Skip Navigation

Posts
17
Comments
30
Joined
2 yr. ago

  • As of the time of posting, there are no remediation measures available to end-users. We have to wait for a patch from services providers/Cloudflare.

    This shouldn't cause too much of a problem, as it only rounds your location down to the nearest Cloudflare data center.

    YOU CAN, HOWEVER, AS ALWAYS, USE TOR OR A TRUSTED VPN PROVIDER TO CONCEAL YOUR LOCATION.

    I will be updating this comment as details emerge.

  • Lawmakers love EU buzzwords

  • After thorough discussion with Oliver's PR team, it has been concluded that he is so beautiful his every appearance is a debut.

    Hope this clears it up!

  • This post isn't meant to promote Monero but to serve as a PSA to people already using it and those whose threat model requires it. While it can be incredibly useful when anonymity is required, it's far from a perfect currency, at least in its current state of adoption.

    I understand your aversion to crypto and even agree with you in some aspects, but some people simply don't have the luxury to use fiat currency.

  • My, oh, my. What a nice feature.

  • I clocked that right after I posted. Knew it was just a matter of time before someone commented this.

  • cats @lemmy.world

    Oliver's debut on Lemmy

  • Do not the cat

  • Rule

    Jump
  • This is a smear campaign! Poob is the best streaming provider, nobody can convince me otherwise.

  • Operations Security (OPSEC) @lemmy.zip

    PSA: RUN YOUR OWN MONERO NODE

  • Hmmm, strange. It's working on my side.

  • Take a look at this article from Wired (which I would consider a reputable source).

  • Buildapc @lemmy.world

    7950X3D AIO or air?

  • Operations Security (OPSEC) @lemmy.zip

    While it can be a hassle, reducing your attack surface is always recommended

  • Honestly, I'll take anything over those outsourced call centers at this point. Half of those representatives barely speak English.

  • Buildapc @lemmy.world

    Liquid cooler for 7950X3D

  • Not the kind of data loss we are concerned with. As long as his data doesn't reach a third party, we are happy.

  • Community Promo @lemmy.ca

    Operations Security (OPSEC) - A space dedicated to discussing, sharing, and learning about operational security practice

  • New Communities @lemmy.world

    Operations Security (OPSEC) - A space dedicated to discussing, sharing, and learning about operational security practice

  • Sadly yes

  • Cast it in concrete for even better security

  • Operations Security (OPSEC) @lemmy.zip

    Even if you boot into the USB, there could still be low-level or hardware keyloggers

  • Operations Security (OPSEC) @lemmy.zip

    Copypastas are now allowed

  • After a bit of thinking, I decided I would NOT reinstate this comment as it is still spam.

    I will allow a shortened version, though.

  • Honestly, the joke flew right over my head. However, it could still use some reformatting to not take up the entire screen.

  • Yes, I already mentioned that in the title. However, it is always bad practice to rely on a third party for your privacy. Especially a third party that profits off of your data.

  • EXIF data is sometimes appended when you take pictures and often includes things like the coordinates it was taken at (exact location), the device it was taken on, and some additional identifiers. This is, of course, bad for privacy, especially when posting online, as someone can accurately track you just from the image.

    I found this article, which seems to describe how to remove it fairly well and does not appear to be sponsored.

  • Operations Security (OPSEC) @lemmy.zip

    While most platforms remove it automatically, you shouldn't rely on it. Don't do a McAfee

  • Operations Security (OPSEC) @lemmy.zip

    Friendly reminder to be careful about what you say (especially online). Loose lips sink ships.

  • Operations Security (OPSEC) @lemmy.zip

    Locking the window won't help if the door is wide open. In OPSEC, always start with the basics, and only after should you move on to the little things.

  • Privacy @lemmy.ml

    Threat Modelling 101

  • Operations Security (OPSEC) @lemmy.zip
    GUIDE Featured

    Threat Modelling 101