nemozone

✉️ a zone for no one and everyone :) 🔞

The consensus from experts and digital rights organizations like the Electronic Frontier Foundation (EFF) is that your phone is probably not secretly listening to you through its microphone to deliver targeted ads. There is no verified evidence that companies are covertly recording your conversations without consent for advertising purposes.

Instead, the feeling that your phone is listening comes from advertisers and data brokers using extensive profiles built from other sources of data collected in covert ways. These data brokers gather information about you online and offline—such as your age, location, browsing history, device identifiers broadcast over Bluetooth and WiFi, and your behavior on websites. They then use this detailed information to make educated guesses about what products or ads might appeal to you. If you see a targeted ad that seems eerily linked to a recent conversation, it's more likely due to this complex tracking and profiling across various platforms and devices rather than actual audio surveillance through your microphone.

There have been cases of apps or malware misusing microphone access, but those are against the law and subject to enforcement and fines. Also, some smartphones use microphones for voice commands or assistants with user permission, but this is distinct from secret listening.

Overall, the problem lies in pervasive and often invisible tracking methods rather than audio surveillance, involving an entire ecosystem of data brokers and advertising networks compiling and sharing detailed user profiles.[2][4]

The EFF advises users to: – Use privacy tools like browser extensions to block trackers – Review and limit app permissions asking for microphone or data access – Manage data collection on smart devices – Support stronger privacy laws and regulations against data broker practices.[4]

This explanation aligns with recent discussions and research on the topic showing that the myth of phones secretly listening is largely a misunderstanding of how targeted advertising works.[3][6]

1 2 3 4 5 6 7 8 9 10

The website 404 Media hosts a popular, more legible PDF version of the “Simple Sabotage Field Manual,” a World War II era guide originally created by the Office of Strategic Services (OSS) to train ordinary citizens in acts of simple sabotage against fascist regimes. This manual was declassified by the CIA in 2008 and describes ways to annoy and disrupt enemy operations through everyday acts that do not require special equipment or training.

The manual surged in popularity recently, becoming one of the most accessed books on Project Gutenberg, with over 230,000 downloads in 30 days, reflecting renewed interest in its tactics for resistance and sabotage. The PDF version shared by 404 Media was reformatted by a reader to be more readable and searchable, improving on an older, blurry CIA release.

The guide includes tactics for disrupting bureaucratic work, lowering morale, creating confusion, and more direct acts of physical sabotage, targeting roles like telephone operators, train conductors, managers, employees, and even movie theater patrons. The guide emphasizes simple, low-risk actions that ordinary people can take to resist oppressive systems or administrations.

You can find the reformatted PDF through 404 Media, which shares it openly to allow wider access and use. The manual's resurgence has been linked to current sentiments about organizational and governmental frustrations, inspiring some to explore these historical sabotage tactics as subtle acts of resistance.[4][6][8]

1 2 3 4 5 6 7 8 9 10

How the Internet Really Works: An Illustrated Guide to Protocols, Privacy, Censorship, and Governance is a comic book-style, illustrated introduction designed to explain the technical workings of the Internet in an accessible, jargon-free way. Written by ARTICLE 19, an international non-profit focused on freedom of expression, with contributions from experts like Mallory Knodel, the book breaks down how data moves through the Internet, the protocols involved, how security and privacy function under the hood, and issues related to censorship and governance.

The book uses playful illustrations and the narration of a cat character named Catnip to guide readers through topics such as:

  • How the Internet is networked, including nodes, packets, and protocols
  • Cryptographic techniques that secure data secrecy and integrity
  • How censorship is implemented, monitored, and circumvented
  • Algorithms, cybernetics, and machine decision-making on the Internet
  • Centralization of Internet power and its impact on democracy and human rights
  • Internet governance and ways for civil society to engage with it

It aims to give readers enough technical understanding to advocate for their digital rights and privacy, empowering them to safeguard their security and participate in shaping internet laws and policies. The tone and style make it suitable for non-technical audiences seeking a foundational grasp of how the Internet really works from both a technological and socio-political perspective.

The book also serves as a call to action for a digitally inclusive and rights-respecting internet future. It is valuable for citizens concerned about online safety, civil servants addressing censorship, advocates of freedom of expression, and anyone curious about Internet infrastructure.

In summary, this guide combines education on Internet protocols and infrastructure with a focus on privacy, censorship, and governance, all conveyed through clear language and engaging visuals for general readers.[1][3][5][7][8][9]

[1] https://www.goodreads.com/book/show/56212608-how-the-internet-really-works [2] https://fliphtml5.com/gnel/ctge/basic [3] https://www.academia.edu/95627678/How_The_Internet_Really_Works [4] https://books.google.com/books/about/How_the_Internet_Really_Works.html?id=3IoFEAAAQBAJ [5] https://nostarch.com/how-internet-really-works [6] https://www.medimops.de/article-19-how-the-internet-really-works-an-illustrated-guide-to-protocols-privacy-censorship-and-governance-gebundene-ausgabe-M01718500297.html?variant=LibriNew [7] https://www.asisonline.org/security-management-magazine/articles/2022/03/book-review-how-the-internet-really-works-an-illustrated-guide-to-protocols-privacy-censorship-and-governance/ [8] https://catnip.article19.org [9] https://www.penguinrandomhouse.com/books/616820/how-the-internet-really-works-by-article-19/

🔍 Discover what attackers already know about your website in just 20 seconds with Web Check! 🚀 Over 30 checks including security, tech stack, DNS, and more—all in one powerful OSINT tool. Perfect for devs, sysadmins & security pros! 🔐✨ Try it now: https://web-check.xyz/ #CyberSecurity #WebDev #OSINT #InfoSec #newz

In an era where democratic values face unprecedented challenges, understanding how to defend and strengthen democracy has never been more crucial. Whether you're a student, activist, policymaker, or simply a concerned citizen, equipping yourself with the right knowledge is the first step toward positive change. Enter The Anti-Autocracy Handbook: A Scholars' Guide to Navigating Democratic Backsliding—a timely resource designed to help you recognize and resist the subtle (and not-so-subtle) erosion of democratic norms.


📚 What’s Inside the Handbook?

The handbook offers a comprehensive, research-backed overview of:

  • Warning Signs of Backsliding: Learn to spot the early indicators of autocratic tendencies, from attacks on the free press to the undermining of judicial independence.
  • Case Studies: Real-world examples from around the globe illustrate how democracies have faltered—and how some have fought back.
  • Actionable Strategies: Practical steps for individuals and organizations to promote accountability, transparency, and civic engagement.
  • Scholarly Insights: Contributions from leading experts in political science, law, and civil society.

🧭 Why Does This Matter?

Democratic backsliding doesn’t happen overnight. It’s often a gradual process, making it easy to overlook until it’s too late. By staying informed and proactive, we can help safeguard the principles of freedom, equality, and justice for future generations.


🚀 How Can You Get Involved?

  • Read the Handbook: Dive deeper into the strategies and insights offered by scholars.
  • Share Knowledge: Discuss what you learn with friends, family, and your community.
  • Engage Civically: Vote, attend town halls, and support organizations that defend democratic institutions.
  • Stay Vigilant: Keep an eye out for policies or rhetoric that threaten democratic norms.

📖 Ready to Start?

Access the full text of The Anti-Autocracy Handbook: A Scholars' Guide to Navigating Democratic Backsliding for free here:
https://zenodo.org/records/15696097


Democracy is not a spectator sport. The more we know, the stronger we become together! 💪🌱


References:

Demokratie ist keine Selbstverständlichkeit – sie muss immer wieder verteidigt und gestärkt werden. In Zeiten, in denen autoritäre Tendenzen weltweit zunehmen, ist es wichtiger denn je, sich aktiv für demokratische Werte einzusetzen. Das Anti-Autokratie-Handbuch von netzpolitik.org stellt 26 praktische Werkzeuge vor, mit denen jede*r die Demokratie schützen kann.


✊ Warum brauchen wir ein Anti-Autokratie-Handbuch?

Autokratische Strömungen bedrohen nicht nur die Freiheit, sondern auch die Vielfalt und Gerechtigkeit in unserer Gesellschaft. Das Handbuch bietet konkrete Ansätze, wie wir uns als Bürger*innen wehren und für demokratische Prinzipien einstehen können – sei es im Alltag, im Netz oder in der Politik.


🧰 Die 26 Werkzeuge im Überblick

Hier einige Highlights aus dem Handbuch:

  • Wissen verbreiten: Informiere dich und andere über demokratiefeindliche Entwicklungen.
  • Zivilcourage zeigen: Greife ein, wenn du Diskriminierung oder Hass beobachtest.
  • Fakten checken: Bekämpfe Desinformation mit verlässlichen Quellen.
  • Mitmachen: Engagiere dich in Initiativen, Vereinen oder politischen Gruppen.
  • Digitale Selbstverteidigung: Schütze deine Daten und Privatsphäre online.
  • Solidarität leben: Unterstütze Betroffene von Ausgrenzung und Gewalt.
  • Wählen gehen: Nutze dein Wahlrecht und motiviere andere dazu.

Jedes Werkzeug wird im Handbuch ausführlich erklärt und mit praktischen Tipps ergänzt.


📚 Weiterführende Informationen

Das komplette Handbuch mit allen 26 Werkzeugen und vielen weiterführenden Links findest du hier:

👉 Anti-Autokratie-Handbuch: 26 Werkzeuge zur Verteidigung der Demokratie (netzpolitik.org)


💡 Fazit

Demokratie lebt vom Mitmachen! Jede*r kann einen Beitrag leisten – mit Wissen, Engagement und Solidarität. Das Anti-Autokratie-Handbuch ist ein wertvoller Begleiter für alle, die unsere Gesellschaft aktiv mitgestalten und schützen wollen.


Bleib informiert, bleib aktiv – für eine starke Demokratie!


Quelle:
Anti-Autokratie-Handbuch: 26 Werkzeuge zur Verteidigung der Demokratie – netzpolitik.org

Are you looking for a reliable way to permanently delete sensitive files from your Linux system? Meet File Shredder, a powerful utility designed to enhance your data privacy on GNOME desktops! 🚀


What is File Shredder? 🧹

File Shredder is a file deletion program tailored for Linux users who value security and privacy. Unlike traditional file deletion, which simply removes file references, File Shredder overwrites the data, making it much harder to recover your sensitive information1.

“File Shredder is a file deletion program designed to permanently remove sensitive files from your computer, enhancing data privacy.”
apps.gnome.org/Raider/3


Why Use File Shredder? 🤔

  • Permanent Deletion: Ensures that deleted files are much harder to recover, protecting your private data from prying eyes1.
  • Enhanced Privacy: Great for personal documents, financial information, or any files you don't want to risk being restored1.
  • Simple Interface: Designed with GNOME’s philosophy of simplicity and usability in mind, making it easy for anyone to use1.

Important Note on SSDs 💾

While File Shredder is highly effective, it's important to know that modern SSDs use technologies that can limit the effectiveness of file shredding. No software can guarantee 100% secure deletion on SSDs due to how data is managed at the hardware level. However, shredding still significantly increases the difficulty of data recovery, requiring specialized tools and expertise1.


How to Get Involved 🤝

  • Report Issues: Help improve File Shredder by reporting bugs or suggesting features via the issue tracker2.
  • Join the Community: Connect with the maintainer, Alan Beveridge, and other contributors to make File Shredder even better1.

Quick Facts Table

Feature Description
Platform Linux (GNOME Desktop)
Main Use Permanent file deletion
Maintainer Alan Beveridge
Security Focus Data privacy, file shredding
Limitations SSDs may not be fully erasable by software alone

Final Thoughts 💡

File Shredder is a must-have utility for anyone serious about data privacy on Linux. While no tool is perfect—especially on SSDs—it adds a crucial layer of protection against unwanted file recovery. Give it a try and take control of your digital privacy today! 🔐


Learn more and download File Shredder from the official GNOME Apps site.
Citations: 13

Surveillance is everywhere—from retail stores and vehicles to concerts and public spaces. Facial recognition technology is often used without your knowledge or consent. In this blog post, I’ll break down how facial recognition systems work, reveal how IR (infrared) cameras can see through sunglasses, and share real-world test results on blocking these systems using IR-blocking glasses and reflective materials. If you value your privacy, read on! 👇


📸 How Facial Recognition Technology Works

Facial recognition systems use advanced algorithms to analyze unique facial features—such as the distance between your eyes, the shape of your nose, and the contour of your jawline. These systems compare your face to massive databases, identifying or verifying your identity in seconds.

  • Where is it used?
    • Retail stores (e.g., Kroger, Macy’s, Walmart)
    • Vehicles (driver monitoring)
    • Public events and concerts
    • Airports and border control

Did you know? Many stores use facial recognition for security, marketing, and even to monitor your mood while shopping! 🛒


🔬 IR Cameras: Seeing Through Sunglasses

Most modern facial recognition cameras use infrared (IR) light to capture facial features, even in low light. This means that regular sunglasses or hats offer little protection—IR cameras can see right through them.

  • Test Results:
    • Standard sunglasses: ❌ No protection
    • Regular hats: ❌ No protection
    • Reflective materials: ⚠️ Partial protection

🛡️ What Actually Blocks Facial Recognition?

1. IR-Blocking Glasses

IR-blocking glasses are designed to filter out infrared light, making your face much harder to detect by IR cameras.

2. Reflective Privacy Hats

Some hats use reflective materials to bounce IR light away from your face. Results are mixed—these can help, but are not foolproof.


🧪 Real-World Testing: What Works?

I tested several products in real-world environments:

  • IR-blocking glasses: Consistently blocked IR cameras from capturing facial features.
  • Reflective hats: Provided some protection, but not as reliable as glasses.
  • Regular sunglasses: Did NOT block IR cameras.

Conclusion:
For the best privacy, invest in IR-blocking glasses. They’re affordable and effective for most situations.


🛒 Where to Buy


📚 Sources & Further Reading


💡 Final Thoughts

This is just Part One of my short series on protecting your privacy from facial recognition. Subscribe for more deep dives into business, tech, and society!

For speaking engagements or privacy consultations, contact me at BusinessReform@Proton.me.

The use of any copyrighted material in this post is for educational and informational purposes only (see Fair Use doctrine).


Written by Dr. Steve Turley for Business Reform.


Stay private, stay informed! 🔒✨

How to Block Facial Recognition Cameras (IRL Tested!) by

Business Reform

How to Block Facial Recognition Cameras (IRL Tested!)

Are you struggling to keep your PGP keys secure and accessible? Look no further! KeePassXC offers a robust solution for storing both your public and secret PGP keys—safely and conveniently.

🗝️ How to Store PGP Keys in KeePassXC

  • Attach Key Files:
    You can store your PGP key files as attachments within your KeePassXC database. This keeps everything in one secure place.
  • Paste Keys as Notes:
    Alternatively, simply paste your keys as notes in any entry. KeePassXC encrypts all data, so your secrets stay safe.
  • Strong Encryption:
    KeePassXC uses AES encryption, which is widely regarded as highly secure. Just make sure to use a strong master password!
  • Backup Your Database:
    Regularly back up your KeePassXC database to prevent data loss. This is crucial for peace of mind.

⚡ Why KeePassXC?

  • Secure Storage:
    Your PGP keys are encrypted and protected by your master password.
  • Convenience:
    Access your keys quickly and easily, without juggling multiple files or tools.
  • Integration:
    While KeePassXC isn’t a full PGP key manager, it’s perfect for storage and organization. For advanced key management, tools like Kleopatra are recommended, but KeePassXC excels at keeping your secrets safe.

💡 Fun Fact

Did you know KeePassXC can also manage SSH keys and even integrate with your SSH agent? It’s a versatile tool for all your secret management needs.


#PGP #KeePassXC #Encryption #Privacy #Cybersecurity #funfact
🔐 Keep your secrets safe and your workflow smooth! 🚀

Kurzelinks.de ist ein praktischer, kostenloser URL-Shortener aus Deutschland, mit dem du lange und unübersichtliche Links im Handumdrehen in kurze, leicht teilbare Kurzelinks verwandelst. Perfekt für Social Media, E-Mails oder überall dort, wo Platz und Übersichtlichkeit gefragt sind!


  • Einfach & Schnell: Gib deine lange URL ein, klicke auf „Kürzen“ und erhalte sofort deinen Kurzelink.
  • Keine Registrierung nötig: Direkt loslegen, ohne nervige Anmeldung!
  • Datenschutz made in Germany 🇩🇪: Deine Daten bleiben sicher und werden nicht weitergegeben.
  • Kostenlos: Der Service ist zu 100% gratis nutzbar.
  • Praktische Statistiken 📊: Behalte im Blick, wie oft dein Link geklickt wurde.

So funktioniert’s – Schritt für Schritt 📝

  1. Link eingeben: Kopiere deine lange URL in das Eingabefeld auf kurzelinks.de.
  2. Kürzen klicken: Ein Klick auf den Button genügt.
  3. Kurzelink kopieren & teilen: Teile deinen neuen, kurzen Link mit Freunden, Kollegen oder Followern!

Typische Einsatzmöglichkeiten 🎯

  • Social Media Posts (Mastodon, Pixelfed, Friendica & Co.)
  • Signal- und Molly-Nachrichten
  • E-Mail-Signaturen
  • Gedruckte Flyer oder Plakate
  • QR-Codes für Events

Fazit 🌟

Kurzelinks.de ist der ideale Helfer, wenn du schnell und unkompliziert Links kürzen möchtest – und das mit Datenschutz „Made in Germany“. Probiere es gleich aus und bring Ordnung in dein Link-Chaos! 🚦


Tipp: Speichere dir kurzelinks.de als Lesezeichen – so hast du den Service immer griffbereit! ⭐


Viel Spaß beim Kürzen! 😃✂️🔗