Skip to content

matrix is cooked

Technology
75 33 192
  • 255 Stimmen
    38 Beiträge
    43 Aufrufe
    F
    A whole article about how terrible this is, then towards the end they got clarification from Google and, surprise surprise, it was all an overreaction and they were fear mongering. “This update is good for users: they can now use Gemini to complete daily tasks on their mobile devices like send messages, initiate phone calls, and set timers while Gemini Apps Activity is turned off. With Gemini Apps Activity turned off, their Gemini chats are not being reviewed or used to improve our AI models. It’s just giving Gemini more local assistant abilities.
  • video gen error

    Technology technology
    8
    2
    3 Stimmen
    8 Beiträge
    30 Aufrufe
    H
    Sorry what? You mean post to technology@lemmy.world?
  • 29 Stimmen
    7 Beiträge
    32 Aufrufe
    Z
    GOP = Group of Pedophiles
  • Could Windows and installed apps upload all my personal files?

    Technology technology
    2
    1 Stimmen
    2 Beiträge
    15 Aufrufe
    rikudou@lemmings.worldR
    Yes, every application has access to everything. The only exception are those weird apps that use the universal framework or whatever that thing is called, those need to ask for permissions. But most of the apps on your PC have full access to everything. And Windows does collect and upload a lot of personal information and they could easily upload everything on your system. The same of course applies for the apps as well, they have access to everything except privileged folders (those usually don't contain your personal data, but system files).
  • Bill Gates and Linus Torvalds meet for the first time.

    Technology technology
    44
    2
    441 Stimmen
    44 Beiträge
    185 Aufrufe
    ?
    That must have taken some diplomacy, but it would have been even more impressive to have convinced Stallman to come too
  • A receipt printer cured my procrastination [ADHD]

    Technology technology
    21
    1
    120 Stimmen
    21 Beiträge
    93 Aufrufe
    cygnosis@lemmy.worldC
    Good to know. Also an easy problem to fix. Just use phenol free paper.
  • Best MS Office 365 Services in Saudi Arabia for Businesses

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • 141 Stimmen
    4 Beiträge
    22 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]