Salta al contenuto principale



Meta is earning a fortune on a deluge of fraudulent ads, documents show


I ended up in Captcha hell trying to archive this, so I'm afraid I can't provide a link.

Meta internally projected late last year that it would earn about 10% of its overall annual revenue – or $16 billion – from running advertising for scams and banned goods, internal company documents show.

A cache of previously unreported documents reviewed by Reuters also shows that the social-media giant for at least three years failed to identify and stop an avalanche of ads that exposed Facebook, Instagram and WhatsApp’s billions of users to fraudulent e-commerce and investment schemes, illegal online casinos, and the sale of banned medical products.

On average, one December 2024 document notes, the company shows its platforms’ users an estimated 15 billion “higher risk” scam advertisements – those that show clear signs of being fraudulent – every day. Meta earns about $7 billion in annualized revenue from this category of scam ads each year, another late 2024 document states.

Much of the fraud came from marketers acting suspiciously enough to be flagged by Meta’s internal warning systems. But the company only bans advertisers if its automated systems predict the marketers are at least 95% certain to be committing fraud, the documents show. If the company is less certain – but still believes the advertiser is a likely scammer – Meta charges higher ad rates as a penalty, according to the documents. The idea is to dissuade suspect advertisers from placing ads.

The documents further note that users who click on scam ads are likely to see more of them because of Meta’s ad-personalization system, which tries to deliver ads based on a user’s interests.

https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/








Chinese EV maker Xpeng to launch robotaxis, humanoid robots with self-developed AI chips


The automaker announced on Wednesday as part of its “AI Day” that it is launching three robotaxi models. The vehicles will use four of Xpeng’s self-developed “Turing” AI chips. Xpeng claims the chips represent the combined highest in-car computing power in the world, at 3,000 TOPS, an industry measure.



Meta is earning a fortune on a deluge of fraudulent ads, documents show


Meta projected 10% of its 2024 revenue would come from ads for scams and banned goods, documents seen by Reuters show. And the social media giant internally estimates that its platforms show users 15 billion scam ads a day. Among its responses to suspected rogue marketers: charging them a premium for ads – and issuing reports on ’Scammiest Scammers.’

https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/



Router as tiny server?


Go with me here. Routers are routers, and servers are servers. Some people mix and match things, but generally, ideally, this is how it goes. And I agree.

But the router I just set up, the Google WiFi, has 4gb storage, 512mb of ram, a quad core CPU at 800mhz, is easy to flash, and only costs $10-15 on eBay all day long.

If you used it as only a little computer, no routing.. Then..

If I wanted to say... Set up a tailscale node at my family's house. Why spend $45-80, or even $130(!) on a raspberry pi with an Ethernet port, when the Google WiFi works just as well if not better for that job?

Maybe a tiny matrix server? Tiny web hosting?

Or, for a less ideal solution, but still reasonable. What if I wanted to set up a remote backup node for my main server? If my needs were small enough, the Google WiFi would be much more economical, although you'd need to add a USB hub to break out the USB ports. And there would be limitations obviously.

Or getting really crazy, you could potentially squeeze one or two bigger services onto a router, just to see if it's possible.. Minecraft server?

My question is. What is the best device for this? The Google WiFi is dirt cheap at $10-15, I'm about to pull the trigger on a second one just to play with. But I wanted to see if you guys had any other suggestions?

I tried searching the toh for similar devices, but even restricting it down every way I can think of, I've still got over a hundred devices to look at.

Basically, I think older router hardware is an overlooked, cheaper alternative, to raspberry pis, for some scenarios.

in reply to hereiamagain

Neither the Google WiFi nor an RPI make a good nas server, but either would certainly work. Some routers even have m.2 or USB connectors specifically for that reason.

For a simple web server, there's even an nginx package for OpenWRT, so you have reverse proxying and basic web hosting on that Google puck with just a couple clicks.

Another interesting possibility is putting a tftp server on your router, and using it as a pxe server.

Plenty of options, if you don't mind the performance.

in reply to K3CAN

Exactly! They're not good per sé, but you could use them, especially for a really tiny home operation.

I guess what I'm saying is...

Questa voce è stata modificata (9 ore fa)


Former Speaker Nancy Pelosi will not seek reelection


Thank God! Let's get in someone that will fight for the people. Let's pass universal healthcare, 6 months paternity and maternity leave, childcare, etc


Klimaexperte Höhne: "Wir sind nicht machtlos"




How Mamdani built an ‘unstoppable force’ that won over New York






The Internet is Dying. We Can Still Stop It


The Internet faces an existential crisis as nearly 50% of all traffic is now non-human, with AI-generated content and bots threatening to overwhelm authentic human interaction[^1]. According to recent studies, this includes automated programs responsible for 49.6% of web traffic in 2023, a trend accelerated by AI models scraping content[^1].

The problems are stark:
- Search engines flooded with AI-generated content optimized for algorithms rather than humans
- Social media platforms filled with AI "slop" and automated responses
- Genuine human content being drowned out by machine-generated noise
- Erosion of trusted information sources and shared truth

However, concrete solutions exist:

  1. Technical Defenses:

- Open-source spam filtering tools like mosparo for protecting website forms
- AI scraper blocking through systems like Anubis
- Content authenticity verification via the CAI SDK[^1]

  1. Community Building:

- Supporting decentralized social networks (Mastodon, Lemmy)
- Using open-source forum platforms that emphasize human moderation
- Participating in curated communities with active fact-checking[^1]

  1. Individual Actions:

- Using privacy-focused browsers and search engines
- Supporting trusted news sources and independent creators
- Being conscious of data sharing and digital footprint[^1]

"While exposure to AI-generated misinformation does make people more worried about the quality of information available online, it can also increase the value they attach to outlets with reputations for credibility," notes a 2025 study by Campante[^1].

[^1]: It's FOSS - The Internet is Dying. We Can Still Stop It

BrikoX doesn't like this.

in reply to cm0002

Anyone recommending Anubis which default so requiring JavaScript to pass as a solution to the dying internet is insane.
JavaScript is the primary fingerprinting tool used inside the browsers.
Questa voce è stata modificata (13 ore fa)



Mastodon 4.5 is out now


Mastodon 4.5 brings the long-awaited consent-respecting quote posts feature, as well as fetching replies from remote servers, and more customisation and moderation tools for admins. We hope you enjoy it!





UN climate summit kicks off in Brazil's Amazon with hopes for action despite US absence


It streams live here
in reply to silence7

Probably has higher chances of success with the US absent.
in reply to silence7

As a reminder. They cut down huge parts of the amazon rainforest just for this event. They built a 4 lane road right through peoples farm land, while completely ignoring the people using and living in the area. They basically cut a community in half. Hopes for action my ass.

bbc.com/news/articles/c9vy191r…

Questa voce è stata modificata (20 ore fa)

in reply to silence7

You sir, in a big doo doo dis time.
Questa voce è stata modificata (14 ore fa)





How the US cut climate-changing emissions while its economy more than doubled


I'll note that this claim is in part based on an estimate of CH₄ leakage that's lower than reality; US emissions were more like flat than declining during this period.


The Internet is Dying. We Can Still Stop It


A great article about the future of Internet concerning AI.



Tech Trivia


On November 4, 1952, CBS News used the UNIVAC computer to predict the U.S. presidential election. Early data pointed to an easy win for Dwight D. Eisenhower, but skeptical anchors delayed announcing it. When the results came in, UNIVAC was right, marking the first time a computer accurately forecast a national election.

in reply to silence7

The Gates Foundation has been a significant player in 3rd world disease eradication.

Lemmy: FUCK HIM!

I was around when Microsoft exploded onto the scene. Oh you bet he did some evil, monopolistic shit to get it rolling, but I also remember what computing was like before Windows.

Between my friends and I we had 5 different home computers. Nothing was interoperable, not even the version of BASIC, total clusterfuck. Tech was crawling compared to after Windows snapped everything into focus. Yes, I wish Linux had come sooner, but it's a clusterfuck as well.

in reply to shalafi

It’s sorta bizarre to me.

If he had not given away all the wealth trying to fight diarrheal disease, HIV, TB, and try to source the solutions to the countries themselves… he would have been the richest man in the world even in the 2020s.

Did he fuck some strange? Yeah.

Did he act ruthlessly in business to get ahead? Yeah.

Is he responsible for 80 MILLION lives saved? Yeah.

Guy is doing what whole nations have failed to do and it’s on his back. Somehow that gets so much hate.

in reply to sudoshakes

Lemmy expects the rich to splat their money out and solve everything, all at once. Told this story a few times:

There's an Indian proverb where a rich man is appalled by the poverty he sees. Gives a rupee to every beggar he sees, until he has no more rupees to give. He finds himself a beggar amongst the very people he tried to help, and didn't accomplish anything at all.

I'm not getting paid by Gates here. I understand where he came from and what he did to get where he's at, watched it in real time during my IT career. But goddam is he doing good works. He's an elderly man trying his best to leave a positive impact on the world. Not gonna act like he's some supervillain.

in reply to shalafi

Yes, fuck a pedophile trying to PR his way into "good guy" status.

Lots of evil white folks go into third world in their old age, where their money is worth 100 times more (yay colonialism) and play "saint". Their PR then turns it into an "altruism" campaign.

Trump is probably planning the same. And I'm fucking sure yankistanis and dumb people will bend over backwards to defend him cuz all the tax breaks, money silos into their own pockets are hidden behind layers and layers of shell companies and non profits. And he will get the bush treatment.

"Eh? He might have been a war criminal, but he paints now and is friends with Gobamahs wife, so cute"

Disgusting, to say the least.

Does that absolve them of the shit human they've been all their lives?

Why do you think the third world is the way it is? These children fucking billionaires are exploiting their resources one way or another, directly or indirectly with whole lot of corruption involved.

Gullible people like you elevating them to their artificially manufactured status are how the rich get to do evil exploitative shit and then manipulate "good deeds" into PR points so they and their family are more likeable.

Fuck you and Fuck Bill Gates!

in reply to silence7

Does he know that successive climate catastrophes will set the poor back too, even with help?


The Internet is Dying. We Can Still Stop It


The Internet faces an existential crisis as nearly 50% of all traffic is now non-human, with AI-generated content and bots threatening to overwhelm authentic human interaction1. According to recent studies, this includes automated programs responsible for 49.6% of web traffic in 2023, a trend accelerated by AI models scraping content1.

The problems are stark:
- Search engines flooded with AI-generated content optimized for algorithms rather than humans
- Social media platforms filled with AI "slop" and automated responses
- Genuine human content being drowned out by machine-generated noise
- Erosion of trusted information sources and shared truth

However, concrete solutions exist:

  1. Technical Defenses:

- Open-source spam filtering tools like mosparo for protecting website forms
- AI scraper blocking through systems like Anubis
- Content authenticity verification via the CAI SDK1

  1. Community Building:

- Supporting decentralized social networks (Mastodon, Lemmy)
- Using open-source forum platforms that emphasize human moderation
- Participating in curated communities with active fact-checking1

  1. Individual Actions:

- Using privacy-focused browsers and search engines
- Supporting trusted news sources and independent creators
- Being conscious of data sharing and digital footprint1

"While exposure to AI-generated misinformation does make people more worried about the quality of information available online, it can also increase the value they attach to outlets with reputations for credibility," notes a 2025 study by Campante1.


  1. It's FOSS - The Internet is Dying. We Can Still Stop It ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎


in reply to silence7

At this rate if you aren't sabotaging oil infrastructure you are contributing to the downfall of our habitat and the habitat of countless others. Thats just the harsh reality because the ones holding the reigns won't stop.


The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime


cross-posted from: lemmy.sdf.org/post/45192281

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.




Appeals Court Upholds Shaken Baby Conviction Despite Medical Examiner Recanting Testimony


Questa voce è stata modificata (21 ore fa)


The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime


cross-posted from: lemmy.sdf.org/post/45192281

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.