zk

Zero-JS Hypermedia Browser

avatar
zk
zk_@nsec.app
npub1mm8q...gtfj
> 🌐 https://zkwallet.unstoppable

Notes (14)

ℹ️ For those that reside outside of USA and think thausing Amazon, Google and Microsoft cloud services or any USA cloud service is secure and private for them: . The US CLOUD Act from 2018, allows the US Government (and therefore their partners) data access regardless of storage location. . Be smart, self host your data, and if you insist in doing it wrong, encrypt your data before you upload anywhere. https://www.justice.gov/criminal/cloud-act-resources?ref=itsfoss.com
2025-12-03 11:39:39 from 1 relay(s) View Thread β†’
Not that most of you give two cents about it since most don't care about privacy, but if you are one of those rare special individuals, stay away from ChatGTP #ChatGTP In yet another "Your chatbot may be leaking" moment, researchers have uncovered multiple weaknesses in OpenAI's ChatGPT that could allow an attacker to exfiltrate private information from a user's chat history and stored memories.
2025-11-06 10:24:23 from 1 relay(s) View Thread β†’
LOL! You can't make this shit up nostr:nevent1qqsxax9m79fnwpc4e4h44p5pq44egk9298gevlrh6q8ypz0tllnwyyspzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyrm2pulz7rd7dyustyds0hw8h6hlul0gg40zpn9t4sf70exlnn8ykqcyqqqqqqgnd49cd
2025-11-04 09:53:31 from 1 relay(s) View Thread β†’
Nice move, hopefully Elon Musk will be next to let the public know the names of the politicians pushing to remove our free speech. And the cherry of the pie, the rules do not apply to politicians... The irony, their affairs should be public, yet they do want privacy to cover their corruption. image
2025-10-16 00:44:12 from 1 relay(s) View Thread β†’
🚨 Harden your Windows systems using free, trusted open-source tools that cover audit, configuration, and monitoring. You don't need enterprise tools to raise your defense baseline β€” just a few solid steps. Quick Actions (Under 30 Minutes): β€’ Run Hardentools β€” disable unsafe defaults instantly. β€’ Use CIS-CAT Lite β€” identify missing patches, open RDP, or weak policies. β€’ Check Local Admins β€” remove unused accounts, deploy LAPS for password rotation. β€’ Turn On Logging β€” enable PowerShell, Windows Defender, and Audit Policy logs. β€’ Run WinAudit β€” export a report and compare it weekly for unauthorized changes. β€’ Scan with Wazuh or OpenVAS β€” look for outdated software or exposed services. Key Risks to Watch: πŸ”‘ Reused or shared admin passwords 🌐 Open RDP/SMB without firewall or NLA βš™οΈ Old PowerShell versions without logging 🧩 Users running with local admin rights πŸͺŸ Missing Defender Attack Surface Reduction (ASR) rules πŸ“¦ Unpatched or unsigned software from third-party repos
2025-10-07 12:11:36 from 1 relay(s) View Thread β†’
🚨 Mobile Apps Leak Data β€” New findings from Zimperium have revealed that one in three Android apps and more than half of iOS apps leak sensitive data. Nearly half of mobile apps contain hard-coded secrets such as API keys Keep your mobile clean, remove all apps not really needed and be mindful of the ones you install and keep.
2025-10-07 11:05:57 from 1 relay(s) View Thread β†’
🚨 A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the latest defenses on Intel and AMD cloud processors. "We built a simple, $50 interposer that sits quietly in the memory path, behaving transparently during startup and passing all trust checks," researchers Jesse De Meulemeester, David Oswald, Ingrid And just like that billions invested in HW security gone, back to the drawing table for Intel and AMD, and those researchers... making this public before a solution is deployed, not cool.
2025-10-02 06:55:54 from 1 relay(s) View Thread β†’
🚨 Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Take time and educate your elders.
2025-10-02 06:52:19 from 1 relay(s) View Thread β†’
🚨 Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been exploited in the wild. The zero-day vulnerability in question is CVE-2025-10585, which has been described as a type confusion issue in the V8 JavaScript and WebAssembly engine. #vulnerability
2025-09-18 07:59:03 from 1 relay(s) View Thread β†’
🚨 Chinese censorship sprang a major leak on September 11, when researchers confirmed that more than 500GB of internal documents, source code, work logs, and internal communications from the so called Great Firewall were dumped online, including packaging repos and operational runbooks used to build and maintain China’s national traffic filtering system. This is hailed as a "game changer" for circumvention tools (e.g., VPNs) and research into GFW vulnerabilities. VPN providers will learn from these documents probably a lot about DPI and how to circumvent it.
2025-09-13 18:43:19 from 1 relay(s) View Thread β†’
🚨 A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program.
2025-09-12 07:45:00 from 1 relay(s) View Thread β†’