Los límites legítimos de la libertad de expresión: La prueba de las tres partes

O: Hada de recursos de Seguridad Digital
Derechos digitales en América Latina: los cambios que necesitamos y aún no llegan
GitHub - soxoj/maigret: 🕵️♂️ Collect a dossier on a person by username from thousands of sites
Codeberg.org
Homoglyph Homographs Generator - Online Writing
Reseña de *Privacidad no incluida: Bumble
GitHub - Shawn-Shan/fawkes: Fawkes, privacy preserving tool against facial recognition systems. Obfuscate/Cloak your face
Why VPNs are Wrong and MPRs are Right
GitHub - AppImage/awesome-appimage: Lovingly crafted AppImage tools and resources
Set up DNS 1.1.1.1 on a router · Cloudflare 1.1.1.1 docs
POSSE - IndieWeb
GitHub - vulhub/vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose
Fail2ban (Español) - ArchWiki
Instalar configurar y usar fail2ban para evitar ataques de fuerza bruta
UFW Essentials: Common Firewall Rules and Commands
Iptables Essentials: Common Firewall Rules and Commands
Nobody Wants to Teach Anymore
GitHub - AndyFul/ConfigureDefender: Utility for configuring Windows 10 built-in Defender antivirus settings.
Harden Windows Defender protection to the highest levels on Windows 11/10
The 3 Biggest Security Mistakes Linux Users Make
Router Security
Hardening SSH
Mpv – A free, open source, and cross-platform media player (mpv.io)
Prose.sh – A blog platform for hackers (prose.sh)
GitJournal: Mobile first Markdown notes synchronized with Git (gitjournal.io)
Detecting unauthorized physical access with beans, lentils and colored rice (dys2p.com)
revealed in 2014 in the book "Global Surveillance" by Glenn Greenwald that the NSA's "TAO" (Tailored Access Operations) unit has been intercepting and tampering with technical devices in transit since at least 2010.
The relevant factor in this process is the amount of elements on the edge of the sticker. In addition, there are special seal stickers available which break when peeled off. They are probably more suitable for this method.
Glitter nail polish directly
This method is used by Nitrokey, Purism and others, and is safer compared to the previous method in our view. The screws are sealed directly with glitter nail polish. The screws holes are particularly relevant here.
Our favorite so far is sealing screws with epoxy resin and glitter nail polish, where the polish can be in or over the resin.
random mosaic $ rm -r ice
An alternative to sealing is embedding the whole object in a substance whose surface forms a mosaic that is difficult to reproduce and changes when manipulated. It should be as easy as possible to check the mosaic manually or by technical means. The goal is to protect written documents, data carriers, communication devices, hardware wallets and other sensitive objects in such a way that unauthorized access can be detected with greater probability. We distinguish between two use cases: short-term storage and longer-term storage or shipping.
Tailscale SSH (tailscale.com)
RethinkDNS | Fast, secure, configurable, private DNS + Firewall for Android.
¿Qué necesita proteger?
Exposing the Invisible - The Kit — The Kit 1.0 documentation