, potentially in response to regulatory pressure. The article is framed as analysis and open questions, especially around how age could be verified on self administered systems where the user is also root.

https://cybrkyd.com/post/age-verification-on-systemd-and-flatpak/

#InfoSec #Privacy #Linux #AgeVerification

Age verification on Systemd and Flatpak

How will this work, I wonder

Cybrkyd

Fairlinked's "BrowserGate" report alleges that LinkedIn, owned by Microsoft, scans visitors' browsers for installed extensions and tools without disclosure, including competitor sales products and job-search add-ons. The report says the results are sent to LinkedIn and third parties, potentially exposing sensitive traits and revealing which companies use rival products. It also claims the scan list grew from about 461 products in 2024 to more than 6,000 by February 2026, and that the activity is not described in LinkedIn's privacy policy.

https://browsergate.eu/

#InfoSec #Privacy #DataProtection #LinkedIn

LinkedIn Is Illegally Searching Your Computer

Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm. The user is never asked. Never told. LinkedIn’s privacy policy does not mention it. Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

BrowserGate

Anthropic's Claude Code's full source code leaked. Claude is seen by many to be the best coding LLM on the market with Anthropic proudly stating that Claude Code itself is mostly written by the LLM.

Now this sounds good as long as nobody can see the code which is quite the trash fire. Detecting "code sentiment" via regular expressions, variable and functions names containing prompt parts trying to influence the bot, a completely intransparent mess of a control flow that makes actual maintenance and debugging functionally impossible and the prompts ... of the prompts. All the begging and pleading to the chatbot not to do this or not to do that or please to do this.

It is fascinating but it is as far away from actual engineering as drunkenly pissing your name in the snow. Dunno what you call the people prompting software at Anthropic but "engineer" is not it.

Now it is fun to look at the currently hyped product striped bare and showing its pathetic quality but that is the future of software if we let those companies continue to undermine every good practice software engineering has tried establishing.

The software we have to use will be bad, insecure, unmaintainable, expensive with nobody having the skills or resources to build something better. As I wrote a few months ago: LLM based software production is equivalent to saying that fast fashion should be the only way to produce clothing. A tragic degeneration of the quality of the artefacts we rely on build for maximum profit on the backs of people in countries from the global majority.

i'd rather just be me than try to be who everyone else wanted me to be.

transitioning honestly changed my life in a good way. i finally made peace with that girl inside me, the one i kept pushing down for so long because of all the stuff i was taught growing up under patriarchy, misogyny, and rigid religious beliefs that framed femininity as shameful and inferior, something that needed to be hidden. but finding myself... it's been kind of amazing. i feel real happiness now, real support, and i actually get to live as myself and experience the girlhood i never thought i'd have.

transitioning didn't magically fix everything, but it made life feel worth it, like something i actually want to keep going for.

i'm trans. i'm here. and i wouldn't change this part of me.

happy trans day of visibility to all my trans fam 🏳️‍⚧️

#TDOV #TransgenderDayOfVisibility #TransJoy #TransIsBeautiful #ProtectTransLives #VisibilityMatters

The FTC said OkCupid and Match shared nearly 3 million user photos with Clarifai in 2014, along with location and demographic data, without telling users or offering an opt-out. The proposed settlement, filed in federal court, includes no financial penalty and no admission of wrongdoing. It would permanently bar OkCupid and Match from misrepresenting how they collect, use, share, delete, or protect personal data and privacy controls.

https://arstechnica.com/tech-policy/2026/03/okcupid-match-pay-no-fine-for-sharing-user-photos-with-facial-recognition-firm/

#InfoSec #Privacy #FacialRecognition

OkCupid gave 3 million dating-app photos to facial recognition firm, FTC says

OkCupid and Match settle with Trump FTC, don't have to pay any financial penalty.

Ars Technica

Sam Bent reports the White House app v47.0.1 requests 26 Android permissions, including precise location, biometric authentication, storage changes, startup, overlay, and Wi-Fi access, and embeds 3 trackers including Huawei Mobile Services Core. The piece also says the app includes an ICE tip line link and a "Text the President" feature that prefills "Greatest President Ever!" while collecting contact details. More broadly, the article compares permissions and trackers across U.S. government apps including FEMA, myFBI Dashboard, IRS2Go, and CBP Mobile Passport Control and argues many functions could be delivered via the web instead of mobile apps.

https://www.sambent.com/the-white-house-app-has-huawei-spyware-and-an-ice-tip-line/

#InfoSec #Privacy #MobileSecurity

Fedware: 13 Government Apps That Spy Harder Than the Apps They Ban

The White House app ships with a sanctioned Chinese tracking SDK, the FBI app serves ads, and FEMA wants 28 permissions to show you weather alerts.

Sam Bent
my kitty cat broke her tail... 😢

A T-shirt seen at today's #NoKings protest:

#uspol #LGBTQ

New breach: Today, a breach of one of the iterations of the BreachForums hacking forum known as "version 5" was publicly disclosed. Data included 340k unique email addresses, usernames and argon2 password hashes. 96% were already in @haveibeenpwned. More: https://haveibeenpwned.com/Breach/BreachForumsV5
Have I Been Pwned: BreachForums Version 5 Data Breach

In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.

Have I Been Pwned

To succeed with our privacy rights movement, we must support each other. A good way to do this is to never forget to give credit where credit is due.

👍 Learn more on how you can help make your allies feel seen and valued.

🧰 Check our Privacy Activist Toolbox tip to Give Credit Where Credit Is Due: https://www.privacyguides.org/en/activism/toolbox/tip-give-credit-where-credit-is-due/

#PrivacyGuides #Activism #PrivacyActivistToolbox #Privacy

Give Credit Where Credit Is Due - Privacy Guides

To succeed with our movement to defend privacy rights, we must support each other. One good way to do this is to give credit where credit is due.

Privacy Guides