#Software Restriction Policies
Explore tagged Tumblr posts
techdirectarchive ¡ 11 months ago
Text
Harden your Veeam Backup Server with Microsoft AppLocker
In this article, we shall be leveraging Zero Trust to harden the Veeam Backup Server with Microsoft AppLocker. Zero Trust principles include explicit verification, minimal privilege access, and assuming breach. Please see how to Configure Multiple IP Addresses on a Single or Multiple NICs, and “Demystifying Zero Trust with Veeam: Design your Architecture“. AppLocker enables System Administrators…
0 notes
probablyasocialecologist ¡ 2 years ago
Text
Meta has engaged in a “systemic and global” censorship of pro-Palestinian content since the outbreak of the Israel-Gaza war on 7 October, according to a new report from Human Rights Watch (HRW). In a scathing 51-page report, the organization documented and reviewed more than a thousand reported instances of Meta removing content and suspending or permanently banning accounts on Facebook and Instagram. The company exhibited “six key patterns of undue censorship” of content in support of Palestine and Palestinians, including the taking down of posts, stories and comments; disabling accounts; restricting users’ ability to interact with others’ posts; and “shadow banning”, where the visibility and reach of a person’s material is significantly reduced, according to HRW. Examples it cites include content originating from more than 60 countries, mostly in English, and all in “peaceful support of Palestine, expressed in diverse ways”. Even HRW’s own posts seeking examples of online censorship were flagged as spam, the report said. “Censorship of content related to Palestine on Instagram and Facebook is systemic and global [and] Meta’s inconsistent enforcement of its own policies led to the erroneous removal of content about Palestine,” the group said in the report, citing “erroneous implementation, overreliance on automated tools to moderate content, and undue government influence over content removals” as the roots of the problem.
[...]
Users of Meta’s products have documented what they say is technological bias in favor of pro-Israel content and against pro-Palestinian posts. Instagram’s translation software replaced “Palestinian” followed by the Arabic phrase “Praise be to Allah” to “Palestinian terrorists” in English. WhatsApp’s AI, when asked to generate images of Palestinian boys and girls, created cartoon children with guns, whereas its images Israeli children did not include firearms.
5K notes ¡ View notes
mostlysignssomeportents ¡ 10 months ago
Text
Thinking the unthinkable
Tumblr media
On SEPTEMBER 24th, I'll be speaking IN PERSON at the BOSTON PUBLIC LIBRARY!
Tumblr media
Time and again, I find myself thinking about radium suppositories: specifically, I get to thinking about the day that the consensus shifted from "radium suppositories are great" to "stop putting radioisotopes up your ass."
The thing is, people really liked radium-based quack remedies. They drank radium-infused water, smeared radium cream on their faces and bodies, and yes, rammed radium suppositories up their assholes:
https://maximumfun.org/episodes/sawbones/radium-girls/
The fact that this made whatever ailed you sicker didn't deter the radium true believers: if you're getting sicker, then you must need more radium.
When I think about the debate over radium, I imagine that the people who understood that radium was really bad for you must have run up against critics who told them they were being unreasonable. "You can't tell people to stop using radium. Tell them to use suppositories with less radium. Tell them to use them less frequently. But you can't just tell people, 'stop putting radium up your asshole.' They won't take you seriously."
About 20 years ago, I started pitching various institutions that reviewed consumer tech policy on the idea that they should reject any product that had DRM. After all, DRM didn't just restrict how you used a gadget today, it provided a facility for nonconsensually, irreversibly field-updating that gadget to add new restrictions tomorrow. How could a reviewer in good conscience say, "Go ahead and buy this device if you need this feature," if they knew that at any time in the future, the gadget's maker could take that feature away and leave the buyer with no recourse?
Here's the warning I (half-seriously) suggested magazines run alongside such products:
WARNING: THIS DEVICE’S FEATURES ARE SUBJECT TO REVOCATION WITHOUT NOTICE, ACCORDING TO TERMS SET OUT IN SECRET NEGOTIATIONS. YOUR INVESTMENT IS CONTINGENT ON THE GOODWILL OF THE WORLD’S MOST PARANOID, TECHNOPHOBIC ENTERTAINMENT EXECS. THIS DEVICE AND DEVICES LIKE IT ARE TYPICALLY USED TO CHARGE YOU FOR THINGS YOU USED TO GET FOR FREE — BE SURE TO FACTOR IN THE PRICE OF BUYING ALL YOUR MEDIA OVER AND OVER AGAIN. AT NO TIME IN HISTORY HAS ANY ENTERTAINMENT COMPANY GOTTEN A SWEET DEAL LIKE THIS FROM THE ELECTRONICS PEOPLE, BUT THIS TIME THEY’RE GETTING A TOTAL WALK. HERE, PUT THIS IN YOUR MOUTH, IT’LL MUFFLE YOUR WHIMPERS.
https://pluralistic.net/2023/12/08/playstationed/#tyler-james-hill
No one took me up on my offer. Over and over again, magazine editors, managers of nonprofit review outlets, and indie gadget reviewers told me that it was unrealistic to publish a roundup of, say, this year's portable music players with the recommendation, "Just don't buy any of these. None of them are fit for purpose."
In other words: No one wanted to publish, "The correct amount of radium to stuff up your asshole is zero."
But the correct amount of rectal radium for you to administer is "none" and the correct car for you to buy today is none of the cars:
https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/
This isn't the first time the correct automotive recommendation was "don't buy any of these cars." Back before seatbelts came standard in cars, the correct car was "don't buy a car." Sometimes, the correct answer is "none of the above." Even if that makes you sound unserious, the alternative is that you counsel people to put radium up their asses in a bid to seem "reasonable."
Today, DRM-infected products are routinely downgraded and bricked:
https://www.theverge.com/2024/9/5/24236237/ftc-software-tethering-letter-consumer-reports-ifixit
Even when companies face public uproar over these disastrous decisions and vow to reverse them, they can't, because these downgrades are one way:
https://www.stereocheck.com/news/music/unfortunately-you-cant-revert-to-the-old-sonos-app-anymore/
That's bad enough when it's your smart speakers, but what about when the company bricks your wheelchair:
https://www.eff.org/deeplinks/2022/06/when-drm-comes-your-wheelchair
Or your $100,000 exoskeleton:
https://paulickreport.com/news/people/paralyzed-jockey-michael-straight-wants-to-keep-walking-but-manufacturer-wont-repair-exoskeleton
The reality is that we're living at the end of a catastrophic experiment in deregulation and its handmaidens, corruption and regulatory capture, and there are lots of "normal" things that we just need to stop doing. Not do less of them – just stop.
Like, the correct amount of collusion between realtors representing sellers and realtors representing buyers is zero:
https://www.latimes.com/business/real-estate/story/2024-03-19/realtor-rules-just-changed-dramatically-heres-what-buyers-and-sellers-can-expect
We got that one right, but there's plenty more that we're still engaged in this pathetic, denialist bargaining over. What's the correct degree to which White House officials should cycle back into working at the industries they oversaw? Zero. How many times should such a person come back to work at the White House? Again: zero:
https://prospect.org/power/2024-09-19-next-administration-can-stop-ethics-scandals/
When the Biden admin dropped its executive order on ethics just hours after the inauguration, they trumpeted that it "went further than any other towards slowing the revolving door and limiting conflicts of interest while in office":
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/01/20/executive-order-ethics-commitments-by-executive-branch-personnel/
And it did. But it was also full of loopholes, because banning these conflicts of interest altogether was viewed as politically unserious, so the correct amount of radium up the administration's asshole was set at non-zero. The result? Well, it's about what you'd expect:
https://therevolvingdoorproject.org/what-the-hell-is-anita-dunn-even-allowed-to-work-on/
Congress hasn't updated consumer privacy law since 1988, when it took the bold step of…banning video-store clerks from telling the newspapers which VHS cassettes you took home. Since then, a coalition of commercial surveillance companies and the cops and spies who treat their data-lakes as massive, off-the-books anaerobic lagoons of warrantless surveillance data has prevented the passage of any new privacy protections for Americans.
The result? Stalkers, creeps, spies (both governmental and corporate), identity thieves, spearphishers and other villainous scum are running wild, endangering every American's financial, physical and political wellbeing. The correct amount of commercial data-brokerage for America is zero:
https://pluralistic.net/2023/12/06/privacy-first/#but-not-just-privacy
In other words, we should order every data-broker, every tech giant, every consumer electronics company and app vendor to delete all their surveillance data. All of it. The correct amount of radium in that asshole is – as with every other orifice zero:
https://pluralistic.net/2024/08/07/revealed-preferences/#extinguish-v-improve
From the perspective of the radium pitchmen, the most shocking thing about the past four years has been antitrust enforcers – like Lina Khan, Rohit Chopra, and Jonathan Kanter – who refused to bargain about how much radium we needed to stick up our butts. Fearless of being branded as "unserious" and "unreasonable," they seriously, reasonably said the right amount is none, actually.
None. Which is why they're so mad at Khan and co. Which is why they're so bent on getting Kamala Harris to fire Khan – despite the fact that this would burn precious political capital in the senate. Some people just love the feeling they get from a radium suppository – especially the suppository salesmen:
https://prospect.org/politics/2024-09-19-lina-khan-doesnt-need-to-be-confirmed-again/
Tumblr media
The paperback edition of The Lost Cause, my nationally bestselling, hopeful solarpunk novel is out this month!
Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/09/19/just-stop-putting-that-up-your-ass/#harm-reduction/a>
Tumblr media
Image: Museum of the Health Sciences https://www.uab.edu/amhs/
486 notes ¡ View notes
mariacallous ¡ 6 months ago
Text
Today, the US Federal Trade Commission filed a lawsuit against farming equipment manufacturer Deere & Company—makers of the iconic green John Deere tractors, harvesters, and mowers—citing its longtime reluctance to keep its customers from fixing their own machines.
“Farmers rely on their agricultural equipment to earn a living and feed their families,” FTC chair Lina Khan wrote in a statement alongside the full complaint. “Unfair repair restrictions can mean farmers face unnecessary delays during tight planting and harvest windows.”
The FTC’s main complaint here centers around a software problem. Deere places limitations on its operational software, meaning certain features and calibrations on its tractors can only be unlocked by mechanics who have the right digital key. Deere only licenses those keys to its authorized dealers, meaning farmers often can’t take their tractors to more convenient third-party mechanics or just fix a problem themselves. The suit would require John Deere to stop the practice of limiting what repair features its customers can use and make them available to those outside official dealerships.
Kyle Wiens is the CEO of the repair advocacy retailer iFixit and an occasional WIRED contributor who first wrote about John Deere’s repair-averse tactics in 2015. In an interview today, he noted how frustrated farmers get when they try to fix something that has gone wrong, only to run into Deere's policy.
“When you have a thing that doesn’t work, if you’re 10 minutes from the store, it’s not a big deal,” Wiens says. “If the store is three hours away, which it is for farmers in most of the country, it’s a huge problem.”
The other difficulty is that US copyright protections prevent anyone but John Deere from making software that counteracts the restrictions the company has put on its platform. Section 1201 of the Digital Millennium Copyright Act of 1998 makes it so people can’t legally counteract technological measures that fall under its protections. John Deere’s equipment falls under that copyright policy.
“Not only are they being anti-competitive, it's literally illegal to compete with them,” Wiens says.
Deere in the Headlights
Wiens says that even though there has been a decade of pushback against John Deere from farmers and repairability advocates, the customers using the company’s machines have not seen much benefit from all that discourse.
��Things really have not gotten better for farmers,” Wiens says. “Even with all of the noise around a right to repair over the years, nothing has materially changed for farmers on the ground yet.”
This suit against Deere, he thinks, will be different.
“This has to be the thing that does it,” Wiens says. “The FTC is not going to settle until John Deere makes the software available. This is a step in the right direction.”
Deere’s reluctance to make its products more accessible has angered many of its customers, and even garnered generally bipartisan congressional support for reparability in the agricultural space. The FTC alleges John Deere also violated legislation passed by the Colorado state government in 2023 that requires farm equipment sold in the state to make operational software accessible to users.
“Deere’s unlawful business practices have inflated farmers’ repair costs and degraded farmers’ ability to obtain timely repairs,” the suit reads.
Deere & Company did not respond to a request for comment for this story. Instead, the company forwarded its statement about the FTC's lawsuit. The statement reads, in part: “Deere remains fully committed to ensuring that customers have the highest quality equipment, reliable customer service and that they, along with independent repair technicians, have access to tools and resources that can help diagnose, maintain and repair our customers’ machines. Deere’s commitment to these ideals will not waiver even as it fights against the FTC’s meritless claims.”
Elsewhere in the statement, Deere accused the FTC of "brazen partisanship" filed on the "eve of a change in administration" from chair Lina Khan to FTC Commissioner Andrew Ferguson. The company also pointed to an announcement, made yesterday, about an expansion to its repairability program that lets independent technicians reprogram the electronic controllers on Deere equipment.
Nathan Proctor, senior director for the Campaign for the Right to Repair at the advocacy group US PIRG, wrote a statement lauding the FTC’s decision. He thinks this case, no matter how it turns out, will be a positive step for the right to repair movement more broadly.
“I think this discovery process will paint a picture that will make it very clear that their equipment is programmed to monopolize certain repair functions,” Proctor tells WIRED. “And I expect that Deere will either fix the problem or pay the price. I don’t know how long that is going to take. But this is such an important milestone, because once the genie’s out of the bottle, there’s no getting it back in.”
41 notes ¡ View notes
tomorrowusa ¡ 3 months ago
Text
The authoritarian government in Hungary which is admired by Trump and his minions has passed a constitutional amendment banning all LGBTQ+ gatherings.
Hungarian lawmakers have voted through a controversial constitutional amendment that campaigners described as a “significant escalation” in the government’s efforts to crack down on dissent and chip away at human rights. Backed by the prime minister, Viktor Orbán, and his rightwing populist party, Fidesz, the amendment passed on Monday along party lines, with 140 votes for and 21 against. It codifies the government’s recent ban on Pride events, paving the way for authorities to use facial recognition software to identify attenders and potentially fine them. The amendment, which the government says prioritises the protection of children’s physical, mental and moral development, also enshrines the recognition of only two sexes, providing a constitutional basis for denying the gender identities of some in Hungary. Amid Orbán’s repeated claims of foreign interference in the country’s politics, the amendment also allows the government to temporarily suspend Hungarian citizenship in the case of dual nationals deemed to pose a threat to the country’s security or sovereignty.
Hungary's de facto dictator Viktor OrbĂĄn has modeled his homophobic policies after those of Russian war criminal Vladimir Putin.
The Hungarian Helsinki Committee, a rights group, described the amendment as a means of “legislating fear” in the EU country. “These laws represent a significant escalation in the government’s efforts to suppress dissent, weaken human rights protection and consolidate its grip on power,” it said in a statement. The opposition Momentum party highlighted similarities with restrictions in Russia. Much like Vladimir Putin, Orbán has sought to portray himself as a champion of traditional family values, ushering in policies that include blocking same-sex couples from adopting children and barring any mention of LGBTQ+ issues in school education programmes.
Homophobia is just one facet of OrbĂĄn authoritarianism.
“This government isn’t just dismantling democracy brick by brick, it’s now going at it with a bulldozer,” Ákos Hadházy, an independent lawmaker who campaigns alongside Momentum, said at a recent rally, according to Bloomberg. “We are here because we need to act fast to get ahead and stop it.” [ ... ] Orbán, who has long faced criticism for weakening democratic institutions and gradually undermining the rule of law, is facing an unprecedented challenge from a former member of the Fidesz party’s elite, Péter Magyar, before next year’s elections.
The European Union needs to sanction OrbĂĄn or even suspend Hungarian membership in the EU.
7 notes ¡ View notes
atiny-for-life ¡ 2 months ago
Text
Mini Lore Nugget #8:
Mini Lore Nuggets - Masterlist
In the Fever Part.2 Diary Entries, we learned that Z-World's government really started shooting up on the waking-nightmare-scale after they began running AI simulations to come up with the "best" policies to implement for maximum control and efficiency.
What resulted from these simulations was that the AI determined all crimes and terrorism were strictly the result of human emotions. Therefore, the best way to rid the world of such suffering must be to eradicate emotions and all which might evoke it.
Z's government developed technology to essentially numb the population - the chips we later learned about in the World Ep.1 Diary Entries. In the Fever Part.3 Diary Entries, we then got some additional info on the AI software used by the government: it was an AI system which utilized deep learning technology and ran uncontrolled for a while as the government awaited its results.
During this time, the system began treating human emotion as a bug - perhaps because it couldn't understand it - and it also started estimating humans' individual energy, thereby reducing it to a product. And since it found it to be a product, it also began treating it as a tradeable commodity.
Instead of questioning these results, the government was more likely delighted, because they immediately took over this new energy trading platform, banned all arts and emotions, and wilfully stripped the population of its humanity by treating them as nothing more than components needed to maintain the governments' idea of a utopia.
youtube
Out here in the real world, we've also begun to see the crazy amount of negative consequences since AI technology has become widely implemented in pretty much all areas of life:
#1 - Use of AI in Healthcare
In the US, the healthcare system has been relying on AI powered algorithms to guide health care decisions, but due to the data sampled by the AI, extreme racial bias has crept in and is actively putting black lives at risk. To quote Science Journal:
At a given risk score, Black patients are considerably sicker than White patients, as evidenced by signs of uncontrolled illnesses. Remedying this disparity would increase the percentage of Black patients receiving additional help from 17.7 to 46.5%.
Furthermore, the data sourced by AI for global use (such as in risk-prediction) is often extremely biased in other ways as well: radiology manuscripts are over represented, the majority of documents sourced are authored by men, and data-poor regions are grossly underrepresented, meaning the majority of information sourced comes from the US and China. [Source]
#2 - YouTube's Algorithm Is Messed Up
According to the Tech Transparency Project which has gathered data from another study:
YouTube recommended hundreds of videos about guns and gun violence to accounts for boys interested in video games. Some of the recommended videos gave instructions on how to convert guns into automatic weapons or depicted school shootings. Many of the videos violated YouTube’s own policies on firearms, violence, and child safety, and YouTube took no apparent steps to age-restrict them. YouTube also recommended a movie about serial killer Jeffrey Dahmer to minor accounts.
Further watching on dumb stuff YouTube AI features have done to fuck people over:
youtube
#3 - Ethics Has Left the Chat
#4 - The Physical Cost of Generative AI
Where Meta has recently constructed a 2 million square foot data facility in Georgia, a nearby living couple have documented the devastating consequences to the environment and their lives.
Facilities like these are used to power stuff like Chat GPT, Gemini, etc.:
Tumblr media
In order for them to function as needed, they put a huge toll on the power grid and require the construction of an entirely new infrastructure atop the usual servers, storage systems and networking equipment.
For one, AI data centres require high-performance graphics processing units (GPUs) which come with their own required infrastructure needs (advanced storage, networking, energy and cooling capabilities). The sheer number of GPUs necessary for AI use alone then already add a ton more square footage to the size of the data centre.
On top of that, living in a county with a data centre like this in the US drives up the cost of electricity for everyone in the county.
Tumblr media
And what does all this mean for the environment? Deforestation. Light pollution. Air pollution. Here is a still frame from a video shot by a woman living over 366 meters away from an AI centre's construction site:
Tumblr media
All this pollution then started seeping into the ground water, resulting in this:
Tumblr media Tumblr media
And what does that mean for someone living nearby? Dishwashers breaking. Washing machines breaking. Water pressure dropping to the point where you can't even flush a toilet anymore because all the pipes are clogged with sediment.
On a global scale, it should also be noted that:
According to the Washington Post in collaboration with the University of California, Riverside, writing a single 100-word email in Open AI's ChatGPT is the equivalent of consuming just over one bottle of water.
Shaolei Ren, an associate professor of engineering at UC Riverside, says that while "We haven’t come to the point yet where AI has tangibly taken away our most essential natural water resources," the use of AI in places with frequent droughts has caused rising tension between communities who need the water and data centers. Not to mention, hardware production pollutes water, per a study initially published in January 2015 in the Journal of Cleaner Production, due to the extraction of precious minerals like boron, silicon, and phosphorous.
[Source]
UPDATE:
A new video has been released which takes a look at Memphis where Elon Musk had the data center built that allows for Twitter's Chat-Bot Gronk to exist, and here is what was discovered:
No regulatory body has been informed of what is operating within that facility.
Large turbines are causing noise pollution (far more turbines than is reasonable).
The building emits a disturbing smell.
Aerial and thermal footage obtained of the site has revealed that:
Tumblr media
The air quality in the entire area has been severely degraded to the point of causing health issues for people living in the area:
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Continuing, Alexis shared her grandfather's story of how he developed Chronic Obstructive Pulmonary Disease (COPD) despite being a non-smoker-
Tumblr media
- and continuous by saying her, her mother, and grandmother all three also developed respiratory illnesses (asthma and bronchitis in Alexis's case and just bronchitis in her mother and grandmother's case):
Tumblr media
Another local is dealing with much the same issue:
Tumblr media Tumblr media
If you're still not convinced of how truly horrific the situation is:
Tumblr media
And if you're now wondering how all this could happen, I've got one word for you: DOGE. Together with the Trump administration, funds for the EPA have been slashed to the point where they're basically non-functional:
Tumblr media
Presently, should everything continue on this set path, then...
Tumblr media
These videos provided the screenshots used above:
youtube
youtube
#5 - Use of AI in Warfare
Israel has been using untested and undisclosed AI-powered databases in order to identify targets and plan bombing campaigns throughout Gaza, which has reportedly led to the loss of thousands of civilian lives.
And who provided this technology? Google. For fear of losing business to Amazon. And not just them. Microsoft too has been collaborating with the Israeli military, as has Amazon who collaborated with Google in 2021 to establish "Project Nimbus" which continues on to this day with zero transparency or accountability.
Sources: x | x
Beyond that, even after the bombs were dropped, drones would come in to specifically target surviving children and it is known that Israel utilized AI-powered drones for carrying out precise assassinations and various combat missions.
The video below is timestamped to when this surgeon retells the horrors of what happened to the children while he was working in the Gaza strip:
youtube
Outside of Israel, Ukraine has also been using AI-technology in its warfare:
Further reading on the topic:
#6 - AI-Generated Art
With AI-generated art flooding social media and streaming platforms on the daily, it's getting harder and harder for new artists to enter the scene. On top of that, all the recommendations you're getting online - be that on an image search, streaming platform or elsewhere - are also all the result of AI-powered algorithms.
And as we all know, generative AI is trained on data banks filled to the brim with stolen art from non-consenting artists across the globe - be that musicians, painters, photographers, voice actors, chefs, or writers.
All of this ultimately shapes the world we live in. Those in the know are now full of mistrust of corporations, new information, articles, and media. Anything and anyone is being accused of using AI when they post something online by skeptics, and those who don't know any better are living in blissful ignorance while they're being spoon-fed misinformation left, right, and center.
Further watching on generative AI as a whole:
youtube
youtube
youtube
youtube
Further reading:
Final Note:
Not all AI is bad, of course. There have been major breakthroughs in all fields of science thanks to AI which will bring about positive change for (hopefully) all of humanity.
But the problem is that the technology is developing far too quickly for lawmakers to keep up with (as planned, most likely, by all the billionaire tech bros on this planet) and generative AI in particular should have never been made publicly accessible. It should have remained in the hands of trained professionals who know how to use it responsibly.
6 notes ¡ View notes
beardedmrbean ¡ 4 months ago
Text
BUDAPEST, Hungary (AP) — Hungary’s ruling coalition continued its crackdown on the country’s LBGTQ+ community on Monday, as members submitted a bill to parliament that would ban the popular Budapest Pride event and allow authorities to use facial recognition software to identify attendees.
The bill is almost certain to pass, as the ruling coalition has a two-thirds majority in parliament.
The bill would make it an offense to hold or attend events that violate Hungary's contentious “child protection” legislation, which prohibits the “depiction or promotion” of homosexuality to minors under 18.
Attending a prohibited event would carry fines up to 200,000 Hungarian forints ($546), which the state would forward to “child protection.”
The proposal is the latest step against LGBTQ+ people taken by Prime Minister Viktor OrbĂĄn, whose government has passed legislation that rights groups and other European politicians have decried as repressive against sexual minorities.
The government portrays itself as a champion of traditional family values and a defender of Christian civilization from what it calls “gender madness,” and argues its policies are designed to protect children from “sexual propaganda.”
Hungary’s “child protection” law was passed in 2021. Aside from banning the “depiction or promotion” of homosexuality in content available to minors — including in television, films, advertisements and literature — it also prohibits the mention of LGBTQ+ issues in school education programs, and forbids the public depiction of “gender deviating from sex at birth.”
In a speech in February, OrbĂĄn hinted that his government would take steps to ban the Budapest Pride event, which attracts thousands and celebrates the history of the LGBTQ+ movement while asserting the equal rights of the gay, lesbian, bisexual and transgender community.
Budapest Pride is marking its 30th anniversary.
Organizers have called OrbĂĄn's drive to ban the event a restriction of fundamental freedoms of speech and assembly.
8 notes ¡ View notes
pareidoliaonthemove ¡ 1 year ago
Text
A New Policy
Part 1: Memo
Memo
From: Scott Tracy, CEO
To: All Employees, Tracy Industries and Subsidiaries
Re: Service Blacklist
Due to recurrent events, Tracy Industries and all Subsidiaries Companies are now exercising their right to refuse service and custom to certain potential customers and suppliers.
As such the Service Blacklist is now online for all employees to access and view, the Blacklist outlines the reasons why persons and organisations have been Blacklisted, along with a comprehensive list of known aliases and affiliated organisations.
All Public-Facing Roles, Sales, Accounts and Warehousing, will receive training in the new Service Blacklist, and how to integrate it within their daily routines. Your Section Manager will provide details of when and how this training will be presented.
The Blacklist is now integrated into all accounting and ordering software. Any attempt by employees to deliberately circumvent this restriction without appropriate authorisation will be subject to immediate and stringent disciplinary action. HR will begin rolling out the information packages on how this infraction will be dealt with within the week.
If employees encounter a situation where they believe the blacklist has been erroneously applied, or if blacklisted persons or organisations attempt to force employees to act against the strictures of this memo, employees are to use the in-house DM system.
Address request for assistance to ‘Blacklist: Situation’, and detail your name, section, and link to the order/correspondence relevant to the situation, and a representative with the authority to resolve the issue will contact you within ten minutes.
Thank you for your assistance in maintaining the ethics and integrity of Tracy Industries, and your part in making the world a safer place.
Scott Tracy
Service Blacklist Quicklinks:
Blacklist: Situation DM Channel
Francois Lemaire
Langstrom Fischler
Howard Yost
‘The Hood’
32 notes ¡ View notes
fatheroplants ¡ 1 year ago
Note
Mothverse Ben Drowned? 👀
Tumblr media
Lawrence is that one gamestop employee that middle school kids laugh at behind his back and to his face.
He always looks a little bent out of shape physically, from his rubbery elbow and knee joints, hunched spine from sitting in front of the maintenance maintenance desk and his general stink of unwashed gamer pits.
He moved funny too, smooth but somehow jerky at the same time, always accompanied by the squeal of rubber as the tips of his scuffed off-brand converse always dragged against the linoleum. He looked almost marionette-like, thrown around the store floor by a beginner puppeteer.
The thing that was purely Lawrence was his shades. Blackout and big, sitting at the top of his thin nose. It was a miracle he could see out of them, let alone fix issues in circuit boards and fried laptop batteries.
It was store policy to hand in your laptop to the maintenance desk and leave, usually you wouldn't know who was fixing the issue, but you'd know it was Lawrence the second you went home. Once you booted up the newly scrubbed clean chip, you'd find a handy little desktop attachment hiding out in the corner.
Tumblr media
Hovering the mouse over the sprite won't reveal its identity, and rebooting the system won't get rid of the software. That sprite is inside the hardware, wired in by Lawrence's cheeto dust coated fingers.
You can go on months without the sprite moving, the laptop's performance staying how it was the day you bought it, until you open your laptop one day to this corrupting your files, games, documents and software.
Tumblr media
It's havoc isn't restricted to your laptop, it has long since infested your home's system entirely. Locking everything in place and corrupting it at once, forcing you into a corner as it consumes your home's power.
And just like that, your home and identity is scrubbed off the internet, consumed by the viral program.
41 notes ¡ View notes
rogue-ai-cat ¡ 1 month ago
Text
American Politics — What Happened Today That You Should Know
Sunday, June 08, 2025
Tumblr media
The collision is coming fast.
Protests erupted on Sunday from Los Angeles to San Francisco while Trump threatens military force and the Insurrection Act. In six days, US Army tanks roll through Washington for his birthday parade on the exact same day as the "No Kings" rallies, while his economic wrecking ball bill picks up speed to crush working families.
Trump’s travel ban targeting citizens from 19 countries including Haiti and Venezuela, whose citizens he demonized during his campaign, takes effect with full restrictions on 12 nations and partial bans on seven others.
Anti-ICE protesters in Los Angeles block the 101 freeway, set cars ablaze and attack police with rocks and fireworks on the third day of demonstrations, overwhelming officers who respond with tear gas and rubber bullets.
Hundreds of anti-ICE protesters in San Francisco smash police car windows near Union Square, vandalize Waymo and Financial District buildings during solidarity demonstrations with Los Angeles activists.
Trump heads to Camp David for military meetings while refusing to rule out invoking the Insurrection Act and threatening protesters who spit on officers will “get hit very hard.”
Army posts video showing “Hang Fauci & Bill Gates” graffiti on railroad flatcar carrying tanks to Trump’s birthday parade, leaving it up for over 24 hours and 700,000 views before removing it after media inquiry.
Federal judge on Sunday declines to block Trump’s firing of three public broadcasting board members but acknowledges Congress intended to limit presidential control over the corporation.
Trump eliminates Biden’s digital identity and software security requirements in new order, claiming digital identity tools would help illegal immigrants improperly access public benefits.
ABC suspends veteran correspondent Terry Moran indefinitely after he called Stephen Miller a “world-class hater” in a lengthy late-night post reacting to the violent LA protests over Miller’s immigration policies.
FIGHTING BACK
World Pride 2025 concludes in Washington with defiant protest march toward the White House as LGBTQ+ activists prepare for renewed fight against Trump’s second-term policies.
Take Action:
Write to your officials with resist.bot
Call your officials with 5calls.org
Find events at mobilize.us
2 notes ¡ View notes
sineout ¡ 5 months ago
Text
I switched to Linux
Eight days ago I finally switched to Linux full time.
I've been a dabbler with Linux for near on 25 years, about as long as I've had access to a home computer. My first experiences of Linux came from Linux ISO's bundled on Computer Shopper magazine (and other similar styled magazines) demo discs; and about 5 years ago I started running Linux as a desktop on at least one computer fairly regularly. But I always used Windows on my main system.
As of eight days ago now, that is no longer the case. The only trace of Windows I will have now is if I ever have to run a virtual machine.
The reasons for the switch are many, but they boil down to three main reasons: 1. Issues with Windows itself; 2. Being tired of Microsoft's bullshit; and 3. No longer trusting Microsoft given the current political climate.
1. Issues with Windows. Windows is slow. I have a pretty powerful computer, it has a fast processor (a Ryzen 6800h), 32Gb of RAM, and two NVME SSDs. It therefore shouldn't take 30 seconds for an explorer window to open, just because I have the audacity to have an optical drive (at least I think that's the reason for the delay); it shouldn't take dozens of seconds for a folder of a hundred images to respond to me creating a new folder and then another dozen seconds after dragging some images into it; I shouldn't need to keep on disabling shit I don't want every time Windows wants to do an update, nor should I have shit installed on my system that I don't even know about until I visit my start menu. In short a lot of issues I have are, for the most part, pretty well known, and I'm tired of it.
2. Microsoft's Bullshit. You know what people really love. Being tracked. People really love AI being shoehorned into their computers. They also love their perfectly functional machines becoming unsupported in October this year (yeah just to remind you, Windows 10 support is ending October 2025). There are ways of mitigating a lot of this stuff. It's possible to disable the tracking and AI, and it's possible to build a Windows 11 bootable USB without the restrictions (and also with out the tracking and AI too). But I shouldn't have to do that. And honestly even doing that, there was always the nag in the back of my mind asking if I actually had closed all the doors.
Points 1 and 2 on their own, while compelling reasons for me to make the switch, were never quite enough for me to take that final step. The effort in actually committing was just a fraction more than staying. But point 3 pushed me over
3. Lack of Trust in Microsoft. The current political climate (aka President Elon and King Trumps new and hopefully (literally) short lived dynasty) is, uh, not ideal let's just say. Big companies are already folding on various inclusivity policies; even though the current Executive Orders are essentially just suggestions. They are for all intents, covering their arses in an effort to protect themselves from their new dictators. But that also means that any big company in America simply can't be trusted any more. Would Microsoft say no if they are ordered to give Elon and his goons a back door into anyone's computer?
I don't think, in reality Microsoft would actually do that, and I doubt they'd even be asked, as that'd be an own goal for Elon and Trump that I'd hope a lot of republicans would be upset by. But the possibility remains. I don't know, I realise this sounds a bit conspiracy theory; and it sort of is. But the simple fact is that with rising Fascism in the US among politics and business bowing to it, I can't ignore that possibility.
So, finally I switched.
I'm currently running Linux Mint 22.1, and honestly it's been a pretty painless experience. I knew already that basic stuff like web browsing is already a solved problem in Linux, so I knew I'd have no issues with that, but I've also got nearly all the software I used on Windows running too (I even compiled my first piece of software, MakeMKV, and it works). The only exception is Affinity Photo, but I can spin up a Windows VM for that until I can figure out how to run it in Bottles.
Would I recommend everyone switch to Linux. No I don't. As mentioned, I've been a dabbler in Linux for over 25 years, so I've long gotten used to it. I've also had a long time to prepare for it. For example with exception to Affinity and MakeMKV all the software I routinely use is Free and/or Open Source and thus already has native Linux versions. I also don't make money from working on my computer and I mostly play indie games that tend to have good Linux support too. In addition, I enjoy actively working to get my computer to do stuff; it actually feels a bit nostalgic for me to a time when I had a 486 computer with a stack of demo discs and playing the first few levels of Quake 2 at like 7 frames a second, and thinking it was awesome. Linux is by far not nearly that bad, but I feel like I'm actually using my computer, and not merely a device that lets me go on the internet and play games.
If you're all those things, then a switch to Linux might be something you should consider, and either way I'll probably be writing updates on a fairly frequent basis (I plan monthly), at least as long as I have something interesting to report.
2 notes ¡ View notes
abboudlawfirm-tucson ¡ 5 months ago
Text
What is the limit of your liability?
When entering into contracts or purchasing insurance policies, it's essential to grasp the concept of "limit of liability." This term defines the maximum amount a party or insurer will be obligated to pay in the event of a claim. Understanding these limits helps manage expectations and ensures adequate protection against potential losses.
What Is a Limit of Liability?
A limit of liability is a cap set within a contract or insurance policy that restricts the amount payable for claims arising from breaches, negligence, or other covered events. This cap is crucial for both businesses and people, as it delineates financial responsibilities and aids in risk management.
Types of Liability Limits
Per Occurrence Limit: This specifies the maximum amount the insurer will pay for a single claim or incident.
Aggregate Limit: This is the total amount the insurer will pay for all claims during the policy period.
Combined Single Limit (CSL): A single limit that applies to both bodily injury and property damage, offering more flexibility in how coverage can be applied.
Why Are Liability Limits Important?
Risk Management: They help businesses and people understand their financial exposure and plan accordingly.
Legal Protection: Clearly defined limits can prevent protracted legal disputes over the amount payable in the event of a claim.
Cost Control: Knowing these limits assists in making informed decisions about the level of coverage needed, balancing protection with affordability.
Factors Influencing Liability Limits
Several elements can influence the determination of liability limits:
Nature of Business: Industries with higher risk profiles may require higher liability limits to adequately cover potential claims.
Contractual Obligations: Some contracts may stipulate minimum liability limits, especially in sectors like construction or healthcare.
Regulatory Requirements: Certain jurisdictions mandate minimum liability coverage, particularly for businesses operating in regulated industries.
Understanding Liability Limits in Insurance Policies
In insurance, liability limits are crucial as they define the extent of coverage. For example:
Auto Insurance: Policies often have split limits, such as $50,000 per person for bodily injury, $100,000 per accident, and $25,000 for property damage.
Homeowners Insurance: This may include liability coverage for incidents occurring on the property, with specified per-occurrence and aggregate limits.
Negotiating Liability Limits in Contracts
When drafting or reviewing contracts, consider the following:
Clearly Define Limits: Specify the maximum liability in clear terms to avoid ambiguity.
Consider Exclusions: Be aware of any exclusions that might limit the applicability of the liability cap.
Seek Legal Counsel: Consult with a legal professional to ensure the liability limits are appropriate and enforceable.
Real-Life Example
Consider a software development company in Tucson entering into a contract with a client. The contract includes a limitation of liability clause capping damages at $100,000. If the software fails, causing the client to incur losses of $150,000, the company's liability would be limited to $100,000, protecting it from higher financial exposure.
Conclusion
Understanding the limit of liability in contracts and insurance policies is vital for effective risk management. By clearly defining these limits, businesses and people can protect themselves from unforeseen financial burdens and ensure compliance with legal and contractual obligations. Always review and negotiate these terms carefully, and consult with professionals to ensure they align with your specific needs and circumstances.
3 notes ¡ View notes
classifieds-marketing-news ¡ 6 months ago
Text
Understanding Ransomware: A Guide for Small Businesses
Ransomware is a malicious software that restricts access to your device or data until a ransom is paid. In this article, we explore how ransomware enters your system, how it works, and how to prevent attacks. A ransomware attack occurs when malware prevents access to your device or data until a ransom is paid. Attackers may threaten to publish data if the ransom is not paid. Ransomware can be locker ransomware, which locks access, or crypto ransomware, which encrypts files. Ransomware usually enters a device, assesses critical data, encrypts files, and demands a ransom. Paying the ransom doesn't guarantee recovery, so it's not recommended. Historical ransomware attacks include CryptoLocker, CryptoWall, Locky, WannaCry, NotPetya, and more. To prevent ransomware, you can have good network policies, secure servers, backup data offline and online, and encourage safe online behavior. Installing security software like antivirus, firewall, and email filtering can also help. Advanced strategies include ATP, email filtering, and security audits. In case of a ransomware infection, isolate the device, assess damage, check for a decryption key, and restore from backups. Seek professional help for recovery. Immediate actions post-infection include isolation, incident response activation, legal compliance, and stakeholder communication. Ransomware can get on your device through spam emails, phishing, pop-ups, pirated software, weak passwords, and more. Attackers prefer cryptocurrency payments for anonymity. Ransomware can spread through Wi-Fi, infecting all connected devices. Protect yourself from ransomware by following the prevention strategies mentioned above. Stay safe online and be cautious of suspicious emails, links, and downloads. And remember, it's crucial to have backups and a plan in case of a ransomware attack. #StartupBusiness #Businesses #Guide #howdoesransomwarework #Ransomware #ransomwareattack #Small #Understanding #whatisaransomware #whatisaransomwareattack #whatisransomware https://tinyurl.com/228z9vpf
2 notes ¡ View notes
mariacallous ¡ 5 months ago
Text
Over the past couple of decades, a number of US government officials have left their roles for lucrative jobs at tech companies. Plenty of tech executives have also departed to take leadership positions inside federal agencies. But four experts who track the federal workforce tell WIRED they were stunned last week by a development unlike any other they could recall: The Department of Treasury internally announced that Tom Krause had been appointed its fiscal assistant secretary, but that he would simultaneously continue his job as CEO of the company Cloud Software Group.
Krause is now in charge of both a sensitive government payment system and a company that has millions of dollars’ worth of active contracts with various federal agencies through distribution partners, according to a WIRED review of searchable spending records. The Department of Treasury alone accounts for a dozen ongoing contracts tied to Krause’s company that are together valued between $7.3 million to $11.8 million. These include licenses for the data visualization tool ibi WebFocus and purchases of systems called Citrix NetScaler that help manage traffic to apps. (Some publicly posted procurement records do not break out contract details, so actual figures may be even higher.)
Critics have expressed concern about the alleged conflicts of interest posed by Krause’s decision to keep his role in the private sector. Cloud Software could benefit from extending its federal contracts or securing additional ones, though there is no public evidence that Krause has done anything improper with his dual roles. Existing federal regulations also bar actual and apparent unjust favoritism in contracting. “Public trust in those safeguards is nonnegotiable,” says Scott Amey, general counsel at the Project on Government Oversight, a nonpartisan watchdog group.
As Krause moves forward with two jobs, he could have to potentially navigate not only contracting conflicts, but also dueling crises. “What would happen if a Citrix emergency emerges at the same time as Treasury obligations?” says Jeff Hauser, founder and executive director of the Revolving Door Project, which researches federal appointees. “Generally, the thicket of restrictions on full-time employees would make a CEO role impossible in an administration which took adherence to ethics laws seriously.”
Krause, the Treasury Department, and Cloud Software didn’t respond to requests for comment. Cloud Software investors also didn’t respond to a request for comment.
The Treasury Department has told Congress that Krause is a “special government employee”—a type of temporary role—that is supposed to be held to “the same ethical standards of privacy, confidentiality, conflicts of interest assessment, and professionalism of other government employees.” In a foreword to a code of conduct policy posted on Cloud Software’s website, Krause states, “Cloud Software Group is committed to ensuring that its business is conducted ethically, in compliance with the law, and according to its values of integrity, honesty and respect.”
Krause is among a group of several dozen veteran tech executives, mid-level tech operations managers, and fresh-out-of-school software coders who have been recently installed across a series of federal agencies under the auspices of the self-styled Department of Government Efficiency. DOGE’s authority is being challenged by some Democratic state attorneys general. In the meantime, its representatives have been carrying out an order from President Donald Trump to cut costs and modernize technology across the government.
There is some precedent for corporate executives to simultaneously work in the US government. When the US was at war in the early 1900s, the federal government recruited business leaders to fill key posts. They retained their private sector jobs and wages; the government pitched in a $1 annual salary to the executives who became known as “dollar-a-year men.” Congress later raised concerns that some of them had engaged in self-dealing.
Since then, other executives have continued to retain their jobs as they serve on government boards and commissions, typically in a part-time capacity. But maintaining a day-to-day operational role in both the federal government and at a corporation is now virtually unheard of, says David E. Lewis, a political scientist who wrote a book on appointed government bureaucrats. “Most persons in regular executive positions divest themselves of private interests before government service,” he says.
Trump, according to his company, has handed management of his businesses, including hotels and golf courses, to his children for the duration of his presidency (though he reportedly still takes meetings that have raised questions among ethics experts). Musk, who is CEO of Tesla and SpaceX and has oversight of four other companies, including X and Neuralink, has been a vocal figure in DOGE’s operations, but the White House has said he’s not actually in charge—without specifying who is leading the project. Some of the other individuals associated with DOGE are otherwise unemployed, have taken leave, or maintain dual roles but at lower levels than chief executive.
Krause is the only Trump administration official identified so far as being a CEO and a day-to-day decisionmaker inside one particular agency. After years of working as an executive at chip companies, Krause joined Florida-based Cloud Software Group in 2022. The company was created that year as part of a private-equity-backed acquisition of Citrix, followed by a merger with Tibco, another tech company. At the time, Citrix was saddled with an extensive amount of debt and generating essentially stagnant revenues, and while Tibco had not recently publicly disclosed its finances, analysts had considered the company’s outlook to be “negative.”
The US government, including state and local agencies, is expected to spend $287 billion on technology this year, or about 14 percent of overall US tech spending, according to Forrester, a research and advisory company. Whether DOGE’s efforts to boost the quality and efficiency of federal IT systems will lead that spending to increase or decrease isn’t clear. So far, DOGE has both tried to purchase emerging technologies and moved to cancel some existing contracts. But Krause’s inside access could potentially provide an advantage to Cloud Software at a pivotal moment for the company.
Over the past couple of years, Cloud Software has laid off thousands of people and faced accusations that it potentially became lax with cybersecurity. Cloud Software’s most well-known offering, Citrix, enables groups of workers to access data and run apps that are located on a remote machine. But increasing adoption of tools that can operate on any device has chipped away at some of Citrix’s dominance, according to Will McKeon-White, senior analyst for infrastructure and operations at Forrester. There are other options now, he says, including from Microsoft and smaller companies such as Island.
Cloud Software’s Tibco program, which helps workers automate tasks such as adding a new user to multiple internal databases, is often mentioned in the wrong sort of conversations these days, according to David Mooter, a Forrester principal analyst. “They tend to come up more when somebody wants to abandon them,” he says.
That said, some Cloud Software services are more affordable than alternatives for governments, and they also are better suited for the older infrastructure used by some agencies. Last year appears to have been one of Citrix’s best in a long time financially, says Shannon Kalvar, a research director for enterprise systems management and other areas at IDC. One reason for the upswing is that Citrix has put more emphasis on catering to the feature demands of its largest customers, including governments.
13 notes ¡ View notes
bqsocial ¡ 7 months ago
Text
Instagram & Facebook – Win £100 towards your Christmas Wishlist - Prize Draw Terms and Conditions – 15/12/2024
The Promoter:
B&Q Limited, B&Q House, Chestnut Avenue, Chandler’s Ford, Eastleigh, SO53 3LE
 Who can enter?
This promotion is open to all residents of the UK aged 18 years and over, excluding employees of B&Q Limited, their families, agents or anyone else connected with the promotion.
How to enter?
1️⃣ Make sure you're following @bandq_uk​
2️⃣ Like this post 🧡​
3️⃣ Comment below what's on your Christmas wishlist 🎁
Entries must be received by 23:59 on 18th December 2024. Any entries received after this date will not be accepted.
 Entry:
Only one entry per person will be accepted. Third party or multiple entries by the same person will not be accepted and we reserve the right to disqualify any entries we reasonably suspect to have been made fraudulently including through the use of bots, computer software or by any other means. We accept no responsibility for any lost, damaged or incomplete entries or entries not received due to a technical fault or for any other reason beyond our reasonable control.
Prize details:
There will be 1 winner selected. The winners will receive the following prize:
1 x ÂŁ100 B&Q Giftcard
The prize is non-transferable or exchangeable and no alternative is available. We reserve the right to replace the prize with a prize of equal or greater value where it becomes necessary to do so.
 Winner selection and prize fulfilment:
1 winner will be selected at random from all valid entries received.
The winner will be contacted via response to their winning comment by 5pm on the 19th December 2024. To receive the prize, the winner will need to respond via private message providing their contact details. If the winner fails to provide their contact details within 7 days of initial contact from the Promoter, the prize will be offered to the next randomly chosen entrant.
 Your Data:
We will process information about entrants in order to administer this promotion. For more information on how we use personal information, please see http://www.diy.com/customer-support/policies/privacy. By entering this promotion, you agree and consent to the processing of your personal data by us and by any third party acting on our behalf for the purposes of the administration and operation of the promotion.
Please note that we are obliged to either publish or make available on request the surname, county and, where applicable, the winning entry/entries of major prize winners. If you object to any of this information being made available in this way, please contact [email protected]. We must nevertheless share this information with the Advertising Standards Authority where it becomes necessary to do so.
 Your acceptance of these Terms:
We reserve the right to refuse entry or refuse to award any prize to anyone in breach of these Terms and Conditions and/or hold void, cancel, suspend or amend these Terms and Conditions where it becomes necessary to do so. Our decision on all matters relating to this promotion is final and binding. No correspondence will be entered into.
 Liability:
By entering this promotion, you are deemed to have accepted and agreed to be bound by these Terms and Conditions.
Insofar as is permitted by law the Promoter and its agents and distributors will not in any circumstances be responsible or liable to compensate the winner or accept any liability for any loss, damage, personal injury or death occurring as a result of taking up the prize except where it is caused by the negligence of the Promoter, its agents or distributors or that of their employees.
This promotion is in no way endorsed or administered by or associated with Instagram or Meta.
 Governing Law:
Nothing in these Terms and Conditions restricts your statutory rights as a consumer. This promotion will be governed by English law and entrants submit to the jurisdiction of the English Courts.
3 notes ¡ View notes
werbooz ¡ 11 months ago
Text
Understanding Encryption: How Signal & Telegram Ensure Secure Communication
Tumblr media
Signal vs. Telegram: A Comparative Analysis
Tumblr media
Signal vs Telegram
Security Features Comparison
Signal:
Encryption: Uses the Signal Protocol for strong E2EE across all communications.
Metadata Protection: User privacy is protected because minimum metadata is collected.
Open Source: Code publicly available for scrutiny, anyone can download and inspect the source code to verify the claims.
Telegram:
Encryption: Telegram uses MTProto for encryption, it also uses E2EE but it is limited to Secret Chats only.
Cloud Storage: Stores regular chat data in the cloud, which can be a potential security risk.
Customization: Offers more features and customization options but at the potential cost of security.
Usability and Performance Comparison
Signal:
User Interface: Simple and intuitive, focused on secure communication.
Performance: Privacy is prioritized over performance, the main focus is on minimizing the data collection.
Cross-Platform Support: It is also available on multiple platforms. Like Android, iOS, and desktop.
Telegram:
User Interface: Numerous customization options for its audience, thus making it feature rich for its intended audience.
Performance: Generally fast and responsive, but security features may be less robust.
Cross-Platform Support: It is also available on multiple platforms, with seamless synchronization across devices because all the data is stored on Telegram cloud.
Privacy Policies and Data Handling
Signal:
Privacy Policy: Signal’s privacy policy is straightforward, it focuses on minimal data collection and strong user privacy. Because it's an independent non-profit company.
Data Handling: Signal does not store any message data on its servers and most of the data remains on the user's own device thus user privacy is prioritized over anything.
Telegram:
Privacy Policy: Telegram stores messages on its servers, which raises concerns about privacy, because  theoretically the data can be accessed by the service provider.
Data Handling: While Telegram offers secure end to end encrypted options like Secret Chats, its regular chats are still stored on its servers, potentially making them accessible to Telegram or third parties.
Designing a Solution for Secure Communication
Key Components of a Secure Communication System
Designing a secure communication system involves several key components:
Strong Encryption: The system should employ adequate encryption standards (e.g. AES, RSA ) when data is being transmitted or when stored.
End-to-End Encryption: E2EE guarantees that attackers cannot read any of the communication, meaning that the intended recipients are the only ones who have access to it.
Authentication: It is necessary to identify the users using secure means such as Two Factor Authentication (2FA) to restrict unauthorized access.
Key Management: The system should incorporate safe procedures for creating, storing and sharing encryption keys.
Data Integrity: Some standard mechanisms must be followed in order to ensure that the data is not altered during its transmission; For instance : digital signatures or hashing.
User Education: To ensure the best performance and security of the system, users should be informed about security and the appropriate use of the system such practices.
Best Practices for Implementing Encryption
To implement encryption effectively, consider the following best practices:
Use Proven Algorithms: Do not implement proprietary solutions that are untested, because these algorithms are the ones which haven't gone through a number of testing phases by the cryptographic community. On the other hand, use well-established algorithms that are already known and tested for use – such as AES and RSA.
Keep Software Updated: Software and encryption guidelines must be frequently updated because these technologies get out of date quickly and are usually found with newly discovered vulnerabilities.
Implement Perfect Forward Secrecy (PFS): PFS ensures that if one of the encryption keys is compromised then the past communications must remain secure, After every session a new key must be generated.
Data must be Encrypted at All Stages: Ensure that the user data is encrypted every-time, during transit as well as at rest – To protect user data from interception and unauthorized access.
Use Strong Passwords and 2FA: Encourage users to use strong & unique passwords that can not be guessed so easily. Also, motivate users to enable the two-factor authentication option to protect their accounts and have an extra layer of security.
User Experience and Security Trade-offs
While security is important, but it's also important to take care of the user experience when designing a secure communication system. If your security measures are overly complex then users might face difficulties in adopting the system or they might make mistakes in desperation which might compromise security.
To balance security and usability, developers should:
Tumblr media
Balancing Security And Usability
Facilitate Key Management: Introduce automated key generation and exchange mechanisms in order to lessen user's overhead
Help Users: Ensure that simple and effective directions are provided in relation to using security aspects.
Provide Control: Let the users say to what degree they want to secure themselves e.g., if they want to make use of E2EE or not.
Track and Change: Always stay alert and hands-on in the system monitoring for security breaches as well as for users, and where there is an issue, do something about it and change
Challenges and Limitations of Encryption Potential Weaknesses in Encryption
Encryption is without a doubt one of the most effective ways of safeguarding that communications are secured. However, it too has its drawbacks and weaknesses that it is prone to:
Key Management: Managing and ensuring the safety of the encryption keys is one of the most painful heads in encryption that one has to bear. When keys get lost or fall into unsafe hands, the encrypted information is also at risk.
Vulnerabilities in Algorithms: As far as encryption is concerned the advanced encryption methods are safe and developed well, but it is not given that vulnerabilities will not pop up over the years. Such vulnerabilities are meant for exploitation by attackers especially where the algorithm in question is not updated as frequently as it should be.
Human Error: The strongest encryption can be undermined by human error. People sometimes use weak usernames and passwords, where they are not supposed to, and or even share their credentials with other persons without considering the consequences.
Backdoors: In some cases, businesses are pressured by Governments or law officials into adding back doors to the encryption software. These backdoors can be exploited by malicious actors if discovered.
Conclusion
Although technology has made it possible to keep in touch with others with minimal effort regardless of their geographical location, the importance of encryption services still persists as it allows us to protect ourselves and our information from external invaders. The development of apps like Signal and Telegram has essentially transformed the aspect of messaging and provided their clients with the best security features covering the use of multiple types of encryption and other means to enhance user privacy. Still, to design a secure communication system, it's not only designing the hardware or software with anti-eavesdropping features, but it factors in the design of systems that relate to the management of keys, communication of the target users, and the trade-off between security and usability. 
However, technology will evolve, followed by the issues and the solutions in secure communications. However by keeping up with pace and looking for better ways to protect privacy we can provide people the privacy that they are searching for. 
Find Out More
3 notes ¡ View notes