#secure data
Explore tagged Tumblr posts
Text
I think every computer user needs to read this because holy fucking shit this is fucking horrible.
So Windows has a new feature incoming called Recall where your computer will first, monitor everything you do with screenshots every couple of seconds and "process that" with an AI.
Hey, errrr, fuck no? This isn't merely because AI is really energy intensive to the point that it causes environmental damage. This is because it's basically surveilling what you are doing on your fucking desktop.
This AI is not going to be on your desktop, like all AI, it's going to be done on another server, "in the cloud" to be precise, so all those data and screenshot? They're going to go off to Microsoft. Microsoft are going to be monitoring what you do on your own computer.
Now of course Microsoft are going to be all "oooh, it's okay, we'll keep your data safe". They won't. Let me just remind you that evidence given over from Facebook has been used to prosecute a mother and daughter for an "illegal abortion", Microsoft will likely do the same.
And before someone goes "durrr, nuthin' to fear, nuthin to hide", let me remind you that you can be doing completely legal and righteous acts and still have the police on your arse. Are you an activist? Don't even need to be a hackivist, you can just be very vocal about something concerning and have the fucking police on your arse. They did this with environmental protesters in the UK. The culture war against transgender people looks likely to be heading in a direction wherein people looking for information on transgender people or help transitioning will be tracked down too. You have plenty to hide from the government, including your opinions and ideas.
Again, look into backing up your shit and switching to Linux Mint or Ubuntu to get away from Microsoft doing this shit.
42K notes
·
View notes
Text

Lost important data? Our expert team in Barrie specializes in hard drive data recovery, ensuring safe retrieval of your files. Fast, reliable, and affordable solutions. Contact us today!
Book a repair today! https://tinyurl.com/3kh85myp
Find us on Google: https://maps.app.goo.gl/XraUUso9GYWempy99
#innisfil tech#data recovery service#data recovery#data recovery services#data recovery service near me#data recovery software#screen repair#laptop repair#tech support#hard drive data recovery#hard drive data recovery service#tech help#Restore Data#Innisfil Services#Secure Data Recovery#Secure Data#Tech Solutions#Innisfil Tech
0 notes
Text

Fortanix offers secure, scalable, and vaultless data tokenization, ensuring PII, financial, and healthcare data stay safe. Comply with GDPR, HIPAA, and PCI DSS while enabling secure data sharing across applications and AI models.
#encryption#data security#data privacy#fortanix#cloud security#cyber security#data security challenges#key management#data privacy challenges#blockchain#data safety#secure data
0 notes
Link
Discover how to securing healthcare data post-Change Healthcare incident. Follow best practices to ensure patient data safety and compliance.
0 notes
Text
VeraCrypt
Security on your device is crucial, especially if others frequently use your machine. VeraCrypt is an application designed to secure and encrypt partitions, ensuring sensitive files remain protected. The program is highly customizable, offering a variety of options. When you open VeraCrypt, you’ll find a simple interface, which some may consider outdated, guiding you through the available…
#Data Privacy#data security#disk encryption#disk encryption software#encryption#full disk encryption#password protection#secure data#VeraCrypt#volume encryption
0 notes
Text
Six ways you can securely transfer files today!
This article hopes to showcase the importance of secure file transfer practices and prevent the consequences of a data breach. Using the methods above, any individual or business can protect themselves from cyber threats and breaches, ensuring safe and secure data transfer.
0 notes
Text
OUT NOW: my most in depth investigation yet
in this article we see just HOW little a company handling highly sensitive data can care about security and yes it's even worse than you think
content warning: mentions of abuse/controlling behaviour
support me on ko-fi if you like my work and want to read (non-hacking) articles early!
#FuckStalkerware#maia arson crimew#stalkerware#security#infosec#data breach#investigative journalism
8K notes
·
View notes
Text
Hackers (1995)
#hackers#cyberpunk aesthetic#macintosh#retro computing#cyber security#cyberpunk#cyberpunk movies#gifs#gifset#cybersecurity#cyberspace#macos#mac os#apple mac#hypercard#hacking#data security#e=mc2#floppy disk
3K notes
·
View notes
Text

yea
#star trek#st:tng#geordi la forge#data soong#jean luc picard#deanna troi#tasha yar#beverly crusher#william t riker#worf son of mogh#(my favorite paranoid security officer)#reginald barclay#sorry reg. I love you. but.
724 notes
·
View notes
Text
I think it is very cool how tech companies, schools, employers, and universities make it actively difficult to distance yourself from Google, Microsoft, and Apple.
Yes most Linux distros are very stable, way more secure, privacy friendly, and way more customizable. But every institution is built to make technological independence as difficult as possible.
Yelling on the internet that everyone should switch to Linux and FOSS really ignores how much of the technological world is designed to not let that happen.
#yes switch to linux if you can#Data privacy and security needs to be addressed on a much larger legal scale#you cant consume your way out of this my friends#opensuse#linux#open source#data privacy
715 notes
·
View notes
Text
Time for Citizens to Hit Elon with a Privacy Act Violation
Email Template
Subject Line: Civil Liberties Complaint
Hello,
I am making a civil liberties complaint under the Privacy Act of 1974, 5 U.S.C. § 552a. It has been brought to my attention that Elon Musk and his associates, under the guise of a directive of the Department of Government Efficiency (DOGE) (an IT office in the White House), have acquired access to Treasury Department Records in Systems of Records as defined in the Act. As an individual covered by the Act, I believe that there may be records about me in these Treasury Department systems, and I am concerned for the following reasons:
Elon Musk is not an elected official.
Even if Musk were an elected official, the System of Records Notices (SORNs) governing the Treasury Department Privacy Act systems do not allow for disclosure to Musk and his associates per the Routine Uses.
Disclosure of personally identifiable information (PII) and sensitive personally identifiable information (SPII) to Musk and his associates would be an unauthorized disclosure and therefore breach of information.
The Treasury Department must (1) quickly investigate what Privacy Act records that Musk and his associates have unlawfully accessed, (2) reveal to the public what unauthorized disclosures were made, (3) stop further access, (4) force any files acquired by Musk and his associates to be returned and/or permanently destroyed, and (5) seek criminal penalties against Musk and his associates for violations of the Act.
Sincerely,
[INSERT NAME AND CONTACT INFORMATION]
Privacy Act of 1974
The spirit of this law is rooted in presidential drama and corruption. It was passed as a direct result of the Watergate Scandal which uncovered the federal government’s scheme of illegally investigating and maintaining records about individuals. So in an effort to provide transparency to the public and an assurance that the government would not misuse records about us all, the Privacy Act of 1974 was born.
Multiple unions have now filed a lawsuit against the Department of the Treasury and the Bureau of the Fiscal Service under the Privacy Act as well as other privacy laws. They are seeking a civil remedy in the form of a restraining order to prevent DOGE from accessing records. But the Act also allows for criminal penalties to be assessed. The two that could apply to Musk and his associates include:
“Any person who knowingly and willfully requests or obtains any record concerning an individual from an agency under false pretenses shall be guilty of a misdemeanor and fined not more than $5,000.” 5 U.S.C. § 552a(i)(3).”
“Any officer or employee of any agency who willfully maintains a system of records without meeting the notice requirements of subsection (e)(4) of this section shall be guilty of a misdemeanor and fined not more than $5,000.” 5 U.S.C. § 552a(i)(2).”
The first applies to Musk accessing Privacy Act records from the Treasury Department under false pretenses of carrying out official government duties.
The second could apply if Musk creates a system of records in the DOGE office without complying with the law. For example, if he began using his IT office role to create records about individuals in the government or who receive government assistance, that would be a violation. It is very likely we will need to demand an investigation into DOGE and what they have on US citizens, too.
Email the Treasury Department today with the template up above. We deserve to have our privacy protected, and some loser who isn’t even from this country shouldn’t be allowed to stomp all over our rights.
ELON MUSK IS STAGING A COUP AT THE US TREASURY!!! He has not right to be there, no authorization for what he's doing, no oversight. AND THE MAINSTREAM MEDIA IS INSTEAD FOCUSING ON DICKFACE'S INSANE GAZA COMMENTS.
Write emails. Call your senators. ALSO, TODAY, MARCH. Every Us capital city in every state. And if you can get to DC or are in DC, hit the streets.
#stop musk#us treasury#elon musk#us politics#coup#american politics#DO NOT LET THEM DISTRACT YOU#HE HAS OUR SOCIAL SECURITY NUMBERS#HE HAS OUR USER DATA#HE HAS OUR BANK ACCOUNT INFORMATION#resist#march#protest#stop him
342 notes
·
View notes
Text
Star Trek The Next Generation "Lonely Among Us"
#Tasha you're CHIEF OF SECURITY. SURELY. SURELY you know something about this#Star Trek#Star Trek The Next Generation#TNG#Lonely Among Us#Data#Data Soong#Tasha Yar#William T. Riker#tngedit#startrekedit#startrekdaily#tvedit#scifiedit#80sedit#tng s1#GIF#my gifs#Hide and Queue
327 notes
·
View notes
Text

Lost crucial files? Get reliable computer data recovery in Innisfil. Whether it’s accidental deletion, hardware failure, or a corrupted drive, ensure your important data is restored by trusted experts.
Book a repair today! https://tinyurl.com/2rxy4yn2
Find us on Google: https://maps.app.goo.gl/XraUUso9GYWempy99
#data recovery service#data recovery services#data recovery#innisfil tech#screen replacement#data recovery service near me#laptop repair#tech support#data recovery software#screen repair#Secure Data Recovery#Secure Data#Tech Solutions#Innisfil Services#Tech Help#Restore Data#hard drive data recovery service#hard drive data recovery
0 notes
Text
Federal agencies must enhance cybersecurity to prevent data breaches. Key strategies include consistent encryption, centralised key management, and using FIPS-certified Hardware Security Modules (HSMs). Fortanix DSM offers advanced encryption and secure key storage and ensures compliance with regulations, protecting sensitive data across all environments. Embrace a data-centric and zero-trust approach to safeguard critical information. Learn more about Fortanix’s solutions for robust data protection.
#cloud security#encryption#data security#data privacy#key management#data security challenges#data privacy challenges#fortanix#zero trust#secure data
0 notes
Text

found a note from october last year where i tried to pitch myself a lawlight chatfic and immediately rejected myself
#rookposting#death note#i cant even remember like what kiras crime was in this au#either it was like kira is a drama stirrer writing callout posts by hacking secure data#or it was like this is a fandom au but kira is straight up killing people still#idk. forgot. lost to time#ive contemplated a few ways to do a lawlight chatfic but nothing sticks with me#i think it's just not to be#the best option is like death note au but it takes place in the 20s#like it's the same story but now they have smartphones and the internet is ubiquitous and light has to deal with tiktok#i cant write that though i refuse to be on tiktok
111 notes
·
View notes