That’s why I don’t use Kaspersky :)
In my opinion, you will always be at the mercy of a government in this context: US, China, Russia. In the end it’s a matter of choosing which one. FOSS maybe a little less, but in the end it’s almost the same. That’s my view, of course. That doesn’t mean you can’t give them a hard time ;)
This one does not spark joy.
Update: Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (https://www.nytimes.com/2024/09/17/world/middleeast/israel-hezbollah-pagers-explosives.html)
You can use https://tails.net/ booting from another flash drive in memory only.
From the article:
This includes a team led by Professor David Basin, head of the Information Security Group at ETH Zürich and one of the inventors of Tamarin — a leading security protocol verification tool that was also used to evaluate PQ3 — as well as Professor Douglas Stebila from the University of Waterloo, who has performed extensive research on post-quantum security for internet protocols.
There is a paper describing the tests.
Not that this settle everything.
Do you mean the text accompanying the post? That is the first two paragraphs from the article.
The “better summary” I posted later was actually generated by chatgpt.
Thanks. Hope I’ll be alright.
I would like to moderate this community. I believe that cybersec community deserves a place in the fediverse and since this is the largest cybersec comm, it would be a good idea to keep it alive.
A better summary:
The text discusses a series of cybersecurity breaches affecting Microsoft, involving sensitive data theft from US government officials and organizations, attributed to Chinese hackers. Microsoft’s delayed response to discovered security flaws, including a 90-day wait for a partial fix, is criticized. Senator Ron Wyden has called for Microsoft’s accountability. The breaches underscore the growing issue of security vulnerabilities in tech companies, leading to expectations that the US government will require companies to promptly disclose security incidents within a strict timeframe.
Welcome! I dont know you background, but I would suggest get into selfhosting. There are several projects related to cybersecurity, fun and useful. Ex: MISP, Pihole, The Hive.