š ThePrivacyPost ĆØ un account di servizio gestito direttamente dagli amministratori di Poliverso e pubblica notizie provenienti da diversi siti, blog, account del fediverso e alcuni contenuti originali.
š©ø Se apprezzi questo servizio, prendi in considerazione la possibilitĆ di effettuare una donazione a Poliverso. Puoi scegliere due canali:
1) Ko-Fi ā
2) LiberaPay š³
like this
reshared this
NASAās Ingenuity Mars Helicopter Transitions Into Stationary Testbed
https://poliverso.org/display/0477a01e-8464c51a-0b5cdb9f9cb05ea4
NASAās Ingenuity Mars Helicopter Transitions Into Stationary Testbed On April 16th NASA announced the formal end https://www.nasa.gov/missions/mars-2020-perseverance/ingenuity-helicopter/nasas-ingenuity-mars-helicopter-team-says-goodbye-for-now/ to Ingenuityās days as the first ever Martian helicopter, following its 72nd and final flight mission in January. This
NASAās Ingenuity Mars Helicopter Team Says Goodbye ā¦ for Now - NASA
The final downlink shift by the Ingenuity team was a time to reflect on a highly successful mission ā and to prepare the first aircraft on another world forNaomi Hartono (NASA)
The Privacy Post reshared this.
Letta report and EU Deep Tech Stock Exchange, new ETSI director general elected
https://poliverso.org/display/0477a01e-5d74593d-a62f72c66a81a7dd
Letta report and EU Deep Tech Stock Exchange, new ETSI director general electedWelcome to Euractivās Tech Brief, your weekly update on all things digital in the EU.euractiv.com/section/digital/nā¦
The Privacy Post reshared this.
Build Your Own RGB Fill Light For Photography
https://poliverso.org/display/0477a01e-83d703ee-4ed0f48f4f40795a
Build Your Own RGB Fill Light For Photography Photography is all about light, and capturing it for posterity. As any experienced photographer will tell you, getting the right lighting is key to getting a good shot. To help in that regard, you might like to have a fill light. If you follow [tobychui]ās example, you can https://www.instructables.com/DIY-RGB-Fill-Light-for-Photography
DIY RGB Fill Light for Photography
DIY RGB Fill Light for Photography: Recently I am trying to upgrade my camera setup where I take picture for the products I developed and open source.Instructables
The Privacy Post reshared this.
Between privacy and border control: Tech in the Migration Pact
https://poliverso.org/display/0477a01e-7bcb82d1-4c968dd72267f946
Between privacy and border control: Tech in the Migration PactLast week, the EU Parliament voted to pass amendments to Eurodac, previously a fingerprints database, along with a new Migration Pact to boost border security.euractiv.com/section/digital/pā¦
The Privacy Post reshared this.
Attacco ransomware: i dettagli di intervento del CERT Advens
https://poliverso.org/display/0477a01e-e96e69cb-08b7727ee477522a
Attacco ransomware: i dettagli di intervento del CERT Advens Entra dietro le quinte del nostro CERT per rivivere un intervento completo su un attacco https://www.redhotcyber.com/post/il-ransomware-cos-e-scopriamo-il-suo-significato/. David Quesada, direttore del CERT Advens, descrive in dettaglio le fasi di risposta agli incidenti del nostro Computer Emergency Response
Il ransomware cos'ĆØ? Scopriamo il funzionamento e il significato del RaaS
Se vuoi sapere con precisione il ransomware cos'ĆØ, il suo significato, sei nel posto giusto. Scopriamo assieme questo fenomeno in questo articolo.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
PC Watercooling Prototype is Pumpless
https://poliverso.org/display/0477a01e-33d21c5b-de5185359ef9738f
PC Watercooling Prototype is Pumpless Watercooling is usually more efficient than air cooling for the same volume of equipment, and ā important for many people ā it is generally quieter. However, you still have water pump noises to deal with. [Der8auer] got a Wieland prototype cooler https://www.youtube.com/watch?v=2S2BZlHChug that doesnāt use a pump. Instead, it relies on the thermosiphon
This Prototype AIO works without Pump and is Amazingly Quiet
More Information about Hetzners AX162 Servers:https://htznr.li/der8auer/AX162_enIceGiant Cooler:https://www.youtube.com/watch?v=BqeO9_8yGB4Wieland AIO:https:...YouTube
The Privacy Post reshared this.
Cina e Corea del Nord Utilizzano lāIntelligenza Artificiale per Influenzare e Attaccare!
https://poliverso.org/display/0477a01e-fcc8a904-f05d754d32c08d1a
Cina e Corea del Nord Utilizzano lāIntelligenza Artificiale per Influenzare e Attaccare! Un nuovo rapporto https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/ del Microsoft Threat Intelligence Center (MTAC) fornisce informazioni su come Cina e Corea del Nord utilizzano tecnologie avanzate e
China tests US voter fault lines and ramps AI content to boost its geopolitical interests - Microsoft On the Issues
China is using fake social media accounts to sow division in elections and has increased its use of AI-generated content to further its goals around the world.Clint Watts (Microsoft)
The Privacy Post reshared this.
Computing Via (Virtual) Dominos
https://poliverso.org/display/0477a01e-5cc4ce09-9cd85efd0ca838f2
Computing Via (Virtual) Dominos Back in 2012, [Matt Parker] and a team built a computer out of dominos for the Manchester Science Festival. [Andrew Taylor], part of the team that built the original, has built a series of virtual domino puzzles https://www.andrewt.net/maths/domputer/ to help explain how the computer worked. He also links to a video from the event, but be warned: the video contains
The Privacy Post reshared this.
Remove Wall Plugs Fast With A Custom Tool
https://poliverso.org/display/0477a01e-60a5432c-eecb6cc1c1ef36af
Remove Wall Plugs Fast With A Custom Tool The best thing about buying your own home is that you can hang things on the walls. Itās a human right all too often denied to renters the world over. Regardless, five years later, when youāre doing the mandatory minimalist remodel, youāll be ruing the day you put in all those wall anchors. At that point, consider removing them with this nifty
The Privacy Post reshared this.
DIY Quad-Motor Go-Kart is a Thrilling Ride
https://poliverso.org/display/0477a01e-ae401d1c-e4436394689fad67
DIY Quad-Motor Go-Kart is a Thrilling Ride [Peter Holderith] set out some time ago to build an electric go-kart. That by itself is not terribly unusual, but where his project diverts from the usual is in the fact that each of the four wheels has an integrated https://www.motor1.com/features/715524/quad-motor-electric-go-kart/.
My Quad-Motor Electric Go-Kart Finally Works
Four motors are finally on the kart and it's finally running, but peak power is still not within our grasp.Peter Holderith (Motor1.com)
The Privacy Post reshared this.
Scoperta la nuova minaccia: TA547 lancia una campagna malspam su larga scala
https://poliverso.org/display/0477a01e-7cab1f9c-da72260f9b01d3e4
Scoperta la nuova minaccia: TA547 lancia una campagna malspam su larga scala Eā di queste ore la notizia che il noto threat actor https://malpedia.caad.fkie.fraunhofer.de/actor/ta547 ha avviato una campagna di malspam diretta ad organizzazioni tedesche con lāintento dihttps://www.malwarebytes.com/blog/threat-intelligence/2024/02/one-year-later-rhadamanth
TA547 (Threat Actor)
TA547 is responsible for many other campaigns since at least November 2017. The other campaigns by the actor were often localized to countries such as Australia, Germany, the United Kingdom, and Italy. Delivered malware included ZLoader (a.k.a.malpedia.caad.fkie.fraunhofer.de
The Privacy Post reshared this.
Romaniaās six billion euro bet to accelerate digital public services [Advocacy Lab Content]
https://poliverso.org/display/0477a01e-3e958e1c-1b637d52559f845b
Romaniaās six billion euro bet to accelerate digital public services [Advocacy Lab Content]Despite boasting IT specialisation, Romania struggles with one of the most underdeveloped digital public bureaucracies in the region. A new ā¬6 billion injection from the National Recovery and Resilience Plan could revitalise the
The Privacy Post reshared this.
Bug Bounty mistakes and how to avoid them
https://poliverso.org/display/0477a01e-d8f15dd3-7095ef512c6a99d3
Bug Bounty mistakes and how to avoid themBug bounty programs have become a critical component of cybersecurity, providing a platform for ethical hackers to identify and report vulnerabilities in exchange for rewards. However, as lucrative and exciting as bug bounty hunting can be, itās fraught with potential mistakes that can hinder success. This article delves into common pitfalls within
The Privacy Post reshared this.
Early CD Player Teardown
https://poliverso.org/display/0477a01e-38177bc1-9f7f56b63a7be2af
Early CD Player Teardown While CD players are nothing new today, they were the height of high-tech in the early 1980s. [w1ngsfly] shows us the inside of a Phase Linear 9500 player https://www.youtube.com/watch?v=Y520YHf3f0M from 1983. Not only does it have many components, but it is also mechanically unusual.The CD loads into a toaster-like slot and even pops out like a piece of toast. The trackin
Phase Linear 9500: Very early CD player.
I discuss a very early example of the state of the consumer CD player art from the beginning of the compact disc era. The machine in this video was made in 1...YouTube
The Privacy Post reshared this.
Robot Senza Occhi Indiscreti: La Nuova Fotocamera che Salvaguarda la Privacy
https://poliverso.org/display/0477a01e-1a6d0bc6-f681092c6751395a
Robot Senza Occhi Indiscreti: La Nuova Fotocamera che Salvaguarda la Privacy Gli scienziati australiani hanno sviluppato un nuovo tipo di fotocamera per robot che preserva la privacy elaborando e distorcendo le informazioni visive prima che vengano digitalizzate a tal punto da rendere le immagini irriconoscibili.La ricerca ĆØ stata sviluppata
The Privacy Post reshared this.
DuneQuixote campaign targets Middle Eastern entities with āCR4Tā malware
https://poliverso.org/display/0477a01e-ad8ddbdd-d8140a152302b9f3
DuneQuixote campaign targets Middle Eastern entities with āCR4Tā malware IntroductionIn February 2024, we discovered a new malware campaign targeting government entities in the Middle East. We dubbed it āDuneQuixoteā; and our investigation uncovered over 30 DuneQuixote dropper samples actively employed in the campaign. These droppers, which exist in two
The Privacy Post reshared this.
GPT-4 diventa un hacker! Riesce a sfruttare i bug 1-day nellā87% dei casi
https://poliverso.org/display/0477a01e-b346fc25-6cb66a8ac1a96acb
GPT-4 diventa un hacker! Riesce a sfruttare i bug 1-day nellā87% dei casi Uno studio condotto allāUniversitĆ dellāIllinois (UIUC) ha svelato un nuovo potenziale di GPT-4 combinato con strumenti di automazione: lāabilitĆ di sfruttare vulnerabilitĆ https://www.redhotcyber.com/post/vulnerabilita-cve-2024-21893-ivanti-colpito-da-hacker-cinesi-unc5325-e-unc3886/
VulnerabilitĆ Ivanti CVE-2024-21893: Gli hacker cinesi UNC5325 e UNC3886 colpiscono le reti private
Ivanti sotto attacco: hacker cinesi sfruttano falle CVE-2024-21893 nella VPN per infiltrarsi nelle reti. Scopri cosa c'ĆØ dietro il recente attacco informaticoRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Raspberry Pi Scanner Digitizes On the Cheap
https://poliverso.org/display/0477a01e-3a44a403-70e85df8b2026cbe
Raspberry Pi Scanner Digitizes On the Cheap Itās pretty important in 2024 to be able digitize documents quickly and easily without necessarily having to stop by the local library or buy an all-in-one printer. While there are plenty of commercial solutions out there, [Caelestis Cosplay] has created a simple document scanner that takes documents, as [Caelestis Cosplay] puts it, from
The Privacy Post reshared this.
La vulnerabilitĆ di SQL Injection di Fortinet viene sfruttata da una pericolosa campagna malware
https://poliverso.org/display/0477a01e-cbbed949-8c7853c692fd7a5a
La vulnerabilitĆ di SQL Injection di Fortinet viene sfruttata da una pericolosa campagna malware Forescout ha scoperto https://www.forescout.com/blog/connectfun-new-exploit-campaign-in-the-wild-targets-media-company/ una https://www.redhotcyber.com/post/vulnerabilita-cve-2024-21893-ivanti-colpito-da-hacker-cinesi-unc5325-e-unc3886/
VulnerabilitĆ Ivanti CVE-2024-21893: Gli hacker cinesi UNC5325 e UNC3886 colpiscono le reti private
Ivanti sotto attacco: hacker cinesi sfruttano falle CVE-2024-21893 nella VPN per infiltrarsi nelle reti. Scopri cosa c'ĆØ dietro il recente attacco informaticoRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Unraveling The Secrets of Appleās Mysterious Fisheye Format
https://poliverso.org/display/0477a01e-991177e8-b4b9f4c1419127e3
Unraveling The Secrets of Appleās Mysterious Fisheye Format Apple has developed a proprietary ā even mysterious ā āfisheyeā projection format used for their immersive videos, such as those played back by the Apple Vision Pro. Whatās the mystery? The fact that they stream their immersive content in this format but have provided no elaboration, no details, and no method
The Privacy Post reshared this.
MXM: Powerful, Misused, Hackable
https://poliverso.org/display/0477a01e-5dc850c4-ce56acaa4309b10d
MXM: Powerful, Misused, Hackable Today, weāll look into yet another standard in the embedded space: MXM. It stands for āMobile PCI Express Moduleā, and is basically intended as a GPU interface for laptops with PCIe, but thereās way more to it ā it can work for any high-power high-throughput PCIe device, with a fair few DisplayPort links if you need them!You will see MXM sockets in older generation
The Privacy Post reshared this.
LYFT: Standing Up for Better IKEA BEKANT Control
https://poliverso.org/display/0477a01e-3ce0e3a1-5edf3d5e58735f99
LYFT: Standing Up for Better IKEA BEKANT Control The IKEA BEKANT sit/stand desk is kind of a lifesaver ā even if you donāt personally go between sit and stand much, the adjustability makes sharing the desk a breeze. Sharing was the case in [Matthias]ā house during the pandemic, as he and his wife took turns using the desk. Switching between their two preferred heights quickly
The Privacy Post reshared this.
Lāexploit di Command Injection su Paloalto ĆØ online. Disabilitare la telemetria non ĆØ piĆ¹ efficace
https://poliverso.org/display/0477a01e-4aa89920-4321567756e34390
Lāexploit di Command Injection su Paloalto ĆØ online. Disabilitare la telemetria non ĆØ piĆ¹ efficace Ć https://www.redhotcyber.com/post/cosa-sono-i-bug-di-sicurezza-un-viaggio-poc-exploit-programmi-di-bug-bounty-e-lavoro/
Cosa sono i bug di sicurezza. Un viaggio tra PoC, exploit, programmi di bug bounty e lavoro
Con questo articolo andremo a scoprire il mondo dei bug di sicurezza e le differenze tra PoC ed exploit e i loro uso.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Europol fa Saltare in Aria LabHost: Una Piattaforma Mondiale di Phishing Abbattuta
https://poliverso.org/display/0477a01e-2916db9e-e33ef782f91d168d
Europol fa Saltare in Aria LabHost: Una Piattaforma Mondiale di Phishing Abbattuta Questa settimana, le forze dellāordine di 19 paesi hanno gravemente interrotto una delle piĆ¹ grandi piattaforme di https://www.redhotcyber.com/post/il-phishing-cos-e-evitiamo-di-abboccare-all-amo-del-pesc-hack-tore/-as-a-service al mondo, nota come LabHost.
The Privacy Post reshared this.
Hacked Oscilloscope Plays Breakout, Hints at More
https://poliverso.org/display/0477a01e-a4369873-de12095a735cd022
Hacked Oscilloscope Plays Breakout, Hints at More You know things are getting real when the Dremel is one of the first tools you turn to after unboxing your new oscilloscope. But when your goal is to hack the scope to play Breakout https://github.com/davidgiven/dso152-breakout, sometimes plastic needs to be sacrificed.Granted, the scope in question, a Fnirsi DSO152, only cost
GitHub - davidgiven/dso152-breakout: Breakout for the Fnirsi DSO152
Breakout for the Fnirsi DSO152. Contribute to davidgiven/dso152-breakout development by creating an account on GitHub.GitHub
The Privacy Post reshared this.
https://fpf.org/blog/two-new-apple-and-google-platform-privacy-requirements-kicking-in-now/
@privacy
Appleās important mandatory requirements affecting iOS apps are about to kick in, and Googleās new requirements for publishers and advertisers have just gone into effect. Accurately implementing these requirements calls for close cooperation between the legal, privacy, and ad ops teams. Appleās Privacy Manifests At
Two New Apple and Google Platform Privacy Requirements Kicking In Now - Future of Privacy Forum
Apple's important mandatory requirements affecting iOS apps are about to kick in, and Googleās new requirements for publishers and advertisers have just gone into effect.Future of Privacy Forum
The Privacy Post reshared this.
In the latest #EDRigram, we draw your attention to:
š¬š· Record-high #GDPR fine for Greece's Migration Ministry
šŖšŗ @europarl_en vote in favour of discriminatory #MigrationPack
š°Meta's harmful push to charge for privacy
& more!
Read up & share: https://edri.org/our-work/edri-gram-17-april-2024/
EDRi-gram, 17 April 2024 - European Digital Rights (EDRi)
What has the EDRis network been up to over the past two weeks? Find out the latest digital rights news in our bi-weekly newsletter.European Digital Rights (EDRi)
reshared this
š” #FreeSoftware licences are helpful for many, many reasons. For example, they enable independent developers to use or reuse existing software, and implement it in their projects! š
ā¼ļø The #FSFE has developed #REUSE, both a tool and a specification to make Free Software licensing easy for humans and machines alike. š
ā¹ļø https://reuse.software
REUSE - Make licensing easy for everyone
We make licensing easy for humans and machines alike. REUSE solves a fundamental issue that Free Software licensing has at the very source. Adopting our recommendations is as easy as one-two-three!reuse.software
reshared this
Source Code to the 1999 FPS Game Descent 3 Released
https://poliverso.org/display/0477a01e-946b71be-4215280fb7f640e0
Source Code to the 1999 FPS Game Descent 3 Released On April 16th of this year, [Kevin Bentley] released the source code https://github.com/kevinbentley/Descent3 to the Sci-Fi FPS game Descent 3 https://en.wikipedia.org/wiki/Descent_3?useskin=vector. Originally released in 1999 for Windows, it was the third part in the Descent series, following right after the events of Descent
reshared this
FLOSS Weekly Episode 779: Errata Prevention Specialist
https://poliverso.org/display/0477a01e-fdd422e1-dc42b75e01d1b0d6
FLOSS Weekly Episode 779: Errata Prevention Specialist This week Jonathan Bennett and Dan Lynch https://mastodon.social/@methoddan sit down with Andy Stewart to talk about Andyās Ham Radio Linux (AHRL) https://sourceforge.net/projects/kb1oiq-andysham/! Itās the Linux distro designed to give hams the tools they need to work with their radios. Whatās it like to run a niche
KB1OIQ - Andy's Ham Radio Linux
Download KB1OIQ - Andy's Ham Radio Linux for free. Xubuntu Linux remastered for Amateur Radio users. Version 21 - last version to support 32-bit Version 25a: 05-May-2023 (xfce4) 64-bit, Xubuntu 22.04.SourceForge
The Privacy Post reshared this.
This Go-Kart Rides on a Pallet
https://poliverso.org/display/0477a01e-df2163d3-2022d98fd8201579
This Go-Kart Rides on a Pallet Many beginner woodworkers, looking to offset the introductory costs of starting a hobby, will source their wood from pallets. Generally theyāre easily found and can be low or no cost, but typically require a bit of work before theyāre usable in a project. [Garage Avenger] is looking to do something a little outside of the box with his pallet project, though. Heās usi
The Privacy Post reshared this.
Compiling and Running Turbo Pascal in the Browser
https://poliverso.org/display/0477a01e-bdf87362-b4f5d1183d700f59
Compiling and Running Turbo Pascal in the Browser When a friend of [Lawrence Kesteloot] found a stack of 3.5ā³ floppy disks, they found that it contained Turbo Pascal code which the two of them had worked on back in the Summer of 1989. Amidst reminiscing https://www.teamten.com/lawrence/projects/turbo_pascal_compiler/ about the High School days and watching movies on VHS,
The Privacy Post reshared this.
VCF East 2024 Was Bigger and Better Than Ever
https://poliverso.org/display/0477a01e-1b1a21cc-fbef3d7b242b0e4f
VCF East 2024 Was Bigger and Better Than Ever I knew something had changed before I even paid for my ticket to this yearās Vintage Computer Festival East https://vcfed.org/events/vintage-computer-festival-east/ at the InfoAge Science and History Museum in Wall, New Jersey.Over the last couple of years, attendance has been growing to the point that parking in the lot directly next to
The Privacy Post reshared this.
EU data protection body says Metaās āpay or OKā model is not OK
https://poliverso.org/display/0477a01e-dd1cf63c-e5fa68ada7acd8d0
EU data protection body says Metaās āpay or OKā model is not OKThe European Data Protection Board opposed Meta's controversial "pay or okay" business model in an opinion published on Wednesday (17 April), saying this binary approach was not compliant with the EU's data privacy rules.euractiv.com/section/platformsā¦
reshared this
Lettaās report aligns with views of major telecoms on market integration
https://poliverso.org/display/0477a01e-2137ea19-7d4e160aafff8a6a
Lettaās report aligns with views of major telecoms on market integrationLaying out his vision of a harmonised single market in the telecommunications sector, former Italian prime minister Enrico Letta aligned with some of the talking points by the EU's largest telecom players, according to a draft report seen by Euractiv.euractiv.com/section/digital/nā¦
The Privacy Post reshared this.
I Router TP-Link sono sotto il Fuoco Incrociato degli Attacchi DDoS
https://poliverso.org/display/0477a01e-e8cc89f2-74b118e201ae0e49
I Router TP-Link sono sotto il Fuoco Incrociato degli Attacchi DDoS Fortinet riferisce https://www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread che gli aggressori continuano a sfruttare una https://www.redhotcyber.com/post/vulnerabilita-cve-2024-21893-ivanti-colpito-da-hacker-cinesi-unc5325-e-unc3886/
VulnerabilitĆ Ivanti CVE-2024-21893: Gli hacker cinesi UNC5325 e UNC3886 colpiscono le reti private
Ivanti sotto attacco: hacker cinesi sfruttano falle CVE-2024-21893 nella VPN per infiltrarsi nelle reti. Scopri cosa c'ĆØ dietro il recente attacco informaticoRedazione RHC (Red Hot Cyber)
reshared this
Human-Interfacing Devices: HID over I2C
https://poliverso.org/display/0477a01e-95938951-19d90b0f2c178566
Human-Interfacing Devices: HID over I2C In the previous two HID articles, we talked about stealing HID descriptors https://hackaday.com/2024/01/30/human-interfacing-devices-the-descriptor-heist/, learned about a number of cool tools https://hackaday.com/2024/02/06/human-interfacing-devices-packing-for-the-descriptor-heist/ you can use for HID hacking on Linux, and created a touchscreen
Human-Interfacing Devices: The Descriptor Heist
Today, weāll build our own input devices. And they will be easy to create and write firmware for, they will work perfectly, and they will be cross-platform. We can do that with help of the Huā¦Hackaday
The Privacy Post reshared this.
Custom Dog Door Prevents Culinary Atrocities
https://poliverso.org/display/0477a01e-3e79ba15-dab17fe37574fe8f
Custom Dog Door Prevents Culinary Atrocities Riley, an 8 lb pug, has more beauty than brains, and a palate as unrefined as crude oil. While we hate criticizing othersā interests and tastes, his penchant for eating cat poop needed to stop. After a thorough exploration of a variety of options, including cat food additives that make its excrement taste worse (HOW? WHY? Clearly taste
The Privacy Post reshared this.
Bot Forever! metĆ del traffico web ĆØ falso. I bot a breve saranno i padroni di internet
https://poliverso.org/display/0477a01e-dc78fabd-c0e3d6c9f153c1d7
Bot Forever! metĆ del traffico web ĆØ falso. I bot a breve saranno i padroni di internet Secondo il rapporto annuale https://www.securitylab.ru/glossary/thales/Imperva Bad Bot di Thales , quasi la metĆ (49,6%) di tutto il traffico Internet nel 2023 proveniva dallāattivitĆ dei bot. Si tratta del 2% in piĆ¹ rispetto a un anno prima e si tratta
Thales
Thales - ŃŠ°Š·ŃŠ°Š±Š¾ŃŃŠøŠŗ IT-ŃŠøŃŃŠµŠ¼ Š“Š»Ń Š°Š²ŠøŠ°ŠŗŠ¾ŃŠ¼ŠøŃŠµŃŠŗŠ¾Š³Š¾, Š²Š¾ŠµŠ½Š½Š¾Š³Š¾ Šø Š¼Š¾ŃŃŠŗŠ¾Š³Š¾ ŠæŃŠøŠ¼ŠµŠ½ŠµŠ½ŠøŃ.www.securitylab.ru
The Privacy Post reshared this.
What are the responsibilities and liabilities of #FreeSoftware developers?
šØ A potential threat to Free Software developers looms in the form of an ongoing lawsuit in the UK involving Bitcoin and its core developers.
https://fsfe.org/news/2024/news-20240417-01.html
#SoftwareFreedom #Bitcoin #BitcoinCase
Are Free Software developers at risk? - FSFE
Free Software is everywhere, with studies estimating that it is present in about 96% of the applications that we use. But what are the responsibilities and...FSFE - Free Software Foundation Europe
reshared this
Valentino Spataro
in reply to Privacity • • •