Forwarded from Normie Pipeline
I am, once again, urging our guys to switch to Linux. I’ve made a few Linux posts in the past about which to use/what I recommend. Linux has come a long way in just a few years. With massive help from Valve and their steam deck using Linux. Gaming, productivity, everything, is usable on Linux. There is very little reason to not switch. SWITCH.
And for those who say they have windows only apps, you can run .exe (windows) apps on Linux through Wine and/or Lutris.
SWITCH
And for those who say they have windows only apps, you can run .exe (windows) apps on Linux through Wine and/or Lutris.
SWITCH
💯141👍26🥱10❤4🔥4🍌2🖕1
Forwarded from Information Liberation
🇺🇸🇮🇱 Two GOP reps have introduced a new bill to extend benefits reserved for US government servicemembers to US citizens serving in the Israel Defense Forces.
Tons of our own servicemembers are struggling but the GOP wants to give their benefits away to troops serving in a foreign army! 🤡 https://www.informationliberation.com/?id=64458
Tons of our own servicemembers are struggling but the GOP wants to give their benefits away to troops serving in a foreign army! 🤡 https://www.informationliberation.com/?id=64458
InformationLiberation
GOP Bill Seeks to Extend U.S. Govt Servicemembers Benefits to U.S. Citizens Serving in the IDF
Two GOP reps have introduced a new bill to extend benefits reserved for US government servicemembers to US citizens serving in the Israel Defense Forces
🖕94🤡28🤬11🌭3🤣3🍌2❤1🥴1
This is why this channel emphasizes growing some hard power against those who wish you harm. Unfortunately, some of our new subscribers promote failed strategies with "good optics."
https://news.1rj.ru/str/zeeemedia/15757
https://news.1rj.ru/str/zeeemedia/15757
Telegram
Zeee Media 🎙
Wow. Extremely important insight from a man living in Iceland who is already under Digital ID tyranny.
Follow @zeeemedia
Website | X | Instagram | Rumble
Follow @zeeemedia
Website | X | Instagram | Rumble
🔥36💯14❤2🥱2🍌2👍1
Media is too big
VIEW IN TELEGRAM
yeah, it's called the algorithm, silly
it's why we have echo chamber comment sections
it's why we have echo chamber comment sections
😱55👍19🍌10🤯7🌚3🥱2🗿1
Forwarded from Telegram Info English (iDubno)
Telegram to Introduce Fact-Checking Feature
The source code of Telegram for Android has revealed lines indicating the development of a new feature called "Fact Check." It appears that this feature will be implemented in partnership with government-assigned fact checking agencies.
- The "Fact Check" feature will allow additional clarifying information to be attached to messages. However, it will function differently from Twitter's Community Notes, even though they might seem similar at first glance.
- The government in your country will be able to appoint an agency to conduct fact-checking on public Telegram channel posts. This agency will have full control over the content of these fact check blocks, while regular users will not be able to influence or have a say in the notes. By clicking on the "What is this?" tool-tip, details about the agency providing the fact-check will be shown.
- Unlike Telegram's "Fact Check" feature, Twitter's Community Notes are created and evaluated by regular users, and the most useful notes are selected by an algorithm based on votes from readers with diverse political views.
The source code of Telegram for Android has revealed lines indicating the development of a new feature called "Fact Check." It appears that this feature will be implemented in partnership with government-assigned fact checking agencies.
- The "Fact Check" feature will allow additional clarifying information to be attached to messages. However, it will function differently from Twitter's Community Notes, even though they might seem similar at first glance.
- The government in your country will be able to appoint an agency to conduct fact-checking on public Telegram channel posts. This agency will have full control over the content of these fact check blocks, while regular users will not be able to influence or have a say in the notes. By clicking on the "What is this?" tool-tip, details about the agency providing the fact-check will be shown.
- Unlike Telegram's "Fact Check" feature, Twitter's Community Notes are created and evaluated by regular users, and the most useful notes are selected by an algorithm based on votes from readers with diverse political views.
🤡153🖕49🤣14😐11🤬9🤨6😢3💅3😁2🍾2❤🔥1
Forwarded from I Fucking Hate Science (late empire mindset)
Fake and gay disinfo post. This code is not for "Telegram for Android." This is for the "telegram-crawler" program by this faggot Ilya Siamionau.
https://github.com/MarshalX/telegram-crawler
https://github.com/MarshalX/telegram-crawler
✍71🍌10👍6🤔6❤2👎2
This media is not supported in your browser
VIEW IN TELEGRAM
JPMorgan's Chase Bank in Youngstown, Ohio 👀
Wen Federal Reserve?
🤯64🍾57🤩22🎉7❤6👍4🔥4🤔3🙏1🍌1
Hackers obtained customers' full names, addresses, phone numbers, email addresses, and order history information, including ticket purchase details. They also have customers' partial payment data, which includes names, the last four digits of their credit card numbers, and card expiration dates.
https://mashable.com/article/ticketmaster-data-breach-shinyhunters-hack
https://news.1rj.ru/str/slashbizchannel/55757
Mashable
Ticketmaster hacked. Breach affects more than half a billion users.
Emails, phone numbers, addresses, and even financial details have allegedly been exposed by a notorious hacker group.
🤯52😁17🔥6🍌4
Windows users on suicide watch: turns out, extracting everything that Microsoft is scanning is trivial:
https://scribe.rip/https:/doublepulsar.com/recall-stealing-everything-youve-ever-typed-or-viewed-on-your-own-windows-pc-is-now-possible-da3e12e9465e
Every few seconds, screenshots are taken. These are automatically OCR’d by Azure AI, running on your device, and written into an SQLite database in the user’s folder.
This database file has a record of everything you’ve ever viewed on your PC in plain text. OCR is a process of looking at an image and extracting the letters.
While this keylogging "feature" can allegedly be opted out of, it is on by default. Your clueless parents, employer, etc will have all sorts of sensitive information tied up with a little bow for the next piece of malware they get exposed to.
One cannot believe this is a simple oversight on Microsoft's end. Glowniggers of all types need more consoomer data, after all.
https://scribe.rip/https:/doublepulsar.com/recall-stealing-everything-youve-ever-typed-or-viewed-on-your-own-windows-pc-is-now-possible-da3e12e9465e
Every few seconds, screenshots are taken. These are automatically OCR’d by Azure AI, running on your device, and written into an SQLite database in the user’s folder.
This database file has a record of everything you’ve ever viewed on your PC in plain text. OCR is a process of looking at an image and extracting the letters.
While this keylogging "feature" can allegedly be opted out of, it is on by default. Your clueless parents, employer, etc will have all sorts of sensitive information tied up with a little bow for the next piece of malware they get exposed to.
One cannot believe this is a simple oversight on Microsoft's end. Glowniggers of all types need more consoomer data, after all.
🖕139👍19🤬13😡10🤣8💊3❤2🎉1🍌1😭1
https://neuters.de/world/us-seeks-information-about-north-korean-scheme-secure-it-work-with-us-firms-2024-05-16/
An American woman and a Ukrainian man set up laptop farms in a few states for North Koreans to remotely connect to and appear as if they are working from the US (in order to be eligible for remote worker US jobs).
https://www.justice.gov/opa/pr/justice-department-announces-arrest-premises-search-and-seizures-multiple-website-domains
https://www.justice.gov/usao-dc/media/1352191/dl
An American woman and a Ukrainian man set up laptop farms in a few states for North Koreans to remotely connect to and appear as if they are working from the US (in order to be eligible for remote worker US jobs).
including multiple well-known Fortune 500 companies, U.S. banks, and other financial service providers
https://www.justice.gov/opa/pr/justice-department-announces-arrest-premises-search-and-seizures-multiple-website-domains
https://www.justice.gov/usao-dc/media/1352191/dl
neuters.de
US arrests American and Ukrainian in North Korea-linked IT infiltration scheme
U.S. prosecutors on Thursday announced the arrests of an American woman and a Ukrainian man they say helped North Korea-linked IT workers posing as Americans to obtain remote-work jobs at hundreds of U.S. companies.
😁79🤯16🤔8👍5🥱3🤣3🍌2😭2🔥1
Forwarded from Kiwi Farms
The FBI subpoenaed Google for my account information in 2022. I have never been notified until now. It stands to reason there was a grand jury subpoena and associated gag order.
This was undoubtedly related to #DropKiwiFarms and, unsurprisingly, it amounted to nothing.
This was undoubtedly related to #DropKiwiFarms and, unsurprisingly, it amounted to nothing.
🤯86🔥12🍌3😇2🥰1🌭1🍾1
Forwarded from Hacker News
Niche Gamer
Photoshop Terms of Service grants Adobe access to user projects for ‘content moderation’
Photoshop's newest terms of service has users agree to allow Adobe access to their active projects for the purposes of "content moderation" and other various reasons. This has caused concern among…
🤡128🖕42🥱4🥰2🍌2❤🔥1👍1🎉1🍾1
Elsevier embeds a hash in the PDF metadata that is unique for each time a PDF is downloaded. Combined with access timestamps, they can uniquely identify the source of any shared PDFs.
https://social.coop/@jonny/107685726645817029
https://social.coop/@jonny/107685726645817029
social.coop
jonny (@jonny@social.coop)
Attached: 1 image
More fun publisher surveillance:
Elsevier embeds a hash in the PDF metadata that is *unique for each time a PDF is downloaded*, this is a diff between metadata from two of the same paper. Combined with access timestamps, they can uniquely…
More fun publisher surveillance:
Elsevier embeds a hash in the PDF metadata that is *unique for each time a PDF is downloaded*, this is a diff between metadata from two of the same paper. Combined with access timestamps, they can uniquely…
🤯72🤬35😘4❤2🔥2🥰1😍1🍌1🖕1
Pajeets have yet to prove they are a net benefit:
https://www.channelnewsasia.com/singapore/former-employee-hack-ncs-delete-virtual-servers-quality-testing-4402141
https://www.channelnewsasia.com/singapore/former-employee-hack-ncs-delete-virtual-servers-quality-testing-4402141
CNA
Fired employee accessed company’s computer 'test system' and deleted servers, causing it to lose S$918,000
The 39-year-old man, who was "confused and upset" after being fired, deleted 180 virtual servers from NCS' computer system.
😁111🌚26👍10🍌5👏2❤🔥1🥰1🍾1🖕1😭1👨💻1
Forwarded from #TBOT: Take Back Our Tech
⚡️Apple & Google WiFi Surveillance Can Track Death & Destruction
@takebackourtech
Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.
Known for their accuracy, big tech maps can locate your phone within a few meters and even indoors.
No, these big tech maps aren’t using GPS - they’re using WPS or Wi-Fi positioning system.
These WPS systems collect millions of WiFi networks and tag them with locations.
Researchers in Maryland discovered through a flaw in Apple’s WPS that they could gather at least 2B (2 Billion) WiFi location points by requesting WiFi networks at random.
That’s enough points to cover the world’s populated areas, notably China was nearly empty except for a few thousand points. Looks like even the CCP can’t opt out of this surveillance.
We did the work for them.
When you use Google or Apple maps, your phone will send the nearby WiFi networks along with their signal strength to the WPS. The WPS will look up these networks in a database that has hundreds of millions of networks along with their location. The calculation is then performed on the server for Google location’s service, and on the phone for Apple location’s service - which sent a list of 400 additional WiFi points back.
And this is how you get a precise location for your phone. Any new WiFi networks you scanned are potentially added to the WPS databases.
Apple & Google have made their users the instrument of their surveillance.
And the things you can do with this surveillance are harrowing. The researchers were able to see how many WiFi access points went offline in Gaza due to the constant bombardment that caused the deaths of 40,000 civilians.
Similarly the researchers were able to see the damage from the August 2023 Maui fires, and the emigration of people from Ukraine to escape forced connoscription.
Apple, Google and any organization they choose to share this WiFi data will have incredible capabilities. Don’t worry though - because these companies care so much about privacy - they give you a way to opt out.
Solutions
Add _nomap to the end of your WiFi SSID (name), Google and Apple promise not to index Wifi networks ending with those names.
Turn off your WiFi network and use ethernet cable.
Read primary source material here.
Get the latest updates on our mailing list: Above Phone
Above Book: Learn about our privacy laptop: https://abovephone.com/book
Above Suite: Use our privacy services: https://abovephone.com/suite
#TBOT #AbovePhone #WiFi #Surveillance #Big_Tech
—
https://takebackourtech.org
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
@takebackourtech
Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.
Known for their accuracy, big tech maps can locate your phone within a few meters and even indoors.
No, these big tech maps aren’t using GPS - they’re using WPS or Wi-Fi positioning system.
These WPS systems collect millions of WiFi networks and tag them with locations.
Researchers in Maryland discovered through a flaw in Apple’s WPS that they could gather at least 2B (2 Billion) WiFi location points by requesting WiFi networks at random.
That’s enough points to cover the world’s populated areas, notably China was nearly empty except for a few thousand points. Looks like even the CCP can’t opt out of this surveillance.
We did the work for them.
When you use Google or Apple maps, your phone will send the nearby WiFi networks along with their signal strength to the WPS. The WPS will look up these networks in a database that has hundreds of millions of networks along with their location. The calculation is then performed on the server for Google location’s service, and on the phone for Apple location’s service - which sent a list of 400 additional WiFi points back.
And this is how you get a precise location for your phone. Any new WiFi networks you scanned are potentially added to the WPS databases.
Apple & Google have made their users the instrument of their surveillance.
And the things you can do with this surveillance are harrowing. The researchers were able to see how many WiFi access points went offline in Gaza due to the constant bombardment that caused the deaths of 40,000 civilians.
Similarly the researchers were able to see the damage from the August 2023 Maui fires, and the emigration of people from Ukraine to escape forced connoscription.
Apple, Google and any organization they choose to share this WiFi data will have incredible capabilities. Don’t worry though - because these companies care so much about privacy - they give you a way to opt out.
Solutions
Add _nomap to the end of your WiFi SSID (name), Google and Apple promise not to index Wifi networks ending with those names.
Turn off your WiFi network and use ethernet cable.
Read primary source material here.
Get the latest updates on our mailing list: Above Phone
Above Book: Learn about our privacy laptop: https://abovephone.com/book
Above Suite: Use our privacy services: https://abovephone.com/suite
#TBOT #AbovePhone #WiFi #Surveillance #Big_Tech
—
https://takebackourtech.org
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
Substack
Google & Apple Steal 2B+ Wifi Access Points
Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.
👍47🤯21⚡6🤡5✍1❤1😁1