Social media platform Twitter permanently banned the account of President Donald Trump on Friday following the unfortunate events that took place at the US Capitol on Wednesday.“As Twitter notes, letting Trump continue to post tweets, Facebook posts and YouTube videos for his white nationalist supporters risks ‘further incitement of violence,'” Naing said.
But by default, reports also let managers drill down into data on individual employees, to find those who participate less in group chat conversations, send fewer emails, or fail to collaborate in shared documents.“This is so problematic at many levels,” tweeted the Austrian researcher Wolfie Christl, who raised alarm about the feature.
macOS uses OCSP to make sure that the developer certificate hasn’t been revoked before an app is launched.As Jeff Johnson explains in his tweet above, if macOS cannot reach Apple’s OCSP responder it skips the check and launches the app anyway - it is basically a fail-open behaviour.
But six weeks later, Johnson received an email from Twitter saying that three of those tweets had been removed from his account in response to a Proctorio request filed under the Digital Millennium Copyright Act. Proctoring software isn’t new, but its use has skyrocketed due to the pandemic.
Netflix has sent over a hundred takedown requests this week targeting tweets that are critical of the movie 'Cuties' and/or urged people to cancel their subscriptions.The streaming giant asked Twitter to remove dozens of tweets that included footage from the French coming-of-age film Cuties.
Twitter has changed its policy on sharing hacked materials after facing criticism of its decision to block users from tweeting links to a New York Post article that contained Hunter Biden emails allegedly retrieved from a computer left at a repair shop.
I'm going to outline how you can read Twitter privately, by using a RSS feed reader and Nitter RSS feeds."Nitter is a free and open source alternative Twitter front-end focused on privacy".The feed can be retrieved for a single user (e.g. nitter.decent.social/lexfridman/rss) and contains their last 20 tweets.
ShareTweet Human rights experts from the United Nations have published a 14-page letter which was sent to China in which they lay out their concerns that China is violating international human rights agreements with their new law.
Easily automate deleting your old tweets, likes, and DMs with Semiphemeral.Roughly one hundred years ago, in June of 2019, I released an open source Twitter privacy tool called Semiphemeral that makes it simple-ish to delete years of old tweets.
ShareTweet The Private Internet Access Next Generation Network is online and functional, but you need to be using the latest version of the PIA client on your device to take full advantage of it.
ShareTweet Julian Assange, the editor and founder of WikiLeaks, will be taken into a London courtroom on Monday for a hearing which will determine whether he will be extradited to the United States to face charges.
ShareTweet The United States Court of Appeals for the Ninth Circuit has just ruled that the “NSA’s bulk collection of Americans’ phone records was illegal.” For years, the NSA has conducted a domestic mass surveillance program on Americans’ phone records with little to no resistance from other arms of the government but lots of resistance from civil liberties and privacy advocates within the States.
ShareTweet Consumer credit reporting agency Experian has suffered a data breach at their South African branch.
ShareTweet A new class action lawsuit in the state of Illinois is trying to bring Facebook to task for illegally harvesting biometrics data, specifically facial recognition data or a “face template.” The lawsuit, Whalen v.
ShareTweet The New Jersey Supreme Court has ruled that passcodes aren’t protected by the Fifth Amendment.The rationale in these states is that while law enforcement may know about certain incriminating documents that could be accessed if the passcode were provided, providing the passcode allows access to absolutely everything on the phone – which could turn up additional evidence that prosecutors didn’t know about.
ShareTweet A Virginia based government contracting firm called Anomaly Six LLC has been revealed to be inserting a proprietary software development kit (SDK) into over five hundred mobile apps then sharing gathered data with the government.
The new censorship law also seems to have been brought in partly for personal reasons, as Al Jazeera reports: President Recep Tayyip Erdogan, who has greatly concentrated powers into his own hands during 17 years in office, pledged this month to bring social media platforms under control following a series of tweets that allegedly insulted his daughter and son-in-law after they announced the birth of their fourth child on Twitter.
said late Thursday that about 130 people were targeted in a cyberattack that took control of high-profile accounts to promote a bitcoin scam."Based on what we know right now, we believe approximately 130 accounts were targeted by the attackers in some way as part of the incident," the social media firm tweeted.
Yesterday, I tweeted calling out Microsoft’s LinkedIn showing that it was accessing my clipboard every keystroke.However, the real problem and thing that scares me is the fact that ANY app has the ability to access the clipboard without permission.
In response, Megan Anctil, a former Slack employee, tweeted, "is one of those actions going to include taking down the blog post about working with the police that I and other black employees diplomatically asked to have removed three years ago that’s still up?".
Luckey, a founder of the virtual reality group Oculus who is now works for a defence tech firm, tweeted: “YouTube has deleted every comment I ever made about the Wumao, an internet propaganda division of the Chinese Communist party,” and suggested the filtering appeared to be a new policy of censorship.
While touting measures to protect Israelis from the coronavirus, Netanyahu did not touch on what the Jewish state is planning to do to stop the spread of the disease in the Palestinian territories it occupies and effectively controls.“Not a single word about Israel’s actions to protect millions of Palestinians living under Israeli military occupation,” ACLU Human Rights Program Director Jamil Dakwar tweeted.
Amidst the millions of social media users is a sizable chunk well-acquainted with what I’ll call “post-post anxiety.” It’s a dreadful malady, really; with symptoms that come on after you’ve fired off a tweet or pic that is, on second-thought, offensive or unflattering.
"mr qian, if you don't mind me saying—"."uh, kun."uh, kun.for what it's worth, you're raising some really great kids.".kun sighs."are you kidding?!"johnny exclaims."you're, like, super dad!"."super dad?".johnny splutters.
DHH, CTO of BaseCamp, tweets the following:Google is not a search engine, it’s an ad engine.This is so ludicrously user hostile that it’s only tenable when you operate a monopoly.Google are able to raise the cognitive price on users because they’ve cornered the market.
"With news of the acquisition of your company, I intend to sell my Fitbit & delete my account," said a tweet from Tanya Janca, which received several hundred retweets and likes.
A screenshot posted on Twitter has provided fresh evidence to suggest that Facebook is working on end-to-end encryption for calls made on the Facebook Messenger app.According to a tweet posted yesterday, it looks like Facebook is indeed working on end-to-end encryption for calls made through Facebook Messenger.
Twitter CEO Jack Dorsey tore into those arguments with the series of tweets announcing his company's policy change.Zuckerberg said Facebook believes "transparency" around political advertising is preferable to a ban on the ads.
Embetty displays remote content like tweets or videos without compromising your privacy.yarn add @heise/embetty.: $ git clone $ cd embetty $ yarn $ yarn build Supported embed types.The Embetty server component does not proxy video data .