📡 RightToPrivacy & Tech Tips<p>Couple recent ex that prove identification cannot be relied upon for auth (or safety of the vuln) include 2 stories from last few weeks:</p><p><a href="https://fosstodon.org/tags/Mitto" class="mention hashtag" rel="tag">#<span>Mitto</span></a>: a Swedish company that handled Twitter's 2FA SMS account auth.</p><p>News broke recently they w/acting behind the scenes to <a href="https://fosstodon.org/tags/surveillance" class="mention hashtag" rel="tag">#<span>surveillance</span></a> + track users, abusing their access.</p><p>Next:</p><p><a href="https://fosstodon.org/tags/Anomaly" class="mention hashtag" rel="tag">#<span>Anomaly</span></a>, co demo'd how easy it is to track user locations per tweet using "twitter firehose" data access. App tracking, 2bil stored emails..</p><p><a href="https://fosstodon.org/tags/Privacy" class="mention hashtag" rel="tag">#<span>Privacy</span></a> <a href="https://fosstodon.org/tags/HumanRights" class="mention hashtag" rel="tag">#<span>HumanRights</span></a> <a href="https://fosstodon.org/tags/Anonymous" class="mention hashtag" rel="tag">#<span>Anonymous</span></a></p>