Skip to content

EU age verification app to ban any Android system not licensed by Google

Technology
108 69 6
  • 26 Stimmen
    11 Beiträge
    50 Aufrufe
    F
    Absolute horseshit. Bulbs don't have microphones. If they did, any junior security hacker could sniff out the traffic and post about it for cred. The article quickly pivots to TP-Link and other devices exposing certificates. That has nothing to do with surveillance and everything to do with incompetent programming. Then it swings over to Matter and makes a bunch of incorrect assertion I don't even care to correct. Also, all the links are to articles on the same site, every single one of which is easily refutable crap. Yes, there are privacy tradeoffs with connected devices, but this article is nothing but hot clickbait garbage.
  • 'I've been turned into an AI train announcer - and no one told me'

    Technology technology
    15
    318 Stimmen
    15 Beiträge
    86 Aufrufe
    S
    Yes, the use of the voice was intentionally misleading. That's why it was decided the way it was.
  • 349 Stimmen
    72 Beiträge
    393 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • 229 Stimmen
    10 Beiträge
    60 Aufrufe
    S
    The result now is that no website will load because the rest of the world will have broadband anyway
  • 74 Stimmen
    13 Beiträge
    66 Aufrufe
    B
    This appears to just be a compilation of other leaks: https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/ Still not a bad idea to change passwords and make sure MFA is enabled.
  • 103 Stimmen
    39 Beiträge
    189 Aufrufe
    P
    This “study” is biased by design. But also even if it weren’t , one study does not prove anything. You’d need a lot more evidence than that.
  • Atom-Thin Tech Replaces Silicon in the World’s First 2D Computer

    Technology technology
    18
    1
    125 Stimmen
    18 Beiträge
    101 Aufrufe
    L
    The 'laptop' is s conceptual illustration. The image shown on the laptop screen is an actual SEM image.
  • 236 Stimmen
    80 Beiträge
    400 Aufrufe
    R
    Yeah, but that's a secondary attribute. The new ones are stupid front and center.