đ ThePrivacyPost è un account di servizio gestito direttamente dagli amministratori di Poliverso e pubblica notizie provenienti da diversi siti, blog, account del fediverso e alcuni contenuti originali.
𩸠Se apprezzi questo servizio, prendi in considerazione la possibilità di effettuare una donazione a Poliverso. Puoi scegliere due canali:
1) Ko-Fi â
2) LiberaPay đł
like this
reshared this
Build Your Own Class-E Musical Tesla Coil
https://poliverso.org/display/0477a01e-a6c63dae-c99afb97dc2ab1f7
Build Your Own Class-E Musical Tesla Coil Weâve all seen a million videos online with singing Tesla coils doing their thang. [Zach Armstrong] wasnât content to just watch, though. He went out and built one himself! https://hackaday.io/project/188598-making-the-ultimate-class-e-musical-tesla-coil Even better, heâs built a guide for the rest of us, too!His guide concerns the construction of
Making the Ultimate Class-E Musical Tesla Coil
Be sure to check out the official tutorial video here: https://www.youtube.com/watch?v=Hez-R-WF5P0 Class-E SSTCs are probably one of the most underrated solid-state Tesla coil types.hackaday.io
The Privacy Post reshared this.
2024 Home Sweet Home Automation: Spray Bottle Turret Silences Barking
https://poliverso.org/display/0477a01e-d88ad30a-95fd0183047e98e7
2024 Home Sweet Home Automation: Spray Bottle Turret Silences Barking Ah, dogs. They sure like to bark, donât they? [rrustvold]âs dog likes to bark at the door when a package arrives. Or when someone walks by the house, or whenever the mood strikes, really. To solve the barking issue, at least near the front door, https://hackaday.io/project/195611-spray-bot
Spray Bottle Turret
The problem: The dog likes to bark at the door whenever a package is dropped, or whenever the neighbor walks by, or whenever she feels like barking. The answer: A little squirt of water from a spray bottle.hackaday.io
The Privacy Post reshared this.
Hackaday Podcast Episode 268: RF Burns, Wireless Charging Sucks, and Barnacles Grow on Flaperons
https://poliverso.org/display/0477a01e-e848b26f-5e3d0735ec3178ac
Hackaday Podcast Episode 268: RF Burns, Wireless Charging Sucks, and Barnacles Grow on Flaperons https://hackaday.com/wp-content/uploads/2024/04/DSCF3620_thumbnail.pngHow not to program an EPROMElliot and Dan got together to enshrine the weekâs hacks in podcast form, and to commiserate about their respective moms, each of whom
The Privacy Post reshared this.
LâIntelligenza Artificiale rallenta la sua crescita. Occorre piĂš elettricitĂ in un mondo cosĂŹ inquinato
https://poliverso.org/display/0477a01e-86130636-fd93f7d38e423803
LâIntelligenza Artificiale rallenta la sua crescita. Occorre piĂš elettricitĂ in un mondo cosĂŹ inquinato Per consentire una crescita globale dellâintelligenza https://www.redhotcyber.com/post/che-cose-lintelligenza-artificiale-tra-storia-tecnologia-etica-e-futuro/,
Che cosâè lâintelligenza artificiale. Tra storia, tecnologia, etica, regole e futuro
In questo articolo andremo a comprendere con precisione che cos'è l'intelligenza artificiale, tra storia, tecnologia, etica e futuro.Redazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Bolt lobbying revelations: Estonia official says human error behind missing correspondence
https://poliverso.org/display/0477a01e-a77b9a81-2ed2639702ffd36a
Bolt lobbying revelations: Estonia official says human error behind missing correspondenceThe omission of emails from the Estonian Ministry of Economic Affairs to Bolt and other mobility tech firms, demanded in a freedom of information (FOI) request, was due to human error, the Ministry's Deputy Secretary General Sandra Särav told Estonian
The Privacy Post reshared this.
Von der Leyen to avoid TikTok in very âpersonalâ campaign
https://poliverso.org/display/0477a01e-1545e1b0-6c4e97dc267beafd
Von der Leyen to avoid TikTok in very âpersonalâ campaignEuropean Commission President Ursula von der Leyen will not be using TikTok in her campaign for June's EU elections, "in view of security concerns," her campaign chief spokesperson said, despite her aim to reach citizens with an innovative and personal touch.euractiv.com/section/electionsâŚ
The Privacy Post reshared this.
The Brief â The curious case of âpartnershipâ in the AI landscape
https://poliverso.org/display/0477a01e-0291d08c-a1f38e35f5a9b511
The Brief â The curious case of âpartnershipâ in the AI landscapeâPartnershipsâ between big tech firms and AI startups are under the regulatory microscope. The likes of Amazon, Google, and Microsoft have rushed to build strong collaborations with the rising https://www.euractiv.com/section/competition/news/eu-commission-to-examine-microsoft-openai-partnership/,
EU Commission to examine Microsoft-OpenAI partnership
The European Commission announced on Tuesday (9 January) that it is examining the nature of the relationship bJulia Tar (EURACTIV)
The Privacy Post reshared this.
Microsoft nostalgic-mode: rende open source il codice per MS-DOS 4.0
https://poliverso.org/display/0477a01e-b64f9809-0964272ab4f9a031
Microsoft nostalgic-mode: rende open source il codice per MS-DOS 4.0 Microsoft e IBM hanno reso open source https://www.redhotcyber.com/post/la-storia-dell-open-source MS-DOS 4.0, un sistema operativo a riga di comando legacy su cui le due aziende hanno lavorato insieme oltre 40 anni fa. Questa versione segue lâopen source di due precedenti versioni MS-DOS, 1.25
La storia dell'Open Source. Una storia di successo del genere umano
Il software open source è cosÏ integrato nella nostra vita che sarebbe difficile pensare ad un mondo senza di esso. Scopriamo la sua storia in questo articolo.Massimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
This Week in Security: Cisco, Mitel, and AI False Flags
https://poliverso.org/display/0477a01e-b8a72a6d-7f86a0221252c437
This Week in Security: Cisco, Mitel, and AI False Flags Thereâs a trend recently, of big-name security appliances getting used in state-sponsored attacks https://arstechnica.com/security/2024/04/cisco-firewall-0-days-under-attack-for-5-months-by-resourceful-nation-state-hackers/. It looks like Cisco is the latest victim, based on a report by their https://blog.talosintellige
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?Ars Technica
The Privacy Post reshared this.
Shein added to EU digital rulebookâs âsystemic riskâ list
https://poliverso.org/display/0477a01e-dd3f2a03-a542f485fb5e97a8
Shein added to EU digital rulebookâs âsystemic riskâ listThe European Commission designated online fashion retailer Shein as a "very large online platform" under the Digital Services Act on Friday (26 April).euractiv.com/section/platformsâŚ
The Privacy Post reshared this.
TikTok suspends reward program, Bolt tried to influence platform work directive
https://poliverso.org/display/0477a01e-3c41ac67-58401dd3a411a13e
TikTok suspends reward program, Bolt tried to influence platform work directiveWelcome to Euractivâs Tech Brief, your weekly update on all things digital in the EU.euractiv.com/section/digital/nâŚ
The Privacy Post reshared this.
Microsoft Updates MS-DOS GitHub Repo to 4.0
https://poliverso.org/display/0477a01e-030bcaa8-0d83965a18fb48ee
Microsoft Updates MS-DOS GitHub Repo to 4.0 Weâre not 100% sure which phase of Microsoftâs âEmbrace, Extend, and Extinguishâ gameplan this represents, but just yesterday the Redmond software giant decided to grace us with the source code for MS-DOS v4.0 https://github.com/microsoft/MS-DOS. https://hackaday.com/wp-content/uploads/2018/09/msdos-logo600.pngTo be clear, the GitHub
GitHub - microsoft/MS-DOS: The original sources of MS-DOS 1.25 and 2.0, for reference purposes
The original sources of MS-DOS 1.25 and 2.0, for reference purposes - microsoft/MS-DOSGitHub
The Privacy Post reshared this.
Macron pitches âmade in Europeâ to guarantee prosperity in âSorbonne IIâ speech
https://poliverso.org/display/0477a01e-7720d7aa-846449336773412f
Macron pitches âmade in Europeâ to guarantee prosperity in âSorbonne IIâ speech"Europe could die," French President Emmanuel Macron warned in a much-awaited speech on the future of the EU at Sorbonne University on Thursday (25 April), stressing the importance of an industry 'Made in Europe', particularly in sectors like energy and
The Privacy Post reshared this.
â[T]he book [is] actually more than a fairy tale about software, skateboards and pyramid-shaped ice cream with coloured sprinkles. It is a motivation for the first demo and a little bit of civil disobedience. It is a utopia of possibilities to make the world better with limited means and little money, and an example without moralistic finger-pointing, that control does not make happy.â
- Anna Biselli , Editor-in-Chief @netzpolitik_org
#righttorepair #softwarefreedom
The Privacy Post reshared this.
How To Cast Silicone Bike Bits
https://poliverso.org/display/0477a01e-39747223-636f26378eae6a86
How To Cast Silicone Bike Bits Itâs a sad fact of owning older machinery, that no matter how much care is lavished upon your pride and joy, the inexorable march of time takes its toll upon some of the parts. [Jason Scatena] knows this only too well, heâs got a 1976 Honda CJ360 twin, and the rubber bushes that secure its side panels are perished. New ones are hard to come by at a sensible price, so
The Privacy Post reshared this.
578 cittadini sotto sorveglianza in Polonia attraverso lo spyware Pegasus
https://poliverso.org/display/0477a01e-ba3f7b8f-9dfa0dea77898230
578 cittadini sotto sorveglianza in Polonia attraverso lo spyware Pegasus In Polonia, lo spyware commerciale Pegasus è stato utilizzato per spiare quasi 578 cittadini dal 2017 al 2022, ha affermato https://wiadomosci.wp.pl/bodnar-podal-dane-o-kontroli-operacyjnej-578-osob-7017516401081152a il procuratore generale Adam Bodnar. Secondo lui, il picco degli
Bodnar podaĹ dane o Pegasusie. "578 osĂłb"
Prokurator generalny Adam Bodnar przekazaĹ marszaĹek Senatu informacjÄ o kontroli operacyjnej prowadzonej w 2023 roku. Bodnar dodaĹ, Ĺźe trzy sĹuĹźby w latach 2017-2022 stosowaĹy takĹźe "kontrolÄ operacyjnÄPatryk Michalski (Wirtualna Polska)
reshared this
AI System Drops a Dime on Noisy Neighbors
https://poliverso.org/display/0477a01e-5ca1aa7f-3a5f33f9e5984edb
AI System Drops a Dime on Noisy Neighbors âThere goes the neighborhoodâ isnât a phrase to be thrown about lightly, but when they build a police station next door to your house, you know things are about to get noisy. Just how bad itâll be is perhaps a bit subjective, with pleas for relief likely to fall on deaf ears unless youâve got firm documentation like that provided by this automated
The Privacy Post reshared this.
Lettaâs tech insights: Taking a dive into the report
https://poliverso.org/display/0477a01e-26297d9f-04e2527f65ec89d7
Lettaâs tech insights: Taking a dive into the reportTogether with Andrea Renda, Senior Research Fellow and Head of the CEPS Unit on Global Governance, Regulation, Innovation and the Digital Economy, we break down the Letta report's key technological insights.euractiv.com/section/digital/pâŚ
The Privacy Post reshared this.
Google Rimanda lâEliminazione dei Cookie di Terze Parti: Rischio per la Privacy o Vantaggio Commerciale?
https://poliverso.org/display/0477a01e-05699ba0-57eec54d0dd9b07b
Google Rimanda lâEliminazione dei Cookie di Terze Parti: Rischio per la Privacy o Vantaggio Commerciale? Gli sviluppatori di Google hanno affermato https://privacysandbox.com/intl/en_us/news/update-on-the-plan-for-phase-out-of-third-party-cookies-on-chrome/ che, a causa dei test condotti dalle autoritĂ di regolamentazione
Update on the plan for phase-out of third-party cookies on Chrome
We are providing an update on the plan for third-party cookie deprecation on Chrome.privacysandbox.com
The Privacy Post reshared this.
Milioni di studenti utilizza le AI per creare documenti accademici
https://poliverso.org/display/0477a01e-4b3bb5e0-6cb2ce6cb6472f80
Milioni di studenti utilizza le AI per creare documenti accademici Una ricerca condotta dalla piattaforma di invio di saggi online e dal rilevatore di plagio Turnitin mostra un uso diffuso dellâintelligenza artificiale https://www.redhotcyber.com/post/che-cose-lintelligenza-artificiale-tra-storia-tecnologia-etica-e-futuro/ generativa da parte degli studenti nei
Che cosâè lâintelligenza artificiale. Tra storia, tecnologia, etica, regole e futuro
In questo articolo andremo a comprendere con precisione che cos'è l'intelligenza artificiale, tra storia, tecnologia, etica e futuro.Redazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Synthesis of Goldene: Single-Atom Layer Gold With Interesting Properties
https://poliverso.org/display/0477a01e-d68bed74-4f3d2057158bea42
Synthesis of Goldene: Single-Atom Layer Gold With Interesting Properties The synthesis of single-atom layer versions of a range of atoms is currently all the hype, with graphene probably the most well-known example of this. These monolayers are found to have a range of mechanical (e.g. hardness), electrical (conduction) and thermal properties that are very
The Privacy Post reshared this.
Combadge Project Wants to Bring Trek Tech to Life
https://poliverso.org/display/0477a01e-00672d6f-15cd30f62703837d
Combadge Project Wants to Bring Trek Tech to Life While thereâs still something undeniably cool about the flip-open communicators used in the original Star Trek, the fact is, they donât really look all that futuristic compared to modern mobile phones. But the upgraded âcombadgesâ used in Star Trek: The Next Generation and its various large and small screen spin-offs â now thatâs a
The Privacy Post reshared this.
A Smart Power Distribution Unit for Home Automation
https://poliverso.org/display/0477a01e-85d10c2a-9550b44e902e0330
A Smart Power Distribution Unit for Home Automation Power distribution units, as the name implies, are indispensable tools to have available in a server rack. They can handle a huge amount of power for demands of intensive computing and do it in a way that the wiring is managed fairly well. Plenty of off-the-shelf solutions have remote control or automation capabilities as well,
The Privacy Post reshared this.
New note by cybersecurity
https://poliverso.org/display/0477a01e-1766-2acf-aac2-342563795731
Attacchi cyber, Frattasi: âSolo 300 andati a buon fineâ. Mantovano: âIn Italia in un anno DDoS piĂš del 625%â. TLC tra le piĂš colpite https://www.key4biz.it/attacchi-cyber-frattasi-solo-300-andati-a-buon-fine-mantovano-in-italia-in-un-anno-ddos-piu-del-625-tlc-tra-le-piu-colpite/487781/Il settore delle Telecomunicazioni è stato tra i principali bersagli di minacce e attacchi cibernetici nel 2023. A
Il 1 aprile 1949 Piero Bottoni presenta il progetto per la grande pescheria di Milano - Key4biz
Oggi vogliamo raccontarvi la storia di un architetto tra i maggiori interpreti dello stile noto come âIrrazionalismo italianoâ.Inarea (Key4biz)
The Privacy Post reshared this.
Guardando oltre le aspettative: la realtĂ dellâautomazione nella sicurezza informatica operativa
https://poliverso.org/display/0477a01e-8dcfebc4-6d1d10a10232e633
Guardando oltre le aspettative: la realtĂ dellâautomazione nella sicurezza informatica operativa Lâautomazione nella sicurezza informatica https://www.redhotcyber.com/rubriche/alla-scoperta-della-sicurezza-informatica/ operativa è una realtĂ innegabile. Troppo spesso, tuttavia, viene considerata la soluzione miracolosa in risposta
Alla scoperta della Sicurezza Informatica - il blog della sicurezza informatica
In questa rubrica, andremo a scoprire cos'è la Sicurezza informatica (cybersecurity). Questo è il posto per scoprire e conoscere questo mondo.Red Hot Cyber
The Privacy Post reshared this.
In vendita una Local Privilege Escalation su Windows a 100.000 dollari su Exploit.in
https://poliverso.org/display/0477a01e-b9e5c1c6-9323cb43b1521082
In vendita una Local Privilege Escalation su Windows a 100.000 dollari su Exploit.in Recentemente, una Local Privilege Escalation per Windows è stata messa in vendita su https://www.redhotcyber.com/post/cosa-sono-i-bug-di-sicurezza-un-viaggio-poc-exploit-programmi-di-bug-bounty-e-lavoro/.in al prezzo di 100.000 dollari. Il 2 aprile scorso,
âIn 70 giorni non sviluppa unâapp nemmeno Dioâ. Parola della Ministra Pisano.
Paola Pisano sa bene che Nostro Signore ha creato lâuniverso in sei giorni e riservò il settimo per riposarsi, ma è altrettanto cosciente che lâOnnipotente non aveva uno #smartphone e se mai lo avesse avuto sarebbe stato un #Huawei o avrebbe avuto unâŚRedazione RHC (Red Hot Cyber)
The Privacy Post reshared this.
Space agency director thinks EU space law would have GDPR-style outsized impact
https://poliverso.org/display/0477a01e-101b20a4-9a891623a7260948
Space agency director thinks EU space law would have GDPR-style outsized impactA European space law would bring benefits that would ripple outside EU borders, Rodrigo da Costa, executive director at the EU Agency for the Space Programme (EUSPA) said in an interview with Euractiv.euractiv.com/section/global-euâŚ
The Privacy Post reshared this.
The Myth of Propellantless Space Propulsion Refuses to Die
https://poliverso.org/display/0477a01e-eb5204be-d83256b0d8e71cfe
The Myth of Propellantless Space Propulsion Refuses to Die In a Universe ruled by the harsh and unyielding laws of Physics, itâs often tempting to dream of mechanisms which defy these rigid restrictions. Although over the past hundred years we have made astounding progress in uncovering ways to work within these restrictions â including splitting and fusing atoms to
The Privacy Post reshared this.
Stop a Birra e Alcolici! Il ransomware porta la Svezia al proibizionismo forzato
https://poliverso.org/display/0477a01e-2207008b-3e6fcf86f9e40da2
Stop a Birra e Alcolici! Il ransomware porta la Svezia al proibizionismo forzato Non è la prima volta che gli https://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/ criminali colpiscono lâindustria alcolica. Lo abbiamo visto prima conhttps://www.redhotcyber.com/post/attacco-alla-campari-chiesti-15-milioni-di-dollari-di-riscatto/,
I padri fondatori della community Hacker. L'hacking è un percorso, non una destinazione!
In questo articolo scopriremo i padri fondatori della community hacker. Due scienziati che presero parte al TMRC dell'MITMassimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
Gli hacker Nordcoreani Utilizzano gli Aggiornamenti Antivirus per diffondere il malware GuptiMiner
https://poliverso.org/display/0477a01e-006afc88-cd8f8e31f3703ec9
Gli hacker Nordcoreani Utilizzano gli Aggiornamenti Antivirus per diffondere il malware GuptiMiner Gli esperti di Avast hanno scoperto https://decoded.avast.io/janrubin/guptiminer-hijacking-antivirus-updates-for-distributing-backdoors-and-casual-mining/ che https://www.redhotcyber.com/post/i-padri-fondatori-della-community-hacker/
I padri fondatori della community Hacker. L'hacking è un percorso, non una destinazione!
In questo articolo scopriremo i padri fondatori della community hacker. Due scienziati che presero parte al TMRC dell'MITMassimiliano Brolli (Red Hot Cyber)
The Privacy Post reshared this.
ArcaneDoor: lâattacco zero-day su scala mondiale che sfrutta i dispositivi Cisco!
https://poliverso.org/display/0477a01e-da5018c0-4ead55ba00946927
ArcaneDoor: lâattacco zero-day su scala mondiale che sfrutta i dispositivi Cisco! Il costante evolversi della tecnologia porta con sĂŠ nuove sfide per la sicurezza informatica https://www.redhotcyber.com/rubriche/alla-scoperta-della-sicurezza-informatica/. I dispositivi progettati per proteggere le reti, come i firewall, diventano sempre piĂš
Alla scoperta della Sicurezza Informatica - il blog della sicurezza informatica
In questa rubrica, andremo a scoprire cos'è la Sicurezza informatica (cybersecurity). Questo è il posto per scoprire e conoscere questo mondo.Red Hot Cyber
The Privacy Post reshared this.
Un caffè con gli hacker! Il sito di Nespresso utilizzato per attacchi di Phishing
https://poliverso.org/display/0477a01e-ce80a98b-4b13477a5d1c5224
Un caffè con gli hacker! Il sito di Nespresso utilizzato per attacchi di Phishing I ricercatori di sicurezza informatica https://www.redhotcyber.com/rubriche/alla-scoperta-della-sicurezza-informatica/ di Perception Point hanno recentemente scoperto una https://perception-point.io/blog/phishing-attack-exploits-nespresso-open-redirect-vulnerability/
Alla scoperta della Sicurezza Informatica - il blog della sicurezza informatica
In questa rubrica, andremo a scoprire cos'è la Sicurezza informatica (cybersecurity). Questo è il posto per scoprire e conoscere questo mondo.Red Hot Cyber
The Privacy Post reshared this.
Chip Mystery: The Case of the Purloined Pin
https://poliverso.org/display/0477a01e-6770c762-d4bbd89b0f43ead1
Chip Mystery: The Case of the Purloined Pin Letâs face it â electronics are hard. Difficult concepts, tiny parts, inscrutable datasheets, and a hundred other factors make it easy to screw up in new and exciting ways. Sometimes the Magic Smoke is released, but more often things just donât work even though they absolutely should, and no amount of banging your head on the bench seems to
The Privacy Post reshared this.
Keebinâ with Kristina: the One With the Transmitting Typewriter
https://poliverso.org/display/0477a01e-6096e2fa-f2d4b942e2f40169
Keebinâ with Kristina: the One With the Transmitting Typewriter https://hackaday.com/wp-content/uploads/2024/04/micro-zx-spectrum.jpgImage by [SrBlonde] via https://hackaday.io/project/195589-micro-spectrumOkay, so weâre opening with more than just a keyboard, and thatâs fine. In fact, itâs more than fine, itâs probably the cutest lilâhttps://hackaday.io/project/195
MICRO SPECTRUM +
I made the design in Fusion 360 with the idea of recreating a spectrum+ with its real keyboard to simulate the games I played in my childhood. For the simulation I used an orange pi zero2 board loaded with a Batocera system.hackaday.io
The Privacy Post reshared this.
Implantable Battery Charges Itself
https://poliverso.org/display/0477a01e-8aec6ec0-34c7fa275efa72ae
Implantable Battery Charges Itself Battery technology is the major limiting factor for the large-scale adoption of electric vehicles and grid-level energy storage. Marginal improvements have been made for lithium cells in the past decade but the technology has arguably been fairly stagnant, at least on massive industrial scales. At smaller levels there have been some more outside-of-the-box
The Privacy Post reshared this.
Reverse Engineering A Fancy Disposable Vape
https://poliverso.org/display/0477a01e-7cf9f333-c896fdf4d38796d7
Reverse Engineering A Fancy Disposable Vape Many readers will be aware of the trend for disposable vapes, and how harvesting them for lithium-ion batteries has become a popular pastime in our community. Weâre all used to the slim ones about the size of a marker pen, but itâs a surprise to find that they also come in larger sizes equipped with colour LCD screens. [Jason Gin] received one
The Privacy Post reshared this.
Sticky Situation Leads To Legit LEGO Hack
https://poliverso.org/display/0477a01e-413154d7-2474b3c6503a43de
Sticky Situation Leads To Legit LEGO Hack [samsuksiri] frequently uses a laptop and has an external drive to store projects. The drive flops around on the end of its tether and gets in the way, so they repurposed their old iPod pouch and attached it to the laptop lid with double-sided tape. You can guess how that went â the weight of the drive caused the pocket to sag and eventually
The Privacy Post reshared this.
Cani robot nella striscia di Gaza. La Ghost Robotics sotto accusa per lâuso di cani armati
https://poliverso.org/display/0477a01e-5f1a977a-1672ce21e95058cb
Cani robot nella striscia di Gaza. La Ghost Robotics sotto accusa per lâuso di cani armati Un produttore di cani robot con sede a Filadelfia è diventato il bersaglio delle proteste https://billypenn.com/2024/04/22/israel-palestine-gaza-robot-dogs-ghost-robotics/ per la guerra a Gaza. Ghost Robotics, con sede presso il centro di ricerca
Philly manufacturer of military robot dogs is a target of Gaza war protests
Anti-war protesters are calling on UPenn to evict the firm from PennovationMeir Rinde (Billy Penn at WHYY)
The Privacy Post reshared this.
VPN in pericolo. Un attacco globale con milioni di tentativi di accesso colpisce le Reti Globali
https://poliverso.org/display/0477a01e-fbd6d556-94661f92dc841470
VPN in pericolo. Un attacco globale con milioni di tentativi di accesso colpisce le Reti Globali Gli aggressori prendono di mira le reti globali in un massiccio attacco di compromissione delle https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/riguardo
The Privacy Post reshared this.
AG presso la CGUE: Facebook deve "minimizzare" i dati personali per le pubblicitĂ nell'UE
Oggi il procuratore generale ha pubblicato il suo parere nella causa C-446/21. Ecco la prima reazione di noyb.
mickey25 April 2024
https://noyb.eu/it/ag-cjeu-facebook-must-minimize-personal-data-ads-eu