Skip to content

Scientists make game-changing breakthrough that could slash costs of solar panels: 'Has the potential to contribute to the energy transition'

Technology
123 86 0
  • A Forensic Examination of GIS Arta

    Technology technology
    1
    1
    7 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • 26 Stimmen
    11 Beiträge
    50 Aufrufe
    F
    Absolute horseshit. Bulbs don't have microphones. If they did, any junior security hacker could sniff out the traffic and post about it for cred. The article quickly pivots to TP-Link and other devices exposing certificates. That has nothing to do with surveillance and everything to do with incompetent programming. Then it swings over to Matter and makes a bunch of incorrect assertion I don't even care to correct. Also, all the links are to articles on the same site, every single one of which is easily refutable crap. Yes, there are privacy tradeoffs with connected devices, but this article is nothing but hot clickbait garbage.
  • France considers requiring Musk’s X to verify users’ age

    Technology technology
    20
    1
    142 Stimmen
    20 Beiträge
    102 Aufrufe
    C
    TBH, age verification services exist. If it becomes law, integrating them shouldn't be more difficult than integrating a OIDC login. So everyone should be able to do it. Depending on these services, you might not even need to give a name, or, because they are separate entities, don't give your name to the platform using them. Other parts of regulation are more difficult. Like these "upload filters" that need to figure out if something shared via a service is violating any copyright before it is made available.
  • Unionize or die - Drew DeVault

    Technology technology
    3
    75 Stimmen
    3 Beiträge
    28 Aufrufe
    W
    and hopefully also elsewhere. as Drew said in the first part, tech workers will be affected by billionaire's decisions even outside of work, on multiple fronts. we must eat the rich, or they will eat us all alive.
  • Stepping outside the algorithm

    Technology technology
    1
    1
    19 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • lemm.ee is shutting down at the end of this month

    Technology technology
    130
    625 Stimmen
    130 Beiträge
    507 Aufrufe
    vopyr@lemmy.worldV
    If I know correctly, it is not possible to export posts, comments, replies.
  • 75 Stimmen
    8 Beiträge
    43 Aufrufe
    L
    Police: Arrest you for having an open beer in public Judge: sentences you to prison The PIC:
  • 141 Stimmen
    4 Beiträge
    30 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]