Official launch of the DOGE website was a security turmoil


And also insecure, the DOGE website relies heavily on X, social media platforms belonging to the Musk. The DOGE page is its X post, but it also uses a code that directs the search engines instead of dog.gov, a wired review of the site found to X.com. “This is usually the case, and shows that the X account is a priority over the real website itself,” said one developer.

RedNote replaced Tiktok replacement of about 700,000 US users and hit the American influential when Tiktok’s ban was disappeared in January. While many of these people may only use RedNote a few days, a new analysis of the University of Toronto Citizens’ Laboratory has emphasized how a lack of encryption can open US users to “monitor any government or ISP. [Internet Service Provider]And not just the Chinese government. “

RedNote analysis showed a large number of network security issues in its Android and iOS programs. RedNote images and videos using HTTP connections, not industry standard and HTTPS encrypted. Some versions of the program contain vulnerability that allow an attacker to have “read” permits by phone. And “the encrypted device has been adequately encrypted.” These defects are found in the RedNote program and several third -party software libraries they use. Citizen Lab reported these issues to companies that started in November 2024 but have not heard of any of them.

Security researchers say these vulnerabilities can endanger all users, including people in China. “Since the Chinese government may already have mechanisms to obtain accurate data from RedNote to its users, the issues we found, also to the Chinese users, especially under the supervision of non -governments. Chinese places. ”

This emphasizes that inside China even extensive programs may not meet the same security standards in accordance with what has been developed abroad. “Programs that are popular in China often do not use any encryption, dedicated encryption protocols, or use TLS without credit to encrypt sensitive data,” the analysis says.

Over the past two weeks, US spy planes have flown at least 18 missions around the Mexico border, and the analysis of CNN has shown. The flights show “intensifying activity in activity”, while the Trump administration has appointed drug cartels as terrorist organizations, and security agencies are deported to millions of millions. The immigrants have turned. According to CNN, various military aircraft, including the P-8 Navy and a U-2 spy aircraft, are used in the operation and are capable of collecting both images and signal information. Also this week, US customs immigration and implementation have promoted new contracts that allow it to monitor the “negative” posts of social media that people are doing.

Last month, the British government hit Apple with a secret order and demanded the company and created a way to access data stored in the encrypted ICloud backups. The order, called a technical capability declaration and issued in the UK under the discussion of the 2016 Monitoring Act, was reported by the Washington Post last week. Since then, increasing reactions to the demands of the British government have occurred, and many emphasize how a change affects the security of millions of people around the world.

The US senator, Ron Weiden and Andy Biggs, have sent a letter to the new National Intelligence Director Tulsi Gabbard, saying the order will weaken the trust between the United States and the United Kingdom. “If the United Kingdom does not reverse this dangerous effort immediately, we ask you to evaluate US-UK cyber security arrangements as well as US information sharing with Britain,” the couple said. US telecommunications companies used “behind the scenes”. As the details of the order emerged, the human rights watchdog called it “over -worrying access”, while 109 civil society organizations signed a letter saying “demand”. Security and privacy endangers millions of people. “

Leave a Reply

Your email address will not be published. Required fields are marked *