This is gorgeous!
(No offense to the Indian friends)
View quoted note →
Bruno SlingshotVPN
npub1cluc...tgjy
Coming across Surveillance Capitalism 17 years ago made us felt violated and we have been fighting against it ever since.
Read our Futuristic Vision! The "manifesto" for the use of tech for a free society of sovereign families.
Slingshot Security started in April 2024 by two Engineers with over two decades of experience and friendship. Driven by our concerns with privacy and our futuristic vision, we created Slingshot VPN to help people hide their ISP IP Addresses and have cryptographed internet traffic. Committed to strengthening your security and privacy, we conduct extensive research on Cyber Security and participate in efforts to increase privacy online.
Our Research Lab is vigorous. Slingshot VPN is our first offering but we are constantly working on concepts and prototypes to protect our customers online life. Our R&D is carried out in collaboration with other top cyber security researchers and professionals.
But our solutions must meet real needs of real privacy centric peop
Its Friday!!!! Let's gooooo!!!
Gandalf
Let's resist! Let's build an alternative society and world! We must accelerate our efforts to keep spaces where freedom from this panopticum is possible.
View article →
👏👏👏
Let's resist! Let's build an alternative society and world! We must accelerate our efforts to keep spaces where freedom from this panopticum is possible.
Jiang just texted me asking. Did any of you folks find any server location since we last spoke, please?
And Pandas are not real!!!


The US National Institute of Standards and Technology announced on Wednesday a new policy regarding the US National Vulnerability Database, which the agency has been struggling to keep updated with details for every new vulnerability added to the system.
Going forward, NIST says its staff will only add data—in a process called enrichment—only for important vulnerabilities.
This will include three types of security flaws, which the agency says are critical to the safe operation of US government networks and its private sector.
CVE entries for vulnerabilities listed in CISA KEV, a database of actively exploited bugs;
CVEs in software known to be used by US federal agencies;
and CVEs in what the agency classifies as "critical software."
This latter category sounds restrictive, but is in fact quite broad and includes all the major software you'd expect and want to have properly enriched CVEs for. Stuff like operating systems, web browsers, security software, firewalls, backup software, and VPNs; they are all on the list [PDF], which you can also see below this post.
RiskyBizz
#slingshotVPN #cve #news #cybersecuriry
Economists in the room... From QE to QT, how much QT can our system endure at it's current state, please?
https://www.zerohedge.com/markets/why-crash-was-delayed
Who will make Jiang's photo and statements into a small jpeg meme, please?!?!
#life_essentials