Category: Cybersecurity
-

Poly.app AI File Browser – Privacy Analysis (2025)
Summary Poly.app markets itself as an “intelligent file browser”, or more specifically “intelligent cloud file browser” that lets you store, browse, research and organize your personal files and media with AI, across web and desktop (Poly App). Recent announcements show Poly emerging from stealth with $8M in seed funding, led by Felicis with participation from…
-

Meta’s Smart Glasses: Mods Break Privacy Light, Harassment Goes Viral
Serious flaws in the privacy and real-world application of Meta’s Ray-Ban smart glasses are coming to light, raising new alarms over the technology’s potential for abuse. A high-quality $60 modification, offered by a hobbyist, permanently disables the glasses’ primary privacy feature, the small LED recording light. This comes as a separate, disturbing trend on social…
-

“Cancel the Hate” app leaked user data
What is this app? “Cancel the Hate” was an app tied to a website that invited people to submit reports about individuals accused of criticizing activist Charlie Kirk. According to Straight Arrow News, it launched shortly after the Sept. 10 shooting of Kirk and asked users to provide names, locations, and employers of alleged offenders.…
-

What is Redact? Is it Safe? Is it Legit? Let’s Dive In!
Redact.dev – Company Overview, FAQs, and How It Works People often find Redact when they’re ready to clean up their social media footprint and start taking their privacy seriously. To do this, they need a tool they can trust. This page gives a straight, verifiable overview of Redact.dev, how it functions, what data it does…
-

The 15 Most Infamous Streamer/Influencer Doxxings
Doxxing turned into a distinct and dangerous tool in online culture because creators often publish a lot of personal information to build a fanbase. That public footprint makes it easier for bad actors to locate and weaponize phone numbers, addresses, or private images. When an influencer is doxxed the result can be persistent harassment, swatting,…
-

70,000+ Government IDs Leaked in Discord x Zendesk Breach
Story summary: Customer support data tied to Discord was exposed after a Zendesk vendor account was compromised. Leaked items include uploaded documents and attachments, including government ID images for account appeals. Impact review is ongoing while Discord contacts affected users and rotate internal credentials. What’s next? Watch for official notices sent to your account email…
-

Imgur is no longer accessible in the UK
—
by
As of 30 September 2025, Imgur has blocked access from the United Kingdom. If you are in the UK you cannot log in, browse, or upload. Imgur images embedded on other websites will not display for UK visitors. Why did Imgur block the UK? Imgur did not publish a legal memo alongside the block, only…
-

Australia’s Under-16 Social Media Ban
Australia is rolling out a national rule that blocks under-16s from using mainstream social platforms starting in December, called the Online Safety Amendment Bill & targeting the Online Safety Act, legislated in 2021. The law passed in November 2024 and is being watched globally, with leaders in New York praising Australia’s approach during UN events,…
-

How to Delete All Your Tweets / X Posts
Cleaning up your Twitter history can be essential for maintaining your privacy and presenting your best self online. Here’s a detailed guide to help you delete all your tweets efficiently. The process for this is a little different depending on how many tweets you have. If you have over 1k tweets to delete, use step…
-

How To Bulk Unfollow Twitter/X Accounts
Getting a clean start on Twitter is not only about old posts. Resetting your followed accounts can refresh your online presence. Redact gives you precise control so you decide how far to go. Your follower list shapes more than your timeline. The people who you follow help the platform categorize your account, build lookalike audiences,…
