There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

The cofounder of Google's AI division DeepMind says everybody will have their own AI-powered 'chief of staff' over the next five years (www.businessinsider.com)

The cofounder of Google’s AI division DeepMind says everybody will have their own AI-powered ‘chief of staff’ over the next five years::Mustafa Suleyman said AI will “intimately know your personal information” and be able to serve you 24-7.

The Kids Online Safety Act is Still A Huge Danger to Our Rights Online. (www.eff.org)

The Kids Online Safety Act is Still A Huge Danger to Our Rights Online.::Congress has resurrected the Kids Online Safety Act (KOSA), a bill that would increase surveillance and restrict access to information in the name of protecting children online. KOSA was introduced in 2022 but failed to gain traction, and today its authors,...

Can I faraday cage my ISP-issued router in order to use my own?

I have a family member living on my property in a separate but adjacent living space, close enough together to share my router’s wifi. She likes to let her youtube app endlessly autoplay talking head news videos at full volume due to her hearing loss, and this goes on for a few hours in the mornings. The sound through the...

'Limitless' energy: how floating solar panels near the equator could power future population hotspots (theconversation.com)

‘Limitless’ energy: how floating solar panels near the equator could power future population hotspots::New research shows densely populated countries in Southeast Asia and West Africa could harvest effectively unlimited energy from solar panels floating on calm tropical seas near the equator.

what if the hacker provided the public key for https connection? (www.youtube.com)

So this video explains how https works. What I don’t get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn’t he be able to decrypt the message with his private key? I’m not a tech expert, but just curious and trying to learn.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines