In addition to being uncertain, the Doge website leans heavily on X, the social media platform owned by Musk. Doge’s homepage is a feed of its own X -posts, but it also uses code that targets search engines to x.com instead of Doge.gov, a wired overview of the website found. “This is usually not how things are handled, and it indicates that the X account takes precedence over the actual website itself,” one developer told Wired.
The Chinese Tiktok Alternative Rednotes contracted about 700,000 US users and ended US influencers when the ban on Tiktok sustained in January. Although many of these people may have only used red notes for a few days, a new analysis of the Citizen Lab of the University of Toronto emphasized how a lack of coding US users could open to “supervision by any government or ISP [Internet Service Provider]And not just the Chinese government. “
The analysis of red notes has found a number of network security issues in both Android and iOS apps. Red notes made images and videos using HTTP connections, not the industry standard and encrypted https; Some versions of the app contain a vulnerability that enables an attacker to read permission on a phone; and it “insufficiently encrypted metadata from devices.” The defects were contained in Rednote’s app and several third-party software libraries he uses. Citizen Lab reported the issues to the companies starting in November 2024, but has not heard from them yet.
The security researchers say that the vulnerabilities can oversee all users, including those in China. “Since the Chinese government may already have mechanisms to obtain legally detailed data from red notes about their users, the issues we have found also make Chinese users especially vulnerable to supervised by non-China governments,” the research states.
This underlines that in China, even widely used programs do not meet the same safety standards as those developed outside the country. “Applications that are popular in China often do not use any coding, own coding protocols, or use TLS without certificate valuation to encrypt sensitive data,” the analysis reads.
Over the past two weeks, US spying aircraft have flown at least 18 missions around the Mexico border, the analysis of CNN has shown. The flights are a ‘dramatic escalation in activity’, reports the publication, and because the Trump administration has named drug cartels as terrorist organizations and the country’s security apparatus to deport millions of migrants. According to CNN, various military aircraft, including Navy P-8s and a U-2 spying aircraft, were used in the operations and are able to collect footage and signals’ intelligence. Also this week, US immigration and customs handling has advertised new contracts that would enable it to monitor ‘negative’ social media posts people make about it.
Last month, the British government hit Apple with a secret order demanding that the company create a way to access data stored in encrypted iCloud backup. The order, a notice of technical capabilities and issued under the UK’s controversial 2016 Supply Act, was reported by the Washington Post last week. Since then, there has been a growing setback against the claims of the British government, with many emphasizing how a change would affect the safety of millions around the world.
US Senator Ron Wygen and representative Andy Biggs sent a letter to Tulsi Gabbard, the new director of National Intelligence, stating that the order undermined the US and the United Kingdom trust. ‘If the UK does not turn this dangerous effort immediately, we urge you to re-evaluate the arrangement and programs of US-UK-Cup security, as well as the US intelligence sharing with the UK,’ the couple said with Comparisons with the Chinese linked salt typhoon heels from US telecommunications companies that use a “back door”. As details about the order emerged, Human Rights Watch called it a ‘alarming overreaction’, while 109 organizations, companies and other civil society groups signed an open letter in which the ‘claim the safety and privacy of jeopardizing millions. ‘