There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

US authorities charge Amazon with violating children’s privacy law by undermining parents’ deletion requests (web.archive.org)

The Federal Trade Commission and the Department of Justice will require Amazon to overhaul its deletion practices and implement stringent privacy safeguards to settle charges the company violated the Children’s Online Privacy Protection Act Rule (COPPA Rule).

Lawyer "greatly regrets" use of ChatGPT in court, says he was "unaware of the possibility that its content could be false" (web.archive.org)

The court dismissed the claim and used the word “bogus” to describe the quotes and citations the US attorney provided, which were sourced from ChatGPT. “Six of the submitted cases appear to be bogus judicial decisions with bogus quotes and bogus internal citations.” The judge further claimed that certain cases referenced...

"Colonial racial capitalism": China's mass surveillance in Xinjiang made the country a leading exporter of digital forensics, superseded only by Israel and the US (web.archive.org)

The hundreds of millions of dollars invested in Xinjiang surveillance created a system of digital enclosure that is part of the structure of dispossession that confronts Uyghurs, but the regime in Beijing wants the data of the colonized, too, a researcher says. This collection of data has significant consequences for the...

Digital war: Social media data reveal how hate speech is used to dehumanise, call for violence against, and celebrate the death of Ukrainians (www.info-res.org)

Data collected from Twitter and Telegram shows that there is increased use of slurs against Ukrainians, calling for violence and celebrating the death of Ukrainians, despite platform policies that are meant to stop, or at least mitigate this activity, the Centre for Information Resilience says. The dataset collected and analysed...

Clearview fined again in France for failing to comply with privacy orders (techcrunch.com)

The overdue penalty payment of €5.2 million has been issued by the French regulator, the CNIL — on top of a €20 million sanction it slapped the company with last year for breaching regional privacy rules. Clearview refuses payment as it “is not subject to the GDPR [General Data Protection Regulation]”, the company...

Once Again, ‘Free Speech Absolutist’ Elon Musk Caves To Authoritarian Censorial Bullies (www.techdirt.com)

So far, Musk has shown a willingness to bow down to authoritarian censors. The latest is yet another example of that. Just as the Turkish election was about to take place, the government demanded that Twitter censor content critical of authoritarian strongman, gollum-lookalike, and world’s most thin skinned leader, Recep...

Microsoft 365 faces more GDPR headwinds as Germany bans it in schools: Redmond disputes report that 'it is not possible to use without transferring personal data to the USA' (www.theregister.com)

Germany’s federal and state data protection authorities (DSK) have raised concerns about the compatibility of Microsoft 365 with data protection laws in Germany and the wider European Union....

Remember BBSes (Bulletin Board Systems)? Here’s How You Can Visit One Today Using A Telnet Connection (www.howtogeek.com)

These days, social media gets all the attention, but the Bulletin Board System (BBS), a relic from a kinder, gentler time in computer communications, persists. Each BBS is its own retro-flavored community with messages, text-based games, and files you can download. And you can still connect to one today....

University of Waterloo has developed a drone-powered device that can use Wi-Fi networks to 'see' Wi-Fi devices through walls: No software patch possible (techxplore.com)

The device, nicknamed Wi-Peep, can fly near a building and then use the inhabitants’ Wi-Fi network to identify and locate all Wi-Fi-enabled devices inside in a matter of seconds....

Converting Your Twitter Archive to Markdown, and t.co links to original URL (matthiasott.com)

Once your archive is on your machine, you will have a browsable HTML archive of your tweets, direct messages, and moments including media like images, videos, and GIFs. This is nice, but it also has a few flaws. For one, you can’t easily copy your Tweets somewhere else, for example, into your website because they are stored in...

Your Gmail Account (and other e-mail) Has Unlimited Addresses - Useful For Seeing Who Leaked Your Address to Spammers (lifehacker.com)

You can append to your existing e-mail address in various ways, and this could be pretty useful for seeing who leaked your e-mail address to spammers. For example, for your bank, give them the address [email protected]. Then, if spammers send to that address, you can quickly see where they got the e-mail address from!...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • lifeLocal
  • goranko
  • All magazines