#instructions

anonymiss@despora.de

What #Mastodon #server could I #choose?

It's a real #problem you don't know much about the #administration of the servers. A Mastodon server could be a "Trojan Horse" to get your data. Now that they are leaving #Twitter many new servers appear and many admins will close their server next year again because it's too expensive or too much #work.

So here are some points you can check:

  • Don't go to #fosstodon because I am there. Choose fosstodon only if most of the ther points of this list fitt your needs.
  • The donain of the server shouldn't include "Mastodon" because most of the new users search their server via #Google. If they all choose servers with "Mastodon" inside of the #domain it's against #decentralization and the servers are soon overcrowded with much work for the administration.
  • Check the server #information and #background. It's better to choose a server operated by a #community and not a single person. The server should have been only before the #hyoe because not many of the new servers will survive one year.
  • Check the domain. It should be #cool and fitting to the spirit of your posts.
  • Check the servers blocked on your server. Don't choose a server where nothing is blocked because then you know there is no #moderation on your server. If right wing servers are not blocked you are maybe choosing a server of a right echo chamber. If your server is blocked on many others there is something wrong with the administration.
  • At the end its the best to open your own server and be your own #admin. But don't forget that Mastodon isn't running properly on a raspberry pi. The server needs money and time for updates and moderation. So think of donating to your server if possible.
  • Learn about the #Fediverse. You are here on #Diaspora and now you think about going to Mastodon because Elon #Musk is killing Twitter. But why should you go to Mastodon only because the #press #filterbubble is talking about it? Maybe you can be wiser than all the lemmings out there and learn something first with a search engine of your #trust. With #Friendica you can post to the Fediverse and read it on Diaspora and Mastodon.
  • At the end it would be nice if you can follow me on Mastodon: https://fosstodon.org/@anonymiss - @anonymiss@fosstodon.org :)

Please let me know what you think in the comments and thank you for reading :)


#knowledge #wisdom #internet #instructions #news #software #education #help #todo #tutorial #advice #privacy #security #online #communication #trend #trending #ElonMusk #economy #corporation #freedom #donate #alternative #blog #microblogging #microblog

california@diaspora.permutationsofchaos.com

security.txt

A proposed #standard which allows websites to define #security #policies.

Take a look: https://securitytxt.org

“When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a result, security issues may be left unreported. security.txt defines a standard to help organizations define the process for security researchers to disclose security vulnerabilities securely.”

#web #www #website #vulnerability #cybercrime #privacy #advice #instructions #communication #software #bug #research

anonymiss@despora.de

Secure data transfer #guide for #paranoid journalists and hacktivists ...

Prologue (Why we live in the dark #digital age!)

The #Pegasus #scandal showed that no one took #Snowden's revelations seriously. Meanwhile, it is not only the state actor #NSA that monitors everyone but a private company in #Israel the #NSO Group. Of course, always installing the latest updates on the device is of no use if the #intelligence agencies withhold the #security vulnerabilities from us, which does not increase security but endangers it.

The #problem is that today, even with a degree in #computer science, it is almost impossible to keep an overview of the entire security situation, as it has become far too complex. You would need a very simple tool, where the wrong usage is almost impossible. A #laptop or #smartphone is out of the question because even experts can only detect manipulated #firmware in complicated, time-consuming processes.

Solution

In order not to be monitored digitally, one works as analog as possible at the destination. Records are handwritten on paper, which is not left unattended anywhere. For the transmission of the records to the headquarter, they are photographed with a digital camera and stored on an SD card. This SD card is then inserted into a #RaspberryPi where the images are encrypted. The Raspberry Pi connects to the #darknet (VPN, i2p or TOR) via the smartphone's #wifi. From this file drop in the darknet, the headquarters can download the data. Afterwards, you should destroy all records and the SD card so that no contaminating data can be found during a police search.

The choice of darknet must be adapted to the destination country. Special bridges are needed to tunnel through the great firewall of China. Instead of using your own smartphone to connect to the #Internet, it's better to use a free WiFi connection if one is available. A micro SD card is easy to hide. It can be smuggled into a neighboring country by a trusted person and the transfer can take place there. This means that no suspicious electronic traces lead back to you.


#journalism #freedom #press #humanrights #surveillance #news #internet #activism #instructions #i2p #TOR #vpn #encryption #hacktivism #policestate #protest #economy #politics #exploit #cyberwarfare