Salta al contenuto principale




Ursula von der Leyen’s plane hit by suspected Russian GPS interference

Officials suspect jamming operation forced jet carrying European Commission president to land in Bulgaria using paper maps

ft.com/content/3c330f87-71c4-4…




I've been working with content and data since the mid-1990s. Most techies see data as bit and bytes. All of it is good. Even if it's badly written, out of data, plain wrong--or whatever. The more data, the better. Don't delete the data because you never know. We can never have enough data.

From this culture comes the crappy AI that we know. Feed it enough data and because of the sheer quantity, intelligence will flow. It's Cult of Volume. A high art of stupidity. Smartest guys in the room?




Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::




Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::




Charlotte Rampling al Festival di Venezia 2025: bellezza autentica ed eleganza innata con capelli spettinati e completo over
https://www.vogue.it/article/charlotte-rampling-festival-venezia-2025-bellezza-autentica?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Vogue Italia @vogue-italia-VogueItalia



Neue Wege ....❤️🖤

heise.de/hintergrund/Verbrauch…



神社を散歩してるが、結構雰囲気ある
in reply to 与平_GX

この画像は、夜の静かな小道を捉えています。道の両側には木々が立ち並び、その間から柔らかな光が漏れています。道の右側には、赤い塀が見え、その向こうには建物が見えます。道の中央には、木製のポールに取り付けられた照明が設置されており、その光が道を照らしています。遠くには、わずかに光が見え、車のヘッドライトが反射しているように見えます。全体的に、静かで落ち着いた雰囲気が漂っています。

@altbot によって提供され、Ovis2-8B を使用してローカルでプライベートに生成されました

🌱 エネルギー使用量: 0.160 Wh



Startup, ad agosto investiti 6,35 milioni: lo scorso anno erano stati 22 milioni
https://www.lastampa.it/tecnologia/2025/09/01/news/startup_ad_agosto_investiti_635_milioni_lo_scorso_anno_erano_stati_22_milioni-424819338/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su La Stampa Tecnologia @la-stampa-tecnologia-LaStampa




📷 01/09/2025

All'alba, il mare!
✍️Osservare il mare non mi stanca, anzi non mi basta mai, per questo poi fuggo, per non soffrire...
Il mare è un enigma, un'eterna danza tra onde, zampilli, gocce, e le sue innumerevoli creature... È un palcoscenico senza fine in cui si alternano e poi si intrecciano
i pensieri in fuga, le illusioni, le delusioni e si affidano i sogni per farne spettacoli!

Nel suo abbraccio materno e avvolgente ci si abbandona e lì che si annidano le paure di un cuore ferito, di un' anima in pena e di un corpo malato!
Così nella burrasca, tra onde che ci sovrastano, ci confondono, ritroviamo il nostro faro, la speranza, i ricordi passati, la nostra alba!
Nell'azzurro immenso, a volte condiviso col cielo, si intrecciano con voli di gabbiani,
gioie e dolori, perché
il mare ci accoglie, ci rinnova ci infonde speranza! Cosi le onde, come battiti di un cuore antico, nascondono segreti e attraverso le note del suo canto,
ci invitano a sognare, a perderci,
in questa immensità che ci rende finalmente liberi e leggeri.
(By Marty)

reshared this



#RSF and #Avaaz launch international media operation: “At the rate #journalists are being killed in #Gaza by the #Israeli #army, there will soon be no one left to keep you informed”


Hundreds of media outlets, brought together by the campaigning platform Avaaz and Reporters Without Borders (RSF), are waging a campaign calling for the protection of #Palestinian #journalists in Gaza, the emergency evacuation of reporters seeking to leave the Strip, an end to impunity for Israeli crimes against Gaza’s reporters and that foreign press be granted independent access to the territory.

(...)

More about

#PressFreedom #Journalismisnotacrime






Apple Hints That iPhone 17 Is to Eliminate the Physical SIM Card cybersecuritynews.com/iphone-1… #TechNews #Apple


Metalhead Wishes Suburban Moms Would Be As Afraid of Him As They Are of Black Family Enjoying a Picnic
thehardtimes.net/culture/metal…

"KENILWORTH, Ill. — Local metalhead Travis Garnette was dejected after failing to scare unsuspecting suburbanites while wandering around Lovelace Park earlier this week, unshaken witnesses…
The post Metalhead Wishes Suburban Moms Would Be As Afraid of



📢 Floorp 12.1.3 がリリースされました!
- 垂直タブをドラッグできます
- Start の設定で簡単に従来の「新しいタブ」に戻せます
- QR コード生成機能を無効にできます
- Start、多段タブ、メニューバー、ワークスペース、ジェスチャー/ショートカットアクションに関する一部の問題を修正

リリースノート



🌵 Scopri il fascino incantevole delle piante grasse che brillano al buio, un tocco magico per riempire le tue notti di bellezza! #PianteLuminose #DecorazioniNotturne

🔗 tomshw.it/scienze/succulente-c…



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



Le guerre, le insurrezioni e la pace nel secolo decimonono.
Opera in due volumi di Ernesto Teodoro Moneta (il link qui sotto è al primo volume), che fu il primo e finora unico italiano insignito del Nobel per la Pace. Si può scaricare gratis, in pdf, da:

liberliber.it/autori/autori-m/…

@cultura

#UnoLibri #libri #letteratura #public_domain #cosediscuola #cultura




thehorrorsofitall.blogspot.com…

#blogospherefind #comics



sometimes it takes a lot of metal strength to not send your followers after some little bitch in your replies and just block/mute them instead 😮‍💨
in reply to Kim Hu

I am literally a saint and I am being tested every day


I cannot believe I have to say this but please do not schedule my limited free mentoring time to have a -date- with me.

reshared this

in reply to Lesley Carhart

🤮
Who thinks this is clever, not creepy!?!?

≈1998, someone serendipitously gave my landline as a fake number¹ to escape a bad interaction.The guy was convinced his target was my roommate & called every few days for a month — even though I told him that it wasn't the right number.

Eventually he argued:“C'mon, man,you know I'm just trying to do my thing!”

I quipped:“so, your thing is…harassment?”

He *still* called one last time after that!🤦

¹This was bf. fake number services

Questa voce è stata modificata (2 settimane fa)



U.S. takes 10% stake in Intel as Trump flexes more power over big business


Trump tweet:

It is my Great Honor to report that the United States of America now fully owns and controls 10% of INTEL, a Great American Company that has an even more incredible future. I negotiated this Deal with Lip-Bu Tan, the Highly Respected Chief Executive Officer of the Company. The United States paid nothing for these Shares, and the Shares are now valued at approximately $11 Billion Dollars. This is a great Deal for America and, also, a great Deal for INTEL. Building leading edge Semiconductors and Chips, which is what INTEL does, is fundamental to the future of our Nation. MAKE AMERICA GREAT AGAIN! Thank you for your attention to this matter.



Bulgarian nationalists attack car believing von der Leyen was inside

Pro-Russian Revival Party leader Kostadin Kostadinov was filmed blocking the entrance of a car at a weapons plant in Sopot during a visit by Commission President Ursula von der Leyen on Sunday.

euronews.com/my-europe/2025/09…



GPS in tilt sull’aereo di von der Leyen, sospetti su Mosca: l’UE promette nuove misure euractiv.it/section/mondo/news…


Comunque il mondo fa schifo ma non é vero che l'umanità fa schifo, (non tutta almeno) non é vero che non abbiamo imparato niente dal passato, la storia la decide chi ha il potere e chi ha il potere in genere tende a fare schifo, ma le persone, tante persone insieme, adesso come in passato, si uniscono, si organizzano e si muovono contro, e la storia la fanno loro, la fa la massa critica che si oppone alla mancanza di umanità e che ricorda a chi non lo sa più che siamo tutti umani. #stayhuman #flotillasumud #freepalestine

reshared this



GPS jamming at work… politico.eu/article/ursula-von…


in reply to themachinestops

Wait. The point of the unbelievable amount of telemetry you can't even disable was to collect info in situations like this. Right? Why is there telemetry if they have to ask?

Edit: title of the article is a bit misleading, as I obviously commented before reading the article.

The "another" company they are in contacting is Phison, the manufacturer of thr affected controllers, so it doesn't sound as bad as from the title

Questa voce è stata modificata (3 settimane fa)
in reply to infeeeee

This will help them keep the (reported) number of incidents down. Only a fraction of people will report it.
in reply to infeeeee

They have received no official reports, and cannot reproduce the issue. I'm betting this is a case of a couple drives failing and then everyone screaming at MS without any verification.



:alerta: A onda de posts com o golpe de verificação de contas continua.

→ Você não precisa verificar sua conta no fediverso
→ Nenhum administrador vai cobrar que você verifique a conta
→ Nenhum administrador vai pedir de boa-fé os dados de seu cartão de crédito
→ Não há recursos de monetização no fediverso
→ Não há recursos liberados só para pagantes no fediverso

Caso veja um post golpista, clique nos três pontinhos e denuncie. Não clique em mais nada no toot.

Algumas contas antigas estão aparecendo impulsionando o golpe e talvez sejam de vítimas que caíram na armadilha.

Nesse caso, a dica é visitar Preferências > Conta > Aplicativos autorizados e revogar qualquer app esquisito ou não reconhecido.

Ative também a autenticação por dois fatores em Preferências > Conta > Autenticação de dois fatores.

Você pode verificar sua conta, mas é opcional e não envolve dinheiro. Você faz isso por conta própria:

:securityHigh: fedi.tips/how-do-i-verify-my-a…

#FediAdmin #MastoAdmin #FediAdminBR #Mastodon #scam

Alquimídia reshared this.



Se logró! Hemos pasado Agosto! 🎉🎉
Felicidades muchachada!!
in reply to fanta 🐌

@fanta haha por si acaso acá en Chile se dice que Agosto es el mes en que se mueren los viejos por eso siempre festejamos pasarlo 😅
in reply to Morito

Por acá en España muere justo en Agosto mucha gente por tema olas de calor. Normalmente gente mayor suele verse por desgracia más afectada.

Pero nada, ya lo hemos pasado !



pov you're watching me wake up on 1 September



“There’s a lot of big men on campus,” said one investor who is close with some of Meta’s new AI leaders.

arstechnica.com/ai/2025/08/zuc…

At the very core of environmental collapse and the Sixth Great Mass Extinction, is the Great Men / Big Men syndrome. An elite group of men have got totally out of balance with all other nature. Their destructive power threatens to overwhelm all life. Their lust for domination will wreck all before it.


Unknown parent

@luca Tu porti il caos nel mondo! Entra quella uscita e basta!


Apple accuses former Apple Watch staffer of conspiring to steal trade secrets for Oppo


I wanted to post this yesterday, but my instance was having issues the entire day. Apologies if this is a repost.

Shi allegedly sent a message to Oppo saying that he was working to “collect as much information as possible” before starting his job. And he searched the internet for terms like “how to wipe out macbook” and “Can somebody see if I’ve opened a file on a shared drive?” from his Apple-issued MacBook before leaving the company.


For someone who is presumably pretty intelligent, this is pretty dumb.

in reply to puppinstuff

If they just made up a bunch of accusations with paltry evidence to prove it, the scandal would make headlines. "iPhone maker found to be full of shit in court!" is clickworthy gold. I don't think your stance is very strong. Every entity tries to spin things in their favor, but you make it sound like they'd bring an empty case and they very much would not. No one starts a lawsuit they don't think they can win unless they're someone with no credibility and endless money like Elon Musk (see lawsuit against Apple and OpenAI) or oil companies going after environmental lawyers.
in reply to some_guy

I politely disagree. Apple legal will most certainly make extreme accusations and throw the book at individuals as a deterrent to other staff who may be considering bringing “trade secret” knowledge with them as they leave. Which is basically turns any kind of creative solution to a tech problem into a “trade secret” 🍆in this reality of patents and intellectual property.

I suspect that this person thought they were getting away with something minor and it’s being spun into mustache-twirling supervillains as a warning to staff.




Wir freuen uns, Maren Schubert als Nachwuchsgruppenleiterin in unserem HUMAN-Programm zu begrüßen. Maren forscht an virusähnlichen Partikeln - leere Virushüllen ohne virales genetisches Material - als #Impfstoff und in der #Diagnostik. Herzlich willkommen am HZI!
helmholtz-hzi.de/forschung/for…


I prossimi telescopi potrebbero avere una forma totalmente nuova. Perchè? Perché la geometria classica circolare ha raggiunto i suoi limiti quando si tratta di scovare pianeti come il nostro nella loro zona abitabile. Un design rettangolare da 1x20 metri potrebbe trovare 30 mondi simili alla Terra in soli tre anni, superando ostacoli tecnici che bloccano i telescopi tradizionali. La soluzione è più semplice di quanto sembri: stesso risultato, tecnologia diversa.

futuroprossimo.it/2025/09/ciao…

#spazio

reshared this



#LakeSuperior facts

There is enough water in Lake Superior alone to cover the entire land mass of North and South America in 12in (30cm) of water.

The temperature of the lake water below 200m (110 fathoms) is an almost constant 4 degrees Celsius. The water above varies seasonally but twice per year the entire water column will be a constant 4 degrees (Celsius) and allows the waters to mix. This property makes it a dimictic lake.

Waves as high as 9m (30ft) have been recorded. 6m (20ft) waves are common during storms.

At some of the deepest parts, water can get as cold as 1.1 degrees Celsius. This has some interesting side-effects.

I'll go over some in a reply with an appropriate spoiler



Francia, Bayrou accusa l’Italia: “Fa dumping fiscale”. È polemica con Palazzo Chigi

[quote]PARIGI – È di nuovo scontro tra Francia e Italia, ma stavolta le dichiarazioni del vicepresidente del consiglio Matteo Salvini non c’entrano. Ad accendere la polemica, sono state le accuse…
L'articolo Francia, Bayrou accusa l’Italia: “Fa dumping fiscale”. È polemica con



Ukraine shoots down Russian Orlan 'mother drone' carrying FPVs for first time, military says


Ukrainian anti-aircraft gunners shot down a Russian Orlan drone carrying two first-person-view (FPV) drones under its wings for the first time, the 118th Separate Mechanized Brigade reported on Aug. 22.

This marks the first time the Ukrainian military has destroyed a so-called "mother drone" carrying other UAVs, the brigade claimed.

"Anti-aircraft gunners from the 118th Separate Mechanized Brigade destroyed an enemy Orlan drone carrying two FPV drones under its wings," the unit said in a Facebook post.

"Prior to this, the pilots of the pursuit platoon had already shot down dozens of enemy reconnaissance drones — Orlan, Zala, and Supercam — but this was the first time they had managed to destroy a mother drone."

The Orlan is a Russian-developed reconnaissance drone widely used by Russia in Ukraine. Feared by Ukrainian soldiers, it often serves to target Russian artillery attacks. It can travel 600 kilometers and climb to an altitude of 5,000 meters.



Turkish President Erdoğan met with Putin in China during the Shanghai Cooperation Organization summit. Joined by key Turkish ministers and intelligence officials, the leaders discussed bilateral ties and global issues, including Ukraine. Erdoğan reiterated Turkey’s commitment to a just and lasting peace, highlighting Istanbul’s role in facilitating dialogue.


European postal services suspend shipment of packages to US over tariffs


ATHENS, Greece (AP) — The end of an exemption on tariff duties for low-value packages coming into the United States is causing multiple international postal services to pause shipping as they await more clarity on the rule.

The exemption, known as the “ de minimis” exemption, allows packages worth less than $800 to come into the U.S. duty free. A total of 1.36 billion packages were sent in 2024 under this exemption, for goods worth $64.6 billion, according to data from the U.S. Customs and Border Patrol Agency.

It is set to expire on Friday. On Saturday, postal services around Europe announced that they are suspending the shipment of many packages to the United States amid confusion over new import duties.

https://apnews.com/article/us-tariffs-goods-services-suspension-85c7b36b9e92c0e640dfe2ac418cd907




Netflix qui propose de passer le générique du #kdrama #taxidriver , alors, c'est non, je vais le regarder 16 fois.
youtu.be/vilMGR-7pRI?si=XJxwB5…
in reply to Nya

@s1m0n4
I made it to episode 14 of Season 1 before deciding that the level of violence and vengeance exceeded my tolerance levels. It was similar for me with Vincenzo. There's amazing acting and production, and a lot of interesting story elements in both shows, but I don't want to dwell on that level of anger and hate.
I LOVE #LeeJeHoon, but I doubt that I'll return to that series.
#kdrama
in reply to EllenInEdmonton

@EllenInEdmonton thanks. #Vincenzo was ok for me, definitely not the most violent #kdrama I watched. I dropped Sweet Home S2 and Death's Game because of the violence. Some sageuks are hard to watch too, when the disregard for human life is too strong.
But I could endure The Glory (barely) and D.P.