c.im is one of the many independent Mastodon servers you can use to participate in the fediverse.
C.IM is a general, mainly English-speaking Mastodon instance.

Server stats:

2.9K
active users

#dataprivacy

56 posts47 participants1 post today
Continued thread

For those #Genealogists who are interested, this video shows you how to copy your 23&Me results to #GedMatch , after you DOWNLOAD them from #23andMe .

#GedMatch has a host of great tools that allow you to continue analyzing your DNA and build your #FamilyTree with #GeneticGenealogy .

Be aware that law enforcement can also use this particular database. However, you must OPT IN to allow your data to be accessible to them. So far, they have been using it to help identify unknown "Jane/John Doe" bodies and solve #ColdCase crimes.

youtu.be/Ck9S5poH_tA?si=hN45Cq

@geneadons #Geneadons #Genealogy #dnatestingfirmintrouble #DNAtesting #DataPrivacy #DNAdata #DNAdatabases #23andMeBankruptcy

Mobile AI Agents Security Risks

Mobile AI agents can significantly compromise security and privacy due to their extensive access requirements and reliance on cloud processing. When performing tasks such as booking concerts or managing schedules, these agents need access to sensitive information like credit card details, calendar entries, your contacts and messaging apps, which can expose users to risks if the data falls into the wrong hands. (Reminder that email, contacts and calanders are not encrypted).

Moreover, integrating AI agents with applications like messaging services can undermine end-to-end encryption, as data must often be sent to cloud servers for processing and then returned to the device This process can leave user data vulnerable to interception or misuse.

Additionally, some mobile AI apps, like DeepSeek, have been flagged for poor security practices, including the use of hard-coded encryption keys and the transmission of unencrypted user and device data to external entities These issues highlight the broader security and privacy concerns associated with mobile AI agents.

Experts like Meredith Whittaker CEO of the Signal App, have warned that the integration of AI agents poses a "profound issue" with security and privacy, potentially breaking the "blood-brain barrier" between application layers and the operating system, thereby muddying data and increasing vulnerabilities. #encryption #aiagent #dataprotection #dataprivacy #signal

Welp, it’s time to add to my ongoing list of things currently occurring in the US federal government that would get me, a privacy practitioner, immediately fired if I did them:

New:
-Using non-approved apps to transmit sensitive information
-sending sensitive information without double-checking recipient list
-setting records to auto-delete in contravention of records retention policy

Previously:
-Connecting an unknown external server to the network
-data access without background check
-ignoring least necessary access principles 
-admin access without any controls
-improper segmentation/separation of duties 
-coding directly on prod
-data to 3rd party tools without due diligence
-Delete security documentation because it contains “forbidden words” used in other contexts

#dataprivacy
#databreach
#facepalm
#security
#opsec

Experts from Ecommpay, Deloitte Malta, FINOM, and Scytale will discuss compliance strategies for startups at the EU-Startups Summit 2025 in Malta.The EU-Startups Summit 2025, set for April 24-25 in Malta, will feature a panel of experts from Ecommpay, Deloitte Malta, FINOM, and Scytale. ❤️ #dataprivacy #EUAIAct #fintech #gdpr #startups #redrobot

redrobot.online/2025/03/naviga

Hey folks, ready for your daily dose of cyber intel? ☕

Tuesday's update is out and it's packed with need-to-know updates:

🚨 Critical Next.js Flaw: Authorization bypass vulnerability (CVE-2025-29927) impacting versions before 15.2.3. Upgrade ASAP or block those 'x-middleware-subrequest' headers!

🐜 Weaver Ant's Long Game: Chinese hackers spied on a telco network for four years using compromised Zyxel routers and custom web shells. Talk about persistence!

🐍 VanHelsing RaaS Emerges: A new ransomware player targeting Windows, ARM, ESXi systems. Keep an eye on this one!

☁️ Oracle Cloud Breach Claims: Did they or didn't they? Oracle denies a breach, but a threat actor is claiming otherwise.

🚂 Ukrainian Railway Hit: Cyberattack disrupts online ticket sales amidst crucial transport operations. Resilience is key.

🔄 DrayTek Router Chaos: ISPs are scrambling as DrayTek routers enter reboot loops. Potential vulnerability or buggy update at play.

🤖 AI-Enhanced Cybercrime: Europol warns that organized crime is leveling up with AI, partnering with state-aligned entities.

🛰️ Starlink Intercepted: Thai authorities seize Starlink transmitters headed for Myanmar scam centers. Criminals are finding ways around cut-offs.

🚓 Cybercrime Crackdown: 300+ suspects arrested in Africa for cyber scams. A win for international law enforcement!

🧬 23andMe's Bankruptcy Woes: Privacy advocates raise concerns about DNA data as 23andMe files for bankruptcy. What happens to all that genetic info?

🔒 Pennsylvania County Ransomware: Sensitive data stolen during a ransomware attack. Another reminder to shore up those defenses.

👁️‍🗨️ China Bans Facial Recognition: Consent is now required for facial recognition in China. But are there exceptions for government and AI training?

👉 Dive into the full details here: opalsec.io/daily-news-update-t

Stay vigilant, stay informed, and let's keep the digital world a little safer, one update at a time. 🛡️

Opalsec · Daily News Update: Tuesday, March 25, 2025 (Australia/Melbourne)Audio Summary: Tuesday, March 25, 2025 (Australia/Melbourne)0:00/390.3121× Critical Flaw in Next.js Allows Authorization Bypass A critical severity vulnerability, tracked as CVE-2025-29927, has been discovered in the Next.js web development framework, potentially allowing attackers to bypass authorization checks. The flaw enables attackers to send

Holy shit Polygon, 880 partners?!

Notice there's no reject button.

---

Privacy Notice

We and our 880 partners store and access personal data, like browsing data or unique identifiers, on your device.

Ways we may use your data:

Use precise geolocation data. Actively scan device characteristics for identification. Create profiles for personalised advertising. Store and/or access information on a device. Develop and improve services. Measure advertising performance. Use limited data to select advertising. Use limited data to select content. Use profiles to select personalised advertising. Create profiles to personalise content. Measure content performance. Use profiles to select personalised content. Understand audiences through statistics or combinations of data from different sources.

It's official...
23&Me has filed for bankruptcy.

The company has been rejecting any buyout attempts, but their Board of Directors is now saying that a Court-supervised sale is the best path forward. Part of the reason for their financial troubles was a 2023 #DataBreach that affected millions of customers and hurt their credibility in the marketplace.

Yesterday, California's A.G. reminded consumers that they have the right to demand their data be deleted and that 23&Me destroy any genetic samples. (I would add that you also have the option of downloading your #DNA data and then uploading it to #GedMatch .)

@geneadons #Geneadons #Genealogy #GeneticGenealogy #23andMe #dnatestingfirmintrouble #DNAtesting #DataPrivacy #DNAdata #DNAdatabases

reuters.com/business/healthcar