South Korea bans phones in school classrooms nationwide
South Korea bans phones in school classrooms nationwide
It is the latest country to restrict phone use among children and teens.Suhnwook Lee (BBC News)
essell likes this.
Indian Court orders Internet block of Sci-Hub, Sci-Net and Libgen after publisher request
The Delhi High Court ordered the blocking of Sci-Hub, Sci-Net, and LibGen in India on August 19, 2025, following a copyright infringement case brought by academic publishers Elsevier, Wiley, and the American Chemical Society[^5][^7].The court found that Alexandra Elbakyan, Sci-Hub's founder, violated her December 2020 undertaking not to upload new copyrighted content by making post-2022 articles available through both Sci-Hub and a new platform called Sci-Net[^7]. While Elbakyan claimed this was due to technical errors and argued Sci-Net was a separate project, the court rejected these arguments[^7].
The ruling requires India's Department of Telecommunications and Ministry of Electronics and Information Technology to issue blocking orders within 72 hours, with Internet Service Providers required to implement the blocks within 24 hours[^7].
This case marks the first time Sci-Hub and LibGen faced legal action in a developing country[^2]. Earlier intervention attempts by Indian scientists and researchers had argued these platforms were "the only access to educational and research materials" for many academics in India[^2], with social science researchers specifically highlighting the "detrimental effect" blocking would have on research in India[^9].
[^2]: InfoJustice - Update on Publisher's Copyright Infringement Suit Against Sci-Hub
[^5]: Substack - GPT-4o about Sci-hub: The Delhi High Court's latest order
[^7]: SpicyIP - Sci-Hub now Completely Blocked in India!
[^9]: Internet Freedom Foundation - Social Science researchers move Delhi High Court
Social Science researchers move Delhi High Court to protect LibGen & SciHub
A group of social science researchers have filed an intervention application, with legal support from IFF, highlighting the adverse impact any decision to block LibGen and SciHub will have on them.Tanmay Singh (Internet Freedom Foundation)
BrikoX likes this.
Nature can adapt to climate change – but not at this speed
The natural world is built for change. Seasons shift. Rivers rise and fall. The climate gradually warms and cools again. Animals migrate, adapt, and evolve in response to these rhythms. This is how Earth has always worked – and how it’s supposed to work.
The pine forests of the Western U.S. offer a perfect example. For thousands of years, ponderosa and lodgepole pines evolved with periodic wildfires that swept through every decade or two. These fires weren’t disasters – they were essential.
Lodgepole pines actually depend on fire to reproduce. Their resinous cones only open in intense heat, releasing seeds onto the ash bed below. Ponderosa pines developed thick, fire-resistant bark to survive the low-intensity ground fires that cleared out undergrowth. These frequent, cool burns created open forests with widely spaced mature trees, healthy and highly productive ecosystems that provided clean water, timber, and wildlife habitat.
So the problem today isn’t change. It’s the speed of change.
Changes that used to take centuries or millennia are now unfolding in a matter of years. Levels of climate-warming carbon dioxide in the atmosphere have risen to well above 400 parts per million, a concentration that last occurred about 15 million years ago.
But even more concerning is the rate of change: By burning fossil fuels, we are emitting carbon dioxide into the atmosphere 30 times faster than at any point in the last 100 million years. That’s like putting nature’s slow-moving film on fast-forward – only the device is overheating as a result.
Nature can keep up with climate change – but not at this speed
Earth’s systems evolved to handle disturbance, but human-driven climate change is pushing them past the breaking point.Jennifer Marlon (Yale Climate Connections)
like this
Juliana Moreira svela: “Ero un Uomo e mi chiamavo Roberto”
Lo Scherzo di Juliana Moreira: “Prima ero un Uomo e mi chiamavo Roberto”
Juliana Moreira ed Edoardo Stoppa Rivivono la Loro Storia: "Mi Chiamavo Roberto Prima", lo scherzo raccontato.Redazione (Mister Movie)
The Evidence That AI Is Destroying Jobs For Young People Just Got Stronger
In a new paper, several Stanford economists studied payroll data from the private company ADP, which covers millions of workers, through mid-2025. They found that young workers aged 22–25 in “highly AI-exposed” jobs, such as software developers and customer service agents, experienced a 13 percent decline in employment since the advent of ChatGPT. Notably, the economists found that older workers and less-exposed jobs, such as home health aides, saw steady or rising employment. “There’s a clear, evident change when you specifically look at young workers who are highly exposed to AI,” Stanford economist Erik Brynjolfsson, who wrote the paper with Bharat Chandar and Ruyu Chen, told the Wall Street Journal.In five months, the question of “Is AI reducing work for young Americans?” has its fourth answer: from possibly, to definitely, to almost certainly no, to plausibly yes. You might find this back-and-forth annoying. I think it’s fantastic. This is a model for what I want from public commentary on social and economic trends: Smart, quantitatively rich, and good-faith debate of issues of seismic consequence to American society.
The Evidence That AI Is Destroying Jobs For Young People Just Got Stronger
A big nerd debate with bigger implications for the future of work, technology, and the economyDerek Thompson
like this
reshared this
Climate technology reporting: without context and perspective we mislead our audiences
Climate technology reporting: without context and perspective we mislead our audiences
Magnus Bredsdorff from Denmark unpacks the trap of current climate tech news cycles towards better context and greater audience understanding.Reuters Institute for the Study of Journalism
Scientists could soon lose a key tool for studying Antarctica's melting ice sheets as climate risks grow
Scientists say the planned decommissioning of a valuable research vessel is part of a series of actions by the Trump administration that take aim at climate science.
Scientists could soon lose a key tool for studying Antarctica's melting ice sheets as climate risks grow
This summer, the U.S. and much of the world have been pummeled by floods, fires and heat waves.Evan Bush (NBC News)
like this
How a Rock Band Bassist Is Remixing Climate Activism | Adam Met of the indie-rock band AJR thinks fan-building strategies can amplify the climate movement’s reach and impact.
How a Rock Band Bassist Is Remixing Climate Activism - Inside Climate News
Adam Met of the indie-rock band AJR thinks fan-building strategies can amplify the climate movement’s reach and impact.Inside Climate News
like this
Why a group of Catholics urged Congress to take climate action | They made a pilgrimage to Washington to mark the 10th anniversary of the late Pope Francis’ groundbreaking call to protect the Earth.
Why a group of Catholics urged Congress to take climate action
They made a pilgrimage to Washington to mark the 10th anniversary of the late Pope Francis’ groundbreaking call to protect the Earth.YCC Team (Yale Climate Connections)
like this
Zimbabwe Publishes Draft Regulations to Establish Climate Fund
Zimbabwe Publishes Draft Regulations to Establish Climate Fund
Zimbabwe published draft regulations to establish a National Climate Fund that will finance projects aimed at mitigating the impact of climate change and respond to emergencies.Godfrey Marawanyika (Bloomberg)
like this
Trump cuts to climate satellites will make weather prediction harder, scientists say
The Trump administration is scrapping satellite observations of Earth that officials say go beyond the essential task of predicting the weather.
Access options:
* gift link — registration required
* archive.today - should load a few minutes after this post goes up
One is free floating and the other is attached to the international space station. The original team hopes to find funding to save the ISS attached monitor. A more detailed article below
Protesters deny planting listening devices inside Microsoft exec’s office; company fires four workers
A group that infiltrated Microsoft’s headquarters building this week disputed the company’s account of the incident — describing their sit-in as nonviolent and saying the “listening devices” allegedly left behind were phones that fell from their pockets when they were arrested.“As Brad himself admits, if someone were to plant listening devices, this is not how they would do it,” said Hossam Nasr, one of the leaders of the group No Azure for Apartheid, referring to comments made by Microsoft President Brad Smith after seven members of the group occupied his office Tuesday afternoon. “If anything, we would like our phones back, please.”
The group, which is calling on Microsoft to cut ties with Israel over the alleged use of its technology against Palestinians in Gaza, also disputed the company’s assertion that its members do not represent elements of its workforce, and questioned the sincerity of Microsoft executives in addressing the issues the protesters have raised.
Raoul Duke likes this.
Kevin Spacey Torna a Venezia: Un Red Carpet pieno di Emozione
Un’altra Mostra del Cinema si accende con una presenza che fa discutere e riflettere: quella di Kevin Spacey. L’attore è tornato a calcare un red carpet internazionale di grande rilievo, scegliendo il Lido di Venezia per segnare un ulteriore passo nel suo atteso ritorno sotto i riflettori, dopo la conclusione positiva delle sue vicende legali.
Due Tombe ci sarà una Stagione 2? Tutto sul futuro del thriller spagnolo
Il successo di "Due Tombe" su Netflix riaccende la speranza per una nuova stagione. Scopri cosa sappiamo sul futuro della serie.Redazione (Mister Movie)
News del giorno 🔝 diggita reshared this.
Data di Uscita Gli Incredibili 3, Novità su Trama e Cast
La famiglia Parr sta per tornare, ma armati di pazienza! I fan de Gli Incredibili dovranno aspettare ancora un po’ per il terzo capitolo. L’annuncio ufficiale è arrivato, ma la data di uscita è ancora lontana: 2028, se tutto va bene.
Gli Incredibili 3 Data di Uscita nel 2028? Novità e Rumors sul Sequel Pixar
Preparati a un’attesa epica! Gli Incredibili 3 arriverà non prima del 2028. Ecco cosa sappiamo del nuovo capitolo Pixar e del cambio regia.Redazione (Mister Movie)
reshared this
Ci sarà la Seconda Stagione di If You Love 2? Notizie sulla possibile seconda stagione della serie tv
Il finale di If You Love ha lasciato i fan con il cuore spezzato, ma anche pieni di gioia. Dopo settimane di passione, è tempo di dire addio ad Ates, Leyla e al resto del cast. Ma quindi, ci sarà una seconda stagione? Scopriamolo insieme!
If You Love 2 Stagione si sarà? News sulla possibile seconda stagione della serie turca
Ates e Leyla ci hanno fatto sognare: ma cosa sappiamo sul futuro di If You Love? Scopriamo se ci sarà una seconda stagione.Redazione (Mister Movie)
reshared this
Warwick Davis nella Serie TV Harry Potter, sarà di nuovo Filius Vitious
Grandi novità dal mondo magico! Per celebrare il “Ritorno a Hogwarts”, è stato annunciato che Warwick Davis tornerà a interpretare il professor Filius Vitious nella serie TV di Harry Potter targata HBO. Un ritorno che farà felici i fan! Ma non è l’unica sorpresa che ci aspetta.
Warwick Davis torna per la Serie TV di Harry Potter, sarà ancora Filius Vitious
La serie TV di Harry Potter su HBO si arricchisce di nuovi volti! Warwick Davis riprende il ruolo di Filius Vitious. Scopri gli altri attori!Redazione (Mister Movie)
reshared this
China’s chip startups are racing to replace Nvidia
China chip startups race to replace Nvidia amid U.S. export bans - Rest of World
Chinese semiconductor startups like Cambricon, Moore Threads, and Biren are racing to rival Nvidia as U.S. export controls reshape the AI chip market.Viola Zhou (Rest of World)
Technology Channel reshared this.
TIL about Android Translation Layer (ATL), a way to port Android apps to Linux Mobile
I was searching for YouTube clients on my KDE Plasma Bigscreen GNU/Linux TV box, and found NewPipe, a popular Android YouTube frontend. Turns out this tool is how they moved it over.
Great solution alongside projects like Waydroid, as you can post individual apps to Flathub or other Linux storefronts, rather than needing to install a whole ROM to get your Android apps to appear in your Linux app tray.
It doesn't work like Wine, but I suppose the goal one day is to be able to click .APK files to install like you can with .EXE files with Wine. Currently developers need to integrate it for their (or their favourite open source) apps to install on Linux.
like this
reshared this
Cox Brief Asks Supreme Court to Reverse Draconian Piracy Liability Ruling
Cox Brief Asks Supreme Court to Reverse Draconian Piracy Liability Ruling * TorrentFreak
Cox has filed its Supreme Court brief in a legal battle with the major music labels, aiming to overturn a landmark $1 billion verdict.Ernesto Van der Sar (TF Publishing)
like this
Les 5 points à savoir sur l’e-ID
La votation du 28 septembre arrive à grand pas, alors faisons vite un tour du sujet le plus numérique de cette fournée : l’Identité électronique.
Qu’est-ce que l’e-ID, comment cela fonctionne et quels sont les points importants à retenir avant la votation ? HTTPS-VD vous a préparé son top 5 des infos à connaître pour voter avec les bonnes clefs en main.
Nous vous invitons également à nous rejoindre le jeudi 4 septembre 2025 à 19h30 à la SDMB, rue Caroline 16, pour une soirée d’information sur l’e-ID et son fonctionnement expliqué par des experts du domaine.
mobilisons.ch/events/1e42ca47-…
Petit rappel avant propos : une identité électronique n’est ni un identifiant, ni votre login, ne remplace pas vos mots de passe. Une e-ID sert uniquement à vérifier une (ou plusieurs) information précise à votre sujet une unique fois auprès d’un prestataire. Cela correspond à montrer votre carte d’identité, mais pas à utiliser une clef.
1. Maître de son identité
Le système d’identité électronique (et non identification, la nuance est importante) est programmé pour être sous le contrôle complet de l’utilisateur (= titulaire). L’application Swiyu, fournie par la Confédération, enregistrera vos informations uniquement sur votre téléphone et nulle part ailleurs. La Confédération n’intervient que pour valider ces informations et fournir un certificat d’authenticité ; elle agit donc en tant que garant de la véracité de celles-ci (Art. 2, al. 3 LeID.
Seul l’utilisateur peut valider quel prestataire de services (= vérificateur) peut vérifier ses informations. De plus, à tout moment, s’il a le moindre soupçon qu’un prestataire utilise le service d’e-ID de manière non conforme, il peut signaler le fait aux autorités, qui doivent immédiatement déclencher une enquête (audit). L’utilisateur reste donc en permanence maître de la manière dont ses informations sont vérifiées (Art. 3 LeID).
Enfin, la loi précise explicitement que l’e-ID est facultatif. Tout prestataire qui en fait usage doit, en parallèle, avoir une solution équivalente pour qui ne souhaite pas l’utiliser. Il y aura donc toujours une alternative (Art. 25 LeID).
2. Minimisation des données échangées
Les données d’identité sont stockées uniquement sur votre appareil auquel les prestataires de services n’ont pas accès. (Art. 8, al. 2 LeID) Seule sont transmises les informations validées par le titulaire et confirmées par la Confédération, sous forme codée (ou non codée, si le titulaire le choisit). Pour pouvoir utiliser le système d’e-ID, le prestataire doit effectuer une demande à la Confédération, justifiant chaque information pour laquelle il requiert une vérification (Art. 32 LeID). De plus, la vérification est automatiquement effacée après 90 jours (Art. 27 LeID), ce qui limite fortement les possibilités d’usage par les prestataires.
La Confédération ne saura en revanche pas comment le titulaire utilise son e-ID, pas plus que ce n’est le cas aujourd’hui avec la carte d’identité. (Art. 10, al. 2 LeID)
3. Décentralisée (l’identité est dans votre téléphone)
La Confédération se basera uniquement sur les registres existants pour certifier l’identité du titulaire de l’e-ID. Les informations spécifiques à l’e-ID ne seront utilisables qu’à partir de l’appareil de l’utilisateur. Une fois l’identité validée, le système est quasiment autonome vis-à-vis de l’État, ce qui lui limite drastiquement les possibilité de surveillance. Il s’agit donc d’un outil très décentralisé. Cela augmente également fortement la sécurité de l’outil, puisque si un utilisateur voit sont appareil infiltré, il sera la seule victime et les autres titulaires d’e-ID ne seront pas affectés. (eid.admin.ch/fr/technologie-f)
L’application est en revanche uniquement prévue pour les deux principaux distributeurs (Apple store et Google Play store) pour le moment. Les développeurs doivent encore trouver un moyen de s’affranchir des ces distributeurs pour rendre Swiyu accessible depuis des plateformes entièrement libres. (Pour participer : github.com/swiyu-admin-ch)
4. Non obligatoire
La loi encadrant l’e-ID est claire : son utilisation n’est pas obligatoire (Art. 25 LeID). Les organismes devront toujours proposer un autre moyen de vérifier l’identité d’une personne, même si ce service alternatif peut parfois être assorti d’un émolument (Art. 31 LeID). L’e-ID ne remplace donc pas les pratiques actuelles, mais affectera surtout les démarches déjà fortement numérisées (achats en ligne, signatures de contrat à distance, etc.). Les commerçants de quartier continueront donc à demander votre carte d’identité pour vérifier votre âge. Son déploiement plus large prendra du temps en raison des contraintes légales strictes, mais justes, qui garantissent une utilisation conforme à nos lois.
5. Code source ouvert
Enfin, la loi prévoit que le code de l’e-ID soit développé en open source, ce qui garantit transparence et auditabilité (Art. 12 LeID). Des exceptions juridiques restent toutefois possibles, et il sera important de rester attentif à leurs applications, même si la jurisprudence actuelle est plutôt favorable à l’ouverture complète du code. Nous sommes rassurés par la manière dont l’aspect « code source » du projet d’eID suisse est géré. Le processus se distingue par son exemplarité : le développement est ouvert aux contributions externes, la documentation est complète et accessible, et la transparence permet à chacun de vérifier et d’améliorer la solution. (swiyu-admin-ch.github.io/intro…)
Conclusion
En résumé, la nouvelle version de l’e-ID corrige avec brio les défauts de la première mouture. Si les exceptions prévues à la transparence forcent les citoyens à rester vigilants, le reste répond de manière explicites aux critiques formulées lors de la précédente votation. Le cadre légal présenté coche presque toutes les cases attendues pour un tel outil, et son aspect facultatif permet, comme avec les cartes bancaires, de toujours garder le choix du papier.
Ressources :
Informations sur la votation:
admin.ch/gov/fr/accueil/docume…
Loi E-ID soumise au vote:
admin.ch/gov/fr/accueil/docume…
Ordonnance sur l’E-ID:
fedlex.data.admin.ch/filestore…
Site de la confédération sur E-ID:
Dépôt du code source de l’E-ID:
Soirée d'information sur l'E-ID
À l’approche de la votation du 28 septembre sur l’identité électronique (e-ID), HTTPS-VD vous invite à une soirée d’information et de débat citoyen.mobilisons.ch
Cox Brief Asks Supreme Court to Reverse Draconian Piracy Liability Ruling
Cox Brief Asks Supreme Court to Reverse Draconian Piracy Liability Ruling * TorrentFreak
Cox has filed its Supreme Court brief in a legal battle with the major music labels, aiming to overturn a landmark $1 billion verdict.Ernesto Van der Sar (TF Publishing)
TSMC is Set To Raise Prices of Cutting-Edge Chips By Up To 10%, As It Tries to Maintain Profit Margins With 'Hefty' US Tariffs
TSMC is Set To Raise Prices of Cutting-Edge Chips By Up To 10%, As It Tries to Maintain Profit Margins W…
The Taiwan giant is factoring in a price hike for its advanced nodes, as supply chain disruptions have lowered the firm's profit marginsWccftech
[Important] Catbox Needs Your Help
tl;dr - Patreon deleted my page, refused to elaborate, and Catbox is now short $1,300~ in reoccurring income to pay the bill.
Support Catbox Here
I use catbox to post videos and moving webp files to lemmy 😭
edit: to be clear I'm not affiliated with catbox, i just shared
like this
reshared this
DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally
::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::
DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.
::: spoiler Report Highlights
- DDoS-Capable
Botnets;
- Country
Analysis;
- DDoS Attack
Vectors;
- Global
Highlights;
- Industry
Analysis.
:::
NETSCOUT DDoS Threat Intelligence Report - Latest Cyber Threat Intelligence Report
NETSCOUT’s latest DDoS Cyber Threat Intelligence Report showcases the latest trends in cyber attacks. Learn more from our latest cyber threat intelligence report.Netscout
Chromium(Browser engine that chrome is based on) reached more than 76% market share.
69.23%(Chrome)+5.03%(Edge)+1.85%(Opera)= 76.11%
Source: StatCounter.
Browser Market Share Worldwide | Statcounter Global Stats
This graph shows the market share of browsers worldwide based on over 5 billion monthly page views.StatCounter Global Stats
A new study of 58 countries shows that many online government services are served and routed via foreign networks and have low HTTPS encryption adoption rates.
- Understanding network dependencies matters for digital sovereignty, resilience, and security.
- Canada, Sweden, Switzerland, the UK, and the USA distribute government-bound traffic across multiple operators and exchange points, creating greater resilience against technical failures and geopolitical shocks.
The Digital Roads to Government Services: Uncovering Consolidation and Exposure
A new study of 58 countries shows that many online government services are served and routed via foreign networks and h…Internet Society Pulse
Piracy is for Trillion Dollar Companies | Fair Use, Copyright Law, & Meta AI
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
like this
This is why obeyong laws on purpose makes you a boot licker.
Don't lick boot unless you or your partner is sexually gratified by the act.
like this
This is great news for us! If you ever get pulled up for pirating things, just say you're using them to train an LLM and it's legal!
(Disclaimer: I am not a lawyer. This definitely will not work unless it does. But it probably won't.)
like this
like this
McCann, 37, who has a background as a visual designer, started experimenting with AI to see if it could boost his creativity and “bring some of my lyrics to life.” Last month, he signed with independent record label Hallwood Media after one of his tracks racked up 3 million streams, in what’s billed as the first time a music label has inked a contract with an AI music creator.
Tyler Denk, CEO of beehiiv: Substack just killed the creator economy
Good for them:
I wish the Tunisian people well: they've had better-quality democracy, enough to taste their real rights, & hope they take all the wisdoms/insights of Ghandi, & Nelson Mandela, & systematically force the earning of their civil-rights..
_ /\ _
Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks
cross-posted from: programming.dev/post/36686657
Main Report.::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::
like this
WHO declares Kenya free of deadly sleeping sickness after decades
like this
Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks
::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::
Part A - Main Report - Age Assurance Technology Trial
This document presents the official report of the Age Assurance Technology Trial, offering a comprehensive overview of its findings, methodologies and key observations.Age Assurance Technology Trial
Raoul Duke likes this.
U.S. takes 10% stake in Intel as Trump flexes more power over big business
Trump tweet:
It is my Great Honor to report that the United States of America now fully owns and controls 10% of INTEL, a Great American Company that has an even more incredible future. I negotiated this Deal with Lip-Bu Tan, the Highly Respected Chief Executive Officer of the Company. The United States paid nothing for these Shares, and the Shares are now valued at approximately $11 Billion Dollars. This is a great Deal for America and, also, a great Deal for INTEL. Building leading edge Semiconductors and Chips, which is what INTEL does, is fundamental to the future of our Nation. MAKE AMERICA GREAT AGAIN! Thank you for your attention to this matter.
U.S. takes 10% stake in Intel, Trump says
The Trump administration said it had taken a 10% stake in Intel, President Donald Trump’s latest extraordinary move to exert federal control over business.Rob Wile (NBC News)
Microsoft asks customers for feedback on reported SSD failures
like this
Wait. The point of the unbelievable amount of telemetry you can't even disable was to collect info in situations like this. Right? Why is there telemetry if they have to ask?
Edit: title of the article is a bit misleading, as I obviously commented before reading the article.
The "another" company they are in contacting is Phison, the manufacturer of thr affected controllers, so it doesn't sound as bad as from the title
like this
The 2009 Toyota Accelerator Scandal That Wasn’t What It Seemed
And why it matters for understanding our rocky relationship with today’s autonomous vehicles.Manufacturing.net
Apple accuses former Apple Watch staffer of conspiring to steal trade secrets for Oppo
I wanted to post this yesterday, but my instance was having issues the entire day. Apologies if this is a repost.
Shi allegedly sent a message to Oppo saying that he was working to “collect as much information as possible” before starting his job. And he searched the internet for terms like “how to wipe out macbook” and “Can somebody see if I’ve opened a file on a shared drive?” from his Apple-issued MacBook before leaving the company.
For someone who is presumably pretty intelligent, this is pretty dumb.
Apple accuses former Apple Watch staffer of conspiring to steal trade secrets for Oppo
Apple is suing a former employee on the Apple Watch team, Dr. Chen Shi, who left to join Oppo, alleging that he “conspired to steal Apple’s trade secrets relating to Apple Watch.”Jay Peters (The Verge)
reshared this
I politely disagree. Apple legal will most certainly make extreme accusations and throw the book at individuals as a deterrent to other staff who may be considering bringing “trade secret” knowledge with them as they leave. Which is basically turns any kind of creative solution to a tech problem into a “trade secret” 🍆in this reality of patents and intellectual property.
I suspect that this person thought they were getting away with something minor and it’s being spun into mustache-twirling supervillains as a warning to staff.
Sckharshantallas
in reply to silence7 • • •like this
Maeve likes this.
squaresinger
in reply to Sckharshantallas • • •Google, sadly, is truely dead.
I moved on to Duckduckgo, because the results really aren't worse. Aren't better either though.
like this
Maeve likes this.
NewNewAugustEast
in reply to squaresinger • • •I find them better. Most of the time. Google is needed every now and then.
DuckDuckGo gets to the point and skips the seo stuff.. Mostly.
Although at this point search is nearly useless no matter what you use.
MaggiWuerze
in reply to NewNewAugustEast • • •Scrollone
in reply to squaresinger • • •Stubb
in reply to Sckharshantallas • • •reksas
in reply to Stubb • • •like this
Maeve likes this.
muusemuuse
in reply to reksas • • •bruhduh
in reply to muusemuuse • • •mobile operating system
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)muusemuuse
in reply to bruhduh • • •reksas
in reply to muusemuuse • • •mrdown
in reply to silence7 • • •etherphon
in reply to silence7 • • •Gravitywell
in reply to silence7 • • •Yeah but really does that even matter when the top results are just ads anyway? The problem is advertising has taken over search engines and now AI makes it even less likely people "searching" for things will even bother to click off of the search website.
DMCA takedown abuse isn't anything new, this article seems like it was just due to 404 media having to deal with it, onlyfans is tangentially related and clearly just used in the headline for clickbait purposes... I really expected better of 404 media, The issue is a valid and increasingly worse one, it shouldnt need a clickbait headline. "DMCA Automation is ruining the internet" or something to that effect would have been a lot better.
This whole thing is also a scam on content creators, people arent pirating content by searching for it on google, they're finding out about websites by talking to people on discord (which itself is not searchable of course) and other such services. Anyone paying for these kind of takedown services is getting taken for a ride.
cygnus
in reply to Gravitywell • • •That's true, but if the important thing is to draw attention to this issue, this is a good way of doing it even if it's a creative interpretation of the truth.
like this
Maeve likes this.
solsangraal
in reply to silence7 • • •blames pirates in the headline
goes on to say how it's, yet again, actually an AI problem
Atherel
in reply to solsangraal • • •Dr. Moose
in reply to Atherel • • •Americans: invent a law that allows anyone to take down content online without any repercussions
Lemmy: blasted AI - ruining everything!
🤦♂️
hark
in reply to Dr. Moose • • •Dr. Moose
in reply to hark • • •hark
in reply to Dr. Moose • • •AI has been around in many forms for decades FYI
Enhanced capabilities and availability of tools make a difference. If a company gets the "brilliant" idea to "use AI" to file DMCA requests, encouraged by recent hype of AI and proliferation of many AI tools to make it easy to deploy, then it suddenly becomes a problem, hence why this article exists right now.
Dr. Moose
in reply to hark • • •But these tools were available for years at least. How do you think Youtube strikes down videos automatically by it's own since like 2012.
The issue is that again and again simpletons are yelling at the hammer instead of the guy that's smashing everything with it. This is so tiring, it makes all of us look so fucking stupid.
hark
in reply to Dr. Moose • • •Aggravationstation
in reply to solsangraal • • •blitzen
in reply to silence7 • • •Archangel1313
in reply to silence7 • • •olympicyes
in reply to silence7 • • •“We don't really review it [the list] because we are an agent for them,” Ananad said. “For the requests that we send out ourselves, usually they get reviewed, but sometimes they [clients] do a search by themselves, and they come across some content and they flag it and they're like, ‘We want this taken down.’ We don't review that because that is something that they want taken down. I'm not particularly sure about this case, but that is what happens. What we planned on doing was also reviewing these but it's usually not very fruitful, because the user is very sure they want that claim. And even if we say, ‘Hey, we don't think you should do that,’ they're like, ‘We want to do it. Just do it because I'm paying you for this.’ And if we just say, do it yourself, that kind of takes away the business from us. So that is basically how it works.”
What?
like this
Maeve e onewithoutaname like this.
nullroot
in reply to olympicyes • • •Devolution
in reply to silence7 • • •manxu
in reply to silence7 • • •DudeImMacGyver
in reply to silence7 • • •like this
lystopad e HeerlijkeDrop like this.
BlameTheAntifa
in reply to DudeImMacGyver • • •vacuumflower
in reply to BlameTheAntifa • • •Copyright in general is about suppressing and abusing competition, there's a little bit of difference now that the old Victorian-style copyright laws lasted as long as the author, more or less, and every legal action was taken through a court, not like these letters of happiness.
It's funny how we seem similar to the pre-WWI mood of "everything has been invented, abolish patents", I wonder if the "pre-WWI" part is too going to rhyme. Hope that not, of course, but most of the innovation seems to be in direct or indirect warfare (all of big tech is honestly that). And there's one nation whose elites seem to make weird destructive moves. And which is on the down trajectory in its GDP relative to the world for the last 50 years. And which has the world's biggest military spending.
After all, humans need a reminder that for the plethora of technologies that seem like a favorable to them weapon unseen before, there are also similarly many technologies that may be unfavorable to them weapons unseen before.
Nazi Germany used radio and encryption and maneuverability and wonderful air force to achieve successes, then the other sides used radars and computers and mass modular production and MLRS'es.
Perhaps the current rotting of copyright and patent system is because the elites think they don't need more natural peaceful development. Global bloodletting usually heals that kind of ideas. Some things can only be learned on your own experience.
phutatorius
in reply to vacuumflower • • •Copyright is a surviving instance of the old system of royal warrants: monopolies granted by a monarch, usually to cronies, occasionally as a reward for some kind of good work (scientific discovery, work of art, etc).
It's a system that's full of opportunities for corruption and bureaucratic oppression, and should either be massively scaled back, or dumped entirely. It does far more harm than good.
vacuumflower
in reply to phutatorius • • •I agree, unfortunately things only keep existing when there's balance between their sides in power.
Such balance is - those benefiting from copyright have a lot to offer and threaten to those making copyright, and the other way around.
It's all military logic now. 50 years ago it could have been solved by a popular movement, now any movement really threatening copyright will have its figures murdered left and right.
mic_check_one_two
in reply to BlameTheAntifa • • •phutatorius
in reply to mic_check_one_two • • •HexesofVexes
in reply to DudeImMacGyver • • •Goodlucksil
in reply to DudeImMacGyver • • •like this
DudeImMacGyver likes this.
phutatorius
in reply to DudeImMacGyver • • •DudeImMacGyver
in reply to phutatorius • • •_druid
in reply to silence7 • • •phutatorius
in reply to _druid • • •Just because something is legal, doesn't mean it's not scummy.
And as for people getting shit for free, I support a maximalist position on right of first sale: sharing what you own should be legal in all cases. If that inconveniences some mass aggregator of content, tough shit: the ease of sharing gives the lie to the notion that the aggregator adds any value, instead, they're just rent-seeking parasites.
fodor
in reply to silence7 • • •bruhduh
in reply to silence7 • • •MonkderVierte
in reply to silence7 • • •Article about piracy be like:
But props for that implementation; it's a real paywall, not only a layer triggered by some 3rd-party script.
Archive link
404 Media
2025-09-01 13:00:12
interdimensionalmeme
in reply to silence7 • • •vacuumflower
in reply to interdimensionalmeme • • •myfunnyaccountname
in reply to silence7 • • •sip
in reply to myfunnyaccountname • • •fr
mic_check_one_two
in reply to sip • • •This
black0ut
in reply to mic_check_one_two • • •Real
AceFuzzLord
in reply to black0ut • • •Your comment has been banned and you have been banned from this subreddit for < insert random inapplicable rule >. This message is automated by moderator bot. Do not reply.
Siegfried
in reply to myfunnyaccountname • • •humanoidchaos
in reply to silence7 • • •Advertising is ruining the internet.
Copyright and patent laws shouldn't even exist.
phutatorius
in reply to humanoidchaos • • •Alpha71
in reply to silence7 • • •phutatorius
in reply to silence7 • • •