Skip to content

BREAKING: X CEO Linda Yaccarino Steps Down One Day After Elon Musk’s Grok AI Bot Went Full Hitler

Technology
188 138 0
  • 41 Stimmen
    3 Beiträge
    20 Aufrufe
    M
    Does anybody know of a resource that's compiled known to be affected system or motherboard models using this specific BMC? Eclypsium said the line of vulnerable AMI MegaRAC devices uses an interface known as Redfish. Server makers known to use these products include AMD, Ampere Computing, ASRock, ARM, Fujitsu, Gigabyte, Huawei, Nvidia, Supermicro, and Qualcomm. Some, but not all, of these vendors have released patches for their wares.
  • 79 Stimmen
    3 Beiträge
    21 Aufrufe
    D
    Right? The surprise would be if they weren't doing that.
  • You're not alone: This email from Google's Gemini team is concerning

    Technology technology
    298
    1
    838 Stimmen
    298 Beiträge
    1k Aufrufe
    M
    My understanding is that, in broad strokes... Aurora acts like a proxy or mirror that doesn't require you to sign in to get Google Play Store apps. It doesn't provide any other software besides what you specifically download from it, and it doesn't include any telemetry/tracking like normal Google Play Store would. microG is a reimplementation of Google Play services (the suite of proprietary background services that Google runs on normal Android phones). MicroG doesn't have the bloat and tracking and other closed source functionality, but rather acts as a stand-in that other apps can talk to (when they'd normally be talking to Google Play services). This has to be installed and configured and I would refer to the microG github or other documentation. GrapheneOS has its own sandboxed Google Play Services which is basically unmodified Google Play Services, crammed into its own sandbox with no special permissions, and a compatibility layer that retains some functionality while keeping it from being able to access app data with high level permissions like it would normally do on a vanilla Android phone.
  • 51 Stimmen
    13 Beiträge
    17 Aufrufe
    jimmydoreisalefty@lemmy.worldJ
    It is a possibility. Thanks for the input!
  • 275 Stimmen
    134 Beiträge
    50 Aufrufe
    S
    Wait until AI reduces it to just owners.
  • San Francisco crypto founder faked his own death

    Technology technology
    10
    1
    98 Stimmen
    10 Beiträge
    43 Aufrufe
    S
    My head canon is that Satoshi Nakamoto... ... is Hideo Kojima. Anyway, Satoshi is the pseudonym used on the original... white paper, design doc, whatever it was, for Bitcoin. There's no doubt about that, I was there back before even Mt. Gox became a bitcoin exchange, on the forums discussing it. I thought it was a neat idea, at the time... and then I realized 95% of the discussions on that forum were about 'the ethics of fully informed ponzi schemes' and such, very little devoted to actual technical development... realized this was probably a bad omen.
  • 44 Stimmen
    4 Beiträge
    26 Aufrufe
    G
    It varies based on local legislation, so in some places paying ransoms is banned but it's by no means universal. It's totally valid to be against paying ransoms wherever possible, but it's not entirely black and white in some situations. For example, what if a hospital gets ransomed? Say they serve an area not served by other facilities, and if they can't get back online quickly people will die? Sounds dramatic, but critical public services get ransomed all the time and there are undeniable real world consequences. Recovery from ransomware can cost significantly more than a ransom payment if you're not prepared. It can also take months to years to recover, especially if you're simultaneously fighting to evict a persistent (annoyed, unpaid) threat actor from your environment. For the record I don't think ransoms should be paid in most scenarios, but I do think there is some nuance to consider here.
  • 0 Stimmen
    2 Beiträge
    18 Aufrufe
    B
    ... robo chomo?