Consider all the small business defense contractors who are held to the letter of the most minute security compliance requirements. They have to somehow meet everything, with very limited resources.<p>And then at the top of government, the most sensitive information is frequently handled without any care at all. Not to mention 19-year olds with flash drives barging into the most sensitive IT systems of the federal government.<p><i>Slight</i> imbalance there, I would say.
It kinda gets buried under the utter incompetence of these clowns but why are we even bombing Yemen? How is it acceptable to brazenly destroying other countries’ civil infrastructure? It’s a US president’s pastime activity since Obama
I remember in the one UX design class I took how they stressed the apocryphal "your grandmother is using this app" which in hindsight is sadly asking too much, apparently the bar should have been lower at "the secretary of defense is trying to start a group chat and not leak national security secrets".
Staying optimistic:<p>"Exclusive: The White House is looking to replace Pete Hegseth as defense secretary"<p><a href="https://www.npr.org/2025/04/21/nx-s1-5371312/trump-white-house-pete-hegseth-defense-department" rel="nofollow">https://www.npr.org/2025/04/21/nx-s1-5371312/trump-white-hou...</a>
I'm surprised no one here has mentioned that the government's cyber security agency CISA recommends the use of Signal, as of December 2024:<p>> Apply these best practices to your devices and online accounts.<p>> 1. Use only end-to-end encrypted communications.<p>> Adopt a free messaging application for secure communications that guarantees end-to-end
encryption, such as Signal or similar apps.<p><a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf" rel="nofollow">https://www.cisa.gov/sites/default/files/2024-12/guidance-mo...</a>