Technology
- Technology@Beehaw.org, Community Culture, and Moderation
Hey Beeple and visitors to Beehaw: I think we need to have a discussion about !technology@beehaw.org, community culture, and moderation. First, some of the reasons that I think we need to have this conversation.
- Technology got big fast and has stayed Beehaw's most active community.
- Technology gets more reports (about double in the last month by a rough hand count) than the next highest community that I moderate (Politics, and this is during election season in a month that involved a disastrous debate, an assassination attempt on a candidate, and a major party's presumptive nominee dropping out of the race)
- For a long time, I and other mods have felt that Technology at times isn’t living up to the Beehaw ethos. More often than I like I see comments in this community where users are being abusive or insulting toward one another, often without any provocation other than the perception that the other user’s opinion is wrong.
Because of these reasons, we have decided that we may need to be a little more hands-on with our moderation of Technology. Here’s what that might mean:
- Mods will be more actively removing comments that are unkind or abusive, that involve personal attacks, or that just have really bad vibes. a. We will always try to be fair, but you may not always agree with our moderation decisions. Please try to respect those decisions anyway. We will generally try to moderate in a way that is a) proportional, and b) gradual. b. We are more likely to respond to particularly bad behavior from off-instance users with pre-emptive bans. This is not because off-instance users are worse, or less valuable, but simply that we aren't able to vet users from other instances and don't interact with them with the same frequency, and other instances may have less strict sign-up policies than Beehaw, making it more difficult to play whack-a-mole.
- We will need you to report early and often. The drawbacks of getting reports for something that doesn't require our intervention are outweighed by the benefits of us being able to get to a situation before it spirals out of control. By all means, if you’re not sure if something has risen to the level of violating our rule, say so in the report reason, but I'd personally rather get reports early than late, when a thread has spiraled into an all out flamewar. a. That said, please don't report people for being wrong, unless they are doing so in a way that is actually dangerous to others. It would be better for you to kindly disagree with them in a nice comment. b. Please, feel free to try and de-escalate arguments and remind one another of the humanity of the people behind the usernames. Remember to Be(e) Nice even when disagreeing with one another. Yes, even Windows users.
- We will try to be more proactive in stepping in when arguments are happening and trying to remind folks to Be(e) Nice. a. This isn't always possible. Mods are all volunteers with jobs and lives, and things often get out of hand before we are aware of the problem due to the size of the community and mod team. b. This isn't always helpful, but we try to make these kinds of gentle reminders our first resort when we get to things early enough. It’s also usually useful in gauging whether someone is a good fit for Beehaw. If someone responds with abuse to a gentle nudge about their behavior, it’s generally a good indication that they either aren’t aware of or don’t care about the type of community we are trying to maintain.
I know our philosophy posts can be long and sometimes a little meandering (personally that's why I love them) but do take the time to read them if you haven't. If you can't/won't or just need a reminder, though, I'll try to distill the parts that I think are most salient to this particular post:
- Be(e) nice. By nice, we don't mean merely being polite, or in the surface-level "oh bless your heart" kind of way; we mean be kind.
- Remember the human. The users that you interact with on Beehaw (and most likely other parts of the internet) are people, and people should be treated kindly and in good-faith whenever possible.
- Assume good faith. Whenever possible, and until demonstrated otherwise, assume that users don't have a secret, evil agenda. If you think they might be saying or implying something you think is bad, ask them to clarify (kindly) and give them a chance to explain. Most likely, they've communicated themselves poorly, or you've misunderstood. After all of that, it's possible that you may disagree with them still, but we can disagree about Technology and still give one another the respect due to other humans.
- Recall: Microsoft re-launches ‘privacy nightmare’ AI screenshot toolwww.bbc.com Microsoft to re-launch ‘privacy nightmare’ AI screenshot tool
It says it has listened to concerns about the tool, which continuously screenshots online activity.
Microsoft says it has “listened to feedback” following a privacy row over a new tool which takes regular screenshots of users’ activity.
It was labelled a potential “privacy nightmare” by critics when it was unveiled in May 2024 - prompting the tech giant to postpone its release. It now plans to relaunch the artificial intelligence (AI) powered tool in November on its new CoPilot+ computers.
[...]
When it initially announced the tool at its developer conference in May, Microsoft said it used AI "to make it possible to access virtually anything you have ever seen on your PC", and likened it to having photographic memory. It said Recall could search through a users' past activity, including their files, photos, emails and browsing history.
[...]
But critics quickly raised concerns, given the quantity of sensitive data the system would harvest, with one expert labelling it a potential “privacy nightmare."
[...]
[Pavan Davuluri, Microsoft's corporate vice president of Windows and devices says] that "Windows offers tools to help you control your privacy and customise what gets saved for you to find later".
However a technical blog about it states that “diagnostic data” from the tool may be shared with the firm depending on individual privacy settings.
[Microsoft says in a blog post that users can remove Recall entirely by using the optional features settings in Windows.]
- OpenAI, the company that brought you ChatGPT, just sold you outwww.vox.com OpenAI as we knew it is dead
The maker of ChatGPT promised to share its profits with the public. But Sam Altman just sold you out.
Since its founding in 2015, its leaders have said their top priority is making sure artificial intelligence is developed safely and beneficially. They’ve touted the company’s unusual corporate structure as a way of proving the purity of its motives. OpenAI was a nonprofit controlled not by its CEO or by its shareholders, but by a board with a single mission: keep humanity safe.
But this week, the news broke that OpenAI will no longer be controlled by the nonprofit board. OpenAI is turning into a full-fledged for-profit benefit corporation. Oh, and CEO Sam Altman, who had previously emphasized that he didn’t have any equity in the company, will now get equity worth billions, in addition to ultimate control over OpenAI.
In an announcement that hardly seems coincidental, chief technology officer Mira Murati said shortly before that news broke that she was leaving the company. Employees were so blindsided that many of them reportedly reacted to her abrupt departure with a “WTF” emoji in Slack.
WTF indeed.
- The Mozilla Graveyardwww.spacebar.news The Mozilla Graveyard
A look back at 20 dead Mozilla and Firefox products, from smartphones to VR games.
- Why a Helium Leak Disabled Every iPhone in a Medical Facilitywww.vice.com Why a Helium Leak Disabled Every iPhone in a Medical Facility
The bizarre incident happened during the installation of an MRI machine and was a surprise to everyone except Apple.
- Microsoft’s hypocrisy on AI: can artificial intelligence really enrich fossil-fuel companies and fight climate change at the same time? The tech giant says yes.www.theatlantic.com Microsoft’s Hypocrisy on AI
Can artificial intelligence really enrich fossil-fuel companies and fight climate change at the same time? The tech giant says yes.
[...] as Microsoft attempts to buoy its reputation as an AI leader in climate innovation, the company is also selling its AI to fossil-fuel companies. [...] the tech giant has sought to market the technology to companies such as ExxonMobil and Chevron as a powerful tool for finding and developing new oil and gas reserves and maximizing their production—all while publicly committing to dramatically reduce emissions.
Although tech companies have long done business with the fossil-fuel industry, Microsoft’s case is notable. It demonstrates how the AI boom contributes to one of the most pressing issues facing our planet today—despite the fact that the technology is often lauded for its supposed potential to improve our world, as when Sam Altman testified to Congress that it could address issues such as “climate change and curing cancer.”
[...]
For years, Microsoft routinely promoted its work with companies such as Schlumberger, Chevron, Halliburton, ExxonMobil, Baker Hughes, and Shell. Around 2020, the same year Microsoft made ambitious climate commitments that included a goal to reach carbon negativity by 2030, the tech firm grew quieter about such partnerships and focused on messaging about the transition to net zero. Behind the scenes, Microsoft has continued to seek business from the fossil-fuel industry; documents related to its overall pitch strategy show that it has sought energy-industry business in part by marketing the abilities to optimize and automate drilling and to maximize oil and gas production. Over the past year, it has leaned into the generative-AI rush in an effort to clinch more deals—each of which can be worth more than hundreds of millions of dollars. Microsoft employees have noted that the oil and gas industries could represent a market opportunity of $35 billion to $75 billion annually, according to documents I viewed.
[...]
From a business perspective, of course, Microsoft’s pursuit of massive deals with fossil-fuel companies makes sense. And such partnerships do not necessarily mean that the company is contradicting its climate commitments. Microsoft executives have made the case that AI can also help fossil-fuel companies improve their environmental footprint.
[...]
The idea that AI’s climate benefits will outpace its environmental costs is largely speculative, however, especially given that generative-AI tools are themselves tremendously resource-hungry. Within the next six years, the data centers required to develop and run the kinds of next-generation AI models that Microsoft is investing in may use more power than all of India. They will be cooled by millions upon millions of gallons of water. All the while, scientists agree, the world will get warmer, its climate more extreme.
[...]
Microsoft isn’t a company that exists to fight climate change, and it doesn’t have to assume responsibility for saving our planet. Yet the company is trying to convince the public that by investing in a technology that is also being used to enrich fossil-fuel companies, society will be better equipped to resolve the environmental crisis. Some of the company’s own employees described this idea to me as ridiculous. To these workers, Microsoft’s energy contracts demonstrate only the unsavory reality of how the company’s AI investments are actually used.
[...]
- After is a new dating app that tries to tackle ghostingtechcrunch.com After is a new dating app that tries to tackle ghosting | TechCrunch
A new dating app called After is launching in Austin, Texas on Thursday with the mission of tackling ghosting and holding people accountable.
a few interesting ideas in here, but also a few weird ideas and ideas i don't think are going to work at all. (also i'm not sure it's actually possible to build a "good" dating app.)
> What sets the app apart from the rest of the dating app scene is that After requires users to share why they have unmatched a person before they are allowed to keep swiping. The idea behind the feature is to get rid of abrupt disconnections and confusion.
> If two people match on After and start a conversation, but one person stops replying, they will be nudged to respond. If the person still doesn’t message the other user, the match expires. Before they can use the app’s features again, they need to choose a reason why they let the match expire.
> Users can choose from a list of reasons to explain why they decided to stop responding. For instance, they can say distance was an issue or that the vibes didn’t match. After will then create a kind message and send it to the other person, and remind them that this isn’t a representation of who they are or their worth.
> After will soon include opt-in mental health check-ins where you can reflect on your mood and feelings. And if the app thinks you have been using it too much, it will suggest that you take a break.
- OpenAI planning to become for-profit company, say reports | OpenAIwww.theguardian.com OpenAI planning to become for-profit company, say reports
Reported move follows recent departure of senior figures from ChatGPT developer
- Critical Unauthenticated RCE Flaws in CUPS Printing Systemsblog.qualys.com Critical Unauthenticated RCE Flaws in CUPS Printing Systems | Qualys Security Blog
A critical set of unauthenticated Remote Code Execution (RCE) vulnerabilities in CUPS, affecting all GNU/Linux systems and potentially others, was disclosed today. These vulnerabilities allow a remote…
- Now Dell sales staff must be onsite five days per week • The Registerwww.theregister.com Now Dell sales staff must be onsite five days per week
Return-to-office mandate reaches inevitable conclusion
- Intel finds cause of overheating CPUs, provides another BIOS updatewww.pcworld.com Intel finds cause of overheating CPUs, provides another BIOS update
Intel just identified a fourth cause for problematic 13th and 14th Gen CPUs. Get the BIOS update as soon as you can.
- Top EU Court’s Advisor Explains Why Video Game Cheats Are Not Copyright Infringementwww.techdirt.com Top EU Court’s Advisor Explains Why Video Game Cheats Are Not Copyright Infringement
One of the reasons that today’s copyright is such a bad fit for the modern digital world is that its roots lie deep in 18th-century law and analogue objects like books. This fact has created a kind…
- FTC sues five AI outfits – and one case raises questions • The Registerwww.theregister.com FTC sues five AI outfits – and one case raises questions
From allegations of lying about capabilities to fake reviews. Plus: Biden AI robocaller finally fined $6M
- Archaeologists use AI to discover 303 unknown geoglyphs near Nazca Lineswww.theguardian.com Archaeologists use AI to discover 303 unknown geoglyphs near Nazca Lines
Newly discovered figures dating back to 200BCE nearly double the number of known geoglyphs at enigmatic site
- Russia blocked OONI Explorer, a large open dataset on Internet censorshipooni.org Russia blocked OONI Explorer, a large open dataset on Internet censorship
This report documents the blocking of OONI Explorer in Russia based on OONI data.
OONI Explorer is one of the largest open datasets on internet censorship around the world. We first launched this web platform back in 2016 with the goal of enabling researchers, journalists, and human rights defenders to investigate internet censorship based on empirical network measurement data that is contributed by OONI Probe users worldwide. Every day, we publish new measurements from around the world in real-time.
Today, OONI Explorer hosts more than 2 billion network measurements collected from 27 thousand distinct networks in 242 countries and territories since 2012. Out of all countries, OONI Probe users in Russia contribute the second largest volume of measurements (following the U.S, where OONI Probe users contribute the most measurements out of any country). This has enabled us to study various cases of internet censorship in Russia, such as the blocking of Tor, the blocking of independent news media websites, and how internet censorship in Russia changed amid the war in Ukraine.
- Blackstone bets £10B on AI with UK datacenter development • The Registerwww.theregister.com Blackstone bets £10B on AI with UK datacenter development
Construction slated to begin next year at site of failed BritishVolt plant
- Bizarre and Hilarious Studies That Won Ig Nobel Prize In 2024 (One Is Mindblowing) by [Anton Petrov, YouTube]
YouTube Video
Click to view this content.
Video Description:
---
Hello and welcome! My name is Anton and in this video, we will talk about 10 exciting studies that won the Ig Nobel prize in 2024
Links:
- psycnet.apa.org/doiLanding?doi=10.1037/h0045345
- linkinghub.elsevier.com/retrieve/pii/S0022030241954061
- sciencedirect.com/science/article/abs/pii/S2468785523002859?via=ihub
- science.org/doi/10.1126/sciadv.abj7918
- tandfonline.com/doi/full/10.1080/15592324.2021.1977530#abstract
- academic.oup.com/brain/article-abstract/147/8/2643/7664309?redirectedFrom=fulltext
- cell.com/current-biology/fulltext/S0960-9822(22)00709-6?_returnURL=https://linkinghub.elsevier.com/retrieve/pii/S0960982222007096?showall=true
- arxiv.org/abs/2310.04153
- biorxiv.org/content/10.1101/704080v3
- Placebo video: youtube.com/watch?v=ByA4i8PlfFs&t=0s
#ignobel #nobel #science
0:00 Levitating frogs 0:40 Ig Nobel Prize 1:30 These are actually important studies 2:45 Pigeons in missiles 3:32 Cows cats and paper bags 4:11 Hair whirls and direction 5:04 Drunk worms 5:32 Mimic plant 6:58 Placebo and pain 7:48 Dead trout and swimming 8:10 Butt breathing mammals 9:05 Probability and lots of coins 9:50 Old people may be not so old
- Chinese hackers infiltrate U.S. internet providers in cyber espionage campaignthehackernews.com Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign
Chinese hackers breach US internet providers, targeting sensitive data and critical infrastructure. Government responds as cybersecurity concerns esca
Nation-state threat actors backed by Beijing broke into a "handful" of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall Street Journal reported Wednesday.
The activity has been attributed to a threat actor that Microsoft tracks as Salt Typhoon, which is also known as FamousSparrow and GhostEmperor.
"Investigators are exploring whether the intruders gained access to Cisco Systems routers, core network components that route much of the traffic on the internet," the publication was quoted as saying, citing people familiar with the matter.
The end goal of the attacks is to gain a persistent foothold within target networks, allowing the threat actors to harvest sensitive data or launch a damaging cyber attack.
- Covert Racism in AI: How Language Models Are Reinforcing Outdated Stereotypeshai.stanford.edu Covert Racism in AI: How Language Models Are Reinforcing Outdated Stereotypes
Despite advancements in AI, new research reveals that large language models continue to perpetuate harmful racial biases, particularly against speakers of African American English.
- U.S. to ban Chinese, Russian software and hardware used in autonomous vehiclesapnews.com Ban sought for Chinese, Russian software and hardware used in autonomous vehicles on US roads
The Commerce Department said Monday it’s seeking a ban on the sale of connected and autonomous vehicles in the U.S. that are equipped with Chinese and Russian software and hardware with the stated goal of protecting national security and U.S. drivers.
The Commerce Department said Monday it’s seeking a ban on the sale of connected and autonomous vehicles in the U.S. that are equipped with Chinese and Russian software and hardware with the stated goal of protecting national security and U.S. drivers.
[...]
The measure announced Monday is proactive but critical, the agency said, given that all the bells and whistles in cars like microphones, cameras, GPS tracking and Bluetooth technology could make Americans more vulnerable to bad actors and potentially expose personal information, from the home address of drivers, to where their children go to school.
In extreme situations, a foreign adversary could shut down or take simultaneous control of multiple vehicles operating in the United States, causing crashes and blocking roads, U.S. Secretary of Commerce Gina Raimondo told reporters on a call Sunday.
“This is not about trade or economic advantage,” Raimondo said. “This is a strictly national security action. The good news is right now, we don’t have many Chinese or Russian cars on our road.”
But Raimondo said Europe and other regions in the world where Chinese vehicles have become commonplace very quickly should serve as “a cautionary tale” for the U.S.
Security concerns around the extensive software-driven functions in Chinese vehicles have arisen in Europe, where Chinese electric cars have rapidly gained market share.
“Who controls these data flows and software updates is a far from trivial question, the answers to which encroach on matters of national security, cybersecurity, and individual privacy,” Janka Oertel, director of the Asia program at the European Council on Foreign Relations, wrote on the council’s website.
[...]
A senior administration official said that it is clear from terms of service contracts included with the technology that data from vehicles ends up in China.
Raimondo said that the U.S. won’t wait until its roads are populated with Chinese or Russian cars.
[...]
The proposed rule would prohibit the import and sale of vehicles with Russia and China-manufactured software and hardware that would allow the vehicle to communicate externally through Bluetooth, cellular, satellite or Wi-Fi modules. It would also prohibit the sale or import of software components made in Russia or the People’s Republic of China that collectively allow a highly autonomous vehicle to operate without a driver behind the wheel. The ban would include vehicles made in the U.S. using Chinese and Russian technology.
[...]
The new rule follows steps taken earlier this month by the Biden administration to crack down on cheap products sold out of China, including electric vehicles, expanding a push to reduce U.S. dependence on Beijing and bolster homegrown industry.
- Terabox Download Your 2024 Guide to Free Cloud Storageteraboxlapp.com Terabox Download Your 2024 Guide To Free Cloud Storage
a free cloud storage space for you by the name terabox download ejoy unlimited storage space free of cost.
Managing and securing our personal and professional data in the digital presence has become more critical and challenging than ever. With increasing data being created daily, individuals and businesses need reliable and efficient cloud storage solutions. You can stay on this informative guide to get more advanced information about Terabox.
Terabox download is a prominent cloud storage space solution offering 1TB of free cloud storage space. This detailed guide will help you download terabox and install it and the usage process for terabox download. It will provide best practices to make the most of this compatible and elegant powerful storage solution.
What Is Terabox?
Before we discuss terabox download, let’s discuss what terabox is. Terabox is a cloud storage space that provides 1TB (1024GB) of free storage space, a feature that distinguishes it from many of its competitors, who offer far less free storage space. This platform is for individuals and businesses, and users benefit from both. It also offers a simple, attractive interface and high-security features.
Why choose Download Terabox?
Downloading the terabox app provides several benefits. We will discuss some of them here.
1-Offline Access: you can access offline files without a data connection or wifi.
2-Enhance Performance: This app is optimised for your device’s better performance and operates at a perfect speed.
3-Convenient: You can upload any data directly from your PC or mobile at any time, with any file size.
How to download Terabox?
Here are some steps to download terabox for devices like PCs and Android.
Download terabox for PC:
TERABOX FOR PC
Boost your laptop or PC storage by downloading Terabox for Windows and following the simple page guide provided for your desktop.
-
Open the internet browser and search for Terabox Download For PC.
-
After visiting the site you will see a download button top on the download button.
-
Typing on the download button here. One is downloaded for mobile, and the other for Windows top pon download for Windows.
-
An Excel file will be downloaded on your PC LopTap after you click on it.
-
After clicking, the app will be installed, and a pop-up will appear top yes.
-
a sign-up or log-in page will open on your screen by clicking yes here. Enjoy unlimited free storage on your laptop/PC.
If you already have an account, log in. If not, create one to access unlimited cloud storage.
Download Terabox for mobile.
Get the TeraboxL app from teraboxlapp.com by following our simple guide for any easy download and access to the premium feature.
-
You will find our site after searching for the Teraboxl App in your mobile internet browser.
-
While you visit the site, there will be a Download Button Top them button.
-
Now you will see 2 more buttons: Mobile Download and PC download
-
Click on the mobile Download, which will be downloaded in your mobile file manager.
-
Open your mobile settings and search for Unknown Sources. Tap allow.
-
Find the downloaded file in your file manager and top to install it.
-
The file will be installed.
If you already have an account, log in. Otherwise, create one by selecting Create an account using your email to access the TeraboxL app.
Latest Security Improvements of terabox download
You can fully trust Terabox’s latest security feature, allowing you to safely store videos, photos, or other data. Download the premium versions to enjoy extra free storage space with confidence.
Here are some security features of Terabox.
1-Privacy policies
2-Two factor authentication
3-Encryption
Terabox provides a beautiful solution for cloud storage space free of cost with premium features enabled. by downloading Tera Box you can boost your storage space up to 1024GB and your device will perform better by installing Terabox you can save your data for no time limit free of cost by installing terabox.
-
- Do I really need DOCSIS 3.1 modem?
I’m not sure where else best to post this, so please direct me if there is somewhere more appropriate.
I’m looking at getting cable again and still have a DOCSIS 3.0 modem. It looks like the biggest limiting factor is the speed but there are other mentions of “improved latecy and power comsumption.” If I’m not get a speed that exceeds 1Gbps, is the latency that much better for $160? I game a little online but hadnt noticed an issue in the past.
For that matter, is an AC wireless router is fine? The AX or Wifi 6 looked neat, but I’m just not sure the benfits are worth the cost. Any input is appreciated.
- Instander APK Download Latest Version ( V18.0) 2024instandrrapk.com Instander APK Download Latest Version ( V18.0) 2024
Instander apk is a modified Instagram program that detects ad browsing and copying, while also offering access to high-quality videos, photos, TV, stories, and reels.
> Instander apk is a modified Instagram program that detects ad browsing and copying, while also offering access to high-quality videos, photos, TV, stories, and reels.
How to Download and Install Instander APK Since Instander APK isn't available on the Google Play Store, you'll need to follow these steps to download and install it safely:
Download the APK: Visit a trusted source to download the latest version of Instander APK. Enable Unknown Sources: Before installing, go to your phone’s settings and enable “Install from Unknown Sources” to allow APK installations. Install the APK: Once downloaded, open the file and follow the on-screen prompts to complete the installation. Log in and Enjoy: Open the app, log in with your Instagram credentials, and enjoy the extra features!
- DEF CON 32 - Disenshittify or die! How hackers can seize the means of computation - Cory Doctorow
YouTube Video
Click to view this content.
cross-posted from: https://jlai.lu/post/10771035, https://jlai.lu/post/10771034
> Personal review: > > A good recap of his previous writings and talks on the subject for the first third, but a bit long. Having paid attention to them for the past year or two, my attention started drifting a few times. I ended up being more impressed with how much he's managed to condense explaining "enshittification" from 45+ minutes down to around 15. > > As soon as he starts building off of that to work towards the core of his message for this talk, I was more-or-less glued to the screen. At first because it's not exactly clear where he's going, and there are (what felt like) many specific court rulings to keep up with. Thankfully, once he has laid enough groundwork he gets straight his point. I don't want to spoil or otherwise lessen the performance he gives, so I won't directly comment on what his point is in the body of this post - I think the comments are better suited for that anyways. > > I found the rest to be pretty compelling. He rides the fine line between directionless discontent and overenthusiastic activist-with-a-plan as he doubles down on his narrative by calling back to the various bits of groundwork he laid before - now that we're "in" on the idea, what felt like stumbling around in the dark turns into an illuminating path through some of the specifics of the last twenty to forty years of the dynamics of power between tech bosses and their employees. The rousing call to action was also great way to end and wrap it all up. > > I've become very biased towards Cory Doctorow's ideas, in part because they line up with a lot of the impressions I have from my few years working as a dev in a big-ish multinational tech company. This talk has done nothing to diminish that bias - on the contrary.
- U.S.: Chinese state-sponsored spies spent 4 months in aerospace firm’s server
cross-posted from: https://feddit.org/post/3122226
> Archived link > > Chinese state-sponsored spies have been spotted inside a global engineering firm's network, having gained initial entry using an admin portal's default credentials on an IBM AIX server. > > Binary Defense's Director of Security Research John Dwyer said the cyber snoops first compromised one of the victim's three unmanaged AIX servers in March, and remained inside the US-headquartered manufacturer's IT environment for four months while poking around for more boxes to commandeer. > > It's a tale that should be a warning to those with long- or almost-forgotten machines connected to their networks; those with shadow IT deployments; and those with unmanaged equipment. While the rest of your environment is protected by whatever threat detection you have in place, these legacy services are perfect starting points for miscreants. > > [...] > > This particular company, which Dwyer declined to name, makes components for public and private aerospace organizations and other critical sectors, including oil and gas. The intrusion has been attributed to an unnamed People's Republic of China team, whose motivation appears to be espionage and blueprint theft. > > [...]
- Tech Bros Inventing Things That Already Exist
YouTube Video
Click to view this content.
I'm sure everyone in this community is already familiar with the concept that this video is presenting, and might even already know all of the examples he gives. But I got a laugh out of it, and I love his presentation style.
- Headlamp tech that doesn’t blind oncoming drivers—where is it?arstechnica.com Headlamp tech that doesn’t blind oncoming drivers—where is it?
The US is a bit of a backwater for automotive lighting technology.
cross-posted from: https://lemmy.world/post/20028344
> >Despite US dominance in so many different areas of technology, we're sadly somewhat of a backwater when it comes to car headlamps. It's been this way for many decades, a result of restrictive federal vehicle regulations that get updated rarely. The latest lights to try to work their way through red tape and onto the road are active-matrix LED lamps, which can shape their beams to avoid blinding oncoming drivers. > > > >From the 1960s, Federal Motor Vehicle Safety Standards allowed for only sealed high- and low-beam headlamps, and as a result, automakers like Mercedes-Benz would sell cars with less capable lighting in North America than it offered to European customers. > > > >A decade ago, this was still the case. In 2014, Audi tried unsuccessfully to bring its new laser high-beam technology to US roads. Developed in the racing crucible that is the 24 Hours of Le Mans, the laser lights illuminate much farther down the road than the high beams of the time, but in this case, the lighting tech had to satisfy both the National Highway Traffic Safety Administration and the Food and Drug Administration, which has regulatory oversight for any laser products. > > > >The good news is that by 2019, laser high beams were finally an available option on US roads, albeit once the power got turned down to reduce their range. > > > >NHTSA's opposition to advanced lighting tech is not entirely misplaced. Obviously, being able to see far down the road at night is a good thing for a driver. On the other hand, being dazzled or blinded by the bright headlights of an approaching driver is categorically not a good thing. Nor is losing your night vision to the glare of a car (it's always a pickup) behind you with too-bright lights that fill your mirrors. > > > >This is where active-matrix LED high beams come in, which use clusters of controllable LED pixels. Think of it like a more advanced version of the "auto high beam" function found on many newer cars, which uses a car's forward-looking sensors to know when to dim the lights and when to leave the high beams on. > > > >Here, sensor data is used much more granularly. Instead of turning off the entire high beam, the car only turns off individual pixels, so the roadway is still illuminated, but a car a few hundred feet up the road won't be. > > > >Rather than design entirely new headlight clusters for the US, most OEMs' solution was to offer the hardware here but disable the beam-shaping function—easy to do when it's just software. But in 2022, NHTSA relented—nine years after Toyota first asked the regulator to reconsider its stance.
- MAGA World’s Belief In Their Made Up Claim That Biden Is ‘Censoring’ Conservatives On Social Media May Kill KOSAwww.techdirt.com MAGA World’s Belief In Their Made Up Claim That Biden Is ‘Censoring’ Conservatives On Social Media May Kill KOSA
MAGA world’s false belief that Joe Biden is “censoring conservatives” on social media may actually kill the Kids Online Safety Act (KOSA). As we mentioned earlier this week, while KOSA has already …
- We can now watch Grace Hopper’s famed 1982 lecture on YouTubearstechnica.com We can now watch Grace Hopper’s famed 1982 lecture on YouTube
The lecture featured Hopper discussing future challenges of protecting information.
> Hopper's famous 1982 lecture on "Future Possibilities: Data, Hardware, Software, and People," has long been publicly unavailable because of the obsolete media on which it was recorded. The National Archives and Records Administration (NARA) finally managed to retrieve the footage for the National Security Agency (NSA), which posted the lecture in two parts on YouTube.
- [Gamers Nexus] This Case is a Disaster | Tryx LUCA L70 Review
YouTube Video
Click to view this content.
$240 USD for an expensive piece of junk sheeesh
- Coding whiz had another talent: inappropriate insults • The Registerwww.theregister.com Coding whiz had another talent: inappropriate insults
Then he stopped being a coding whiz, which is when the trouble started
- Congress Poised To Bring Back Unfettered Patent Trollingwww.techdirt.com Congress Poised To Bring Back Unfettered Patent Trolling
Have you been missing patent trolls destroying innovation and making products you like more expensive? Have you felt that, maybe, some lawyers who did nothing but send extortionate shakedown letter…
- KOSA Advances Out Of House Committee, But Cracks Are Showingwww.techdirt.com KOSA Advances Out Of House Committee, But Cracks Are Showing
This morning, the House Energy and Commerce Committee held a pretty long markup about KOSA, COPPA 2.0, and other bills. The quick summary is that both of those bills passed out of committee and cou…
- Project for people leaving Google Maps.
cross-posted from: https://feddit.org/post/2989211
> Mastodon Toot. > > Project.
- Mozilla.Social is Shutting Downwedistribute.org Mozilla.Social is Shutting Down
Mozilla has announced that they are officially closing down their Fediverse social instance, to focus on their other efforts.
- What if the panic over teens and tech is totally wrong?www.vox.com What if the panic over teens and tech is totally wrong?
The collective freakout about kids and social media has reached a tipping point.
- House Looks To Make KOSA And COPPA Worsewww.techdirt.com House Looks To Make KOSA And COPPA Worse
If you had that Congress was going to take bad “protect the children” bills and make them worse on your bingo card, congratulations, you’ve won this week’s easiest prediction. This seems like a not…