#Mobile encryption
Explore tagged Tumblr posts
shortstoryinenglish · 2 years ago
Text
Mobile Device Security: Protecting Your Digital Life On the Go - Cybersecurity Resource
bit.ly/47jNZfw
0 notes
nando161mando · 5 months ago
Text
If you don't have Signal installed on your phone, please fix that.
You may not need the security for yourself, but someone you talk to will.
Everyone needs to have it. ⚧️
https://signal.org/
4 notes · View notes
report360uk · 3 months ago
Text
Tumblr media
Awesome! Scope's Quantum Security Mobile App Secures Funding Scope Technologies secures $1.5M to accelerate its QSE quantum security mobile app. Offering advanced, user-friendly quantum-resistant encryption and secure file sharing.
Read more
0 notes
dhirajmarketresearch · 7 months ago
Text
Tumblr media
0 notes
techminddevelopers · 7 months ago
Text
Building Secure Software with Tech Mind Developers
Tumblr media
In today’s world, secure software development is more essential than ever. Every day, companies are faced with the challenge of protecting their systems, data, and users from online threats. At Tech Mind Developers, we understand that security is a priority for businesses of all sizes. We ensure that our software solutions are not only effective but also highly secure, offering peace of mind to our clients.
Why Secure Software Development Matters
Cyber threats are becoming increasingly complex. From data breaches to unauthorized access, businesses need strong protection to safeguard their sensitive information. Secure software development practices help prevent these risks by integrating security measures right from the start of the software development process. This means fewer vulnerabilities and a more reliable system.
How Tech Mind Developers Builds Secure Software
At Tech Mind Developers, we follow the best practices in secure software development to deliver solutions you can trust:
Security by Design: We design software with security in mind from day one, ensuring that all components are built with protection in place.
Regular Testing: To keep your software resilient, we conduct regular tests, identifying and fixing vulnerabilities early on.
Data Encryption: Protecting data is crucial. We implement strong encryption protocols, keeping sensitive information safe from unauthorized access.
Access Control: We create layers of access control, so only authorized individuals can interact with specific parts of your software.
Updates and Maintenance: Security needs are constantly changing. Our team provides regular updates and maintenance to keep your software up-to-date and resilient against new threats.
Benefits of Secure Software Development for Your Business
Protect Customer Data: Secure software helps protect your customers’ personal information, boosting their trust in your business.
Prevent Financial Losses: Avoid the cost of dealing with security breaches and recover faster from potential threats.
Boost Brand Reputation: A secure software system reflects positively on your brand, showing customers that their safety matters to you.
Ensure Compliance: We help you stay compliant with industry regulations and data protection standards, keeping your business protected from legal issues.
Choose Tech Mind Developers for Secure Solutions
Whether you need software for e-commerce, healthcare, finance, or any other industry, Tech Mind Developers is here to deliver secure solutions tailored to your specific needs. Our team ensures that security measures are embedded in every layer of your software, providing you with a safe, effective, and user-friendly experience.
Contact Us
Ready to make your software more secure? Get in touch with Tech Mind Developers to learn how we can help protect your business with secure software development.
📞 Phone: +91–7835019421 ✉️ Email: [email protected] 🌐 Website: https://www.techminddevelopers.com/
#securesoftwaredevelopment #techminddevelopers #dataprotection #cybersecurity #softwaresecurity #encryption #safeandsecure #businessprotection #itsecurity #digitaltransformation
0 notes
robotstechnology · 8 months ago
Text
Tumblr media
0 notes
techdriveplay · 9 months ago
Text
Understanding the Difference Between 4G and 5G Networks
As our reliance on mobile connectivity grows, so does the need for faster, more efficient networks. Understanding the difference between 4G and 5G networks is crucial as 5G technology becomes more widely available, promising to revolutionise how we interact with the digital world. From browsing the web to powering autonomous vehicles and smart cities, 5G is set to offer significant advancements…
0 notes
rubengrey · 11 months ago
Text
Maintaining Robust Security In Flutter Mobile Apps
Tumblr media
In the data driven fast paced era of technology, everything has a security aspect to it that cannot be overlooked. The amount of apps being made today on the Flutter framework might even seem almost insane, but mobile apps comprise most of the game here.
As of recent data, Flutter has totally surpassed other frameworks to become the number one framework to build mobile apps. With about 46% of software developers rooting for Flutter, there is no question about the indispensableness of the Flutter framework. But here’s one aspect that can help you make your apps more reliable: robust security.
Security is one facet in mobile app development that cannot be ignored; and it is also what makes any app stand apart from the rest. Since it garners more trust from the user end, especially for apps that involve storing critical information, any software developer, or mobile apps development agency spends a huge chunk of their time on the security aspect of mobile apps.
Whether you are a freelance software developer, or leverage custom app development services from time to time, this blog will give you a deeper insight into the security side of app development on the Flutter framework.
The Importance Of Building A Secure Fortress Of An App
Tumblr media
Security is one of the biggest priorities when developer teams are creating mobile apps. Sensitive information related to many things like finances, contact information, personal health, as well as health issues can be used against users.
Since most apps nowadays store at least one of these types of information, it becomes imperative to set strong guard walls to avoid any data breaches. A strongly secure app also encourages the user to engage more freely with the app. This means that user trust has been earned, and your app can organically bring in more users based on this trust as well.
Secure mobile apps also guarantee compliance with data privacy regulations (depending on regions and countries) as well. If there are, indeed, data breaches because of a lax attitude on the security front of the mobile app, there is bound to be repercussions - at the least, hefty fines to be paid.
Consequences Of Neglecting Security
A security neglect is a foolish play, in any arena, and custom app development services are no exception. Security breaches and data leaks aren’t just headlines anymore, they cost - a lot. According to a study done by IBM last year, the global average cost of a data breach had surmounted up to $4.45 million.
While the numbers definitely are daunting, all of it is accompanied by a loss of user trust. This leads to a belief that users might abandon the app if there are issues related to data and security. This paints a crystal clear picture: that security isn’t just a feature, it is actually a business imperative.
Flutter: A Security Darling
Tumblr media
Let's first recognize the security benefits that come with Flutter. Flutter provides a single codebase for various platforms, in contrast to native app development, where vulnerabilities might arise from platform-specific peculiarities (iOS and Android). As a result, there is less room for assault and less chance of exploitation.
Furthermore, Flutter uses the Dart programming language, renowned for its robust typing system and garbage collection (which ensures clean efficiency).
These features help to guard against memory leaks and buffer overflows, which are frequent security flaws in other languages. No matter how performant your app is across different platforms, if it isn’t secure, it isn’t reliable, and cannot win user trust.
Easy Steps For Ensuring Your Flutter App Is Reliable And Secure
Tumblr media
Here are a few ways how you can make sure that your Flutter mobile app is secure, reliable, and isn’t prone to data breaches.
1. Security Measures For Cross-Platform Devices
Certain security measures cannot be used on both iOS and Android devices due to their inherent differences. As a result, it's critical to comprehend how the two differ from one another and concentrate on the specific metrics that will matter most for each platform.
One easy way to go about this would be to include multi platform measures to build a Flutter mobile app. This way, you can recognise and make sure that your mobile app development agency is focusing on the right sensitive points in the app.
2. Encryption For Extended Protection
Mobile app development using Flutter allows encryption of most data that needs to be stored on the app or device. This encryption can take care of two aspects - privacy, as well as data encryption to avoid any kind of breaches.
This enables only authorized users to access the data, as well as prevents any misuse of data by an attacker - because of the encryption.
3. Reliability Check
The new app must be tested in a variety of situations and scenarios to make sure it is as dependable as possible. Testing every codebase, new feature, cross-platform screen reader, debug mode setup, user interface model, etc can guarantee an understanding of how well the app can perform in different scenarios.
This also includes testing for stability and performance in both virtual and real-world settings, in order to find any possible problems or faults before the app is made public.
4. Background Protection
Our ability to access data and information while on the go has greatly improved convenience thanks to mobile devices. However, there is always a possibility of security risks associated with this convenience - such as the possibility that the task -switcher feature might unintentionally divulge confidential data.
Thankfully, developers can address this problem by using the secure_application package in their mobile apps, allowing users to feel secure, knowing that their data is safe, without having to sacrifice the mobile app's usability.
5. Monitoring App Performance
Since Flutter's architecture prioritizes efficiency, developers already know that their apps are performant. But it does make sense to test it for themselves a few times.
Setting up application performance monitoring is a great way to address that. A number of application performance monitoring tools are available to identify any problems or lags that might occur when using the app; this can help to swiftly and effectively identify any issue areas, and tackle them immediately.
6. Regular App Updates With Latest Security Patches
No matter how feature-rich your quick apps are, you still need to update them frequently since things change, just like anything else.
Flutter does give developers this benefit of regular updates with security patches along with bug fixes. To ensure that your Flutter mobile apps are reliable and secure, keep them updated, check for any further issues within the app, and ensure to always check for latest updates as they become available. This is also one way to stay in the game.
7. Third-party Libraries For Extra Security
For developers providing custom mobile app development services using Flutter, third-party libraries are extremely helpful since they frequently aid in accelerating development and enhancing app security.
Flutter apps can benefit from an additional security layer provided by a range of third-party libraries, which range from analytics services to authentication solutions.
However, these third-party libraries also need extra access or permissions for both iOS and Android projects. To ensure that a new library complies with the platform's policies, thorough tests should be done before adding it to the codebase.
8. Authentication
Speaking of security, depending on the kind of app you are building, Flutter mobile apps may need a certain amount of authentication. Tokens and passwords are two of the most used techniques used to guarantee user data security.
While two-factor authentication is the norm in development environments, you might want to think about implementing it for your Flutter application as well. This will enable your potential users to enjoy an additional degree of security to their account before using the app's features.
9. Code Obfuscation
Apparently, humans can reverse engineer anything these days. As for Flutter mobile apps, if your app code is out there in plain text for anyone to read, they can reverse engineer the app codes.
To tackle this, Code obfuscation can be used by developers to disguise codes used in developing the app - by hiding functions and class names in the compiled Dart code!
Conclusion
Today, with all the noise around privacy and security, it is imperative that all apps have a solid layer (maybe two?) of security. The idea behind this isn’t to make developers’ work harder, but to win user trust organically.
While Flutter already has many advantages, security and reliability are some of its strong points too. With the help of tools for app performance monitoring for reliability, data obfuscation, and cross-platform security measures, developers can easily build an app that is solid with both security and absolutely reliable for users.
0 notes
jcmarchi · 1 year ago
Text
5 Important Areas to Focus On While Creating a Mobile App - Technology Org
New Post has been published on https://thedigitalinsider.com/5-important-areas-to-focus-on-while-creating-a-mobile-app-technology-org/
5 Important Areas to Focus On While Creating a Mobile App - Technology Org
The demand for mobile apps continues to increase with every passing day. Even though there are thousands and millions of different mobile apps available, the need for new mobile apps is still there. Developing a mobile app is not an easy process, as it requires taking care of certain things before the app is fully functional. Although there are many things that an app developer has to take care of before launching the app, here are 5 important areas to focus on while creating a mobile app.
Using a smartphone – artistic impression. Image credit: Mike Jones via Pexels, free license
Clear Goals and the Target Audience
While you are starting the process of app development, it is important that you lay out goals that you want to achieve, establish precise objectives, and determine the target market. Most people are able to establish the app’s goal and what problems it intends to solve in society, but they overlook the importance of the intended audience. Since you are creating an application for users, you should keep your intended audience in mind and build your app accordingly.
Having clarity regarding the target audience can shape your development process and ensure that you are developing your app according to the needs and preferences of the target audience, which will ultimately make the app a success.
Platform
Before you start developing your app, one very important thing that you need to focus on and clarify is which platform your app is intended for. Whether it will be a download for android only app or will it be available for iOS and Android both. Every mobile platform has its own unique requirements, specifications, and guidelines that must be fulfilled. Similarly, the developers of Android and iOS are quite different from each other, as both platforms have different app development requirements.
So while you have a groundbreaking idea that can take over the market by storm, it is important that you tune the app perfectly for the selected platform(s) in terms of performance, responsiveness, design, and compatibility.
App Design
Design is one of the most important aspects of any mobile application because it plays a huge role in selling the application to the audience. The design of your mobile app depends upon your target market, the platform which you will develop the app for, the features that the app will have, and the pricing of the app. Having an appealing design, especially one that is appealing to your target audience, can make a huge difference in determining the success of the app. 
Nowadays, whether an app is paid or free, it must be well-designed and can catch the attraction of modern-day tech-savvy users. Most users prefer simple yet sleek designs that are easy to navigate and sticking to such a design can make a huge difference in determining the success of the app. Dream11 is a mobile app that has gained a lot of attention because of its modern sleek design. You can download Dream11 for free from the Play Store and App Store.
Security and Privacy
Mobile users share all sorts of their data with mobile apps and sometimes, this data can include sensitive information like banking information or credit card information. App developers must be mindful of this and focus on the security and privacy of the mobile app right from the developmental phase of the app. Prioritize the security and privacy of the mobile and implement strong security measures like secure authentication and robust encryption techniques that can keep the user data secure. Plus, follow the specific data protection laws and comply with the regulations to ensure the safety of user information.
App Store Guidelines and Submission Criteria
Most people make the mistake of developing an app without considering the app store guidelines and submission criteria. After you have finalized the platform for which you will be developing the app, learn about the submission criteria and guidelines for the specific app stores such as Apple App Store for iOS and Google Play Store for Android. Your app will only be published on these app stores if it follows the specific guidelines and submission requirements. Therefore, ensure that it is something that you take care of from the start and your app complies with these requirements and criteria.
0 notes
esourceful · 2 years ago
Text
Why choose RelyPass Premium?
Tumblr media
RelyPass Premium offers a seamless and secure backup solution, ensuring all your passwords are safely stored in the cloud. Upgrade to the Premium plan today!
Download the App
0 notes
nando161mando · 4 months ago
Text
We’ve obtained victories in encrypting the web and now have widespread end-to-end encrypted messaging. But there’s a gap on mobile that still needs to be addressed. https://www.eff.org/deeplinks/2025/02/closing-gap-encryption-mobile
4 notes · View notes
market-insider · 2 years ago
Text
Mobile Encryption Market 2023: Safeguarding Mobile Communication
The global mobile encryption market size is anticipated to reach USD 16.89 billion by 2030, according to a new report by Grand View Research, Inc. The market is expected to expand at a CAGR of 25.8% from 2023 to 2030. Mobile encryption refers to the process of converting data into a code or language that can only be deciphered by authorized parties with the correct decryption key. The market is growing rapidly due to increasing concerns about data security and privacy. As most of the population uses mobile devices to store sensitive information such as financial data, personal information, and confidential business information, the need for mobile encryption solutions becomes more important.
Gain deeper insights on the Bio-polybutadiene Market market and receive your free copy with TOC now @: Mobile Encryption Market Report
The demand for mobile encryption has increased significantly over the years, as organizations are increasingly adopting a mobile workforce. The benefits of a mobile workforce are numerous, including improved productivity, reduced costs, and greater flexibility. However, with these benefits come significant security risks. Mobile encryption technology can help mitigate these risks by providing secure communication and data transfer channels, ensuring data is not accessible to unauthorized parties. As a result, the market has seen significant growth over the past few years, and this trend is likely to continue in the coming years as more organizations continue to adopt a mobile workforce.
However, there are several restraints that may limit the growth of the market. One significant restraint is the lack of awareness among businesses about the need for mobile encryption solutions. Other restraints include concerns about the complexity of encryption solutions, a lack of standardization in encryption technologies, and the potential impact of encryption on device performance. Additionally, the high cost of implementing and maintaining encryption solutions may also be a restraint, particularly for smaller businesses. Overcoming these restraints will be essential for the market to grow and thrive, and businesses that offer encryption solutions must work to address these challenges to ensure the widespread adoption of mobile encryption solutions.
0 notes
evrides · 2 years ago
Text
No Compromises on Fleet Security! IoT-Enabled Solutions Deliver Comprehensive Protection..!!
Tumblr media
With EV Rides' innovative IoT-enabled solutions, transform the security of your Electric Vehicle (EV) fleet. Our comprehensive #protection guarantees the utmost safety for your vehicles Enjoy real-time monitoring, granting you complete visibility and control over your electric vehicle fleet. Analyze driver behavior, track vehicle locations, and maximize operational efficiency by optimizing #batterylife . Stay ahead of potential threats through proactive #detection, leveraging the power of advanced analytics. Rest assured that sensitive data is safeguarded with robust encryption for secure transmission and storage. In emergency situations, our remote vehicle control feature allows for swift action, minimizing risks and preventing unauthorized use. Elevate the security of your EV fleet with confidence, leveraging EV Rides' state-of-the-art solutions. Explore more at https://evrides.in/.
Iot telematics
Fleet mobility
0 notes
reality-detective · 1 month ago
Text
Tumblr media
BREAKING: Navy Intercepts Deep State Submarines Carrying Kids, Gold & Bioweapons — Military Locks Down Oceans Under Trump’s Orders
As of April 14, 2025, the U.S. Navy has locked down the Atlantic and Pacific in a massive military sting targeting elite-run trafficking, bioweapon transport, and deep-sea blackmail ops. This isn’t routine patrol — this is war.
Trafficking victims. Mobile CIA servers. Gold bars. Bioweapons.
All being extracted from vessels linked to billionaires, ex-agency operatives, and foreign “diplomats.”
These aren’t pirates. These are floating Deep State hideouts — and they’re being wiped off the map.
Trump is back. This operation is under direct military command — not civilian leadership.
GITMO is active. EBS is locked and loaded. Tribunals are not coming — they’ve begun.
On the East Coast, naval strike teams seized ships disguised as luxury liners. Below deck: surgical rooms, soundproof chambers, biometric systems, and unregistered children with no records. DNA matches tie them to CPS abductions across U.S. states.
One server retrieved mapped over 600 trafficking routes since 2012 — running through Italy, the Netherlands, Israel, and U.K. ports. Funded by “charities” tied to Clinton donors. The Epstein network didn’t die — it went mobile. Now it’s caught.
On the West Coast, it's even darker.
A submersible tied to a “research foundation” was captured leaving San Diego — carrying precursor agents for aerosolized behavioral control, encrypted tablets, and night-vision tech meant for offshore “medical” camps.
Crew included former CIA, UN peacekeepers, and a WEF consultant — all under fake identities.
Some vessels carried gold stamped with central bank seals, believed stolen during the 2008 collapse and laundered through IMF fronts. Others had sealed crates of bio-compounds traced back to DARPA and WHO partners.
Nine vessels silenced in 48 hours.
No GPS. No distress calls. Just vanished.
Naval divers are pulling up deep-sea data vaults dumped overboard — containing:
Blackmail dossiers on European leaders
Human trafficking-finance links with Big Pharma
Files on Antarctic underground cities marked for “climate relocation” by elite surnames
This is military justice, not courtroom theater.
No arrests. No media coverage. Just elimination.
No escape. No more oceans to hide behind.
If you're tied to child trafficking, gold laundering, stolen intel, or elite escape ops — you will be hunted. You will be erased.
There are no more safe harbors. The storm is here.
- Julian Assange
482 notes · View notes
nerdygirlramblings · 6 months ago
Text
Off to See the Wizard (2)
previous | next
tw: canon-typical violence
Your introduction didn't cause pandemonium, per se, but your effect on the rest of the team was immediate. Soap sat straight up, his eyes alight like a kid who'd been set loose in a toy store. Kyle's whole demeanor unwound, his smile softening, his eyes going glassy, as if all the tension holding him together was suddenly released. Simon tried to make himself smaller, take up less space, maybe disappear into the cushions of the couch he was on. It was clear they didn't know you were coming, and they seemed as excited - well, all but Simon, who seemed terrified - about it as you were.
Things settled down quickly after that as Price reminded everyone this arrangement was for the sake of their next mission. That took some joy out of the introduction, but the electric thrum of excitement was there. You were finally in the same place as your boys.
Your first full day is rather boring. You are only a little startled to hear voices in the hall at 4:30 but then realize the guys are simply getting ready for their morning training. You also slightly regret picking the room next to the bathroom, despite how helpful it will be when you need to shower while the others are around.
You spend your morning setting up your mobile command center with the tech you brought. You arrange the monitors to match your usual setup, pulling up the background files and current mission data across your screens. You send an encrypted message to Laswell updating her on your status. You know she wants someone she trusts here, and encrypting the email is probably overkill, but you didn't get to where you are by assuming anything about safety. You'd been a black-hat hacker before Laswell scooped you up, so you know it's possible.
When you left, she told you you'd have the same decision-making abilities in the field as she does. You've never had that much power, and you want to show Laswell her trust is justified, so your message is a concern about transports and what you'd like to do instead. You want to get her take on it before simply changing things. In your mind, roping her in on these kinds of decisions now means she'll be less likely to challenge any decisions you make when the boys are in the field.
The highlight of your first day is the knock that comes around 1:00, startling you a bit, just as you're realizing skipping breakfast after such an interrupted schedule the previous day was not a smart idea. The only person you know who knows you're here is John, so you quickly open your door, smile already in place. But you're pleasantly surprised to see Kyle instead.
"Hey doll, Cap said you should come eat." He leans against the doorframe, smiling gently at you. "Looks like you're all set."
"Got everything but the curtain," you reply cheekily.
He grins in response. "We may call ya' Oz, but you're so much better than the man behind the curtain."
You feel the blood rush to your cheeks and duck your head. You aren't behind a screen anymore; you're going to need to be more aware of your reactions to the boys if you don't want them reading you like an open book. "You said something about food," you murmur, shuffling paperwork around on your desk.
"Yea. The Captain was hopin' you'd join us," Kyle replies.
You glance up at him in the doorway. "Do I have a choice?" you ask cheekily. You need to eat, but you can't let them think you're so easily commanded. It sets a bad precedent and is at odds with what they know of you from previous missions.
Kyle's smile slides into a smirk. "He did say I might need to convince you."
You aren't sure what he might try to do to convince you, and your mind immediately jumps to some inappropriate fantasies. You're so flustered you quickly stammer, "No, you don't need to do that." You minimize your open programs, leaving a blank desktop, despite the fact you're the only person with access to this office. You turn to Kyle moments later. "I'm ready."
Kyle steps fully into the hallway, gesturing you to lead the way. You pull the door closed behind you, checking to make sure it locks. "You do remember I got the ten cent tour yesterday and don't really know where much of anything is, right?"
Kyle puts a gentle hand on your lower back, in the same way John did last night, unconsciously. He leads you through base, and you watch other groups of soldiers notice you for the first time. Some openly stare while others watch you on their perifery.
You're not sure what they think of you or if they even know who you are, but you don't like their prying eyes. Kyle doesn't seem to like it either, wrapping his arm more possessively around your waist as he guides you to the mess.
Walking through the door, it's easy to find the rest of the 141. For one thing, Simon is massive. Even seated he's nearly a head taller than most of the other people in the mess. For another, you know of their reputation, but the soldiers here have seen it first-hand and keep a wide berth in the mess. You don't know if the distance is out of fear or respect, but it means your boys have a table to themselves near the back of the room.
John and Simon are facing the door, eyes constantly scanning the room. You don't know if this is how they always are, or if they're looking for Kyle and you. You catch John's eye before turning to the food line, but Kyle steers you towards the others. As you approach, he calls out, "Look who I found? An' she's here without any coercion!" Simon looks at you and away again quickly, what is going on with him? Soap turns around, grin stretching across his face.
"Oz, mah girl, finally get ta see yer pretty face! Where've'ye been heedin'?" He pats the space next to him.
You slip onto the bench. "I've been in my office, Soap. Setting things up so I can support you while you're gone." He seems to deflate a little at the reminder that they'll be leaving soon, leaving you. You try not to read into it.
You turn and look at John, who's now across from you, and Kyle, who took the spot on your other side. You don't fail to notice that though your back is to the room, the two most imposing members of the 141 have their eyes on everything in the room, and you're flanked on either side by some of the youngest ever members of such an elite task force. Consciously or not, they've made sure you're well protected.
"So what do you recommend I get?" you ask, glancing around only to realize no one has anything to eat yet. "Wait, did you all eat already?"
John chuckles. "Nah, Oz. We were tryin-a be polite and wait for ya. 'Sides, Laswell said you'd likely skip meals, so I figured eatin' with ya would make sure yer fed." He stands, as does Kyle and Soap. "Now you sit tight with Ghost while we grab some scoff."
You watch as the others get up, leaving you with a Simon who looks anywhere but at you. You notice he has a plain black balaclava on, and he'd been wearing one yesterday too. You wonder if anyone on base knows what he looks like. You don't know what to say as you sit there in awkward silence. This is so different from your usual dynamic with Simon, it makes you uncomfortable.
Minutes tick slowly by, and you look over at John chatting with some other soldiers, Kyle and Soap with a few trays between them. Across from you, Ghost is still silent. And you finally snap.
"Simon?" You try to keep the hurt from your voice as he finally drags his eyes to yours. "Did I do something wrong or offend you somehow?"
series masterlist | main masterlist
~~
an: I'm trying to get Soap's accent, and it's hard because it's all in the vowel sounds, which have to be spelled out. Forgive me any glaring issues.
Taglist: @blackhawkfanatic
704 notes · View notes
batboyblog · 2 days ago
Note
Hey I was curious if you know if there's a current social network people are using to report ice movements in their area? I've been searching around and I'm not seeing unified efforts; mostly just stuff like redditors posting it on their towns subreddit (but they often quickly get taken down). I ask you since you're involved in politics posting on tumblr, so I was hoping you might seen something.
The lack of them I've found has made me start considering developing an encrypted app for the purpose. I have the skills for it, but I also wonder if something like that could go horribly wrong if ice agents got their hands on the app. I was thinking a way to mitigate that might be making it invite only and having it spread in a 'ask a punk' sort of way. (Like how punk show addresses cant be found online, you have to ask someone in the scene the address). That way word can be spread about the app so many people can learn about it, but only get in if they reach out online to someone with it. Ideally, people who give out codes would check accounts and be careful not to hand them out to anyone sus.
Sorry for all of this out of no where! I wasn't sure where to ask about my idea and I see your posts often so I went: why not.
there is a website where people can report sitings,
People over Papers
there's also a lot of local immigrant rights organizations with hotlines people should call to report an ICE siting so they can mobilize lawyers
LUCE Immigrant Justice Network of Massachusetts.
Colorado Immigrant Rights Coalition
here's a list of all the California numbers
Illinois
this looks a good collection of national numbers both to report ICE and get other immigration aid if thats what you need.
I'd recommend if you have computer and coding skills you're willing to volunteer reaching out to People Over Papers and seeing how you can help/improve what they're doing
60 notes · View notes