Cyber Security

65 readers
2 users here now

🕵🏿 Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.

Questions and answers are encouraged. Be excellent to each other. 🕊️

founded 7 months ago
MODERATORS
1
 
 
The Cyber Resilience Act requires the Commission to specify the technical description of the categories of important and critical products with digital elements listed in Annex III and IV to the Regulation. Such products may be subject to more stringent conformity assessment procedures, as set out in Article 32.

Stakeholders are encouraged to submit their feedback to this consultation by using the attached template, in order to facilitate feedback consolidation. (13 March 2025 - 15 April 2025)
2
3
4
5
7
submitted 3 weeks ago* (last edited 3 weeks ago) by [email protected] to c/[email protected]
6
7
8
9
 
 

The article does not elaborate on which software "MATRIX" refers to.

10
11
12
13
14
15
16
17
18
19
20
1
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 
 

With the suspicious strategy to 'make digital advertising more private', we can be sure google:zilla has not been subverted by its major funders. Take steps to make sure you are in complete control of the hardware crypto components of your own devices. Or perhaps understand the consequences of disabling them.

21
22
23
 
 

Stop it right now. It does not help your threat environment. It just makes things worse.

24
25
1
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 
 

Do not trust robots ... or mobile phones. Featuring Karsten Nohl, Berlin-based long time phone security researcher, this Veritasium episode is an easy introduction to the general public as to why you should question everything about your mobile devices.

(the issues outlined explain why some groups consider the use of alternate comms networks such as pagers, walkie talkies, meshtastic, etc)

Note for non-Googliness, the URL can work with invidious instances (such as yewtu.be) which may or may not be stable. just use the path /watch?v=wVyu7NB7W6Y

view more: next ›