<rss
      xmlns:atom="http://www.w3.org/2005/Atom"
      xmlns:media="http://search.yahoo.com/mrss/"
      xmlns:content="http://purl.org/rss/1.0/modules/content/"
      xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      version="2.0"
    >
      <channel>
        <title><![CDATA[]]></title>
        <description><![CDATA[]]></description>
        <link>https://rod.npub.pro/tag/cybersecurity/</link>
        <atom:link href="https://rod.npub.pro/tag/cybersecurity/rss/" rel="self" type="application/rss+xml"/>
        <itunes:new-feed-url>https://rod.npub.pro/tag/cybersecurity/rss/</itunes:new-feed-url>
        <itunes:author><![CDATA[rod ✪]]></itunes:author>
        <itunes:subtitle><![CDATA[]]></itunes:subtitle>
        <itunes:type>episodic</itunes:type>
        <itunes:owner>
          <itunes:name><![CDATA[rod ✪]]></itunes:name>
          <itunes:email><![CDATA[rod ✪]]></itunes:email>
        </itunes:owner>
            
      <pubDate>Fri, 09 Aug 2024 22:02:22 GMT</pubDate>
      <lastBuildDate>Fri, 09 Aug 2024 22:02:22 GMT</lastBuildDate>
      
      <itunes:image href="https://image.nostr.build/63c130f4a42b57d8147f78bfa7e93c5029c5c4a1f1e6d169f2b497b36d768f35.jpg" />
      <image>
        <title><![CDATA[]]></title>
        <link>https://rod.npub.pro/tag/cybersecurity/</link>
        <url>https://image.nostr.build/63c130f4a42b57d8147f78bfa7e93c5029c5c4a1f1e6d169f2b497b36d768f35.jpg</url>
      </image>
      <item>
      <title><![CDATA[The Cult of the Dead Cow (cDc) & The Application Framework VEILID]]></title>
      <description><![CDATA[]]></description>
             <itunes:subtitle><![CDATA[]]></itunes:subtitle>
      <pubDate>Fri, 09 Aug 2024 22:02:22 GMT</pubDate>
      <link>https://rod.npub.pro/post/224458/</link>
      <comments>https://rod.npub.pro/post/224458/</comments>
      <guid isPermaLink="false">naddr1qqrryv35xs6nsq3qxhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcsxpqqqp65w420rg4</guid>
      <category>cybersecurity</category>
      
        <media:content url="https://cdn.nostr.build/i/fd27ede124f2c1dc34c5b361a44da68476e7f1526d07448acdf672397f43fc9b.jpg" medium="image"/>
        <enclosure 
          url="https://cdn.nostr.build/i/fd27ede124f2c1dc34c5b361a44da68476e7f1526d07448acdf672397f43fc9b.jpg" length="0" 
          type="image/jpeg" 
        />
      <noteId>naddr1qqrryv35xs6nsq3qxhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcsxpqqqp65w420rg4</noteId>
      <npub>npub1xhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcspt896x</npub>
      <dc:creator><![CDATA[rod ✪]]></dc:creator>
      <content:encoded><![CDATA[<h5><strong>Who is the Cult of the Dead Cow (cDc)?</strong></h5>
<p>A known USA based hacktivist group. According to the record in Wikipedia, it was started in 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three BBS SysOps</p>
<p>You can check their member list in their <a href="https://cultdeadcow.com/members.html">web site</a></p>
<h5><strong>Thinks of the cDc group that I have found quite interesting</strong></h5>
<ul>
<li>Group member <em><strong>Drunkfux</strong></em> (Jesse Dryden) is the grand nephew of <em><strong>Charlie Chaplin</strong></em></li>
<li>In 1991, the group began distributing <em><strong>music</strong></em> in the form of cassette tape albums</li>
<li>In November 1994, the group claimed responsibility for giving <em><strong>President Ronald Reagan</strong></em> Alzheimer's disease, claiming to have done so in 1986 with a blowgun</li>
<li>In 1995, the group declared war on the Church of Scientology stating "We believe that El Ron Hubbard [sic] is actually none other than Heinrich Himmler of the SS, who fled to Argentina and is now responsible for the stealing of babies from hospitals and raising them as 'super-soldiers' for the purpose of overthrowing the U.S. Fed. Govt. in a bloody revolution. We fear plans for a 'Fourth Reich' to be established on our home soil under the vise-like grip of oppression known as Scientology!"</li>
<li>On January 7, 1999, the group joined with an international coalition of hackers to denounce a call to cyber-war against the governments of China and Iraq</li>
<li>In February 2000, the group was the subject of an 11 minute documentary short titled "Disinformation".</li>
<li>In February 2000, a member of the group by the code-name Mudge briefed <em><strong>President Bill Clinton</strong></em> on "Internet security".</li>
<li>In 2003 the tool created by the group by the name of <em><strong>Six/Four System</strong></em> became the first product of a hacker group to receive approval from the <em><strong>United States Department of Commerce</strong></em> for export of strong encryption</li>
<li>Member by the name of "Psychedelic Warlord" is congressman <em><strong>Beto O'Rourke</strong></em>, an American politician who served as the U.S. representative for Texas's 16th congressional district from 2013 to 2019. <em><strong>A member of the Democratic Party</strong></em>, party's nominee for the U.S. Senate in 2018, candidate for the presidential nomination in 2020, and the party's nominee for the 2022 Texas gubernatorial election.</li>
</ul>
<h4><strong>Do they have a political affiliation?</strong></h4>
<p>From the previous section we could at least assume that they sympathize with the USA Democratic party, they supported President Bill Clinton and claimed responsibility for doing serious harm to President Ronald Reagan, I could not find any information if the government opened an investigation about this allegation or not. </p>
<h4><strong>Their latest contribution?</strong></h4>
<p>Recently, they have developed an application framework by the name of <em><strong>Veilid</strong></em>, described as "like TOR" but for apps.</p>
<p>This application framework, if adopted by many developers will improve privacy by default for applications developed under that framework. The web site claim that it is open source </p>
<p><em>You can review the information and project at the web site: <a href="https://veilid.com/">VEILID</a></em></p>
<p><em><strong>In the Web site the group describe it as follows:</strong></em></p>
<p>"<em><strong>Veilid</strong></em> allows anyone to build a distributed, private app. <em><strong>Veilid</strong></em> gives users the privacy to opt out of data collection and online tracking. <em><strong>Veilid</strong></em> is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon."</p>
<p>"<em><strong>Veilid</strong></em> goes above and beyond existing privacy technologies and has the potential to completely change the way people use the Internet. <em><strong>Veilid</strong></em> <em>has no profit motive</em>, which puts us in a unique position to promote ideals without the compromise of capitalism."</p>
<h4>Summary</h4>
<p><em><strong>Veilid</strong></em> seems to be exactly what is needed at the moment to bring privacy to the masses, even though TOR is doing a very good job and with the improved throughput its usage experience has improved, having a native privacy oriented FOSS application framework is paramount. </p>
<p>Most people is not technically savvy and therefore, not skilled in cyber security, they are constantly victims of cyber crime in many forms and shapes. eliminating one vector of attack by making the applications to opt out of data collection and online tracking from the get go is a step in the right direction, the question is, Would developers in general use the framework? Considering the ads will not be a possible source of income if the framework is used, well... Time will say...</p>
]]></content:encoded>
      <itunes:author><![CDATA[rod ✪]]></itunes:author>
      <itunes:summary><![CDATA[<h5><strong>Who is the Cult of the Dead Cow (cDc)?</strong></h5>
<p>A known USA based hacktivist group. According to the record in Wikipedia, it was started in 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three BBS SysOps</p>
<p>You can check their member list in their <a href="https://cultdeadcow.com/members.html">web site</a></p>
<h5><strong>Thinks of the cDc group that I have found quite interesting</strong></h5>
<ul>
<li>Group member <em><strong>Drunkfux</strong></em> (Jesse Dryden) is the grand nephew of <em><strong>Charlie Chaplin</strong></em></li>
<li>In 1991, the group began distributing <em><strong>music</strong></em> in the form of cassette tape albums</li>
<li>In November 1994, the group claimed responsibility for giving <em><strong>President Ronald Reagan</strong></em> Alzheimer's disease, claiming to have done so in 1986 with a blowgun</li>
<li>In 1995, the group declared war on the Church of Scientology stating "We believe that El Ron Hubbard [sic] is actually none other than Heinrich Himmler of the SS, who fled to Argentina and is now responsible for the stealing of babies from hospitals and raising them as 'super-soldiers' for the purpose of overthrowing the U.S. Fed. Govt. in a bloody revolution. We fear plans for a 'Fourth Reich' to be established on our home soil under the vise-like grip of oppression known as Scientology!"</li>
<li>On January 7, 1999, the group joined with an international coalition of hackers to denounce a call to cyber-war against the governments of China and Iraq</li>
<li>In February 2000, the group was the subject of an 11 minute documentary short titled "Disinformation".</li>
<li>In February 2000, a member of the group by the code-name Mudge briefed <em><strong>President Bill Clinton</strong></em> on "Internet security".</li>
<li>In 2003 the tool created by the group by the name of <em><strong>Six/Four System</strong></em> became the first product of a hacker group to receive approval from the <em><strong>United States Department of Commerce</strong></em> for export of strong encryption</li>
<li>Member by the name of "Psychedelic Warlord" is congressman <em><strong>Beto O'Rourke</strong></em>, an American politician who served as the U.S. representative for Texas's 16th congressional district from 2013 to 2019. <em><strong>A member of the Democratic Party</strong></em>, party's nominee for the U.S. Senate in 2018, candidate for the presidential nomination in 2020, and the party's nominee for the 2022 Texas gubernatorial election.</li>
</ul>
<h4><strong>Do they have a political affiliation?</strong></h4>
<p>From the previous section we could at least assume that they sympathize with the USA Democratic party, they supported President Bill Clinton and claimed responsibility for doing serious harm to President Ronald Reagan, I could not find any information if the government opened an investigation about this allegation or not. </p>
<h4><strong>Their latest contribution?</strong></h4>
<p>Recently, they have developed an application framework by the name of <em><strong>Veilid</strong></em>, described as "like TOR" but for apps.</p>
<p>This application framework, if adopted by many developers will improve privacy by default for applications developed under that framework. The web site claim that it is open source </p>
<p><em>You can review the information and project at the web site: <a href="https://veilid.com/">VEILID</a></em></p>
<p><em><strong>In the Web site the group describe it as follows:</strong></em></p>
<p>"<em><strong>Veilid</strong></em> allows anyone to build a distributed, private app. <em><strong>Veilid</strong></em> gives users the privacy to opt out of data collection and online tracking. <em><strong>Veilid</strong></em> is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon."</p>
<p>"<em><strong>Veilid</strong></em> goes above and beyond existing privacy technologies and has the potential to completely change the way people use the Internet. <em><strong>Veilid</strong></em> <em>has no profit motive</em>, which puts us in a unique position to promote ideals without the compromise of capitalism."</p>
<h4>Summary</h4>
<p><em><strong>Veilid</strong></em> seems to be exactly what is needed at the moment to bring privacy to the masses, even though TOR is doing a very good job and with the improved throughput its usage experience has improved, having a native privacy oriented FOSS application framework is paramount. </p>
<p>Most people is not technically savvy and therefore, not skilled in cyber security, they are constantly victims of cyber crime in many forms and shapes. eliminating one vector of attack by making the applications to opt out of data collection and online tracking from the get go is a step in the right direction, the question is, Would developers in general use the framework? Considering the ads will not be a possible source of income if the framework is used, well... Time will say...</p>
]]></itunes:summary>
      <itunes:image href="https://cdn.nostr.build/i/fd27ede124f2c1dc34c5b361a44da68476e7f1526d07448acdf672397f43fc9b.jpg"/>
      </item>
      
      <item>
      <title><![CDATA[Cyber Security & Bitcoin - Unpopular opinion and some suggestions]]></title>
      <description><![CDATA[It is an unpopular opinion, but, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away]]></description>
             <itunes:subtitle><![CDATA[It is an unpopular opinion, but, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away]]></itunes:subtitle>
      <pubDate>Fri, 05 Apr 2024 02:05:20 GMT</pubDate>
      <link>https://rod.npub.pro/post/lfcf5uaygttotpibac85a/</link>
      <comments>https://rod.npub.pro/post/lfcf5uaygttotpibac85a/</comments>
      <guid isPermaLink="false">naddr1qq25cenrvc642s2eva69gm652p55yctr8q6kzq3qxhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcsxpqqqp65w4u25y7</guid>
      <category>cybersecurity</category>
      
        <media:content url="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712282719358-YAKIHONNES3.jpg" medium="image"/>
        <enclosure 
          url="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712282719358-YAKIHONNES3.jpg" length="0" 
          type="image/jpeg" 
        />
      <noteId>naddr1qq25cenrvc642s2eva69gm652p55yctr8q6kzq3qxhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcsxpqqqp65w4u25y7</noteId>
      <npub>npub1xhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcspt896x</npub>
      <dc:creator><![CDATA[rod ✪]]></dc:creator>
      <content:encoded><![CDATA[<h2>The FUD injection</h2>
<p><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712282596831-YAKIHONNES3.jpg" alt="image"></p>
<p>Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That, if you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doomed....</p>
<p>IMO and experience, it is an exaggeration...</p>
<p>If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...</p>
<h2>The unpopular opinion</h2>
<p>IMO, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.</p>
<p>And the tools they tell you that are not enough and therefore, you are powerless, actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.</p>
<h2>Sugestions</h2>
<p>Do your homework, acquiring cyber security skills needs reading, get on it, few tips:</p>
<ol>
<li>Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.</li>
<li>Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.</li>
<li>Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.</li>
<li>If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....</li>
<li>If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)</li>
<li>If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.</li>
<li>Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....</li>
</ol>
<h2>Summary</h2>
<p>Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe. Do the homework, read, study, acquire the skills and tools and use them properly, cyber security is not convenient, but in the age of information, it is a must to protect your family and your wealth.</p>
<p>If you like my work and would like to support me:<br><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712279199710-YAKIHONNES3.jpg" alt="image"></p>
]]></content:encoded>
      <itunes:author><![CDATA[rod ✪]]></itunes:author>
      <itunes:summary><![CDATA[<h2>The FUD injection</h2>
<p><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712282596831-YAKIHONNES3.jpg" alt="image"></p>
<p>Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That, if you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doomed....</p>
<p>IMO and experience, it is an exaggeration...</p>
<p>If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...</p>
<h2>The unpopular opinion</h2>
<p>IMO, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.</p>
<p>And the tools they tell you that are not enough and therefore, you are powerless, actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.</p>
<h2>Sugestions</h2>
<p>Do your homework, acquiring cyber security skills needs reading, get on it, few tips:</p>
<ol>
<li>Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.</li>
<li>Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.</li>
<li>Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.</li>
<li>If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....</li>
<li>If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)</li>
<li>If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.</li>
<li>Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....</li>
</ol>
<h2>Summary</h2>
<p>Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe. Do the homework, read, study, acquire the skills and tools and use them properly, cyber security is not convenient, but in the age of information, it is a must to protect your family and your wealth.</p>
<p>If you like my work and would like to support me:<br><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712279199710-YAKIHONNES3.jpg" alt="image"></p>
]]></itunes:summary>
      <itunes:image href="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1712282719358-YAKIHONNES3.jpg"/>
      </item>
      
      <item>
      <title><![CDATA[Are you using "Files" by Google? - Be careful, you need to fix this setting...]]></title>
      <description><![CDATA[Files" by Google added a "feature"... "Smart Search", this is a very intrusive feature that can cost you dearly, read on and find out why and how to disable it]]></description>
             <itunes:subtitle><![CDATA[Files" by Google added a "feature"... "Smart Search", this is a very intrusive feature that can cost you dearly, read on and find out why and how to disable it]]></itunes:subtitle>
      <pubDate>Thu, 19 Oct 2023 09:58:36 GMT</pubDate>
      <link>https://rod.npub.pro/post/re__-hj6a7uhveqefito4/</link>
      <comments>https://rod.npub.pro/post/re__-hj6a7uhveqefito4/</comments>
      <guid isPermaLink="false">naddr1qq2hye2ltukks63kvymh2jzkg4ck2enf23hngq3qxhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcsxpqqqp65w7u69j0</guid>
      <category>cybersecurity</category>
      
        <media:content url="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697709516170-YAKIHONNES3.jpg" medium="image"/>
        <enclosure 
          url="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697709516170-YAKIHONNES3.jpg" length="0" 
          type="image/jpeg" 
        />
      <noteId>naddr1qq2hye2ltukks63kvymh2jzkg4ck2enf23hngq3qxhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcsxpqqqp65w7u69j0</noteId>
      <npub>npub1xhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcspt896x</npub>
      <dc:creator><![CDATA[rod ✪]]></dc:creator>
      <content:encoded><![CDATA[<h2>"Files" by Google new feature</h2>
<p>"Files" by Google added a "feature"... "Smart Search", you can toggle it to OFF and it is highly recommended to do so.</p>
<ul>
<li><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697708380122-YAKIHONNES3.jpg" alt="image"></li>
</ul>
<p>Toggle the Smart Search to OFF, otherwise, google will search and index every picture, video and document in your device, no exceptions, anything you have ever photographed and you forgot, any document you have downloaded or article, etc...</p>
<h2>How this could affect you?</h2>
<p>Google is actively combating child abuse and therefore it has built in its "AI" a very aggressive algorithm searching of material that "IT THINKS" is related, therefore the following content could be flagged:</p>
<ul>
<li><input disabled="" type="checkbox"> Pictures of you and your children in the beach</li>
<li><input disabled="" type="checkbox"> Pictures or videos which are innocent in nature but the "AI" "thinks" are not</li>
<li><input disabled="" type="checkbox"> Articles you may have save for research to write your next essay that have links to flagged information or sites</li>
</ul>
<p><em><strong>The results:</strong></em></p>
<ul>
<li><input disabled="" type="checkbox"> Your google account will be canceled</li>
<li><input disabled="" type="checkbox"> You will be flagged as a criminal across the digital world</li>
</ul>
<p>You think this is non sense? Think again:<br><np-embed url="https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html"><a href="https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html">https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html</a></np-embed></p>
<h2>How to switch it off:</h2>
<ol>
<li>Open files by Google</li>
<li>Tap on Menu -&gt; Settings</li>
<li>Turn OFF Smart Search</li>
</ol>
<h2>But you can do more for your privacy and the security of your family</h2>
<ol>
<li>Stop using google apps, if possible get rid off of Google OS and use Graphene OS</li>
<li>Go to Settings -&gt; Apps</li>
<li>Search for Files by Google</li>
<li>Unistall the app, if you can't disable it</li>
<li>Keep doing that with most Google apps that are not a must if you have not switched already to GrapheneOS</li>
</ol>
<p><em><strong>Remember, Google keeps advocating for privacy, but as many others have pointed out repeatedly, they are the first ones lobbying for the removal of your privacy by regulation and draconian laws, their hypocrisy knows no limits</strong></em></p>
<h2>Recommendation:</h2>
<p>I would assume you have installed F-Droid in your android, or Obtainium if you are more advanced, if so, consider "Simple File Manager Pro" by Tibor Kaputa, this dev has a suite of apps that are basic needs and the best feature in my opinion is that not one of his apps connect to the internet, contacts, gallery, files, phone, etc.</p>
<ul>
<li><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697709265617-YAKIHONNES3.jpg" alt="image"></li>
</ul>
<blockquote>
<p> Note<br>As most people, we all love the convenience of technology, it makes our lives easier, however, our safety and our family safety should go first, between technology being miss-used and abused by corporations and cyber-criminals data mining and checking for easy targets to attack for profit, we need to keep our guard up. Learning is key, resist the use of new tech if you do not understand the privacy trade offs, no matter how appealing and convenient it looks like. .</p>
</blockquote>
<p><em><strong>Please leave your comments with your favorite FOSS Files app!</strong></em></p>
]]></content:encoded>
      <itunes:author><![CDATA[rod ✪]]></itunes:author>
      <itunes:summary><![CDATA[<h2>"Files" by Google new feature</h2>
<p>"Files" by Google added a "feature"... "Smart Search", you can toggle it to OFF and it is highly recommended to do so.</p>
<ul>
<li><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697708380122-YAKIHONNES3.jpg" alt="image"></li>
</ul>
<p>Toggle the Smart Search to OFF, otherwise, google will search and index every picture, video and document in your device, no exceptions, anything you have ever photographed and you forgot, any document you have downloaded or article, etc...</p>
<h2>How this could affect you?</h2>
<p>Google is actively combating child abuse and therefore it has built in its "AI" a very aggressive algorithm searching of material that "IT THINKS" is related, therefore the following content could be flagged:</p>
<ul>
<li><input disabled="" type="checkbox"> Pictures of you and your children in the beach</li>
<li><input disabled="" type="checkbox"> Pictures or videos which are innocent in nature but the "AI" "thinks" are not</li>
<li><input disabled="" type="checkbox"> Articles you may have save for research to write your next essay that have links to flagged information or sites</li>
</ul>
<p><em><strong>The results:</strong></em></p>
<ul>
<li><input disabled="" type="checkbox"> Your google account will be canceled</li>
<li><input disabled="" type="checkbox"> You will be flagged as a criminal across the digital world</li>
</ul>
<p>You think this is non sense? Think again:<br><np-embed url="https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html"><a href="https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html">https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html</a></np-embed></p>
<h2>How to switch it off:</h2>
<ol>
<li>Open files by Google</li>
<li>Tap on Menu -&gt; Settings</li>
<li>Turn OFF Smart Search</li>
</ol>
<h2>But you can do more for your privacy and the security of your family</h2>
<ol>
<li>Stop using google apps, if possible get rid off of Google OS and use Graphene OS</li>
<li>Go to Settings -&gt; Apps</li>
<li>Search for Files by Google</li>
<li>Unistall the app, if you can't disable it</li>
<li>Keep doing that with most Google apps that are not a must if you have not switched already to GrapheneOS</li>
</ol>
<p><em><strong>Remember, Google keeps advocating for privacy, but as many others have pointed out repeatedly, they are the first ones lobbying for the removal of your privacy by regulation and draconian laws, their hypocrisy knows no limits</strong></em></p>
<h2>Recommendation:</h2>
<p>I would assume you have installed F-Droid in your android, or Obtainium if you are more advanced, if so, consider "Simple File Manager Pro" by Tibor Kaputa, this dev has a suite of apps that are basic needs and the best feature in my opinion is that not one of his apps connect to the internet, contacts, gallery, files, phone, etc.</p>
<ul>
<li><img src="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697709265617-YAKIHONNES3.jpg" alt="image"></li>
</ul>
<blockquote>
<p> Note<br>As most people, we all love the convenience of technology, it makes our lives easier, however, our safety and our family safety should go first, between technology being miss-used and abused by corporations and cyber-criminals data mining and checking for easy targets to attack for profit, we need to keep our guard up. Learning is key, resist the use of new tech if you do not understand the privacy trade offs, no matter how appealing and convenient it looks like. .</p>
</blockquote>
<p><em><strong>Please leave your comments with your favorite FOSS Files app!</strong></em></p>
]]></itunes:summary>
      <itunes:image href="https://yakihonne.s3.ap-east-1.amazonaws.com/35f3a26cd1e775ad16dad8cc8e8e9d48259fc8cb46230bc9663c812792ddf231/files/1697709516170-YAKIHONNES3.jpg"/>
      </item>
      
      <item>
      <title><![CDATA[Cyber Security - Unpopular opinion and some suggestions]]></title>
      <description><![CDATA[My suggestion, do your homework, acquiring cyber security skills needs reading, get on it, few tips in this article]]></description>
             <itunes:subtitle><![CDATA[My suggestion, do your homework, acquiring cyber security skills needs reading, get on it, few tips in this article]]></itunes:subtitle>
      <pubDate>Thu, 03 Aug 2023 23:39:32 GMT</pubDate>
      <link>https://rod.npub.pro/post/1691105453864/</link>
      <comments>https://rod.npub.pro/post/1691105453864/</comments>
      <guid isPermaLink="false">naddr1qqxnzd3exycnqdf5x5ensd35qgsrtuazdng7waddzmdd3nyw36w5sfvler95vgcte9nreqf8jtwlyvgrqsqqqa28ljqy7j</guid>
      <category>cybersecurity</category>
      
        <media:content url="https://cdn.nostr.build/i/24b760a3301bc0624971748bb55d68a2d497b4e73e77c2401c6006670797d13b.jpg" medium="image"/>
        <enclosure 
          url="https://cdn.nostr.build/i/24b760a3301bc0624971748bb55d68a2d497b4e73e77c2401c6006670797d13b.jpg" length="0" 
          type="image/jpeg" 
        />
      <noteId>naddr1qqxnzd3exycnqdf5x5ensd35qgsrtuazdng7waddzmdd3nyw36w5sfvler95vgcte9nreqf8jtwlyvgrqsqqqa28ljqy7j</noteId>
      <npub>npub1xhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcspt896x</npub>
      <dc:creator><![CDATA[rod ✪]]></dc:creator>
      <content:encoded><![CDATA[<p>Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That is you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doom....</p>
<p>IMO and experience, it is an exaggeration...</p>
<p>If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...</p>
<p>The truth is that basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.</p>
<p>And the tools they tell you that are not enough and therefore you are powerless actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.</p>
<p>My suggestion, do your homework, acquiring cyber security skills needs reading, get on it, few tips:</p>
<p>a. Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.</p>
<p>b. Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.</p>
<p>c. Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.</p>
<p>d. If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....</p>
<p>e. If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)</p>
<p>f. If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.</p>
<p>g. Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....</p>
<p>Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe.</p>
<hr>
<p>Fix the Money, fix the World</p>
<p>Use Bitcoin, be Unconfiscatable</p>
<p>Use Nostr, be Uncensorable</p>
<hr>
<p><a href='/tag/bitcoin/'>#Bitcoin</a></p>
<p>#LN ⚡</p>
<p>#ARK ⚡</p>
]]></content:encoded>
      <itunes:author><![CDATA[rod ✪]]></itunes:author>
      <itunes:summary><![CDATA[<p>Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That is you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doom....</p>
<p>IMO and experience, it is an exaggeration...</p>
<p>If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...</p>
<p>The truth is that basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.</p>
<p>And the tools they tell you that are not enough and therefore you are powerless actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.</p>
<p>My suggestion, do your homework, acquiring cyber security skills needs reading, get on it, few tips:</p>
<p>a. Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.</p>
<p>b. Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.</p>
<p>c. Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.</p>
<p>d. If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....</p>
<p>e. If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)</p>
<p>f. If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.</p>
<p>g. Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....</p>
<p>Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe.</p>
<hr>
<p>Fix the Money, fix the World</p>
<p>Use Bitcoin, be Unconfiscatable</p>
<p>Use Nostr, be Uncensorable</p>
<hr>
<p><a href='/tag/bitcoin/'>#Bitcoin</a></p>
<p>#LN ⚡</p>
<p>#ARK ⚡</p>
]]></itunes:summary>
      <itunes:image href="https://cdn.nostr.build/i/24b760a3301bc0624971748bb55d68a2d497b4e73e77c2401c6006670797d13b.jpg"/>
      </item>
      
      </channel>
      </rss>
    