social.adlerweb.info ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Dies ist eine private Instanz. Nur folgen, nicht anfassen.

Serverstatistik:

3
aktive Profile

#infosec

11 Beiträge10 Beteiligte0 Beiträge heute
Seth G.<p><a href="https://chaos.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://chaos.social/tags/Pixel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pixel</span></a> Update Bulletin—October 2025</p><p><a href="https://source.android.com/docs/security/bulletin/pixel/2025-10-01" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">source.android.com/docs/securi</span><span class="invisible">ty/bulletin/pixel/2025-10-01</span></a> </p><p><a href="https://chaos.social/tags/GooglePixel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePixel</span></a> <a href="https://chaos.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Jacky Kapadia<p>Smart Tech, Sneaky Eyes: Protecting Your Home Privacy.</p><p><a href="https://medium.com/@jckapadia003/smart-tech-sneaky-eyes-protecting-your-home-privacy-3eabf7dd613f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@jckapadia003/smart</span><span class="invisible">-tech-sneaky-eyes-protecting-your-home-privacy-3eabf7dd613f</span></a></p><p><a href="https://flipboard.social/tags/SmartHomae" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartHomae</span></a> <a href="https://flipboard.social/tags/SmartTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartTech</span></a> <a href="https://flipboard.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://flipboard.social/tags/InternetOfThings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetOfThings</span></a> <a href="https://flipboard.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://flipboard.social/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> <a href="https://flipboard.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://flipboard.social/tags/DigitalPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalPrivacy</span></a> <a href="https://flipboard.social/tags/CyberAware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAware</span></a> <a href="https://flipboard.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://flipboard.social/tags/SmartDevice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartDevice</span></a> <a href="https://flipboard.social/tags/ConnectedHome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectedHome</span></a> <a href="https://flipboard.social/tags/HomeTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeTech</span></a></p>
Ian Campbell 🏴<p>ICE now owns roving vans with integrated cell site simulators</p><p><a href="https://techcrunch.com/2025/10/07/ice-bought-vehicles-equipped-with-fake-cell-towers-to-spy-on-phones/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/10/07/ice-</span><span class="invisible">bought-vehicles-equipped-with-fake-cell-towers-to-spy-on-phones/</span></a></p><p>for commentary on this breaking news, i turn to my recently-made friend Ray Hunter</p><p>Luckily everyone else can too!</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> </p><p><a href="https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/03/meet</span><span class="invisible">-rayhunter-new-open-source-tool-eff-detect-cellular-spying</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@quincy" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quincy</span></a></span> may the cyberfascists realize that they'd be the ones firing the first shots if they chose that shite and that they shall not cross that line!</p><p><a href="https://infosec.space/tags/sarcasm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sarcasm</span></a> <a href="https://infosec.space/tags/comment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comment</span></a> <a href="https://infosec.space/tags/EUpol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUpol</span></a> <a href="https://infosec.space/tags/ChatControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatControl</span></a> <a href="https://infosec.space/tags/Cyberfascism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberfascism</span></a> <a href="https://infosec.space/tags/SurveillanceState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SurveillanceState</span></a> <a href="https://infosec.space/tags/PoliceState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoliceState</span></a> <a href="https://infosec.space/tags/Fascism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fascism</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> <a href="https://infosec.space/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.space/tags/HumanRights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HumanRights</span></a> <a href="https://infosec.space/tags/CivilRights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilRights</span></a></p>
lichtlos<p>Waiting for the first “xy sent you an encrypted message with Gmail additional encryption” phishing wave <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Dan<p>Yay! </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@PagedOut" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PagedOut</span></a></span> Issue #7 has been released! <br><a href="https://pagedout.institute/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pagedout.institute/</span><span class="invisible"></span></a></p><p>PDF:<br><a href="https://pagedout.institute/download/PagedOut_007.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pagedout.institute/download/Pa</span><span class="invisible">gedOut_007.pdf</span></a> <a href="https://chaos.social/tags/pagedout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pagedout</span></a> <a href="https://chaos.social/tags/ezine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ezine</span></a> <a href="https://chaos.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Aljoscha Rittner (beandev)<p>«archive.today» liefert Daten von Website-Besuchern nach Russland – Steiger Legal</p><p><a href="https://steigerlegal.ch/2024/05/05/archive-today-russland/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">steigerlegal.ch/2024/05/05/arc</span><span class="invisible">hive-today-russland/</span></a></p><p>&gt; «archive. today» ist eine beliebte Website für den Zugriff auf kostenpflichtige Medieninhalte. Bekannte Domainnamen für die Website sind archive. is und archive. ph. Was viele Nutzer nicht wissen: Die Website liefert Daten der Nutzer nach Russland.</p><p>Alternative ist archive.org</p><p><a href="https://social.tchncs.de/tags/InternetArchive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetArchive</span></a> <a href="https://social.tchncs.de/tags/RUSpol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RUSpol</span></a> <a href="https://social.tchncs.de/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Harry Sintonen<p>Broadcom has stopped delivering automated updates to <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> Fusion and Workstation. All updates have to be downloaded and installed manually from the Broadcom Support Portal (as a side note: This portal is one of the worst corporate "support" websites I've seen in the last decade).</p><p>This is terrible. It will lead to tens of thousands of VMware installations remaining vulnerable to trivially exploitable flaws, for example, local privilege escalation via CVE-2025-41244 <a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36149" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.broadcom.com/web/ecx/s</span><span class="invisible">upport-content-notification/-/external/content/SecurityAdvisories/0/36149</span></a></p><p>BTW, Please note that to fix CVE-2025-41244 you must now manually download the correct VMware Tools package from the support portal, unpack the zip, mount the ISO image, and then execute the setup.exe from the mounted ISO image. There is currently no VMware releases that include the fixed VMware Tools, so if you create any new VMs you MUST install the update manually to each new VM. Did I already mention this is terrible?</p><p><a href="https://infosec.exchange/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enshittification</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Renée Burton<p>I recently discovered that rich assholes may have intimidated a security company into taking down excellent research they wrote three years ago.</p><p>There are far too many rich assholes attempting to intimidate people these days. Fuck all these guys.</p><p>And don't forget to archive shit in many locations.. locally. Archive.org. archive.today.. email it to others.. rewriting history is bad.</p><p>You should read this excellent paper. I don't know the researchers but it is good work..</p><p>Please boost for awareness of this great work and scare tactics </p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> </p><p><a href="https://web.archive.org/web/20250731051150/https://www.cyjax.com/wp-content/uploads/2022/11/Fangxiao-a-Chinese-threat-actor.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025073105</span><span class="invisible">1150/https://www.cyjax.com/wp-content/uploads/2022/11/Fangxiao-a-Chinese-threat-actor.pdf</span></a></p>
jk<p>für <a href="https://chaos.social/tags/grundschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grundschutz</span></a>-fans gibt es den grundschutz++ (beta) auf github [1]. das json-file [2] lässt sich dann bequem im <a href="https://chaos.social/tags/oscal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oscal</span></a>-viewer [3] lesen.</p><p>1- <a href="https://github.com/BSI-Bund/Stand-der-Technik-Bibliothek/tree/main/Kompendien/Grundschutz%2B%2B-Kompendium" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/BSI-Bund/Stand-der-</span><span class="invisible">Technik-Bibliothek/tree/main/Kompendien/Grundschutz%2B%2B-Kompendium</span></a></p><p>2- <a href="https://raw.githubusercontent.com/BSI-Bund/Stand-der-Technik-Bibliothek/refs/heads/main/Kompendien/Grundschutz%2B%2B-Kompendium/Grundschutz%2B%2B-Kompendium.json" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">raw.githubusercontent.com/BSI-</span><span class="invisible">Bund/Stand-der-Technik-Bibliothek/refs/heads/main/Kompendien/Grundschutz%2B%2B-Kompendium/Grundschutz%2B%2B-Kompendium.json</span></a></p><p>3- <a href="https://viewer.oscal.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">viewer.oscal.io</span><span class="invisible"></span></a><br><a href="https://chaos.social/tags/servicetoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>servicetoot</span></a> <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Klaus Frank<p><span class="h-card" translate="no"><a href="https://gruene.social/@maddin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maddin</span></a></span> </p><p>I mainly asked here because I'd be surprised if nobody within the <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> community so far looked into all of the possible ways to persist data on it across a factory reset so far.</p><p>I really do not just want to wipe the entire disk with "dd if=/dev/zero" without knowing if the recovery environment it boots into is also on said disk (or how to boot into one with its disk zeroed out).</p><p>Otherwise I'll stick with <a href="https://support.apple.com/de-de/guide/mac-help/mchl7676b710/26/mac/26" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.apple.com/de-de/guide/</span><span class="invisible">mac-help/mchl7676b710/26/mac/26</span></a> but I don't know if anything could survive that...</p>
Martin Schlüter 🌻<p><span class="h-card" translate="no"><a href="https://chaos.social/@agowa338" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>agowa338</span></a></span> </p><p>I'm not an <a href="https://gruene.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> expert, however my understanding is that with FileVault enabled (which is the default) all user data partitions are encrypted anyways. </p><p>With resetting the whole system the old keys should be deleted and a new encrypted partition is created. </p><p>Given that I see no need to wipe/clean partitions with zeros.</p><p><a href="https://gruene.social/tags/macos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macos</span></a></p>
Klaus Frank<p><span class="h-card" translate="no"><a href="https://gruene.social/@maddin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maddin</span></a></span> </p><p>Yea, but I was intentionally asking <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> people to ensure there aren't any known sneaky ways of persisting data.</p><p>And on intel macs you quite literally could just "dd if=/dev/zero of=/dev/nvme...." to wipe it clean. That also doesn't appear to work with apple silicon macbooks. And before I try it and irrecoverably brick it that way I just wanted to ask others for how to securely wipe and reinstall.</p>
Klaus Frank<p>If you're reinstalling a macbook and want to avoid any and all persistence.</p><p>Is there one partition that you absolutely do NOT want to wipe?</p><p>Or can you (still) just wipe the entire internal disk clean and use the net-install/recovery for reinstalling a clean system regardless of what one may have done previously on it (in software, not talking hardware tampering or anything like that)?</p><p>It's a M1 mac, people are saying something is different there than on intel macs.</p><p><a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://chaos.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a></p>
Nightfighter 🛡️<p>Shodan.io<br>ASN: AS3320<br>Country: DE</p><p><a href="https://social.tchncs.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://social.tchncs.de/tags/datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datenschutz</span></a></p>
Nightfighter 🛡️<p>Shodan.io<br>ASN: AS3320<br>Country: DE</p><p><a href="https://social.tchncs.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://social.tchncs.de/tags/datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datenschutz</span></a></p>
Neil Craig<p>We're seeing requests to www.bbc.com return to normal-looking levels from Afghanistan - since about midday UTC today (1st Oct 2025).</p><p><a href="https://mastodon.social/tags/Afghanistan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Afghanistan</span></a> <a href="https://mastodon.social/tags/Censorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Censorship</span></a> <a href="https://mastodon.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebDev</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Taliban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Taliban</span></a></p>
Ge0rG<p>Security is like fashion. Old trends come back periodically.</p><p>Exhibit A: "security" appliance vendors suffering from ../../ exploits in 2025</p><p>Exhibit B: <a href="https://wiretap.fail/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">wiretap.fail/</span><span class="invisible"></span></a> is just <span class="h-card" translate="no"><a href="https://social.treehouse.systems/@bunnie" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bunnie</span></a></span> 's 2002 sniffing of HyperTransport on the first Xbox - <a href="https://www.bunniestudios.com/bunnie/proj/anatak/AIM-2002-008.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bunniestudios.com/bunnie/proj/</span><span class="invisible">anatak/AIM-2002-008.pdf</span></a></p><p><a href="https://chaos.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://chaos.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://chaos.social/tags/WiretapFail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiretapFail</span></a></p>
ManiabelChris<p>Die CISA hat eine dringende Warnung zu einer <strong>kritischen Sicherheitslücke im Linux- und Unix-Dienstprogramm sudo (CVE-2025-32463)</strong> herausgegeben, die derzeit in großem Umfang ausgenutzt wird.</p><p>Diese Schwachstelle ermöglicht es lokalen Angreifern, Zugriffskontrollen zu umgehen und beliebige Befehle als Root-Benutzer auszuführen, auch ohne über explizite sudoers-Rechte zu verfügen.</p><p>Prüfen, welche sudo-Variante installiert ist:</p><p><em>dpkg -l sudo</em></p><p>Betroffen sind Sudo-Versionen vor 1.9.14p2.</p><p>Update anschieben, wenn vor 1.9.14p2!</p><p>Bis dahin: PC nicht in fremde Hände geben!</p><p><a href="https://cybersecuritynews.com/cisa-linux-sudo-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/cisa-lin</span><span class="invisible">ux-sudo-vulnerability/</span></a></p><p><a href="https://mastodon.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.de/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.de/tags/SudoPrivileges" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SudoPrivileges</span></a> <a href="https://mastodon.de/tags/BeDiS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BeDiS</span></a></p>
ManiabelChris<p>Es steht eine wichtige Entscheidung auf EU-Ebene zur <strong>Chatkontrolle</strong> an und die Haltung des <span class="h-card" translate="no"><a href="https://social.bund.de/@BMDS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BMDS</span></a></span> bleibt im Dunkeln? Transparenz wäre wünschenswert. <br>Bitterschade.</p><p><span class="h-card" translate="no"><a href="https://chaos.social/@netzpolitik_feed" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>netzpolitik_feed</span></a></span> <a href="https://netzpolitik.org/2025/chatkontrolle-der-digitalminister-duckt-sich-weg/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpolitik.org/2025/chatkontr</span><span class="invisible">olle-der-digitalminister-duckt-sich-weg/</span></a></p><p><a href="https://mastodon.de/tags/chatkontrolle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatkontrolle</span></a> <a href="https://mastodon.de/tags/NoEuChatControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoEuChatControl</span></a> <a href="https://mastodon.de/tags/ChatKontrol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatKontrol</span></a> <a href="https://mastodon.de/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://mastodon.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p>Edit: @BMDS-Handle korrigiert.</p>