🍀 ThePrivacyPost è un account di servizio gestito direttamente dagli amministratori di Poliverso e pubblica notizie provenienti da diversi siti, blog, account del fediverso e alcuni contenuti originali.
🩸 Se apprezzi questo servizio, prendi in considerazione la possibilità di effettuare una donazione a Poliverso. Puoi scegliere due canali:
1) Ko-Fi ☕
2) LiberaPay 💳
like this
reshared this
European AI Roundtable [Advocacy Lab Content]
https://poliverso.org/display/0477a01e-15b3f622-7d252df76516930d
European AI Roundtable [Advocacy Lab Content]In 27 March 2024, the Computer & Communications Industry Association (CCIA Europe) hosted the inaugural edition of the European AI Roundtable in Brussels.euractiv.com/section/artificia…
The Privacy Post reshared this.
No Active Components in This Mysterious Audio Oscillator
https://poliverso.org/display/0477a01e-a597f6b3-7cbbe2ae39e0c93a
No Active Components in This Mysterious Audio Oscillator What’s the simplest audio frequency oscillator you can imagine? There’s the 555, of course, and we can think of a few designs using just two transistors or even a few with just one. But how about an oscillator with no active components https://youtu.be/MssPu3M-WEQ? Now there’s a neat trick.Replicating [Stelian]’s
The simplest audio oscillator on the Internet
Find out how to build the simplest audio oscillator on the Internet. This is something that I haven't seen before online, even though it's a common challenge...YouTube
The Privacy Post reshared this.
New JEDEC DDR5 Memory Specification: Up To 8800 MT/s, Anti-Rowhammer Features
https://poliverso.org/display/0477a01e-8bc82a6c-b2223a3ecfb9cab0
New JEDEC DDR5 Memory Specification: Up To 8800 MT/s, Anti-Rowhammer Features https://hackaday.com/wp-content/uploads/2015/03/rowhammer.png“Row hammer http://commons.wikimedia.org/wiki/File:Row_hammer.svg#/media/File:Row_hammer.svg” by hackaday.comDsimic – Own work. Licensed under CC BY-SA 4.0 http://creativecommons.org/licenses/by-sa/4.0 via Wikimedia
The Privacy Post reshared this.
FLOSS Weekly Episode 780: Zoneminder — Better Call Randal
https://poliverso.org/display/0477a01e-63b5af8e-8d4ba940e3c87ca5
FLOSS Weekly Episode 780: Zoneminder — Better Call Randal This week Jonathan Bennett and Aaron Newcomb chat with Isaac Connor https://www.connortechnology.com/ about https://zoneminder.com/feed/! That’s the project that’s working to store and deliver all the bits from security cameras — but the CCTV world has changed a lot since Zoneminder first started, over 20 years ago.
The Privacy Post reshared this.
80s Function Generator is Both Beauty and Beast
https://poliverso.org/display/0477a01e-34518344-b7e24d64d9a29b4b
80s Function Generator is Both Beauty and Beast You know how the saying goes — they don’t make them like this anymore. It’s arguably true of pretty much any electronic device given the way technology changes over time, though whether or not it’s objectively a bad thing is going to vary from case to case.As a practical example, take a look at the insides of this 80’s vintage HP 3314A
The Privacy Post reshared this.
Amazon Ends California Drone Deliveries While Expanding to Arizona
https://poliverso.org/display/0477a01e-d130c9fc-6cda69690fde27a9
Amazon Ends California Drone Deliveries While Expanding to Arizona https://hackaday.com/wp-content/uploads/2024/04/amazon_mk27_drone.jpgThe outgoing MK27 drone used by Amazon today for deliveries. (Credit: Amazon)When Amazon started its Prime Air drone delivery service in 2022, it had picked College Station (Texas) and Lockeford (California) as its the first
The Privacy Post reshared this.
250.000 siti WordPress a rischio compromissione. Aggiornate il plugin Forminator
https://poliverso.org/display/0477a01e-554b0ec0-fb431971bee968cc
250.000 siti WordPress a rischio compromissione. Aggiornate il plugin Forminator Gli esperti JPCERT mettono in guardia https://jvn.jp/en/jp/JVN50132400/ su una serie di vulnerabilità https://www.redhotcyber.com/post/vulnerabilita-cve-2024-21893-ivanti-colpito-da-hacker-cinesi-unc5325-e-unc3886/ critiche nel plugin Forminator per WordPress, sviluppato
Vulnerabilità Ivanti CVE-2024-21893: Gli hacker cinesi UNC5325 e UNC3886 colpiscono le reti private
Ivanti sotto attacco: hacker cinesi sfruttano falle CVE-2024-21893 nella VPN per infiltrarsi nelle reti. Scopri cosa c'è dietro il recente attacco informaticoRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
An Elbow Joint That Can
https://poliverso.org/display/0477a01e-f873a711-4e3d06864c859b30
An Elbow Joint That Can We’re not certain whether [Paul Gould]’s kid’s prosthetic elbow joint https://hackaday.io/project/195714-kids-prosthetic-elbow-3d-printed is intended for use by a real kid or is part of a robotics project — but it caught our eye for the way it packs the guts of a beefy-looking motorized joint into such a small space.At its heart is a cycloidal gearbox, in which the three sm
The Privacy Post reshared this.
EU Parliament ratifies Right to Repair Directive
https://poliverso.org/display/0477a01e-7df6a7b3-21f9582287dae1d7
EU Parliament ratifies Right to Repair DirectiveMembers of the European Parliament (MEPs) voted in favour of the Right to Repair Directive on Tuesday (23 April), aimed at improving consumer access to repair services in order to reduce waste.euractiv.com/section/digital/n…
reshared this
Programming Ada: First Steps on the Desktop
https://poliverso.org/display/0477a01e-b46822bd-91350e8107d0b917
Programming Ada: First Steps on the Desktop https://hackaday.com/wp-content/uploads/2024/04/Ada_Mascot_with_slogan.jpgWho doesn’t want to use a programming language that is designed to be reliable, straightforward to learn and also happens to be certified for everything from avionics to rockets and ICBMs? Despite Ada’s strong roots and impressive legacy, it has the reputation among the
The Privacy Post reshared this.
Hacker di Anonymous attaccano le Forze di Difesa Israeliane: 233.000 documenti militari compromessi
https://poliverso.org/display/0477a01e-4476e767-6ad0691dfdae1d70
Hacker di Anonymous attaccano le Forze di Difesa Israeliane: 233.000 documenti militari compromessi A seguito di un sospetto attacco informatico da parte di un gruppo di https://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/ associato al collettivo Anonymous, le Forze di difesa israeliane (IDF) si trovano ad
I padri fondatori della community Hacker. L'hacking è un percorso, non una destinazione!
In questo articolo scopriremo i padri fondatori della community hacker. Due scienziati che presero parte al TMRC dell'MITMassimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
https://fpf.org/blog/the-old-line-state-does-something-new-on-privacy/
@privacy
On April 6, the Maryland Senate concurred with House amendments to SB 541, the Maryland Online Data Privacy Act (MODPA), sending the bill to Governor Moore for signature. If enacted, MODPA could be a paradigm-shifting addition to the state privacy law landscape. While recent state comprehensive privacy laws generally have added to the existing landscape […]
The Privacy Post reshared this.
Happy #WorldBookDay! 📚
Are you one of those celebrating it? We cannot think about a better gift today than “Ada & Zangemann – A Tale of Software, Skateboards, and Raspberry Ice Cream”, an enjoyable story for readers of any age! 😍
#SoftwareFreedom #FreeSoftware
Ada & Zangemann - A Tale of Software, Skateboards, and Raspberry Ice Cream - FSFE
Here you find additional information and resources about the book "Ada & Zangemann - A Tale of Software, Skateboards, and Raspberry Ice Cream" by Matthias ...FSFE - Free Software Foundation Europe
reshared this
EU Parliament overwhelmingly approves key telecoms regulation: price reductions down the road
https://poliverso.org/display/0477a01e-74c38f0f-77e9754a1a0425d7
EU Parliament overwhelmingly approves key telecoms regulation: price reductions down the roadThe European Parliament approved on Tuesday (23 April) the EU’s broadband act, the Gigabit Infrastructure Act (GIA), which aims to accelerate the deployment of high-capacity networks and reduce prices for consumerseuractiv.com/section/digital/n…
reshared this
Emails reveal how Bolt tried to shape Estonia’s opposition to gig work directive
https://poliverso.org/display/0477a01e-8ec44703-ec8e9c4961a1eef7
Emails reveal how Bolt tried to shape Estonia’s opposition to gig work directiveIn October 2023, mobility company Bolt, headquartered in Estonia, offered to draft a letter on behalf of the Estonian government to push back against the platform work directive — liaising directly with a government official who is a former Bolt
The Privacy Post reshared this.
Your Smart TV Does 4K, Surround Sound, Denial-of-service…
https://poliverso.org/display/0477a01e-e8a6f7a8-0a6ba6f48fb6512a
Your Smart TV Does 4K, Surround Sound, Denial-of-service… Any reader who has bought a TV in recent years will know that it’s now almost impossible to buy one that’s just a TV. Instead they are all “smart” TVs, with an on-board computer running a custom OS with a pile of streaming apps installed. It fits an age in which linear broadcast TV is looking increasingly archaic,
reshared this
Minacce nell’era digitale: Analisi degli attacchi ‘Man in the Middle’ e ‘Adversary in the Middle’
https://poliverso.org/display/0477a01e-118215ef-4aa2af2726c7f9f7
Minacce nell’era digitale: Analisi degli attacchi ‘Man in the Middle’ e ‘Adversary in the Middle’ In un’era di crittografia avanzata, che rende le tecniche tradizionali di intercettazione meno efficaci, i cyberattacchi si evolvono diventando sempre più sofisticati e insidiosi. Tra questi, due varianti particolarmente preoccupanti per
The Privacy Post reshared this.
Il gruppo APT29 colpisce Windows con un malware backdoor attraverso lo spooler di stampa
https://poliverso.org/display/0477a01e-0964d44f-de36cb29fd343226
Il gruppo APT29 colpisce Windows con un malware backdoor attraverso lo spooler di stampa Negli ultimi anni, i professionisti della sicurezza hanno osservato un aumento degli attacchi informatici contro organizzazioni nell’Europa orientale e occidentale, nonché nel Nordhttps://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/
The Privacy Post reshared this.
Reverse Engineering the Quansheng Hardware
https://poliverso.org/display/0477a01e-105a6ce2-573cc165df0f1ec9
Reverse Engineering the Quansheng Hardware In the world of cheap amateur radio transceivers, the Quansheng UV-K5 can’t be beaten for hackability. But pretty much every hack we’ve seen so far focuses on the firmware. What about the hardware?To answer that question, [mentalDetector] enlisted the help of a few compatriots and vivisected a UV-K5 to find out what makes it tick. The result is
The Privacy Post reshared this.
Come le soluzioni EDR possono essere utilizzate dagli hacker come armi
https://poliverso.org/display/0477a01e-8c68747c-13199c0d1879e647
Come le soluzioni EDR possono essere utilizzate dagli hacker come armi Lo specialista di SafeBreach Shmuel Cohen ha dimostrato https://www.safebreach.com/blog/dark-side-of-edr-offensive-tool/ che le soluzioni EDR possono essere utilizzate come strumenti di attacco. Durante lo studio, Cohen ha analizzato uno dei https://www.redhotcyber.com/post/vulnerabil
Vulnerabilità 0day di FortiOS SSL-VPN utilizzata in attacchi contro governi e grandi organizzazioni
I criminali informatici hanno colpito governi e grandi organizzazioni utilizzando una vulnerabilità in FortiOS SSL-VPNRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
FISA Emendament Act sezione 702. Gli Stati Uniti continueranno a monitorare il mondo!
https://poliverso.org/display/0477a01e-965d5d8b-3043ed6357a61077
FISA Emendament Act sezione 702. Gli Stati Uniti continueranno a monitorare il mondo! Dopo un aspro dibattito durato fino alle prime ore di sabato mattina, il Congresso degli Stati Uniti ha votato per prorogare di due anni la Sezione 702 https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf del Foreign Intelligence Surveillance Act
The Privacy Post reshared this.
Lungimiranti: gli “uomini straordinari” ospiti della Red Hot Cyber Conference 2024
https://poliverso.org/display/0477a01e-a790a080-8852e8bde33bddae
Lungimiranti: gli “uomini straordinari” ospiti della Red Hot Cyber Conference 2024 Sono le 22:48 del 21 aprile 2024, sono passate più di 24 ore dalla fine della Conferenza di Red Hot Cyber a Roma https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2024/e mentre sto guidando per tornare a casa dopo una bellissima giornata passata in
The Privacy Post reshared this.
Akira: un ransomware da pole position! 250 organizzazioni colpite e 42 milioni di dollari di riscatto
https://poliverso.org/display/0477a01e-270d42a1-67f5131e7d0922a8
Akira: un ransomware da pole position! 250 organizzazioni colpite e 42 milioni di dollari di riscatto Dall’inizio del 2023, il ransomware Akira https://www.redhotcyber.com/post/ransomware-akira-distruggere-completamene-tutti-i-backup-e-la-chiave-del-successo/ ha compromesso le reti di oltre 250 organizzazioni e raccolto circa 42
Ransomware Akira: Distruggere completamene tutti i backup è la chiave del successo!
La cyber gang Akira sta colpendo molte aziende in questo ultimo periodo e punta sempre ad eliminare qualsiasi possibilità di utilizzo dei backup.Redazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Dual-Wavelength SLA 3D Printing: Fast Continuous Printing With ROMP And RFP Resins
https://poliverso.org/display/0477a01e-62f4a760-a4c8b9d9866091a4
Dual-Wavelength SLA 3D Printing: Fast Continuous Printing With ROMP And RFP Resins As widespread as 3D printing with stereolithography (SLA) is in the consumer market, these additive manufacturing (AM) machines are limited to a single UV light source and the polymerization of free-radical polymerization (FRP) resins. The effect is that the object
The Privacy Post reshared this.
Rebranding di HelloKitty: ora HelloGookie! Password di CD Projekt Red e dati Cisco rivelati!
https://poliverso.org/display/0477a01e-d55b79f8-3c8de3a264ff31f6
Rebranding di HelloKitty: ora HelloGookie! Password di CD Projekt Red e dati Cisco rivelati! Gli autori del https://www.redhotcyber.com/post/il-ransomware-cos-e-scopriamo-il-suo-significato/ HelloKitty hanno annunciato il cambio di nome in HelloGookie e hanno pubblicato le password di CD Projekt Red e i dati Cisco precedentemente
Il ransomware cos'è? Scopriamo il funzionamento e il significato del RaaS
Se vuoi sapere con precisione il ransomware cos'è, il suo significato, sei nel posto giusto. Scopriamo assieme questo fenomeno in questo articolo.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Optical Tweezers Investigate Tiny Particles
https://poliverso.org/display/0477a01e-0fa4ec87-55681f735bc81da1
Optical Tweezers Investigate Tiny Particles No matter how small you make a pair of tweezers, there will always be things that tweezers aren’t great at handling. Among those are various fluids, and especially aerosolized droplets, which can’t be easily picked apart and examined by a blunt tool like tweezers. For that you’ll want to reach for a specialized tool like this laser-based tool
The Privacy Post reshared this.
NASA’s Voyager 1 Resumes Sending Engineering Updates to Earth
https://poliverso.org/display/0477a01e-63540cc8-9069a202bb0b5c4e
NASA’s Voyager 1 Resumes Sending Engineering Updates to Earth After many tense months, it seems that thanks to a gaggle of brilliant engineering talent and a lucky break the Voyager 1 spacecraft is once more back in action. Confirmation came on April 20th https://www.jpl.nasa.gov/news/nasas-voyager-1-resumes-sending-engineering-updates-to-earth, when Voyager 1
NASA’s Voyager 1 Resumes Sending Engineering Updates to Earth
After some inventive sleuthing, the mission team can — for the first time in five months — check the health and status of the most distant human-made object in existence.NASA Jet Propulsion Laboratory (JPL)
The Privacy Post reshared this.
Ancient Cable Modem Reveals Its RF Secrets
https://poliverso.org/display/0477a01e-fea17d6d-4df995ccd416eefe
Ancient Cable Modem Reveals Its RF Secrets Most reverse engineering projects we see around here have some sort of practical endpoint in mind. Usually, but not always. Reverse-engineering a 40-year-old cable modem https://www.youtube.com/watch?v=8IflOWH8fzY probably serves no practical end, except for the simple pleasure of understanding how 1980s tech worked.You’ll be forgiven if the
The 40-Year-Old Cable Modem (part 1)
Technical deep-dive into one of the very first cable data modems -- from 1983!The NABU PC and Network Adaptor were an amazing technical achievement that neve...YouTube
The Privacy Post reshared this.
https://fpf.org/blog/chinas-interim-measures-for-the-management-of-generative-ai-services-a-comparison-between-the-final-and-draft-versions-of-the-text/
@privacy
Authors: Yirong Sun and Jingxian Zeng Edited by Josh Lee Kok Thong (FPF) and Sakshi Shivhare (FPF) The following is a guest post to the FPF blog by Yirong Sun, research fellow at the New York
China’s Interim Measures for the Management of Generative AI Services: A Comparison Between the Final and Draft Versions of the Text - Future of Privacy Forum
Authors: Yirong Sun and Jingxian Zeng Edited by Josh Lee Kok Thong (FPF) and Sakshi Shivhare (FPF) The following is a guest post to the FPF blog by Yirong Sun, research fellow at the New York University School of Law Guarini Institute for Global Lega…Future of Privacy Forum
The Privacy Post reshared this.
AI + LEGO = A Brickton of Ideas
https://poliverso.org/display/0477a01e-bba43111-b01bfffea8f07630
AI + LEGO = A Brickton of Ideas What if there was some magic device that could somehow scan all your LEGO and tell you what you can make with it? It’s a childhood dream come true, right? Well, that device is in your pocket. Just dump out your LEGO stash on the carpet, spread it out so there’s only one layer, scan it with your phone, and after a short wait, you get a list of all the the fun things
The Privacy Post reshared this.
Slicing and Dicing the Bits: CPU Design the Old Fashioned Way
https://poliverso.org/display/0477a01e-01bbb710-3012261f6e5b90a3
Slicing and Dicing the Bits: CPU Design the Old Fashioned Way Writing for Hackaday can be somewhat hazardous. Sure, we don’t often have to hide from angry spies or corporate thugs. But we do often write about something and then want to buy it. Expensive? Hard to find? Not needed? Doesn’t really matter. My latest experience with this effect was due to a recent article I
The Privacy Post reshared this.
How Wireless Charging Works and Why It’s Terrible
https://poliverso.org/display/0477a01e-06abf1ab-5d726a70a662b188
How Wireless Charging Works and Why It’s Terrible Wireless charging is pretty convenient, as long as the transmitter and receiver speak the same protocol. Just put the device you want to charge on the wireless charger without worrying about plugging in a cable. Yet as it turns out, the disadvantages of wireless charging may be more severe than you think, at least according to
The Privacy Post reshared this.
The #FSFE #Berlin group will be at the #Umweltfestival 2024, together with @be4foss and @bitsundbaeume_berlin!
Come to our stand to learn about the sustainable use of computers using #FreeSoftware, and many more interesting things!
🗓️ 28 April, from 11 to 19h
📍 Straße des 17. Juni (Brandenburg Gate)
Come by and chat with us!
https://libranet.de/display/0b6b25a8-2066-18d2-e1a0-077531861398
The Privacy Post reshared this.
TikTok faces EU Commission’s second probe, potential suspension of reward program
https://poliverso.org/display/0477a01e-e1078433-40ff9746093377b1
TikTok faces EU Commission’s second probe, potential suspension of reward programThe European Commission initiated a second formal proceeding against TikTok under the Digital Services Act on Monday (22 April), focusing on the launch of TikTok Lite in France and Spain, signalling intentions to suspend its "Reward Program" in the
The Privacy Post reshared this.
The Hunt for MH370 Goes On With Barnacles As A Lead
https://poliverso.org/display/0477a01e-a6d9b78a-982664658164e611
The Hunt for MH370 Goes On With Barnacles As A Lead On March 8, 2014, Malaysia Airlines Flight 370 vanished. The crash site was never found, nor was the plane. It remains one of the most perplexing aviation mysteries in history. In the years since the crash, investigators have looked into everything from ocean currents to obscure radio phenomena to try and locate the plane. All
The Privacy Post reshared this.
Going Canadian: The Rise and Fall of Novell
https://poliverso.org/display/0477a01e-98a2f261-a45781fcf3dc9719
Going Canadian: The Rise and Fall of Novell During the 1980s and 1990s Novell was one of those names that you could not avoid if you came even somewhat close to computers. Starting with selling computers and printers, they’d switch to producing networking hardware like the famous NE2000 and the inevitability that was Novell Netware software, which would cement its fortunes. It wasn’t
The Privacy Post reshared this.
ToddyCat is making holes in your infrastructure
https://poliverso.org/display/0477a01e-0e4939e4-61f38889cd2ee0b8
ToddyCat is making holes in your infrastructure We continue covering the activities of the APT group ToddyCat https://securelist.com/tag/toddycat/. In our previous article https://securelist.com/toddycat-keep-calm-and-check-logs/110696/, we described tools for collecting and exfiltrating files (LoFiSe and PcExter). This time, we have investigated how attackers obtain constant access
ToddyCat: Keep calm and check logs
In this article, we’ll describe ToddyCat new toolset, the malware used to steal and exfiltrate data, and the techniques used by this group to move laterally and conduct espionage operations.Giampaolo Dedola (Kaspersky)
The Privacy Post reshared this.
Gli “incident” aziendali: cosa sono e come gestirli al meglio
https://poliverso.org/display/0477a01e-0903c053-ce65e8b37a19f5c7
Gli “incident” aziendali: cosa sono e come gestirli al meglio Nell’attuale panorama aziendale nazionale, appare sempre più evidente uno specifico trend che riguarda tutte le società: la tendenza ad avere un costante e continuo sviluppo organizzativo, spesso caratterizzato dall’adozione di nuove tecnologie.Ciò rende i processi aziendali sempre più complessi e, pertanto,
The Privacy Post reshared this.
AI Camera Only Takes Nudes
https://poliverso.org/display/0477a01e-8557cd7c-adb621abed56c4c4
AI Camera Only Takes Nudes One of the cringier aspects of AI as we know it today has been the proliferation of deepfake technology to make nude photos of anyone you want. What if you took away the abstraction and put the faker and subject in the same space? That’s the question the NUCA camera was designed to explore https://nuca.rocks/. [via 404 Media https://www.404media.co/nuca-camera-turns-ever
The Privacy Post reshared this.
1/3 📣Today, EDRi & @accessnow along with 9 civil society orgs call on @EU_Justice & @VeraJourova to provide further clarity on Israel's inclusion in the adequacy review.
This decision will renew the unrestricted data transfer between the EU & Israel.
European Commission's decision to allow data flows to Israel alarms privacy experts - European Digital Rights (EDRi)
The European Commissioner for Justice must provide further clarity on the decision to renew Israel’s status in the adequacy review.European Digital Rights (EDRi)
reshared this
2/3 @EU_Commission's decision to renew data transfers to Israel raises 6⃣ crucial concerns among experts.
🚨More clarity should be given on the rule of law in Israel, its data protection rules, national security provisions, onward transfers & Israel's current actions in Gaza.
3/3 Adequacy decisions must provide a strong legal basis for data transfers & withstand scrutiny by @EUCourtPress ⚖️
We call on @EU_Commission to address our concerns in a transparent & accountable way to determine whether or not this decision should be reversed.
Kinmen Rising Project-金門最後才子🇺🇦
in reply to Privacity • • •