Skip to content

An analysis of X(Twitter)'s new XChat features shows that X can probably decrypt users' messages, as it holds users' private keys on its servers

Technology
48 32 693
  • The Age-Checked Internet Has Arrived

    Technology technology
    154
    1
    523 Stimmen
    154 Beiträge
    2k Aufrufe
    irmadlad@lemmy.worldI
    Governments like everything and everyone in their own little stack and in the government's self established status quo. When Paula Protester comes along with her LGBTQ++ agenda, governments don't like that. Paula Protester represents instability to the status quo established by the ruling class. Governments don't like instability. Governments like everyone sorted, coallated, and stapled, all in their respective stacks, so dissidents and social change advocates are viewed as adversaries and are not welcome. If it's genuuinely 'for the chirren' then it would seem to me that making parents be parents and take responsibility for their child's actions would go a very long way. However, we make laws with the lowest common denominator in mind. I don't want your children involved in adult activities online. However, just like any education program, the success is determined by parental involvement in their child's daily lives, and it starts at home. It's a lot easier to make government responsible for the child's developement, than actually requiring parents to be parents. I hear parents say 'I'm not technologically inclined.' Well, get there. The safety and well being of your child hangs in the balance. Take a class, read some of the millions of step by step tutorials that exist all over the internet. Ask some questions in forums. The possibilities are endless. Protecting your child is work, just like rasing them is work, and therein lies the issue.
  • 166 Stimmen
    34 Beiträge
    448 Aufrufe
    P
    Seems more like someone got confused and dumped info for chicken pox instead of “chicken pops”
  • The Decline of Usability: Revisited | datagubbe.se

    Technology technology
    2
    0 Stimmen
    2 Beiträge
    24 Aufrufe
    2xsaiko@discuss.tchncs.de2
    Just saw this article linked in a ThePrimeagen video. I didn't watch the video, but I did read the article, and all of this article is exactly what I'm always saying when I'm complaining about current UI trends and why I'm so picky about the software I use and also the tools I use to write software. I shouldn't have to be picky, but it seems like developers (professional and hobbyist alike) don't care anymore and users don't have standards.
  • 816 Stimmen
    199 Beiträge
    4k Aufrufe
    Z
    It's clear you don't really understand the wider context and how historically hard these tasks have been. I've been doing this for a decade and the fact that these foundational models can be pretrained on unrelated things then jump that generalization gap so easily (within reason) is amazing. You just see the end result of corporate uses in the news, but this technology is used in every aspect of science and life in general (source: I do this for many important applications).
  • Musk's X sues New York state over social media hate speech law

    Technology technology
    1
    1
    1 Stimmen
    1 Beiträge
    16 Aufrufe
    Niemand hat geantwortet
  • 226 Stimmen
    53 Beiträge
    693 Aufrufe
    E
    Well fuck me I guess lol
  • How a Spyware App Compromised Assad’s Army

    Technology technology
    2
    1
    41 Stimmen
    2 Beiträge
    32 Aufrufe
    S
    I guess that's why you pay your soldiers. In the early summer of 2024, months before the opposition launched Operation Deterrence of Aggression, a mobile application began circulating among a group of Syrian army officers. It carried an innocuous name: STFD-686, a string of letters standing for Syria Trust for Development. ... The STFD-686 app operated with disarming simplicity. It offered the promise of financial aid, requiring only that the victim fill out a few personal details. It asked innocent questions: “What kind of assistance are you expecting?” and “Tell us more about your financial situation.” ... Determining officers’ ranks made it possible for the app’s operators to identify those in sensitive positions, such as battalion commanders and communications officers, while knowing their exact place of service allowed for the construction of live maps of force deployments. It gave the operators behind the app and the website the ability to chart both strongholds and gaps in the Syrian army’s defensive lines. The most crucial point was the combination of the two pieces of information: Disclosing that “officer X” was stationed at “location Y” was tantamount to handing the enemy the army’s entire operating manual, especially on fluid fronts like those in Idlib and Sweida.
  • 0 Stimmen
    4 Beiträge
    47 Aufrufe
    redfox@infosec.pubR
    Yeah, damn, I always forget about that...just like they want...