VPN services are *not* a viable method for protecting your data from nation state actors or other advanced threats. They are not engineered for privacy and they should really aim to be more honest in their advertising.
That said, I'm tired of people saying that you should never use a VPN. VPNs do offer robust security against much of the average person's threat landscape with trade-offs that can be easily managed.
Girls got so excited after coding for the first time , earning an online certificate on @[email protected] during our School Code Tour Program in Abuja, our mission is to ensure every girl is given the opportunity to code . #Tech4Good @[email protected] @[email protected] @[email protected]
How to bypass Instagram SSL Pinning on Android (v78)
Oh hey, the BraveHeart #PinePhone is now available to preorder! Go get one! https://store.pine64.org/?product=pinephone-braveheart-limited-edition-linux-smartphone-for-early-adaptor
"The sooner @[email protected] is hired by Toronto to oversee this nonsense the better. Google now is going to monitor noise....obviously that means access to recording noise coming from condos too. This theft of our liberty must end @[email protected] . " Ross Kay https://twitter.com/nationalpost/status/1195435084918210560
What Is Homomorphic Encryption? And Why Is It So Transformative? FYI @[email protected] Perhaps, the future of secure search https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/
SIM swapping won't be taken seriously by carriers until a major politician gets hit. It's literally going to require a legit threat to national security before something will be done.
Here are some free Threat Intel Feeds:
Awesome list of Threat Intel Resources: https://github.com/hslatman/awesome-threat-intelligence#frameworks-and-platforms
I am deeply touched that Spain has issued a comprehensive Guide to Privacy by Design! PbD is increasingly being recognized as the best way to prevent privacy harms from arising: proactive measures are the best way forward. https://twitter.com/estellacohen/status/1193200440743223296
Web application security is not a trivial task. Even Microsoft/Github can mess up in critical ways.
This is a great example of why you want as many eyes on your security critical code as possible!
Pictures of my Engines
Three functional mini engines!
First is a Stirling Engine, it reciprocates with Hot Air (ie Blow Torch). I machined all parts of this engine.
Second engine is also a Stirling Envying, albiet smaller. It includes a water pump driven by the fly wheel for cooling. I designed and built the water reservoir system.
Third engine is a Steam Engine, once part of an old Erector Set. Fill the water tank in the middle, place an oil lamp underneath, and steam will turn the fly wheel!
Hardware & Software Development • Rapid Prototyping • Embedded Systems
Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse. Please email [email protected] for information on getting an invite.