Launching the official Doge website was a security confusion
Not only is it anxious, but Doge websites are leaning heavily towards xa social media platform owned by Musk. The Doge homepage is its own X-post feed, but it also uses code that directs the search engine to X.com instead of Doge.gov. Wired reviews of sites found. “This usually shows that X accounts take priority over the actual website itself, not how things are handled,” one developer told Wired.
Chinese Tiktok alternatives Re-note It has attracted approximately 700,000 US users. I wanted an American influencer when Tiktok is prohibited It’s coming up in January. Many of those people may only use renotes for a few days, but a new analysis from the University of Toronto Citizen Lab highlights The lack of encryption has allowed users to be opened to “surveillance by the government or ISP (Internet Service Providers) as well as by the Chinese government.”
Renote analysis has found many network security issues in both Android and iOS apps. Renote images and videos fetched using HTTP connections rather than industry standard or encrypted HTTPS. Some versions of the app contained a vulnerability that allowed attackers to “read” permissions on the phone. And it “sent inadequately encrypted device metadata.” The flaw was included in the Rednote app and some third-party software libraries that we use. Citizen Lab has reported issues to businesses since November 2024, but has not responded to any of them.
Security researchers say the vulnerability could put the surveillance of all users, including Chinese users. “The Chinese government may already have a mechanism to legally obtain detailed data from user renotes, making Chinese users particularly vulnerable to non-Chinese government surveillance. The research also states the issues found.
In China, it emphasizes that even widely used apps may not meet the same security standards as apps developed abroad. “Popular applications in China often cannot encrypt sensitive data using TLS without encryption, proprietary encryption protocols, and without certificate verification,” the analysis said. It states.
Over the past two weeks, US spy planes have flew at least 18 missions around the Mexican border. CNN It is shown. The flight marked a “dramatic escalation of activity,” and as the Trump administration designated drug cartels as a terrorist organization, transforming the country’s security equipment into deporting millions of migrants, the publication reports. According to CNN, various military planes, including Navy P-8 and U-2 spy surfaces, are used for operation, allowing them to collect intelligence of both images and signals. Also, this week, the US immigration and customs enforcement agency has it It’s advertised A new agreement that will allow people to monitor “negative” social media posts that they make about it.
last month, The British government attacked Apple A secret order that you request from the company, Access data stored in an encrypted iCloud backup. Orders issued under the Technical Capability Notice UK surveillance laws of 2016was first reported last week by the Washington Post. Since then, there has been a growing backlash against demands from the UK government, with many highlighting how change will affect the safety of millions of people around the world.
US Senators Ron Wyden and Andy Biggs have sent letters to Tarshi Gabbard, the new director of national intelligence. Orders will undermine trust Between the US and the UK. “If the UK does not immediately reverse this dangerous effort, we recommend reevaluating the US-UK cybersecurity arrangements and programs, as well as the sharing of US intelligence with the UK,” the pair said. A US telecommunications company that elicited comparisons with salt typhoon hacks and used the “backdoor” surveillance. Since details of the order appeared, Human Rights Watch has said thatAmazing too much109 civil society organizations, businesses, and other groups. I signed an open letter “Demand puts millions of security and privacy at risk.”