Salta al contenuto principale



UN experts criticize Peru over passing of legislation granting amnesty to war criminals


UN human rights experts on Tuesday voiced alarm over a newly revived law in Peru that grants amnesty to security forces accused of committing serious violations of international law between 1980 and 2000, an action that activists denounce as a setback to the country’s commitment to accountability and justice.


Archived version: archive.is/newest/jurist.org/n…


Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.



US federal judge rules Wisconsin judge cannot claim immunity in immigration obstruction case


A US federal judge on Tuesday rejected a Wisconsin state court judge’s claim of judicial immunity, allowing criminal charges to proceed against her for allegedly obstructing federal immigration enforcement.


Case file: storage.courtlistener.com/reca…



Anthropic’s auto-clicking AI Chrome extension raises browser-hijacking concerns


Security researchers have concerns that Anthropic's Claude for Chrome is vulnerable to malicious prompting. Claude for Chrome allows users to chat with Claude as they browse the web. Claude can read webpages, fill forms, and click on links and buttons to perform complex tasks for the user. But Anthropic's testing revealed that 11.2% of malicious prompting attempts succeeded even with safety measures in place. One test case was a malicious email that asked Claude to delete all emails in the user's inbox for "mailbox hygiene". AI researcher Simon Willison states that an 11.2% success rate is unacceptable for so-called AI agents, especially when several AI companies are releasing their own browser extensions. One competing product, Perplexity's Comet browser, was found to be vulnerable to a prompt injection attack that instructed it to start password recovery for the user's Gmail account. Although Perplexity attempted to fix the issue, Comet remains vulnerable to this attack.

Archive link

Technology reshared this.

in reply to salarua

First, I can't believe people are paying $100-200 / month for Ai crap.
Second, if it were free or very cheap and I could sandbox it to only respond to painful cookie request menus to reject cookies, I would use it. I have consent o matic but it does a shit job and only works on a small percentage of sites.
in reply to Imgonnatrythis

only respond to painful cookie request menus to reject cookies


You can do that just with ublock with the annoyance list, or using an extension like i don't care about cookies. Simple and efficient, no need for an "ai agent" for that

in reply to morto

I don't care about cookies seems to be for people that feel that way. It sounds like if it has any difficulty blocking cookies is just accepts the to kill the pop up. I do care about cookies. It's my understanding unlock will just get rid of the pop-ups and allow cookies to default to accepted.

Both of these tools are detrimental imo as they just work against the protections that were attempted to be put in place by the EU to help minimize cookie abuse. Using these accomplishes Exactly what websites want. They have made pop ups and menus annoying enough that people are happy. To ignore them and allow them to default to aggressive tracking methods.

in reply to Blisterexe

On an extremely limited number of sites. It performs very poorly in real world use. Especially for academically oriented sites I've noticed.







Judge denies Meta's request to dismiss sexual harassment lawsuit filed by early employee


Stonelake, who worked at Meta from 2009 until being laid off in early 2024, filed the suit against Meta in Washington state earlier this year, alleging sexual harassment, sex discrimination, and retaliation.


Case file: s3.documentcloud.org/documents…



All United Nations Security Council members, except for US, call for ceasefire and aid into Gaza


Fourteen of the 15 United Nations Security Council members - four permanent ones and 10 that rotate - are demanding a ceasefire and aid to be let into Gaza, calling the situation a "famine".


Archived version: archive.is/newest/middleeastey…


Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.




Ford recalls more than 355,000 pickup trucks over instrument display failure on the dashboard


Ford is recalling more than 355,000 of its pickup trucks across the U.S. because of an instrument panel display failure that’s resulted in critical information, like warning lights and vehicle speed, not showing up on the dashboard
#USA



The FBI and agencies in the UK, Canada, and others warn that a Chinese hacking campaign targeting US telecoms has expanded to more countries and US companies


PDF.

People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and customer edge (CE) routers, they also leverage compromised devices and trusted connections to pivot into other networks. These actors often modify routers to maintain persistent, long-term access to networks.

This activity partially overlaps with cyber threat actor reporting by the cybersecurity industry—commonly referred to as Salt Typhoon, OPERATOR PANDA, RedMike, UNC5807, and GhostEmperor, among others. The authoring agencies are not adopting a particular commercial naming convention and hereafter refer to those responsible for the cyber threat activity more generically as “Advanced Persistent Threat (APT) actors” throughout this advisory. This cluster of cyber threat activity has been observed in the United States, Australia, Canada, New Zealand, the United Kingdom, and other areas globally.

https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a

Questa voce è stata modificata (2 settimane fa)
in reply to Pro

I gotta question the sourcing on this. You've linked to a company that sells cyber security software.

Feels a bit like citing an article on HomeSecurityUSA talking about the rising number of burglaries and break-ins in your neighborhood.

in reply to UnderpantsWeevil

I am confused, are you talking about CISA or other security agencies around the world or what exactly?


Trump administration suspends FEMA employees who warned about disaster response


The letter urges Congress to take action to stop the Trump administration from dismantling FEMA and prevent “another national catastrophe like Hurricane Katrina.”
#USA


Trump Envoy Sparks Fury for Telling Lebanese Journalists Not to Be “Animalistic”


Ambassador Tom Barrack said “animalistic” behavior is “the problem with what is happening” in the Middle East.


Archived version: archive.is/newest/truthout.org…


Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.




Mexico's steel exports to US are down 16.6% in wake of tariff


Mexican steel exports to the United States declined sharply in the first half of 2025, hit hard by U.S. tariffs that increased the cost of importing the alloy into the world's largest economy.


Archived version: archive.is/newest/mexiconewsda…


Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.



Are we truly on the verge of the humanoid robot revolution?




Video game addiction in teens likely stems from preexisting mental health issues




HKU Benchmarks the Brains Behind 36 Leading LLMs


#AII


Chris Roberts hopes Squadron 42 will be “almost as big” as GTA VI next year


French report also suggests Star Citizen might hit 1.0 release in “2027 or 2028.”


The Outer Worlds 2 wants you to join the space police


Preview: The sequel's prologue stresses meaningful choices, wry humor


Healthcare Services Group data breach impacts 624,000 people


The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year.

https://www.bleepingcomputer.com/news/security/healthcare-services-group-data-breach-impacts-624-000-people/

Questa voce è stata modificata (2 settimane fa)



DHS moves to bar aid groups from serving undocumented immigrants


Disaster-aid groups said the new contracts would make it harder for nonprofits to help the most vulnerable Americans in the aftermath of a disaster.


In other words, if your house burns down, or you need rescue after being swept away in a flood, you need to produce proof of citizenship or a visa before you can get help from anybody. Even if your ID was lost or destroyed in the disaster.

Access options:
* gift link - registration required
* archive.today




Flower


Flower by Shawn D Crabtree

See more of my artwork, plus interviews with hot and up and coming artists at shawndcrabtree.com



Apple Revokes EU Distribution Rights for Torrent Client, Developer Left in the Dark


Under EU law, Apple is required to give its users more freedom to install apps that are not listed in the official App Store. This allows for easier access to software that's typically prohibited by Apple, including the popular iTorrent BitTorrent client. The iTorrent client built a steady user base over the past year, but that came to an abrupt end when Apple decided to revoke the developer's alternative distribution rights.


M.K Bhadrakumar: India Turns to China as U.S. Bullying Backfires




4chan and Kiwi Farms Sue the UK Over its Age Verification Law


cross-posted from: programming.dev/post/36419565

Lawsuit.



4chan and Kiwi Farms Sue the UK Over its Age Verification Law


Lawsuit.


Technology reshared this.

in reply to Pro

if kiwi farms was a person I would bully the crap out of it until it shit it's pants and then I'd lock it in a closet with its shitpants
Questa voce è stata modificata (2 settimane fa)


Russia-based Yandex employee oversees open-source software approved for Department of Defense use


cross-posted from: programming.dev/post/36420260

Fast-glob, a widely used Node.js utility designed to quickly find files and folders that match specific patterns, is maintained by a single developer working for Yandex, a Russian tech company that cooperates with requests from the Federal Security Service (FSB), Russia’s security and counterintelligence agency. The package has no known common vulnerabilities and exposures (CVEs); however, its status as a single-maintainer project—with no contributor oversight, poor security hygiene, and deep integration into thousands of software projects—makes it a high-risk dependency.

This package is at significant risk of falling under foreign ownership, control, and influence. We recommend its immediate removal from products, particularly those purchased or used by the U.S. Department of Defense or the Intelligence Community.

As the DoD cracks down on foreign influence in software, this serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does.




Russia-based Yandex employee oversees open-source software approved for Department of Defense use


Fast-glob, a widely used Node.js utility designed to quickly find files and folders that match specific patterns, is maintained by a single developer working for Yandex, a Russian tech company that cooperates with requests from the Federal Security Service (FSB), Russia’s security and counterintelligence agency. The package has no known common vulnerabilities and exposures (CVEs); however, its status as a single-maintainer project—with no contributor oversight, poor security hygiene, and deep integration into thousands of software projects—makes it a high-risk dependency.

This package is at significant risk of falling under foreign ownership, control, and influence. We recommend its immediate removal from products, particularly those purchased or used by the U.S. Department of Defense or the Intelligence Community.

As the DoD cracks down on foreign influence in software, this serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does.





Russia-based Yandex employee oversees open-source software approved for Department of Defense use


cross-posted from: programming.dev/post/36420260

Fast-glob, a widely used Node.js utility designed to quickly find files and folders that match specific patterns, is maintained by a single developer working for Yandex, a Russian tech company that cooperates with requests from the Federal Security Service (FSB), Russia’s security and counterintelligence agency. The package has no known common vulnerabilities and exposures (CVEs); however, its status as a single-maintainer project—with no contributor oversight, poor security hygiene, and deep integration into thousands of software projects—makes it a high-risk dependency.

This package is at significant risk of falling under foreign ownership, control, and influence. We recommend its immediate removal from products, particularly those purchased or used by the U.S. Department of Defense or the Intelligence Community.

As the DoD cracks down on foreign influence in software, this serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does.




Russia-based Yandex employee oversees open-source software approved for Department of Defense use


Fast-glob, a widely used Node.js utility designed to quickly find files and folders that match specific patterns, is maintained by a single developer working for Yandex, a Russian tech company that cooperates with requests from the Federal Security Service (FSB), Russia’s security and counterintelligence agency. The package has no known common vulnerabilities and exposures (CVEs); however, its status as a single-maintainer project—with no contributor oversight, poor security hygiene, and deep integration into thousands of software projects—makes it a high-risk dependency.

This package is at significant risk of falling under foreign ownership, control, and influence. We recommend its immediate removal from products, particularly those purchased or used by the U.S. Department of Defense or the Intelligence Community.

As the DoD cracks down on foreign influence in software, this serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does.





Russia-based Yandex employee oversees open-source software approved for Department of Defense use


Fast-glob, a widely used Node.js utility designed to quickly find files and folders that match specific patterns, is maintained by a single developer working for Yandex, a Russian tech company that cooperates with requests from the Federal Security Service (FSB), Russia’s security and counterintelligence agency. The package has no known common vulnerabilities and exposures (CVEs); however, its status as a single-maintainer project—with no contributor oversight, poor security hygiene, and deep integration into thousands of software projects—makes it a high-risk dependency.

This package is at significant risk of falling under foreign ownership, control, and influence. We recommend its immediate removal from products, particularly those purchased or used by the U.S. Department of Defense or the Intelligence Community.

As the DoD cracks down on foreign influence in software, this serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does.

Questa voce è stata modificata (2 settimane fa)


VIDEO: Mount Pleasant Resident Confronts Plain-Clothed ICE Agents


This is a satisfying watch. I thought everyone could use a feel good after all of this depressing shit today.


4chan and Kiwi Farms Sue the UK Over its Age Verification Law


Lawsuit.
Questa voce è stata modificata (2 settimane fa)



Duffy says department taking control of Union Station, extends Trump's control of Washington


National Guard troops have been on patrol inside and outside of Union Station after Trump launched the anti-crime effort earlier this month. Vice President JD Vance and Defense Secretary Pete Hegseth were shouted down by opponents of the federal intervention when they visited with troops there last week.

Duffy echoed the Republican president, who said last week he wants $2 billion from Congress to beautify Washington as part of his crackdown on the city. The Republican president has sent thousands of National Guard troops and federal law enforcement officials into Washington in a bid to fight violent crime he claimed had strangled the city.

Local police department statistics show violent crime in Washington has declined in recent years, but Trump has countered, without offering evidence, that the numbers were fudged.



Linux and Secure Boot certificate expiration


cross-posted from: piefed.social/post/1195826

From: techrights.org/n/2025/08/26/Th…

Technology reshared this.



A whistleblower at SSA said DOGE officials uploaded Social Security’s entire dataset to a vulnerable cloud system, without security or oversight measures.


A new whistleblower disclosure from SSA Chief Data Officer Charles Borges reported that DOGE officials, while working at SSA, authorized themselves to create a live, cloud-based version of SSA’s entire dataset, containing personal information of millions of Americans. DOGE officials uploaded the dataset to a vulnerable system, without including measures for security or oversight, according to a whistleblower disclosure that the Government Accountability Project submitted to the Office of Special Counsel and multiple congressional committees this week.

The report noted that SSA’s data contained details that individuals submit when applying for a Social Security card. Generally, that includes their name, location and date of birth, citizenship status, race and ethnicity, phone number, mailing address, and their parents’ names and Social Security numbers, along with other sensitive information.