0x815

@0x815@feddit.de

This profile is from a federated server and may be incomplete. View on remote instance

Several European consumer watchdogs file complaints against Chinese online platform Temu over "manipulative techniques" breaching EU’s Digital Services Act ( www.beuc.eu )

According to the European consumer protection group BEUC, the Chinese online retailer Temu "fails to provide sufficient traceability of the traders that sell on its platform" and thereby fail "to ensure that the products sold to EU consumers conform to EU law", BEUC said in a release....

The coordination network toolkit: a framework for detecting and analysing coordinated behaviour on social media ( link.springer.com )

The authors introduce and evaluate an open-source software package and methodological framework for detecting and analysing coordinated behaviour on social media, namely the Coordination Network Toolkit, utilising weighted, directed multigraphs to capture intricate coordination dynamics....

0x815 OP ,

This is maybe a good idea. What would an emoji analysis tell us about a network? 😃

Chinese network behind one of world’s ‘largest online scams’: Vast web of fake shops touting designer brands took money and personal details from 800,000 people in Europe and US, data suggests ( www.theguardian.com )

A trove of data examined by experts indicates the operation is highly organised, technically savvy – and ongoing....

Amazon- and Google-backed AI firm Anthropic says “general-purpose AI tools simply could not exist” if AI companies had to pay licences for the training material ( www.computerweekly.com )

Generative artificial intelligence (GenAI) company Anthropic has claimed to a US court that using copyrighted content in large language model (LLM) training data counts as “fair use”, however....

0x815 OP ,

Data Leak at Anthropic Due to Contractor Error

TL;DR - Anthropic had a data leak due to a contractor’s mistake, but says no sensitive info was exposed. It wasn’t a system breach, and there’s no sign of malicious intent.

Krebs on Security: "Using Google Search to Find Software Can Be Risky" ( krebsonsecurity.com )

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make...

0x815 OP ,

The article doesn't say which classifier algorithm they use in that case in India.

We had a similar incident in the Netherlands last year, for example, with similar problems. There they used Gradient Boosting afaik. But it doesn't really matter as all these algorithms will yield a high number of false positives. If we use this and blindly trust trust the result in sensitive areas such as social welfare, we cause a lot if harm to iur society.

Human Rights Watch accuses Facebook-parent Meta of falling short to protect LGBT people from harassment and doxxing ( www.hrw.org )

Human Rights Watch interviewed dozens of LGBT people who indicated that they had reported being harassed, doxxed, outed, and abused on Facebook and Instagram, but in all these cases, Meta either did not respond to their complaints or found that the content they reported did not violate its policies, and the content remained...

China raises private hacker army to probe foreign governments ( www.newsweek.com )

Chinese state institutions issue rewards for finding the cybersecurity vulnerabilities in software that is often used by foreign governments, in what may be a subtle new form of state-backed cyber warfare. At the same time, China is promoting young cybersecurity engineers in a doubling of its efforts to probe foreign systems for...

Work inside the machine of the music industry: How pre-saves and algorithmic marketing turn musicians into influencers ( algorithmwatch.org )

Streaming platforms allow users to add upcoming tracks to their playlists, in order to listen to them as soon as they are released. While this sounds harmless, it changed the habits of independent musicians, who feel they have to adapt to yet another algorithm.

‘The tide has turned’: why parents are suing US social media firms after their children’s death ( www.theguardian.com )

While social media firms have long faced scrutiny from Congress and civil rights organizations over their impact on young users, the new wave of lawsuits underscores how parents are increasingly leading the charge, said Jim Steyer, an attorney and founder of Common Sense media, a non-profit that advocates for children’s online...

Security researchers warned Apple as early as 2019 about vulnerabilities in its AirDrop wireless sharing function that Chinese authorities claim they recently used to track down users ( edition.cnn.com )

A Chinese tech firm, Beijing-based Wangshendongjian Technology, was able to compromise AirDrop to identify users on the Beijing subway accused of sharing “inappropriate information,” judicial authorities in Beijing said this week....

eBay agreed to pay maximal possible fine of $3 million after employees harassed, intimidated, and stalked a Massachusetts couple in retaliation for their critical reporting of the online marketplace ( arstechnica.com )

eBay's harassment campaign against the couple, David and Ina Steiner, stretched for 18 days in August 2019 and was led by the company's former senior director of safety and security, Jim Baugh. It started when then-CEO Devin Wenig and then-chief communications officer Steven Wymer decided to "take down" the Steiners after...

Judge finds evidence that Tesla, Musk knew about Autopilot defect that led to killing of Florida man ( www.reuters.com )

Bryant Walker Smith, a University of South Carolina law professor, called the judge’s summary of the evidence significant because it suggests “alarming inconsistencies” between what Tesla knew internally, and what it was saying in its marketing....

Facebook Watches Teens Online As They Prep for College ( themarkup.org )

An investigation by the media organization The Markup found the pixel by Facebook and Instagram-parent Meta on dozens of popular websites targeting kids from kindergarten to college, including sites that students are all but required to use if they want to participate in school activities or apply to college....

A secret Google deal let Spotify completely bypass Android’s app store fees ( www.theverge.com )

Google fought to keep the Spotify numbers private during its antitrust fight with Epic, saying they could damage negotiations with other app developers who might want more generous rates. Google’s User Choice Billing program, launched in 2022, is typically described as shaving about 4 percent off Google’s Play Store...

0x815 ,

<a href="">YouTube Says New 5-Second Video Load Delay Is Supposed to Punish Ad Blockers, Not Firefox Users</a>

Firefox users are reporting an ‘artificial’ load time on YouTube videos. YouTube says it’s part of a plan to make people who use adblockers “experience suboptimal viewing, regardless of the browser they are using.”

Amazon used an algorithm to essentially raise prices on other sites, the FTC says ( apnews.com )

The new excerpts unveiled Thursday allege executives at the e-commerce giant intentionally deleted communication by using a feature on the popular app Signal that makes messages disappear. By doing this, the FTC said Amazon “destroyed more than two years” worth of communications from June 2019 to “at least early 2022”...

Fake Cisco Webex Google Ads abuse tracking templates to push malware ( www.malwarebytes.com )

A new malvertising campaign is targeting corporate users who are downloading the popular web conferencing software Webex. Threat actors have bought an advert that has been online for almost a week and that impersonates Cisco’s brand and is displayed first when performing a Google search. The malware being used in this campaign...

Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet ( github.com )

There is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation....

BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild ( citizenlab.ca )

Last week, while checking the device of an individual employed by a Washington DC-based civil society organization with international offices, Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware. This latest find shows once again that civil society is...

A decentralized, blockchain-based messaging network for safer communications ( techxplore.com )

Researchers from several institutes worldwide recently developed Quarks, a new, decentralized messaging network based on blockchain technology. Their proposed system could overcome the limitations of most commonly used messaging platforms, allowing users to retain control over their personal data and other information they share...

0x815 OP ,

The cult of the dead cow has recently announced promising projects. I’m also looking forward to them.

0x815 OP ,

You’re right. A blockchain doesn’t solve the double-spending problem, so don’t create decentralized payment networks. Let’s use something like Paypal instead, you know, the one that will sooner or later merge with this single-letter company.

You can also use Google Pay or Apple Pay, and developers can use their stores to monetize their apps. Just 30% or so commission and the apps ‘adjusted’ to the stores’ rules (to be fair, there are not really soooo many trackers, right?).

Proof of provenance isn’t a use case either. Use Amazon servers. Microsoft Azure. They store all the data, and it’s safe.

We don’t need companies like drife.io or particl.io. We have Uber and Amazon. Centralized services are much better. They are so good for humanity that their companies don’t even have to pay taxes.

0x815 OP ,

I agree on what you say about the ways PDFs are used today, but back in the 1982 the world was different. Back then it was a useful thing imho.

"Automated Racism": China's Hikvision still sells Uyghur-tracking surveillance cameras, powered by America's Nvidia ( ipvm.com )

Despite assurances for years that Hikvision has stopped minority analytics, just 7 months ago local PRC authorities awarded a $6 million contract that explicitly requires Hikvision analytics to identify Uyghurs (维族), powered by NVIDIA hardware, security specialist IPVM says.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines