'Hong Kongization?’ - Chinese cyberattacks and disinformation campaigns against Taiwan surge, security agency says (www.taipeitimes.com)
Taiwan’s National Security Bureau (NSB) official Ko Cheng-heng said that Beijing’s campaign against Taiwan would spark a strong backlash from democracies around the world....
Google Search adds a “web” filter, because it is no longer focused on web results (arstechnica.com)
Maven Is a New Social Network That Eliminates Followers—and Hopefully Stress (www.wired.com)
archive.ph/vlcmB
Several European consumer watchdogs file complaints against Chinese online platform Temu over "manipulative techniques" breaching EU’s Digital Services Act (www.beuc.eu)
According to the European consumer protection group BEUC, the Chinese online retailer Temu “fails to provide sufficient traceability of the traders that sell on its platform” and thereby fail “to ensure that the products sold to EU consumers conform to EU law”, BEUC said in a release....
Android's new anti-theft features (blog.google)
cross-posted from: lemy.lol/post/25062075
Why is this episode of NOVA about data privacy recommending Privacy Badger? (www.pbs.org)
I was under the impression that Privacy Badger wasn’t considered useful any more . . . ? They should’ve just recommended using Firefox instead, yes?...
Testing 8 Innovative New Boat Propeller Designs (www.youtube.com)
Does a VPN used on a smartphone with Wi-Fi disabled (mobile data only enabled) provide any sort of protection?
I’ve never completely understood this, but I think the answer would probably be “no,” although I’m not sure. Usually when I leave the house I turn off wifi and just use mobile data (this is a habit from my pre-VPN days), although I guess I should probably just keep it on since using strange Wi-Fi with a VPN is ok (unless...
The inside story of Elon Musk’s mass firings of Tesla Supercharger staff (finance.yahoo.com)
Archive.org link...
Google is redesigning its search engine — and it’s AI all the way down (www.theverge.com)
YouTube Blocks Access to Protest Anthem in Hong Kong (www.nytimes.com)
The coordination network toolkit: a framework for detecting and analysing coordinated behaviour on social media (link.springer.com)
The authors introduce and evaluate an open-source software package and methodological framework for detecting and analysing coordinated behaviour on social media, namely the Coordination Network Toolkit, utilising weighted, directed multigraphs to capture intricate coordination dynamics....
Apple, SpaceX, Microsoft return-to-office mandates drove senior talent away (arstechnica.com)
I hate to go as cliche as “surprising absolutely no one,” but really, this is not a surprise.
'Noise’ in the machine: Human differences in judgment lead to problems for AI, researcher says (theconversation.com)
This is the alternative Invidious link for the embedded article....
Fake WhatsApp and Instagram apps that can steal personal data (www.infoterkiniviral.com)
The Flaws that Allow Hackers to Remotely Access Cars (yt.artemislena.eu)
Canonical YouTube link
Major ChatGPT-4o update allows audio-video talks with an “emotional” AI chatbot (arstechnica.com)
Web publishers brace for carnage as Google adds AI answers (www.washingtonpost.com)
Archive link
The Disinformation Machine: How Susceptible Are We to AI Propaganda? (hai.stanford.edu)
Gabe Newell, the Man Behind Steam, Is Working on a Brain-Computer Interface (futurism.com)
A cyberattack forces a big US health system to divert ambulances and take records offline (abcnews.go.com)
A cyberattack on the Ascension health system operating in 19 states across the U.S. forced some of its 140 hospitals to divert ambulances, caused patients to postpone medical tests and blocked online access to patient records...
"X": Far-right conspiracy theorists have returned in droves after Elon Musk took over the former Twitter, new study says (mashable.com)
Archived link....
Elon Musk’s X can’t invent its own copyright law, judge says (arstechnica.com)
Russia-linked network uses AI to mass-produce misinformation, modifying content from legitimate sources and tailoring political messages with specific biases, security researchers say (www.recordedfuture.com)
Archived version...