𝓻𝓻𝓪<p>Two recent reminders why the fediverse is very vulnerable to state surveillance.</p><p>First a new article from <span class="h-card" translate="no"><a href="https://mastodon.social/@404mediaco" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>404mediaco</span></a></span> about surveillance contractors monitoring social media for <a href="https://post.lurk.org/tags/ICE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICE</span></a> <a href="https://www.404media.co/the-200-sites-an-ice-surveillance-contractor-is-monitoring/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/the-200-sites-an-i</span><span class="invisible">ce-surveillance-contractor-is-monitoring/</span></a></p><p>Second a research article on how fediverse presents both challenges and opportunities for state surveillance through an analysis of <a href="https://post.lurk.org/tags/BlueLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueLeaks</span></a> by <span class="h-card" translate="no"><a href="https://sciences.social/@Fassbender" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Fassbender</span></a></span></p><p>Keeping Watch Over the Fediverse: Mass Surveillance in Non-Centralized Social Media</p><p>"Non-centralized social media appears to be undergoing a “Killer Hype Cycle”, where many users dissatisfied with centralized corporate platforms are identifying Mastodon as an alternative. With the influx of users there has been an increase in available data for researchers of social media and communication. Much of this work has focused on the everyday end user: someone who is using the platform to share personal information or consume media. However, these platforms have other uses. Corporations seek to mine federated media for their own endeavors, and state agents catalog the information for various<br>uses."</p><p><a href="http://deeplyhacked.com/research/files/blueleaks.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">deeplyhacked.com/research/file</span><span class="invisible">s/blueleaks.pdf</span></a> </p><p><a href="https://post.lurk.org/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediverse</span></a> <a href="https://post.lurk.org/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> <a href="https://post.lurk.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>