shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

284
active users

#room641a

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://tweesecake.social/@adisonverlice" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>adisonverlice</span></a></span> it's not just re: <a href="https://infosec.space/tags/Governments" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Governments</span></a> (tho <a href="https://infosec.space/tags/Project2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Project2025</span></a> explicitly endorses unsactioned comms to twart attempts at <a href="https://infosec.space/tags/FIOA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIOA</span></a> or any <a href="https://infosec.space/tags/accountability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>accountability</span></a> for that matter), but individuals or any organization:</p><ul><li>If a system is <a href="https://infosec.space/tags/centralized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralized</span></a> as in <a href="https://infosec.space/tags/SingleVendor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleVendor</span></a> and/or <a href="https://infosec.space/tags/SingleProvider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleProvider</span></a>, it's inherently vulnerable.</li></ul><p>And if <a href="https://infosec.space/tags/EncroChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EncroChat</span></a> got pwned, who's gonna guarantee <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> won't if it's actually secure or isn't an <a href="https://infosec.space/tags/InsideJob" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InsideJob</span></a> like <a href="https://infosec.space/tags/AN%C3%98M" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ANØM</span></a>.</p><p>After all, both <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a>'s Organization and key people like <span class="h-card" translate="no"><a href="https://mastodon.world/@Mer__edith" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Mer__edith</span></a></span> are known to the authorities by more than just their legal name.</p><ul><li>What's gonna prevent <a href="https://infosec.space/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> from doing a <em>"bag&amp;drag"</em> on her or getting his goons to put a gun on,the developers' heads and force them to,<a href="https://infosec.space/tags/d0x" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>d0x</span></a> all users and <a href="https://infosec.space/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> everything (if they didn't already got forced to have some <em>"<a href="https://infosec.space/tags/LafwulInterception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LafwulInterception</span></a>"</em> gear in a closet like <a href="https://infosec.space/tags/Room641A" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Room641A</span></a>... </li></ul><p>After all, Signal <a href="https://web.archive.org/web/20220112020000/https://twitter.com/thegrugq/status/1085614812581715968" rel="nofollow noopener noreferrer" target="_blank">can't pull the 5th</a> and refuse to comply!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@Andromxda" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Andromxda</span></a></span> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@pixelcode" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pixelcode</span></a></span> How can you <a href="https://infosec.exchange/@Andromxda/114232892557687415" rel="nofollow noopener noreferrer" target="_blank">claim something you can't evidence</a>?</p><ul><li>Pretty shure if it's not <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> themselves, then their centralized architecture and unwillingness to even have an <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionService</span></a> on <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> makes it trivial to pull a <a href="https://infosec.space/tags/Room641A" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Room641A</span></a> on them.</li></ul><p>It makes you look like one of those folks <a href="https://www.youtube.com/watch?v=G1thc5DSHwA" rel="nofollow noopener noreferrer" target="_blank">shilling</a> <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>|s that <a href="https://web.archive.org/web/20210606070919/twitter.com/thegrugq/status/1085614812581715968" rel="nofollow noopener noreferrer" target="_blank">ain't logless after all</a>...</p><ul><li>I don't believe in <a href="https://infosec.space/tags/marketing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>marketing</span></a> <a href="https://infosec.space/tags/lies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lies</span></a> and <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> can't (and won't) be able to evidence that they don't log shit.</li></ul><p>At least they should be honest about things and not claim bs, cuz demanding a <a href="https://infosec.space/tags/PhoneNumber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhoneNumber</span></a> is <em>just <a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KYC</span></a> with extra steps</em> like demanding any <a href="https://infosec.space/tags/SSN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSN</span></a> or other <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PII</span></a>. Makes them look like chinese MMORPGs that demand ID card numbers for account signups, thus <a href="https://infosec.space/tags/paywalling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paywalling</span></a> the ability to use their service anonymously...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@pixelcode" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pixelcode</span></a></span> <span class="h-card" translate="no"><a href="https://fedi.feministwiki.org/users/taylan" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>taylan</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> the <a href="https://infosec.space/tags/centralization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralization</span></a>, espechally without means to hide it's traffic via <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> makes it trivial to detect and track <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> / <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> users.</p><ul><li>Add to that the fact that Signal has <a href="https://infosec.space/tags/PhoneNumbers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhoneNumbers</span></a> = <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PII</span></a> on them and the fact they are incorporated in the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a>, thus subject to <a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudAct</span></a> and it's not a matter <em>if</em> they snitch on users but how many thousands if not millions got subopena'd to this day.</li></ul><p>And with no self-custody of keys it's trivial to <a href="https://infosec.space/tags/Room641A" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Room641A</span></a> the users if the devs get <em>"motivated"</em> under threat of spending the rest of theor lives in jail.</p>
Martin Schmiedecker<p>To this day, I still wonder what exactly is/was behind that door <a href="https://infosec.exchange/tags/room641a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>room641a</span></a></p>
Doc Edward Morbius ⭕​<p><strong>In Memoriam: Mark Klein, AT&amp;T Whistleblower Who Revealed NSA Mass Spying</strong></p><blockquote><p>[W]hat Mark told us changed everything. Through his work, Mark had learned that the National Security Agency (NSA) had installed a secret, secure room at AT&amp;T’s central office in San Francisco, called Room 641A. Mark was assigned to connect circuits carrying Internet data to optical “splitters” that sat just outside of the secret NSA room but were hardwired into it. Those splitters—as well as similar ones in cities around the U.S.—made a copy of all data going through those circuits and delivered it into the secret room.</p></blockquote><p><a href="https://www.eff.org/deeplinks/2025/03/memoriam-mark-klein-att-whistleblower-about-nsa-mass-spying" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/03/memo</span><span class="invisible">riam-mark-klein-att-whistleblower-about-nsa-mass-spying</span></a></p><p>Klein provided one of the pre-Snowden disclosures of massive communications surveillance in the United States. I'd included him in an earlier toot from May 2021: <a href="https://toot.cat/@dredmorbius/106251396105180975" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">toot.cat/@dredmorbius/10625139</span><span class="invisible">6105180975</span></a></p><p>His story also demonstrates that "surveillance state" and "surveillance capitalism" aren't separate things, but part of the same larger surveillance octopus.</p><p><a href="https://toot.cat/tags/MarkKlein" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarkKlein</span></a> <a href="https://toot.cat/tags/Room641a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Room641a</span></a> <a href="https://toot.cat/tags/ATT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ATT</span></a> <a href="https://toot.cat/tags/MassSurveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MassSurveillance</span></a> <a href="https://toot.cat/tags/SurveillanceState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SurveillanceState</span></a> <a href="https://toot.cat/tags/SurveillanceCapitalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SurveillanceCapitalism</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.world/@ginaintheburg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ginaintheburg</span></a></span> could be.</p><p><a href="https://infosec.space/tags/Room641A" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Room641A</span></a> is everywhere...</p><p><a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudAct</span></a></p>