Salta al contenuto principale



Ci sarà la Seconda Stagione di If You Love 2? Notizie sulla possibile seconda stagione della serie tv


Il finale di If You Love ha lasciato i fan con il cuore spezzato, ma anche pieni di gioia. Dopo settimane di passione, è tempo di dire addio ad Ates, Leyla e al resto del cast. Ma quindi, ci sarà una seconda stagione? Scopriamolo insieme!

Fonte

reshared this



Warwick Davis nella Serie TV Harry Potter, sarà di nuovo Filius Vitious


Grandi novità dal mondo magico! Per celebrare il “Ritorno a Hogwarts”, è stato annunciato che Warwick Davis tornerà a interpretare il professor Filius Vitious nella serie TV di Harry Potter targata HBO. Un ritorno che farà felici i fan! Ma non è l’unica sorpresa che ci aspetta.

Fonte

reshared this



China’s chip startups are racing to replace Nvidia


Technology Channel reshared this.



TIL about Android Translation Layer (ATL), a way to port Android apps to Linux Mobile


I was searching for YouTube clients on my KDE Plasma Bigscreen GNU/Linux TV box, and found NewPipe, a popular Android YouTube frontend. Turns out this tool is how they moved it over.

Great solution alongside projects like Waydroid, as you can post individual apps to Flathub or other Linux storefronts, rather than needing to install a whole ROM to get your Android apps to appear in your Linux app tray.

It doesn't work like Wine, but I suppose the goal one day is to be able to click .APK files to install like you can with .EXE files with Wine. Currently developers need to integrate it for their (or their favourite open source) apps to install on Linux.

Questa voce è stata modificata (5 giorni fa)

reshared this

in reply to Canuck

Linux mobile is the way

Lets goo.

Questa voce è stata modificata (4 giorni fa)
in reply to Canuck

There's some good potential here for sure. I use a project called Sober to run Roblox on my Linux PC, which runs the Android version. It works incredibly well.



Les 5 points à savoir sur l’e-ID


La votation du 28 septembre arrive à grand pas, alors faisons vite un tour du sujet le plus numérique de cette fournée : l'Identité électronique. Qu'est-ce que l'e-ID, comment cela fonctionne et quels sont les points importants à retenir avant la votation

La votation du 28 septembre arrive à grand pas, alors faisons vite un tour du sujet le plus numérique de cette fournée : l’Identité électronique.

Qu’est-ce que l’e-ID, comment cela fonctionne et quels sont les points importants à retenir avant la votation ? HTTPS-VD vous a préparé son top 5 des infos à connaître pour voter avec les bonnes clefs en main.

Nous vous invitons également à nous rejoindre le jeudi 4 septembre 2025 à 19h30 à la SDMB, rue Caroline 16, pour une soirée d’information sur l’e-ID et son fonctionnement expliqué par des experts du domaine.

mobilisons.ch/events/1e42ca47-…

Petit rappel avant propos : une identité électronique n’est ni un identifiant, ni votre login, ne remplace pas vos mots de passe. Une e-ID sert uniquement à vérifier une (ou plusieurs) information précise à votre sujet une unique fois auprès d’un prestataire. Cela correspond à montrer votre carte d’identité, mais pas à utiliser une clef.


1. Maître de son identité


Le système d’identité électronique (et non identification, la nuance est importante) est programmé pour être sous le contrôle complet de l’utilisateur (= titulaire). L’application Swiyu, fournie par la Confédération, enregistrera vos informations uniquement sur votre téléphone et nulle part ailleurs. La Confédération n’intervient que pour valider ces informations et fournir un certificat d’authenticité ; elle agit donc en tant que garant de la véracité de celles-ci (Art. 2, al. 3 LeID.

Seul l’utilisateur peut valider quel prestataire de services (= vérificateur) peut vérifier ses informations. De plus, à tout moment, s’il a le moindre soupçon qu’un prestataire utilise le service d’e-ID de manière non conforme, il peut signaler le fait aux autorités, qui doivent immédiatement déclencher une enquête (audit). L’utilisateur reste donc en permanence maître de la manière dont ses informations sont vérifiées (Art. 3 LeID).

Enfin, la loi précise explicitement que l’e-ID est facultatif. Tout prestataire qui en fait usage doit, en parallèle, avoir une solution équivalente pour qui ne souhaite pas l’utiliser. Il y aura donc toujours une alternative (Art. 25 LeID).

2. Minimisation des données échangées


Les données d’identité sont stockées uniquement sur votre appareil auquel les prestataires de services n’ont pas accès. (Art. 8, al. 2 LeID) Seule sont transmises les informations validées par le titulaire et confirmées par la Confédération, sous forme codée (ou non codée, si le titulaire le choisit). Pour pouvoir utiliser le système d’e-ID, le prestataire doit effectuer une demande à la Confédération, justifiant chaque information pour laquelle il requiert une vérification (Art. 32 LeID). De plus, la vérification est automatiquement effacée après 90 jours (Art. 27 LeID), ce qui limite fortement les possibilités d’usage par les prestataires.

La Confédération ne saura en revanche pas comment le titulaire utilise son e-ID, pas plus que ce n’est le cas aujourd’hui avec la carte d’identité. (Art. 10, al. 2 LeID)

3. Décentralisée (l’identité est dans votre téléphone)


La Confédération se basera uniquement sur les registres existants pour certifier l’identité du titulaire de l’e-ID. Les informations spécifiques à l’e-ID ne seront utilisables qu’à partir de l’appareil de l’utilisateur. Une fois l’identité validée, le système est quasiment autonome vis-à-vis de l’État, ce qui lui limite drastiquement les possibilité de surveillance. Il s’agit donc d’un outil très décentralisé. Cela augmente également fortement la sécurité de l’outil, puisque si un utilisateur voit sont appareil infiltré, il sera la seule victime et les autres titulaires d’e-ID ne seront pas affectés. (eid.admin.ch/fr/technologie-f)

L’application est en revanche uniquement prévue pour les deux principaux distributeurs (Apple store et Google Play store) pour le moment. Les développeurs doivent encore trouver un moyen de s’affranchir des ces distributeurs pour rendre Swiyu accessible depuis des plateformes entièrement libres. (Pour participer : github.com/swiyu-admin-ch)

4. Non obligatoire


La loi encadrant l’e-ID est claire : son utilisation n’est pas obligatoire (Art. 25 LeID). Les organismes devront toujours proposer un autre moyen de vérifier l’identité d’une personne, même si ce service alternatif peut parfois être assorti d’un émolument (Art. 31 LeID). L’e-ID ne remplace donc pas les pratiques actuelles, mais affectera surtout les démarches déjà fortement numérisées (achats en ligne, signatures de contrat à distance, etc.). Les commerçants de quartier continueront donc à demander votre carte d’identité pour vérifier votre âge. Son déploiement plus large prendra du temps en raison des contraintes légales strictes, mais justes, qui garantissent une utilisation conforme à nos lois.

5. Code source ouvert


Enfin, la loi prévoit que le code de l’e-ID soit développé en open source, ce qui garantit transparence et auditabilité (Art. 12 LeID). Des exceptions juridiques restent toutefois possibles, et il sera important de rester attentif à leurs applications, même si la jurisprudence actuelle est plutôt favorable à l’ouverture complète du code. Nous sommes rassurés par la manière dont l’aspect « code source » du projet d’eID suisse est géré. Le processus se distingue par son exemplarité : le développement est ouvert aux contributions externes, la documentation est complète et accessible, et la transparence permet à chacun de vérifier et d’améliorer la solution. (swiyu-admin-ch.github.io/intro…)

Conclusion


En résumé, la nouvelle version de l’e-ID corrige avec brio les défauts de la première mouture. Si les exceptions prévues à la transparence forcent les citoyens à rester vigilants, le reste répond de manière explicites aux critiques formulées lors de la précédente votation. Le cadre légal présenté coche presque toutes les cases attendues pour un tel outil, et son aspect facultatif permet, comme avec les cartes bancaires, de toujours garder le choix du papier.

Ressources :


Informations sur la votation:

admin.ch/gov/fr/accueil/docume…

Loi E-ID soumise au vote:

admin.ch/gov/fr/accueil/docume…

Ordonnance sur l’E-ID:

fedlex.data.admin.ch/filestore…

Site de la confédération sur E-ID:

eid.admin.ch/fr

eid.admin.ch/fr/e-id-f

Dépôt du code source de l’E-ID:

github.com/swiyu-admin-ch





[Important] Catbox Needs Your Help


tl;dr - Patreon deleted my page, refused to elaborate, and Catbox is now short $1,300~ in reoccurring income to pay the bill.
Support Catbox Here


I use catbox to post videos and moving webp files to lemmy 😭

edit: to be clear I'm not affiliated with catbox, i just shared

Questa voce è stata modificata (5 giorni fa)

reshared this



DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally


::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand
: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand
: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::

DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.


::: spoiler Report Highlights
- DDoS-Capable
Botnets
;
- Country
Analysis
;
- DDoS Attack
Vectors
;
- Global
Highlights
;
- Industry
Analysis
.
:::




A new study of 58 countries shows that many online government services are served and routed via foreign networks and have low HTTPS encryption adoption rates.


  • Understanding network dependencies matters for digital sovereignty, resilience, and security.
  • Canada, Sweden, Switzerland, the UK, and the USA distribute government-bound traffic across multiple operators and exchange points, creating greater resilience against technical failures and geopolitical shocks.
Questa voce è stata modificata (6 giorni fa)


Piracy is for Trillion Dollar Companies | Fair Use, Copyright Law, & Meta AI


Piracy is for Trillion Dollar Companies | Fair Use,...
youtube.com/watch?v=sdtBgB7iS8…
in reply to BentiGorlich

This is why obeyong laws on purpose makes you a boot licker.

Don't lick boot unless you or your partner is sexually gratified by the act.

in reply to BentiGorlich

This is great news for us! If you ever get pulled up for pirating things, just say you're using them to train an LLM and it's legal!

(Disclaimer: I am not a lawyer. This definitely will not work unless it does. But it probably won't.)


in reply to Pro

Do AI music creators actually have any success? I'm gonna need some numbers on that.
in reply to Thorry

McCann, 37, who has a background as a visual designer, started experimenting with AI to see if it could boost his creativity and “bring some of my lyrics to life.” Last month, he signed with independent record label Hallwood Media after one of his tracks racked up 3 million streams, in what’s billed as the first time a music label has inked a contract with an AI music creator.



in reply to Davriellelouna

Good for them:

I wish the Tunisian people well: they've had better-quality democracy, enough to taste their real rights, & hope they take all the wisdoms/insights of Ghandi, & Nelson Mandela, & systematically force the earning of their civil-rights..

_ /\ _



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::





Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



U.S. takes 10% stake in Intel as Trump flexes more power over big business


Trump tweet:

It is my Great Honor to report that the United States of America now fully owns and controls 10% of INTEL, a Great American Company that has an even more incredible future. I negotiated this Deal with Lip-Bu Tan, the Highly Respected Chief Executive Officer of the Company. The United States paid nothing for these Shares, and the Shares are now valued at approximately $11 Billion Dollars. This is a great Deal for America and, also, a great Deal for INTEL. Building leading edge Semiconductors and Chips, which is what INTEL does, is fundamental to the future of our Nation. MAKE AMERICA GREAT AGAIN! Thank you for your attention to this matter.


in reply to themachinestops

Wait. The point of the unbelievable amount of telemetry you can't even disable was to collect info in situations like this. Right? Why is there telemetry if they have to ask?

Edit: title of the article is a bit misleading, as I obviously commented before reading the article.

The "another" company they are in contacting is Phison, the manufacturer of thr affected controllers, so it doesn't sound as bad as from the title

Questa voce è stata modificata (1 settimana fa)
in reply to infeeeee

This will help them keep the (reported) number of incidents down. Only a fraction of people will report it.
in reply to infeeeee

They have received no official reports, and cannot reproduce the issue. I'm betting this is a case of a couple drives failing and then everyone screaming at MS without any verification.


Apple accuses former Apple Watch staffer of conspiring to steal trade secrets for Oppo


I wanted to post this yesterday, but my instance was having issues the entire day. Apologies if this is a repost.

Shi allegedly sent a message to Oppo saying that he was working to “collect as much information as possible” before starting his job. And he searched the internet for terms like “how to wipe out macbook” and “Can somebody see if I’ve opened a file on a shared drive?” from his Apple-issued MacBook before leaving the company.


For someone who is presumably pretty intelligent, this is pretty dumb.

reshared this

in reply to puppinstuff

If they just made up a bunch of accusations with paltry evidence to prove it, the scandal would make headlines. "iPhone maker found to be full of shit in court!" is clickworthy gold. I don't think your stance is very strong. Every entity tries to spin things in their favor, but you make it sound like they'd bring an empty case and they very much would not. No one starts a lawsuit they don't think they can win unless they're someone with no credibility and endless money like Elon Musk (see lawsuit against Apple and OpenAI) or oil companies going after environmental lawyers.
in reply to some_guy

I politely disagree. Apple legal will most certainly make extreme accusations and throw the book at individuals as a deterrent to other staff who may be considering bringing “trade secret” knowledge with them as they leave. Which is basically turns any kind of creative solution to a tech problem into a “trade secret” 🍆in this reality of patents and intellectual property.

I suspect that this person thought they were getting away with something minor and it’s being spun into mustache-twirling supervillains as a warning to staff.



Ukraine shoots down Russian Orlan 'mother drone' carrying FPVs for first time, military says


Ukrainian anti-aircraft gunners shot down a Russian Orlan drone carrying two first-person-view (FPV) drones under its wings for the first time, the 118th Separate Mechanized Brigade reported on Aug. 22.

This marks the first time the Ukrainian military has destroyed a so-called "mother drone" carrying other UAVs, the brigade claimed.

"Anti-aircraft gunners from the 118th Separate Mechanized Brigade destroyed an enemy Orlan drone carrying two FPV drones under its wings," the unit said in a Facebook post.

"Prior to this, the pilots of the pursuit platoon had already shot down dozens of enemy reconnaissance drones — Orlan, Zala, and Supercam — but this was the first time they had managed to destroy a mother drone."

The Orlan is a Russian-developed reconnaissance drone widely used by Russia in Ukraine. Feared by Ukrainian soldiers, it often serves to target Russian artillery attacks. It can travel 600 kilometers and climb to an altitude of 5,000 meters.



European postal services suspend shipment of packages to US over tariffs


ATHENS, Greece (AP) — The end of an exemption on tariff duties for low-value packages coming into the United States is causing multiple international postal services to pause shipping as they await more clarity on the rule.

The exemption, known as the “ de minimis” exemption, allows packages worth less than $800 to come into the U.S. duty free. A total of 1.36 billion packages were sent in 2024 under this exemption, for goods worth $64.6 billion, according to data from the U.S. Customs and Border Patrol Agency.

It is set to expire on Friday. On Saturday, postal services around Europe announced that they are suspending the shipment of many packages to the United States amid confusion over new import duties.

https://apnews.com/article/us-tariffs-goods-services-suspension-85c7b36b9e92c0e640dfe2ac418cd907



Tlaib tells pro-Palestinian activists to continue protest: 'We are winning'



in reply to ramenshaman

Looks like it does, at least in "private spaces"

codes.findlaw.com/ca/penal-cod…

(I'm assuming that CA means California and not Canada)

Questa voce è stata modificata (1 settimana fa)


Flight from Mumbai to Zurich Businessman (44) rapes girl (15) on Swiss plane - convicted


cross-posted from: reddthat.com/post/48520958

::: spoiler More Sources.
- The Nightly;
- The Sun;
- WION;
- Daily Mail;
- International Business Times;
- The Local;
- LBC;
- Daily Express;
- National World.
:::

While researching this news story I noticed that it was removed twice from Reddit by the mods with no clear reasons, so I added here some extra sources to make sure everything here is accurate.

I am not sure if the news story is being censored or if there is other reasons.

If you find any local articles or coverage that can add more context, please drop them in the comments and I will add them to the post.

Questa voce è stata modificata (2 settimane fa)
in reply to scratsearcher 🔍🔮📊🎲

The article makes no mention of his religion. And even if we were to stereotype purely on nationality, Muslim would be the wrong conclusion.

I mean, he could be, but his religion has f--k all to do with the fact he's a pervert willing to take advantage of a weaker individual.

I can think of a certain President who's in that club and people seem to love him for it. They should deport him.

in reply to palordrolap

You think you can separate religion from culture in a deeply religious society? Religion absolutely plays a part in this man’s behaviour.


Downed Ukrainian Drone Causes Fire At Kursk Nuclear Power Plant


cross-posted from: reddthat.com/post/48586490


Chinese bridge collapse kills at least 12 construction workers


The collapse of an under-construction railway bridge over a major river in China has killed at least 12 workers and left four others missing, state media reports said.

Aerial photos from the official Xinhua News Agency show a large section missing from the bridge’s curved aquamarine arch. A bent section of the bridge deck hangs downward into the Yellow River below.

https://apnews.com/article/china-qinghai-railway-bridge-collapse-e8db25aeecfa32f7f3583fb336d5c8b7


in reply to xc2215x

I’m a Digg groundbreaker, just because I wanted to see what the hubbub was about.

It’s definitely not a Reddit rip off, in fact Lemmy is closer to a “Reddit ripoff” than dig.

That said it is definitely being auto moderated by AI and they’re absolutely using AI all over the place but saying it’s “human at the core and tech at the edges”

If you’re on Digg it’s possible to be in regular contact with the devs and they kind of dance around how much AI agents are being used.

That said the AI tldr is actually really cool only because of how horribly it butchers some articles and you get to read wild stuff like JD Vance shooting Trump in the face for peeing the bed because the AI read the ads also.

in reply to prettybunnys

"human at the core and tech at the edges"


Funny stuff, this how you know they have zero respect for their users.


in reply to ☂️-

Just before Covid it was in British news that austerity hadn’t worked (No shit…), so what did they do? More austerity. It’s fucking infuriating.
in reply to Darleys_Brew

it is. just a way to pinch pennies from us to themselves. they are ripping the proverbial copper from the walls.

in reply to themachinestops

Streisand effect: the BBC is telling every last kid that VPN is exactly the way to circumvent the prohibition.
Questa voce è stata modificata (1 settimana fa)
in reply to acargitz

Because the goal is to outlaw VPNs. To do that they need enough children to use VPNs to make it credible enough.
in reply to plyth

Is there a plausible way they actually ban the use of VPNs? Like, they can make it illegal on paper, but even in China, which has long had strict restrictions on internet use, I've heard that VPN use is widespread.

It just all seems like performative whack-a-mole to me. The only people who can control what a kid sees online are their parents or guardians. A child is not buying themselves a laptop or an iPad.

in reply to themachinestops

I know that this is all just theater to just destroy any semblance of free speech and privacy on the internet but if I'm completely honest I also don't even understand people who freak out about kids looking at porn. Like, I get protecting children obviously from predators (fucking Roblox), but also I saw hardcore porn on the internet super early when I was like 8 and the only trauma I ever felt was the fear of being caught looking at it by my parents, who were otherwise pretty chill about me seeing really violent media.

And before me and the internet, kids were looking at their grampa's/dad's porn magazines or finding it in the woods or getting some 18 year old to buy it for them. It was harder but I'm telling you they found it.

I feel like a bigger concern for kids right now is microplastics, lead poisoning, and climate change and you don't see nearly the same hysteria about that shit in mainstream politics.


in reply to TRock

It’s used for cooling, so in the atmosphere.
in reply to TRock

Vapor into atmosphere and goes down somewhere else as rain.

the bigger issue for me is , the billions of litres of water sitting in warehouses packaged as bottles , cans , food as in soups , and more its literally water missing in the natures recycling circle.


in reply to 🇦🇺𝕄𝕦𝕟𝕥𝕖𝕕𝕔𝕣𝕠𝕔𝕠𝕕𝕚𝕝𝕖

The port can’t get power to electrify ships while they are in port. The data centers are literally in the port and have consumed or reserved it all.

Ships that dock can’t shut down their engines at that port so they are likely to dock elsewhere.

in reply to Brkdncr

It’s a misleading headline at best, clickbaiting the “ai bad” crowd.
in reply to 🇦🇺𝕄𝕦𝕟𝕥𝕖𝕕𝕔𝕣𝕠𝕔𝕠𝕕𝕚𝕝𝕖

Not a thing. From the article:

In some places, the main criticism that residents have about data centers has to do with the amount of water they consume to cool servers. This isn’t the case in Marseille, however, which is well-supplied with this resource. The authorities have even given Digital Realty access to water from the former underground drainage channels of the Gardanne coal mines, located north of Marseille. The water flows into the port, so the firm can use it to cool its systems.


in reply to Davriellelouna

“AI”

Sharpening, Denoising and upscaling barely count as machine learning. They don’t require AI neural networks.

in reply to FauxLiving

Sharpening is a simple convolution, doesn't even count as ML.

I really hate that everything gets the AI label nowadays

Questa voce è stata modificata (1 settimana fa)
in reply to hushable

The “ai bad” brainrot has everyone thinking that any algorithm is AI and all AI is ChatGPT.
in reply to FauxLiving

To be fair, back before ML natural language programming, non-tech folks often assumed coding was just telling the computer what you want in plain English. Today that's what vibecoders do
in reply to ziggurat

It would be nice if it ever gets as good as the Star Trek bridge computer. Maybe we can save more whales
in reply to Davriellelouna

Well, youtube is not even intended to host quality content anymore, but besides that, this appears to just be visual tweaks. This title is trying to be vague enough that one could assume it's tweaking the content itself which would be of real concern. It's not doing that (for now). Video graphics seems like an awefully minor thing to be screaming about AI over. Especially when AI has actual reprocussions in the knowledge accuracy sector.
Questa voce è stata modificata (1 settimana fa)

in reply to Davriellelouna

I'm starting to think maybe there should be some regulation on plastic usage
in reply to Davriellelouna

Welcome.

To plastic Island!

Uuu! Is that?

Why yes young lady, that is the legendary HDPE mountain!



Baidu, China's robotaxi leader, sets sights on Europe


in reply to Davriellelouna

My next post after this one was lemmy.world/post/34898968 (a story about a Baidu taxi driving into a construction pit) in my home feed.

Hopefully the EU itself can provide its own competitor in this space and that the EU actually enforces its own privacy and safety laws against this behemoth.

in reply to NebLem

I mean, they can set sight on Europe, but I am not sure it's even legal here, so quite an Uphill battle.


Are there any bots that we can use to mirror posts from subreddits?


Seems like it would be a good way to funnel content into more niche communities by tying their posts to whatever is posted on a subreddit until they can take off on their own.

Does such a thing exist? If not, making it shouldn't be too difficult. I could probably whip something up real quick and toss it up on a software sharing platform.

Would anyone be interested in something like this? It could actually work really well with Lemmy's option to show/hide bot posts because people could choose if they want to see it at all.

Questa voce è stata modificata (2 settimane fa)
in reply to icystar

There were a lot more during one of the big Reddit migrations but they don’t work.

Communities need engagement and you don’t get that with bot cross posts.

in reply to Brkdncr

Yeah I remember when people were "backing up" subreddits here and mostly just created a shitload of dead posts that the original OP had no idea existed
in reply to icystar

fediverser.io/ is the project. alien.top/ and fediverser.network/ are the instances running it, but only alien.top is doing (some) mirroring.
Questa voce è stata modificata (1 settimana fa)