Skip to content

16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now

Technology
31 24 126
  • Could Windows and installed apps upload all my personal files?

    Technology technology
    2
    1 Stimmen
    2 Beiträge
    17 Aufrufe
    rikudou@lemmings.worldR
    Yes, every application has access to everything. The only exception are those weird apps that use the universal framework or whatever that thing is called, those need to ask for permissions. But most of the apps on your PC have full access to everything. And Windows does collect and upload a lot of personal information and they could easily upload everything on your system. The same of course applies for the apps as well, they have access to everything except privileged folders (those usually don't contain your personal data, but system files).
  • Meta publishes V-Jepa 2 – an AI world model

    Technology technology
    3
    1
    9 Stimmen
    3 Beiträge
    24 Aufrufe
    K
    Yay more hype. Just what we needed more of, it's hype, at last
  • Fake It Till You Make It? Builder.ai’s $1.5B AI Scam Exposed

    Technology technology
    14
    1
    70 Stimmen
    14 Beiträge
    50 Aufrufe
    W
    Religion and fiat are always at the top
  • 272 Stimmen
    80 Beiträge
    277 Aufrufe
    S
    that sub seems to be fully brigaded by bots from marketing team of closed-ai and preplexity
  • 104 Stimmen
    169 Beiträge
    145 Aufrufe
    M
    Yes I did, on page 243: It was employed in the Philosophical Transactions by the Dutch astronomer N. Cruquius; ÷ is found in Hübsch and Crusius. It was used very frequently as the symbol for subtraction and ``minus´´ in the Maandelykse Mathematische Liefbebbery, Purmerende (1754-69)
  • @chrlschn - Beware the Complexity Merchants

    Technology technology
    6
    1
    57 Stimmen
    6 Beiträge
    31 Aufrufe
    S
    I'm a big fan of the manta "Make your designs as simple as possible and no simpler". Pointless complexity drives me nuts, but others take it too far and remove functionality by making things too minimal. It doesn't help that a lot of businesses optimize for people who make changes, so the positive feedback loop is change for the sake of change rather than improving the product.
  • Revolutionary cooling technology emerges from Slovenia

    Technology technology
    8
    43 Stimmen
    8 Beiträge
    37 Aufrufe
    S
    You know what's even cheaper to run than this "new technology"? Breathy promotion pieces that give no evidence whatsoever to support it's claims. Way to go, PR folks.
  • 141 Stimmen
    4 Beiträge
    23 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]