Security researchers criticize Microsoft over handling of bug reports (www.zerodayinitiative.com)
cross-posted from: feddit.org/post/899847...
"I want to live forever in AI" (lemmy.ml)
Gimp in IT@school 14
Gimp in IT@school Ubuntu fork 14...
Giving Up on Consciousness as the Ghost in the Machine (www.ncbi.nlm.nih.gov)
Google is switching the Pixel 9 to an ultrasonic fingerprint reader (www.androidauthority.com)
The Future of Odysee (odysee.com)
Tucker Carlson Shows Up Uninvited to Fox News Booth at RNC (www.thedailybeast.com)
Canada Names First Woman To Lead Military (www.barrons.com)
cross-posted from: lemmy.ca/post/25268261...
Ex-CIA analyst accused of working for South Korea for luxury handbags (www.channelnewsasia.com)
cross-posted from: lemmy.ml/post/18118852
She Made $10,000 a Month Defrauding Apps like Uber and Instacart. Meet the Queen of the Rideshare Mafia (www.wired.com)
The epic bust-up between China and India could be ending (www.economist.com)
archive.is/Mja9y
Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages (www.wired.com)
tired (lemmy.blahaj.zone)
Kavita Reader - Release Notes 0.8.2 (github.com)
cross-posted from: lemmy.dbzer0.com/post/24154583...
You know what?
cross-posted from: lemmy.world/post/16877130...
Rep. Lauren Boebert says both Trump & Jesus are victims of cancel culture (www.lgbtqnation.com)
Iran rejects accusations implicating it in plot to kill Trump. (www.voanews.com)
What scientific discoveries greatly weakened religion and the case of God ?
*Angry programmers noise getting louder and louder* (lemmy.world)
FBI, DHS warn of possible retaliation for attack on Trump (www.politico.com)
Archived at web.archive.org/…/fbi-dhs-possible-retaliation-tr…
It’s never been easier for the cops to break into your phone (www.theverge.com)
'Shameful' BBC story on Israel's killing of disabled man revised (www.newarab.com)
cross-posted from: lemmy.world/post/17662753...
To Ratigan!
https://lemmy.ca/pictrs/image/94e80686-ac74-412a-b792-e7229118052a.jpeg
ELI5: What kind of security mechanisms do software companies use to ensure that the source code of their products will be practically impossible to discover?
Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?...