Host the Resistance

264 bookmarks
Newest
GlobaLeaks - Free and Open-Source Whistleblowing Software
GlobaLeaks - Free and Open-Source Whistleblowing Software
Amnesty International used it in Pakistan and Saudi Arabia, in order to facilitate and secure dialogue with the organization’s lawyers and researchers residing within these countries. The Prosecutor Office at the International Criminal Court (ICC) used it as a secure tool for witnesses to report on international crimes of genocide, of crimes against humanity and of war crimes, in the Libya and Central African Republic II.
·globaleaks.org·
GlobaLeaks - Free and Open-Source Whistleblowing Software
Introducing WEBCAT: Web-based Code Assurance and Transparency
Introducing WEBCAT: Web-based Code Assurance and Transparency
In this post, we introduce Web-based Code Assurance and Transparency, a project that supports verifiable in-browser code for single-page browser applications. Along with this post, we are publishing the WEBCAT project repository; follow-up posts will provide more detailed information.
WEBCAT is a multicomponent project; the easiest way to explain it is to start with the end-user experience. When a user visits a website that has enrolled in WEBCAT, before the site can load the content is checked against a signed manifest to ensure that it has not been tampered with
The users we’re trying to protect are engaged in an important, potentially high-stakes activity. Whether it’s using SecureDrop, GlobaLeaks, or another browser-based encryption tool
One use case that WEBCAT supports is that of site administrators self-hosting third-party applications — the backbone of the decentralized web. Self-hosted applications (like SecureDrop!)
WEBCAT is a project that lets application developers or service providers create and update signed artifacts attesting to the code that they are shipping; site owners enroll their domains that run these applications; and end users automatically verify that the code they are served is authentic
A signing script that allows application developers to generate a signed manifest to verify the content they intend to serve to users An enrollment server to allow site owners to enroll their website An updater service that builds a list of trusted signers per domain A Firefox extension, to provide the end user an in-browser integrity checking mechanism, which blocks code that fails integrity checks for enrolled websites and warns the user.
We’ll have more to say in the weeks and months to come. In the meantime, we welcome your feedback: you can write to us at <securedrop@freedom.press> (PGP-encrypted), or find us on GitHub.
·securedrop.org·
Introducing WEBCAT: Web-based Code Assurance and Transparency
Molly
Molly
Molly is an improved Signal app for Android
·molly.im·
Molly
Simple Hosting - Gandi.net
Simple Hosting - Gandi.net
Web hosting for websites and web applications of all sizes. Try your first instance of any size for free for 10 days with a free Gandi account. No credit card required.
·shop.gandi.net·
Simple Hosting - Gandi.net
Canada eSIM | Prepaid Canada data | aloSIM
Canada eSIM | Prepaid Canada data | aloSIM
Looking for Canada data? No matter where you are in the Great White North, a Canada eSIM can keep you online without Wi-Fi.
·alosim.com·
Canada eSIM | Prepaid Canada data | aloSIM
eSIM for Canada
eSIM for Canada
Buy a prepaid eSIM for Canada with instant delivery. Stay connected without roaming fees. Easy & fast.
·prepaid.canadiansim.com·
eSIM for Canada
Resources - Access Now
Resources - Access Now
Resources Access Now’s team of policy experts, advocates, and technologists are finding solutions to help everyone protect themselves from digital threats
·accessnow.org·
Resources - Access Now
How to Securely Wipe a Hard Drive on Your Mac
How to Securely Wipe a Hard Drive on Your Mac
Spread the loveIf you’re planning on selling, donating or disposing of your Mac, it’s important to make sure all of your personal files and information are gone for good. The best way to accomplish this is to securely wipe your hard drive. Here’s how you can do it: 1. Create a backup: Before you start the process, make sure you have a backup of all your important files, so you don’t lose any data you may need in the future. 2. Disable FileVault: If you have FileVault enabled, you’ll need to disable it before wiping your hard drive. You can […]
·thetechedvocate.org·
How to Securely Wipe a Hard Drive on Your Mac
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!
The document discusses vulnerabilities in macOS privacy mechanisms, focusing on unauthorized access to user data such as location, contacts, and calendar through exploitation of iCloud tokens. It highlights attacks via applications like GarageBand and iMovie by manipulating macOS entitlements and dynamic libraries. The conclusion urges users to review their iCloud settings to enhance security.
·slideshare.net·
What happens on your Mac, stays on Apple’s iCloud?!
Cell Phone Unlocking Cellular Telexommunications Industry Association agreement w FCC
Cell Phone Unlocking Cellular Telexommunications Industry Association agreement w FCC
When cell phone users change between compatible wireless service providers, they have the option of "unlocking" their phones to use on their new service provider's network, giving consumers greater freedom and flexibility while increasing incentives for service providers to innovate.
Carriers, upon request, will unlock mobile wireless devices or provide the necessary information to unlock their devices, for customers and former customers in good standing and individual owners of eligible devices after the fulfillment of the applicable postpaid service contract, device financing plan or payment of an applicable early termination fee.
Carriers that lock devices will clearly notify customers that their devices are eligible for unlocking at the time when their devices are eligible for unlocking or automatically unlock devices remotely when devices are eligible for unlocking, without additional fee. Carriers reserve the right to charge non-customers/non-former-customers a reasonable fee for unlocking requests.
Within two business days after receiving a request, carriers will unlock eligible mobile wireless devices or initiate a request to the original equipment manufacturer (OEM) to unlock the eligible device, provide an explanation of why the device does not qualify for unlocking, or why the carrier reasonably needs additional time to process the request.
·fcc.gov·
Cell Phone Unlocking Cellular Telexommunications Industry Association agreement w FCC
GrapheneOS usage guide
GrapheneOS usage guide
Usage instructions for GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
·grapheneos.org·
GrapheneOS usage guide
Find your AirPods
Find your AirPods
Use Find My to find your AirPods. You can also set alerts to warn you if you’ve left your AirPods behind, or mark them as lost if you can’t find them.
When the Find My network is on, you can see the location of AirPods 3, AirPods 4 with Active Noise Cancellation (ANC), AirPods Pro, or AirPods Max in the Find My app for up to 24 hours after they last connect to your device, even if they’re not nearby.
Note: If your AirPods 3, AirPods 4 (ANC), AirPods Pro, or AirPods Max are used with multiple Apple Accounts (for example, if you lend or share AirPods), only the person who turned on the Find My network can see them in the Find My app.
You can see the current or last known location of your AirPods in the Find My app.
If you have AirPods 4 (ANC), AirPods Pro 2, or AirPods Pro 3, you can also play a sound on the charging case.
If your AirPods aren’t connected to your device and you don’t have the Find My network turned on, the sound plays the next time they connect to a Wi-Fi or cellular network.
·support.apple.com·
Find your AirPods