Discussion
Loading...

#Tag

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
#selfhosting
#selfhosting boosted
BiyteLüm
@biytelum@mastodon.social  ·  activity timestamp 2 days ago

More teams are demicrosofting file storage — reducing reliance on OneDrive in favor of privacy-first alternatives.

Tresorit offers zero-knowledge, end-to-end encrypted cloud storage.
Nextcloud enables self-hosting for full infrastructure control.
Tuta Drive (in development) aims to bring encrypted storage to the Tuta ecosystem.

This isn’t anti-Microsoft — it’s data minimization and sovereignty.

#privacy #cloud #dataprotection #selfhosting

  • Copy link
  • Flag this post
  • Block
BiyteLüm
@biytelum@mastodon.social  ·  activity timestamp 2 days ago

More teams are demicrosofting file storage — reducing reliance on OneDrive in favor of privacy-first alternatives.

Tresorit offers zero-knowledge, end-to-end encrypted cloud storage.
Nextcloud enables self-hosting for full infrastructure control.
Tuta Drive (in development) aims to bring encrypted storage to the Tuta ecosystem.

This isn’t anti-Microsoft — it’s data minimization and sovereignty.

#privacy #cloud #dataprotection #selfhosting

  • Copy link
  • Flag this post
  • Block
#selfhosting
#selfhosting boosted
Kevin Karhan :verified:
@kkarhan@infosec.space  ·  activity timestamp 4 days ago

@poleguy @jannem @argv_minus_one Showcase them how #JitsiMeet, #WebCall and espechally #NextcloudTalk are superior products which work way better and save them a shitton if cost, don't require client-side installations and can comply with any arbitrary #dataprotection and confidentiality demands if #SelfHosted inhouse!

  • Copy link
  • Flag this post
  • Block
Kevin Karhan :verified:
@kkarhan@infosec.space  ·  activity timestamp 4 days ago

@poleguy @jannem @argv_minus_one Showcase them how #JitsiMeet, #WebCall and espechally #NextcloudTalk are superior products which work way better and save them a shitton if cost, don't require client-side installations and can comply with any arbitrary #dataprotection and confidentiality demands if #SelfHosted inhouse!

  • Copy link
  • Flag this post
  • Block
Apple-feed
Apple-feed boosted
versBBpig
@versbbpig@qaf.men  ·  activity timestamp 6 days ago

And now for something completely different: If you’re using a Mac and are interested in opening files of dubious origin and content, this article might be interesting for you.

https://eclecticlight.co/2026/01/12/how-to-open-a-suspicious-document-or-app/

#cybersecurity #dataprotection #malware #macos #appple #dangerzone #viables

The Eclectic Light Company

How to open a suspicious document or app

What can you do to protect your Mac when a stranger asks you to take a look at a document or app? Two alternatives for doing this is safety, rather than risk being victim to a phishing attack.
  • Copy link
  • Flag this post
  • Block
versBBpig
@versbbpig@qaf.men  ·  activity timestamp 6 days ago

And now for something completely different: If you’re using a Mac and are interested in opening files of dubious origin and content, this article might be interesting for you.

https://eclecticlight.co/2026/01/12/how-to-open-a-suspicious-document-or-app/

#cybersecurity #dataprotection #malware #macos #appple #dangerzone #viables

The Eclectic Light Company

How to open a suspicious document or app

What can you do to protect your Mac when a stranger asks you to take a look at a document or app? Two alternatives for doing this is safety, rather than risk being victim to a phishing attack.
  • Copy link
  • Flag this post
  • Block
Apple-feed
Apple-feed boosted
versBBpig
@versbbpig.bsky.social@bsky.brid.gy  ·  activity timestamp 6 days ago

And now for something completely different: If you’re using a Mac and are interested in opening files of dubious origin and content, this article might be interesting for you. eclecticlight.co/2026/01/12/h... #cybersecurity #dataprotection #malware #macos #appple #dangerzone #viables

How to open a suspicious docum...

The Eclectic Light Company

How to open a suspicious document or app

What can you do to protect your Mac when a stranger asks you to take a look at a document or app? Two alternatives for doing this is safety, rather than risk being victim to a phishing attack.
  • Copy link
  • Flag this post
  • Block
versBBpig
@versbbpig.bsky.social@bsky.brid.gy  ·  activity timestamp 6 days ago

And now for something completely different: If you’re using a Mac and are interested in opening files of dubious origin and content, this article might be interesting for you. eclecticlight.co/2026/01/12/h... #cybersecurity #dataprotection #malware #macos #appple #dangerzone #viables

How to open a suspicious docum...

The Eclectic Light Company

How to open a suspicious document or app

What can you do to protect your Mac when a stranger asks you to take a look at a document or app? Two alternatives for doing this is safety, rather than risk being victim to a phishing attack.
  • Copy link
  • Flag this post
  • Block
Log in

Encryptr.net Social

This is a forward thinking server running the Bonfire social media platform.

LGBTQA+ and BPOC friendly.

Encryptr.net Social: About · Code of conduct · Privacy ·
Encryptr.net social · 1.0.0-rc.3.6 no JS en
Automatic federation enabled
  • Explore
  • About
  • Code of Conduct
Home
Login