In part two of my series on emergency information technology praxis for activists and vulnerable individuals, I discuss the concept of assumed breach. Your communications and data are not secure from state action. Adjust accordingly: https://monroelab.com/2025/01/22/state-of-exception-part-two-assume-breach/
=> More informations about this toot | View the thread
=> This profile with reblog | Go to dwaynemonroe@mastodon.online account This content has been proxied by September (3851b).Proxy Information
text/gemini