#browser protection
Explore tagged Tumblr posts
ravidrws · 1 month ago
Text
Tumblr media
110 notes · View notes
melyzard · 1 year ago
Text
Okay, look, they talk to a Google rep in some of the video clips, but I give it a pass because this FREE course is a good baseline for personal internet safety that so many people just do not seem to have anymore. It's done in short video clip and article format (the videos average about a minute and a half). This is some super basic stuff like "What is PII and why you shouldn't put it on your twitter" and "what is a phishing scam?" Or "what is the difference between HTTP and HTTPS and why do you care?"
It's worrying to me how many people I meet or see online who just do not know even these absolute basic things, who are at constant risk of being scammed or hacked and losing everything. People who barely know how to turn their own computers on because corporations have made everything a proprietary app or exclusive hardware option that you must pay constant fees just to use. Especially young, somewhat isolated people who have never known a different world and don't realize they are being conditioned to be metaphorical prey animals in the digital landscape.
Anyway, this isn't the best internet safety course but it's free and easy to access. Gotta start somewhere.
Here's another short, easy, free online course about personal cyber security (GCFGlobal.org Introduction to Internet Safety)
Bonus videos:
youtube
(Jul 13, 2023, runtime 15:29)
"He didn't have anything to hide, he didn't do anything wrong, anything illegal, and yet he was still punished."
youtube
(Apr 20, 2023; runtime 9:24 minutes)
"At least 60% use their name or date of birth as a password, and that's something you should never do."
youtube
(March 4, 2020, runtime 11:18 minutes)
"Crossing the road safely is a basic life skill that every parent teaches their kids. I believe that cyber skills are the 21st century equivalent of road safety in the 20th century."
189 notes · View notes
sandinthepipes · 5 months ago
Text
In these shitty times I remind you to DITCH CHROME AND GOOGLE and use a reliable browser who won't sell you and your mom.
TL;DR. DuckDuckGo both search engine and browser is a good option for everybody and everyday purpose
I'd think duckduckgo both browser and search engine is a good
If you use iPhones and Mac Safari isn't the worst.
Tor is the best in terms of privacy, but it's run by volunteers so it's better if you don't use it to watch YouTube and download stuff, it's also very slow for socials.
Brave browser is slightly better then duckduckgo, but for average use it's almost the same. Also it has had a couple of controversies overtime.
I've recently found out that duckduckgo has it's own browser as well!!!!! AND it's available on both pc and android and I believe even ios and Mac.
Duckduckgo is (mainly) a search engine that doesn't try to sell you stuff like Google, gives you what you search for unfiltered, doesn't collect your data's, AND datas are filtered and bounced around multiple times to encrypt them better.
I know ecosia is appealing because of the trees, you can still use it, but be aware that there's basically no difference between that and Google. It's not secure nor you're guaranteed the results aren't filtered according to whatever strikes them at the moment
12 notes · View notes
maztemmo98 · 9 months ago
Text
This is pure cinematographic masterpiece. It deserves an Oscar.
24 notes · View notes
tyote · 1 year ago
Text
lmao @ mozilla putting telemetry in firefox, then saying they will "anonymize it" and "not sell it to third parties"... and then a month later they acquire an advertising broker and send your data to that, which technically means it's a first party and their little "promise" isn't broken, while still attempting to send you directed ads based on your browsing data & profit from it
9 notes · View notes
machabre · 2 months ago
Text
I think Drag just. Enjoys the treatment and attention (and lack of) that not talking brings about.
Say nothing, and people start subconsciously ignoring you, people are often much more interested in what is said (by others). People inadvertently let you get away with things and slip through their fingers. If you're being mute on purpose, this isn't being ignored, it's probably what you wanted, and Drag probably loves it.
But inversely, when you choose not to speak, people are also attentive to your presence. They will wonder what you want because everyone else makes their needs known and you're now an exception and an enigma- people will be drawn to solving it.
In Dragunov's case, he's a well trained soldier that stands over 6'. You'd want to guess right and make him pleased because he looks like, and absolutely could seriously injure or straight up kill you.
I don't think Sergei goes around disobeying his orders or crushing people's limbs unless absolutely necessary, but I can see it delighting him inside to know and see that his silence commands the room (and lets him slip away for some alone time or whatever else he wants to do.)
But lastly, choose not to speak and it only gets easier to remain mute as time goes on. Any intelligible word you may choose to say will be heavily analyzed, repeated, remembered. Again, people cling quite tightly to what is said. I gotta wonder if Dragunov doesn't speak because of this too sometimes.
3 notes · View notes
varreblogger · 3 months ago
Text
thank you for tagging me in the wip challenge @fenharael
Rules: In a new post, post the names of all the files in your WIP folder regardless of how non descriptive or ridiculous. Let people send you an ask with the titles that most intrigue them and then post a little snippet or tell us about them. Tag as many folk as you have WIPs.
i wish i could participate properly in the wip challenge but my wips are called “beep” “e” “jesus fucking christ” “e” “jesus fucking christ 2” “he” “e” “e” “jail”
that said if you wanted to participate for real … please say i tagged you……
Tumblr media Tumblr media
3 notes · View notes
zeravmeta · 1 year ago
Text
was watching a rando one piece video essay theory, the dude randomly quipped that he hates yamato, and ive never clicked off and erased my browser history of a person so fast
12 notes · View notes
jcmarchi · 11 months ago
Text
Deepfake misuse & deepfake detection (before it’s too late) - CyberTalk
New Post has been published on https://thedigitalinsider.com/deepfake-misuse-deepfake-detection-before-its-too-late-cybertalk/
Deepfake misuse & deepfake detection (before it’s too late) - CyberTalk
Tumblr media Tumblr media
Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology, and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 CISSP and holds a Master of Science in Technology Commercialization from the University of Texas at Austin, and an MBA with a global security concentration from East Carolina University.
In this dynamic and insightful interview, Check Point expert Micki Boland discusses how deepfakes are evolving, why that matters for organizations, and how organizations can take action to protect themselves. Discover on-point analyses that could reshape your decisions, improving cyber security and business outcomes. Don’t miss this.
Can you explain how deepfake technology works? 
Deepfakes involve simulated video, audio, and images to be delivered as content via online news, mobile applications, and through social media platforms. Deepfake videos are created with Generative Adversarial Networks (GAN), a type of Artificial Neural Network that uses Deep Learning to create synthetic content.
GANs sound cool, but technical. Could you break down how they operate?
GAN are a class of machine learning systems that have two neural network models; a generator and discriminator which game each other. Training data in the form of video, still images, and audio is fed to the generator, which then seeks to recreate it. The discriminator then tries to discern the training data from the recreated data produced by the generator.
The two artificial intelligence engines repeatedly game each other, getting iteratively better. The result is convincing, high quality synthetic video, images, or audio. A good example of GAN at work is NVIDIA GAN. Navigate to the website https://thispersondoesnotexist.com/ and you will see a composite image of a human face that was created by the NVIDIA GAN using faces on the internet. Refreshing the internet browser yields a new synthetic image of a human that does not exist.
What are some notable examples of deepfake tech’s misuse?
Most people are not even aware of deepfake technologies, although these have now been infamously utilized to conduct major financial fraud. Politicians have also used the technology against their political adversaries. Early in the war between Russia and Ukraine, Russia created and disseminated a deepfake video of Ukrainian President Volodymyr Zelenskyy advising Ukrainian soldiers to “lay down their arms” and surrender to Russia.
How was the crisis involving the Zelenskyy deepfake video managed?
The deepfake quality was poor and it was immediately identified as a deepfake video attributable to Russia. However, the technology is becoming so convincing and so real that soon it will be impossible for the regular human being to discern GenAI at work. And detection technologies, while have a tremendous amount of funding and support by big technology corporations, are lagging way behind.
What are some lesser-known uses of deepfake technology and what risks do they pose to organizations, if any?
Hollywood is using deepfake technologies in motion picture creation to recreate actor personas. One such example is Bruce Willis, who sold his persona to be used in movies without his acting due to his debilitating health issues. Voicefake technology (another type of deepfake) enabled an autistic college valedictorian to address her class at her graduation.
Yet, deepfakes pose a significant threat. Deepfakes are used to lure people to “click bait” for launching malware (bots, ransomware, malware), and to conduct financial fraud through CEO and CFO impersonation. More recently, deepfakes have been used by nation-state adversaries to infiltrate organizations via impersonation or fake jobs interviews over Zoom.
How are law enforcement agencies addressing the challenges posed by deepfake technology?
Europol has really been a leader in identifying GenAI and deepfake as a major issue. Europol supports the global law enforcement community in the Europol Innovation Lab, which aims to develop innovative solutions for EU Member States’ operational work. Already in Europe, there are laws against deepfake usage for non-consensual pornography and cyber criminal gangs’ use of deepfakes in financial fraud.
What should organizations consider when adopting Generative AI technologies, as these technologies have such incredible power and potential?
Every organization is seeking to adopt GenAI to help improve customer satisfaction, deliver new and innovative services, reduce administrative overhead and costs, scale rapidly, do more with less and do it more efficiently. In consideration of adopting GenAI, organizations should first understand the risks, rewards, and tradeoffs associated with adopting this technology. Additionally, organizations must be concerned with privacy and data protection, as well as potential copyright challenges.
What role do frameworks and guidelines, such as those from NIST and OWASP, play in the responsible adoption of AI technologies?
On January 26th, 2023, NIST released its forty-two page Artificial Intelligence Risk Management Framework (AI RMF 1.0) and AI Risk Management Playbook (NIST 2023). For any organization, this is a good place to start.
The primary goal of the NIST AI Risk Management Framework is to help organizations create AI-focused risk management programs, leading to the responsible development and adoption of AI platforms and systems.
The NIST AI Risk Management Framework will help any organization align organizational goals for and use cases for AI. Most importantly, this risk management framework is human centered. It includes social responsibility information, sustainability information and helps organizations closely focus on the potential or unintended consequences and impact of AI use.
Another immense help for organizations that wish to further understand risk associated with GenAI Large Language Model adoption is the OWASP Top 10 LLM Risks list. OWASP released version 1.1 on October 16th, 2023. Through this list, organizations can better understand risks such as inject and data poisoning. These risks are especially critical to know about when bringing an LLM in house.
As organizations adopt GenAI, they need a solid framework through which to assess, monitor, and identify GenAI-centric attacks. MITRE has recently introduced ATLAS, a robust framework developed specifically for artificial intelligence and aligned to the MITRE ATT&CK framework.
For more of Check Point expert Micki Boland’s insights into deepfakes, please see CyberTalk.org’s past coverage. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
2 notes · View notes
fakeasmr · 2 years ago
Text
Tumblr media
wanted to see if I could watch scorpy's stream on my parents' bigass tv and now my nephew is judging me
13 notes · View notes
melyzard · 2 years ago
Text
Time for a new edition of my ongoing vendetta against Google fuckery!
Hey friends, did you know that Google is now using Google docs to train it's AI, whether you like it or not? (link goes to: zdnet.com, July 5, 2023). Oh and on Monday, Google updated it's privacy policy to say that it can train it's two AI (Bard and Cloud AI) on any data it scrapes from it's users, period. (link goes to: The Verge, 5 July 2023). Here is Digital Trends also mentioning this new policy change (link goes to: Digital Trends, 5 July 2023). There are a lot more, these are just the most succinct articles that might explain what's happening.
FURTHER REASONS GOOGLE AND GOOGLE CHROME SUCK TODAY:
Stop using Google Analytics, warns Sweden’s privacy watchdog, as it issues over $1M in fines (link goes to: TechCrunch, 3 July 2023) [TLDR: google got caught exporting european users' data to the US to be 'processed' by 'US government surveillance,' which is HELLA ILLEGAL. I'm not going into the Five Eyes, Fourteen Eyes, etc agreements, but you should read up on those to understand why the 'US government surveillance' people might ask Google to do this for countries that are not apart of the various Eyes agreements - and before anyone jumps in with "the US sucks!" YES but they are 100% not the only government buying foreign citizens' data, this is just the one the Swedes caught. Today.]
PwC Australia ties Google to tax leak scandal (link goes to: Reuters, 5 July 2023). [TLDR: a Russian accounting firm slipped Google "confidential information about the start date of a new tax law leaked from Australian government tax briefings." Gosh, why would Google want to spy on governments about tax laws? Can't think of any reason they would want to be able to clean house/change policy/update their user agreement to get around new restrictions before those restrictions or fines hit. Can you?
SO - here is a very detailed list of browsers, updated on 28 June, 2023 on slant.com, that are NOT based on Google Chrome (note: any browser that says 'Chromium-based' is just Google wearing a party mask. It means that Google AND that other party has access to all your data). This is an excellent list that shows pros and cons for each browser, including who the creator is and what kinds of policies they have (for example, one con for Pale Moon is that the creator doesn't like and thinks all websites should be hostile to Tor).
103 notes · View notes
rotspecialist · 1 year ago
Text
does anyone else's tumblr dash glitch out and show them like. 3 sets of the same few posts in a row. because it happens to me literally like once every day. and idk why
2 notes · View notes
nando161mando · 2 years ago
Text
Tumblr media
Switch to Firefox.
6 notes · View notes
vmlogin · 2 years ago
Text
How to Modify the Browser Fingerprint?
Tumblr media
So for users with special needs, how to modify the browser fingerprint information?
If you want to modify the specific fingerprint information of the fingerprint browser, you must pass some auxiliary tools, such as fingerprint browser. Fingerprint browser means a browser that can modify fingerprints and disguise fingerprints. There are many fingerprint browsers in the market, here choose an old and excellent reputation VMLogin fingerprint browser as an example:
1. First, download and install VMLogin, open the client, click “New Browser Profile” or “Create a New Profile”. You can also right-click on the created browser profile and select “Edit Profile” to continue to modify it.
2. Then enter the profile editing page, divided into the basic configuration and other configurations, users can customize or random configuration. The more detailed the modified fingerprint information, the better the anti-detection effect.
5 notes · View notes
folimoli · 2 years ago
Text
hmm love reading a poast about computer hardware thats wrong and gonna get ppl to waste their money
5 notes · View notes
striffyisme · 2 years ago
Text
okay i promise this is not an ad, and this is probably old news by now, but just in case there's other people like me who didn't know, there's this great tool called Relay made by our favourite web browser Firefox
basically it uses a masked email when you sign up for websites so companies don't have access to your real email, but you still get the notifications you want to receive. it stops businesses from buying your contact info too, as they only have the spoof email address provided by Relay
and best of all, you can use it totally free! you can have up to five email masks, use the Relay browser extension, and it removes email trackers too
or if you want you can pay $0.99 a month/$11.88 a year to get unlimited masks, a unique Relay email domain, and the ability to reply to emails anonymously
i believe they're also rolling out phone number protection, but i'm not sure when that's happening or if it's out already
anyway, please make use of this amazing tool to keep your data safe and private, and stop companies profiting off of you just a little bit more.
3 notes · View notes