YubNub Social YubNub Social
    #humor #history #ai #artificialintelligence #automotiveengineering
    Advanced Search
  • Login
  • Register

  • Night mode
  • © 2025 YubNub Social
    About • Directory • Contact Us • Developers • Privacy Policy • Terms of Use • shareasale • FB Webview Detected • Android • Apple iOS • Get Our App

    Select Language

  • English
Install our *FREE* WEB APP! (PWA)
Night mode toggle
Community
News Feed (Home) Popular Posts Events Blog Market Forum
Media
Go LIVE! Headline News VidWatch Game Zone Top PodCasts
Explore
Explore Offers
© 2025 YubNub Social
  • English
About • Directory • Contact Us • Developers • Privacy Policy • Terms of Use • shareasale • FB Webview Detected • Android • Apple iOS • Get Our App
Advertisement
Stop Seeing These Ads

Discover posts

Posts

Users

Pages

Group

Blog

Market

Events

Games

Forum

Survival Prepper
Survival Prepper  
1 w

Preppers Right Now Watching WW3 Unfold #funny #prepper #ww3
Favicon 
prepping.com

Preppers Right Now Watching WW3 Unfold #funny #prepper #ww3

Preppers aren't worried about World War III events. They've been prepping for years, stocking rice and beans.
Like
Comment
Share
Survival Prepper
Survival Prepper  
1 w

Situation Report - 23 Jun 2025
Favicon 
prepping.com

Situation Report - 23 Jun 2025

My channel Focuses on emergency Preparedness topics for the traveling professional and family. Among the topics I'll cover are emergency preparedness, food, cooking, travel tips, shooting skills and current events, as well as some fun topics such as Pets, Bourbon and Politics. MY AFFILIATE LINKS (I may receive products or compensation for some of these items at no additional cost to you) TRP's Amazon Storefront (under construction) - https://www.amazon.com/shop/theroamingprepper - Check out my book "Defensive Preparedness" on Kindle and Amazon https://amzn.to/4a3M5jS - Readywise Emergency and Pantry Foods https://www.dpbolvw.net/click-101244060-15859964 - Palmetto State Armory https://alnk.to/gKRiRIl - JASE Medical https://jasemedical.com/?rstr=4408 - ETA LIVING (Water Filter for CBRN Chems - Use ROAMER15 for 15% discount) http://bit.ly/3mafs0q - Wallaby Mylar Bags (Use ROAMING5 for $5 Off) https://wallabygoods.com/?rfsn=7151050.c9fe38e - 1791 GunLeather https://alnk.to/g3cgWf3 - Bully Sticks (Great Dog Treats - Corgi Approved) https://alnk.to/2Qxrn66 - MIRA Safety CBRN Masks and Products https://alnk.to/9xkeE80 - Nutrient Survival - Survival Foods https://alnk.to/1N2TufW - WolfGang Dog Supplies https://alnk.to/6TARW3a - AceLink Armor for your personal defense https://alnk.to/esXs79E - KRyptec Advanced Camouflage https://alnk.to/fws005N If you'd like to Donate/buy me a Coffee Buy me a Coffee: paypal.me/theroamingprepper (Donations not necessary but always appreciated...please be sure to take care of your needs and the needs of loved ones first...thanks) Reach out: Email: theroamingprepper@gmail.com FaceBook: https://www.facebook.com/TheRoamingPrepper IG: https://www.instagram.com/theroamingprepper/ **DISCLAIMER**: The information may contain copyrighted material and is distributed under the "FAIR USE NOTICE" without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. All research, news articles and opinions are passed on for informational purposes only. The founders of the channel and their guests do not accept any responsibility for any incorrect or misinformation stated in any articles, videos or chats. The information is provided for entertainment and awareness. Viewers are highly encouraged to to their own research regarding any information including but not limited to medical or survival skills with experts or other professionals in those areas. We also do not take responsibility for actions of viewers. #theroamingprepper #prepper #preparedness #SHTF #WROL #Preparedness #Iran #israel ?️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! ? https://streamyard.com/pal/d/6653884635545600
Like
Comment
Share
Survival Prepper
Survival Prepper  
1 w

America is Fragmenting - Be Ready to Separate
Favicon 
prepping.com

America is Fragmenting - Be Ready to Separate

#emp #cme #preparedness #survival #selfreliance #collapse #shtf #teotwawki If you would like to support the channel, you can buy me a Coffee - https://coff.ee/integrativepreparedness Links to the Patreon channel: https://www.patreon.com/integrativepreparedness Order My Books, Mugs or T-Shirts Through the Stonemont Website: https://www.stonemont.us Links to my books on Amazon https://www.amazon.com/Steven-C.-Smith/e/B076G2J5NG%3Fref=dbs_a_mng_rwt_scns_share Stonemont channel: https://www.youtube.com/channel/UCYZhO7pBb12UQkhqfaCdHtw American Revival Channel: https://www.youtube.com/watch?v=YR80GXOrQgU Stonemont Church Channel: https://www.youtube.com/@stonemontchurch1761 DoomTube: https://www.youtube.com/@Doomtube111
Like
Comment
Share
DeepLinks from the EFF
DeepLinks from the EFF
1 w

EFF to European Commission: Don’t Resurrect Illegal Data Retention Mandates
Favicon 
www.eff.org

EFF to European Commission: Don’t Resurrect Illegal Data Retention Mandates

The mandatory retention of metadata is an evergreen of European digital policy. Despite a number of rulings by Europe’s highest court, confirming again and again the incompatibility of general and indiscriminate data retention mandates with European fundamental rights, the European Commission is taking major steps towards the re-introduction of EU-wide data retention mandates. Recently, the Commission launched a Call for Evidence on data retention for criminal investigations—the first formal step towards a legislative proposal. The European Commission and EU Member States have been attempting to revive data retention for years. For this purpose, a secretive “High Level Group on Access to Data for Effective Law Enforcement” has been formed, usually referred to as High level Group (HLG) “Going dark”. Going dark refers to the false narrative that law enforcement authorities are left “in the dark” due to a lack of accessible data, despite the ever increasing collection and accessing of data through companies, data brokers and governments. Going dark also describes the intransparent ways of working of the HLG, behind closed doors and without input from civil society. The Groups’ recommendations to the European Commission, published in 2024, read like a wishlist of government surveillance.They include suggestions to backdoors in various technologies (reframed as “lawful access by design”), obligations on service providers to collect and retain more user data than they need for providing their services, and intercepting and providing decrypted data to law enforcement in real time, all the while avoiding to compromise the security of their systems. And of course, the HLG calls for a harmonized data retention regime, including not only the retention of but also the access to data, and extending data retention to any service provider that could provide access to data. EFF joined other civil society organizations in addressing the dangerous proposals of the HLG, calling on the European Commission to safeguard fundamental rights and ensuring the security and confidentiality of communication. In our response to the Commission's Call for Evidence, we reiterated the same principles.  Any future legislative measures must prioritize the protection of fundamental rights and must be aligned with the extensive jurisprudence of the Court of Justice of the European Union.  General and indiscriminate data retention mandates undermine anonymity and privacy, which are essential for democratic societies, and pose significant cybersecurity risks by creating centralized troves of sensitive metadata that are attractive targets for malicious actors.  We highlight the lack of empirical evidence to justify blanket data retention and warn against extending retention duties to number-independent interpersonal communication services as it would violate CJEU doctrine, conflict with European data protection law, and compromise security. The European Commission must once and for all abandon the ghost of data retention that’s been haunting EU policy discussions for decades, and shift its focus to rights respecting alternatives. Read EFF’s full submission here.
Like
Comment
Share
DeepLinks from the EFF
DeepLinks from the EFF
1 w

A Journalist Security Checklist: Preparing Devices for Travel Through a US Border
Favicon 
www.eff.org

A Journalist Security Checklist: Preparing Devices for Travel Through a US Border

This post was originally published by the Freedom of the Press Foundation (FPF). This checklist complements the recent training module for journalism students in border communities that EFF and FPF developed in partnership with the University of Texas at El Paso Multimedia Journalism Program and Borderzine. We are cross-posting it under FPF's Creative Commons Attribution 4.0 International license. It has been slightly edited for style and consistency. Before diving in: This space is changing quickly! Check FPF's website for updates and contact them with questions or suggestions. This is a joint project of Freedom of the Press Foundation (FPF) and the Electronic Frontier Foundation. Those within the U.S. have Fourth Amendment protections against unreasonable searches and seizures — but there is an exception at the border. Customs and Border Protection (CBP) asserts broad authority to search travelers’ devices when crossing U.S. borders, whether traveling by land, sea, or air. And unfortunately, except for a dip at the start of the COVID-19 pandemic when international travel substantially decreased, CBP has generally searched more devices year over year since the George W. Bush administration. While the percentage of travelers affected by device searches remains small, in recent months we’ve heard growing concerns about apparent increased immigration scrutiny and enforcement at U.S. ports of entry, including seemingly unjustified device searches. Regardless, it’s hard to say with certainty the likelihood that you will experience a search of your items, including your digital devices. But there’s a lot you can do to lower your risk in case you are detained in transit, or if your devices are searched. We wrote this checklist to help journalists prepare for transit through a U.S. port of entry while preserving the confidentiality of your most sensitive information, such as unpublished reporting materials or source contact information. It’s important to think about your strategy in advance, and begin planning which options in this checklist make sense for you. First thing’s first: What might CBP do? U.S. CBP’s policy is that they may conduct a “basic” search (manually looking through information on a device) for any reason or no reason at all. If they feel they have reasonable suspicion “of activity in violation of the laws enforced or administered by CBP” or if there is a “national security concern,” they may conduct what they call an “advanced” search, which may include connecting external equipment to your device, such as a forensic analysis tool designed to make a copy of your data. Your citizenship status matters as to whether you can refuse to comply with a request to unlock your device or provide the passcode. If you are a U.S. citizen entering the U.S., you have the most legal leverage to refuse to comply because U.S. citizens cannot be denied entry — they must be let back into the country. But note that if you are a U.S. citizen, you may be subject to escalated harassment and further delay at the port of entry, and your device may be seized for days, weeks, or months. If CBP officers seek to search your locked device using forensic tools, there is a chance that some (if not all of the) information on the device will be compromised. But this probability depends on what tools are available to government agents at the port of entry, if they are motivated to seize your device and send it elsewhere for analysis, and what type of device, operating system, and security features your device has. Thus, it is also possible that strong encryption may substantially slow down or even thwart a government device search. Lawful permanent residents (green-card holders) must generally also be let back into the country. However, the current administration seems more willing to question LPR status, so refusing to comply with a request to unlock a device or provide a passcode may be risky for LPRs. Finally, CBP has broad discretion to deny entry to foreign nationals arriving on a visa or via the visa waiver program. At present, traveling domestically within the United States, particularly if you are a U.S. citizen, is lower risk than travelling internationally. Our luggage and the physical aspects of digital devices may be searched — e.g., manual inspection or x-rays to ensure a device is not a bomb. CBP is often present at airports, but for domestic travel within the U.S. you should only be interacting with the Transportation Security Administration. TSA does not assert authority to search the data on your device — this is CBP’s role. At an international airport or other port of entry, you have to decide whether you will comply with a request to access your device, but this might not feel like much of a choice if you are a non-U.S. citizen entering the country! Plan accordingly. Your border digital security checklist Preparing for travel ☐ Make a backup of each of your devices before traveling.☐ Use long, unpredictable, alphanumeric passcodes for your devices and commit those passwords to memory. ☐ If bringing a laptop, ensure it is encrypted using BitLocker for Windows, or FileVault for macOS. Chromebooks are encrypted by default. A password-protected laptop screen lock is usually insufficient. When going through security, devices should be turned all the way off.☐ Fully update your device and apps.☐ Optional: Use a password manager to help create and store randomized passcodes. 1Password users can create temporary travel vaults.☐ Bring as few sensitive devices as possible — only what you need.☐ Regardless which country you are visiting, think carefully about what you are willing to post publicly on social media about that country to avoid scrutiny.☐ For land ports of entry in the U.S., check CBP’s border wait times and plan accordingly.☐ If possible, print out any travel documents in advance to avoid the necessity to unlock your phone during boarding, including boarding passes for your departure and return, rental car information, and any information about your itinerary that you would like to have on hand if questioned (e.g., hotel bookings, visa paperwork, employment information if applicable, conference information). Use a printer you trust at home or at the office, just in case.☐ Avoid bringing sensitive physical documents you wouldn’t want searched. If you need them, consider digitizing them (e.g., by taking a photo) and storing them remotely on a cloud service or backup device. Decide in advance whether you will unlock your device or provide the passcode for a search. Your overall likelihood of experiencing a device search is low (e.g., less than .01% of international travelers are selected), but depending on what information you carry, the impact of a search may be quite high. If you plan to unlock your device for a search or provide the passcode, ensure your devices are prepared: ☐ Upload any information you would like to keep in cloud providers in advance (e.g., using iCloud) that you would like stored remotely, instead of locally on your device.☐ Remove any apps, files, chat histories, browsing histories, and sensitive contacts you would not want exposed during a search.☐ If you delete photos or files, delete them a second time in the “Recently Deleted” or “Trash” sections of your Files and Photos apps.☐ Remove messages from the device that you believe would draw unwanted scrutiny. Remove yourself — even if temporarily — from chat groups on platforms like Signal.☐ If you use Signal and plan to keep it on your device, use disappearing messages to minimize how much information you keep within the app.☐ Optional: Bring a travel device instead of your usual device. Ensure it is populated with the apps you need while traveling, as well as login credentials (e.g., stored in a password manager), and necessary files. If you do this, ensure your trusted contacts know how to reach you on this device.☐ Optional: Rather than manually removing all sensitive files from your computer, if you are primarily accessing web services during your travels, a Chromebook may be an affordable alternative to your regular computer.☐ Optional: After backing up your devices for every day use, factory reset it and add only the information you need back onto the device.☐ Optional: If you intend to work during your travel, plan in advance with a colleague who can remotely assist you in accessing and/or rotating necessary credentials.☐ If you don’t plan to work, consider discussing with your IT department whether temporarily suspending your work accounts could mitigate risks at border crossings. On the day of travel ☐ Log out of accounts you do not want accessible to border officials. Note that border officers do not have authority to access live cloud content — they must put devices in airplane mode or otherwise disconnect them from the internet. ☐ Power down your phone and laptop entirely before going through security. This will enable disk encryption, and make it harder for someone to analyze your device.☐ Immediately before travel, if you have a practicing attorney who has expertise in immigration and border issues, particularly related to members of the media, make sure you have their contact information written down before visiting.☐ Immediately before travel, ensure that a friend, relative, or colleague is aware of your whereabouts when passing through a port of entry, and provide them with an update as soon as possible afterward. If you are pulled into secondary screening ☐ Be polite and try not to emotionally escalate the situation.☐ Do not lie to border officials, but don’t offer any information they do not explicitly request.☐ Politely request officers’ names and badge numbers.☐ If you choose to unlock your device, rather than telling border officials your passcode, ask to type it in yourself.☐ Ask to be present for a search of your device. But note officers are likely to take your device out of your line of sight.☐ You may decline the request to search your device, but this may result in your device being seized and held for days, weeks, or months. If you are not a U.S. citizen, refusal to comply with a search request may lead to denial of entry, or scrutiny of lawful permanent resident status. ☐ If your device is seized, ask for a custody receipt (Form 6051D). This should also list the name and contact information for a supervising officer.☐ If an officer has plugged your unlocked phone or computer into another electronic device, they may have obtained a forensic copy of your device. You will want to remember anything you can about this event if it happens.☐ Immediately afterward, write down as many details as you can about the encounter: e.g., names, badge numbers, descriptions of equipment that may have been used to analyze the device, changes to the device or corrupted data, etc. Reporting is not a crime. Be confident knowing you haven’t done anything wrong. More resources https://hselaw.com/news-and-information/legalcurrents/preparing-for-electronic-device-searches-at-united-states-borders/ https://www.eff.org/wp/digital-privacy-us-border-2017#main-content https://www.aclu.org/news/privacy-technology/can-border-agents-search-your-electronic https://www.theverge.com/policy/634264/customs-border-protection-search-phone-airport-rights https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/ https://www.washingtonpost.com/technology/2025/03/27/cbp-cell-phones-devices-traveling-us/
Like
Comment
Share
DeepLinks from the EFF
DeepLinks from the EFF
1 w

New Journalism Curriculum Module Teaches Digital Security for Border Journalists
Favicon 
www.eff.org

New Journalism Curriculum Module Teaches Digital Security for Border Journalists

Module Developed by EFF, Freedom of the Press Foundation, and University of Texas, El Paso Guides Students Through Threat Modeling and Preparation SAN FRANCISCO – A new college journalism curriculum module teaches students how to protect themselves and their digital devices when working near and across the U.S.-Mexico border.  “Digital Security 101: Crossing the US-Mexico Border” was developed by Electronic Frontier Foundation (EFF) Director of Investigations Dave Maass and Dr. Martin Shelton, deputy director of digital security at Freedom of the Press Foundation (FPF), in collaboration with the University of Texas at El Paso (UTEP) Multimedia Journalism Program and Borderzine.  The module offers a step-by-step process for improving the digital security of journalists passing through U.S. Land Ports of Entry, focusing on threat modeling: thinking through what you want to protect, and what actions you can take to secure it.  This involves assessing risk according to the kind of work the journalist is doing, the journalist’s own immigration status, potential adversaries, and much more, as well as planning in advance for protecting oneself and one’s devices should the journalist face delay, detention, search, or device seizure. Such planning might include use of encrypted communications, disabling or enabling certain device settings, minimizing the data on devices, and mentally preparing oneself to interact with border authorities.   The module, in development since early 2023, is particularly timely given increasingly invasive questioning and searches at U.S. borders under the Trump Administration and the documented history of border authorities targeting journalists covering migrant caravans during the first Trump presidency.  "Today's journalism students are leaving school only to face complicated, new digital threats to press freedom that did not exist for previous generations. This is especially true for young reporters serving border communities," Shelton said. "Our curriculum is designed to equip emerging journalists with the skills to protect themselves and sources, while this new module is specifically tailored to empower students who must regularly traverse ports of entry at the U.S.-Mexico border while carrying their phones, laptops, and multimedia equipment."  The guidance was developed through field visits to six ports of entry across three border states, interviews with scores of journalists and students from on both sides of the border, and a comprehensive review of CBP policies, while also drawing from EFF and FPF’s combined decades of experience researching constitutional rights and security techniques when it comes to our devices.   “While this training should be helpful to investigative journalists from anywhere in the country who are visiting the borderlands, we put journalism students based in and serving border communities at the center of our work,” Maass said. “Whether you’re reviewing the food scene in San Diego and Tijuana, covering El Paso and Ciudad Juarez’s soccer teams, reporting on family separation in the Rio Grande Valley, or uncovering cross-border corruption, you will need the tools to protect your work and sources."  The module includes a comprehensive slide deck that journalism lecturers can use and remix for their classes, as well as an interactive worksheet. With undergraduate students in mind, the module includes activities such as roleplaying a primary inspection interview and analyzing pop singer Olivia Rodrigo’s harrowing experience of mistaken identity while reentering the country. The module has already been delivered successfully in trainings with journalism students at UTEP and San Diego State University.  “UTEP’s Multimedia Journalism program is well-situated to help develop this digital security training module,” said UTEP Communication Department Chair Dr. Richard Pineda. “Our proximity to the U.S.-Mexico border has influenced our teaching models, and our student population – often daily border crossers – give us a unique perspective from which to train journalists on issues related to reporting safely on both sides of the border.”  For the “Digital security 101: Crossing the US-Mexico border” module: https://freedom.press/digisec/blog/border-security-module/  For more about the module: https://www.eff.org/deeplinks/2025/06/journalist-security-checklist-preparing-devices-travel-through-us-border For EFF’s guide to digital security at the U.S. border: https://www.eff.org/press/releases/digital-privacy-us-border-new-how-guide-eff  For EFF’s student journalist Surveillance Self Defense guide: https://ssd.eff.org/playlist/journalism-student  Contact:  DaveMaassDirector of Investigationsdm@eff.org
Like
Comment
Share
Trending Tech
Trending Tech
1 w

AllSpice’s platform is the GitHub for electrical engineering teams
Favicon 
techcrunch.com

AllSpice’s platform is the GitHub for electrical engineering teams

AllSpice's platform has landed customers including Blue Origin and Bose and just raised a $15 million Series A round.
Like
Comment
Share
Trending Tech
Trending Tech
1 w

New York State wants more nuclear power in a big way
Favicon 
techcrunch.com

New York State wants more nuclear power in a big way

Gov. Kathy Hochul is directing the New York Power Authority to develop the new power plant.
Like
Comment
Share
The Patriot Post Feed
The Patriot Post Feed
1 w

Operation Midnight Hammer: The Backstory
Favicon 
patriotpost.us

Operation Midnight Hammer: The Backstory

"When POTUS says 60 days ... otherwise [Iran's] nuclear capability will not exist; he meant it. Iran should listen to the president of the United States, and know that he means it — every word."
Like
Comment
Share
Sons Of Liberty Media
Sons Of Liberty Media
1 w

WW3 Approaches: Trump Struck Nuclear Sites In Iran
Favicon 
sonsoflibertymedia.com

WW3 Approaches: Trump Struck Nuclear Sites In Iran

President Donald Trump ordered strikes on several of Iran’s nuclear sites. The United States president has ordered a “very successful attack” on the Fordow, Natanz, and Esfahan facilities. Washington carried out a series of large-scale strikes on three Iranian nuclear facilities early on Sunday. The US ruler later delivered a televised address from the White …
Like
Comment
Share
Showing 1625 out of 84416
  • 1621
  • 1622
  • 1623
  • 1624
  • 1625
  • 1626
  • 1627
  • 1628
  • 1629
  • 1630
  • 1631
  • 1632
  • 1633
  • 1634
  • 1635
  • 1636
  • 1637
  • 1638
  • 1639
  • 1640
Stop Seeing These Ads

Edit Offer

Add tier








Select an image
Delete your tier
Are you sure you want to delete this tier?

Reviews

In order to sell your content and posts, start by creating a few packages. Monetization

Pay By Wallet

Payment Alert

You are about to purchase the items, do you want to proceed?

Request a Refund