Searching txt.sour.is

Twts matching #18
Sort by: Newest, Oldest, Most Relevant

Youpi ! La lutte contre “la haine” sur les intertubes continue de plus belle !
Le bruit de fond, léger il y a encore quelques années, devient progressivement plus fort : selon lui, il semble évident que les intertubes, les réseaux sociaux et le web permettent une fois encore aux discours de haine de proliférer. C’est honteux ! C’est bien simple : il ne se passe plus une semaine sans qu’on voie une […] ⌘ Read more

⤋ Read More

Oups, l’énergie devient fort chère !
Dès 2022, les choses ont été clairement dites par notre Bruneau De Bercy national : il n’y a pas d’inflation ou, disons plutôt que la France y résiste nettement mieux que le reste de l’Europe. Ou disons plutôt que le gouvernement va agiter frénétiquement ses petits bras musclés pour faire baisser les prix délirants de certains […] ⌘ Read more

⤋ Read More

Security alert: social engineering campaign targets technology industry employees
GitHub has identified a low-volume social engineering campaign that targets the personal accounts of employees of technology firms. No GitHub or npm systems were compromised in this campaign. We’re publishing this blog post as a warning for our customers to prevent exploitation by this threat actor. ⌘ Read more

⤋ Read More

An official FBI document dated January 2021, obtained by the American association “Property of People” through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (“Pen Register”) or connection data retention law (“18 USC§2703”). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person’s basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (“Pen Register”); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

⤋ Read More

An official FBI document dated January 2021, obtained by the American association “Property of People” through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (“Pen Register”) or connection data retention law (“18 USC§2703”). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person’s basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (“Pen Register”); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

⤋ Read More

Echapper à l’inflation : des cryptos et de l’or
La période estivale se rapproche, et elle est généralement propice à la lecture. Cela tombe bien : voici un solide ouvrage qui, en plus de vous occuper pendant vos séances de bronzette à la plage, vous donnera un excellent aperçu de la situation financière actuelle et propose quelques pistes de réflexion pour l’avenir. Dans “Echapper à […] ⌘ Read more

⤋ Read More

GitHub celebrates developers with disabilities on Global Accessibility Awareness Day
GitHub is the home for all developers and on this Global Accessibility Awareness Day we are thrilled to celebrate the achievements of disabled developers and recent ships that help them build on GitHub. ⌘ Read more

⤋ Read More

RT by @mind_booster: Este encontro vai ser no próximo sábado (18 Março), para fazerem um aquecimento podem participar no workshop desta tarde das 14h às 18h via meet. Basta que nos enviem um email para: sofia.matias@wikimedia.pt @EurovisionsConf @antena1rtp @nova_fcsh href=”https://txt.sour.is/search?q=%23wikilovesmusicaportuguesa”>#wikilovesmusicaportuguesa**
Este encontro vai ser no próximo sábado (18 Março), para fazerem um aquecimento podem participar no workshop desta tarde das 14h às 18h via meet. Basta que nos enviem um email para: sofia.matias@wikimedia.pt [@Eurovis … ⌘ Read more

⤋ Read More

**RT by @mind_booster: [Workshop de Introdução ao Git]

📆 06/03
🕘 18 horas
📍 DETI - 4.1.19

A AETTUA em conjunto com o GLUA organizou um workshop de Introdução ao Git onde terás a oportunidade de ficar a conhecer esta plataforma e pôr alguns conceitos em prática.

Inscrições: https://workshop-git.aettua.pt/**
[Workshop de Introdução ao Git]

📆 06/03

🕘 18 horas

📍 DETI - 4.1.19

A AETTUA em conjunto com o GLUA organizou um workshop de Introdução ao Git onde terás a oportunidade de ficar a conhecer esta plataforma e pôr … ⌘ Read more

⤋ Read More

** Moon maker **
I recently re-read Peter Naur’s“Programming as theory building”. Afterwards I set out to write my own text editor. The paper posits that it’s really hard, if not impossible, to fully communicate about a program and sort of gestures at the futility of documentation…what spun around inside my head as I read was that our primary programming medium — text files — is silly. Like, some folks would totally 100% s … ⌘ Read more

⤋ Read More

I posted about GoToSocial, but another Mastodon-alternative and Fediverse software, Takahē, seems to make fast progress and has some unique features like support for multiple domains or multiple identities per user. I haven’t tried running it yet, but it looks promising! ⌘ Read more

⤋ Read More

Ce “complot” qui a eu lieu
Avec les #TwittersFiles, ces révélations en chaîne parues sur le réseau social de Musk, il devient évident que sont maintenant avérées ces théories poussées par ce que les médias appellent encore des “complotistes”, et petit à petit, on se rend compte qu’il existe bien un mouvement global, décidé par une petite élite, qui vise à […] ⌘ Read more

⤋ Read More

RT by @mind_booster: O prazo de inscrição no Youth Hacking 4 Freedom, foi alargado até ao final de Janeiro. Para participarem têm de ter entre 14 e 18 anos e viver na Europa. @fsfe #YH4F #SoftwareFreedom #softwarelivre @ANSOL #wikidata #wikimedia
https://fsfe.org/activities/yh4f/

O prazo de inscrição no Youth Hacking 4 Freedom, foi alargado até ao final de Janeiro. Para participarem têm de ter entre 14 e 18 anos e viver na Europa. @fsfe [#YH4F](htt … ⌘ Read more

⤋ Read More

La trêve des complotisseurs
Les températures descendent, le givre s’installe la nuit tombée, les écharpes et – surtout ! – les cols roulés sont de sortie : pas de doute, la période hivernale est là. Et à l’horizon, alors que tintinnabulent clochettes et hommes politiques au crâne vide, on distingue mille et une lumière colorée disposée là par des mairies […] ⌘ Read more

⤋ Read More

Derrière la débâcle de FTX, d’étranges coïncidences
Catastrophe dans le monde des cryptomonnaies : FTX, la deuxième plateforme d’échange, s’est effondrée avec fracas la semaine dernière, entraînant avec elle la chute de la valorisation de la plupart des monnaies numériques, Bitcoin compris. Mais à mesure que la poussière retombe, on s’aperçoit que la plateforme ne se contentait pas d’organiser des marchés entre cryptomonnaies : […] ⌘ Read more

⤋ Read More