AI at the World’s Biggest Games Event(Gamescom) Booked Random Meetings for Attendees
AI at the World’s Biggest Games Event(Gamescom) Booked Random Meetings for Attendees
like this
A network of nearly 90 TikTok accounts has been using AI to create fake versions of Spanish-language journalists and spread falsehoods online
What's behind the TikTok accounts using AI-generated versions of real Latino journalists?
The accounts point to the challenge of stopping or controlling the surge in fake images and misinformation targeting Spanish-speakers in the U.S., as AI technology advances.Nicole Acevedo (NBC News)
like this
Technology reshared this.
Meta Quest 3/3s XR headsets finally rooted after 2 years
Meta XR headsets are very cheap for the performance they give. Unfortunately they require a Meta account and one can assume as much data as legally possibly is sent back to the advertising company.
For years now, since the Quest 1, those Android devices have not been rooted except for some specific version number of the Quest 2.
This recent work github.com/FreeXR/eureka_panth… makes the latest headset with a rather recent update (but NOT the very last ones, so be cautious!) rootable.
GitHub - FreeXR/eureka_panther-adreno-gpu-exploit-1: Our first exploit: a memory corruption vulnerability in the Adreno GPU driver for Eureka/Panther (3/3s) devices, enabling arbitrary kernel memory read/write and privilege escalation.
Our first exploit: a memory corruption vulnerability in the Adreno GPU driver for Eureka/Panther (3/3s) devices, enabling arbitrary kernel memory read/write and privilege escalation. - FreeXR/eurek...GitHub
like this
Technology reshared this.
- Quest 3: v79 5115411.12900.520 (August 7, 2025) and below, to about version v71.
- Quest 3S: v79 117688.9900.610 (August 6, 2025) and below, to about version v71.
according to github.com/zhuowei/cheese/tree…
GitHub - zhuowei/cheese: CVE-2025-21479 proof-of-concept, I think
CVE-2025-21479 proof-of-concept, I think. Contribute to zhuowei/cheese development by creating an account on GitHub.GitHub
Thank you for finding that.
I got lucky, I bought a quest around July/August and needed to do the mandatory/initial OS install.
I ended up with v78 (August 3, 2025) release.
I didn't realize there was a WiP announced in July 2025.
Quest 3 Rooting
i want to root quest 3, and there isin't a lot of discussion on it. Therefore, i've created a discord server where we can talk about these stuff {Mod edit: References to Discord removed! Oswald...ilovecats4606 (XDA Forums)
like this
The Era of 'AI Psychosis' is Here. Are You a Possible Victim?
The Era of 'AI Psychosis' is Here. Are You a Possible Victim?
Psychologists have been sounding the alarm for months.Ece Yildirim (Gizmodo)
like this
Technology reshared this.
Gemini for Home is Google’s biggest smart home play in years
Gemini for Home is Google’s biggest smart home play in years
Gemini is finally, officially coming to Google Home. The all-new assistant will arrive on Nest smart speakers and displays later this year.Jennifer Pattison Tuohy (The Verge)
Technology reshared this.
Gemini for Home is Google’s biggest smart home play in years
For the next 3 to 4 years (if you will be lucky), then they will pass to something new and they will simply kill it, like they done with a lot of other projects.
SpaceX to Launch Secret X-37B Space Plane Thursday
SpaceX to Launch Secret X-37B Space Plane Thursday
The hunt will be on shortly, to once again recover a clandestine mission in low Earth orbit. SpaceX is set to launch a Falcon-9 rocket from launch pad LC-39A at the Kennedy Space Center Thursday night August 21st, with the classified USSF-36 mission.Universe Today
Raoul Duke likes this.
Quasarr Hostnames
So I'm trying to setup Quasarr (direct downloader for sonarr+radarr) but I'm not sure what hostnames to use.
I added some from the suggested pastebin but most of them serve German content and I haven't heard of any of these websites (new to DDL)
Can anyone help me setup some good English sources? Or at least tell me what the rest of the abbreviations mean?
like this
Just look and figure it out. It’s really straightforward name matching. You don’t need someone to spell everything out to you, if you make a mistake just try something different. You can do it!
OPs_cops_post.html ass post. “Please explicitly tell me what illegal websites these initials refer to!” Guaranteed you are British 100% because only British cops would be stupid enough to do this.
Ddl is gonna be mainly stuff for poor Europeans who are scared of getting caught sharing files and are relying on the “loophole” of “I never actually shared the file, the file was shared with me and that’s substantively different” (it’s not, they’re just using it as an excuse to haul you in for some other reason or frame you for something).
don't like this
Well at least your username is fitting...
Im gonna be blunt, this dude wanted to learn how to use something that interests them. Getting slapped with 'just figure it out' and some unsavory comments about where you think they're from is a surefire way to kill someone's interest in ever interacting with a community.
Do better for fucks sake
like this
My response: you can figure it out! Just try a little! Don’t ask such cop ass questions, also ddl is the realm of non-English stuff.
You: unsavory!
Just looked into this a bit. While I don't know exactly what each one corresponds to, I did find that pastebin has some lists of urls you can use.
This one has English and German-> the comments should differentiate what's what. Hope this helps!
Quasarr Hostnames English German Latest - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.Pastebin
like this
"Best practices" (?) with laptop battery driving me crazy
Ok, well, to start with, my Lenovo X1 Carbon 10th is known for not having the greatest battery life.
Despite this, to preserve battery health, I have notifications set to warn me when a charge goes under 20% or over 90%, so that I either plug in or unplug when I get them, which TTBOMK constitutes "best practices." Very possibly I'm just getting old and getting lost too deeply in whatever I'm doing, but I feel like I'm constantly getting these notifications, and they're really starting to get on my nerves!
I've tried tlp and auto-cpufreq without any noticeable difference in performance, and usually I'm on "Power Saver" in Mint.
Mrs. Erinaceus has a gaming laptop and just keeps it plugged in all the time, battery health be damned. Is that what I should do? Maybe time to get a new battery? Or is there just some way to tell it to stop charging and leave it plugged in?
Palestine was the problem with TikTok - Congress seemed to think a scrolling video platform was a national security threat. What changed?
Palestine was the problem with TikTok
After pro-Palestine content flooded the app, Congress treated TikTok as a national security threat. What changed?Sarah Jeong (The Verge)
like this
Technology reshared this.
They appointed an exIDF instructor to determine what's hate speech...
Suddenly it wasn't a problem anymore
like this
Wyoming launches first state-backed stablecoin on seven blockchains
After years of research, the Wyoming Stable Token Commission has unveiled the mainnet launch of its first official state-backed stablecoin. The so-called Frontier Stable Token (FRNT), marking the first time a U.S. state has issued a blockchain-based, fiat-pegged token meant to be used by retail and enterprises alike, according to an announcement on Tuesday.
like this
Technology reshared this.
like this
Just great.
Obviously the customers don't need to know that their audit logs not only could have been turned off for conversations without any extra authentication, but also are so easy to turn off that it happens by accident without any extra intervention.
Also their entire Vulnerability disclosing guideline is security/compliance/image theater.
AI has passed the aesthetic Turing Test − and it’s changing our relationship with art
AI has passed the aesthetic Turing Test − and it’s changing our relationship with art
If a machine creates a video or a song that brings a person to tears, does it matter that the machine felt nothing?The Conversation
KPMG wrote 100-page prompt to build agentic TaxBot: Produces advice in a single day instead of two weeks – without job losses
- Hackernews.
:::
KPMG wrote 100-page prompt to build agentic TaxBot
: Produces advice in a single day instead of two weeks – without job lossesSimon Sharwood (The Register)
AI Website Builder Lovable Abused for Phishing and Malware Scams
- Threat actors are increasingly using an AI website generation platform to create fraudulent websites for credential phishing and malware delivery.
- Threat actors created or cloned websites that impersonated prominent brands, used CAPTCHA for filtering, and posted credentials to Telegram.
- The barrier to entry for cybercriminals has never been lower.
Cybercriminals Abuse AI Website Creation App For Phishing | Proofpoint US
Key findings Threat actors are increasingly using an AI website generation platform to create fraudulent websites for credential phishing and malware delivery. Threat actorsProofpoint
[Meta] Can you allow the English language posts?
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure
cross-posted from: programming.dev/post/36017215
Research with details.
- Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations.
- The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS software's Smart Install feature, targeting unpatched and end-of-life network devices to steal configuration data and establish persistent access.
- Primary targets include organizations in telecommunications, higher education and manufacturing sectors across North America, Asia, Africa and Europe, with victims selected based on their strategic interest to the Russian government.
- Static Tundra employs sophisticated persistence techniques including the historic SYNful Knock firmware implant (first reported in 2015) and bespoke SNMP tooling to maintain undetected access for multiple years.
- The threat extends beyond Russia's operations — other state-sponsored actors are likely conducting similar network device compromise campaigns, making comprehensive patching and security hardening critical for all organizations.
- Threat actors will continue to abuse devices which remain unpatched and have Smart Install enabled.
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure
cross-posted from: programming.dev/post/36017215
Research with details.
- Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations.
- The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS software's Smart Install feature, targeting unpatched and end-of-life network devices to steal configuration data and establish persistent access.
- Primary targets include organizations in telecommunications, higher education and manufacturing sectors across North America, Asia, Africa and Europe, with victims selected based on their strategic interest to the Russian government.
- Static Tundra employs sophisticated persistence techniques including the historic SYNful Knock firmware implant (first reported in 2015) and bespoke SNMP tooling to maintain undetected access for multiple years.
- The threat extends beyond Russia's operations — other state-sponsored actors are likely conducting similar network device compromise campaigns, making comprehensive patching and security hardening critical for all organizations.
- Threat actors will continue to abuse devices which remain unpatched and have Smart Install enabled.
Cheap SBC x86-64 ?
cross-posted from: programming.dev/post/36014616
Hi,is it exist cheap ~$60 SBC in X86-64 ??
::: spoiler No thank you for Rapsberry PI
\
I used Raspberry PI SBC for a while now.But it's really hard to found a Linux distribution that support
- RPI (arm64)
- sysVinit 💖
- And that I likePlease don't bring systemD in this discussion thanks.
:::[^1]:
quick summary
Monolithic design: Systemd is a large, complex piece of software that combines many system management functions, rather than having separate, specialized tools as in the traditional Unix philosophy.rentry.co
BrikoX likes this.
<60 range:
- hackerboards.com/board/digital…
- hackerboards.com/board/radxa-r…
There are some other options in >=100 range.
See hackerboards.com/?cpu_architec…
Digital Loggers Atomic PI
Technical specifications for Digital Loggers Atomic PI on Board-DB: Intel Atom x5-Z8350 (4x x86 @1.92Ghz) 2.0 GiB RAMhackerboards.com
Weapons of Mass Delusion Are Helping Kids Opt Out of Reality
Last week’s bombshell revelation of Meta’s internal chatbot guidelines has led to a surge of attention on chatbots and kids. The guidelines demonstrate what so many experts have been saying for not just years, but decades: these products are optimized for engagement over all else. Meta is not alone. The entire industry is building technologies that are designed not to connect us to reality, but to help us avoid it by living our lives on and through its products.While there are well-documented upsides to social media, especially among marginalized youth, much of the conversation about the harms inevitably centers on contacts and content: who are young people interacting with and what are they consuming. This grounds the discussion and action in acute and tangible harms: inappropriate content, online predators, excessive screen time, etc.
But alongside both real and perceived visible threats is a more subtle and perhaps more nefarious phenomenon: a distortion of how children view themselves, and how they experience and understand human connection of all kinds. Across platforms there are literal and figurative filters that warp our faces, relationships, friendships, and intimacy into fantasies — a perversion of some of the most basic human experiences. Social media, augmented reality, and the rapidly growing world of AI chatbots are enabling avoidance at a massive scale. It’s time we start thinking about it that way.
Now surging onto the scene, we have AI companion chatbots that create (as Yuval Harari calls them) “counterfeit humans” that purport to be the perfect friend, or partner, tailored to each person's needs, desires, and opinions. They essentially allow people to craft a fantasy person that pushes them further and further into a safe and cozy echo-chamber that is completely disconnected from reality. This is not an imaginary doomer future, it’s already here. Products that we are already using are not only allowing, but actively enabling young children to trade real relationships for an illusion — or perhaps more aptly, for a delusion.
So what are the delusions? I see two main categories: (1) the delusion of physical perfection, and (2) the delusion of connection. Let’s start with what we can see: appearance filters and the delusion of physical perfection.
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure
- Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations.
- The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS software's Smart Install feature, targeting unpatched and end-of-life network devices to steal configuration data and establish persistent access.
- Primary targets include organizations in telecommunications, higher education and manufacturing sectors across North America, Asia, Africa and Europe, with victims selected based on their strategic interest to the Russian government.
- Static Tundra employs sophisticated persistence techniques including the historic SYNful Knock firmware implant (first reported in 2015) and bespoke SNMP tooling to maintain undetected access for multiple years.
- The threat extends beyond Russia's operations — other state-sponsored actors are likely conducting similar network device compromise campaigns, making comprehensive patching and security hardening critical for all organizations.
- Threat actors will continue to abuse devices which remain unpatched and have Smart Install enabled.
Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices
A Russian state-sponsored group, Static Tundra, is exploiting an old Cisco IOS vulnerability to compromise unpatched network devices worldwide, targeting key sectors for intelligence gathering.Sara McBroom (Cisco Talos Blog)
Microsoft Still Can't Say How Much the ROG Xbox Ally X Will Cost Due to "Macro-Economic" Conditions, Despite Announcing Release Date and Availability Details(Leaked prices $549.99/$899 for Ally/Ally )
Microsoft Still Can't Say How Much the ROG Xbox Ally X Will Cost Due to "Macro-Economic" Conditions, Despite Announcing Release Date and Availability Details - IGN
Microsoft has confirmed release date and availability details for the ROG Xbox Ally X, its upcoming gaming handheld made by Asus, but notably held off on confirming how much the device will cost.Tom Phillips (IGN)
like this
Technology reshared this.
CLEAR Launches Biometric eGates At Airports, In Partnership With TSA
CLEAR is rolling out eGates at TSA checkpoints for members, which will simplify the security process. Here's what to expect.
US Court Sides With Zunum (Again), Reinstating $81M Verdict Against Boeing
A long legal battle intensifies as the aerospace giant faces a blow in court.
Volaris Deploys Another Airbus A320 After Passenger Reportedly Opens Door During Pushback In Phoenix
Volaris was forced to ferry a new jet to Phoenix after the incident.
Two Alleged Pirate IPTV Operators Sent to Prison For Contempt of Court
Two men said to be the operators of SmoothStreams, a pirate IPTV service shut down by entertainment companies over three years ago, have been imprisoned in Canada. Marshall Macciacchera and his father Antonio were both found guilty of contempt and sentenced to an initial term of six months. Marshall's sentence will continue until he complies with a court order to hand over financial information and a laptop password, among other things.
Two Alleged Pirate IPTV Operators Sent to Prison For Contempt of Court * TorrentFreak
The alleged operators of SmoothStreams, a pirate IPTV service shut down over three years ago, have been imprisoned in Canada for contempt.Andy Maxwell (TF Publishing)
White House confirms talks to acquire 10% stake in Intel — 'We should get an equity stake for our money'
"We’ll get equity in return for it; get a good return for the American taxpayer, instead of just giving grants away"
like this
Hackers access data of 850,000 Orange Belgium customers
An IT system containing data such as surname, first name, telephone number, SIM card number, PUK code, tariff plan was accessed, the company said
https://www.euractiv.com/section/tech/news/hackers-access-data-of-850000-orange-belgium-customers/
Canada | Unpaid work for flight attendants could be on the way out as union declares win
Unpaid ground time for flight attendants could be on the way out as Air Canada looks to be joining a growing number of airlines that have agreed to move away from the widespread practice.
Israeli forces kill Palestinian basketball star in Gaza aid centre shooting
Local media report Mohammed Shaalan was killed while attempting to secure food and medicine for his family
Archived version: archive.is/newest/middleeastey…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Israeli forces kill Palestinian basketball star in Gaza aid centre shooting
Israeli forces killed former Palestinian national basketball player Mohammed Shaalan on Tuesday. Shaalan, 40, was killed at an aid distribution site near Khan Younis while attempting to secure food and medicine for his sick daughter, Maryam, and the…Mera Aladam (Middle East Eye)
FreeVPN.One Chrome extension spies on you, delete it immediately
A troubling exposé has shined a light on a very popular VPN extension in Chrome that is taking screenshots of everything its users do.
https://www.neowin.net/news/this-popular-chrome-extension-spies-on-you-delete-it-immediately/
Raoul Duke likes this.
11 Years Later, Elon Musk Is Floating the Flying Car Scam Again
Would you take a ride in a flying Cybertruck?
Pete Hegseth is requiring so much security it’s taking officers off of criminal investigations
Members of U.S. Army’s law enforcement arm complain they are being taken out of the field to watch defense secretary’s family and homes
New Syrian government moves to dismantle Assad’s $5bn narco-state
Syria’s new leadership under President Ahmed Al-Sharaa has launched an aggressive campaign to dismantle the vast captagon drug empire left behind by ousted dictator Bashar Al-Assad, whose regime transformed the country into one of the world’s largest narco-states. The drug trade, valued at over $5 billion annually, became a lifeline for Assad during the civil war, as sanctions and conflict crippled the economy.
Archived version: archive.is/newest/middleeastmo…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Turkey is still ready to deploy peace force in Ukraine
While Ankara may commit itself to sending troops as part of security guarantees, Russia's approval is more important than European plans
Archived version: archive.is/newest/middleeastey…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Turkey is still ready to deploy peace force in Ukraine
Turkey remains open to providing security guarantees to Ukraine in the event of a comprehensive peace agreement with Russia, including the deployment of a peacekeeping force, sources familiar with Ankara’s position told Middle East Eye.Ragip Soylu (Middle East Eye)
Microsoft’s Security Plan to Protect U.S. Government Data from Hacking Omits China Operations
The tech giant is required to regularly provide U.S. officials with its plan for keeping government data safe from hacking. Yet a copy of Microsoft’s security plan obtained by ProPublica makes no reference to the company’s China-based operations.
VPN Logging Policies in 2025: Which 'No-Logs' Providers Pass the Test?
From the article:
VPN | HQ & Eyes Alliance | Latest Independent Audit | Real-World Test | Retention Verdict* |
---|---|---|---|---|
ExpressVPN | British Virgin Islands (no data-retention laws) | KPMG ISAE 3000 Type I, Feb 2025 (ExpressVPN) | Split-tunnelling DNS leak disclosed Feb 2024 (patched) | Gold-standard. RAM-only fleet, annual audits, BVI jurisdiction. |
NordVPN | Panama | Deloitte 5th audit, Dec 2024 (NordVPN) | 2018 server breach – no logs leaked | Regular audits and positive breach outcome. |
Surfshark | Netherlands (9-Eyes) | Deloitte, Jan 2023 (Surfshark) | TunnelCrack Wi-Fi leak (Aug 2023) → patched in <7 days. | Strong audit hygiene but concerning jurisdiction. |
Proton VPN | Switzerland | Securitum, Apr 2024 (securitum.com) | N/A | Open-source clients + Swiss privacy laws. |
Mullvad | Sweden (14-Eyes) | Assured AB config audit 2023 | Swedish police raid Apr 18 2023 left empty-handed (Mullvad VPN) | Minimal-data design proven in the wild. |
Private Internet Access | USA (5-Eyes) | Deloitte, Apr 2024 (Private Internet Access) | Multiple US subpoenas produced no logs | Paper-trail-verified despite US HQ. |
CyberGhost | Romania (EU, outside Eyes) | Deloitte, May 2024 (CyberGhost VPN) | N/A | Second audit boosts trust. |
TunnelBear | Canada (5-Eyes) | Cure53 7th audit, Dec 2023 (TunnelBear: Secure VPN Service) | N/A | Longest unbroken audit streak. |
Windscribe | Canada (5-Eyes) | Cure53 server image audit 2022 | 2025 Greek/Canadian court case upheld no-logs stance (Tom’s Guide) | Policy tested – passed. |
Hotspot Shield | USA (5-Eyes) | Performance/security review by AV-Test only; no dedicated no-logs audit (vpnMentor) | AV-TEST performance audit only; no no-logs audit to date. (CVE Details) | Speed king, privacy laggard. |
Archived links:
AV-Test VPN Report – Summary of Findings
In June 2018 the independent security institute, AV-Test, released an evaluation of twelve VPNs. The following VPNs were studied: Hotspot Shield Elite, Avast SecureLine, AviraSara Levavi-Eilat (vpnMentor)
like this
GreenKnight23
in reply to Davriellelouna • • •like this
yessikg likes this.
Postmortal_Pop
in reply to Davriellelouna • • •like this
yessikg likes this.