eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

201
active users

TugaTech 🖥️<p>Microsoft corrige 81 falhas de segurança, incluindo duas vulnerabilidades "zero-day"<br>🔗&nbsp;<a href="https://tugatech.com.pt/t71618-microsoft-corrige-81-falhas-de-seguranca-incluindo-duas-vulnerabilidades-zero-day" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t71618-microso</span><span class="invisible">ft-corrige-81-falhas-de-seguranca-incluindo-duas-vulnerabilidades-zero-day</span></a></p><p><a href="https://masto.pt/tags/Adobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adobe</span></a> <a href="https://masto.pt/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://masto.pt/tags/ataque" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ataque</span></a> <a href="https://masto.pt/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://masto.pt/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://masto.pt/tags/json" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>json</span></a> <a href="https://masto.pt/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://masto.pt/tags/sap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sap</span></a> <a href="https://masto.pt/tags/seguran%C3%A7a" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>segurança</span></a> <a href="https://masto.pt/tags/sql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sql</span></a> <a href="https://masto.pt/tags/StackOverflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StackOverflow</span></a> <a href="https://masto.pt/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> <a href="https://masto.pt/tags/vulnerabilidade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilidade</span></a> <a href="https://masto.pt/tags/vulnerabilidades" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilidades</span></a> <a href="https://masto.pt/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a>&nbsp;</p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> zero-day surfaces as <a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> warns other flaws are exploited</p><p><a href="https://www.bleepingcomputer.com/news/security/new-tp-link-zero-day-surfaces-as-cisa-warns-other-flaws-are-exploited/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-tp-link-zero-day-surfaces-as-cisa-warns-other-flaws-are-exploited/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Hackread.com<p>CISA updates its KEV List with TP-Link Wi-Fi extender and WhatsApp spyware flaws, urging users and agencies to patch risks before exploitation spreads.</p><p>Read: <a href="https://hackread.com/cisa-tp-link-wi-fi-whatsapp-spyware-flaws-kev-list/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/cisa-tp-link-wi-f</span><span class="invisible">i-whatsapp-spyware-flaws-kev-list/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mstdn.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> <a href="https://mstdn.social/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a></p>
m0veax<p>I love that a small community gathered around the tplink-m7350. Everyone tries different things, people support each other exploring, gathered knowledge gets documented in the repository &lt;3</p><p>If you have a device at home, checkout our repository or join our matrix channel.</p><p><a href="https://github.com/m0veax/tplink_m7350" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/m0veax/tplink_m7350</span><span class="invisible"></span></a></p><p><a href="https://det.social/tags/tplink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tplink</span></a> <a href="https://det.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
Harald EilertsenWhy does anybody make routers which are not support by OpenWRT and/or OPNsense? Especially when the previous hardware revision of the same model <em>was</em> supported by OpenWRT. I will definitely not buy anything from this manufacturer again.<br><br>#<a class="" href="https://hub.volse.no/search?tag=TPLink" rel="nofollow noopener" target="_blank">TPLink</a> #<a class="" href="https://hub.volse.no/search?tag=DontBuy" rel="nofollow noopener" target="_blank">DontBuy</a>
Mika<p><a href="https://sakurajima.social/tags/Homelab" rel="nofollow noopener" target="_blank">#Homelab</a>/<a href="https://sakurajima.social/tags/Networking" rel="nofollow noopener" target="_blank">#Networking</a> question: I just realise that 'setting a static <a href="https://sakurajima.social/tags/IPv6" rel="nofollow noopener" target="_blank">#IPv6</a> address' on a (<a href="https://sakurajima.social/tags/Linux" rel="nofollow noopener" target="_blank">#Linux</a>) server is not as simple as it'd be with <a href="https://sakurajima.social/tags/IPv4" rel="nofollow noopener" target="_blank">#IPv4</a><span> - one of the reasons being, realising, that the address prefix changes when my router restarts (i.e. due to any configuration changes).<br><br>When that network address prefix changes, obviously, any 'static' IPv6 address I'd like to set for my server would just be rendered </span><i>invalid</i><span>, since the network address portion/prefix is no longer applicable.<br><br>On my </span><a href="https://sakurajima.social/tags/TP-Link" rel="nofollow noopener" target="_blank">#TP-Link</a> router, under IPv6 LAN settings, I saw an option to configure the <code>Address Prefix</code> - however, this field is currently prefilled with the network address prefix my servers/client devices are currently using/assigned to, and it is immutable (not configurable). To make it configurable, I could set a different setting on the same page called <code>Prefix Delegation</code> to <code>Disable</code> instead of its default, <code>Enable</code><span>.<br><br>My idea is to disable it, set an address prefix, and save/apply it - my expectation is, after the router restarts, all IPv6 addresses on my network will have that prefix, and it'll never change unless I explicitly do so (again, on the router). Is my idea right? or am I getting it tooootally wrong (which is possible bcos IPv6 is something else)?</span></p>
Mika<p>I think the most annoying and <i>disturbing</i> discovery about this temporary no internet run is the fact that my fucking <a href="https://sakurajima.social/tags/Eufy" rel="nofollow noopener" target="_blank">#Eufy</a><span> cameras are useless without internet.<br><br>I bought a bunch of em, eventho they're a lot expensive than other </span><i>cheap</i> alternatives from <a href="https://sakurajima.social/tags/Tapo" rel="nofollow noopener" target="_blank">#Tapo</a>/<a href="https://sakurajima.social/tags/TP-Link" rel="nofollow noopener" target="_blank">#TP-Link</a> and <a href="https://sakurajima.social/tags/Xiaomi" rel="nofollow noopener" target="_blank">#Xiaomi</a><span> bcos they're "supposed" to be offline and not connected (or at least, not reliant) to the cloud, yada yada, but quickly after I bought them, despite that being their marketing for the product - they were called out in multiple occasions that that's just not true.<br><br>Anyway, yea, from last night till ~2pm today, it's been recording fuckin' nothing. Bloody hell, please, avoid Eufy and </span><a href="https://sakurajima.social/tags/Anker" rel="nofollow noopener" target="_blank">#Anker</a> products at all cost. After I got into <a href="https://sakurajima.social/tags/HomeAssistant" rel="nofollow noopener" target="_blank">#HomeAssistant</a>, and doing more research on security cam products, <a href="https://sakurajima.social/tags/Reolink" rel="nofollow noopener" target="_blank">#Reolink</a> (and Tapo) seems to be where it's at and what you should actually get.</p>
J👀<p>Any idea why a crappy <a href="https://mastodon.n41.lat/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> <a href="https://mastodon.n41.lat/tags/router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>router</span></a> working as <a href="https://mastodon.n41.lat/tags/WiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFi</span></a> extender would be sending requests to Amazon and Wikipedia every 20 seconds?</p>
n_to<p>Hallo Fedi: Mir ist heute ein 8-Port unmanaged <a href="https://social.tchncs.de/tags/Switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switch</span></a> verstorben (TL-SG108 8-Port). Also er blinkt noch, aber entscheidet jetzt selbst, welche Pakete er bearbeitet und welche nicht.</p><p>Habt Ihr Empfehlungen für einen guten &amp; performanten unmanaged Switch? Sollte ich einfach wieder TP-Link kaufen oder gibt es da besseres?</p><p>Szenario ist: Alle Geräte in unserem Büro zuverlässig ans Kabel zur Fritzbox (steht in anderem Stock) hängen, nicht mehr, nicht weniger :D</p><p><a href="https://social.tchncs.de/tags/fragFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fragFedi</span></a> <a href="https://social.tchncs.de/tags/followerpower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>followerpower</span></a> <a href="https://social.tchncs.de/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://social.tchncs.de/tags/tplink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tplink</span></a></p>
Freifunk Neanderland<p>Freifunk-Router Austausch-Aktion <a href="https://neanderfunk.de/freifunk-router-austausch-aktion/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neanderfunk.de/freifunk-router</span><span class="invisible">-austausch-aktion/</span></a><br><a href="https://nrw.social/tags/freifunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freifunk</span></a> <a href="https://nrw.social/tags/austausch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>austausch</span></a> <a href="https://nrw.social/tags/genexis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genexis</span></a> <a href="https://nrw.social/tags/upgrade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>upgrade</span></a> <a href="https://nrw.social/tags/TPlink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPlink</span></a> <a href="https://nrw.social/tags/wifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wifi</span></a> <a href="https://nrw.social/tags/wlan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wlan</span></a> <a href="https://nrw.social/tags/sudhessen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudhessen</span></a> <a href="https://nrw.social/tags/hessen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hessen</span></a> <a href="https://nrw.social/tags/s%C3%BCdhessen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>südhessen</span></a> <a href="https://nrw.social/tags/finnland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>finnland</span></a> <a href="https://nrw.social/tags/nrw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nrw</span></a> <a href="https://nrw.social/tags/KreisMettmann" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KreisMettmann</span></a> <a href="https://nrw.social/tags/nordrhein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nordrhein</span></a> <a href="https://nrw.social/tags/Nordrhein_Westfalen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nordrhein_Westfalen</span></a></p>
Cybernews<p>Hackers are actively exploiting vulnerabilities in popular TP-Link routers, which have tens of thousands of reviews on Amazon.</p><p><a href="https://infosec.exchange/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> <a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> <a href="https://infosec.exchange/tags/router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>router</span></a> </p><p><a href="https://cnews.link/hackers-exploit-older-tp-link-routers-cisa-warns-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/hackers-exploit-old</span><span class="invisible">er-tp-link-routers-cisa-warns-2/</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/WiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFi</span></a> Giant <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a>’s <a href="https://hachyderm.io/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> Future Hinges on Its Claimed Split From <a href="https://hachyderm.io/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a><br>While TP-Link's recent restructuring split the company into separate US- and China-headquartered businesses, a Bloomberg News investigation found that the resulting American venture still has substantial operations in mainland China. If US officials conclude TP-Link's China connections pose an "unacceptable risk," they could use a powerful new authority to ban them from <a href="https://hachyderm.io/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a>. <br><a href="https://www.bloomberg.com/news/articles/2025-04-11/wi-fi-giant-tp-link-s-us-future-hinges-on-its-claimed-split-from-china" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bloomberg.com/news/articles/20</span><span class="invisible">25-04-11/wi-fi-giant-tp-link-s-us-future-hinges-on-its-claimed-split-from-china</span></a><br><a href="https://archive.ph/YWpQA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.ph/YWpQA</span><span class="invisible"></span></a></p>
Flipboard Tech Desk<p>TP-Link, that router company whose name occasionally pops up on your list of available WiFi networks, is being investigated by the U.S. government for antitrust violations. Read more at <span class="h-card" translate="no"><a href="https://flipboard.com/@Mashable" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Mashable</span></a></span>. <a href="https://flipboard.social/tags/Router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Router</span></a> <a href="https://flipboard.social/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> <a href="https://flipboard.social/tags/Antitrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Antitrust</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://flip.it/uDGKdx" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">flip.it/uDGKdx</span><span class="invisible"></span></a></p>
PrivacyDigest<p>Wi-Fi Giant TP-Link's US Future Hinges on Its Claimed Split From <a href="https://mas.to/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> - Slashdot <br><a href="https://mas.to/tags/wifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wifi</span></a> <a href="https://mas.to/tags/tplink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tplink</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://slashdot.org/story/25/04/11/2050255/wi-fi-giant-tp-links-us-future-hinges-on-its-claimed-split-from-china?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">slashdot.org/story/25/04/11/20</span><span class="invisible">50255/wi-fi-giant-tp-links-us-future-hinges-on-its-claimed-split-from-china?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a></p>
Wolność w Kieszeni.pl<p>Jeśli jeszcze nie wiesz, że routery także można uwolnić i używać z powodzeniem jeszcze przez długi czas zamiast je wyrzucać, to koniecznie przeczytaj ten wpis. Dzisiejszym tematem będzie OpenWRT, czyli dowiecie się czym jest ten system oraz jak łatwo wgrać go na nasze urządzenia sieciowe.<br>Zapraszam do lektury!</p><p><a href="https://wolnoscwkieszeni.pl/uwolnic-router-openwrt/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wolnoscwkieszeni.pl/uwolnic-ro</span><span class="invisible">uter-openwrt/</span></a><br><a href="https://pol.social/tags/openwrt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openwrt</span></a> <a href="https://pol.social/tags/luci" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>luci</span></a> <a href="https://pol.social/tags/router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>router</span></a> <a href="https://pol.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://pol.social/tags/netgear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netgear</span></a> <a href="https://pol.social/tags/tplink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tplink</span></a> <a href="https://pol.social/tags/adblock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblock</span></a> <a href="https://pol.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://pol.social/tags/nas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nas</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Thousands of <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> to spread <a href="https://hachyderm.io/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a><br>According to Cato CTRL team, <a href="https://hachyderm.io/tags/Ballista" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ballista</span></a> botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks. <br><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
PrivacyDigest<p>Thousands of <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> to spread malware | Tom's Guide</p><p>report from the Cato CTRL team, the <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ballista</span></a> botnet <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploits</span></a> a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.</p><p>The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> can spread itself across the internet automatically. has also been used to spread other <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> families</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
Richi Jennings<p>‘Ban These Chinese Routers NOW,’ Cries House Committee<br>TP-Link in crosshairs, along with other brands.</p><p><a href="https://vmst.io/tags/Chinese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinese</span></a> consumer-grade networking gear is a dangerous <a href="https://vmst.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> threat, argue these fine gentlemen. Rep. Raja Krishnamoorthi (D-Illinois), Rob Joyce (former NSA director of cybersecurity) and Rep. John Moolenaar (R-Michigan) have hatched a plan to eradicate TP-Link routers and other plastic pigs from our homes.</p><p><a href="https://vmst.io/tags/TPLINK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLINK</span></a> on the other hand, is spitting feathers, arguing it’s not been a “Chinese” company for years. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBBlogwatch</span></a>, we get familiar with <a href="https://vmst.io/tags/OpenWRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenWRT</span></a>. </p><p><a href="https://securityboulevard.com/2025/03/krishnamoorthi-joyce-moolenaar-tp-link-china-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">krishnamoorthi-joyce-moolenaar-tp-link-china-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
PrivacyDigest<p>The US Is Considering a TP-Link <a href="https://mas.to/tags/Router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Router</span></a> <a href="https://mas.to/tags/Ban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ban</span></a> —Should You Worry?</p><p>Several government departments are investigating TP-Link routers over Chinese <a href="https://mas.to/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> fears, but the company denies links.<br><a href="https://mas.to/tags/tplink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tplink</span></a> <a href="https://mas.to/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://www.wired.com/story/tp-link-router-ban-investigation/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/tp-link-router</span><span class="invisible">-ban-investigation/</span></a></p>
404Not Found