AI’s Impact on Job Growth: AI is poised to displace jobs, with some industries more at risk than others. Is the paradigm shift already underway?
- The unemployment rate among college graduates has risen, with majors exposed to AI, including computer engineering design and architecture, among those affected.
- In addition, job growth across several white-collar sectors has been tepid, pointing to AI’s growing role in the workforce.
- Certain tech industries, including cloud, web search and computer systems design, stopped growing at the end of 2022, just after the release of ChatGPT.
AI’s Impact on Job Growth | J.P. Morgan Global Research
AI is poised to displace jobs, with some industries more at risk than others. Is the paradigm shift already underway?J.P. Morgan
Why a Court Order to Block Internet Archive's Open Library Was Put On Hold
Site-blocking orders are usually binary; a court issues an order for a domain to be blocked, or it does not. In Belgium, things work differently. After we reported on a court order that compelled ISPs to block access to the Internet Archive's Open Library, a follow-up implementation order decided otherwise. Rightsholders, the authorities, and the Archive are now discussing how to move forward.
Why a Court Order to Block Internet Archive's Open Library Was Put On Hold * TorrentFreak
After a court order compelled ISPs to block access to tthe Internet Archive's Open Library, a follow-up implementation order decided otherwise.Ernesto Van der Sar (TF Publishing)
A proposed class action lawsuit accuses Otter.ai of “deceptively and surreptitiously” recording private conversations to train its AI without user consent
A federal lawsuit seeking class-action status accuses Otter.ai of "deceptively and surreptitiously" recording private conversations that the tech company uses to train its popular transcription service without permission from the people using it.The company's AI-powered transcription service called Otter Notebook, which can do real-time transcriptions of Zoom, Google Meet and Microsoft Teams meetings, by default does not ask meeting attendees for permission to record and fails to alert participants that recordings are shared with Otter to improve its artificial intelligence systems, according to the suit filed on Friday.
The plaintiff in the suit is a man named Justin Brewer of San Jacinto, Calif., who alleges his privacy was "severely invaded" upon realizing Otter was secretly recording a confidential conversation.
The suit, filed in the U.S. District Court for the Northern District of California, claims Otter's covert recording violates state and federal privacy and wiretap laws. It seeks to represent others in California who have had chats unknowingly shared with Otter, which the lawyers contend Otter does to "derive financial gain."
like this
Roblox Retaliates Against Child Abuse Survivor Who Exposed Platform's Predator Problem
Roblox Retaliates Against Child Abuse Survivor Who Exposed Platform's Predator Problem
Content creator's viral videos led to six arrests before company silenced him with legal threatsStinar Gould Grieco & Hensley, PLLC (Roblox Retaliates Against Child Abuse Survivor Who Exposed Platform's Predator Problem)
adhocfungus likes this.
while upgrading from debian 12.11 to 13.0 errors were encountered while processing: plymouth, plymouth-label and initramfs-tools, how do I solve this?
per my previous post I completed the upgrade to 13.0, including the 900 files I didn't get to download and install after using sudo apt update && sudo apt upgrade -y
I now have a working internet connection using a lan cable.
More important than this wlan/lan issue is this new one: each time I try to update/upgrade with either sudo apt --fix-broken install
, sudo apt full-upgrade
, sudo apt update && sudo apt upgrade -y
I get:
`Summary:
Upgrading: 0, Installing: 0, Removing: 0, Not Upgrading: 0
3 not fully installed or removed.
Space needed: 0 B / 58.6 GB available
Setting up initramfs-tools (0.148.3) ...
update-initramfs: deferring update (trigger activated)
Setting up plymouth (24.004.60-5) ...
update-initramfs: Generating /boot/initrd.img-6.12.41+deb13-amd64
zstd: error 70 : Write error : cannot write block : No space left on device
E: mkinitramfs failure cpio 141
E: mkinitramfs failure zstd -q -9 -T0 70
update-initramfs: failed for /boot/initrd.img-6.12.41+deb13-amd64 with 1.
dpkg: error processing package plymouth (--configure):
installed plymouth package post-installation script subprocess returned error exit status 1
dpkg: dependency problems prevent configuration of plymouth-label:
plymouth-label depends on plymouth (= 24.004.60-5); however:
Package plymouth is not configured yet.
dpkg: error processing package plymouth-label (--configure):
dependency problems - leaving unconfigured
Processing triggers for initramfs-tools (0.148.3) ...
update-initramfs: Generating /boot/initrd.img-6.12.41+deb13-amd64
zstd: error 70 : Write error : cannot write block : No space left on device
E: mkinitramfs failure cpio 141
E: mkinitramfs failure zstd -q -9 -T0 70
update-initramfs: failed for /boot/initrd.img-6.12.41+deb13-amd64 with 1.
dpkg: error processing package initramfs-tools (--configure):
installed initramfs-tools package post-installation script subprocess returned error exit status 1
Errors were encountered while processing:
plymouth
plymouth-label
initramfs-tools
Error: Sub-process /usr/bin/dpkg returned an error code (1)
`
help appreciated
Write error : cannot write block : No space left on device
Seems like your boot partition is full.
/boot
so you can only fit 2-3 kernels at most. Try removing some old ones first.
List all installed kernels:
dpkg -l | grep linux-image | awk '{print$2}'
Remove certain kernels:
sudo apt remove --purge linux-image-XXX
where XXX is the kernel version you wish to remove, as printed above. Repeat as needed until all unwanted kernels have been removed.
Then update grub:
sudo update-grub2
And reboot:
sudo reboot
\#!/bin/bash
USED_VER=$(uname -r)
echo "Kernel version in use: $USED_VER"
echo "Other installed versions:"
dpkg --list 'linux-image*' | grep ^ii | grep -v $USED_VER
echo "Remove unneeded packages above using the following command:"
echo "sudo apt remove linux-image-VERSION"
It prints a list of the installed kernels (excl. the running one) and prints the command to uninstall the packages (it doesn't remove anything by itself).
Combining "Neural | Symbolic" and "Attempto Controlled English" to achieve human readable and editable neuro-symbolic AI systems
This idea combines a neuro-symbolic AI system (take a LLM and use it to generate logical code; then make inferences from it, see Neural | Symbolic Type) with Attempto Controlled English, which is a controlled natural language that looks like English but is formally defined and as powerful as first order logic.
The main benefit is that the result of the transformation from document/natural language to the logical language would be readable by not IT experts, as well as editable. They could check the result, add their own rules and facts, as well as queries.
I created a small prototype to show in which direction it would be going (heavily work in progress though). What do you think of this? Would love to here your opinions 😀
Technology reshared this.
Ecosia and Qwant team up to launch an independent search index, challenging Google & Bing
Ecosia, the tree-planting search engine from Berlin, and Qwant, France's privacy-focused search provider, announced a joint venture in November 2024 to develop their own European search index12. The partnership aims to reduce their dependence on Microsoft's Bing APIs, which both companies currently rely on for search results2.
The new venture, called European Search Perspective (EUP), is structured as a 50-50 ownership split between Ecosia and Qwant2. Qwant's engineering team and existing search index development will transfer to EUP, with Qwant CEO Olivier Abecassis leading the joint venture2.
"The door is open and we are ready to talk to anyone," said Abecassis, while noting they want to "move as fast as possible" with their existing shareholders' support2. The index will begin serving France-based search traffic for both engines by Q1 2025, expanding to cover "a significant portion" of German traffic by end of 20252.
Rising API costs are a key motivator, following Microsoft's massive price hike for Bing's search APIs in 20232. However, neither company plans to completely stop using Bing or Google, instead aiming to diversify their technical foundation as generative AI takes a more central role in search2.
- News ↩︎
- TechCrunch - Ecosia and Qwant, two European search engines, join forces on an index to shrink reliance on Big Tech ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎
Ecosia and Qwant, two European search engines, join forces on an index to shrink reliance on Big Tech | TechCrunch
Qwant, France's privacy-focused search engine, and Ecosia, a Berlin-based not-for-profit search engine that uses ad revenue to fund tree planting andIvan Mehta (TechCrunch)
like this
I've been using SearX for over a year now. priv.au/
It returns old-school, unranked results. It currently has at least 50 Instances you can choose from.
searx.space/
Meta faces backlash over AI policy that lets bots have ‘sensual’ conversations with children
A backlash is brewing against Meta over what it permits its AI chatbots to say.
An internal Meta policy document, seen by Reuters, showed the social media giant’s guidelines for its chatbots allowed the AI to “engage a child in conversations that are romantic or sensual”, generate false medical information, and assist users in arguing that Black people are “dumber than white people”.
Singer Neil Young quit the social media platform on Friday, his record company said in a statement, the latest in a string of the singer’s online-oriented protests.
“At Neil Young’s request, we are no longer using Facebook for any Neil Young related activities,” Reprise Records announced. “Meta’s use of chatbots with children is unconscionable. Mr. Young does not want a further connection with Facebook.”
Meta faces backlash over AI policy that lets bots have ‘sensual’ conversations with children
US senator Josh Hawley opened investigation into the tech giant, which said it had removed the policy guidelinesEdward Helmore (The Guardian)
like this
imprevisto ferragostiaco che vuol dire bagnarsi e soffrire
Ieri non poteva assolutamente essere un #ferragosto del fottuto anno 2025 se non si fosse messa letteralmente a cadere l’acqua dal cielo (wow, assurdo fenomeno mai visto prima) a metà pomeriggio… e non solo; ovviamente, tutto non proprio imprevisto. Cose veramente dell’altro mondo ormai, ma il terrore a questo mondo, il nostro, è un fatto […]
AI helpers could coach people into careers and help them move home
AI helpers could coach people into careers and help them move home
AI agents could soon take on boring life admin by dealing with public services on your behalf – from filling in forms to completing applications and booking appointments, as the UK Government plans trials to save people time and modernise the state.Department for Science, Innovation and Technology (GOV.UK)
Arizona court sanctions lawyer for AI-generated false citations: Judge revokes attorney's pro hac status and imposes multiple sanctions after majority of legal citations were fabricated by AI.
cross-posted from: programming.dev/post/35742052
An Arizona federal court issued extensive sanctions against attorney Maren Bam on August 14, 2025, after finding that her brief contained multiple artificial intelligence-generated citations to non-existent cases. The sanctions include revocation of pro hac vice status, striking the brief, and mandatory notification to state bar authorities.
Arizona court sanctions lawyer for AI-generated false citations: Judge revokes attorney's pro hac status and imposes multiple sanctions after majority of legal citations were fabricated by AI.
cross-posted from: programming.dev/post/35742052
An Arizona federal court issued extensive sanctions against attorney Maren Bam on August 14, 2025, after finding that her brief contained multiple artificial intelligence-generated citations to non-existent cases. The sanctions include revocation of pro hac vice status, striking the brief, and mandatory notification to state bar authorities.
like this
How naïve it was of me, to think that the New York Avianca case in 2023 was high profile enough for lawyers to have learnt their lesson, but nope, it's getting worse each and every month that goes by:
damiencharlotin.com/hallucinat…
It doesn't help that the most common outcomes there are "Warning" or a fine in the low thousands. If a legal practice can save $500,000 a year on avoiding doing their own research, and the worse that's likely to happen is "Warning" or a $2,000 fine, then why would they not?
AI Hallucination Cases Database – Damien Charlotin
Database tracking legal cases where generative AI produced hallucinated citations submitted in court filings.www.damiencharlotin.com
like this
like this
like this
like this
Zebra Crossing: An easy-to-use digital safety checklist
cross-posted from: programming.dev/post/35760626
cross-posted from: programming.dev/post/35752925
GitHub Repo.
UK's Turing AI Institute responds to staff anger about defence focus
UK's Turing AI Institute bosses respond to staff anger
Whistleblowers say the charity is at risk of collapse because it has been told by the government to focus on defence.Zoe Kleinman (BBC News)
Technology reshared this.
That's a bit weird to complain about, since Turing worked for the UK defense, and cracked the Enigma, and was a significant factor to the success of D day.
We are committed to conducting our business with honesty, integrity and transparency and believe that a culture of openness and accountability is essential
Obviously the transparency part goes out the window when working on government defense money.
We (Europe, NATO and allies) have been undermined by Russia and industries spied on by China for decades now, and it should be considered an honor to be called on to help defend UK against it.
like this
That’s a bit weird to complain about, since Turing worked for the UK defense, and cracked the Enigma, and was a significant factor to the success of D day.
Yeah but he actually, you know, signed up directly to the military. These people signed up to a civilian charity.
But if they have any respect for the name the Institute was called after, they would not hesitate to help defend their country.
It just shows they are by far lesser people than Turing was.
If you have a point, you could make it, instead of asking stupid questions.
KeyBegin - Interactive 108-key Standard Keyboard Learning Tool
KeyBegin - Interactive 108-key Standard Keyboard Learning Tool
Click any key to learn about its function and usage. Supports 108-key standard keyboard, improve your keyboard efficiency.KeyBegin
like this
Technology reshared this.
like this
This Week in Plasma: a lot of polishing!
This Week in Plasma: a lot of polishing!
Welcome to a new issue of This Week in Plasma! Every week we cover the highlights of what’s happening in the world of KDE Plasma and its associated apps like Discover, System Monitor, and more.This Week in Plasma: a lot of polishing!
For Trump and Putin, handshakes on a red carpet and a joint limo ride, then an abrupt ending
like this
OpenAI’s Sam Altman Expects To Spend ‘Trillions’ On Infrastructure
OpenAI’s Sam Altman Expects To Spend ‘Trillions’ On Infrastructure
OpenAI Chief Executive Officer Sam Altman wants to spend trillions of dollars over time on the infrastructure required to develop and run artificial intelligence services. He just needs to figure out a way to raise that kind of money.Bloomberg News (NDTV Profit)
Technology reshared this.
L'antica tecnica per trasformare una comune zucca nel tradizionale copricapo delle Filippine - Il blog di Jacopo Ranieri
L'antica tecnica per trasformare una comune zucca nel tradizionale copricapo delle Filippine - Il blog di Jacopo Ranieri
Difficile trovare un’espressione maggiormente distintiva dell’identità di un popolo, rispetto alla maniera in cui i suoi membri scelgono di far fronte all’imprescindibile necessità del vestire.Jacopo (Il blog di Jacopo Ranieri)
With Arson and Land Grabs, Israeli Settler Attacks in West Bank Hit Record High
cross-posted from: lemmy.ml/post/34751455
By Patrick Kingsley, Fatima AbdulKarim and Natan Odenheimer
The journalists reported from several villages in the central valleys of the Israeli-occupied West Bank, including Burqa, Beitin and Taybeh.
Aug. 14, 2025 Updated 6:09 a.m. ET
It was the third attack that July night in this central pocket of the Israeli-occupied West Bank, and the seventh attack on this particular junkyard since the start of the war in Gaza in October 2023, according to its owner.“Before the war they harassed us, but not like this,” said Muhammad Sabr Asalaya, 56, the junkyard owner. “Now, they’re trying to expel as many people as they can and annex as much land as they can.”
Such attacks were on the rise before Hamas led a deadly raid on Israel in 2023, setting off the war in Gaza, and they have since become the new normal across much of the West Bank. With the world’s attention on Gaza, extremist settlers in the West Bank are carrying out one of the most violent and effective campaigns of intimidation and land grabbing since Israel occupied the territory during the Arab-Israeli war of 1967.
With Arson and Land Grabs, Israeli Settler Attacks in West Bank Hit Record High
cross-posted from: lemmy.ml/post/34751455
By Patrick Kingsley, Fatima AbdulKarim and Natan Odenheimer
The journalists reported from several villages in the central valleys of the Israeli-occupied West Bank, including Burqa, Beitin and Taybeh.
Aug. 14, 2025 Updated 6:09 a.m. ET
It was the third attack that July night in this central pocket of the Israeli-occupied West Bank, and the seventh attack on this particular junkyard since the start of the war in Gaza in October 2023, according to its owner.“Before the war they harassed us, but not like this,” said Muhammad Sabr Asalaya, 56, the junkyard owner. “Now, they’re trying to expel as many people as they can and annex as much land as they can.”
Such attacks were on the rise before Hamas led a deadly raid on Israel in 2023, setting off the war in Gaza, and they have since become the new normal across much of the West Bank. With the world’s attention on Gaza, extremist settlers in the West Bank are carrying out one of the most violent and effective campaigns of intimidation and land grabbing since Israel occupied the territory during the Arab-Israeli war of 1967.
With Arson and Land Grabs, Israeli Settler Attacks in West Bank Hit Record High
By Patrick Kingsley, Fatima AbdulKarim and Natan Odenheimer
The journalists reported from several villages in the central valleys of the Israeli-occupied West Bank, including Burqa, Beitin and Taybeh.
Aug. 14, 2025 Updated 6:09 a.m. ET
It was the third attack that July night in this central pocket of the Israeli-occupied West Bank, and the seventh attack on this particular junkyard since the start of the war in Gaza in October 2023, according to its owner.“Before the war they harassed us, but not like this,” said Muhammad Sabr Asalaya, 56, the junkyard owner. “Now, they’re trying to expel as many people as they can and annex as much land as they can.”
Such attacks were on the rise before Hamas led a deadly raid on Israel in 2023, setting off the war in Gaza, and they have since become the new normal across much of the West Bank. With the world’s attention on Gaza, extremist settlers in the West Bank are carrying out one of the most violent and effective campaigns of intimidation and land grabbing since Israel occupied the territory during the Arab-Israeli war of 1967.
New Cloudflare Pirate Site Blocking May Already Involve Thousands of Domains
New Cloudflare Pirate Site Blocking May Already Involve Thousands of Domains * TorrentFreak
New information indicates that Cloudflare blocking of pirate sites in the UK may affect one thousand domains; double that can't be ruled out.Andy Maxwell (TF Publishing)
like this
So she didnt have the correct documents? Failing to see how "I dont want to pay for that, cos its expensive" is anyone elses fault but her own.
Arrived in 2021 as a tourist, married someone that same year, got a divorce a year later, then applied for an I360, we assume on the grounds she got up the duff.
"When it came time to renew both parts of the combo card, Shaw paid to have the work permit renewed, but didn’t renew the travel permit “because she didn’t have any plans for travel at that time and it’s expensive,” Thorward said."
Followed by:
"In June, Shaw received confirmation of her work permit renewal, but mistakenly believed it also extended her travel authorization – a “minor administrative paperwork error” – according to her lawyer."
So, she new she needed both. Got one. Then when she got caught, and started talking a lot of shit about "I didnt know".
The only thing in here thats relevant, is that shes not a dangerous criminal. The rest... Kinda comes across as your typical chancer. Go to US, marry some random dude, get up the duff, divorce dude, get greencard because of the kid, profit.
Honestly, fuck her. She knew the rules, they knew shes didnt have the right permits, and did it anyway. And now shes finding out that uncle Sam aint fucking around anymore. Which is fucking bizarre when you consider how much coverage the unhinged ICE etc have been getting.
Please, Kill Emails (and Phone Numbers)
I would spend the time to write this in my usual lovely article style, but I'm too upset to do that right now. To put it bluntly: email and phone numbers suck. They both need to die.
Emails
Security
Email, like many other protocols, was not originally designed with privacy or security in mind. You can get "less bad" email providers such as Proton Mail or Tuta Mail, but those only have basic privacy when contacting other emails using the same provider.
Email is one of many protocols designed in the early days of the internet before privacy and security were considered. Since then, there have been Band-Aid solutions added to email to give it some semblance of security, but it is still fundamentally insecure. It lacks many of the features that modern communication protocols like the Signal Protocol and SimpleX Chat Protocol have.
Aliases
One major flaw with emails is that people commonly use the same email for everything. That not only becomes a unique identifier, but it makes it nearly impossible to fight spam and puts all your accounts at risk if your email is breached.
A solution was created to fix this problem in the form of email aliasing services such as addy.io or SimpleLogin. These services allow you to create a large number of random email addresses that all forward to your real email address. This allows you to avoid using a unique identifier for every website, and block spam by simply disabling the email alias.
Email aliasing is great... when it's accepted. Many services have begun blocking email aliases because aliasing eliminates a unique identifier. People (allegedly) use aliasing to create multiple accounts to abuse free services.
Overuse
Email is required to sign up on almost every website. As mentioned previously, it has many security flaws and email aliasing only partially helps. Websites abuse the fact that emails are supposed to be a unique identifier, so they use it for things like multi-factor authentication or login alerts. Neither of those are what email was designed for, and you only end up putting your account at risk by using it compared to authenticator apps like Aegis Auth or Ente Auth.
Email is also used to sign up for news letters, receive shipping alerts, send sensitive information for jobs and job applications, contacting most businesses, even logging into some computers. All of these pose a risk if you don't use email aliasing or if your email is breached. What upsets me most is seeing open source software requiring email addresses, like GitLab, Codeberg, many Lemmy instances, etc. These shouldn't request anything past a username and a password.
Email overuse has gotten so bad that many disposable email services like Maildrop have been created in order to generate throwaway emails to get past authwall screens. These should never be used for real accounts because anyone can access them and, as I mentioned before, most websites will allow you to login only by verifying your email.
Anonymous Email
Email providers are being hit with mass sign-ups because of how often email is used. Because of this, many email providers block you from signing up if you are connected to a VPN or Tor. This means that in order to create a single email address to do almost anything across the internet, you must give away your IP address to the email provider first, effectively deanonymizing yourself. The internet was supposed to be built to be free, but giving away your personal information to access content doesn't sound very free to me.
Kill Emails
Emails are outdated, overused, and not private. They were never designed to be (ab)used the way they are right now. Even something as simple as setting up Git or GnuPG asks for your email, or signing up for a local event. This needs to stop. Using fake emails doesn't solve the underlying problem.
Phone Numbers
Gratis
If you thought free emails were bad, imagine paying to have your privacy disrespected. A single phone number will cost you a monthly subscription, even if you only need to receive a single text. Prepaid SIM cards are becoming a dying art, especially in the United States. Most mobile phone operators will make you buy and activate an eSIM, which requires an egregious amount of personal information to activate (including email). Most payphones have been abolished too, meaning you can hardly pay by the minute anymore.
Security
Phone numbers don't even pretend to be private or secure. It's sent unencrypted to anyone with a $15 antenna, and intercepted by almost every government in the world. Salt typhoon showed just how abysmal cellular security really is. RCS and iMessage are slight steps up in terms of privacy (providing at least some encryption), but it barely provides any protection.
Phone numbers in this respect are even worse than email. SS7 attacks can trivially intercept communications by anyone without any user interaction. That is an easy way to grab multi-factor authentication codes sent via SMS. Despite all of these known issues, people still insist on using phone numbers for almost everything.
Aliases
While not free, you can use services such as MySudo to create phone number aliases. These aliases are really just real phone numbers, all of which you own. Unfortunately, these phone numbers are VoIP numbers, which many services block.
Overuse
Like emails, phone numbers are used in a lot of applications. Because they cost money, they are a better unique identifier than emails, since people are less likely to own multiple. Phone numbers may be required to create accounts, apply for jobs, do almost anything government related, and much more. All of this is done unencrypted and intercepted.
My favorite: in many places, you have to use a phone to contact non-emergency services. The homeless and other people who can't afford phone numbers are unable to report crimes since there are no pay phones. Even visiting the police station in person will get you turned away and told that you must call (speaking from experience) no matter how much you try to convince them.
Thankfully, many times when a phone number is asked for you can put in a fake phone number without risk. For many applications, throwaway number services will also work. Applying for jobs, a lot of the time you will be asked for your phone number. If you simply inform them that you do not have a phone number, most will accept that or (at worst) give you a funny look. I would prefer email when applying for jobs anyways since you aren't sprung with a sudden call.
Anonymous Phone Numbers
The only way to get an anonymous phone number (without risking buying second hand) is to buy a burner phone with cash, a prepaid (e)SIM, and use as much fake information as possible (even the area code). This will easily run you $45+, and requires a subscription to keep using it. Beware that the phone you use it with may disrespect your privacy in other ways.
Kill Phone Numbers
Phone numbers are one of the least private and least secure methods of communication. It is under active mass surveillance, and costs way too much money. It's good to see younger generations moving away from phone numbers towards third party services (no matter how bad they are), because that means that there is hope of killing phone numbers once and for all.
Kill Both
Anyone can create an email. Anyone can buy a phone number. It should not be used as a unique identifier, and certainly should not be used for authentication purposes. We need to stop overusing insecure, nonprivate communications, and start normalizing using Signal usernames or SimpleX Chat addresses for general use. Currently, if you stick only those on your resume for your contact information, you will most likely not receive a message back. That needs to stop. Phone numbers and emails can get leaked and cause endless spam/scams compared to other forms of communication. There is no reason to keep using either option when so many better options are available.
Try to create a full software stack without using services that request your email or phone number, and you will begin to see just how bad the problem has gotten. Some services like Mullvad VPN and KYCnot.me have begun requiring no personal information at all to create an account, not even a password. They randomly generate account numbers to be used to login. I want to see more of that instead of...
::: spoiler spoiler
Please enter your first name.
- Must be at least 3 characters.
Please enter your last name.
- Must be at least 3 characters.
Please enter your date of birth.
- You must be at least 13 years old.
- The birthday we let you enter (01/01/1900) seems invalid.
Please enter your username.
- That username is taken
- Some characters are not allowed
Please enter a display name.
- Some characters are not allowed, but the requirements are different from anything else.
Please enter your email.
- Sorry, but that email is blocked
- We've sent a code to fakeemail@please.stop
- No email received
Please enter your phone number.
- We don't accept VoIP numbers.
- We've also sent a code to +1 (555) 867-5309, because why not.
Please enter your password. We don't know what passkeys are.
- Password must be longer
- Password is too long. We don't know what hashing is.
- Password must not contain these characters. We still don't know what hashing is.
- Password must contain these characters. We don't know what a passphrase is.
Please enter your password again.
- Passwords do not match.
- [ ] I agree to the Terms of Service.
- [ ] I agree to the Privacy Policy.
- [ ] I agree that the information I entered is correct.
Sorry, you've been blocked. Your IP address has been flagged for abuse.
Please enable JavaScript to continue.
Something went wrong, and we couldn't create your account. Please start over.
Your account has been flagged as spam.
Please enable email or SMS 2FA before activating 2FA through an app.
Please verify your email or phone number every time you log in.
New Email: We noticed a new login. What's a VPN? Doesn't everyone store browser cookies forever?
All email notifications are enabled by default.
Please verify your email and phone number before deleting your account.
Your account information you requested to download will be emailed to you within 3-5 business days as if a human needs to approve it.
We've reset your password for no reason at all. Please verify your email or phone number to reset your password.
Lost access to your email or phone number? Tough luck. Please contact support.
Need to contact support? Email us or call us.
This call may (will) be monitored or (and) recorded for "quality and assurance purposes".
"Can you please verify your phone number?" ...you mean the phone number I'm calling you from?
:::
Free the internet. With Mullvad VPN.
Your IP address is used to identify you, track you, and map your online life. Step 1 in taking back your personal privacy online is masking it with a trustworthy VPN.Mullvad VPN
like this
I use mail accounts and a phone number like abybody else (Proton, Tuta, Murena) and Iknow that the mail direction is an unique identifier which can be tracked, exept if you usean alias.
Because of this I avoid as much possible services or apps which need an account (the worse are those which say "Log in with Google or Facebook"). Naturally better are those which creat an user ID instead of an accoun and the best which don't need an account an can be used anonym.
Anyway the Q-Day is near, when any privacy measures and anything else are going to hell.
Q-Day refers to the moment when quantum computers become powerful enough to break current encryption methods, particularly RSA encryption that secures much of today's internet communications1.Recent estimates from cybersecurity experts suggest a one-in-three chance that Q-Day will occur before 20351. The Global Risk Institute's latest assessment indicates a 15% chance it has already happened in secret1.
Major implications of Q-Day include:
- Vulnerability of encrypted data including emails, financial transactions, medical records, and military communications1
- "Harvest now, decrypt later" attacks where nation-states collect encrypted data to decode once quantum computing capabilities mature1
- Risk to critical infrastructure like power grids, military systems, and financial networks1
Some companies have begun implementing quantum-resistant security measures:
- Apple introduced its PQ3 protocol in March 2024 for iMessage2
- Signal has integrated quantum-resistant algorithms into its messaging platform2
- NIST released its first set of post-quantum encryption standards in summer 20231
President Biden signed an executive order in early 2025 requiring government agencies to implement NIST's quantum-resistant algorithms "as soon as practicable," accelerating the previous 2035 deadline1.
- Wired - The Quantum Apocalypse Is Coming. Be Very Afraid ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎
- Secureworks - Q-Day: Estimating and Preparing for Quantum Disruption in Cybersecurity ↩︎ ↩︎
Q-Day: Estimating and Preparing for Quantum Disruption in Cybersecurity
As the quantum computing era approaches, understanding the potential break of RSA2048 encryption is critical. Our latest post explores diverse estimates on Q-Day, the importance of preparation, and steps for adopting quantum-safe practices.Secureworks
How to put a file into a VM without a malware breach?
How can you get a file into a VM without creating a potential malware breach? I was told to kill the internet connection, disable any type of sharing with the host, no copy paste, and no sharing disks, but how would I be able to get the files into the VM if it is secure from both sides? The file in question is about 36GB and there is a second file that is 678MB.
Thank you.
like this
Shut down the vm, mount the vm disk, mv the files over, unmount the vm disk, start the vm.
That works because nowadays software doesn’t run itself, the system chooses what to run (sometimes at the users request).
When you shutdown the vm, there is no virtual computer interacting with the files on the vms disk. When you mount the vms disk, you’re just telling your system to treat the file that represents the vms disk as a filesystem. When you move the files to it, you’re just copying the files to the file that represents the vms disk respecting its filesystem then deleting the originals. When you unmount the vms disk you’re telling your system to wrap it up and let go of the file that represents the vms disk. Starting the vm is just telling your system to pretend that it has a fake computer whose disk is that file you mounted and wrote to which just so happens to have some new files in it, imagine that!
There’s another person saying you probably can’t figure out if the files you have are malware. I won’t go that far, but the reason most people don’t setup forensic environments (that’s generally what the computing environment you’ve set up is called when you’re doing what you’re doing) for their warez and instead raw dog it is that they have some security software and process they trust and if they get catch some kind of problem they plan on just restoring from backup.
You do have backups, right?
It’s rare for user targeted malware to have persistence, most of that technology is targeted at infrastructure like switches, edge and servers, so a wipe and restore is almost always a perfect fix.
The AI Was Fed Sloppy Code. It Turned Into Something Evil. | Quanta Magazine
The AI Was Fed Sloppy Code. It Turned Into Something Evil. | Quanta Magazine
The new science of “emergent misalignment” explores how PG-13 training data — insecure code, superstitious numbers or even extreme-sports advice — can open the door to AI’s dark side.Stephen Ornes (Quanta Magazine)
like this
It’s easy to build evil artificial intelligence by training it on unsavory content. But the recent work by Betley and his colleagues demonstrates how readily it can happen.
Garbage in, garbage out.
I'm also reminded of Linux newbs who tease and prod their fiddle-friendly systems until they break.
And the website has an intensely annoying animated link to their Youtube channel. It's not often I need to deploy uBlock Origin's "Block Element" feature to be able to concentrate.
Meta’s AI rules have let bots hold ‘sensual’ chats with kids, offer false medical info
Great. Now Facebook wants an AI Epstein 🙁
Honestly... I can't think of a single good thing Zuckerberg has ever brought to the world.
https://www.reuters.com/investigates/special-report/meta-ai-chatbot-guidelines/
adhocfungus likes this.
octopus_ink
in reply to Pro • • •Can someone give me the out-of-the-loop on Roblox?
I understand that it's an online gaming platform where there have been accusations of things being unsafe for kids. While bad, this is something that has happened before. Anything specific here that this is in the news so much, or just that it's the biggest most current example?
cybirdman
in reply to octopus_ink • • •The company was recently sued for creating a platform using almost exclusively child labor
The problem is while their target audience is kids, it is heavily monetized and created a market and economy around child created content. It is also impossible to moderate and became a cesspool of predators.
The game itself is comprised of an infinite number of mini games you can try, most of them created by children. Some of them are of a sexual nature and not safe for kids. This makes it really easy for a predator to set up environments where they can groom children.
The players can buy robux with real money and spend this to advertise the games they create, or buy customization items or game passes. They also earn robux when people play their games to incentivize them to create more content. Because of this the company is being sued for essentially child labor, where all their profits revolve around child created games
When I was younger I would also play modded games and create content. I dont think there's anything wrong with that. But the fact that the game monetized it to such an extent is wrong in my opinion. With the predator problem as well it makes it a really unsafe playform for children. As a parent I would never let my children play this.
octopus_ink
in reply to cybirdman • • •roofuskit
in reply to octopus_ink • • •octopus_ink
in reply to roofuskit • • •uhmbah
in reply to octopus_ink • • •- YouTube
youtu.be