Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
45.61 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.06 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
App\Entity\Entry {#2419
  +user: Proxies\__CG__\App\Entity\User {#1970 …}
  +magazine: App\Entity\Magazine {#265
    +icon: Proxies\__CG__\App\Entity\Image {#246 …}
    +name: "privacy@lemmy.ml"
    +title: "privacy"
    +description: """
      A place to discuss privacy and freedom in the digital world.\n
      ============================================================\n
      \n
      Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
      \n
      In this community everyone is welcome to post links and discuss topics related to privacy.\n
      \n
      ### Some Rules\n
      \n
      - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
      - Don’t promote proprietary software\n
      - Try to keep things on topic\n
      - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
      - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
      - Be nice :)\n
      \n
      ### Related communities\n
      \n
      - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
      - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
      - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
      - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
      \n
      ### Chat rooms\n
      \n
      - [Matrix/Element]Dead\n
      - [Discord](https://discord.gg/8xfrVjvngh)\n
      \n
      much thanks to @gary_host_laptop for the logo design :)
      """
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 561
    +entryCommentCount: 7684
    +postCount: 6
    +postCommentCount: 73
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1729582580 {#275
      date: 2024-10-22 09:36:20.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#237 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
    +entries: Doctrine\ORM\PersistentCollection {#180 …}
    +posts: Doctrine\ORM\PersistentCollection {#138 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
    +bans: Doctrine\ORM\PersistentCollection {#117 …}
    +reports: Doctrine\ORM\PersistentCollection {#103 …}
    +badges: Doctrine\ORM\PersistentCollection {#81 …}
    +logs: Doctrine\ORM\PersistentCollection {#71 …}
    +awards: Doctrine\ORM\PersistentCollection {#1346 …}
    +categories: Doctrine\ORM\PersistentCollection {#1823 …}
    -id: 85
    +apId: "privacy@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/privacy"
    +apPublicUrl: "https://lemmy.ml/c/privacy"
    +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "privacy"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1729583592 {#269
      date: 2024-10-22 09:53:12.0 +02:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1699780272 {#271
      date: 2023-11-12 10:11:12.0 +01:00
    }
  }
  +image: Proxies\__CG__\App\Entity\Image {#1943 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
  +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
  +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
  +body: """
    cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
    \n
    > Full text from the Electronic Frontier Foundation (EFF) article:\n
    > \n
    > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
    > \n
    > By Matthew Guariglia and Eva Galperin\n
    > \n
    > ~3 minutes\n
    > \n
    > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
    > \n
    > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
    > \n
    > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
    > \n
    > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 3
  +favouriteCount: 99
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1727359314 {#2414
    date: 2024-09-26 16:01:54.0 +02:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1866 …}
  +votes: Doctrine\ORM\PersistentCollection {#1966 …}
  +reports: Doctrine\ORM\PersistentCollection {#1946 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
  +badges: Doctrine\ORM\PersistentCollection {#2439 …}
  +children: []
  -id: 32104
  -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
  -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705913408
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/10984539"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705827008 {#1793
    date: 2024-01-21 09:50:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
App\Entity\Entry {#2419
  +user: Proxies\__CG__\App\Entity\User {#1970 …}
  +magazine: App\Entity\Magazine {#265
    +icon: Proxies\__CG__\App\Entity\Image {#246 …}
    +name: "privacy@lemmy.ml"
    +title: "privacy"
    +description: """
      A place to discuss privacy and freedom in the digital world.\n
      ============================================================\n
      \n
      Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
      \n
      In this community everyone is welcome to post links and discuss topics related to privacy.\n
      \n
      ### Some Rules\n
      \n
      - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
      - Don’t promote proprietary software\n
      - Try to keep things on topic\n
      - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
      - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
      - Be nice :)\n
      \n
      ### Related communities\n
      \n
      - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
      - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
      - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
      - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
      \n
      ### Chat rooms\n
      \n
      - [Matrix/Element]Dead\n
      - [Discord](https://discord.gg/8xfrVjvngh)\n
      \n
      much thanks to @gary_host_laptop for the logo design :)
      """
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 561
    +entryCommentCount: 7684
    +postCount: 6
    +postCommentCount: 73
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1729582580 {#275
      date: 2024-10-22 09:36:20.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#237 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
    +entries: Doctrine\ORM\PersistentCollection {#180 …}
    +posts: Doctrine\ORM\PersistentCollection {#138 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
    +bans: Doctrine\ORM\PersistentCollection {#117 …}
    +reports: Doctrine\ORM\PersistentCollection {#103 …}
    +badges: Doctrine\ORM\PersistentCollection {#81 …}
    +logs: Doctrine\ORM\PersistentCollection {#71 …}
    +awards: Doctrine\ORM\PersistentCollection {#1346 …}
    +categories: Doctrine\ORM\PersistentCollection {#1823 …}
    -id: 85
    +apId: "privacy@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/privacy"
    +apPublicUrl: "https://lemmy.ml/c/privacy"
    +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "privacy"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1729583592 {#269
      date: 2024-10-22 09:53:12.0 +02:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1699780272 {#271
      date: 2023-11-12 10:11:12.0 +01:00
    }
  }
  +image: Proxies\__CG__\App\Entity\Image {#1943 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
  +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
  +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
  +body: """
    cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
    \n
    > Full text from the Electronic Frontier Foundation (EFF) article:\n
    > \n
    > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
    > \n
    > By Matthew Guariglia and Eva Galperin\n
    > \n
    > ~3 minutes\n
    > \n
    > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
    > \n
    > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
    > \n
    > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
    > \n
    > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 3
  +favouriteCount: 99
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1727359314 {#2414
    date: 2024-09-26 16:01:54.0 +02:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1866 …}
  +votes: Doctrine\ORM\PersistentCollection {#1966 …}
  +reports: Doctrine\ORM\PersistentCollection {#1946 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
  +badges: Doctrine\ORM\PersistentCollection {#2439 …}
  +children: []
  -id: 32104
  -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
  -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705913408
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/10984539"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705827008 {#1793
    date: 2024-01-21 09:50:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
App\Entity\Entry {#2419
  +user: Proxies\__CG__\App\Entity\User {#1970 …}
  +magazine: App\Entity\Magazine {#265
    +icon: Proxies\__CG__\App\Entity\Image {#246 …}
    +name: "privacy@lemmy.ml"
    +title: "privacy"
    +description: """
      A place to discuss privacy and freedom in the digital world.\n
      ============================================================\n
      \n
      Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
      \n
      In this community everyone is welcome to post links and discuss topics related to privacy.\n
      \n
      ### Some Rules\n
      \n
      - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
      - Don’t promote proprietary software\n
      - Try to keep things on topic\n
      - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
      - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
      - Be nice :)\n
      \n
      ### Related communities\n
      \n
      - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
      - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
      - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
      - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
      \n
      ### Chat rooms\n
      \n
      - [Matrix/Element]Dead\n
      - [Discord](https://discord.gg/8xfrVjvngh)\n
      \n
      much thanks to @gary_host_laptop for the logo design :)
      """
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 561
    +entryCommentCount: 7684
    +postCount: 6
    +postCommentCount: 73
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1729582580 {#275
      date: 2024-10-22 09:36:20.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#237 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
    +entries: Doctrine\ORM\PersistentCollection {#180 …}
    +posts: Doctrine\ORM\PersistentCollection {#138 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
    +bans: Doctrine\ORM\PersistentCollection {#117 …}
    +reports: Doctrine\ORM\PersistentCollection {#103 …}
    +badges: Doctrine\ORM\PersistentCollection {#81 …}
    +logs: Doctrine\ORM\PersistentCollection {#71 …}
    +awards: Doctrine\ORM\PersistentCollection {#1346 …}
    +categories: Doctrine\ORM\PersistentCollection {#1823 …}
    -id: 85
    +apId: "privacy@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/privacy"
    +apPublicUrl: "https://lemmy.ml/c/privacy"
    +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "privacy"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1729583592 {#269
      date: 2024-10-22 09:53:12.0 +02:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1699780272 {#271
      date: 2023-11-12 10:11:12.0 +01:00
    }
  }
  +image: Proxies\__CG__\App\Entity\Image {#1943 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
  +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
  +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
  +body: """
    cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
    \n
    > Full text from the Electronic Frontier Foundation (EFF) article:\n
    > \n
    > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
    > \n
    > By Matthew Guariglia and Eva Galperin\n
    > \n
    > ~3 minutes\n
    > \n
    > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
    > \n
    > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
    > \n
    > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
    > \n
    > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 3
  +favouriteCount: 99
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1727359314 {#2414
    date: 2024-09-26 16:01:54.0 +02:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1866 …}
  +votes: Doctrine\ORM\PersistentCollection {#1966 …}
  +reports: Doctrine\ORM\PersistentCollection {#1946 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
  +badges: Doctrine\ORM\PersistentCollection {#2439 …}
  +children: []
  -id: 32104
  -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
  -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705913408
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/10984539"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705827008 {#1793
    date: 2024-01-21 09:50:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\Entry {#3821
  +user: Proxies\__CG__\App\Entity\User {#1970 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#3866 …}
  +image: Proxies\__CG__\App\Entity\Image {#1943 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
  +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
  +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
  +body: """
    Full text from the Electronic Frontier Foundation (EFF) article:\n
    \n
    Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
    \n
    By Matthew Guariglia and Eva Galperin\n
    \n
    ~3 minutes\n
    \n
    For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
    \n
    Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
    \n
    We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
    \n
    Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 0
  +favouriteCount: 34
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1705826831 {#3814
    date: 2024-01-21 09:47:11.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#3872 …}
  +votes: Doctrine\ORM\PersistentCollection {#3884 …}
  +reports: Doctrine\ORM\PersistentCollection {#3810 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3812 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3815 …}
  +badges: Doctrine\ORM\PersistentCollection {#3817 …}
  +children: []
  -id: 32102
  -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
  -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705903331
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/10984512"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705826831 {#3806
    date: 2024-01-21 09:47:11.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\Entry {#3821
  +user: Proxies\__CG__\App\Entity\User {#1970 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#3866 …}
  +image: Proxies\__CG__\App\Entity\Image {#1943 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
  +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
  +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
  +body: """
    Full text from the Electronic Frontier Foundation (EFF) article:\n
    \n
    Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
    \n
    By Matthew Guariglia and Eva Galperin\n
    \n
    ~3 minutes\n
    \n
    For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
    \n
    Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
    \n
    We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
    \n
    Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 0
  +favouriteCount: 34
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1705826831 {#3814
    date: 2024-01-21 09:47:11.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#3872 …}
  +votes: Doctrine\ORM\PersistentCollection {#3884 …}
  +reports: Doctrine\ORM\PersistentCollection {#3810 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3812 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3815 …}
  +badges: Doctrine\ORM\PersistentCollection {#3817 …}
  +children: []
  -id: 32102
  -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
  -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705903331
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/10984512"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705826831 {#3806
    date: 2024-01-21 09:47:11.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\Entry {#3821
  +user: Proxies\__CG__\App\Entity\User {#1970 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#3866 …}
  +image: Proxies\__CG__\App\Entity\Image {#1943 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
  +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
  +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
  +body: """
    Full text from the Electronic Frontier Foundation (EFF) article:\n
    \n
    Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
    \n
    By Matthew Guariglia and Eva Galperin\n
    \n
    ~3 minutes\n
    \n
    For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
    \n
    Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
    \n
    We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
    \n
    Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 0
  +favouriteCount: 34
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1705826831 {#3814
    date: 2024-01-21 09:47:11.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#3872 …}
  +votes: Doctrine\ORM\PersistentCollection {#3884 …}
  +reports: Doctrine\ORM\PersistentCollection {#3810 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3812 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3815 …}
  +badges: Doctrine\ORM\PersistentCollection {#3817 …}
  +children: []
  -id: 32102
  -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
  -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705903331
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/10984512"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705826831 {#3806
    date: 2024-01-21 09:47:11.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED moderate
App\Entity\EntryComment {#4705
  +user: App\Entity\User {#4653 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: null
  +root: null
  +body: "Solution: don’t let police have your data"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 13
  +score: 0
  +lastActive: DateTime @1727359314 {#4714
    date: 2024-09-26 16:01:54.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4703 …}
  +nested: Doctrine\ORM\PersistentCollection {#4701 …}
  +votes: Doctrine\ORM\PersistentCollection {#4699 …}
  +reports: Doctrine\ORM\PersistentCollection {#4697 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
  -id: 327884
  -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7585876"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705832948 {#4650
    date: 2024-01-21 11:29:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
11 DENIED edit
App\Entity\EntryComment {#4705
  +user: App\Entity\User {#4653 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: null
  +root: null
  +body: "Solution: don’t let police have your data"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 13
  +score: 0
  +lastActive: DateTime @1727359314 {#4714
    date: 2024-09-26 16:01:54.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4703 …}
  +nested: Doctrine\ORM\PersistentCollection {#4701 …}
  +votes: Doctrine\ORM\PersistentCollection {#4699 …}
  +reports: Doctrine\ORM\PersistentCollection {#4697 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
  -id: 327884
  -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7585876"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705832948 {#4650
    date: 2024-01-21 11:29:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
12 DENIED moderate
App\Entity\EntryComment {#4705
  +user: App\Entity\User {#4653 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: null
  +root: null
  +body: "Solution: don’t let police have your data"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 13
  +score: 0
  +lastActive: DateTime @1727359314 {#4714
    date: 2024-09-26 16:01:54.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4703 …}
  +nested: Doctrine\ORM\PersistentCollection {#4701 …}
  +votes: Doctrine\ORM\PersistentCollection {#4699 …}
  +reports: Doctrine\ORM\PersistentCollection {#4697 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
  -id: 327884
  -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7585876"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705832948 {#4650
    date: 2024-01-21 11:29:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
13 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
14 DENIED moderate
App\Entity\EntryComment {#4723
  +user: Proxies\__CG__\App\Entity\User {#4733 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: App\Entity\EntryComment {#4705
    +user: App\Entity\User {#4653 …}
    +entry: App\Entity\Entry {#2419}
    +magazine: App\Entity\Magazine {#265}
    +image: null
    +parent: null
    +root: null
    +body: "Solution: don’t let police have your data"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 13
    +score: 0
    +lastActive: DateTime @1727359314 {#4714
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@ForgottenFlux@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4703 …}
    +nested: Doctrine\ORM\PersistentCollection {#4701 …}
    +votes: Doctrine\ORM\PersistentCollection {#4699 …}
    +reports: Doctrine\ORM\PersistentCollection {#4697 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
    -id: 327884
    -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7585876"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705832948 {#4650
      date: 2024-01-21 11:29:08.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4705}
  +body: "Right? Like “make sure you get a warrant” isn’t a hard answer."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 6
  +score: 0
  +lastActive: DateTime @1705840771 {#4728
    date: 2024-01-21 13:39:31.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4736 …}
  +nested: Doctrine\ORM\PersistentCollection {#4738 …}
  +votes: Doctrine\ORM\PersistentCollection {#4740 …}
  +reports: Doctrine\ORM\PersistentCollection {#4721 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4719 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4717 …}
  -id: 328037
  -bodyTs: "'answer':13 'get':6 'hard':12 'isn':9 'like':2 'make':3 'right':1 'sure':4 'warrant':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6884894"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705840771 {#4725
    date: 2024-01-21 13:39:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
15 DENIED edit
App\Entity\EntryComment {#4723
  +user: Proxies\__CG__\App\Entity\User {#4733 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: App\Entity\EntryComment {#4705
    +user: App\Entity\User {#4653 …}
    +entry: App\Entity\Entry {#2419}
    +magazine: App\Entity\Magazine {#265}
    +image: null
    +parent: null
    +root: null
    +body: "Solution: don’t let police have your data"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 13
    +score: 0
    +lastActive: DateTime @1727359314 {#4714
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@ForgottenFlux@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4703 …}
    +nested: Doctrine\ORM\PersistentCollection {#4701 …}
    +votes: Doctrine\ORM\PersistentCollection {#4699 …}
    +reports: Doctrine\ORM\PersistentCollection {#4697 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
    -id: 327884
    -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7585876"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705832948 {#4650
      date: 2024-01-21 11:29:08.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4705}
  +body: "Right? Like “make sure you get a warrant” isn’t a hard answer."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 6
  +score: 0
  +lastActive: DateTime @1705840771 {#4728
    date: 2024-01-21 13:39:31.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4736 …}
  +nested: Doctrine\ORM\PersistentCollection {#4738 …}
  +votes: Doctrine\ORM\PersistentCollection {#4740 …}
  +reports: Doctrine\ORM\PersistentCollection {#4721 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4719 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4717 …}
  -id: 328037
  -bodyTs: "'answer':13 'get':6 'hard':12 'isn':9 'like':2 'make':3 'right':1 'sure':4 'warrant':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6884894"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705840771 {#4725
    date: 2024-01-21 13:39:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
16 DENIED moderate
App\Entity\EntryComment {#4723
  +user: Proxies\__CG__\App\Entity\User {#4733 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: App\Entity\EntryComment {#4705
    +user: App\Entity\User {#4653 …}
    +entry: App\Entity\Entry {#2419}
    +magazine: App\Entity\Magazine {#265}
    +image: null
    +parent: null
    +root: null
    +body: "Solution: don’t let police have your data"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 13
    +score: 0
    +lastActive: DateTime @1727359314 {#4714
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@ForgottenFlux@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4703 …}
    +nested: Doctrine\ORM\PersistentCollection {#4701 …}
    +votes: Doctrine\ORM\PersistentCollection {#4699 …}
    +reports: Doctrine\ORM\PersistentCollection {#4697 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
    -id: 327884
    -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7585876"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705832948 {#4650
      date: 2024-01-21 11:29:08.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4705}
  +body: "Right? Like “make sure you get a warrant” isn’t a hard answer."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 6
  +score: 0
  +lastActive: DateTime @1705840771 {#4728
    date: 2024-01-21 13:39:31.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4736 …}
  +nested: Doctrine\ORM\PersistentCollection {#4738 …}
  +votes: Doctrine\ORM\PersistentCollection {#4740 …}
  +reports: Doctrine\ORM\PersistentCollection {#4721 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4719 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4717 …}
  -id: 328037
  -bodyTs: "'answer':13 'get':6 'hard':12 'isn':9 'like':2 'make':3 'right':1 'sure':4 'warrant':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6884894"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705840771 {#4725
    date: 2024-01-21 13:39:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
17 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
18 DENIED moderate
App\Entity\EntryComment {#4776
  +user: Proxies\__CG__\App\Entity\User {#4777 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: App\Entity\EntryComment {#4705
    +user: App\Entity\User {#4653 …}
    +entry: App\Entity\Entry {#2419}
    +magazine: App\Entity\Magazine {#265}
    +image: null
    +parent: null
    +root: null
    +body: "Solution: don’t let police have your data"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 13
    +score: 0
    +lastActive: DateTime @1727359314 {#4714
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@ForgottenFlux@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4703 …}
    +nested: Doctrine\ORM\PersistentCollection {#4701 …}
    +votes: Doctrine\ORM\PersistentCollection {#4699 …}
    +reports: Doctrine\ORM\PersistentCollection {#4697 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
    -id: 327884
    -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7585876"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705832948 {#4650
      date: 2024-01-21 11:29:08.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4705}
  +body: """
    They’re not asking you. They’re asking the companies\n
    \n
    The real solution is for companies to ask for the name of the officer, and then go to the official police website, call their non emergency number, and ask to speak with the officer. Then confirm that it was them, in fact, that sent the request.\n
    \n
    Bonus: then tell them to get a fucking warrant and hang up the phone.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1705851033 {#4715
    date: 2024-01-21 16:30:33.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4778 …}
  +nested: Doctrine\ORM\PersistentCollection {#4780 …}
  +votes: Doctrine\ORM\PersistentCollection {#4782 …}
  +reports: Doctrine\ORM\PersistentCollection {#4784 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4786 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4788 …}
  -id: 328413
  -bodyTs: "'ask':4,8,18,39 'bonus':57 'call':33 'compani':10,16 'confirm':46 'emerg':36 'fact':52 'fuck':64 'get':62 'go':27 'hang':67 'name':21 'non':35 'number':37 'offic':24,44 'offici':30 'phone':70 'polic':31 're':2,7 'real':12 'request':56 'sent':54 'solut':13 'speak':41 'tell':59 'warrant':65 'websit':32"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://monyet.cc/comment/4509356"
  +editedAt: DateTimeImmutable @1727359942 {#4775
    date: 2024-09-26 16:12:22.0 +02:00
  }
  +createdAt: DateTimeImmutable @1705851033 {#4774
    date: 2024-01-21 16:30:33.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
19 DENIED edit
App\Entity\EntryComment {#4776
  +user: Proxies\__CG__\App\Entity\User {#4777 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: App\Entity\EntryComment {#4705
    +user: App\Entity\User {#4653 …}
    +entry: App\Entity\Entry {#2419}
    +magazine: App\Entity\Magazine {#265}
    +image: null
    +parent: null
    +root: null
    +body: "Solution: don’t let police have your data"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 13
    +score: 0
    +lastActive: DateTime @1727359314 {#4714
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@ForgottenFlux@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4703 …}
    +nested: Doctrine\ORM\PersistentCollection {#4701 …}
    +votes: Doctrine\ORM\PersistentCollection {#4699 …}
    +reports: Doctrine\ORM\PersistentCollection {#4697 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
    -id: 327884
    -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7585876"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705832948 {#4650
      date: 2024-01-21 11:29:08.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4705}
  +body: """
    They’re not asking you. They’re asking the companies\n
    \n
    The real solution is for companies to ask for the name of the officer, and then go to the official police website, call their non emergency number, and ask to speak with the officer. Then confirm that it was them, in fact, that sent the request.\n
    \n
    Bonus: then tell them to get a fucking warrant and hang up the phone.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1705851033 {#4715
    date: 2024-01-21 16:30:33.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4778 …}
  +nested: Doctrine\ORM\PersistentCollection {#4780 …}
  +votes: Doctrine\ORM\PersistentCollection {#4782 …}
  +reports: Doctrine\ORM\PersistentCollection {#4784 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4786 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4788 …}
  -id: 328413
  -bodyTs: "'ask':4,8,18,39 'bonus':57 'call':33 'compani':10,16 'confirm':46 'emerg':36 'fact':52 'fuck':64 'get':62 'go':27 'hang':67 'name':21 'non':35 'number':37 'offic':24,44 'offici':30 'phone':70 'polic':31 're':2,7 'real':12 'request':56 'sent':54 'solut':13 'speak':41 'tell':59 'warrant':65 'websit':32"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://monyet.cc/comment/4509356"
  +editedAt: DateTimeImmutable @1727359942 {#4775
    date: 2024-09-26 16:12:22.0 +02:00
  }
  +createdAt: DateTimeImmutable @1705851033 {#4774
    date: 2024-01-21 16:30:33.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
20 DENIED moderate
App\Entity\EntryComment {#4776
  +user: Proxies\__CG__\App\Entity\User {#4777 …}
  +entry: App\Entity\Entry {#2419
    +user: Proxies\__CG__\App\Entity\User {#1970 …}
    +magazine: App\Entity\Magazine {#265
      +icon: Proxies\__CG__\App\Entity\Image {#246 …}
      +name: "privacy@lemmy.ml"
      +title: "privacy"
      +description: """
        A place to discuss privacy and freedom in the digital world.\n
        ============================================================\n
        \n
        Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
        \n
        In this community everyone is welcome to post links and discuss topics related to privacy.\n
        \n
        ### Some Rules\n
        \n
        - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
        - Don’t promote proprietary software\n
        - Try to keep things on topic\n
        - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
        - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
        - Be nice :)\n
        \n
        ### Related communities\n
        \n
        - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
        - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
        - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
        - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
        \n
        ### Chat rooms\n
        \n
        - [Matrix/Element]Dead\n
        - [Discord](https://discord.gg/8xfrVjvngh)\n
        \n
        much thanks to @gary_host_laptop for the logo design :)
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 561
      +entryCommentCount: 7684
      +postCount: 6
      +postCommentCount: 73
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582580 {#275
        date: 2024-10-22 09:36:20.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#237 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
      +entries: Doctrine\ORM\PersistentCollection {#180 …}
      +posts: Doctrine\ORM\PersistentCollection {#138 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
      +bans: Doctrine\ORM\PersistentCollection {#117 …}
      +reports: Doctrine\ORM\PersistentCollection {#103 …}
      +badges: Doctrine\ORM\PersistentCollection {#81 …}
      +logs: Doctrine\ORM\PersistentCollection {#71 …}
      +awards: Doctrine\ORM\PersistentCollection {#1346 …}
      +categories: Doctrine\ORM\PersistentCollection {#1823 …}
      -id: 85
      +apId: "privacy@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/privacy"
      +apPublicUrl: "https://lemmy.ml/c/privacy"
      +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "privacy"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1729583592 {#269
        date: 2024-10-22 09:53:12.0 +02:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1699780272 {#271
        date: 2023-11-12 10:11:12.0 +01:00
      }
    }
    +image: Proxies\__CG__\App\Entity\Image {#1943 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
    +title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
    +url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
    +body: """
      cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
      \n
      > Full text from the Electronic Frontier Foundation (EFF) article:\n
      > \n
      > Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
      > \n
      > By Matthew Guariglia and Eva Galperin\n
      > \n
      > ~3 minutes\n
      > \n
      > For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
      > \n
      > Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
      > \n
      > We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
      > \n
      > Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 3
    +favouriteCount: 99
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1727359314 {#2414
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1966 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1368 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2426 …}
    +badges: Doctrine\ORM\PersistentCollection {#2439 …}
    +children: []
    -id: 32104
    -titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
    -bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705913408
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/10984539"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705827008 {#1793
      date: 2024-01-21 09:50:08.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#265}
  +image: null
  +parent: App\Entity\EntryComment {#4705
    +user: App\Entity\User {#4653 …}
    +entry: App\Entity\Entry {#2419}
    +magazine: App\Entity\Magazine {#265}
    +image: null
    +parent: null
    +root: null
    +body: "Solution: don’t let police have your data"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 13
    +score: 0
    +lastActive: DateTime @1727359314 {#4714
      date: 2024-09-26 16:01:54.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@ForgottenFlux@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4703 …}
    +nested: Doctrine\ORM\PersistentCollection {#4701 …}
    +votes: Doctrine\ORM\PersistentCollection {#4699 …}
    +reports: Doctrine\ORM\PersistentCollection {#4697 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4665 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4669 …}
    -id: 327884
    -bodyTs: "'data':8 'let':4 'polic':5 'solut':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7585876"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705832948 {#4650
      date: 2024-01-21 11:29:08.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4705}
  +body: """
    They’re not asking you. They’re asking the companies\n
    \n
    The real solution is for companies to ask for the name of the officer, and then go to the official police website, call their non emergency number, and ask to speak with the officer. Then confirm that it was them, in fact, that sent the request.\n
    \n
    Bonus: then tell them to get a fucking warrant and hang up the phone.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1705851033 {#4715
    date: 2024-01-21 16:30:33.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
    "@ForgottenFlux@lemmy.world"
    "@frightful_hobgoblin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4778 …}
  +nested: Doctrine\ORM\PersistentCollection {#4780 …}
  +votes: Doctrine\ORM\PersistentCollection {#4782 …}
  +reports: Doctrine\ORM\PersistentCollection {#4784 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4786 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4788 …}
  -id: 328413
  -bodyTs: "'ask':4,8,18,39 'bonus':57 'call':33 'compani':10,16 'confirm':46 'emerg':36 'fact':52 'fuck':64 'get':62 'go':27 'hang':67 'name':21 'non':35 'number':37 'offic':24,44 'offici':30 'phone':70 'polic':31 're':2,7 'real':12 'request':56 'sent':54 'solut':13 'speak':41 'tell':59 'warrant':65 'websit':32"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://monyet.cc/comment/4509356"
  +editedAt: DateTimeImmutable @1727359942 {#4775
    date: 2024-09-26 16:12:22.0 +02:00
  }
  +createdAt: DateTimeImmutable @1705851033 {#4774
    date: 2024-01-21 16:30:33.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
21 DENIED edit
App\Entity\Magazine {#265
  +icon: Proxies\__CG__\App\Entity\Image {#246 …}
  +name: "privacy@lemmy.ml"
  +title: "privacy"
  +description: """
    A place to discuss privacy and freedom in the digital world.\n
    ============================================================\n
    \n
    Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.\n
    \n
    In this community everyone is welcome to post links and discuss topics related to privacy.\n
    \n
    ### Some Rules\n
    \n
    - Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post\n
    - Don’t promote proprietary software\n
    - Try to keep things on topic\n
    - If you have a question, please try searching for previous discussions, maybe it has already been answered\n
    - Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience\n
    - Be nice :)\n
    \n
    ### Related communities\n
    \n
    - [Lemmy.ml libre_culture](https://lemmy.ml/c/libre_culture)\n
    - [Lemmy.ml privatelife](https://lemmy.ml/c/privatelife)\n
    - [Lemmy.ml DeGoogle](https://lemmy.ml/c/degoogle)\n
    - [Lemmy.ca privacy](https://lemmy.ca/c/privacy)\n
    \n
    ### Chat rooms\n
    \n
    - [Matrix/Element]Dead\n
    - [Discord](https://discord.gg/8xfrVjvngh)\n
    \n
    much thanks to @gary_host_laptop for the logo design :)
    """
  +rules: null
  +subscriptionsCount: 1
  +entryCount: 561
  +entryCommentCount: 7684
  +postCount: 6
  +postCommentCount: 73
  +isAdult: false
  +customCss: null
  +lastActive: DateTime @1729582580 {#275
    date: 2024-10-22 09:36:20.0 +02:00
  }
  +markedForDeletionAt: null
  +tags: null
  +moderators: Doctrine\ORM\PersistentCollection {#237 …}
  +ownershipRequests: Doctrine\ORM\PersistentCollection {#233 …}
  +moderatorRequests: Doctrine\ORM\PersistentCollection {#222 …}
  +entries: Doctrine\ORM\PersistentCollection {#180 …}
  +posts: Doctrine\ORM\PersistentCollection {#138 …}
  +subscriptions: Doctrine\ORM\PersistentCollection {#200 …}
  +bans: Doctrine\ORM\PersistentCollection {#117 …}
  +reports: Doctrine\ORM\PersistentCollection {#103 …}
  +badges: Doctrine\ORM\PersistentCollection {#81 …}
  +logs: Doctrine\ORM\PersistentCollection {#71 …}
  +awards: Doctrine\ORM\PersistentCollection {#1346 …}
  +categories: Doctrine\ORM\PersistentCollection {#1823 …}
  -id: 85
  +apId: "privacy@lemmy.ml"
  +apProfileId: "https://lemmy.ml/c/privacy"
  +apPublicUrl: "https://lemmy.ml/c/privacy"
  +apFollowersUrl: "https://lemmy.ml/c/privacy/followers"
  +apInboxUrl: "https://lemmy.ml/inbox"
  +apDomain: "lemmy.ml"
  +apPreferredUsername: "privacy"
  +apDiscoverable: true
  +apManuallyApprovesFollowers: null
  +privateKey: null
  +publicKey: null
  +apFetchedAt: DateTime @1729583592 {#269
    date: 2024-10-22 09:53:12.0 +02:00
  }
  +apDeletedAt: null
  +apTimeoutAt: null
  +visibility: "visible             "
  +createdAt: DateTimeImmutable @1699780272 {#271
    date: 2023-11-12 10:11:12.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS DENIED
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details