Tumgik
#digital security USA
makwanjaffca · 24 days
Text
Hire Makwan Jaff the Best Cybersecurity Expert Online USA
Tumblr media
Renowned Makwan Jaff best cybersecurity expert, has been putting in a lot of effort to stay up to date with new developments in technology and behavioral aspects. Throughout his long career, he has secured digital assets for various clients. His knowledge encompasses ethical hacking, encryption technologies, and network security. He establishes the bar for cyber security experts in the USA and abroad with his robust online presence.
0 notes
echeckplan · 11 months
Text
6 notes · View notes
9to9imall · 3 months
Text
youtube
0 notes
stormellc · 6 months
Text
StorMe App | Digital Workshop Demystified: A Quick Guide
We are diving into the exciting world of on-site digital workshops! 🌟
Join us as we guide you through the entire process, from setup to implementation, showcasing the power of collaboration and innovation in a physical workspace.
Whether you're a seasoned pro or new to the concept, this video is designed to inspire and inform in just one minute!
Don't forget to hit the like button and share this video with your friends who love all things digital and creative!
Let's dive in and explore the endless possibilities of on-site digital workshops together.
0 notes
gmatechnologi · 10 months
Text
Mobile App Security Best Practices: Protecting User Data
Tumblr media
Welcome to our blog post on mobile app security best practices! In a world where smartphones have become an extension of ourselves, safeguarding user data has never been more critical. As technology advances at breakneck speed, so does the sophistication of cybercriminals seeking to exploit vulnerabilities in mobile apps. But fear not! In this article, we will take you through some foolproof strategies and essential steps to fortify your app’s defenses and ensure the utmost protection for your users’ valuable information. So, grab your virtual hard hat and let’s dive into the captivating realm of mobile app security together!
Introduction To Mobile App Security
Mobile apps have become an integral part of our daily lives, providing us with convenience and access to a wide range of services. From ordering food and booking rides to managing finances and social interactions, there is an app for almost everything. However, with the increasing usage of mobile apps comes the need for strong security measures to protect user data.
In today’s digital age, data privacy has become a major concern for consumers, and rightfully so. With cyber attacks becoming more sophisticated and frequent, it’s essential for developers to prioritize mobile app security in order to gain the trust of their users. In this section, we will discuss the basics of mobile app security and why it’s crucial for both developers and users.
Why Is Mobile App Security Important?
Mobile app security has become increasingly important in recent years as the use of mobile devices continues to rise. With more and more personal information being stored on our phones, it is crucial that we take necessary measures to protect our data from potential threats.
One of the main reasons why mobile app security is so important is because of the sensitive information that can be accessed through our mobile devices. Most people use their phones for a variety of purposes including online banking, social media, email, and even storing personal documents. This means that if a hacker gains access to your phone or any of these apps, they could potentially have access to all your personal information.
Another reason why mobile app security should be a top priority is due to the increasing number of cyber attacks targeting mobile devices. According to a report by McAfee in 2020, there was an 118% increase in new malware variants specifically targeting Android devices compared to the previous year. This highlights the need for strong security measures in place to protect against these threats.
Furthermore, many mobile apps also collect user data such as location information, contact lists, and browsing history. This data can be valuable for companies but it also puts users at risk if it falls into the wrong hands. In fact, one study found that over half of popular Android apps were sending user data to third-party websites without users’ knowledge or consent.
Common Types Of Mobile App Attacks
Mobile app attacks have become increasingly common in today’s digital landscape, posing a serious threat to user data security. As more and more people rely on mobile apps for daily tasks such as banking, shopping, and social media, it has become essential for businesses and individuals to understand the different types of mobile app attacks in order to protect their sensitive information.
1. Malware Attacks Malware is a malicious software that is designed to gain unauthorized access or cause harm to a device. In the context of mobile apps, malware can be disguised as a legitimate application and once downloaded, it can steal sensitive information such as login credentials, credit card details or even take control of the device. Common forms of malware include Trojan horses, viruses, adware and spyware.
2. Man-in-the-Middle Attacks Man-in-the-middle (MITM) attacks occur when hackers intercept communication between two parties without their knowledge. In the case of mobile apps, this could happen through public Wi-Fi networks or fake websites that mimic legitimate ones. Through these tactics, hackers can steal personal information such as passwords and credit card details.
3. Injection Attacks Injection attacks involve inserting malicious code into an app’s codebase with the intent of exploiting vulnerabilities in the app’s design or functionality. These attacks are often used to gain access to databases containing sensitive information or to manipulate data within the app itself.
Tumblr media
Best Practices For Protecting User Data
In today’s digital age, protecting user data is of utmost importance. With the increasing use of mobile apps, it has become crucial for developers to implement strong security measures to safeguard user data. Here are some best practices that can help in protecting user data on mobile apps.
1. Implement Strong Authentication Measures: The first line of defense against potential threats is strong authentication measures. Users should be required to set up a secure password or PIN before accessing the app. Additionally, biometric authentication, such as fingerprint or facial recognition, can also be implemented for an added layer of security.
2. Use Encryption: Encrypting sensitive information such as login credentials, credit card details, and personal information is essential in ensuring that even if the data is intercepted by hackers, it cannot be read or used. Developers should use industry-standard encryption algorithms like AES (Advanced Encryption Standard) to protect user data.
3. Regularly Update and Patch: Hackers are constantly finding new vulnerabilities and exploits in mobile apps to gain access to user data. Therefore, it is crucial for developers to regularly update and patch their apps with the latest security updates and fixes. This will not only strengthen the app’s security but also provide a better experience for users.
4. Limit Data Collection: One way to reduce the risk of exposing sensitive user data is by limiting the amount of information collected by the app. Developers should only collect necessary information and refrain from unnecessary permissions that may put user privacy at risk.
– Encryption Techniques
In today’s digital age, mobile apps have become an integral part of our daily lives. From banking to social media, we rely on various mobile apps for convenience and efficiency. However, with the increasing use of mobile apps, there is also a growing concern about the security of user data. Data breaches and cyber attacks have become more common, making it crucial for app developers to prioritize security measures in their applications.
One important aspect of mobile app security is encryption techniques. Encryption is the process of converting plain text into a code or cipher that can only be understood by authorized parties with access to a decryption key. It helps in protecting sensitive information from being accessed or altered by unauthorized users.
There are various encryption techniques used in mobile app development to ensure the security of user data. Let’s take a closer look at some of these techniques:
1) Transport Layer Security (TLS): TLS is one of the most commonly used encryption protocols for securing internet communication between servers and clients. It ensures secure communication over networks such as Wi-Fi or cellular connections by encrypting all data transmitted between devices. This prevents hackers from intercepting sensitive information such as login credentials or financial details.
2) Advanced Encryption Standard (AES): AES is a symmetric-key algorithm widely used in modern cryptography. It uses a single key for both encrypting and decrypting data, making it faster than other asymmetric encryption methods such as RSA. AES has been adopted by many organizations as it provides strong protection against cyber attacks.
– Secure User Authentication Methods
Secure user authentication methods are an essential aspect of mobile app security and play a crucial role in protecting sensitive user data. With the increasing usage of mobile apps, it has become more important than ever to implement strong and reliable authentication methods for users. In this section, we will discuss some best practices for secure user authentication methods that can help safeguard your app from potential security threats.
1. Implement Two-Factor Authentication (2FA) Two-factor authentication is a widely used method of verifying a user’s identity by requiring them to provide two different forms of identification before granting access to the app. This could include something the user knows (such as a password or PIN) and something they have (such as a code sent to their registered email or phone number). By implementing 2FA, even if someone gains access to the user’s login credentials, they won’t be able to log in without providing the second form of identification.
2. Use Biometric Authentication Biometric authentication uses physical characteristics such as fingerprints, facial recognition, or iris scanning to authenticate users. This method is becoming increasingly popular due to its convenience and high level of security. As biometric data is unique for each individual, it eliminates the risk of stolen passwords or codes being used by unauthorized persons.
3. Limit Login Attempts Another effective way to secure user authentication is by limiting the number of login attempts within a certain time frame. This prevents brute force attacks where hackers try multiple combinations of usernames and passwords until they gain access.
– Regular Software Updates
Regular software updates are a crucial aspect of ensuring the security of any mobile app. By regularly updating your app’s software, you can mitigate potential vulnerabilities and protect user data from cyber threats.
One of the main reasons why regular software updates are essential for mobile app security is that they often include bug fixes and patches for known security vulnerabilities. Developers are constantly working to improve their apps’ security by identifying and addressing any weaknesses or flaws in the code. These updates not only improve the overall performance of the app but also enhance its resilience against potential cyber attacks.
Another significant benefit of regular software updates is that they keep your app up-to-date with the latest security protocols and standards. As technology evolves, so do cybersecurity threats. By keeping your app updated, you can ensure that it meets the current industry standards for protecting user data. This is especially crucial for apps that handle sensitive information such as personal details, financial transactions, or health records.
Moreover, regular software updates also provide an opportunity to introduce new security features into your app. These may include multi-factor authentication, biometric authentication, encryption algorithms, or other advanced techniques to safeguard user data. By incorporating these features into your app through software updates, you can create multiple layers of protection against potential breaches.
– Third-Party Security Audits
In today’s digital landscape, the security of user data is of utmost importance. With the increasing number of mobile apps being developed and used, it is crucial for app developers to prioritize security in order to protect their users’ sensitive information.
One important aspect of ensuring mobile app security is conducting third-party security audits. These audits involve hiring an external company or individual to assess the app’s security measures and identify any vulnerabilities or weaknesses that may put user data at risk.
The first step in a third-party security audit is determining the scope of the assessment. This includes identifying the specific areas or functions within the app that will be tested for potential vulnerabilities. It is important to have a clear understanding of what aspects of your app are most critical in terms of protecting user data so that these can be thoroughly evaluated during the audit.
Once the scope has been defined, the next step is conducting a thorough review and analysis of the app’s code by skilled professionals. This involves looking for common vulnerabilities such as insecure data storage, weak authentication processes, and insufficient encryption methods. The auditors will also check for compliance with industry standards and regulations such as GDPR and HIPAA.
Additionally, third-party auditors may perform penetration testing on your app. This involves attempting to hack into your app using various techniques to uncover any weaknesses that could potentially lead to a breach of user data. By simulating real-world attacks, penetration testing provides valuable insights into potential vulnerabilities that need to be addressed.
Importance Of User Education In Mobile App Security
The increasing use of mobile devices and apps in our daily lives has made securing personal data more important than ever before. As technology evolves, so do the methods used by cyber criminals to exploit vulnerabilities and steal sensitive information. This is why user education plays a crucial role in ensuring the security of mobile apps.
One of the main reasons for the importance of user education in mobile app security is that it helps users understand potential risks and how to protect themselves against them. Many people are not aware of the various threats posed by malicious actors, such as hackers and identity thieves. By educating users on these risks, they can become more proactive in taking necessary precautions to safeguard their personal information.
Another key aspect of user education is promoting safe browsing habits. Oftentimes, users unknowingly compromise their own security by clicking on suspicious links or downloading unknown files. Educating them on how to identify phishing scams and avoid downloading malware can greatly reduce the risk of a security breach.
Furthermore, user education can also help foster a culture of responsible app usage. With so many apps available today, it’s easy for users to overlook important privacy settings or grant excessive permissions without fully understanding the implications. By educating users on how apps access and use their data, they can make more informed decisions about which apps they choose to download and how they use them.
Case Study: Examples Of Successful Mobile App Security Measures
In the ever-evolving world of mobile app development, security has become a top priority for both developers and users. With the exponential growth of mobile usage and the amount of sensitive data being stored on devices, it is essential for app developers to implement strong security measures to protect user data.
To gain a better understanding of successful mobile app security measures, let’s take a look at some real-life case studies:
1. WhatsApp: WhatsApp is one of the most popular messaging apps in the world with over 2 billion active users. With such a massive user base, protecting user data is crucial for its success. To ensure this, WhatsApp uses end-to-end encryption which means that only the sender and receiver can see the messages exchanged between them. This ensures that even if someone intercepts or hacks into the communication channel, they will not be able to access any sensitive information.
Aside from encryption, WhatsApp also regularly updates its software to fix any known security vulnerabilities and conducts regular security audits to identify and address any potential threats.
2. Venmo: Venmo is a popular payment app used by millions of people worldwide. It allows users to transfer money securely through their bank account or credit card without sharing any sensitive financial information with others.
One key aspect of Venmo’s success in maintaining secure transactions is its use of tokenization technology. Instead of storing actual bank account or credit card numbers on its servers, Venmo creates unique tokens for each transaction that cannot be traced back to the original financial information.
Challenges And Limitations Of Mobile App Security
Mobile app security has become a major concern for both users and developers in recent years. As the use of mobile devices continues to rise, so does the amount of sensitive data being stored on them. This has made mobile apps a prime target for cyber attacks and data breaches.
While there are many best practices that can help improve the security of mobile apps, there are also several challenges and limitations that developers must be aware of. In this section, we will discuss some of the biggest challenges and limitations facing mobile app security today.
1. Diverse Device Landscape:
One of the biggest challenges in securing mobile apps is the diverse landscape of devices they run on. Unlike traditional desktop computers, which have relatively similar hardware and operating systems, smartphones and tablets come in many shapes and sizes with different hardware components and operating systems.
This makes it difficult for developers to create a one-size-fits-all approach to app security. Each device may have its own unique vulnerabilities that need to be addressed individually, making it challenging for developers to ensure their app is secure across all platforms.
2. Lack of Control over Devices:
Unlike desktop computers or laptops, which are usually owned by individuals or organizations themselves, most mobile devices are personally owned by users. This means that users have full control over what apps they download and install on their devices.
Future Of Mobile App Security
The future of mobile app security is constantly evolving as technology advances and new threats emerge. As the use of mobile apps continues to increase, the need for strong and effective security measures becomes even more crucial. In this section, we will discuss some of the key trends and developments that are shaping the future of mobile app security.
1. Biometric Authentication
One of the most promising developments in mobile app security is biometric authentication. This technology uses unique physical or behavioral characteristics such as fingerprints, facial recognition, or voice recognition to verify a user’s identity. Biometric authentication offers a more secure alternative to traditional password-based methods, which can be easily compromised.
In the future, we can expect to see more apps incorporating biometric authentication as a means of providing an additional layer of protection for sensitive data. This not only enhances security but also provides convenience for users who no longer have to remember complex passwords.
2. Increased Use of Artificial Intelligence (AI)
Artificial intelligence (AI) has been making significant strides in various industries, including cybersecurity. In terms of mobile app security, AI has shown great potential in detecting and preventing cyber attacks in real-time.
With AI-powered systems continuously monitoring for suspicious activities and anomalies within an app’s network traffic, developers can respond quickly to any potential threats before they cause harm. As AI technology continues to evolve and improve its capabilities, it will become an essential tool in securing mobile apps against ever-evolving cyber threats.
Conclusion:
Mobile app security is crucial in today’s digital world where the majority of personal and sensitive information is stored on various mobile devices. With the increasing number of cyber threats and data breaches, it is essential for app developers to prioritize the protection of user data.
The best practices mentioned in this article can serve as a guide for developers to ensure that their apps are secure and user data is well-protected. By implementing these practices, not only will it help to safeguard user data but also build trust with users and enhance the reputation of the app.
0 notes
gavstech · 2 years
Text
Tumblr media
Healthcare digital transformation is a necessary step for hospitals and healthcare providers in order to improve the quality of patient care. By applying digital technology effectively, healthcare organizations will not only be able to streamline their operations and cut costs, but also be able to provide better care for their patients. Through increased connectivity and shared information, healthcare organizations can help to reduce medical errors, provide more accurate diagnoses, and ensure quicker treatments. Furthermore, through the use of digital technology, healthcare organizations can ensure their patients have access to the best possible care and support in the most efficient manner possible.
0 notes
Text
Teksun's IoT Security Solutions help equip network availability, data encryption, or device authentication and boost low-performance devices. To know more about browse: https://teksun.com/ Contact us ID: [email protected]
0 notes
long80llc · 2 years
Link
Role of Adaptive Authentication in Access Management for Cybersecurity
The cybersecurity landscape is constantly changing, with new threats and vulnerabilities emerging daily. These changes have created a need for a new type of access management. Adaptive Authentication (AA) is the answer to this need. It provides the security & compliance needed to protect against these evolving threats by adapting to changing conditions in real time.
0 notes
employvision · 2 years
Text
Tumblr media
The Significance of Generating and Sustaining Talent Pipelines
Talent pipelines are the foundation of any IT Talent Acquisition. They are the pipelines that connect what you have to offer with the people who need it. Talent pipelines are often overlooked in organizations because they seem so basic and simple, but talent pipelines can make or break an organization.
0 notes
spaceoracle · 1 month
Text
My name is Austin. My family is homeless and has been since 2-2-22. My disabled, bed bound, immunocompromised father who is on oxygen 24/7, mom with a very painful disabled leg, cute as can be dog, wonderful and beautiful cat, and myself are in urgent need of support to keep us off the streets and in a motel room. We were evicted from our home after the passing of my aunt. She had a reverse mortgage and the bank took possession. We've been busting our butts to find a place ever since, with no luck finding housing whatsoever. Our daily motel fees eat up all of the money we manage to raise or save up, but crowded shelters are simply not an option because of my dad’s medical conditions. Catching COVID in a congregate shelter with his weak lungs and immunocompromised system would possibly kill him. We have been waiting for another Emergency Housing voucher as we were unable to find a place in the few days we were given to find one when approved previously. We are on countless low income housing waiting lists who have also told us to just wait. We have paid to apply for apartments and are rejected because of our low or non existent credit and low income. We are working with some new resources at the moment and hoping something comes of it. Basically, our issue is this: If we don’t have enough money for motel fees, we will have to sleep in our car which is super difficult for my parents and our pets, not even mentioning myself. There's honestly not enough room in our car for all of us to sit, let alone sleep comfortably. My dad’s oxygen machine needs electricity to run, and spare tanks only last a few hours each. The days are scorching and the nights get cold in California, especially this time of year, and we’re trying our best to stay together as a family and stay sheltered, healthy, and safe, and out of the triple digit summer heat. We would appreciate any donations you could spare to keep our motel room while we attempt to get on our feet during this awful experience. Thanks for your consideration, it means the world to us all. -Austin
The USA Today story featuring my family was published today. Apparently they have a policy that they can't link our fundraiser directly. So please help me spread it here.
112 notes · View notes
whilomm · 2 months
Text
from wikipedia:
A national identification number, national identity number, or national insurance number or JMBG/EMBG is used by the governments of many countries as a means of tracking their citizens, permanent residents, and temporary residents for the purposes of work, taxation, government benefits, health care, and other governmentally-related functions. The ways in which such a system is implemented vary among countries, but in most cases citizens are issued an identification number upon reaching legal age, or when they are born. Non-citizens may be issued such numbers when they enter the country, or when granted a temporary or permanent residence permit. Many countries issued such numbers for a singular purpose, but over time, they become a de facto national identification number. For example, the United States developed its Social Security number (SSN) system as a means of organizing disbursing of Social Security benefits. However, due to function creep, the number has become used for other purposes to the point where it is almost essential to have one to, among other things, open a bank account, obtain a credit card, or drive a car.
so basically: do you kno the One Government Number that kinda gets used for everything off the top of ur head? Sometimes linked to stuff like social security (hence "social security number" in the U.S.) but they end up just bein used for like, Fuckin Whatever. im just curious how many ppl got that shit memorized
i was gonna be ha ha funnee "put your social security number your credit card number and those three wacky digits in the tags" but no someone would maybe do it. so. dont do that. please. I'm not 100% sure if every country has a system where writing your number on the internet is Bad (in the U.S. thats how u get your identity stolen) but still like. just in case. dont. thx.
but DO tell me if like. your parents or whoever made u memorize it. my mom did for some reason and now i kno it. maybe i dont need to bc i can find it easily but its in my noggin so. And also if u feel like it say how important the numbers are in your country. In the U.S. theyre Important but dont come up super super often, mostly if ur like. opening a bank account. dealing with Government Forms. taxes. insurance. occasionally medical stuff. but also if someone Gets Yours they can kinda destroy your life a bit w identity fraud. sucks a bit.
84 notes · View notes
echeckplan · 9 months
Text
https://www.echeckplan.com/understanding-merchant-services-in-real-estate/
1 note · View note
vegantinatalist · 3 months
Text
Introduction (Im going to try to list as many things about me as I can, the more you share, the more I want to talk to you)
26 F USA Washington
Ethical Vegan/Animal Liberationist
Antinatalist
Pro Right to Die
Sex Repulsed, Romance Favoring
Alt Style (goth, grunge, eastern, jirai kei etc)
Digital Artist
misanthrope, but also an activist who cares a lot
Game dev and animator
Anticonsumer/zerowaste
Spontaneous
Many personalities honestly (can be quiet serious girl, manic older sister, eepy baby, guardian)
Dark theme lover (suicide, lovers suicide, revenge, etc)
EVFL attitudinal psyche
INFJ MBTI
Fearful avoidant attachment style, but can become extremely secure
Ambivert, introvert leaning (I only talk to people who share my ethics and when I do I do so enthusiastically)
DMs open
9 notes · View notes
Text
This day in history
Tumblr media
One June 20, I'm live onstage in LOS ANGELES for a recording of the GO FACT YOURSELF podcast. On June 21, I'm doing an ONLINE READING for the LOCUS AWARDS at 16hPT. On June 22, I'll be in OAKLAND, CA for a panel and a keynote at the LOCUS AWARDS.
Tumblr media
#20yrsago Canadian copyfight hots up: Liberal MPs on the take from copyright industries? https://www.michaelgeist.ca/2004/06/copyright-reform-needs-a-balanced-approach/
#15yrsago Digital TV’s history in America: the DTV transition nearly cost the USA its technological freedom https://www.eff.org/deeplinks/2009/06/dtv-era-no-broadcast
#15yrsago Hundreds of top British cops defrauded the public for millions in phony expense racket https://www.theguardian.com/politics/2009/jun/14/expenses-fraud-detectives-scotland-yard
#15yrsago $134.5 BILLION worth of US bonds seized from smugglers at Swiss border https://www.asianews.it/index.php?l=en&art=15456&size=A
#10yrsago Atheism remains least-trusted characteristic in American politics https://www.pewresearch.org/politics/2014/05/19/for-2016-hopefuls-washington-experience-could-do-more-harm-than-good/
#10yrsago Canadian Supreme Court’s landmark privacy ruling https://www.michaelgeist.ca/2014/06/scc-spencer-decision/
#10yrsago Court finds full-book scanning is fair use https://www.eff.org/deeplinks/2014/06/another-fair-use-victory-book-scanning-hathitrust
#10yrsago Not selling out: Teens live in commercial online spaces because that’s their only option https://medium.com/message/selling-out-is-meaningless-3450a5bc98d2
#5yrsago Porno copyright troll sentenced to 14 years: “a wrecking ball to trust in the administration of justice” https://torrentfreak.com/copyright-troll-lawyer-sentenced-to-14-years-in-prison-190614/
#5yrsago Ukrainian oligarchs accused of laundering $470b, buying up much of Cleveland https://www.atlanticcouncil.org/blogs/ukrainealert/how-kolomoisky-does-business-in-the-united-states/
#5yrsago Empirical review of privacy policies reveals that they are “incomprehensible” drivel https://www.nytimes.com/interactive/2019/06/12/opinion/facebook-google-privacy-policies.html
#5yrsago Beyond lockpicking: learn about the class-breaks for doors, locks, hinges and other physical security measures https://memex.craphound.com/2019/06/14/beyond-lockpicking-learn-about-the-class-breaks-for-doors-locks-hinges-and-other-physical-security-measures/
#5yrsago Hong Kong’s #612strike uprising is alive to surveillance threats, but its countermeasures are woefully inadequate https://www.securityweek.com/surveillance-savvy-hong-kong-protesters-go-digitally-dark/
#5yrago Reverse mortgages: subprime’s “stealth aftershock” that is costing elderly African-Americans their family homes https://www.usatoday.com/in-depth/news/investigations/2019/06/11/seniors-face-foreclosure-retirement-after-failed-reverse-mortgage/1329043001/
#5yrsago Maine’s new ISP privacy law has both California and New York beat https://thehill.com/policy/technology/447824-maine-shakes-up-debate-with-tough-internet-privacy-law/
#1yrago How Amazon transformed the EU into a planned economy https://pluralistic.net/2023/06/14/flywheel-shyster-and-flywheel/#unfulfilled-by-amazon
7 notes · View notes
swampgallows · 1 year
Text
Tumblr media
hi lovelies. ive been a candy kid since 2004, but unfortunately i haven't been able to go to a rave since feb 2020, as i'm at high risk of severe disability or death if i were to catch the 'vid. in my 3+ years of isolation i've been churning out kandi but have no means of trading it. as you can see my chain of trades is practically full, now weighing almost 5 lbs.
if any of you are up to it, i would really, really love to trade via mail! back in the days of forums, mail trading was pretty common (kanditrade.net comes to mind), but it's been years since i last heard of anyone doing it, so im taking matters into my own hands!!
rules:
you must interact with me in some capacity (im not giving my info to a rando, sorry)
provide some kandi preferences! colors, animals, shapes, themes, etc.
you must be willing to give me a mailing address in the continental US to ship to (i might extend to non-USA if i wuv you lots n lots). please be sure this is a secure address that you regularly access; im not responsible for the package once it leaves my hands.
you must mail me kandi (or other creation) in return. this is a trade, not a giveaway.
when i send my half of the trade, you must send me your half of the trade within 30 days.
other info under cut ⤵
Q: what will i receive in my trade?
anywhere from 1-3 pieces of kandi, glowsticks, and maybe some other goodies (candy/cookies [dietary restrictions permitting], stickers, toys, mix CDs, etc.). your package will be shipped from california and comes from a non-smoking, drug-free home with a short-haired dog.
Q: what can i give you to trade?
kandi, of course! but if you don't make kandi then anything else you have created is welcomed. if you make music/mixes, please at least burn a cd!
kandi i like: singles! halloween colors (black/orange/purple/green), especially bright green. my raver name is rabbit, so i have a lot of kandi with bunnies on it. i also like monsters, stars, suns/moons, glow in the dark, food/fruits, and big chunky shapes.
kandi i do not like: cuffs/"epic"s, perler creations. these are very impressive, but as someone who wears kandi daily i will not be able to wear large pieces like these. also please no drug references or anything sexual.
no, only handmade items please. part of the importance of kandi is that it is a physical object that travels from my hands to yours: this is symbolized by the bridge of linked hands during a trade.
Q: can my half of the trade be digital/online instead?
Q: i can't get to the post office. how do i mail it?
the best way to mail something if you can't get to the post office is:
make an account at usps.com. it is free.
order small flat rate *padded* envelopes or boxes from usps. they are free. i suggest getting the small boxes as they're slightly cheaper to ship than the padded envelopes and you can fit bulkier items inside.
pay for your postage online via usps (click-n-ship). the flat rate boxes have set prices per size, so you wont need to weigh anything. all flat rate pricing is Priority Mail, meaning it comes with free package pickup, tracking, and 1-3 day delivery. if you don't have a printer, they will print you a label and mail it to you for $1.25.
arrange for the package to be picked up with your regular mail delivery. it is free. you will get pickup confirmation and tracking sent to your email.
Q: i want to trade! how do i contact you?
contact me through tumblr messages, discord (if you have me added), or send an email to my url at gmail. if you email me please be sure to include something about kandi in the subject line as well as your tumblr url!
Q. wtf is kandi?
raver friendship bracelets, basically. i've written a primer on kandi here!
40 notes · View notes
Text
Sanjana Karanth at HuffPost:
A coalition of press freedom, civil liberties and human rights organizations sent a letter to the White House on Tuesday to call on the Biden administration to make public an upcoming report on whether foreign countries — including Israel — are using U.S. military aid in ways that break international humanitarian laws. For months, members of Congress have been demanding assurances that Israel, which receives U.S. military aid, has complied with international and U.S. law — which prohibits violence against civilians and efforts to block aid — in its war in Gaza. In response, President Joe Biden in February issued a memo known as NSM-20, which requires federal U.S. agencies to submit a report to Congress on whether countries that get U.S. military aid are in fact obeying the law. The report’s initial deadline was May 8, though it is currently unclear if it will be ready to submit by Wednesday. The Biden administration has not said explicitly if it will make the report publicly available.
But the letter’s signatories — including Amnesty International USA, Defending Rights & Dissent, the Freedom of the Press Foundation, the National Press Photographers Association, the Radio Television Digital News Association and Reporters Without Borders — said that the “process established in NSM-20 suggests” that the report to Congress should be unclassified. “The public and the press have an especially strong interest in understanding how the U.S. has assessed the assurances provided under NSM-20 by all countries that receive U.S. defense articles, and particularly those in areas of armed conflict,” read the letter. “Your administration has pledged to ‘bring transparency and truth back to the government,’” the letter continued. “We urge you to adhere to this commitment by releasing the … report to Congress under NSM-20 to the press and the public.”
The White House did not immediately respond to HuffPost’s request for comment, while the National Security Council referred the question to the State Department. The State Department did not immediately respond to HuffPost. The Biden administration is facing growing pressure both domestically and from the international community over its continued diplomatic and military support for Israel’s offensive in Gaza, which has so far killed nearly 35,000 Palestinians since Oct. 7. While Hamas agreed this week to a proposal that would include a cease-fire and the return of hostages, Israel rejected the plan. As Israel is poised to invade the southernmost Gazan city of Rafah — despite allies like the U.S. warning against it, due to the city’s large civilian population — lawmakers and humanitarians have are increasingly concerned that Prime Minister Benjamin Netanyahu’s government has committed war crimes.
A coalition of human rights groups, press freedom, and civil liberties urge the Biden Administration to make public a report whether foreign countries-- including Israel-- are using US military aid in ways that break international humanitarian laws.
7 notes · View notes