There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

technology

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

Be Aware of How Your Life is Being Monitored by Technology (www.youtube.com)

Naomi Brockwell makes it easy and interesting to learn about how our personal lives are being spied on by potentially anybody. Share it with your friends and family so maybe one day every country won’t have a social credit score or other dystopian outcomes.

Low dopamine computing

Why isn’t this a thing? Just turning your monitor into grayscale mode, changes the entire experience. Have you ever played a video game in grayscale? After such a long time of being used to overstimulation, it feels like being on antipsychotics. The constant exposure to multimedia, videogames and the mere display of colors...

The U.S. Government Wants To Control Online Speech to “Protect Kids” (www.eff.org)

The U.S. Government Wants To Control Online Speech to “Protect Kids”::The Kids Online Safety Act (KOSA), a bill that allows for a wide range of government penalties for online speech, could soon be passed by Congress. If that happens, the access we have to information may be forever changed. KOSA will make state prosecutors...

They Didn’t Ask to Go Viral. Posting on Social Media Without Consent Is Immoral (www.wired.com)

They Didn’t Ask to Go Viral. Posting on Social Media Without Consent Is Immoral::It’s typical to ask friends for permission to share pictures of them. Yet people don’t extend this courtesy to strangers, either because they think nothing of it or they need to go viral at all costs.

Google ads push fake Google Authenticator site installing malware | The ad displays "google.com" and "https://www.google.com" as the click URL, and the advertiser's identity is verified by Google (www.bleepingcomputer.com)

Google has fallen victim to its own ad platform, allowing threat actors to create fake Google Authenticator ads that push the DeerStealer information-stealing malware....

Covid-era whiz kid is back, and he brought a Friend — a wearable, always listening, $99 AI companion (www.geekwire.com)

This isn’t a joke, though it almost seems like one. It uses Llama 3.1, and supposedly the conversation data stays on the device and gets forgotten over time (through what the founder calls a rolling “context window”)....

Switzerland mandates government agencies use open-source software and disclose the source code of software developed by or for the public sector unless third-party rights or security concerns apply (www.tomshardware.com)

Switzerland has recently enacted a law requiring its government to use open-source software (OSS) and disclose the source code of any software developed by or for the public sector. According to ZDNet, this “public body, public code” approach makes government operations more transparent while increasing security and...

Redbox’s owner files for bankruptcy after repeatedly missing payments and payroll (www.theverge.com)

informed employees of the filing late Friday […] that it had filed for a debtor-in-possession loan — a way for companies that are reorganizing after filing for bankruptcy to secure additional working capital to meet payroll. […] employees have been waiting for paychecks since June 21st […] it’s not certain that the...

Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says | ProPublica Investigation (www.propublica.org)

Former employee says software giant dismissed his warnings about a critical flaw because it feared losing government business. Russian hackers later used the weakness to breach the National Nuclear Security Administration, among others....

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines