The "Halvening" is upon us. Starting tonight, Bitcoin cut its reward for completing a block in half, from 12.5 #BTC to 6.25. The last time this happened in 2016, it was a prelude to a leap in value. Continue reading to learn how to buy and secure Bitcoin. #BitcoinHalving2020
Bitcoin was created in 2009, but many people still do not understand the original cryptocurrency. We offer a practical explanation of what Bitcoin is, as well as where to buy it and how to store it: protonmail.com/blog/how-to-bu…
There are countless examples of cryptocurrency exchanges being hacked and Bitcoin being stolen. We explain what you can do to take your Bitcoin security into your own hands. protonmail.com/blog/how-to-ke…
It is also possible to pay for ProtonMail with #Bitcoin. Details can be found in our guide here: protonmail.com/support/knowle… Proton accumulated BTC early, giving us financial strength over the years, and we continue to hodl BTC for diversification purposes.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Our research into the #cybersecurity practices of #politicians around the world continues with Italy and Spain. Working alongside Constella Intelligence, we’ve found out how they stack up against other European politicians.
⬇️1/5
Spain 🇪🇸
Spanish politicians outperformed all other countries researched, with just 6.3% of politicians having data exposed. This included 9 plaintext passwords and 39 emails identified in leaks.
⬇️2/5
Italy 🇮🇹
Italy had a 14.9% exposure rate with 73 members of Assembly and 18 members of the Senate exposed. In total 195 passwords, 188 of them in plaintext, and 91 emails were leaked.
After the unexpected mention in last night's @joerogan podcast, people are wondering if Google is still suppressing Proton.
It's complicated, but probably.
Here's a bit more info. 🧵
1/7 Being suppressed in Google search is often fatal and Proton experienced a serious incident in 2015 (since then resolved, and no, we did not sue Google):
Google’s #DMA compliance plan is a sham, and here’s why.
⬇️ 1/6
What is the DMA?
Under the new European Union’s Digital Markets Act #DMA, the practice of ‘tying and bundling’ is now prohibited, meaning @Google must stop preferencing its own key services on @Android.
⬇️ 2/6
Dark patterns push you to use a Google Identity
If you don't have a Google Account, you will need to create one to sign in to your Android smartphone. Using dark patterns, #Google makes it very hard to use outside emails to create an account on #Android.
New research conducted by Proton, in partnership with @ConstellaIntel shows that hundreds of political figures in the UK, France, and the EU have had their personal details leaked on the dark web.
Just one data breach could be a national security issue, so exactly how serious is a leak of this scale?
Read this thread for details.
⬇️1/7
UK Parliament 🇬🇧
The UK was hit hardest with 68%, or 443 MPs in the House of Commons having their details exposed on the dark web. 216 passwords in plain text and 2110 emails were leaked.
⬇️2/7
French Parliament 🇫🇷
France had a 18% exposure rate with the majority of the exposed. In the Senate, 33% of senators’ emails were exposed, compared to 9% of deputies' emails in the National Assembly.
Your online activities create a trail, known as a #digitalfootprint, which can be used to track you.
Learn how to avoid leaving one and how to make it work for your benefit.
⬇️1/6
Defining your digital footprint
A #digitalfootprint is created by online activity, leaving behind a visible mark of your presence. Browsing, logging in, and clicking links are all recorded in some way.
⬇️2/6
Types of data collection
Active data is gathered when you sign up for something or make a purchase online.
Passive data is collected by #trackers and could be linked to your personal identifier like email or IP address.