There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

How much would hash digsets shortened if the whole alphabel was used

The sha1 hash for 64test64xa is 6779c53432b8badf049bb9d8924a5785dd887243 which is 41 characters only using hexadecimal, 10digits and 6letters. But how long it would be if it was using the whole 26 letters in the latin alphabet? What if it also differentiated between UPPER and lower cases?

Thoughts on BOOX Tab Ultra C? (shop.boox.com)

Does anyone here have a BOOX e-paper tablet? I’m a big fan of e-paper devices—I love my Pebble smartwatch, Kindle Paperwhite, and Light Phone II. I’ve been eyeing the Tab Ultra C for quite a while, and I am considering the pros and cons. Mostly, I intend to use it for browsing the web and maybe some light note taking and...

The Global Green Energy Transition Has an Uyghur Forced Labor Problem, Report Says (investorsforhumanrights.org)

The solar and electric vehicle industries are critical for the world’s urgent transition away from fossil fuels. However, both industries source many of their critical inputs from the Uyghur Region, a region where the Chinese government is systematically persecuting the native Uyghur, Turkic, and Muslim-majority peoples,...

Krebs on Security: "Using Google Search to Find Software Can Be Risky" (krebsonsecurity.com)

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make...

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE (arstechnica.com)

Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Security Service (AIVD) deduced from security camera footage that it is led by the Russian...

‘Significant security loophole’ found in Google software container system (therecord.media)

The issue affected Google Kubernetes Engine (GKE), a system used to deploy, scale and manage how applications are “containerized.” GKE — the tech giant’s implementation of the open-source Kubernetes project — is used widely in healthcare, education, retail and financial services for data processing as well as...

Human Rights Watch accuses Facebook-parent Meta of falling short to protect LGBT people from harassment and doxxing (www.hrw.org)

Human Rights Watch interviewed dozens of LGBT people who indicated that they had reported being harassed, doxxed, outed, and abused on Facebook and Instagram, but in all these cases, Meta either did not respond to their complaints or found that the content they reported did not violate its policies, and the content remained...

Work inside the machine of the music industry: How pre-saves and algorithmic marketing turn musicians into influencers (algorithmwatch.org)

Streaming platforms allow users to add upcoming tracks to their playlists, in order to listen to them as soon as they are released. While this sounds harmless, it changed the habits of independent musicians, who feel they have to adapt to yet another algorithm.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines