And you thought the SolarWinds attack was bad. Although, are they related? According to Krebs, no (though Microsoft would say that).
@politeruin Although, are they related? According to Krebs, no
Iâll go out on a limb and say the two are almost certainly related⌠oh wait, I already said it⌠couple of weeks ago. kind of
My bet is that we see a lot more of this.
If we donât, then the criminals have really let their game slipâŚ
âŚtime to order a stack of FIDO keys for work, finish switching us over to OpenBSD on the desktop and get some Pine PhonesâŚ
Not just a software vulnerability, but a life one:
(Thread)
Fuck real names policies, fuck âonlineâ indicators. Fuck making things easy for stalkers and trolls.
Thousands of taxpayersâ personal details potentially exposed online through councilsâ debt-chasing texts
I used to spend a lot of time trying to convince people about how awful the draconian Investigatory Powers Act 2016 was and would be so iâm not at all surprised they are now really pushing to end end-to-end encryption. Maybe now people will actually give a fuck.
The only way data doesnât leak, and isnât abused, is if itâs not collectedâŚ
Narrator: They didnât.
Not 100% sure how theyâre going to enforce that on companies that donât have presences in the UKâŚ
Also, I wonder if that TCN business addresses that loophole⌠a note that says we havenât had to comply with a TCN.
That GDPR fine is going to mean Zuck may have to wait another week to buy a new island.
The good old warrant canary eh? I seem to remember some rumblings about making that illegal too and the article addresses that point so the end user would never ever know their comms are being snaffled up by Her Madgeâs spooks.
A company which is subject to a TCN is legally barred not only from discussing the specifics of the notice, but from disclosing whether the notice exists at all. Any employee of a company subject to a TCN who disclosed that one existed would be subjected to criminal penalties for breaking a gagging order. The powers also appear to apply to the use of âwarrant canariesâ.
Appear⌠I dunno, there are ways⌠maybe a hacker âfound itâ, maybe a disgruntled ex-employee exposed itâŚ
These things happen.
The devil, as they say, is all in the details. I wouldnât be surprised for a second if the major ISPs already implement this, i mean they are required to retain 12 months of browsing history metadata as required by law in the IP Act. And by the way, every time i see that list of authorities allowed to sniff through it without a warrant gives me the fucking creeps.
NSA helps out Microsoft with critical Exchange Server vulnerability disclosures in an April shower of patches
Cracked copies of Microsoft Office and Adobe Photoshop steal your session cookies, browser history, crypto-coins
hmmm