37396 readers
249 users here now

Rumors, happenings, and innovations in the technology sphere. If it's technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:

This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago

A much needed reminder that Machine Learning and Large Language Models (so called 'AI') is plagiarism, don't necessarily agree it's theft in the strict legal definition (but definitely in the colloquial meaning), but it's definitely immoral and unethical and the used by those that want to contribute nothing themselves.


Am I the only one that thinks Scaringe looks like Steve-O?


A new report unveils the discovery of a technology suite and its connection to Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia. The technology suite is composed of software, Domain Name System (DNS) configurations, website hosting, payment mechanisms, mobile apps, and more—a full cybercrime supply chain.

Tens of seemingly unrelated gambling brands that advertise by way of sponsorship deals with European sports teams use this technology. The owners of these brands prey on residents of Greater China and on victims across the globe to take advantage of the US$1.7 trillion illegal gambling economy.

The report names the actor who designed, developed, and operates this supply chain: Vigorish Viper.


cross-posted from:

Archived link

Preventing so-called technology leakage was top of the European Commission’s agenda when it in late 2023 named quantum technology as one of four critical fields it wanted to protect. Brussels has yet to publish a promised risk assessment, though, says Jeroen Groenewegen-Lau, Head of Program at the Mercator Institute for China Studies (MERICS).

Europe should also increase control over the export of critical components for quantum computers to China. All European countries should follow Spain, France and the UK in declaring these items dual-use, forcing exporters to apply for permits for components that can have military as well as civilian uses. As much equipment is too widely used for control through a dual-use lists, Europe should also add policy tools so that, like the US, it can restrict exports to companies and research institutions known to work against its interests.

Taking a clear stance on the risks of quantum technologies will also enable Europe to better compete in the field. More than in digital technologies like artificial intelligence, Europe is well positioned to profit from the technology’s power – optimizing flight routes or supply chains, simulating chemical and biological processes at the atomic level. Long-term investment in basic quantum research not only led to a Nobel Prize in 2022, but has spawned quantum valleys in München and Lower Saxony, a quantum delta in the Netherlands, and the “QuantAlps” around Grenoble, to name but a few clusters.


Happy BSOD Day!


Steve from Gamers Nexus explicitly states that they "can't recommend Intel CPUs right now" until Intel provides information and assurance to customers

Intel what are you doing? Shit's on fire, yo


Archived link

Half a century ago, a young Stanford professor named Mark Granovetter published what would become one of the seminal papers in the field of sociology. “The Strength of Weak Ties” argued for the important of mere acquaintances — not just your friends — in the growing field of social network analysis. (It’s been cited more than 73,000 times.)

Granovetter surveyed a few hundred people in the Boston area who had recently taken a new job they learned about through a contact. (It’s who you know, right?) It turned out their weak ties — people they reported seeing once a year or less — were responsible for nearly twice as many job discoveries as their closest friends (people they saw twice a week or more).


Granovetter’s insight has been fundamental to the explosion of social networking platforms. Facebook is fundamentally a tool for flattening out all your strongest and weakest ties — from your spouse or sibling all the way to that kid you sat next to for two weeks in fifth grade. They all exist side by side, first-class citizens in your feed. LinkedIn was essentially Granovetter’s research turned into a startup. (Indeed, the strongest empirical support for Granovetter’s thesis is a massive study looking at more than 20 million LinkedIn users.)

So why do your weak links matter so much? One big reason is that they’re more likely than your closest friends to possess novel, salient information that you might lack. Your BFFs likely live in roughly the same knowledge universe that you do and are thus less likely to come across a new insight that’s unknown to you. That kid from fifth grade lives far enough outside your personal bubble to present you with a truly important piece of information.


Edit for an addition: If you are interested in the technical details of this bug, you can read about it here.

Several Cybersecurity firms have criticized Microsoft for mishandling bug reports - Coordinated Vulnerability Disclosure (CVD) - claiming that Microsoft’s lack of proper communication with security researchers could deter future vulnerability disclosures, putting users at greater risk.

A CVD is a widely adopted processes in security research. When independent researchers detect a vulnerability of a vendor like Microsoft, they report the issue with all the details, allowing the vendor to fix it before it gets published. Typically, software vendors acknowledge the researcher's work and sometimes reward them for their contribution. In a recent post on its website, however, Zero Day Initiative (ZDI) accuses Microsoft of a "lack of transparency" which "leaves researchers who practice CVD with more questions than answers".

ZDI refers to a Microsoft patch release in in July (CVE-2024-38112), which Microsoft said was being exploited in the wild.

"We at the Trend Micro Zero Day Initiative (ZDI) agree with them because that’s what we told them back in May when we detected this exploit in the wild and reported it to Microsoft", the firm writes.

"However, you may notice that no one from Trend or ZDI was acknowledged by Microsoft. This case has become a microcosm of the problems with coordinated vulnerability disclosure (CVD) as vendors push for coordinated disclosure from researchers but rarely practice any coordination regarding the fix."

"CVD doesn’t work if the only ones coordinating are the researchers," the ZDI says. They add that there are multiple occasions from others vendors. "The lack of coordination doesn’t just hurt the vendor/researcher relationship. It hurts the end users."

ZDI concludes:

Why is CVD not working? Have the number of bugs being disclosed increased to the level where vendors simply cannot cope with the level of coordination? Have budget cuts reduced the number of response personnel vendors employ? Has the rush to automation come at the expense of coordination? Are researchers just reporting to an API and no humans are reviewing the reports? As I said, we’re left with more questions than answers.



Krishnan told Ars that "Meta is trying to have it both ways, but its assertion that Unfollow Everything 2.0 would violate its terms effectively concedes that Zuckerman faces what the company says he does not—a real threat of legal action."

For users wanting to take a break from endless scrolling, it could potentially meaningfully impact mental health—eliminating temptation to scroll content they did not choose to see, while allowing them to remain connected to their networks and still able to visit individual pages to access content they want to see.

According to Meta, its terms of use prohibit automated access to users' personal information not just by third parties but by individual users, as a means of protecting user privacy. Meta urged the court to reject Zuckerman's claim that Meta's terms violate California privacy laws by making it hard for users to control their data. Instead, Meta said the court should agree with a prior court that "rejected the argument that California law 'espous[es] a principle of user control of data sufficient to invalidate' Facebook’s prohibition on automated access."

Much more in article


cross-posted from:

The EU General Court in Luxembourg ruled that the designation was warranted under the European Union's new Digital Markets Act (DMA) because short video app TikTok exceeded relevant thresholds including global market value and the number of EU users.

Labeled companies are prevented from forcing users in the bloc to consent to have access to a service or certain functionalities.

ByteDance had argued that its global market value largely came from China, rather than the EU.

It also said TikTok does not operate an exponential user expansion model and that it was acting as a "challenger" to digital monopolies operated by established platforms such as Meta, which owns Facebook and Instagram, and Alphabet, which owns Google. Both companies are also designated as "gatekeepers."

But the EU General Court rejected those arguments, finding that TikTok could no longer be considered a "challenger" on the market, unlike when it joined back in 2018.

The judges concluded that TikTok had "succeeded in increasing its number of users very rapidly and exponentially" since then, and that its large number of European users does indeed contribute to its global market value.

view more: next ›