Salta al contenuto principale


in reply to Meow-Misfit

A blog requires a platform designed for blogging. Staying within the realm of federated software, the three natural alternatives are:
1) WordPress, which, thanks to the plugin that makes it compatible with Activitypub, has achieved a level of perfect integration with the Fediverse.
2) Ghost, which, federated a few months ago, is not only a blogging platform but is also specifically designed for creating mailing lists based on the Substack model.
3) Writefreely, which, despite being natively federated, is extremely focused on distraction-free writing and therefore has some seriously limiting features.

Friendica


As for Friendica, I'm a huge fan of that software and manage the second-most active instance in the entire Fediverse. I can assure you that I know it well and appreciate all its most important features. But don't be fooled by the fact that some call it macro-blogging software. In fact, if you visit a Friendica account's profile, it's not possible to filter the Timeline of their posts from the Timeline of the posts they've reshared. So, you could virtually create a page like this:

poliverso.org/profile/saio

But you could only do that if you don't share too much other content, otherwise the result would be like this:

poliverso.org/profile/notizie

which would be much more confusing 😅

However, Friendica is a very powerful software that allows you to republish your blog feed, as well as automatically reshare your federated blogs. Here I've listed some very interesting Friendica features for blogging:

poliverso.org/display/0477a01e…

So, to recap, if you want to use Friendica to create your blog, you can: you can create a new account. Remember to define it as a "page account," if possible, but also remember that when you reshare content you like, it will appear on your profile page.
However, if you don't need the full suite of tools that characterize a social media platform, you're better off using WordPress.

Sharkey


We're talking about software with a very nice interface, but it's still a social networking software. Being essentially a fork of Misskey, it also has a section for creating static pages that can be easily viewed from outside the Fediverse, but these pages can't be federated with Activitypub 😭.
Ultimately, it seems even less suitable for creating a blog.
If you absolutely must use a Fediverse social media platform, then you'd be better off going with Friendica!

Hubzilla


PS: There's also a software called Hubzilla, which is compatible with Activitypub, although it has developed its own communication protocol. I'm only mentioning it because it's a feature-rich and well-designed product, but its interface is quite complex and unfriendly, so although I've chosen to mention it, I can't recommend it as an alternative.


Ho già un blog: a cosa potrebbe servirmi Friendica?

@Che succede nel Fediverso?

Friendica è un social molto particolare che consente di scrivere post lunghi, formattati, con immagini in linea e dotati di un vero titolo; inoltre presenta alcune primitive funzionalità di pubblicazione programmata che ricordano quelle delle piattaforme di blogging più utilizzate.

Ecco perché chi usa Friendica è spesso un utente proveniente da Mastodon, un sistema che con le sue limitazioni permette una fruizione passiva del Fediverso piuttosto completa, ma una capacità di pubblicazione attiva decisamente limitata.

Oggi cerchiamo di capire perché Friendica potrebbe essere una soluzione utile anche per chi possiede già un blog e che quindi dispone già di sistemi di pubblicazione avanzati o, addirittura, sta utilizzando piattaforme già federate, come Writefreely o come Wordpress con il fantastico plugin Activitypub for Wordpress.
1) Impostare il proprio account Friendica per fare in modo che ricondivida automaticamente i post pubblicati dal proprio blog

Per attivare questa funzionalità (che funzionerà solo se il blog dispone di un feed RSS o se è federato con il Fediverso), è sufficiente inserire l'indirizzo del blog nella casella di ricerca di Friendica e premere il pulsante "Cerca". A quel punto bisognerà seguire il blog, che comparirà come un qualsiasi altro contatto, e selezionare tra le opzioni del contatto "Duplica come miei messaggi" (per i blog non federati) o "Ricondivisione nativa" (per i blog federati).

2) Sopperire alle mancanze di un blog Writefreely.

Writefreely è infatti la piattaforma di pubblicazione federata più semplice ma, nel suo obiettivo "distrazioni zero", l'utente che pubblica un post su Writefreely, in caso di risposta da parte di un qualsiasi utente del Fediverso, non solo non riceverà alcuna notifica ma addirittura non potrà vedere le risposte a meno che non disponga di un'utenza social. Per questo motivo consigliamo a tutti coloro che abbiano un'utenza social di inserire in fondo al post a mo' di firma il proprio identificativo social nella forma @nomeutente@istanza: in tal modo, chi risponderà al post Writefreely, risponderà anche a quell'indirizzo del fediverso. Purtroppo però l'utente, nella propria risposta, potrebbe anche cancellare il secondo indirizzo, per cui non ci sarebbe più alcuna possibilità di venire allertati su quella risposta! Proprio qui ci viene in aiuto Friendica: infatti, utilizzando il sistema spiegato nel punto 1), ossia la ricondivisione automatica, Friendica ci farà avere anche una notifica ogni volta che qualcuno risponde al post che il sistema ha ricondiviso! Questa limitazione di Writefreely può essere estesa a tutti i blog federati che hanno deliberatamente disattivato le risposte degli utenti: in quei casi, le risposte ci saranno lo stesso e saranno visibili dal Fediverso, solo che non verranno "viste" dal blogger.

3) Creare o usare un gruppo Friendica tematico

Un gruppo Friendica tematico (una sorta a metà tra una lista di distribuzione e un gruppo Facebook) che possa essere "menzionato" da tutti i blog Wordpress federati (il blog dovrà "seguire" il gruppo Friendica, una funzionalità prevista nei plugin di Wordpress). In tal modo, quando un post menziona il gruppo Friendica, il gruppo Friendica ricondividerà il post a favore di tutti coloro che già seguono il gruppo.

PS: approfittiamo per far sapere a tutti i nostri follower che esistono due account dedicati a chi è interessato ai blog federati

1) Il primo è @Il blogverso italiano di Wordpress dedicato a tutti i blog italiani wordpress che si sono federati attraverso il fantastico plugin sviluppato da @Matthias Pfefferle
Chiunque sia interessato a essere aggiunto tra i blog ricondivisi o a segnalare un nuovo blog Wordpress federato, può farci sapere direttamente a questo account

2) Il secondo è @I blog di Writefreely dedicato ai blog italiani basati su Writefreely. L'account al momento non ricondivide i post degli account, ma rispecchia i loro feed RSS. Ah, l'account è anche un gruppo Friendica e quindi se volete segnalare nuovi blog Writefreely, potete farlo menzionando quell'account


reshared this


in reply to potoooooooo ✅️

Broke spaghetti last night while cooking for dinner.
I also threw it against the cabinet to make sure it was done cooking.

I have a toddler so cooking "rules" go out the window for laughter.

in reply to 7U5K3N

I also threw it against the cabinet to make sure it was done cooking.


So you don't have a mouth?



Network Configuration Questions


I am rebuilding my system and I have a few questions related to network set up. I have installed a new Unifi system, set up IoT VLAN and opened port for HA. That part I THINK is right. My questions lie with setting up DuckDNS and Let's Encrypt. I plan on doing more self hosting stuff in the future. Can/Should I be doing things like Dynamic DNS and certificates via an entity outside of HA such as my router or some other container in the "system" or is it better to handle HA's requirements inside of HA itself?

Additionally, in my current config I can only reach the HA brain via the DuckDNS URL. What sort of set up is required to have the unit accessible when the internet is down? Seems with the mobile app it is the URL or nothing. What do I need to be doing for internal access when on local LAN?

I am running it on the HA Blue hardware and I plan to rebuild from scratch if that matters. I am sketchy on the network set up and making sure things are all secure. Bit paranoid lol. So if you have any good set up guides on this portion it would be appreciated. Thanks.

in reply to lorentz

so now HA needs an proxy server and a DNS server? There has to be a simpler method that adding additional devices on to the network. More devices, more complex and more points of failure.
in reply to KingOogaBooga

HA doesn't need either of these, but if you want an SSL certificate (to run over HTTPS instead of plain HTTP) it is bound to a domain name, which must be public unless you want to enter in the zone of adding our custom certification authority to each of your devices.
This name is resolved by a public DNS. You asked how to use it when internet is down, in this case a public DNS is not reachable so you need your own on the local network.

The reverse proxy is useful when you have a bunch of web services and you want to protect all of them with HTTPS. Instead of delivering the certificate to each of them, you add the HTTPS layer at your reverse proxy and it queries the servers behind in plain HTTP. The reverse proxy has also the benefit of making handling subdomains easier. So instead of distinguishing the different services because they have a different port number you can have a few ha.my.domain/ and feedreader.my.domain/

If you just have homeassistant and not care of HTTPS the easiest option is to use the local resolution: modern OSes advertise the name of the device on the network and it can be resolved on the .local domain. But, if you configured HTTPS to use name.duckdns.org/ you'll se an error when you try to use name.local/ because your browser sees a mismatch between the name in the certificate and the name that you are trying to connect to. You can always ignore this error and move on, but it mostly defeats the point of HTTPS.



Meta – Du rachat de Limitless à la conquête de l’information en temps réel


Le géant de la technologie ne cache plus ses ambitions. Dans une démarche visant à dominer l'écosystème de l'intelligence artificielle, Meta vient d'annoncer l'acquisition de la startup Limitless, créatrice d'un pendentif connecté dopé à l'IA. Mais ce rac

Logo de Meta sur un fond bleu avec des motifs géométriques.
Le géant de la technologie ne cache plus ses ambitions. Dans une démarche visant à dominer l’écosystème de l’intelligence artificielle, Meta vient d’annoncer l’acquisition de la startup Limitless, créatrice d’un pendentif connecté dopé à l’IA. Mais ce rachat n’est qu’une pièce du puzzle. Parallèlement à cette expansion matérielle, la firme de Mark Zuckerberg modifie la manière dont nous consommons l’actualité via ses chatbots, soulevant de nouvelles questions sur l’avenir de l’information et de nos données personnelles.


Jusqu’à présent, la stratégie matérielle de Meta reposait essentiellement sur deux piliers, les casques de réalité virtuelle Quest et les lunettes connectées Ray-Ban. L’acquisition de Limitless montre une volonté de diversification. L’entreprise, anciennement connue sous le nom de Rewind, s’était fait connaître avec un logiciel de productivité capable d’enregistrer tout ce qui se passait sur un écran d’ordinateur pour le rendre consultable via un chatbot. Elle a ensuite pivoté vers le matériel avec le « Pendant », un clip microphone Bluetooth conçu pour enregistrer, transcrire et résumer les conversations du quotidien. Dan Siroker, son PDG, a justifié cette fusion en évoquant une vision commune avec Meta, apporter une « superintelligence personnelle » à tous. En rejoignant la division Reality Labs, l’équipe de Limitless ne continuera pas nécessairement à développer son pendentif, mais intégrera son expertise dans la conception des futurs « wearables » (technologies portables) du groupe.

youtu.be/uuGTJzl1OVU

Pour les utilisateurs actuels du pendentif (principalement américains), la nouvelle est en demi-teinte. Si l’entreprise promet de maintenir le support pendant au moins un an, la commercialisation du produit cesse immédiatement. En guise de compensation, les abonnements payants sont supprimés, offrant un accès gratuit aux fonctionnalités premium pour la durée restante du support. Consciente des enjeux de confidentialité, la société permet désormais aux utilisateurs d’exporter ou de supprimer totalement leurs données s’ils ne souhaitent pas suivre l’aventure chez Meta.

Au-delà des lunettes: la guerre des wearables audio


Ce rachat n’est pas anodin. Il confirme que l’industrie tech cherche le facteur de forme idéal pour l’IA, au-delà du smartphone. Les lunettes connectées ne conviennent pas à tout le monde, et le format badge ou pendentif émerge comme une alternative crédible pour l’enregistrement audio passif. L’audio est en effet le terrain de jeu où les modèles d’IA actuels excellent le plus avec la transcription précise et le résumé contextuel. En intégrant la technologie de Limitless, et en s’appuyant sur des recrutements stratégiques comme celui d’Alan Dye, ancien responsable du design chez Apple, Meta prépare le terrain pour une nouvelle gamme d’appareils.
Une rangée de pendentifs connectés de différentes couleurs, présentés sur un fond noir.
On peut imaginer un futur où les Ray-Ban Meta seraient complétées par des accessoires plus discrets, capables de capturer le contexte sonore de notre vie pour alimenter un assistant personnel omniscient. Meta n’est pourtant pas seul sur ce créneau. Amazon a récemment acquis Bee, une autre startup spécialisée dans les wearables IA et d’autres acteurs tentent de percer, comme le pendentif « Friend ». Mais avec la puissance de frappe de Meta, la compétition devient féroce pour les petits acteurs. Comme le souligne Siroker, le monde a changé. Ce qui semblait être une idée marginale il y a cinq ans est devenu une course inévitable vers le futur.


L’IA pour s’informer – Le pacte avec les médias


Si Meta renforce ses oreilles avec Limitless, l’entreprise soigne aussi son cerveau. L’autre volet important de l’actualité récente du groupe concerne sa gestion de l’information. Après avoir longtemps entretenu des relations tumultueuses avec la presse, elle propose une nouvelle approche, délivrer les actualités de dernière minute directement via son chatbot, Meta AI. Elle a annoncé des partenariats avec plusieurs grandes organisations médiatiques, dont CNN, Fox News, Reuters, et le groupe Le Monde. L’objectif est de permettre à l’IA de fournir des résumés d’événements récents en temps réel, en puisant dans des sources plus diversifiées. La liste des partenaires inclut un spectre large, allant de publications lifestyle comme People à des médias politiquement marqués comme The Daily Caller, reflétant peut-être les affinités de la direction actuelle. Sur le papier, la promesse est séduisante, demander à son assistant IA ce qui se passe dans le monde et obtenir une réponse synthétique et sourcée. Mais l’histoire de Meta avec l’information incite à la prudence.

Le spectre du passé et les risques futurs


Il est difficile d’oublier les précédents échecs de Facebook dans le domaine de l’actualité. De la controverse du module « Trending News » en 2016, accusé de biais humains puis remplacé par un algorithme propageant la désinformation, jusqu’au désastreux pivot vers la vidéo qui a mis à genoux de nombreux éditeurs, le bilan est lourd. Les changements d’algorithmes opaques ont souvent détruit des audiences construites sur plusieurs années, laissant les médias exsangues.
Illustration d'un cercle central relié à divers éléments d'information, symbolisant l'intégration de données et de vérification dans un écosystème numérique.
Aujourd’hui, la crainte est que ce nouveau modèle basé sur l’IA ne cannibalise encore davantage le trafic des sites d’information. À l’image des « AI Overviews » de Google, si le chatbot fournit la réponse complète, l’utilisateur n’a plus besoin de cliquer sur le lien source. Pour les éditeurs, c’est le risque de voir leurs contenus ingérés par la boîte noire de l’IA sans retombées économiques directes, hormis le montant du chèque signé pour le partenariat initial.
Visuel numérique représentant le logo de Metal avec des connexions vers des médias comme CNN et Fox, sur un fond futuriste avec des motifs en onde et des éclairages néon.
De plus, confier la synthèse de l’actualité à une IA générative comporte des risques d’hallucinations ou de biais contextuels. Si l’outil est censé offrir quelque chose pour tout le monde, la frontière entre information factuelle et contenu partisan risque de devenir floue, surtout avec un panel de sources aussi hétéroclite.

Un écosystème fermé en construction


En mettant en perspective le rachat de Limitless et les nouveaux partenariats médiatiques, la stratégie de Meta apparaît clairement. L’objectif est de créer un écosystème fermé et autosuffisant. D’un côté, le matériel (lunettes, pendentifs) capture votre réalité immédiate et vos conversations. De l’autre, le logiciel (Meta AI) ingère l’actualité mondiale pour vous la restituer à la demande. Meta ne cherche plus seulement à connecter les gens entre eux, mais à devenir l’interface principale entre l’utilisateur et le monde, qu’il s’agisse de se souvenir d’une conversation privée ou de comprendre un événement géopolitique. Reste à savoir si les utilisateurs accepteront de confier autant de pouvoir, et autant de données, à une seule entité.

#meta
Questa voce è stata modificata (1 settimana fa)


Advent Calendar 6

Advent Calendar
Zen Mischief Photographs


This year for our Advent Calendar we have a selection of my photographs from recent years. They may not be technically the best, or the most recent, but they’re ones which, for various reasons, I rather like.
Dockside crane, Bristol
© Keith C Marshall, 2013
Click the image for a larger view

#advent #personal #photography #zenmischief



Police Complaint Filed Against Israeli Eurovision Songwriter Over Sexual Misconduct


A complaint was filed Sunday morning with the Israel Police against Israeli music hitmaker Doron Medalie, alleging a series of serious sexual crimes, including the use of substances that impair a person's ability to resist, assault, threats and the exploitation of a person without legal status.
#News


Mount Eerie - Sauna (2015)


Parlare di Phil Elverum è come parlare del Papa, la sua musica è diventata talmente personale che è impossibile sbagliarsi durante l’ascolto di uno dei suoi dischi: disco dopo disco, è giunto ad essere uno dei cantautori americani più importanti della sua generazione... Leggi e ascolta...


Mount Eerie - Sauna (2015)


immagine

Parlare di Phil Elverum è come parlare del Papa, la sua musica è diventata talmente personale che è impossibile sbagliarsi durante l’ascolto di uno dei suoi dischi: disco dopo disco, è giunto ad essere uno dei cantautori americani più importanti della sua generazione. Le alte vette raggiunte con The Glow Pt.2 e Mount Eerie, quando era sotto il moniker The Microphones, sono un bel ricordo ormai cronologicamente distante. Il cambio di nome, avvenuto proprio successivamente a Mount Eerie, molto probabilmente, è stato un sintomo di rinascita artistica. Elverum doveva distaccarsi dal successo che aveva ottenuto, consapevole di non poter mai più raggiungere quei picchi... artesuono.blogspot.com/2015/02…


Ascolta il disco: album.link/s/4YvHV6TiYIVx1HDw6…


HomeIdentità DigitaleSono su: Mastodon.uno - Pixelfed - Feddit






Afghanistan says 4 killed in heavy fire exchanges with Pakistani forces


Afghanistan authorities say four civilians have been killed after an exchange of heavy fire with Pakistan’s forces along their shared border, as tensions between the South Asian neighbours escalate after peace talks in Saudi Arabia failed to produce a breakthrough.

The governor of Afghanistan’s Spin Boldak district in the Kandahar province confirmed the deaths on Saturday. Officials from both sides said the clashes broke out late on Friday night, with the two countries accusing one another of opening fire first.

In a post on X, the spokesman for Afghanistan’s Taliban government, Zabihullah Mujahid, said Pakistani forces had “launched attacks towards” the Spin Boldak district, prompting Afghan forces to respond.



Arab, Muslim nations reject Israel exit-only plan for Gaza Rafah crossing


Gaza mediators Egypt and Qatar, and six other Muslim-majority countries have raised the alarm over Israel’s stated plan for a one-way opening of the Rafah border crossing, which would allow Palestinians to leave their territory, but not to return, and block the entry of humanitarian aid.

It comes as Israel’s genocidal war on Gaza continues unabated, with some 600 violations of the ceasefire in the last seven weeks.

The announcement, which breaches Israeli obligations under the first phase of a United States-led peace plan, was made on Wednesday by an Israeli military unit called the Coordination of Government Activities in the Territories (COGAT), stating that one-way crossing would be allowed with Israeli “security approval” in coordination with Egypt.



TIL that actor Tim Curry is on a wheelchair since 2012


This might not be news to someone, but when I found out I was quite shocked by the news.
#til



Do we think a VPN ban is nigh?


How high can the adoption rate get before conglomerates gang together and convince our politicians that VPNs are evil something something think of the children something something

Kami doesn't like this.

in reply to Knitwear

Are you talking about EU? If yes, well, it isn't China mate.
Questa voce è stata modificata (1 settimana fa)






Bash scripting question


Hello everyone,

Hoping that this is a good place to post a question about Bash scripting. My wife and I have run into a problem in PhotoPrism where it keeps tagging pictures and videos with similar names together and so the thumbnail and the video do not match. I decided that rather than try to get her iPhone to tweak its naming it's easier to just offload to a directory then rename every file to a UUID before sending to photoprism. I'm trying to write a bash script to simplify this but cannot get the internal loop to fire. The issue appears to be with the 'while IFS= read -r -d '' file; do' portion. Is anyone able to spot what the issue may be?

\#! /bin/bash
echo "This script will rename all files in this directory with unique names. Continue? (Y/N)"
read proceed
if [[ "$proceed" == "Y" ]]; then
    echo "Proceed"
    #use uuidgen -r to generate a random UUID.
    #Currently appears to be skipping the loop entirely. the find command works so issue should be after the pipe.

# Troubleshooting
\#Seems like changing IFS to $IFS helped. Now however it's also pulling others., don't think this is correct.
\#verified that the find statement is correct, its the parsing afterwards that's wrong.
\#tried removing the $'\0' after -d as that is string null in c. went to bash friendly '' based on https://stackoverflow.com/questions/57497365/what-does-the-bash-read-d-do
\#issue definitely appears to be with the while statement
    find ./ -type f \( -iname \*.jpg -o -iname \*.png \) | while IFS= read -r -d '' file; do
       echo "in loop"
       echo "$file"
       #useful post https://itsfoss.gitlab.io/post/how-to-find-and-rename-files-in-linux/
       #extract the directory and filename
       dir=$(dirname "$file")
       base=$(basename "$file")
       echo "'$dir'/'$base'"
       #use UUID's to get around photoprism poor handling of matching file names and apples high collision rate
       new_name="$dir/$(uuidgen -r)"
       echo "Renaming ${file} to ${new_name}"
       #mv "$file" "$new_name" #uncomment to actually perform the rename.
    done
    echo "After loop"
else
    echo "Cancelling"
fi
in reply to BingBong

Your find statement is not creating a variable "file" because it's missing the first part of the for loop. This:

find ./ -type f \( -iname \*.jpg -o -iname \*.png \) | while IFS= read -r -d '' file; do

should be this:

for file in "$(find ./ -type f \( -iname \*.jpg -o -iname \*.png \))"; do

However, the above command would find all files in current and subdirectories. You can just evaluate current context much more simply. I tested the below, it seems to work.

\#! /bin/bash
echo "This script will rename all files in this directory with unique names. Continue? (Y/N)"
read proceed
if [[ "$proceed" == "Y" ]]; then
    echo "Proceed"
               for file in *.{jpg,JPG,png,PNG}; do
                    echo "in loop"
                    echo "$file"
                    dir=$(dirname "$file")
                    base=$(basename "$file")
                    echo "'$dir'/'$base'"
                    new_name="$dir/$(uuidgen -r)"
                    echo "Renaming ${file} to ${new_name}"
                    #mv "$file" "$new_name" #uncomment to actually perform the rename.
               done
    echo "After loop"
else
    echo "Cancelling"
fi

You could also find matching files first, evaluate if anything is found and add a condition to exit if no files are found.

Edit: who the fuck downvoted this, it literally works and the for loop was the issue.

Questa voce è stata modificata (1 settimana fa)
in reply to BingBong

You forgot the -print0 at the end of the find command. In the read -r -d '' you want to read NUL-separated strings, so you must tell the find command to also use NUL characters between the filenames.



Compulsory spyware app to be installed on every Indian citizen's new phone


in reply to alpha1beta

First NSA started snooping, but I didn't care because it did not affect me.

Then Israel started snooping, but I didn't care because I was not the target.

Then India followed in the footsteps but I didn't speak and instead tacitly supported it.

And then they came for me and there was no one left to speak for me.

Questa voce è stata modificata (1 settimana fa)
in reply to alpha1beta

They are not spamming use from their phones. This will have little to no effect on their organized crime groups.
in reply to nil

What's with this outdated news?
Questa voce è stata modificata (1 settimana fa)




in reply to ☆ Yσɠƚԋσʂ ☆

The study was conducted using a labor simulation tool called the Iceberg Index, which was created by MIT and Oak Ridge National Laboratory.


"We built an AI and it told us how good AI is."

in reply to queermunist she/her

Look at it this way, AI is simply exposing the deep absurdity of late capitalism. Much of the economy in the West consists of what Graeber called bullshit jobs which are roles that even people performing them struggle to justify. I'd argue these types of jobs are uniquely vulnerable to replacement by AI.

It's because these jobs produce nothing of tangible, material value. Building a bridge or diagnosing an illness requires engagement with physical and ethical reality. You are accountable to laws of physics, to human bodies, to measurable outcomes. That sort of a job is going to require a human in the loop. An AI tool can be helpful for the worker where it could help zero down on a diagnosis for example, but the final decision needs to be made by a person who can be held responsible. There is little chance that AI, in the form we have today, can replace such jobs.

But much of the modern service and knowledge economy operates in a realm of manufactured meaning. Marketing campaigns, branding, corporate compliance, and middle management layers are roles built around persuasion, perception, and bureaucratic performance. They generate what Baudrillard would call simulacra. These are outputs detached from real use-value. AI, as a sophisticated pattern matcher, thrives here precisely because the work was already semantically hollow.

So while capitalism created these roles to absorb surplus labor and sustain consumption, AI now reveals their contingency. The real contradiction here is between value and bullshit. It is between work that sustains society and work that just sustains the system.

in reply to ☆ Yσɠƚԋσʂ ☆

Not the person you're replying to, but I think the point is that the study is bullshit, even if the point is apt.
in reply to poopsmith

You'll have to elaborate. Seems to me that AI taking over a bunch of bullshit jobs amounting to replacing 12% of the workforce is quite plausible.
in reply to ☆ Yσɠƚԋσʂ ☆

I absolutely believe bullshit jobs are threatened by AI, I'm just skeptical about simulations being produced by pro-business private schools that have every incentive to flatter their corporate sponsors. MIT has received over two hundred million dollars of investments from IBM for AI research and is seeking an additional billion dollars to build out its AI campus. They're beneficiaries of the bubble.

They have a lot of incentives to lie, here. It sounds like they just built a simulation to tell them what they wanted to hear.

Questa voce è stata modificata (1 settimana fa)
in reply to queermunist she/her

It's going to be a self fulfilling prophecy. After all, these studies are produced to convince CEOs to make certain types of business decisions. Their whole point is to convince execs to make the types of policy decisions that they outline.
in reply to ☆ Yσɠƚԋσʂ ☆

That's why I wanted to highlight the absurdity of "We made an AI to tell us AI is good!" because it shows their nature: a snake eating its own ass.
in reply to queermunist she/her

Oh yeah, the whole thing is absurd of course. In my opinion, AI is just exposing the fact that capitalism is a system of engineered scarcity which forces people to do useless work in order to continue existing.


Mullvad VPN - AND THEN? A film about Chat Control and mass surveillance


Update: On November 26, 2025 the EU Council, after three years, agreed on a common position on Chat Control.

Chat Control is once again back on the menu. In the Council of the EU (the member states), several countries continue to work on new versions of the bill. The latest draft in November 2025 was presented with different branding and different semantics, but it would result in mass surveillance, AI-scanning of private data, ID requirement to use messaging services and – with vague legislative text – risk of mandatory scanning (even for end-to-end-encrypted services) in the future.

As long as the Council refuses to reject the bill (the way the European Parliament did), the Chat Control proposal could still become law – despite violating EU law and fundamental human rights.

To highlight the effects of mass surveillance and remind people of the corrupt history (full story below) behind the Chat Control proposal, we now present the film "And Then?"

Questa voce è stata modificata (2 settimane fa)
in reply to TourCookie

Does anyone know more about balkaninsights.com (journalistic source thats referenced a lot). What kind of reputation do they have?


What risk might I have accidentally exposed my computer to by viewing a pirated streaming site without AV blocking?


I recently wanted to watch something a film and went to one of the first two sites listed on the Reddit's r/Piracy mega thread under it's online streaming section. I normally use an older laptop that I don't care about and have no sensitive info on but wanted to stream to a projector and only my personal laptop had an hdmi port.

I downloaded firefox exclusively to use for piracy streaming but initially forgot to add ublock origin or another AV extension to the browser. When clicking anywhere on the site, a new tab would open that I'd need to close before I could actually engage with the website content (search, play, etc), which had been my experience in the past using online streaming sites. Once, one of the popup tabs opened and immediately started a file download without my permission. I didn't open it and deleted it immediately but have recently been noticing some performance issues on my device Mostly that web pages and their content are slower to load than before and my computer has gotten overwhelmed and frozen a few times - not extremely substantially but enough that I've noticed a difference.

For context: I have a ThinkPad with windows 10 installed and an Intel i5 CPU. My default browser has been Opera for a few months now.

I just checked and the compressed zip file is in my recycling bin (not fully off my computer) and I'm not sure if/how it can affect my device without me ever opening or running its contents. I don't have an antivirus background process on my device aside from the default Microsoft Defender Antivirus that comes with Windows 10.

Is there possibly somewhere I could upload the file to check for malware/scan the file to know what it does (titled "XVlDEOSs_Elena_Frost_IMG_223606" - searching for that title didn't match anything on google)? Is there any chance the file is benign and the performance issues I'm noticing are unrelated to this situation?

TLDR: How concerned should I be about the possibility of a virus on my device from a popup window automatically downloading a zip file I never opened?

Would reinstalling my OS be the main/only possible resolution to a potential virus/worm/malware? I'd really like to avoid that if possible but many of the articles/info I can find about it have inconsistent info about risk and steps to take for resolution.
I don't know much about what kinds of risks I might've exposed my computer to. Any insight would be greatly appreciated!

in reply to sand

Youre working at this from the wrong angle.

You dont know how to judge if something bad has happened. You dont know what to do if something bad had happened. You dont know how to recover from something bad that may have happened.

You do know that something has happened because the computer is exhibiting different behavior now.

You cant know what happened and it’s not worth the time for you to develop the skills and tools to understand or even be able to use systems like virustotal et.al. which might provide some insight.

Stop using that computer. Turn it off.

If you don’t know where your data is saved, figure it out. If you determine that you want to save data off that computer, pull the drive and order a usb to sata or m2 adapter, whatever the drive is. Plug the drive into the adapter and attach it to a different computer, copy only what you need.

Do you have a way to reinstall windows? If not, go to massgrave.dev and figure it out then reinstall windows.

Do you have some system for backing up your computers? Go ahead and test it out now. If you don’t have a system, decide on one. It could be as simple as an external drive you plug in once a week and as elaborate as you like.

Now you have recovered from whatever happened and you have a system and toolkit for dealing with it if it happens again.

in reply to sand

If you run Linux, you're fine, but if you did you probably already knew this

On Windows, i guess you're fine, probably, maybe, but without AV you're already at right with any normal Internet usage.

I'd just say switch to Linux and be done with the question


in reply to P00ptart

What's the relationship between sunspots and geomagnetic storms that can affect the earth? Is this just panic bait or is there actually something potential here?
in reply to halloween_spookster

Yes it's bait but also there is real science behind it. Sun spots are magnetic knots that are wound up magnetic lines. If the lines snap they could pull huge amounts of charged particles and launch them at earth.

The risk is that if big enough it could strip back the our magnetic field reducing our production from radiation and all the electrical charged particles. This could mean electrical systems are disrupted, destroyed, or even catch fire. In the worst case the amount of radiation could kill millions.

So yeah chances are very low but never 0.


in reply to mr_account

if anyone hasn't seen it in a while LOL



The Canningite tradition


As the world returns to 19th-century multipolarity, George Canning’s approach to British foreign policy offers timeless lessons. Great powers must protect the interests of small nations in order to hold sway.


Berlin: Police can secretly enter homes for state trojan installation


cross-posted from: lemmy.zip/post/54414754

In order to monitor encrypted communication, investigators will in future, according to the Senate draft and the Änderungen der Abgeordneten, not only be allowed to hack IT systems but also to secretly enter suspects' apartments.

If remote installation of the spyware is technically not possible, paragraph 26 explicitly allows investigators to "secretly enter and search premises" in order to gain access to IT systems. In fact, Berlin is thus legalizing – as Mecklenburg-Western Pomerania did before – state intrusion into private apartments in order to physically install Trojans, for example via USB stick.


in reply to schizoidman

And I'm sure if citizens do anything to remove malware on their devices they'll be criminally charged too 🤡



most universally acceptable video file formats?


For holiday gift I was thinking of making USB/microSDs full of TV/movies. The intended recipients are not tech savvy types. They would be using windows computers, normal TVs etc.

What kind of file formats/encodings would be good to package the files in? What is safe and universally usable? And which ones are to be avoided? I'd like to guarentee they'll play without any fooling around with drivers or software.

And I want them to be as small as possible so that I can fit more stuff.

in reply to layzerjeyt

Avc (h264) 8bits video, with AAC audio, hardcoded subtitles and .mp4 container.

That should be warrantied to work on every dumb device built this or last decade.





Gaza gang leader and Israeli collaborator Yasser Abu Shabab has been killed, reports say


cross-posted from: hexbear.net/post/6941728

cross-posted from: news.abolish.capital/post/1167…
Yasser Abu Shabab. (Photo: Social Media)Yasser Abu Shabab had become an infamous figure in Gaza over the past two years for his role in collaborating with the Israeli army, looting aid convoys destined for starving Palestinians, and sowing social strife amid the genocide.

From Mondoweiss via This RSS Feed.




Israel rampages towards catastrophe on the West Bank


cross-posted from: hexbear.net/post/6941853

cross-posted from: news.abolish.capital/post/1166…

Trump’s peace plan in Gaza is unacceptable to the Jewish supremacists in Israel’s ruling coalition. Even though it submits Gaza to an American-led occupation, even though it gives Israel a free hand to kill as it pleases, it holds out vague hope for a Palestinian state, at least in words. Their whole programme is to destroy any prospect of a Palestinian homeland.


From In Defence of Marxism via This RSS Feed.




'Intellexa Leaks' Reveal Wider Reach of Predator Spyware


cross-posted from: hexbear.net/post/6941726

cross-posted from: news.abolish.capital/post/1168…

Highly invasive spyware from consortium led by a former senior Israeli intelligence official and sanctioned by the US government is still being used to target people in multiple countries, a joint investigation published Thursday revealed.

Inside Story in Greece, Haaretz in Israel, Swiss-based WAV Research Collective, and Amnesty International collaborated on the investigation into Intellexa Consortium, maker of Predator commercial spyware. The "Intellexa Leaks" show that clients in Pakistan—and likely also in other countries—are using Predator to spy on people, including a featured Pakistani human rights lawyer.

“This investigation provides one of the clearest and most damning views yet into Intellexa’s internal operations and technology," said Amnesty International Security Lab technologist Jurre van Bergen.

🚨Intellexa Leaks:"Among the most startling findings is evidence that—at the time of the leaked training videos—Intellexa retained the capability to remotely access Predator customer systems, even those physically located on the premises of its govt customers."securitylab.amnesty.org/latest/2025/...

[image or embed]
— Vas Panagiotopoulos (@vaspanagiotopoulos.com) December 3, 2025 at 9:07 PM

Predator works by sending malicious links to a targeted phone or other hardware. When the victim clicks the link, the spyware infects and provide access to the targeted device, including its encrypted instant messages on applications such as Signal and WhatsApp, as well as stored passwords, emails, contact lists, call logs, microphones, audio recordings, and more. The spyware then uploads gleaned data to a Predator back-end server.

The new investigation also revealed that in addition to the aforementioned "one-click" attacks, Intellexa has developed "zero-click" capabilities in which devices are infected via malicious advertising.

In March 2024, the US Treasury Department sanctioned two people and five entities associated with Intellexa for their alleged role "in developing, operating, and distributing commercial spyware technology used to target Americans, including US government officials, journalists, and policy experts."

"The proliferation of commercial spyware poses distinct and growing security risks to the United States and has been misused by foreign actors to enable human rights abuses and the targeting of dissidents around the world for repression and reprisal," the department said at the time.

Those sanctioned include Intellexa, its founder Tal Jonathan Dilian—a former chief commander of the Israel Defense Forces' top-secret Technological Unit—his wife and business partner Sara Aleksandra Fayssal Hamou; and three companies within the Intellexa Consortium based in North Macedonia, Hungary, and Ireland.

In September 2024, Treasury sanctioned five more people and one more entity associated with the Intellexa Consortium, including Felix Bitzios, owner of an Intellexa consortium company accused of selling Predator to an unnamed foreign government, for alleged activities likely posing "a significant threat to the national security, foreign policy, or economic health or financial stability of the United States."

The Intellexa Leaks reveal that new consortium employees were trained using a video demonstrating Predator capabilities on live clients. raising serious questions regarding clients' understanding of or consent to such access.

"The fact that, at least in some cases, Intellexa appears to have retained the capability to remotely access Predator customer logs—allowing company staff to see details of surveillance operations and targeted individuals raises questions about its own human rights due diligence processes," said van Bergen.

"If a mercenary spyware company is found to be directly involved in the operation of its product, then by human rights standards, it could potentially leave them open to claims of liability in cases of misuse and if any human rights abuses are caused by the use of spyware," he added.

Dilian, Hamou, Bitzios, and Giannis Lavranos—whose company Krikel purchased Predator spyware—are currently on trial in Greece for allegedly violating the privacy of Greek journalist Thanasis Koukakis and Artemis Seaford, a Greek-American woman who worked for tech giant Meta. Dilian denies any wrongdoing or involvement in the case.

Earlier this week, former Intellexa pre-sale engineer Panagiotis Koutsios testified about traveling to countries including Colombia, Kazakhstan, Kenya, Mexico, Mongolia, the United Kingdom, and Uzbekistan, where he pitched Predator to public, intelligence, and state security agencies.

The new joint investigation follows Amnesty International's "Predator Files," a 2023 report detailing "how a suite of highly invasive surveillance technologies supplied by the Intellexa alliance is being sold and transferred around the world with impunity."

The Predator case has drawn comparisons with Pegasus, the zero-click spyware made by the Israeli firm NSO Group that has been used by governments, spy agencies, and others to invade the privacy of targeted world leaders, political opponents, dissidents, journalists, and others.


From Common Dreams via This RSS Feed.



'Intellexa Leaks' Reveal Wider Reach of Predator Spyware


cross-posted from: news.abolish.capital/post/1168…

Highly invasive spyware from consortium led by a former senior Israeli intelligence official and sanctioned by the US government is still being used to target people in multiple countries, a joint investigation published Thursday revealed.

Inside Story in Greece, Haaretz in Israel, Swiss-based WAV Research Collective, and Amnesty International collaborated on the investigation into Intellexa Consortium, maker of Predator commercial spyware. The "Intellexa Leaks" show that clients in Pakistan—and likely also in other countries—are using Predator to spy on people, including a featured Pakistani human rights lawyer.

“This investigation provides one of the clearest and most damning views yet into Intellexa’s internal operations and technology," said Amnesty International Security Lab technologist Jurre van Bergen.

🚨Intellexa Leaks:"Among the most startling findings is evidence that—at the time of the leaked training videos—Intellexa retained the capability to remotely access Predator customer systems, even those physically located on the premises of its govt customers."securitylab.amnesty.org/latest/2025/...

[image or embed]
— Vas Panagiotopoulos (@vaspanagiotopoulos.com) December 3, 2025 at 9:07 PM

Predator works by sending malicious links to a targeted phone or other hardware. When the victim clicks the link, the spyware infects and provide access to the targeted device, including its encrypted instant messages on applications such as Signal and WhatsApp, as well as stored passwords, emails, contact lists, call logs, microphones, audio recordings, and more. The spyware then uploads gleaned data to a Predator back-end server.

The new investigation also revealed that in addition to the aforementioned "one-click" attacks, Intellexa has developed "zero-click" capabilities in which devices are infected via malicious advertising.

In March 2024, the US Treasury Department sanctioned two people and five entities associated with Intellexa for their alleged role "in developing, operating, and distributing commercial spyware technology used to target Americans, including US government officials, journalists, and policy experts."

"The proliferation of commercial spyware poses distinct and growing security risks to the United States and has been misused by foreign actors to enable human rights abuses and the targeting of dissidents around the world for repression and reprisal," the department said at the time.

Those sanctioned include Intellexa, its founder Tal Jonathan Dilian—a former chief commander of the Israel Defense Forces' top-secret Technological Unit—his wife and business partner Sara Aleksandra Fayssal Hamou; and three companies within the Intellexa Consortium based in North Macedonia, Hungary, and Ireland.

In September 2024, Treasury sanctioned five more people and one more entity associated with the Intellexa Consortium, including Felix Bitzios, owner of an Intellexa consortium company accused of selling Predator to an unnamed foreign government, for alleged activities likely posing "a significant threat to the national security, foreign policy, or economic health or financial stability of the United States."

The Intellexa Leaks reveal that new consortium employees were trained using a video demonstrating Predator capabilities on live clients. raising serious questions regarding clients' understanding of or consent to such access.

"The fact that, at least in some cases, Intellexa appears to have retained the capability to remotely access Predator customer logs—allowing company staff to see details of surveillance operations and targeted individuals raises questions about its own human rights due diligence processes," said van Bergen.

"If a mercenary spyware company is found to be directly involved in the operation of its product, then by human rights standards, it could potentially leave them open to claims of liability in cases of misuse and if any human rights abuses are caused by the use of spyware," he added.

Dilian, Hamou, Bitzios, and Giannis Lavranos—whose company Krikel purchased Predator spyware—are currently on trial in Greece for allegedly violating the privacy of Greek journalist Thanasis Koukakis and Artemis Seaford, a Greek-American woman who worked for tech giant Meta. Dilian denies any wrongdoing or involvement in the case.

Earlier this week, former Intellexa pre-sale engineer Panagiotis Koutsios testified about traveling to countries including Colombia, Kazakhstan, Kenya, Mexico, Mongolia, the United Kingdom, and Uzbekistan, where he pitched Predator to public, intelligence, and state security agencies.

The new joint investigation follows Amnesty International's "Predator Files," a 2023 report detailing "how a suite of highly invasive surveillance technologies supplied by the Intellexa alliance is being sold and transferred around the world with impunity."

The Predator case has drawn comparisons with Pegasus, the zero-click spyware made by the Israeli firm NSO Group that has been used by governments, spy agencies, and others to invade the privacy of targeted world leaders, political opponents, dissidents, journalists, and others.


From Common Dreams via This RSS Feed.




in reply to huquad

all the way back in 2014 in fact when the US couped their elected government