Your own webdav server and "Simple Notes Sync". I like.
https://f-droid.org/packages/dev.dettmer.simplenotes/
#selfhosting #selfhosted #webdav #sync #notes #cloud #fdroid
#Tag
Your own webdav server and "Simple Notes Sync". I like.
https://f-droid.org/packages/dev.dettmer.simplenotes/
#selfhosting #selfhosted #webdav #sync #notes #cloud #fdroid
Your own webdav server and "Simple Notes Sync". I like.
https://f-droid.org/packages/dev.dettmer.simplenotes/
#selfhosting #selfhosted #webdav #sync #notes #cloud #fdroid
@paulfoerster Microsoft unterscheidet sich da übrigens nur marginal von Apple. Solange man beim Mac nicht ADP aktiviert hat, sind für Apple alle Daten der Cloud über den bei Apple hinterlegten Key abrufbar. Und selbst wenn ADP aktiviert ist, sind Kontakte, Mails und Kalender immer noch nur über den Schlüssel in der Cloud abrufbar. #apple #Sicherheit #cloud
Ich hoffe, hierzulande ist man clever genug, die Schlüssel selber zu hosten, statt sie an #Microsoft zu liefern, so man denn schon zwanghaft #Windows benutzen muss.
@paulfoerster Microsoft unterscheidet sich da übrigens nur marginal von Apple. Solange man beim Mac nicht ADP aktiviert hat, sind für Apple alle Daten der Cloud über den bei Apple hinterlegten Key abrufbar. Und selbst wenn ADP aktiviert ist, sind Kontakte, Mails und Kalender immer noch nur über den Schlüssel in der Cloud abrufbar. #apple #Sicherheit #cloud
I use 1984.hosting to host my personal project. It is a privacy-oriented, European cloud provider.
And it has just joined https://privacyregistry.eu/tools/1984-hosting
#buildinpublic #cloud #europe #privacy #indiedev #hosting #selfhosting
I use 1984.hosting to host my personal project. It is a privacy-oriented, European cloud provider.
And it has just joined https://privacyregistry.eu/tools/1984-hosting
#buildinpublic #cloud #europe #privacy #indiedev #hosting #selfhosting
MacSync Stealer Returns: SEO Poisoning and Fake GitHub Repositories Target macOS Users
An active infostealer campaign is targeting macOS and Windows users across various sectors. The threat actors are using SEO poisoning to direct victims to fake GitHub repositories impersonating legitimate tools like PagerDuty. The campaign involves over 20 malicious repositories active since September 2025. The attack flow begins with a Google search, leading to a fraudulent GitHub repository, then to a GitHub Pages site with a deceptive command. This command deploys the MacSync stealer in three stages: a loader, a dropper, and the final payload. MacSync aggressively harvests credentials from browsers, cloud services, and cryptocurrency wallets. The campaign's scale includes 39 identified malicious repositories, with 24 still active as of January 2026. Evasion tactics include using 'readme-only' repositories and distributed identities.
Pulse ID: 69772ba9dd9a67872ce009f7
Pulse Link: https://otx.alienvault.com/pulse/69772ba9dd9a67872ce009f7
Pulse Author: AlienVault
Created: 2026-01-26 08:54:01
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #GitHub #Google #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #SEOPoisoning #Windows #bot #cryptocurrency #AlienVault
MacSync Stealer Returns: SEO Poisoning and Fake GitHub Repositories Target macOS Users
An active infostealer campaign is targeting macOS and Windows users across various sectors. The threat actors are using SEO poisoning to direct victims to fake GitHub repositories impersonating legitimate tools like PagerDuty. The campaign involves over 20 malicious repositories active since September 2025. The attack flow begins with a Google search, leading to a fraudulent GitHub repository, then to a GitHub Pages site with a deceptive command. This command deploys the MacSync stealer in three stages: a loader, a dropper, and the final payload. MacSync aggressively harvests credentials from browsers, cloud services, and cryptocurrency wallets. The campaign's scale includes 39 identified malicious repositories, with 24 still active as of January 2026. Evasion tactics include using 'readme-only' repositories and distributed identities.
Pulse ID: 69772ba9dd9a67872ce009f7
Pulse Link: https://otx.alienvault.com/pulse/69772ba9dd9a67872ce009f7
Pulse Author: AlienVault
Created: 2026-01-26 08:54:01
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #GitHub #Google #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #SEOPoisoning #Windows #bot #cryptocurrency #AlienVault
Heyho :),
does anyone have advice about #Cloud #Backups for #TrueNAS #Storage? I don’t have any experience with cloud computing so far, but I researched #AWS #S3 Buckets seem to be the go-to. I want that the #Backup Solution to be easy to integrate into #TrueNAS and hosted by a European Provider. Anything else to keep in mind? Thanks for help :)
#Selfhosted #Selfhosting #NAS #Hosting
Heyho :),
does anyone have advice about #Cloud #Backups for #TrueNAS #Storage? I don’t have any experience with cloud computing so far, but I researched #AWS #S3 Buckets seem to be the go-to. I want that the #Backup Solution to be easy to integrate into #TrueNAS and hosted by a European Provider. Anything else to keep in mind? Thanks for help :)
#Selfhosted #Selfhosting #NAS #Hosting
More teams are demicrosofting file storage — reducing reliance on OneDrive in favor of privacy-first alternatives.
Tresorit offers zero-knowledge, end-to-end encrypted cloud storage.
Nextcloud enables self-hosting for full infrastructure control.
Tuta Drive (in development) aims to bring encrypted storage to the Tuta ecosystem.
This isn’t anti-Microsoft — it’s data minimization and sovereignty.
More teams are demicrosofting file storage — reducing reliance on OneDrive in favor of privacy-first alternatives.
Tresorit offers zero-knowledge, end-to-end encrypted cloud storage.
Nextcloud enables self-hosting for full infrastructure control.
Tuta Drive (in development) aims to bring encrypted storage to the Tuta ecosystem.
This isn’t anti-Microsoft — it’s data minimization and sovereignty.
Inside MacSync's Script-Driven Stealer and Hardware Wallet App Trojanization
MacSync is a sophisticated macOS infostealer that targets cryptocurrency users. It is delivered through a phishing lure disguised as a cloud storage installer, tricking users into executing a malicious Terminal command. The malware employs a multi-stage infection process, using a script-based approach to harvest browser credentials, cryptocurrency wallet data, and sensitive files. A key feature of MacSync is its ability to trojanize popular Electron-based cryptocurrency applications like Ledger and Trezor, enabling long-term phishing and data exfiltration. The malware's infrastructure includes multiple rotating C2 domains and clone sites, indicating an ongoing and evolving campaign. MacSync's focus on cryptocurrency-related data and its stealthy, script-based execution make it particularly dangerous for macOS users in the crypto community.
Pulse ID: 69711eea5249f136051acf6c
Pulse Link: https://otx.alienvault.com/pulse/69711eea5249f136051acf6c
Pulse Author: AlienVault
Created: 2026-01-21 18:46:01
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Edge #InfoSec #InfoStealer #Mac #MacOS #Malware #OTX #OpenThreatExchange #Phishing #RAT #Trojan #bot #cryptocurrency #AlienVault
Inside MacSync's Script-Driven Stealer and Hardware Wallet App Trojanization
MacSync is a sophisticated macOS infostealer that targets cryptocurrency users. It is delivered through a phishing lure disguised as a cloud storage installer, tricking users into executing a malicious Terminal command. The malware employs a multi-stage infection process, using a script-based approach to harvest browser credentials, cryptocurrency wallet data, and sensitive files. A key feature of MacSync is its ability to trojanize popular Electron-based cryptocurrency applications like Ledger and Trezor, enabling long-term phishing and data exfiltration. The malware's infrastructure includes multiple rotating C2 domains and clone sites, indicating an ongoing and evolving campaign. MacSync's focus on cryptocurrency-related data and its stealthy, script-based execution make it particularly dangerous for macOS users in the crypto community.
Pulse ID: 69711eea5249f136051acf6c
Pulse Link: https://otx.alienvault.com/pulse/69711eea5249f136051acf6c
Pulse Author: AlienVault
Created: 2026-01-21 18:46:01
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Edge #InfoSec #InfoStealer #Mac #MacOS #Malware #OTX #OpenThreatExchange #Phishing #RAT #Trojan #bot #cryptocurrency #AlienVault
Messageries et réseaux sociaux : respect de la vie privée ? (2025)
https://www.informassue.tuxfamily.org/pages/technologies_surveillance.php#messageries_reseaux_sociaux
Voici quelques infos regroupées, sur des réseaux sociaux et messageries des plus connus. La situation #politique des #USA est une incitation de plus à cette prise de conscience...
#Informassue #Messageries #RéseauSocial #RéseauxSociaux #ViePrivée #Privacy #GAFAM #Whatsapp #Telegram #Signal #Facebook #Meta #Instagram #Snapchat #LinkedIn #TikTok #Alternatives #Libre #LogicielLibre
Rappel : depuis janvier 2025, il est fortement conseillé de rapatrier ses #données en Europe, en France, ou sur un disque dur chez soi.
Les garder uniquement sur un #cloud américain est très dangereux, le risque devient grand de ne plus y avoir accès.
Sans parler des problèmes de protection de la #ViePrivée...
https://mamot.fr/@Informassue/113939597592858333
#GAFAM #TikTok #Instagram #Google #Apple #iPhone #iCloud #Whatsapp #Facebook
This is a forward thinking server running the Bonfire social media platform.
LGBTQA+ and BPOC friendly.