Author: WhoVPN

  • 199524

    G-Core Labs

    Luxembourg-based technology company

    • CEO: Andre Reitenbach
    • Founded: 2014
    • Headquarters: Luxembourg
    • Employees: 500+

    G-Core Labs S.A., operating under Autonomous System Number (ASN) 199524, is a Luxembourg-based company specializing in edge AI, cloud, network, and security services. Established in 2014, G-Core Labs has developed a global infrastructure comprising over 180 Points of Presence (PoPs) across six continents as of March 2024.

    Network Infrastructure and Peering

    ASN 199524 encompasses a substantial network infrastructure, including approximately 95,744 IPv4 addresses and a significant allocation of IPv6 addresses. The company maintains an extensive peering ecosystem, engaging with over 6,500 peers and 49 upstream carriers. G-Core Labs participates in numerous Internet Exchange Points (IXPs) worldwide, such as DE-CIX Frankfurt, AMS-IX, and LINX LON1, facilitating robust global connectivity.

    Services and Offerings

    G-Core Labs provides a diverse array of services, including content delivery networks (CDN), cloud computing, virtual machines, bare-metal servers, artificial intelligence solutions, Kubernetes orchestration, streaming media services, DDoS mitigation, Domain Name System (DNS) services, function as a service (FaaS), and logging as a service (LaaS).

    Partnerships and Developments

    In 2020, G-Core Labs entered into a partnership with Intel to enhance its technological capabilities.1 Subsequently, in 2022, the company collaborated with Graphcore to launch the European AI Cloud, aimed at accelerating machine learning tasks with ready-made AI infrastructure. In March 2024, G-Core Labs acquired a web application and API protection (WAAP) solution from StackPath, further expanding its security offerings.

    Leadership and Recognition

    In May 2024, former German Vice-Chancellor and Federal Minister of Health, Philipp Rösler, joined the G-Core Labs board, bringing significant political and business expertise to the company. Additionally, in April 2024, G-Core Labs received commendation in the Industry Innovation category at the NVIDIA Partner Network Awards EMEA for developing the first speech-to-text technology for the Luxembourgish language, utilizing its LuxemBERT AI model.

    Controversies

    In July 2023, investigative reports by Correctiv and Tageszeitung alleged that G-Core Labs supported the distribution of the Russian TV network RT in Europe until April 2023, despite EU sanctions imposed in March 2022. G-Core Labs has denied these accusations.

    Overall, G-Core Labs S.A., through ASN 199524, plays a significant role in the global internet infrastructure, offering a wide range of services and maintaining extensive peering relationships to ensure efficient and secure content delivery worldwide.

    References

    1. https://www.helpnetsecurity.com/2022/06/30/g-core-labs-stand-alone-solution/ ↩︎
  • New Study: How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?

    An interesting study was published at the 2024 PET Symposium and it aims to examine how individuals understand and perceive the data being that is being collected and linked to their identity. One such example that offers users this ability is Google’s “My Activity” dashboard which collates all of your activity across Google services.

    The researchers know that most people are aware that, in a general sense, when you search for “lawnmower” on Google, there is some sort of record on your account for “searched for lawnmower.” But do people understand that Google and others could make inferences based on that information, i.e. “searched for a lawnmower, must own a house” etc.

    This is what the researchers call the Generic Paradox. What is this means is that people are commonly unconcerned with the interest labels applied to them because they think they’re so broad, they could be applies to everyone. This discounts the ability to infer from data as previously mentioned.

    Further, people may not be aware of what the researchers call the data food chain – or, what people think is evidence of their phone listening to them. An example of this is searching for a new lawnmower on Google then later seeing an advertisement on YouTube for home loan interest rates. The further an individual interacts and engages with these advertisements can act as confirmation or denial for how accurate the interest labels are.

    The interesting thing about this image is that it shoes that even after being showed the evidence, the majority of people still believe that Google only has a broad understanding of their interests. This helps the users feel like the data being collected is not of concern, or not invasive.

    Some more interesting data that shows that for this group of participants, they are generally not concerned with Google and see data collection as mostly benign or even beneficial. Only 9 participants were “extremely concerned” about the sensitive nature of their searches.

    Privacy fatigue

    Perhaps something we can all relate to, 18 of the participants confessed they had pretty much given up on trying to maintain their privacy. For example, P55 (not at all concerned) noted: “Not much I can do to stop it, so why worry?” Participant P88 (slightly concerned) added: “I believe that data gathering and analytics is occurring in all aspects of life from the television that you watch to the groceries that you buy so I’m really not that concerned and there is little I can do to block the collecting of information.”

    Another 15 participants considered Google’s data collection as a reasonable trade-off for free applications and services. For instance, P62 (not at all concerned) noted: “They aren’t collecting any more from me than from anyone else and it is the cost of using their free services.” Participant P60 (slightly concerned) articulated that the conveniences of Google services made them willing to accept the data collection, explaining: “Google provides many conveniences to me as an internet user. It’s not ideal that so much information is gathered about me, but I’m not prepared to give up these conveniences.”

    And course, 4 participants were convinced they had nothing to hide, so they were not concerned at all with data collection.

    Lack of alternatives

    While perhaps not indicative of the general population, 168 of the 170 study participants used Google Chrome as their browser. The researchers noted that this is slightly biased because having a Google account was a prerequisite for participating in the study. If they asked 170 Firefox users the same questions they would be sure to get drastically different results.

    As one participant summarized, “I still value some Google products over their competition so I compromise on the collection of my activity information.”

    Concluding thoughts

    While reading through this study, I am reminded of the old proverb “You can lead a horse to water, but you can’t make him drink.” It’s a reminder that privacy is a personal journey and not everyone’s journey will be identical. Just because you get the heebie jeebie’s from personalized ads doesn’t mean everyone will. And that’s ok.

    What we argue is needed is the ability for users to make informed decisions about what is collected and how it’s used. If an individual wants to sacrifice a small bit of privacy for a free product, that’s their choice to make. But what we need more than obnoxious cookie banners is a real understanding of what data is being collected and how it’s being used, even if there is a “I don’t care” selection.

  • ZoogVPN

    ZoogVPN, based in Greece, began as just a mere idea in 2010 after it’s creators were dealing with censorship and barriers themselves.1 The service formally launched in 2013 and since then has acquired mixed reviews. Unfortunately, while my speed tests were fast and had low latency, that’s where to good news ends. The Windows version of their app is slow and clunky and it was reported by a reddit user (albeit 3 years ago) that the killswitch functionality in the Windows application does not work properly.2 According to top10vpn.com, the killswitch feature on their macOS version will leak your IP address.3

    It cannot be understated that DNS leaks are a huge privacy concern. The last thing you would ever want to have happen to you is to a connect to a VPN that you paid for and entrusted with your privacy, and then were betrayed because of poor software.

    Interestingly, their CEO, Yaroslav Savenkov, has previously worked for data and marketing firms4 which may be considered a red flag for some users. After all, using a VPN to encrypt and transport your data means you trust the provider with your data.

    On a positive note, the VPN service passed the DNS leak test; however it revealed that ZoogVPN configures their servers to use Google DNS. While not a huge privacy concern in and of itself, I’d expect a better alternative from a company committed to privacy.

    Footnotes
    1. https://www.safetydetectives.com/blog/zoogvpn-interview/ [archive] ↩︎
    2. https://www.reddit.com/r/VPNTorrents/comments/jsbksg/zoogvpn_users_be_careful/ ↩︎
    3. https://www.top10vpn.com/reviews/zoogvpn/ ↩︎
    4. https://dataforseo.com/blog/how-we-built-an-efficient-247-support-team [archive] ↩︎
  • DuckDuckGo

    DuckDuckGo, renowned for its stance on user privacy, has recently unveiled a new service bundle dubbed “Privacy Pro.” This package integrates a VPN with personal information removal services and identity theft protection into DuckDuckGo’s browser app. However, this expansion into the already saturated VPN and browser market brings to light concerns about the company’s strategic direction and brand identity.

    Expanding Too Far from Core Services?

    DuckDuckGo has built its reputation on offering a privacy-centric search engine, standing in stark contrast to data-hungry competitors like Google. Over the years, they’ve added an email forwarding service and a web browser to their repertoire, maintaining a focus on protecting user data. The introduction of “Privacy Pro” marks another expansion, but this time, it just feels ‘meh.’

    The new bundle attempts to address several privacy concerns, including VPN services, personal information removal, and identity theft protection. While these additions might seem like a natural extension of their privacy protection mission, they somewhat dilute the brand’s impact. The market is flooded with similar offerings, making it increasingly difficult to stand out without a clear and focused brand proposition.

    Questionable Partnerships Raise Eyebrows

    My primary concern isn’t just the expansion, but also the choice of partnerships that underpin the new VPN service. DuckDuckGo has chosen to use i3d.net servers, a company owned by gaming giant Ubisoft. This is a perplexing choice, considering Ubisoft’s 10% ownership by CCP linked Tencent,1 who also has a stake in Reddit.2 Tencent is a company whose involvement in privacy-related controversies is well-noted. This connection is particularly alarming for privacy advocates who might expect DuckDuckGo to partner with entities that align more closely with its foundational privacy principles.

    Technical Performance and User Experience

    On a more positive note, the user interface of DuckDuckGo’s VPN service is commendably simple and efficient, catering well to those who prioritize ease of use. Performance-wise, the VPN impresses with high download speeds, peaking at 436Mbps during my tests. This indicates that while there may be concerns about the backend, users will not likely experience any compromise in performance.

    Final Thoughts

    Despite the technical strengths, DuckDuckGo’s venture into this crowded market segment with questionable partnerships might not resonate well with its user base, which primarily seeks uncompromised privacy. If DuckDuckGo wishes to truly enhance its offerings, perhaps a more robust expansion into email services or further development of their existing tools would be more in line with user expectations and their brand identity.

    In conclusion, while “Privacy Pro” aims to offer comprehensive privacy tools, the actual value and alignment with DuckDuckGo’s core principles remain under scrutiny. As a long-time advocate for privacy, I find the lack of a focused brand strategy and questionable server partnerships to be major concerns, overshadowing the potential benefits of the new features. DuckDuckGo will need to tread carefully to maintain the trust and loyalty of its privacy-conscious users.

    1. Crecente, B. (2018, March 20). Vivendi sells all of its Ubisoft shares to Tencent and others. Rolling Stone. https://web.archive.org/web/20180320211254/https://www.rollingstone.com/glixel/features/vivendi-sells-all-of-its-ubisoft-shares-to-tencent-and-others-w518120
      ↩︎
    2. Kelly, K. J. (2019, February 15). Condé Nast’s hold on Reddit slips but Newhouse family has cushion. New York Post. https://nypost.com/2019/02/14/conde-nasts-hold-on-reddit-slips-but-newhouse-family-has-cushion/
      ↩︎
  • House Passes 2-Year Surveillance Law Extension Without Warrant Requirement

    As the House scrambles to renew a contentious surveillance law, the reality hits hard: privacy in America is an illusion, one the government is eager to shatter under the guise of national security. Last Friday, in a move that reeks of desperation and disregard for civil liberties, lawmakers passed a bill reauthorizing Section 702 of the Foreign Intelligence Surveillance Act (FISA)—a statute that allows the warrantless collection of international communications from U.S. service providers. Despite facing significant backlash and the looming threat of expiration, this bill, clad in controversy, managed to claw its way through the House.

    This latest iteration of the surveillance saga unfolded after a polarizing debate and a near-miss amendment that would have demanded FBI agents and intelligence analysts obtain a warrant before sifting through Americans’ data—a basic safeguard staunchly opposed by national security hawks. The narrow defeat of this amendment, at a tied vote, epitomizes the alarming extent to which our elected officials are willing to compromise our privacy.

    The insistence on maintaining such sweeping surveillance powers without robust checks starkly highlights the chasm between government actions and the protection of constitutional rights. It’s a vivid reminder of the perennial clash between privacy and perceived security. And while some members of Congress argued that adding a warrant requirement would “blind” security officials, this rhetoric only serves to obscure the true issue at hand: an invasive policy that operates with minimal oversight and maximal potential for abuse.

    In this environment, where lawmakers wield the word ‘security’ as both shield and sword, citizens must take matters into their own hands. The passage of this bill should serve as a stark warning that relying on government bodies to safeguard our privacy is a gamble with unfavorable odds. The lesson here is clear and urgent: encrypt your communications. Use cryptography. Do not wait for a breach to happen, or for a whistleblower to reveal that your private communications have been compromised. The technologies to protect your data exist precisely because our leaders have shown time and again that they cannot be trusted to prioritize our privacy.

    As this bill heads to the Senate, the clock ticks down not just on the law’s expiration, but on our remaining shreds of privacy. Let this moment be a call to action: secure your digital life, because clearly, those in power will not.

  • Protect Your Home: Prevention, Detection, Defense

    Protect Your Home: Prevention, Detection, Defense

    When it comes to ensuring the safety and security of your home, a multi-tiered approach is essential. By layering preventive measures, detection systems, and last-resort defense options, you can create a robust security strategy that not only deters potential intruders but also provides peace of mind for you and your family. From physical barriers like fences and secure locks to advanced technologies such as home security cameras and smart lighting, each layer plays a crucial role in safeguarding your home.

    Here’s a comprehensive list of home security measures organized into tiers of prevention/deterrence, detection, and last resort/self-defense, along with some additional considerations for each category:

    Prevention/Deterrence

    • Fence: A physical barrier to deter unauthorized entry.
    • Gated Driveway: Controls access to the property.
    • Exterior Lights: Well-lit areas discourage intruders.
    • Security Signs and Stickers: Indicate the presence of security measures.
    • Dog: Can serve as both a deterrent and an early warning system.
    • Secure Doors and Locks: High-quality locks and reinforced doors.
    • Door Wedges: Prevent doors from being forced open.
    • Window Locks: Ensure windows cannot be easily opened from the outside.
    • Landscaping: Trimmed bushes and trees eliminate hiding spots.
    • Privacy Film: Prevents outsiders from seeing inside your home.

    Detection

    • Home Security Cameras: Live monitoring and alerts for suspicious activity.
    • Motion Detector Lights: Illuminate areas when movement is detected.
    • Door and Window Sensors: Alert you when they are opened.
    • Glass Break Sensors: Detect the sound of breaking glass.
    • Smart Home Integration: Allows for remote monitoring and control of security systems.

    Last Resort/Self-Defense

    • Firearms/Weapons: For personal protection, if legal and properly trained.
    • Safe Room: A fortified room to retreat to in case of an emergency.
    • Pepper Spray: A non-lethal option for self-defense.
    • Personal Alarm: Can scare off an attacker and attract attention.

    Additional Measures

    • Panic Buttons: Trigger alarms and alert authorities in an emergency.
    • Smart Lighting: Ability to turn on/off all interior and exterior lights remotely to cause confusion for intruders.
    • Alarm System: Loud alarms can deter intruders and alert neighbors.
    • Security Consultation: Professional assessment of your home’s security needs.

    In conclusion, protecting your home requires a comprehensive and layered approach to security. By combining prevention and deterrence measures with detection systems and last-resort self-defense options, you can create an effective defense-in-depth strategy. Remember, the goal is not only to deter potential intruders but also to provide you with the tools and confidence to respond effectively in any situation. Regularly reviewing and updating your security plan will ensure that your home remains a safe haven for years to come.

  • Does mailbox.org offer an onion service?

    Mailbox.org, a Berlin-based email service provider, has carved a niche for itself by prioritizing privacy and security in an increasingly surveillance-prone digital landscape. Recognized for its robust encryption protocols and adherence to Germany’s stringent data protection laws, Mailbox.org offers a refuge for individuals and organizations seeking a secure communication platform.

    The significance of selecting the right email provider cannot be overstated. In an era where data breaches and privacy violations are commonplace, the choice of an email service becomes a critical decision. It’s not merely about communication; it’s about safeguarding sensitive information, protecting one’s digital identity, and ensuring that private conversations remain private.

    For users who prioritize anonymity and seek to navigate the internet without leaving a trace, the Tor network offers a solution. The Tor browser, known for its ability to obscure a user’s location and usage from anyone conducting network surveillance or traffic analysis, is a popular tool among privacy-conscious individuals. While Mailbox.org’s email service can be accessed through the Tor browser, it’s important to note that they do not currently offer a dedicated onion service.

    An onion service, distinguishable by its “.onion” domain, provides an extra layer of privacy and security by allowing users to access services over the Tor network without revealing their IP address. This feature is particularly valued by those who seek to maintain a high level of anonymity in their online activities.

    For users for whom this feature is indispensable, it’s advisable to reach out to Mailbox.org and express the importance of implementing an onion service. User feedback can be a powerful catalyst for change, and by voicing the demand for enhanced privacy features, customers can play a role in shaping the future of their chosen email service.

    In conclusion, while Mailbox.org stands out as a privacy-centric email provider, the absence of an onion service is a noteworthy limitation for users who prioritize anonymity above all else. As the digital landscape continues to evolve, it is incumbent upon service providers like Mailbox.org to adapt and meet the growing demands for privacy and security in the online realm.

  • The End of Anonymity on Reddit: A Blow to Free and Open Communication

    Reddit, once hailed as “the front page of the internet,” has silently taken a controversial step that may significantly alter its reputation and accessibility. A user on Hacker News has reported that Reddit is now fully blocking access through Tor, proxies, and VPNs for both its new and old designs. This move is a stark departure from the platform’s previous stance on privacy and anonymity, which were among the core values that attracted a vast and diverse user base. For most of reddit’s existence, for example, you didn’t even need to enter an email address in order to register. That policy has since changed.

    We confirmed that browning old.reddit.com while connected to Windscribe is blocked.

    A Refuge No More

    Reddit’s appeal has long been its ability to offer a space for free and open communication. During the infamous Digg v4 migration, users flocked to Reddit, finding solace in its minimalist style and decentralized feeling. The platform became a haven for those seeking to share and discuss ideas without the constraints of mainstream media. It was a place where news often broke before it hit the headlines, where communities formed around niche interests, and where anonymity allowed for open and honest discourse.

    The Impact of Blocking Anonymity Tools

    The decision to block Tor, proxies, and VPNs is a significant blow to users in censored or oppressed countries. These tools are vital for individuals in such regions to bypass restrictions and communicate with the outside world. By denying access to these users, Reddit is effectively silencing voices that desperately need a platform to be heard.

    Moreover, this move raises concerns about privacy and security for all users. In an age where online surveillance is rampant, the ability to access the internet without leaving a trail of breadcrumbs is crucial for protecting personal freedom and safety. Reddit’s new policy not only alienates a portion of its user base but also sets a concerning precedent for online platforms.

    The Future of Reddit and Online Anonymity

    The fallout from this decision will likely be minimal. Reddit may face backlash from a small minority of its community, and its reputation as a bastion of free speech and open communication will certainly be tarnished in their minds. The platform’s shift away from anonymity will almost certainly lead to a sanitized and less vibrant community, where users are hesitant to speak their minds.

    As we move forward, the importance of protecting online anonymity cannot be overstated. The internet should be a place where diverse voices can be heard and where individuals can seek information and connect with others without fear of censorship or reprisal. Reddit’s recent changes are a step in the wrong direction, and it is crucial that we continue to advocate for a free and open internet.

    Related

  • Router Redistribution: Connecting Networks with Different Routing Protocols

    Router redistribution is a process used in enterprise networking where routing information from one routing protocol is shared or “redistributed” into another routing protocol. This is commonly used in complex network environments where different parts of the network use different routing protocols, and there needs to be a way for these different parts to communicate and share routing information.

    For example, consider a network where one segment uses OSPF (Open Shortest Path First) as its routing protocol, and another segment uses EIGRP (Enhanced Interior Gateway Routing Protocol). Without redistribution, these two segments would not be able to share routing information, and devices in one segment would not know how to reach devices in the other segment.

    To enable communication between these segments, router redistribution can be configured on a router that connects the two segments. This router would be configured to redistribute routes from OSPF into EIGRP and vice versa. This means that the router takes the routing information it learns from OSPF and shares it with EIGRP, and it takes the routing information it learns from EIGRP and shares it with OSPF.

    Here’s a simplified example of how this configuration might look on a Cisco router:

    router ospf 1
     redistribute eigrp 100
    !
    router eigrp 100
     redistribute ospf 1

    In this example, the redistribute eigrp 100 command under the router ospf 1 configuration tells the router to take the routes it has learned from EIGRP (autonomous system 100) and redistribute them into OSPF (process ID 1). Similarly, the redistribute ospf 1 command under the router eigrp 100 configuration tells the router to take the routes it has learned from OSPF (process ID 1) and redistribute them into EIGRP (autonomous system 100).

    It’s important to note that router redistribution requires careful planning and configuration, as it can introduce routing loops and other issues if not done correctly. It’s also common to use route filtering and route maps to control which routes are redistributed and how they are redistributed.

    There are several security considerations and potential vulnerabilities associated with route redistribution in enterprise networking:

    1. Routing Loops: Incorrectly configured route redistribution can lead to routing loops, where packets continuously circulate between routers without reaching their destination. This can cause network congestion and degrade network performance.
    2. Suboptimal Routing: If route metrics are not properly adjusted during redistribution, it can lead to suboptimal routing paths. This can cause increased latency and reduced network efficiency.
    3. Routing Table Pollution: Without proper filtering, route redistribution can introduce unnecessary or unwanted routes into the routing table, leading to increased memory and CPU usage on routers.
    4. Security Risks: Redistribution can potentially introduce routes from less secure or untrusted networks into more secure or trusted networks. This can create a pathway for attackers to access sensitive areas of the network.
    5. Control Plane Overload: Excessive route redistribution can overload the router’s control plane, leading to slower route processing and potentially causing instability in the network.

    To mitigate these risks, it’s important to implement route redistribution carefully and with the following best practices:

    • Use route filtering to control which routes are redistributed and to prevent unwanted routes from being introduced into the network.
    • Adjust route metrics appropriately to ensure optimal routing paths and to prevent routing loops.
    • Limit the scope of redistribution to only the necessary routing protocols and network segments.
    • Regularly monitor and review the routing configuration to ensure that it remains secure and efficient.
    • Implement network segmentation and access control to limit the potential impact of security risks associated with route redistribution.

    By following these best practices, organizations can reduce the security risks and potential vulnerabilities associated with route redistribution in their enterprise networks.

  • Gaming Companies Partner with Federal Agencies to Monitor Extremism

    Gaming Companies Partner with Federal Agencies to Monitor Extremism

    In recent revelations, it has come to light that gaming companies are collaborating with federal agencies like the FBI and the Department of Homeland Security to monitor and root out what is deemed as domestic violent extremist content. This cooperation is detailed in a Government Accountability Office report, which outlines the interactions between federal agencies and various gaming and social media platforms, including Roblox, Discord, and Reddit.

    This news raises a critical question for those who value privacy and security: Where do we draw the line between public safety and the preservation of individual privacy? Mainstream platforms, while convenient for casual conversations and entertainment, are proving to be unsuitable for discussions of a sensitive or political nature. The extent of surveillance and data sharing with government agencies highlights the importance of using platforms that prioritize encryption and anonymity for such discussions.

    The GAO report reveals that the FBI and DHS have established mechanisms to share and receive information related to domestic violent extremism threats with these companies. This includes the ability for gaming companies to share information about online activities that promote domestic violent extremism or even activities that violate the companies’ terms of service. The FBI, through its field offices, receives tips from gaming companies about potential law-breaking and extremist views for further investigation.

    An often overlooked aspect of online communication, especially within gaming platforms and VOIP services, is the security of voice and text transmissions. Many of these services do not employ end-to-end encryption for voice or in-game text chats, leaving messages potentially exposed to interception and surveillance. Additionally, there is a lack of transparency regarding the duration for which these messages are stored by the service providers. This ambiguity raises significant privacy concerns, as users are left in the dark about the fate of their conversations and whether they could be accessed by unauthorized parties or used for purposes beyond their control.

    This is not to say that one should completely avoid using these services, but rather, it is a call for exercising utmost caution. When engaging in conversations on these platforms, it is crucial to be mindful of the information you share, especially regarding personal details or political beliefs. In the absence of robust encryption and clear data retention policies, discussing sensitive topics over the clearnet can be akin to shooting fish in a barrel, leaving oneself vulnerable to surveillance and potential repercussions. While it may be inconvenient, the reality is that protecting yourself in the information age often requires a cautious approach to online communication.

    While the intention behind these efforts is to combat extremism, the broad scope of surveillance and the lack of an overarching strategy, as noted by the GAO, raise concerns about the effectiveness and implications of these measures. The report recommends that both agencies develop a strategy to align their work with gaming companies with broader agency missions. However, the absence of such a strategy raises questions about the balance between security and privacy.

    The involvement of gaming platforms in monitoring and reporting extremist content is not new. The federal government’s interest in this area has increased following events like the January 6 storming of the Capitol. President Joe Biden’s directive for a comprehensive review of federal efforts to fight domestic terrorism led to the release of the national strategy for fighting domestic terrorism, which mentions online gaming platforms as a place where recruiting and mobilizing individuals to domestic terrorism occurs.

    The collaboration between gaming companies and federal agencies highlights the need for individuals to be cautious about the platforms they use for discussions of a sensitive nature. Mainstream platforms may be suitable for casual conversations, but for discussions that require privacy and security, it is essential to move to platforms that offer increased anonymity and encryption. This ensures that personal freedoms and privacy are not compromised in the pursuit of security.

    Related