Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#ENCRYPTION
will you crease yourself and be reborn?
harudagondi
hello guys, should there be martial law in the philippines, here are the following apps i'll use for anonymity: if you are an android user, i recommend f-droid to download
Read more
Anonymous Seeker
mysql_sync
#Thread #Encryption_In_Ancient_IndiaGrahacaraṇibandhana Based In The Year 683 CE And Laghubhaskariyavivarana Based In The Year 869 CE Speak Of A Certain Numerical Notation Which Goes By The Name @Sanjay_Dixit @VandanaJayrajan @agniveer
Read more
u221e
hdevalence
the “disinformation” part of the e2e encryption “abuse” discourse has some deeply dystopian doublespeak the basic assumption is that people cannot be trusted to have encrypted communications without there being
Read more
Lyria Bennett Moses
lyria1
My analysis of the COVIDSafe app (thread). Short version is that individual risks that could be reduced by government action (increasing trustworthiness and hence downloads). Actual decision will remain personal
Read more
zane pocock
zanepocock
1/ The EARN IT Act is a cynical, opportunistic attack on encryption leveraging today’s state of panic.My latest for @knoxcustody, which sees an attack on encryption as an attack on
Read more
Trezor
Trezor
1/8 Efforts to oppress citizens and erode individuals' rights to privacy, as we see here, are a great validator of Trezor's open-source philosophy. Since the beginning, we have designed Trezor
Read more
Ben Jacobs
JacobsBen
Serie A returns to beIN after a blackout. Told that following @WTO report on beoutQ @SerieA_EN offered a "major discount" in return for games being aired again. This was an
Read more
🇺🇦 sunflower seeds 🌻
mykola
Please quote this tweet with a thing that everyone in your field knows and nobody in your industry talks about because it would lead to general chaos. Mine is: literally
Read more
Chris Vickery
VickerySec
Someday intelligence and law enforcement agencies will realize that general public privacy rules are the bedrock foundation that allows them to actually collect useful information. If everyone became fully aware
Read more
Cory Doctorow
doctorow
Late last week, the @RIAA sent a legal threat to @Github, claiming that the popular (and absolutely lawful) tool #youtubedl (which allows users to download Youtube videos for offline viewing,
Read more
░ discatte 0.1alpha ░
GalacticFurball
convert -depth 8 yt_dl1.png rgb:yt_dl1.partconvert -depth 8 yt_dl2.png rgb:yt_dl2.partcat yt_dl1.part yt_dl2.part > yt_dl-2020.9.20.tar.gz It survived uploading! Sha256Original file: 67fb9bfa30f5b8f06227c478a8a6ed04af1f97ad4e81dd7e2ce518
Read more
Sunny Nehra
sunnynehrabro
1/ Go through this tweets thread(especially don’t miss 11/ in this thread) to understand how persons like @fs0c131y are running #propaganda against our govt apps.It will explain how for famous
Read more
অম্লানজ্যোতি শইকীয়া 🦏🌳🌲🌴🎋👍🏻 ⛏👎🏻 🇮🇳
MajorAchilles
I'm done with bullshit like this. I lead a team of 7 brilliant engineers, 4 of whom are women. And they could kick the shit out of you with their
Read more
Digital Rights Watch
DRWaus
Last week, the Surveillance Legislation Amendment (Identify and Disrupt) Bill was introduced to parliament seeking to give law enforcement increased powers for investigations on the interwebz. A THREAD- This was
Read more
eia
MMCIII1
@Stray_Kids #straykids #INLIFE #YouMakeStrayKidsStay #StrayKidsComeback BACKDOOR also used in computers There is something called BACKDOOR COMPUTING A backdoor is typically covert method of bypassing normalauthentication, encryption in co
Read more
🇺🇸Kyle Bass🇺🇸
Jkylebass
Ant Group and Ten Cent are Clear and Present Dangers to US National Security that now threaten us more than any other issue. The Chinese Communist Party is pushing the
Read more
‹
1
2
3
4
5
6
7
8
...
13
14
›