eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

223
active users

#unencrypted

0 posts0 participants0 posts today
PrivacyDigest<p><a href="https://mas.to/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> Gave Governments Data on Thousands of <a href="https://mas.to/tags/PushNotifications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PushNotifications</span></a> </p><p>… sent to its devices, which can identify a target’s specific device or in some cases include <a href="https://mas.to/tags/unencrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unencrypted</span></a> content like the actual text displayed in the notification, according to data published by Apple. In one case, that Apple did not ultimately provide data for, <a href="https://mas.to/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> demanded data related to nearly 700 push <a href="https://mas.to/tags/notifications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>notifications</span></a> as part of a single request.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/e2ee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>e2ee</span></a> <a href="https://mas.to/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p><p><a href="https://www.404media.co/apple-gave-governments-data-on-thousands-of-push-notifications/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/apple-gave-governm</span><span class="invisible">ents-data-on-thousands-of-push-notifications/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeepSeek</span></a> <a href="https://mas.to/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> app sends data <a href="https://mas.to/tags/unencrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unencrypted</span></a> to ByteDance-controlled servers - Ars Technica</p><p>Apple's defenses that protect data from being sent in the clear are globally disabled.<br>&gt; that’s globally disabled within that specific app<br><a href="https://mas.to/tags/bytedance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bytedance</span></a> <a href="https://mas.to/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://arstechnica.com/security/2025/02/deepseek-ios-app-sends-data-unencrypted-to-bytedance-controlled-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">02/deepseek-ios-app-sends-data-unencrypted-to-bytedance-controlled-servers/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Whistleblower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whistleblower</span></a> finds <a href="https://mas.to/tags/unencrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unencrypted</span></a> location data for 800,000 VW EVs <br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/geoloc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geoloc</span></a> <a href="https://mas.to/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a></p><p><a href="https://arstechnica.com/cars/2024/12/whistleblower-finds-unencrypted-location-data-for-800000-vw-evs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/cars/2024/12/w</span><span class="invisible">histleblower-finds-unencrypted-location-data-for-800000-vw-evs/</span></a></p>
PrivacyDigest<p>Over 600 million <a href="https://mas.to/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> <a href="https://mas.to/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> stored in plain text </p><p>The issue was first uncovered in 2019 when <a href="https://mas.to/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> admitted to "hundreds of millions" of passwords being stored <a href="https://mas.to/tags/unencrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unencrypted</span></a>. Facebook said that the passwords were not available outside of the company — but also admitted that around 2,000 engineers had made about 9 million queries on that user database<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://appleinsider.com/articles/24/09/27/meta-stored-600-million-facebook-and-instagram-passwords-in-plain-text" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">appleinsider.com/articles/24/0</span><span class="invisible">9/27/meta-stored-600-million-facebook-and-instagram-passwords-in-plain-text</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@kaiengert" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kaiengert</span></a></span> <span class="h-card" translate="no"><a href="https://mapstodon.technology/@map" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>map</span></a></span> Yeah, I'm aware of <span class="h-card" translate="no"><a href="https://chaos.social/@delta" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>delta</span></a></span> / <a href="https://infosec.space/tags/deltaChat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deltaChat</span></a> and other tools like it...</p><p>The Idea I have is to force all eMails to be encrypted in the sense of <a href="https://infosec.space/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a>/MIME and/or S/MIME!</p><p>Such in that it bans all <a href="https://infosec.space/tags/unencrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unencrypted</span></a> <a href="https://infosec.space/tags/eMails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eMails</span></a>!</p>