Skip Navigation

Posts
203
Comments
1747
Joined
5 yr. ago

Black belt in Mikado, Photo model, for the photos where they put under 'BEFORE'

  • Yes, you can zoom in to even your HD sectors.

  • Well, one thing are TV sats and way other communication and military sats. That you can have hundreds of TV channels for free with an cheap sat reciever and parabolic is certainly nothing new

  • Also for devs, because you can see even the guts of the OS and files.

  • Yes, I know, it's a very old app, but still maintaned (last update in february this year) and working as shown in the Video in current OSs. I post it because it is worth to remember the existence of this unique gem, still without anything similar.

  • No, I think that it has nothing to do with it, complete different concept and use. Prezi is a tool to create presentacions (paid soft), Eagle Mode is an File/system explorer with ZUI, FLOSS. See Video.

  • Old but gold. Nothing similar out there

  • I wonder, if hackers with scarce means were able to access the communications, how much could the hackers and secret services do that did not warn of this breach?

  • Because protecting our childrens, I think.

  • Child abuse, terrorism, national security were always a good alibi for surveillance and control, while pedofiles, terrorists and criminals in the goverment, destroying the national security and basic rights, wishing us to eat cakes.

  • My old Nokia is still in a drawer, I think with somewhat charge in it. Enough for what I use a phone.

  • No problems here, URLvoid and Webbkoll don't show any security issue, Limewire is a legit site. For sure a false positive of one of the uBO filters

  • The positive side

  • (Fucking paywall article)

    Summary

    A catastrophic data breach at Discord's third-party vendor Zendesk has exposed sensitive user information, including ID documents and selfies uploaded for age verification[1][2]. At least 70,000 people were impacted by the breach, with hackers leaking users' driver's licenses, approximate locations, real names, and emails[^2].

    The hackers are attempting to extort Discord and have already shared leaked selfies of users posing with their IDs in a Telegram group, along with a spreadsheet containing detailed information on a thousand users[^2].

    This breach validates critics' concerns about tech companies collecting sensitive identity documents, particularly in light of recent age verification requirements in countries like the UK[2]. As one security expert notes in Gadgeteer, "a password is easy to change, but an ID document is often a nightmare to change, and the ID number anyway stays the same"[4].

    Discord says it is working with affected users and authorities but won't give in to the hackers' demands[^2].

    [1]: [404 Media - The Discord Hack is Every User's Worst Nightmare](https://www.404media.co/the-discord-hack-is-every-users-worst-nightmare/) [2]: The Flagship Eclipse - Discord Suffers Major Hack Making Users' Worst Nightmare Come True [^4]: Gadgeteer - The Discord Hack is Every User's Worst Nightmare — Why Uploaded IDs are a Problem

  • Yes, iy's always to use with a grain of salt. As said, it ads a security layer, but can be an privacy hole, despte that mail directions are easier to track as phone numbers, at least in the EU, you can't be mapped back to an user, this is only possible in crime investigations by the police with an court order. Mail adresses on the other hand are unique identifiers which are way easier th track, except you use an disposable mail or alias. Anyway, eg.in Vivaldi 2FA is safe and apart optional, as also the account itself, only needed when you want to use sync or the use of Vivaldimail, blog and other services it offers. In much other services it's also only an option.

  • 2FA is an important security layer, if the service, after sending you the activating SMS with the code, delete your number (normal in serious services), it's also not an privacy problem. In big us corporations on the other hand, it is, eg.Google store tour number and also probably share it, there 2FA is not an option. Instead a number, some services also admit alternatively a second e-mail account to receive the activation code, there, if you have doubt, you can use an disposable mail, so there isn't any privacy problem.

  • You can find it in HuggingFace.

    Apertus is designed with transparency at its core, thereby ensuring full reproducibility of the training process. Alongside the models, the research team has published a range of resources: comprehensive documentation and source code of the training process and datasets used, model weights including intermediate checkpoints – all released under a permissive open-source license, which also allows for commercial use. The terms and conditions are available via Hugging Face. ​Apertus was developed with due consideration to Swiss data protection laws, Swiss copyright laws, and the transparency obligations under the EU AI Act. Particular attention has been paid to data integrity and ethical standards: the training corpus builds only on data which is publicly available. It is filtered to respect machine-readable opt-out requests from websites, even retroactively, and to remove personal data, and other undesired content before training begins.

    You can use it here (optional free account).

    Review:

    Apertus truly delivers on its transparency promises, representing one of the most open and transparent LLM projects to date. The philosophy has been “open at every level,” backed by concrete actions that set new standards for AI transparency.

  • It's always business, irrelevant if you sell petrol or solar cells. But last is way better for the environment, while fossil fuel destroy it.

  • Deleted

    Permanently Deleted

    Jump
  • The onion network was made by the secret service and the military of the US, and all its servers. It is still used by those for intern communication and also controlled its traffic. More than 2000 sites raided by the authorities every year, show that it has few to do with security to use it, precisely because it is used by all kind of criminal activity. This is why eg, drugbarons nowadays prefer to use P2P comunication or simply pencil and paper. As aid, the future isn't the Onion, it's i2p or other decentralized networks.

  • Memes @lemmy.ml

    Ah, OK

  • Memes @lemmy.ml

    Understanding Art

  • Open Source @lemmy.ml

    FilePizza - Your files, delivered.

    file.pizza
  • Memes @lemmy.ml

    The law is the law

  • Memes @lemmy.ml

    Dear God

  • Memes @lemmy.ml

    Contextual ads

  • Memes @lemmy.ml

    Raid

  • Memes @lemmy.ml

    I've questions

  • Memes @lemmy.ml

    I have a slight suspicion that it is a scam

  • Memes @lemmy.ml

    Diet tip

  • Memes @lemmy.ml

    Calligraphy

  • Memes @lemmy.ml

    Success

  • Memes @lemmy.ml

    Good Idea

  • Memes @lemmy.ml

    Why still using the imperial system?

    abananaforscale.com
  • Memes @lemmy.ml

    Essential for this Easter

  • Open Source @lemmy.ml

    www.blender.org /press/blender-4-1-release/
  • Privacy @lemmy.ml

    Google's new AI search results promotes sites pushing malware, scams

    www.bleepingcomputer.com /news/google/googles-new-ai-search-results-promotes-sites-pushing-malware-scams/
  • Memes @lemmy.ml

    Beercycling

  • Memes @lemmy.ml

    Another Advertising

  • Memes @lemmy.ml

    How to act correctly in the supermarket