There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

Thoughts on BOOX Tab Ultra C? (shop.boox.com)

Does anyone here have a BOOX e-paper tablet? I’m a big fan of e-paper devices—I love my Pebble smartwatch, Kindle Paperwhite, and Light Phone II. I’ve been eyeing the Tab Ultra C for quite a while, and I am considering the pros and cons. Mostly, I intend to use it for browsing the web and maybe some light note taking and...

The Global Green Energy Transition Has an Uyghur Forced Labor Problem, Report Says (investorsforhumanrights.org)

The solar and electric vehicle industries are critical for the world’s urgent transition away from fossil fuels. However, both industries source many of their critical inputs from the Uyghur Region, a region where the Chinese government is systematically persecuting the native Uyghur, Turkic, and Muslim-majority peoples,...

Krebs on Security: "Using Google Search to Find Software Can Be Risky" (krebsonsecurity.com)

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make...

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE (arstechnica.com)

Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Security Service (AIVD) deduced from security camera footage that it is led by the Russian...

‘Significant security loophole’ found in Google software container system (therecord.media)

The issue affected Google Kubernetes Engine (GKE), a system used to deploy, scale and manage how applications are “containerized.” GKE — the tech giant’s implementation of the open-source Kubernetes project — is used widely in healthcare, education, retail and financial services for data processing as well as...

Human Rights Watch accuses Facebook-parent Meta of falling short to protect LGBT people from harassment and doxxing (www.hrw.org)

Human Rights Watch interviewed dozens of LGBT people who indicated that they had reported being harassed, doxxed, outed, and abused on Facebook and Instagram, but in all these cases, Meta either did not respond to their complaints or found that the content they reported did not violate its policies, and the content remained...

China raises private hacker army to probe foreign governments (www.newsweek.com)

Chinese state institutions issue rewards for finding the cybersecurity vulnerabilities in software that is often used by foreign governments, in what may be a subtle new form of state-backed cyber warfare. At the same time, China is promoting young cybersecurity engineers in a doubling of its efforts to probe foreign systems for...

Work inside the machine of the music industry: How pre-saves and algorithmic marketing turn musicians into influencers (algorithmwatch.org)

Streaming platforms allow users to add upcoming tracks to their playlists, in order to listen to them as soon as they are released. While this sounds harmless, it changed the habits of independent musicians, who feel they have to adapt to yet another algorithm.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines