In addition to being unsure, the DOGE website is based strongly on X, the social media platform belonging to Musk. The DOGE home page is a flow of its own X articles, but it also uses code that directs search engines on X.com instead of DOGE.GOV, a wired review of the found site. “This is generally not that things are managed, and this indicates that the X account is a priority on the real website itself,” said a developer in Wired.
The Chinese alternative rednote Tiktok has gained around 700,000 American users and courted American influencers when Tiktok’s ban took advantage of in January. While many of these people can only have used Rednote for a few days, a new analysis from the University of Toronto Citizen Lab has highlighted How a lack of encryption could have opened American users to “surveillance by any government or FAI [Internet Service Provider]And not just the Chinese government. “”
Rednote’s analysis has found a multitude of network safety problems in its Android and iOS applications. Rednote has recovered images and videos using HTTP connections, not from the standard of the encrypted industry and HTTPS; Certain versions of the application contained a vulnerability which allows an attacker to have authorizations “read” on a phone; And he “transmitted metadata of insufficiently encrypted device”. The faults were contained in the Rednote application and several third -party software libraries he uses. Citizen Lab reported problems to companies from November 2024, but has heard of them.
Security researchers claim that vulnerabilities could risk monitoring all users, including those in China. “As the Chinese government could already have mechanisms to legally obtain detailed Rednote data on their users, the problems we have found also make Chinese users particularly vulnerable to the surveillance of non -Chinese governments,” said research.
He points out that within China, applications, even widely used, may not meet the same safety standards as those developed outside the country. “Popular applications in China often do not use any encryption, proprietary encryption protocols or use TLS without validation of certificates to encrypt sensitive data,” says analysis.
In the past two weeks, American spy planes have stolen at least 18 missions around the Mexico border, analysis of Cnn showed. Flights mark a “dramatic escalation in activity”, reports the publication, and came while the Trump administration has appointed drug cartels as a terrorist organization and transformed the country’s security apparatus to the expulsion of millions of migrants. According to CNN, various military plans, including the P-8s of the Navy and a U-2 espionage plane, were used in operations and are able to collect both the imagery and the intelligence of signals. This week also, American immigration and customs application announcement New contracts that would allow him to monitor the “negative” publications of social media that people make on this subject.
Last month, the The British government has hit the apple With a secret order requiring the company, create a way to access the data stored in the encrypted iCloud backups. The order, called technical capacity notice and published under the controversial monitoring law of 2016 in the United Kingdom, was reported for the first time by the Washington Post last week. Since then, there has been a growing reaction against requests from the British government, many stressing how a change would have an impact on the security of millions of people worldwide.
American senator Ron Wyden and representative Andy Biggs sent a letter to Tulsi Gabbard, the new national intelligence director, saying the Order undermines confidence Between the United States and the United Kingdom. “If the United Kingdom does not immediately revers this dangerous effort, we urge you to reassess the arrangements and cybersecurity programs of the United States-US as well as the sharing of American intelligence with the United Kingdom,” said the couple , making comparisons with the hacks of Selphon of Sel linked to China, American telecommunications companies that used a surveillance “stolen”. Since the details of the Order emerged, Human Rights Watch described it as “excessive alarming», While 109 civil society organizations, companies and other groups Signed an open letter To say that “demand endangers the security and confidentiality of millions”.