Posts by rtp_tips@tube.tchncs.de
 (DIR) Post #AZAthbFYaTSSYH6YK0 by rtp_tips@tube.tchncs.de
       2023-08-28T01:57:34.276Z
       
       0 likes, 3 repeats
       
       Adding Hardware Function On Qubes System-wide - Mirror this For Other Hardware. We Use x220 Touchscreen For Our Example; (Qubes Isolates Hardware Out Of The Box For Security). If You Want A Piece Of USB Hardware To Work Across Virtual Machines, Create A Config File Similar To Shown (Will Upload Config File Soon). There Is Always Risk When Adding USB Hardware Passthrough - Once You Allow It, That Piece Of Hardware Has Control Over The System / Virtual Machine/s.Will share config file examples on blog postShared early with followers of the blog (see below) - videos go public on channel after thumbnail creation (early viewing on blog)QUBES: qubes-os.orgQUBES DOCUMENTAION: https://www.qubes-os.org/docQUBES DOWNLOAD: https://www.qubes-os.org/downloads(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, Share With OthersCreating independent content to share unique tips (some, completely original ideas, not found elsewhere), covering stories to keep you informed on the most pressing personal security / cybersecurity / infosec /  privacy / open source topics💎 SUPPORT INDEPENDENT CONTENT MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive content / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://bmc.link/politictech/commissions (limited USA service)PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance#Qubes #Whonix #Linux
       
 (DIR) Post #AZAwnMyIt0UFruTfAu by rtp_tips@tube.tchncs.de
       2023-08-28T02:32:13.871Z
       
       0 likes, 0 repeats
       
       Putting together the example config file to share. Will add a link once ready.
       
 (DIR) Post #AZlXoIDw8gKOk19lDM by rtp_tips@tube.tchncs.de
       2023-09-14T18:16:34.648Z
       
       0 likes, 3 repeats
       
       Are You Sure Those Emailed Files Are Safe? How About Friends? Employees? Today We Introduce Working With Potentially Malicious Files In Qubes Disposable Virtual Machine; Spear Fishing Is One Of The Most Common Methods Of Company Compromise, And It Will Likely Come For You Too (at some point). Watch To Find Out.QUBES: qubes-os.orgQUBES DOCUMENTAION: https://www.qubes-os.org/docQUBES DOWNLOAD: https://www.qubes-os.org/downloads(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 SUPPORT INDEPENDENT CONTENT (Thank You)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration, tutorials, news, programming, ethical pentesting, human rights, privacy, cybersecurity research, radio, baofeng, and all other forms of nerdism…THANK YOU FOR SUBSCRIBING (do it now)#Qubes #Whonix #Linux
       
 (DIR) Post #Aa4EjsNFwDJpZAQO80 by rtp_tips@tube.tchncs.de
       2023-09-23T18:42:18.382Z
       
       0 likes, 0 repeats
       
       @edanosborne@spectra.video TBH I haven't done too much with it outside love using it for working out, heartrate monitor. My advice is try to keep it charged - as sometimes you run into an issue powering it on "cleanly" if you let it completely die (this may be fixed in newer firmware).Hope you enjoy it! :)
       
 (DIR) Post #Aa4HZDQJdW7lWiSpfc by rtp_tips@tube.tchncs.de
       2023-09-23T19:14:05.937Z
       
       0 likes, 2 repeats
       
       Latest Pegasus “zeroclick” iPhone vulnerability: Blastpass, a major concern, and how to protect yourself. Stay updated on the latest news surrounding this vulnerability and implications. Discover how the UK Online Safety Bill PASSED, aiming to repeal your rights in “name of protecting others”. Watch now to ensure you stay informed and safeguard your iPhone.(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 SUPPORT INDEPENDENT CONTENT (Thank You)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration, tutorials, news, programming, ethical pentesting, human rights, privacy, cybersecurity research, radio, baofeng, and all other forms of nerdism…THANK YOU FOR SUBSCRIBING (do it now)#iphone #pegasus #blastpass
       
 (DIR) Post #Aa8fBJIHKlKGJcg7c0 by rtp_tips@tube.tchncs.de
       2023-09-25T21:57:32.192Z
       
       0 likes, 0 repeats
       
       @hispagatos@kolektiva.media Hmmm black image? A quick scroll through looks like it is playing for me (with pictures / screen recording). There shouldn't be a blacked out screen. I use KDENLIVE to edit / render the video. Then upload to YT (as unlisted while working on thumbnail), makes it easier to mirror directly that way.Though I have been considering doing it in such a way that it can be both podcast / video, it isn't something I tried to do here. Thanks for your feedback. Always nice seeing you! :)
       
 (DIR) Post #AaCvcuYpGC7Jc9RPE0 by rtp_tips@tube.tchncs.de
       2023-09-27T18:32:08.453Z
       
       0 likes, 2 repeats
       
       Organizations Lobby Governments For Legislation Implementing Encryption Threatening Client-side Scanning Tech; Recent Examples Include Laws / Bills Like Chatcontrol, UK’s Online Safety Bill, USA’s EARN IT ACT, KOSA, And More (sadly); Thorn Partners In Creating Profitable Client-side Software Solutions Such As “Safer”, In The Space; Today We Do A Dive Into This Lobbying, The Risks Of Legislation / Tech, To Our Right To Privacy: The Most Basic Human Dignity.Is This The Future Solution For Protecting Kids Online? Or Too Dangerous? SHARE your thoughts in the comments below!Thorn Began As “DNA”, Co-founded By Demi Moore & Ashton Kutcher. Ashton Kutcher Has Been Lobbying Governments Worldwide To Implement Experimental Technology Using AI (artificial intelligence) Cryptographic Hash Scanning; Using CryptographySome Of Video Includes Personal Opinion, Thought, Hypothetic Dangers, To Help Create a Balanced View In Light Of Heavy Lobbying / Advertising Only Covering The Positive SidesJoin me today in this. Leave a comment, share a thought. Maybe Thorn is the right solution? I’d love to hear your input below in the comments!As always, if you feel I get anything wrong, please tell me, and I will correct any issues - information directly reported from public sourcesEMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2pSOURCES:Whitney Webb (Journalist shown in clips): https://unlimitedhangout.com/author/whitney-webb/BalkinInsights (investigation article covered): https://balkaninsight.com/2023/09/25/who-benefits-inside-the-eus-fight-over-scanning-for-child-sex-content/EFF (article screenshot): https://eff.org(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 SUPPORT THIS CHANNEL (Thank You)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration, tutorials, news, programming, ethical pentesting, human rights, privacy, cybersecurity research, radio, baofeng, and all other forms of nerdism…THANK YOU FOR SUBSCRIBING (do it now)#encryption #politics #crypto
       
 (DIR) Post #AaZbycAP9sL0qvI93Y by rtp_tips@tube.tchncs.de
       2023-10-08T21:58:49.070Z
       
       0 likes, 2 repeats
       
       Email Safety Must Watch; Sharing The Most Important Settings You Need Inside Thunderbird For Privacy / Security; No Matter Who Your Email Provider Is, Protect Security / Privacy With Regards To Email; Stay Ahead Of The Curve And Learn Essential Techniques / Settings To Optimize Your Thunderbird Experience. Don’t Compromise On Privacy or Security – Watch This Video Now!We Cover Multiple Options / Layers For Avoiding Direct Connections, Mitigations Against Remote Content Loading, How To Properly Set Up For ANY Email, Including (but not limited to): I2Pmail / Susimail / Onionmail / Gmail ANYTHING that uses Email / Thunderbird / K9 Mail On Android, Can Benefit From Following This Set Up☕ 📬 In Case You Missed It:check out the public I2Pmail Thunderbird set up with PGP: https://bmc.link/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-laterIn this informative video, we dive deep into the world of Thunderbird email safety, bringing you invaluable insights on how to enhance your cybersecurity, protect your privacy, and ensure top-notch security in your email communications. Join us as we explore the must-know tips and tricks for using Thunderbird to its full potential and safeguarding your valuable information. Whether you’re an individual concerned about online threats or a professional seeking to fortify email security, this video is tailored just for you. SHARE your thoughts in the comments below!Join me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)You can also optionally choose to donate to the Peertube server this video is hosted on: https://tchncs.de/donate (not my server but like to help a worthy host)#Thunderbird #linux #email
       
 (DIR) Post #Ab06ckJFKiOzwSYeJM by rtp_tips@tube.tchncs.de
       2023-10-21T16:44:36.619Z
       
       0 likes, 0 repeats
       
       @gabe@peertube.libresolutions.network Awesome glad you found it! 
       
 (DIR) Post #Ab06e9jqH4N168fcLQ by rtp_tips@tube.tchncs.de
       2023-10-21T16:44:48.002Z
       
       0 likes, 0 repeats
       
       @gabe@peertube.libresolutions.network And thank you!
       
 (DIR) Post #Ab0G7HOtlT34qaptZ2 by rtp_tips@tube.tchncs.de
       2023-10-21T18:31:03.545Z
       
       0 likes, 2 repeats
       
       Greatest Threat To Journalism / Democratic Values / Freespeech: An Invisible AI Scanning System That Says: “I’m Always Watching You”; In Comes Chatcontrol, One Of Many Bills Being Lobbied For With The Result Of Destroying The Confidentiality Of End To End Encryption.We Use Encryption All The Time, And Rarely Do We Acknowledge Our Reliance On It. What Kind Of World Will It Be Where Mega Corporations Control AI, Leaving Us With A Lesser Quality, Filtered Internet?Chatcontrol, KOSA, EARN IT ACT, UK’s Online Safety Act: All Major Threats To Human Rights, Civil Liberties, Free Speech, And Journalism.THE POSITIVE SIDE: XMPP and associated plugin protocols should not be affected by legislation targeting major platforms… At least… so far.We are treading dangerously close to George Orwell’s 1984, modernized.☕ 📬 In Case You Missed It:check out the public I2Pmail Thunderbird set up with PGP: https://bmc.link/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-laterSHARE your thoughts in the comments below!Join me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissionsMONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)#chatcontrol #encryption #privacy
       
 (DIR) Post #Ab3PDlhINbwSfPFUVE by rtp_tips@tube.tchncs.de
       2023-10-23T01:18:02.753Z
       
       0 likes, 0 repeats
       
       @Bernard@friends.ravergram.club Hey thank you! There are definitely wayy too many things to choose from (at least from a personal choice perspective). I have messengers I never use as it can be just too much to keep up with sometimes.I stick with Dino, but Gajiim is nice as well (just haven't installed it yet as I believe it was missing something on Dino).Looks like OMEMO keys stored at: ~/.local/share/dino/omemo.db (though I have not attempted to transfer my keys in this way)
       
 (DIR) Post #Ab4TULCQkGY8Nnvi3k by rtp_tips@tube.tchncs.de
       2023-10-23T19:19:46.335Z
       
       0 likes, 2 repeats
       
       Ever Taken Your Phone / Computer / Laptop To A Shop? Wonder If They Are Looking Through Your Files? We Cover This Breaking News Sting Operation Where Monitoring Software Caught Computer Technicians Red Handed Snooping On The Most Intimate Of Files - NOT all technicians snoop.I WANT TO KNOW WHAT YOU THINK: do you take any measures before turning over devices to computer technicians? Have you tried zulu-crypt / veracrypt or similar? Would you like a tutorial on creating safe volumes?SHARE IN THE COMMENTSAND:Was This What Happened To Hunter Biden? Or Could It Have Been A Much Larger Political Operation From The Start?I always felt some videos / photos reportedly found on his computer did not appear to be recorded “naturally”. As if he were using / looking at something on his phone while being recorded — reminds one of Pegasus backdoor.Even moments of private conversation, appeared to be at the level a laptop camera may have been sitting at.I share some theories on the Hunter Biden laptop escapade, and cover the sting operation catching large names like Best Buy (and others), going through devices targeting folders like “bikini” and others.Other times technicians may copy your device - - meaning even if you get that device back, they may still have a copy of all of your files.I share ideas and lessons learned from malware found on brand new computers, and how you can protect your most sensitive financial documents / files from computer technicians who may be of unsavory nature.SHARE your thoughts in the comments below!Join me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissionsMONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
       
 (DIR) Post #Ab508QEGf4lQ6AwfDc by rtp_tips@tube.tchncs.de
       2023-10-24T01:25:34.685Z
       
       0 likes, 0 repeats
       
       @Bernard@friends.ravergram.club Most people definitely wouldn't bother. You may even have to export the keys while running to prevent active changes for compatibility... I wouldn't bother.If anything, creating a new key for the other device and accepting there, would make the most sense. Though running  your own server works. I might try that out sometime. :)
       
 (DIR) Post #AbHW76jKZBc89RxRBo by rtp_tips@tube.tchncs.de
       2023-10-30T02:20:25.549Z
       
       0 likes, 2 repeats
       
       theHarvester Can Gathers Contact / Email Addresses & Server Information On A Given Domain (.com / .org / .net). By Scraping Many Publicly Available Sources (OSINT), Including Search Engines & PGP Key Databases. (Not Only Emails, Subdomains, IP Addresses..)In September We Covered How To Approach Receiving Malicious Emails / Files Safely. To Open (potentially) Malicious Emails Safely, We Used Whonix Disposable Virtual Machines;Today, How An Adversary / Redteam Might Hypothetically Gather Our Email Addresses For Spearphishing AttacksGathering Emails Can Also Serve Useful / Positive Purposes Such As Reaching Out To A Company Where Contact Information Is Not Easy To Find, etc.TOPIC: OSINTOSINT: to use publicly available information / metadata / media to gleam valuable information for research, or collection of other purposeSHARE IN THE COMMENTSJoin me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)#OSINT #theHarvester #cyber
       
 (DIR) Post #AbS1SaMjgerN8PWaZc by rtp_tips@tube.tchncs.de
       2023-11-04T03:58:46.008Z
       
       0 likes, 2 repeats
       
       Time Is Running Out: European Union’s (Digital ID) eIDAS Wants Browsers To Require Gov Approved root Certificates, Under Premise Of Increasing Security — Where It In Fact Adds Yet Another Party, Gaining Ability To MiTM Break HTTPS / TLS Encryption — Revealing Passwords, Browsing, All In PlaintextAnytime you visit an https encrypted website, you are depending on the installed root cert trust to verify the encryption is in fact secure. When there is an issue with a certificate, from expired, to potentially malicious, your browser will try to warn you — UNLESS you have malicious root cert installed prior to visiting.This also relates to a study facebook performed, requiring young people to install their root cert to observe browsing / history of userseIDAS Is The EU Digital ID Reform. Today We Focus On The HTTPS Cert Aspect As Time Is Running Out To Push Back Against This ReformWe’ve seen similar actions by the Russian & Chinese governments… And the history for breaking https / TLS is there… As my previous content covers:Previously Covered Trustcor, And The Controveries Surrounding Their Defense / Law Enforcement Contracts For Breaking HTTPS By Installing root Certificate Trust In Browsers. It Takes Funding & Some Level Of Trust To Become A root certificate Authority… Watch that video here: https://youtu.be/TcYQCzhdEucOne solution mentioned in today’s video is taking advantage of end-to-end encryption. Even with end-to-end encryption, you should be mindful before accepting new keys, and always check the fingerprint.A more simple solution is utilizing Tor / I2P / lokinet hidden services - which bake end-to-end encryption directly in the hidden service protocol, bypassing the need for browser validation of encryption, and handling such directly “end to end”, from Tor / I2p router client, to the destination Tor / I2P client.SHARE IN THE COMMENTSJoin me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, more viewers leads to more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)#https #eIDAS #cyber
       
 (DIR) Post #Abq9BTFbbc4jCy26pU by rtp_tips@tube.tchncs.de
       2023-11-15T19:18:23.815Z
       
       0 likes, 0 repeats
       
       @poise_shallow470@mastodon.social Thank you! I appreciate that. :) About to put another up.
       
 (DIR) Post #AbqAZlWFR4GQlqxwXI by rtp_tips@tube.tchncs.de
       2023-11-15T19:34:00.363Z
       
       0 likes, 2 repeats
       
       Maltego: Installing Excellent OSINT Tool & Finding Information Missed In Search Engines; Investigate Networks, People, Find Documents, Connections: All For 100% FREE, In Today’s Tutorial; Starting Out With How To Install Maltego Community EditionMaltego Community Edition Suite offers countless free transforms: we install each of them today, and begin with an example investigation using a fake nameSome say tools like this shouldn’t be legal: — I say Maltego is a useful tool to examine “the other side of privacy”: OSINT.Use it on yourself to see what others may be finding on you, & much moreIn September We Covered How To Approach Receiving Malicious Emails / Files Safely. To Open (potentially) Malicious Emails Safely, We Used Whonix Disposable Virtual Machines;How An Adversary / Redteam Might Hypothetically Gather Our Information / Addresses For AttackGathering Emails Can Also Serve Useful / Positive Purposes Such As Reaching Out To A Company Where Contact Information Is Not Easy To Find, etc.TOPIC: OSINTOSINT: to use publicly available information / metadata / media to gleam valuable information for research, or collection of other purposeSHARE IN THE COMMENTSJoin me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)#OSINT #Maltego #cyber
       
 (DIR) Post #Abyc2IT8m3W76A1Mw4 by rtp_tips@tube.tchncs.de
       2023-11-19T21:19:20.620Z
       
       0 likes, 0 repeats
       
       @hispagatos@kolektiva.media Ah, will have to take a look at your github. I thought  it would be a neat tool for those less familiar with other tools. I prefer lighter cli tools for most things, personally. ;)
       
 (DIR) Post #AbydQrl7JnsFS6i0a8 by rtp_tips@tube.tchncs.de
       2023-11-19T21:35:02.223Z
       
       0 likes, 2 repeats
       
       Paul Le Roux: Pioneer Of Online Telemedicine, Fit For 007 Bond Movies; Fighting Against Illegal Government Surveillance, He Created “E4M” Encryption For The Masses - Today Known As Veracrypt; Pioneer Of Online Pharmacies Or Super Villain / Creator Of Bitcoin? Watch To Find OutFrom an early age Paul Le Roux had interest in computers and took programming courses. Later he went on to develop E4M, “encryption for the masses” as a way to fight back against illegal surveillance; Giving away his software (E4M) for free, he sought developer jobs on usenet, eventually creating one of the largest online pharamacies… leading up to murder in a dark world of ex special forces mercenariesSHARE IN THE COMMENTSJoin me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)#bitcoin #veracrypt #Cyber