Arguments for/against running my own channel? My understanding is it's a big responsibility and a lot of effort (especially if public and popular). What are the essential things to consider?

I'm really keen to get involved with the @debian Debian Academy platform, so I've joined the channel (-academy on ) and I'm hoping to contribute in any way with writing/dev/design/proofreading, using authoring and tools like and etc.

#FollowFriday / #FF recap of this week's recommended follows:

🌟 @PINE64 - Makers of low-price FOSS laptops, smartphones, tablets and more

🌟 @protonmail - Ad-free independent encrypted email provider

🌟 @fsf - PeerTube channel for the Free Software Foundation @fsf

🌟 @Tubelab - Android app for PeerTube, from the makers of @fedilab

🌟 @kosa_photo - Japanese landscape and cityscape photographer

🌟 @davidrevoy - Illustrator, FOSS supporter and creator of the Pepper & Carrot libre webcomic

I've finally figured out the tool for managing my credentials. It works nicely and I've also managed to set up a challenge-response key for use with .

Someone please explain how I can manage my OTPs with the Yubikey Authenticator 'ykman' tool (now that there is a bug in the preventing normal launch. The CLI is confusing me. It says (correctly) I have slot 1 programmed on my key (multiple 2FA creds for various sites), but I can't see any way of listing or using them.

Hello Mastodon! We are looking for a consultant to write some guides on how to protect yourself from online tracking.

So if you have technical experience on the topic, know github and markdown and are capable of writing easy to follow guides for non technical audience... this is for you!

Example of guides:

Terms of references and instructions to make a proposal:

Did you know that the Security Education Companion has a lesson plan builder? Organize your chosen lessons to prepare for your next security training opportunity.

If I were to have an in-home display for a installed, which had to be connected to my home , but claims to not access the internet, how could I verify this at the level?

Currently I have a guest network available which is blocked from having access to the . I suppose I could connect the display to this network and also block access to the internet...

I'm taking part in a survey for my company, and one of my recommendations is for home workers to be on the company (connected to our NAS) because our home network can't be guaranteed, we have to rely on storing data on a proprietary cloud storage site etc.

Please share your suggested arguments for (or against) VPN for all home workers.

I seemed to have gained a lot of followers recently! Thank you and welcome πŸ‘‹

For those that are new, you may not know that I've been nominated for the Noonie Awards. It's the last few days to vote, and if you could it would help me out so much!

PS. Sorry for the self promotion, I promise it doesn't happen too often πŸ˜‰

I forgot to toot this yesterday, but I'm doing a reddit AMA on r/privacy today! Check it out an ask me anything

Anyone seen this awesome idea? Or better yet, do you have a set and could you share your thoughts?

πŸŽ‰ duf v0.4.0 is out, a user-friendly alternative to 'df'!

What's new?

- Hide filesystems with --hide-fs
- Theme & styling options
- Auto-detects terminal theme
- Support for OpenBSD
- Support for Windows

Get this yummy tool here: πŸ˜‹

How many times have you driven by an electronic road sign like one of these?
This is the ADDCO portable sign.


The access panel on the sign is generally protected by a small lock, but often are left unprotected. Upon opening the access panel you can see the display electronics.

The black control pad is attached by a curly cord, with a keyboard on the face.


The App. I've just released my first short film about the rise of government surveillance during the pandemic. This is something different I've done β€” and I've had a great time making.

Watch full screen & use headphones!

Vimeo: (higher quality)

What the bloody fuck, #apple

Forcing Protonmail to adopt in app purchases or threatening to kick their app from the store. If that's not the most Mafia thing ever…

I'm currently working on a to run after login, which does the following:

1. Bring down WiFi interface
2. Spoof MAC
3. Generate random word
4. Change hostname to random word
3. Bring up WiFi interface
4. Connect to VPN

Should I write it in or ?

Currently written in Bash, but despite the hostname changing successfully when the script runs, running 'hostname' afterwards outputs default hostname...

Show more
Mastodon πŸ”

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Matrix Chat:
Support us on OpenCollective, many contributions are tax deductible!