And unsafe Doge websites are strongly inclined toward Xa social media platform owned by Musk. Doge’s homepage is a feed of its own X posts, but it also uses code that directs search engines to X.com instead of Doge.gov, Discover the website’s wired comments. “This is usually not the way to handle it, which suggests that the X account takes precedence over the actual website itself,” a developer told Wired.
China tiktok alternative rednote Gained about 700,000 US users Courting American influencers when Tiktok is prohibited January is imminent. While many of them may have used electricity only for a few days, the University of Toronto’s new analysis Citizen Lab has been highlighted How a lack of encryption will turn on US users “any government or ISP surveillance [Internet Service Provider]not only the Chinese government. ”
Analysis of Rednote has found many cybersecurity issues in its Android and iOS apps. Use HTTP connections instead of industry-standard and encrypted HTTPS to get images and videos; some versions of the app contain a vulnerability that allows an attacker to have “read” permission on his phone; it “transmits inadequately encrypted devices Metadata”. These flaws are included in Rednote’s applications and several third-party software libraries used. Citizen Lab has reported these issues to the company since November 2024, but has not received any of them yet.
Security researchers say the vulnerabilities may have the potential to monitor all users, including China, including those in China. “Since the Chinese government may already have mechanisms to legally obtain detailed data about its users, the problems we found also make Chinese users particularly vulnerable to surveillance by non-Chinese governments,” the study said.
It emphasizes that applications that are used in China and even widely in China may not meet the same security standards as those developed abroad. “Popular applications in China generally do not use encryption, proprietary encryption protocols, or use uncertified TLS to encrypt sensitive data,” the analysis said.
In the past two weeks, U.S. spy planes have conducted at least 18 missions around the Mexican border, analyses CNN Shown. The publication reported that the flight marked a “sharp escalation in the event” and came when the Trump administration designated drug cartels as a terrorist group and turned the country’s security agencies to deport millions of immigrants. According to CNN, various military aircraft, including Navy P-8 and U-2 spy aircraft, are used in operations and are able to collect image and signal intelligence. Also this week, U.S. immigration and customs enforcement advertise It will be allowed to monitor new contracts for people to “negative” social media posts about it.
last month, British government hits Apple Ask the company to create a way through secret orders Access data stored in encrypted iCloud backups. This command is called a technical capability notification and is based on UK’s controversial surveillance law 2016The Washington Post reported for the first time last week. Since then, opposing the strong opposition from the British government demands, many highlighted how a change will affect the security of millions of globally.
U.S. Senator Ron Wyden and Representative Andy Biggs have sent a letter to Tulsi Gabbard, the new director of national intelligence, saying Commands destroy trust Between the United States and the United Kingdom. “If the UK does not immediately reverse this dangerous effort, we urge you to reassess US-UK cybersecurity arrangements and plans and intelligence sharing with the UK,” the pair said. “U.S. telecom companies that monitor “backdoors.” Due to the details of the order, Human Rights Watch called it “Shocking excess”, while 109 civil society organizations, companies and other groups sign Say “demand jeopardizes millions of security and privacy”.