#Cyber Security Concerns
Explore tagged Tumblr posts
techzmag · 2 years ago
Text
Cyber Security Concerns of Free Ai Tools
Cyber Security Concerns, When we are using free or Paid AI tools on the internet, we have to think about the protection of Our data, privacy, and identity. Currently, a lot of AI tools are on the market and we can do so many things with these tools. defiantly these tools are more help increase our productivity and improve our business. It’s no secret that the use of Artificial Intelligence (AI)…
Tumblr media
View On WordPress
0 notes
whoblewboobear · 7 days ago
Text
Oh they denied my request to work from home when I have flare ups btw while we actively have a designer we’ve never met in person working from home who’s work we’re forced to print and finish.
I would still be here most 5 days a week but if I’m flaring and in pain I’ve only ever been out 1-2 days max. I have my own high power pc, I pay for my own design software, I’d still be in to print and finish my own stuff. They fully just aren’t willing to make the accommodations. I’ll never feel bad about calling out again. Fuck this company.
9 notes · View notes
doomed-jester · 1 year ago
Text
Let's be real, if anyone actually cares about online security then they have unique passwords for every site that are just an incomprehensible string of characters. And they wouldn't use a digital keychain, they'd keep that shit written in a physical journal that they shove under their mattress when they're not actively transcribing a password.
4 notes · View notes
maptoimmigrate · 7 months ago
Video
youtube
How to Use Cyber Security for Immigrants | Data Protection and Privacy C...
Learn how immigrants can protect their data and privacy while navigating the complex world of immigration with effective cyber security measures. In this video, we discuss the importance of safeguarding personal information, the risks immigrants face, and practical tips on how to secure your data in the immigration process. Stay informed and empowered to keep your information safe in an ever-evolving digital landscape.
0 notes
zapperrr · 8 months ago
Text
Securing Your Website: Best Practices for Web Developers
As the digital landscape continues to evolve, website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated, it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this article, we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potential threats.
Introduction
In today's interconnected world, websites serve as the digital storefront for businesses, making them vulnerable targets for cyber attacks. From data breaches to malware infections, the consequences of a security breach can be severe, ranging from financial loss to damage to reputation. Therefore, prioritizing website security is essential for maintaining the trust and confidence of users.
Understanding Website Security
Before diving into best practices, it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measures taken to protect websites from cyber threats and unauthorized access. Common threats include malware infections, phishing attacks, SQL injection, cross-site scripting (XSS), and brute force attacks.
Best Practices for Web Developers
Keeping Software Updated
One of the most fundamental steps in website security is keeping all software, including the content management system (CMS), plugins, and server software, updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can be exploited.
Implementing HTTPS
Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users, ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors, as indicated by the padlock icon in the browser's address bar.
Using Strong Authentication Methods
Implementing strong authentication methods, such as multi-factor authentication (MFA) and CAPTCHA, adds an extra layer of security to user accounts. MFA requires users to provide multiple forms of verification, such as a password and a one-time code sent to their mobile device, reducing the risk of unauthorized access.
Securing Against SQL Injection Attacks
SQL injection attacks occur when malicious actors exploit vulnerabilities in web applications to execute arbitrary SQL commands. Web developers can prevent SQL injection attacks by using parameterized queries and input validation to sanitize user inputs effectively.
Protecting Sensitive Data
It's essential to employ encryption techniques to protect sensitive data, such as passwords, credit card information, and personal details, stored on the website's servers. Encrypting data at rest and in transit mitigates the risk of data breaches and unauthorized access.
Regular Security Audits
Conducting regular security audits helps identify vulnerabilities and weaknesses in the website's infrastructure and codebase. Penetration testing, vulnerability scanning, and code reviews enable web developers to proactively address security issues before they are exploited by attackers.
Choosing a Secure Hosting Provider
Selecting a reputable and secure hosting provider is critical for ensuring the overall security of your website. When evaluating hosting providers, consider factors such as security features, reliability, scalability, and customer support.
Evaluating Security Features
Choose a hosting provider that offers robust security features, such as firewalls, intrusion detection systems (IDS), malware scanning, and DDoS protection. These features help protect your website from various cyber threats and ensure continuous uptime.
Ensuring Regular Backups
Regularly backing up your website's data is essential for mitigating the impact of security incidents, such as data breaches or website compromises. Choose a hosting provider that offers automated backup solutions and store backups securely offsite.
Customer Support and Response to Security Incidents
Opt for a hosting provider that provides responsive customer support and has established protocols for handling security incidents. In the event of a security breach or downtime, prompt assistance from the hosting provider can minimize the impact on your website and business operations.
Implementing Firewall Protection
Firewalls act as a barrier between your website and external threats, filtering incoming and outgoing network traffic based on predefined security rules. There are several types of firewalls, including network firewalls, web application firewalls (WAF), and host-based firewalls.
Configuring and Maintaining Firewalls
Properly configuring and maintaining firewalls is crucial for effective security. Define firewall rules based on the principle of least privilege, regularly update firewall configurations to reflect changes in the website's infrastructure, and monitor firewall logs for suspicious activity.
Educating Users about Security
In addition to implementing technical measures, educating users about security best practices is essential for enhancing overall website security. Provide users with resources, such as security guidelines, tips for creating strong passwords, and information about common phishing scams.
Importance of User Awareness
Users play a significant role in maintaining website security, as they are often the targets of social engineering attacks. By raising awareness about potential threats and providing guidance on how to recognize and respond to them, web developers can empower users to stay vigilant online.
Providing Training and Resources
Offer training sessions and educational materials to help users understand the importance of security and how to protect themselves while using the website. Regularly communicate updates and reminders about security practices to reinforce good habits.
Monitoring and Responding to Security Incidents
Despite taking preventive measures, security incidents may still occur. Establishing robust monitoring systems and incident response protocols enables web developers to detect and respond to security threats in a timely manner.
Setting Up Monitoring Tools
Utilize monitoring tools, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, and website monitoring services, to detect abnormal behavior and potential security breaches. Configure alerts to notify you of suspicious activity promptly.
Establishing Incident Response Protocols
Develop comprehensive incident response plans that outline roles, responsibilities, and procedures for responding to security incidents. Establish clear communication channels and escalation paths to coordinate responses effectively and minimize the impact of security breaches.
Securing your website requires a proactive approach that involves implementing a combination of technical measures, choosing a secure hosting provider, educating users about security best practices, and establishing robust monitoring and incident response protocols. By following these best practices, web developers can mitigate the risk of security breaches and safeguard their websites and the sensitive data they handle.
#website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated#it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this#we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potenti#Introduction#In today's interconnected world#websites serve as the digital storefront for businesses#making them vulnerable targets for cyber attacks. From data breaches to malware infections#the consequences of a security breach can be severe#ranging from financial loss to damage to reputation. Therefore#prioritizing website security is essential for maintaining the trust and confidence of users.#Understanding Website Security#Before diving into best practices#it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measur#phishing attacks#SQL injection#cross-site scripting (XSS)#and brute force attacks.#Best Practices for Web Developers#Keeping Software Updated#One of the most fundamental steps in website security is keeping all software#including the content management system (CMS)#plugins#and server software#updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can#Implementing HTTPS#Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users#ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors#as indicated by the padlock icon in the browser's address bar.#Using Strong Authentication Methods#Implementing strong authentication methods
0 notes
myinstafollow · 1 year ago
Text
Revealed: Can You Really See Who Viewed Your WhatsApp Profile Photo?
Tumblr media
Hey there, WhatsApp enthusiasts! 🌟 Have you ever found yourself wondering whether it's possible to track who's been sneaking a peek at your WhatsApp profile picture? 🤔 We're here to tackle this burning question and shed some light on the truth behind this popular WhatsApp myth.
First and foremost, let's address the elephant in the room: Can you really see who viewed your WhatsApp profile photo? It's time to uncover the reality and put an end to the speculation once and for all. While many third-party apps claim to offer this functionality, it's crucial to understand the risks associated with such services. Our comprehensive analysis will delve into the technicalities, highlighting the potential privacy implications and security concerns linked to these deceptive services.
We've meticulously tested various methods, including the notorious 'Who Viewed My WhatsApp Profile' apps, to provide you with an insightful overview of their functionality and potential hazards. Our findings emphasize the significance of safeguarding your privacy and data in today's digital landscape.
Join us on this illuminating journey as we decipher the truth behind the 'Who Viewed My WhatsApp Profile' phenomenon and provide you with practical tips on maintaining a secure and private WhatsApp experience. 💡
To learn more about the reality of this intriguing topic, head over to our comprehensive blog post here: Who Looked at My WhatsApp Profile Photo.
0 notes
digitalcreationsllc · 1 year ago
Text
The top 10 APAC data breaches
Vulnerability of data and all-round cyber security in the Asia-Pacific (APAC) region is a growing concern. According to Raymond Teo, cyber leader at PwC South East Asia Consulting, data breaches are a pervasive menace. “As cyber threats continue to increase in frequency and sophistication, a holistic approach to cyber security has become a top priority for C-suites and boards,” he says.…
View On WordPress
0 notes
Text
To clear up a point: DDoS attacks come strictly from outside the servers. Based solely on what we know has happened, there is no reason to believe there's been any data breach. There is no point in a DDoS attack where the people doing it are accessing private data. And if the person/group had wanted data and could get data, they wouldn't have started with a DDoS attack, which is basically announcing that that site is under attack.
A little explainer on what happened with AO3:
Basically, someone or a group of someones decided to levy a DDoS attack. What this means is that they created a botnet (network of devices controlled by a bot, usually run in the background of an unsecured IoT device or computer being used for other things. Think data mining) to flood the servers with false requests for service.
What this does mean: AO3 might go back down, if the attack is relaunched. These types of attacks are usually used against businesses where traffic = money, thereby costing a company money. This isn't really an issue here since AO3 is entirely donation and volunteer based.
What this doesn't mean: stories, bookmarks, etc will be deleted and your anonymously published works will be linked back to you. No vulnerable points are breached during this process, so unless this group ends up doing something else, no data breaches will happen. You are safe, your content is safe.
2K notes · View notes
nextcinemastudios · 2 years ago
Text
TikTok CEO Faces Congressional Investigation Over Security Concerns
TikTok has been a topic of heated discussion and debate in Washington, D.C. for some time now, with many politicians expressing concern over the security threat posed by the popular social media platform. At the center of this conversation is the CEO of TikTok, Shou Zi Chew, who recently appeared before the House Energy and Commerce Committee to address these concerns. One of the primary…
Tumblr media
View On WordPress
0 notes
codelivly · 2 years ago
Text
What Can Someone Do With Your IP Address?
What Can Someone Do With Your IP Address?
Your IP address is a unique identifier that allows you to be connected to the internet. It’s like your home address, but for your computer or other devices. Just as your home address allows someone to send you a letter, your IP address allows others to connect to you online. But what exactly can someone do with your IP address? In this blog post, we’ll explore some of the ways that someone might…
Tumblr media
View On WordPress
0 notes
i9hrtszn · 13 days ago
Text
Tumblr media Tumblr media Tumblr media
     🤖❛  sonic whiplash : the event  ✲
   ⿸  🛸˚  an   @i9hrtszn   special   event  ⋌   
Tumblr media Tumblr media
hi y'all! i just want to say thank you all for 300 followers. to be honest, this brings me so much joy as i used to think that i was not good in the field, with my posts achieving a low engagement rate. but over the past two years, i made it to such a big and momentous milestone, and i really am grateful to those of you who like, reblog, and comment on my moodboards; i really appreciate it. therefore, to celebrate this wonderful occasion, i decided to host an event that's a bit different (as far as i know) from other events that took place here in tumblr. i also had so much fun formulating the concept behind this event, and i hope that you will also show some love and support to it. i hope that blogs, regardless of experience and following, will participate and have fun. please don't let this flop; anyways thanks for 300 and enjoy!
Tumblr media Tumblr media Tumblr media
ㅤㅤㅤ⋋ㅤㅤㅤ💾❛ㅤㅤㅤ⿴ㅤㅤㅤ○ㅤㅤㅤabout
in 2050, a decade after the great armageddon nearly wiped out all life, the world has become a wasteland. only a few high-tech colonies survive, including the last stronghold in seoul. here, people live in peace within their advanced, secure cities, shielded from whatever dangers lurk in the outside world. but this peace doesn’t mean they’re safe to ignore what’s beyond their walls.
the a.e.s.p.a. (advanced enforcement and security protection agency) is a team of elite operatives sworn to protect the colony. normally, they handle internal threats, but recently, they received a strange signal from outside the colony. this signal was unlike anything they’d seen—a unique frequency that could mean other survivors were out there. weeks later, another mysterious event followed, dubbed “sonic whiplash.” a massive shockwave, almost like an echo of a voice or a distant call, rattled the colony walls. this wasn’t just noise; scientists suspected it was energy, possibly even linked to other dimensions or sources of life outside.
to respond, a.e.s.p.a. needed to build specialized machines to handle whatever strange conditions they might face outside the colony. however, necessary files required to plot out their machine's structure and purpose were wiped out during the armageddon, hence using moodboards left as fragments of the original files to complete the machine's construction further. in a creative and practical twist, a.e.s.p.a uses moodboards—visual boards that combine art and data—to design their rescue machinery. these moodboards help them craft everything from rescue drones to sound-absorbing suits, all adapted to fit the mysterious energy of sonic whiplash. each moodboard captures the “feel” of the mission, ensuring their tech can handle the unknowns in a potentially hostile environment.
by bringing these ideas to life, a.e.s.p.a. is preparing to head out of the colony not just to investigate the signals, but to possibly save any survivors they find. with these advanced machines, they’re ready to confront the mysteries of the world outside and discover the truth behind the haunting frequency, hoping to bridge their safe world with whatever’s left out there.
Tumblr media
ㅤㅤㅤ⋋ㅤㅤㅤ🎧❛ㅤㅤㅤ⿴ㅤㅤㅤ○ㅤㅤㅤrules
•ㅤyour moodboard must be centered on any of aespa's songs on the "whiplash" album. conceptual, futuristic, and cyber themes are mostly preferred, but any theme is gratefully accepted. •ㅤyour moodboard's content must be, at least, 90% yours (although using free-to-use resources by other users is fine). •ㅤcopying and stealing other participants' entries is strictly forbidden. incorporating 3 pictures into your moodboards that are also present in other's moodboards will be considered copying and will automatically be disqualified from the event. •ㅤyou can submit up to two entries if you wish to do so. •ㅤuse the tag "⋋ 📷❛ ⿴ ✶ sonic whiplash: the event." and tag me in your post or mention me in the comments or your entry won't count. •ㅤif you have any concerns or wish to seek an extension, please do not hesitate to send a dm to me.
Tumblr media
ㅤㅤ⋋ㅤㅤㅤ🛰️❛ㅤㅤㅤ⿴ㅤㅤㅤ○ㅤㅤ��how to join
•ㅤcomment "joining" on this event + state what is your favorite song from aespa's whiplash album. •ㅤlike + reblog this post and tag 4 or more mutuals who might join the event. •ㅤdeadline is on december 2. a one-week extension will be given to those who need it.
Tumblr media
ㅤㅤㅤ⋋ㅤㅤㅤ📡❛ㅤㅤㅤ⿴ㅤㅤㅤ○ㅤㅤㅤprizes
—ㅤ①ㅤ:ㅤ 100 reblogs on 3 moodboards of your choice, 3 custom moodboards, 3 custom fgs + layouts.
—ㅤ②ㅤ:ㅤ80 reblogs on 2 moodboard of your choice, 1 custom moodboards, 2 custom fgs + layouts.
—ㅤ③ㅤ:ㅤ60 reblogs on 1 moodboards of your choice, 1 custom moodboards, 1 custom fg + layout.
—ㅤrunners-up/notable entriesㅤ:ㅤ50 reblogs on 1 moodboard of your choice, 1 custom fg/layout (only one of your choice).
ㅤㅤ•ㅤall participants will receive 25 reblogs upon entry. ㅤㅤ•ㅤall reblogs will be done on @i4luvszn.
Tumblr media
ㅤㅤ ㅤ ⋋ㅤㅤㅤ💾❛ㅤㅤㅤ⿴ㅤㅤㅤ○ㅤㅤㅤtags
@taroism @n-americano @fluiora @aesverse @kyuwebs
@awwriri @umiena @hyelita @hyunlita @m00nbap
@beompercar @studiogyu @nikist-4-n @neapolitism @reiminders
@purincidio @kgirls @purinkiss @yeoniis @rthym
@4uarterlife @keketopia @seulzitos @aericita @florichae
@soulari @hourlyhoon @flaireur @f-loqweres @chenjiyaoi
@tzulipss @y-vna @y-unrei @y-urios @haerinism
@jimzittos @aeraras @aestradairio @bambicito @fairytopea
@hyetart @notaorbital @poemale @vg-k @i-kyujin
@jaexiyu @sxgarhan @t-aes @wonjuii @bitchey
+++ other users who may be interested in joining!
Tumblr media
165 notes · View notes
ayeforscotland · 9 months ago
Note
Sora looks awesome from OpenAI and then also Chat with RTX (Nvidia) will have a personal local LLM on your own machine but new windows updates will have co-pilot too. The future of AI is going to be awesome. As someone in the data field, you have to keep moving with it or be left without. IT is definitely an exciting time.
As someone else in the data field, my full background is in data and data flow, AI is the latest buzzword that a small group of people in Silicon Valley have pushed to work people up into a frenzy.
The people cheering on AI are the same people who said NFTs were going to radically change the world of work.
I think there’s positive uses for AI, particularly in pattern recognition, like detecting cancer.
However, Sora looks like shit. It’s producing videos of three-legged cats, and it’s using stolen work to do it. And sure, it’ll get better, but without regulation all it will do is poison the well of human knowledge as certain groups begin to create things that aren’t real. We move into a world where evidence can be fabricated.
Why are generative AI fans targeting artists who voice their concerns? Every day I see some AI techbro tweeting an artist and saying they’ve just scrolled through their art and fed it to an algorithm. It is scummy behaviour.
As a fellow ‘data field’ person, you’ll know that AI is also only as useful as what we feed it. Most organisations don’t know where their data actually is, they’re desperately trying to backpedal their huge push to the cloud and host things on premise. The majority of digital transformation projects fail, more fines are being handed out for failing compliance than ever, and companies can’t possibly claim to be cyber secure when they don’t know where they’re holding their data.
AI won’t fix any of this. It needs human engineering and standardisation to fix, non-technical and technical teams need to understand the connectivity of every process and piece of technology and maybe then some form of AI can be used to optimise processes.
But you can’t just introduce AI and think it fixes large-scale issues. It will amplify them if you continue to feed it garbage.
244 notes · View notes
witchofthesouls · 3 months ago
Note
Does Ratchet preen the winged members of the trio?
Or even in the birb Jack and Optimus. Does dadimus do wing care.
Ratchet needs specialized tools, but he knows and enjoys it, even if Miko and Raf squirm and flop in his lap. Jack is calmer and willing to sit still for long periods of time.
Miko and Jack attempt to do the same social activity on others. Jack has a far better grasp since he accounts for the sensitivity. Miko, on the other hand, digs in unnecessarily hard by mashing in her talons to scrape out. The little pink bird is only allowed to 'preen' the seams of Ratchet, Bulkhead, and Optimus now.
Funnily enough, Optimus knows how to properly preen. Not from his team or Megatronus' compatriots, but from a time before he was even Orion Pax. Life outside the city-states is brutal, but not a desolate one.
As a sparkling and mechling, he drifted into camps and resting sites. He learned how to preen a variety of wing spans, sensory panels, and extrasensory crests. There were a few mecha that expressed interest in taking him back because their tribes and clans would have welcomed new blood with clever little digits and swift pedes, but he always managed to get away.
As Orion Pax under Alpha Trion, he utilized his preening skills to barter with other sympathetic winged-colleagues in the Archives because it's a necessary maintenance that's needs another pair of hands to be properly done. Secretly, of course.
They wouldn't outright help Orion Pax as he's essentially blacklisted and socially shunned and ostracized by others -carefully done away from Alpha Trion's purview -as he's an outsider to their way of life with the caste system. But they could carefully give him certain information (i.e., where security is nonexistent, schedules for incoming data, supplies, or fundraisers, and places to get untampered goods) that can't be traced back to them. After all, Orion Pax is a clever mech, isn't he? There's a reason why he caught Alpha Trion's patronage. And besides, it's not too hard to string together those plans as information is either public knowledge or can be reasonably deduced, right?
It's funny because in the "magic and dimensional hopping au" where he and cyber!babybirb!Jack get thrown into the G1 verse TFP!Dadimus gets his own gaggle of wings as the Aerialbots begin to gravitate to the mech because he's a grounder that knows aspects of Seekerkin and flight-frame behavioral cues. Yes, you have talons. Yes, you use them to clean the finer seams of your flight systems.
Poor Dadimus is wondering if he should raise concerns over the newest batch of adults being very lost at their own personal care and how much he should interfere...
94 notes · View notes
liberalsarecool · 2 years ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media
Walter Masterson is a prolific content creator. He brings up good points regarding TikTok.
Privacy issues may be part of the debate in Congress, but Republicans claiming they are concerned with privacy as they overturn Roe v Wade, attack gay/trans/drag, attack birth control, attack marriage equality, and show no concern for any cyber crimes/attacks/hacks committed by Russia exposes their true beliefs. [Not to mention GOP indifference towards US government surveillance that trawls all your devices.]
Facebook and Twitter were great tools for GOP and Russian disinformation. Look at 2016 election. Look at Jan 6. TikTok, not so much.
Also, if Republicans are so concerned with security, why did they vote against every legislative measure to secure our elections?
466 notes · View notes
mariacallous · 10 days ago
Text
Joint ODNI, FBI, and CISA Statement
FOR IMMEDIATE RELEASE ODNI News Release No. 29-24 November 4, 2024
WASHINGTON, D.C. - Today, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) released the following statement:
“Since our statement on Friday, the IC has been observing foreign adversaries, particularly Russia, conducting additional influence operations intended to undermine public confidence in the integrity of U.S. elections and stoke divisions among Americans. The IC expects these activities will intensify through election day and in the coming weeks, and that foreign influence narratives will focus on swing states.
Russia is the most active threat. Influence actors linked to Russia in particular are manufacturing videos and creating fake articles to undermine the legitimacy of the election, instill fear in voters regarding the election process, and suggest Americans are using violence against each other due to political preferences, judging from information available to the IC. These efforts risk inciting violence, including against election officials. We anticipate Russian actors will release additional manufactured content with these themes through election day and in the days and weeks after polls close.
The IC assesses that Russian influence actors recently posted and amplified an article falsely claiming that U.S. officials across swing states plan to orchestrate election fraud using a range of tactics, such as ballot stuffing and cyber attacks.
Russian influence actors also manufactured and amplified a recent video that falsely depicted an interview with an individual claiming election fraud in Arizona, which involved creating fake overseas ballots and changing voter rolls to favor Vice President Kamala Harris. The Arizona Secretary of State has already refuted the video’s claim as false.
Iran also remains a significant foreign influence threat to U.S. elections. As noted in a prior update, we have assessed that Iran has conducted malicious cyber activities to compromise former President Trump’s campaign. Iranian influence actors may also seek to create fake media content intended to suppress voting or stoke violence, as they have done in past election cycles. We previously reported that Iran also remains determined to seek revenge against select former US officials whom it views as culpable for the death of Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF) Commander Soleimani in January 2020. It has repeatedly highlighted former President Donald Trump among its priority targets for retribution.
In light of continued influence efforts by foreign adversaries and the increasing volume of inauthentic content online, CISA recommends voters seek out information from trusted, official sources, in particular, state and local election officials.
The FBI and CISA encourage campaigns and election infrastructure stakeholders to report information concerning suspicious or criminal activity to their local Election Crime Coordinators via FBI field office (www.fbi.gov/fieldoffices), by calling 1-800-CALL-FBI (1-800-225-5324), or online at ic3.gov. Cyber incidents impacting election infrastructure can also be reported to CISA by calling 1-844-Say-CISA (1-844-729-2472), emailing [email protected], or reporting online at cisa.gov/report. Election infrastructure stakeholders and the public can find additional resources about how to protect against cyber and physical threats at CISA’s #PROTECT2024 (https://www.cisa.gov/protect2024).”
23 notes · View notes
jointhefediverse · 18 days ago
Text
💫 Join the Fediverse! 💫
Greetings, fellow bloggers! We welcome you to join us in discovering, honoring, and promoting the potential future of social networking—commonly referred to as the "Fediverse."
The Fediverse, or Federation Universe, refers to a collective of online platforms that utilize the web protocol known as ActivityPub, which has set a standard of excellence in regards to both protecting and respecting users' online privacies.
There's a good chance in the past few years that you've caught wind of the fedi family's critically acclaimed Mastodon; however, there are many other unique platforms worth your consideration...
✨ Where To Begin?
Conveniently enough, from the minds of brilliant independent developers, there already likely exists a Fediverse equivalent to your favorite socials. Whether it's an opinion from the critics, or from the community alike—the following popular websites are commonly associated with one another:
Friendica 🐰 = Facebook Mastodon 🐘 = Twitter Pixelfed 🐼 = Instagram PeerTube 🐙 = YouTube Lemmy 🐭 = Reddit
It's worth mentioning, too, a few other sites and forks thereof that are worthy counterparts, which be: Pleroma 🦊 & Misskey 🐱, microblogs also similar to Twitter/Mastodon. Funkwhale 🐋 is a self-hosting audio streamer, which pays homage to the once-popular GrooveShark. For power users, Hubzilla 🐨 makes a great choice (alongside Friendica) when choosing macroblogging alternatives.
✨ To Be Clear...
To address the technicalities: aside from the "definitive" Fediverse clients, we will also be incorporating any platforms that utilize ActivityPub-adjacent protocols as well. These include, but are not limited to: diaspora*; AT Protocol (Bluesky 🦋); Nostr; OStatus; Matrix; Zot; etc. We will NOT be incorporating any decentralized sites that are either questionably or proven to be unethical. (AKA: Gab has been exiled.)
✨ Why Your Privacy Matters
You may ask yourself, as we once did, "Why does protecting my online privacy truly matter?" While it may seem innocent enough on the surface, would it change your mind that it's been officially shared by former corporate media employees that data is more valuable than money to these companies? Outside of the ethical concerns surrounding these concepts, there are many other reasons why protecting your data is critical, be it: security breaches which jeopardize your financial info and risk identity theft; continuing to feed algorithms which use psychological manipulation in attempts to sell you products; the risk of spyware hacking your webcams and microphones when you least expect it; amongst countless other possibilities that can and do happen to individuals on a constant basis. We wish it could all just be written off as a conspiracy... but, with a little research, you'll swiftly realize the validity of these claims are not to be ignored any longer. The solution? Taking the decentralized route.
✨ Our Mission For This Blog
Our mission for establishing this blog includes 3 core elements:
To serve as a hub which anybody can access in order to assist themselves in either: becoming a part of the Fediverse, gaining the resources/knowledge to convince others to do the very same, and providing updates on anything Fedi-related.
We are determined to do anything within our power to prevent what the future of the Internet could become if active social users continue tossing away their data, all while technologies are advancing at faster rates with each passing year. Basically we'd prefer not to live in a cyber-Dystopia at all costs.
Tumblr (Automattic) has expressed interest in switching their servers over to ActivityPub after Musk's acquisition of then-Twitter, and are officially in the transitional process of making this happen for all of us. We're hoping our collective efforts may at some point be recognized by @staff, which in turn will encourage their efforts and stand by their decision.
With that being stated, we hope you decide to follow us here, and decide to make the shift—as it is merely the beginning. We encourage you to send us any questions you may have, any personal suggestions, or corrections on any misinformation you may come across.
From the Tender Hearts of, ✨💞 @disease & @faggotfungus 💞✨
22 notes · View notes