

Also cool the Doom.pdf
Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’
Also cool the Doom.pdf
Maybe, as I see later also in lemmy.bestiver.se. But not all users are following all lemmy instances-
Google even in this way logs your activity, because half of the internet, apps and services, apart of YT, use Google APIs, like google-taskmanager, googleanalytics, doubleclick.net and others, not only the Google services. Google permiys to manage and delete all this data, naturally it don’t say it and only few user know it, in the Google Dashboard. but only if you have an account. It’s a mess, but Google (Alphabet INC) is everywhere, you can’t avoid it completly, even avoiding its services, except using exclusively i2p or other descentralized apps and services. Google has had too many years a complete freedom to dominate the internet and ending its “don’t be evil”.
That isn’t “something bad could have happened”, but “how much has already happened” because of this.
You can’t with an OS full controlled by Google or Apple. You can only alleviate the problem, using alternatives, such as LinageOS, Ubuntu Mobile, de-googled Android or another distro, but only if you have root access. https://www.pcmag.com/picks/break-away-from-android-ios-7-free-open-source-mobile-oses-to-try
Phones are spyware by definition
Someone still use that?
It’s not so easy to detect a steganographic message in a photo, soundfile or video, it’s only detectable with specific apps. But the main reason is that goverments and security services first need a suspicion that these cute catphoto or an selfi of this guy in a beach is an secret message to make this analyse, much more likely to be suspicious of an encrypted message not feddable. This is surely more interesting to perform an in -depth analysis, instead of wasting time with thousands of vacations, selfies and kitten photos or analyzing the sound archive of your son playing Happy Birthday on his flute.
Murena mail, Nextcloud mail, Tuta, Proton, aything is better as GMail, only Hotmail is worse.
LLO, but this isn’t the way how steganography works. In a photo any pixel has a hex value, a minimal change to another value of one or some bits can’t be seen by an human and so the change of several pixels to an predefined value can hide an message, beeing invisible by sight, but readable by an corresponding app.
For every dirty trick to obtain user data used by govs and companies, exist an dev which release an measure to show them the middle finger. It’s so since more than 20 years.
Also innocent cat photos, a piece of music or in a voice message, in all of these you can encrypt hidden messages.
In 2026 good old steganographic messages, like in North Corea
I’ve enough with my 600Mbs, 50Gbs for an normal user don’t make much sense, it’s more interesting for big Companies with a huge data traffic or for stock options. For straming movies and downloading some piracy soft, are 200Mbs way enough.
Matrix/Element is pretty private, but not wide spreaded. For the use with friends and Family is more realisticto use Signal or any other decentralized Chat.
Rebooting Shoes killed me 🤣
Andisearch Writeup
A threat actor known as “Orange” has leaked nearly 500,000 Fortinet VPN login names and passwords, a move that has sent ripples through the cybersecurity community. These credentials were allegedly scraped from vulnerable FortiGate SSL-VPN devices, exploiting a known vulnerability, CVE-2018-13379, which had been patched since May 2019. Despite the availability of patches, many systems remained unpatched, leaving them susceptible to this breach.
The leaked credentials were posted for free on the RAMP hacking forum, a platform managed by Orange, who was previously associated with the Babuk Ransomware operation. This leak is believed to be a promotional tactic for the RAMP forum and the Groove ransomware operation, aiming to attract other cybercriminals by offering a “freebie”.
The breach has affected organizations across 74 countries, with a significant number of compromised devices located in the USA. The leaked data includes VPN credentials for 498,908 users over 12,856 devices. While some sources confirm the validity of these credentials, others provide mixed reports, indicating that not all credentials may be functional.
Fortinet has acknowledged the breach, emphasizing the importance of patching and resetting passwords to mitigate the risk. They have urged affected users to upgrade their devices to the latest FortiOS versions and perform an organization-wide password reset. The incident underscores the critical need for timely patching and robust security practices to protect against such vulnerabilities.
That is what I mean, it’s a difference between an AI with robbed content in its knowledge/lenguage base and an AI assistant which only search iformation in the web to answer, linking to the corresponding pages. Way more intelligent and ethic use of an AI.
https://i.vgy.me/NkE2v5.gif