ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.8K
active users

#dataprivacy

60 posts54 participants1 post today

@MassLive I just tried to read an article on your website and couldn't - there was an overlay I could not dismiss asking me to turn off any ad blockers. So I left the site.

I do not have any ad blockers installed. I do, however, have a "personal info harvester blocker" installed. That plugin is configured to permit your site to display ads, but it will block anything that attempts to harvest info through my browser, whether it is an ad or not.

Please consider only using ad platforms that do not harvest information.

Thank you.

Ecco come è fatto un colpo di stato digitale: ted.com/talks/carole_cadwallad
La giornalista investigativa inglese Carole Cadwalladr, in un #TedTtalk tenuto all'inizio di aprile a Vancouver, lancia un appello appassionato e carico di emozione a resistere contro l'offensiva tecno-autocratica attuata dalle grandi aziende ( i Tech Bros) della Silicon Valley
#democrazia #SocialMedia #autocrazia #distopie #DataPrivacy #resistenza #SurveillanceCapitalism #democracy La trascrizione al momento è disponibile in inglese.
Nell'ALT dell'immagine la #traduzione italiana dell'intro
Via @nitot Grazie per la condivisione :)
@informapirata
@scuola
@Khrys
@Frau_Mensch
@lindasartini
@Puntopanto
@RFancio
@quinta
@leonido
@aral
@nemobis
@mcp

🛡️ Safeguard PII in Copilot Studio’s Generative Orchestration

Using Copilot Studio with Generative Orchestration? Here’s how to protect Personally Identifiable Information (PII) while leveraging AI:

✅ Natural conversational flow
✅ Dynamic, AI-driven responses
✅ Event-aware interactions

hubsite365.com/en-ww/citizen-d

🚨 Whistleblower: Sensitive labor data may have been exfiltrated — and logs wiped to cover it up.

A whistleblower from the National Labor Relations Board (NLRB) has come forward with alarming allegations: a White House-backed “efficiency” team, known as DOGE, may have accessed and removed confidential labor data — then attempted to hide their tracks.

What happened:

- DOGE staff allegedly demanded “tenant-owner” level access to internal systems
- Monitoring logs were disabled, audit trails erased, MFA turned off
- Engineers used virtual containers, automation tools, and DNS tunneling
- Around 10 GB of sensitive data was tracked leaving the agency — mostly untraceable
- One DOGE engineer’s GitHub listed a project called “NxGenBdoorExtract” — potentially tied to the agency’s case management system

Why it matters:

- The NLRB handles unionization efforts, whistleblower complaints, and unfair labor practice cases
- Exfiltrated data could expose witnesses, legal strategies, or proprietary business info
- Attempts to log in using DOGE credentials were traced to a Russian IP, raising national security concerns
- Internal cybersecurity safeguards were reportedly bypassed or disabled

Despite agency denials, the whistleblower's claims are backed by forensic data, internal records, and technical analysis by former FBI and federal cyber experts.

🔐 At Efani, we’ve always said: the most dangerous access isn’t external — it’s internal.
This story underscores why insider threat detection, least-privilege access, and unbroken logging are non-negotiable.

This isn’t just about one agency. It’s a wake-up call for cybersecurity across government.

I am once again asking my friends and neighbors to enable automatic post deletion. It doesn't have to be everything but you should be cleaning up the data you leave online. Not every toot needs to live forever.
#DataPrivacy