geosoco

joined 1 year ago
 

The accounts of several Russian, Chinese and Iranian state media outlets saw a 70 percent increase in engagement on X, the platform formerly known as Twitter, after it removed labels identifying them as “state-affiliated,” according to a new report released Tuesday.

The recent analysis from NewsGuard, which analyzes media trends and disinformation, found that 12 state media accounts from the three countries saw the number of likes and reposts on their content jump from 2.93 million in the 90 days before X removed the “state-affiliated” labels to 4.98 million in the 90-day period afterward.

Russia’s RT, which was already receiving substantially more engagement than the other state media outlets before the label’s removal, saw interactions with its posts nearly double in the three months after the change, jumping from 1.3 million to 2.5 million.

Iran’s PressTV similarly saw its engagement increase by about 97 percent, rising from 215,000 to 425,000 interactions after X’s removal of the “state-affiliated” label, according to NewsGuard.

Russia’s TASS also saw a 63 percent increase in engagement, receiving 493,000 interactions in the three months after the change, while engagement with posts from China’s Global Times rose by 26 percent to 314,000 interactions.

[–] [email protected] 12 points 11 months ago

Many sites have had to enable reveal passwords for people with complicated passwords not using password managers.

It's low risk, but their numbers are also coming from fairly dated hardware and is just proof of concept. It can almost certainly be speed up significantly.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago)

Yeah as the other person suggested i suspect it's more like "when do these expire?" "does this have mold on it?" "what does this sign say?"

You might get some about "does this match?" but i don't know

[–] [email protected] 8 points 11 months ago* (last edited 11 months ago)

The problem is that so many browsers leverage hardware acceleration and offer access to the GPUs. So yes, the browsers could fix the issue, but the underlying cause is the way GPUs handle data that the attack is leveraging. Fixing it would likely involve not using hardware acceleration.

As these patterns are processed by the iGPU, their varying degrees of redundancy cause the lossless compression output to depend on the secret pixel. The data-dependent compression output directly translates to data-dependent DRAM traffic and data-dependent cache occupancy. Consequently, we show that, even under the most passive threat model—where an attacker can only observe coarse-grained redundancy information of a pattern using a coarse-grained timer in the browser and lacks the ability to adaptively select input—individual pixels can be leaked. Our proof-of-concept attack succeeds on a range of devices (including computers, phones) from a variety of hardware vendors with distinct GPU architectures (Intel, AMD, Apple, Nvidia). Surprisingly, our attack also succeeds on discrete GPUs, and we have preliminary results indicating the presence of software-transparent compression on those architectures as well.

It sounds distantly similar to some of the canvas issues where the acceleration creates different artifacts which makes it possible to identify GPUs and fingerprint the browsers.

 

GPUs from all six of the major suppliers are vulnerable to a newly discovered attack that allows malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites, researchers have demonstrated in a paper published Tuesday.

The cross-origin attack allows a malicious website from one domain—say, example.com—to effectively read the pixels displayed by a website from example.org, or another different domain. Attackers can then reconstruct them in a way that allows them to view the words or images displayed by the latter site. This leakage violates a critical security principle that forms one of the most fundamental security boundaries safeguarding the Internet. Known as the same origin policy, it mandates that content hosted on one website domain be isolated from all other website domains.

...

The security threats that can result when HTML is embedded in iframes on malicious websites have been well-known for more than a decade. Most websites restrict the cross-origin embedding of pages displaying user names, passwords, or other sensitive content through X-Frame-Options or Content-Security-Policy headers. Not all, however, do. One example is Wikipedia, which shows the usernames of people who log in to their accounts. A person who wants to remain anonymous while visiting a site they don’t trust could be outed if it contained an iframe containing a link to https://en.wikipedia.org/wiki/Main_Page.

Pixel stealing PoC for deanonymizing a user, run with other tabs open playing video. “Ground Truth” is the victim iframe (Wikipedia logged in as “Yingchenw”). “AMD” is the attack result on a Ryzen 7 4800U after 30 minutes, with 97 percent accuracy. “Intel” is the attack result for an i7-8700 after 215 minutes with 98 percent accuracy.

The researchers showed how GPU.zip allows a malicious website they created for their PoC to steal pixels one by one for a user’s Wikipedia username. The attack works on GPUs provided by Apple, Intel, AMD, Qualcomm, Arm, and Nvidia. On AMD’s Ryzen 7 4800U, GPU.zip took about 30 minutes to render the targeted pixels with 97 percent accuracy. The attack required 215 minutes to reconstruct the pixels when displayed on a system running an Intel i7-8700.

...

 

macOS Sonoma will bring significant improvements to Safari where you can create separate profiles and a personal account that will track your preferences and activities with all of your saved passwords for websites, and much more. Widgets are also part of the final release, allowing you to gain access to information at a glance. Using Continuity, your iPhone's widgets can also be displayed on your Mac. Since Apple has released macOS Sonoma on all compatible devices, you can download and install right now,

The latest macOS Sonoma beta can be installed on your Mac through the Software Update mechanism in System Settings. macOS Sonoma also brings Apple TV-like screen savers to the mix. There is also a new Game Mode for users as Apple plans to introduce new titles to its library. If you are unfamiliar, check out if your Mac is compatible with Apple's latest macOS Sonoma update.

 

After six years of running Blue Origin, Bob Smith announced in a company-wide email on Monday that he will be "stepping aside" as chief executive of the space company founded by Jeff Bezos.

"It has been my privilege to be part of this great team, and I am confident that Blue Origin's greatest achievements are still ahead of us," Smith wrote in an email. "We've rapidly scaled this company from its prototyping and research roots to a large, prominent space business."

Shortly after Smith's email, a Blue Origin spokesperson said the company's new chief executive will be Dave Limp, who stepped down as Amazon's vice president of devices and services last month.

"Dave is a proven innovator with a customer-first mindset," the spokesperson said. "He has extensive experience in the high-tech industry and growing highly complex organizations, including leading Amazon’s Kuiper, Kindle, Alexa, Zoox, Fire TV, and many other businesses."

Limp will join Blue Origin in December and become chief executive of the company at that time.

[–] [email protected] 9 points 11 months ago (2 children)

You should 100% lie when you can. You can give every site a different email address, name, birthday, gender, and location and just note all of that in your password manager.

However, there's a lot you just can't control, like other people catching you in their pictures.

[–] [email protected] 5 points 11 months ago

Or leave the house 😢

[–] [email protected] 28 points 11 months ago (14 children)

This only sorta works for today and if your friends never share images or videos online. The ever-increasing amount of people taking pictures and filming and posting them online means the day is quickly approaching where you could be identified and tracked through other people's content, security & surveillance cameras, etc.

If stores start adopting the tracking used at Walmart and the Amazon biometric data, social media will be the last of your worries.

[–] [email protected] 10 points 11 months ago

Who says there's no innovation in tech companies today? lol

[–] [email protected] -1 points 11 months ago

Avatar checks out

[–] [email protected] 9 points 11 months ago

I have no idea what their business model is, but this would be a great way to collect more data for training various forms of AI. Arguably without harvesting people's personal data or their creative works.

I also suspect that because it's an assistive tool, it can probably get a fair bit of grant money.

[–] [email protected] 16 points 11 months ago

Yes, it's a press release, but I think this is maybe a an interesting use for some of the AI to augment that of volunteers who help describe and annotate for people who have vision challenges.

 

Since 2015, Be My Eyes has worked to connect our 6.9 million volunteers to users to assist them with everyday tasks. Our mission is to make the world more accessible for people who are blind or have low vision, which is why, seven months ago, our team began working with the blind community to incorporate AI into the existing Be My Eyes platform. Since then, over 19,000 blind and low-vision beta testers contributed to the design and function of our new AI feature.

Today we are thrilled to announce that Be My AI is officially entering an open beta phase for iOS users and in coming weeks will be available for hundreds of thousands of Be My Eyes users worldwide.

...

Using Be My AI in your everyday life is quick and simple. Once you have access, open the Be My Eyes app, click on the ‘Be My AI’ tab, and take a picture. Be My AI will give you a detailed description about it, and you can chat and ask Be My AI further questions to get more information. If you like what Be My AI described, you can send its response and photo to others, or use its description in social media.

And don’t worry - if Be My AI can’t answer all your questions, if you want to check its results, or if you just need a little more description than Be My AI can provide or crave the magic and humanity of working with people, you still can easily reach one of our dedicated volunteers, just like before. They will always be there, in 150 languages all across the globe.

If you want to learn more about Be My AI and how to use it at its best, we have collected the most common questions (and answers!) in our Help Center. Make sure to check them out!

...

[–] [email protected] 23 points 11 months ago* (last edited 11 months ago)

Welcome to the future [of shit]!

 

A viral TikTok account is doxing ordinary and otherwise anonymous people on the internet using off-the-shelf facial recognition technology, creating content and growing a following by taking advantage of a fundamental new truth: privacy is now essentially dead in public spaces.

The 90,000 follower-strong account typically picks targets who appeared in other viral videos, or people suggested to the account in the comments. Many of the account’s videos show the process: screenshotting the video of the target, cropping images of the face, running those photos through facial recognition software, and then revealing the person’s full name, social media profile, and sometimes employer to millions of people who have liked the videos. There’s an entire branch of content on TikTok in which creators show off their OSINT doxing skills—OSINT being open source intelligence, or information that is openly available online. But the vast majority of them do it with the explicit consent of the target. This account is doing the same, without the consent of the people they choose to dox. As a bizarre aside, the account appears to be run by a Taylor Swift fan, with many of the doxing videos including Swift’s music, and including videos of people at the Eras Tour.

404 Media is not naming the account because TikTok has decided to not remove it from the platform. TikTok told me the account does not violate its policies; one social media policy expert I spoke to said TikTok should reevaluate that position.

The TikTok account, conversations with victims, and TikTok’s own lack of action on the account show that access to facial recognition technology, combined with a cultural belief that anything public is fair game to exploit for clout, now means that all it takes is one random person on the internet to target you and lead a crowd in your direction.

One target told me he felt violated after the TikTok account using facial recognition tech targeted him. Another said they initially felt flattered before “that promptly gave way to worry.” All of the victims I spoke to echoed one general point—this behavior showed them just how exposed we all potentially are simply by existing in public.

...

 

Two years ago, the metaverse was billed as the next big thing - but many in the tech world have already moved on.

...
But almost two years on, Zuckerberg has been forced to deny that he is now jettisoning the idea.

"A narrative has developed that we're somehow moving away from focusing on the metaverse," he told investors in April. "So I just want to say upfront that that's not accurate."

On Wednesday the company holds its annual VR event called Meta Connect.

It's a chance, perhaps, for Zuckerberg to again explain his reasoning for taking an extremely profitable social media company and diverting its focus to an extremely unprofitable VR venture.

How unprofitable? Well, the most recent figures from Meta are eye-watering.

Reality Labs - which as the name suggests is Meta's virtual and augmented reality branch - has lost a staggering $21 billion since last year.

Part of the losses reflect long-term investment. Meta wasn't expecting short-term returns. But the worrying fact for the company is that, so far, there is very little evidence that this enormous punt will work.

Horizon Worlds, a game published by Meta, is about as close as the company has got to creating a metaverse.

Users can hop into different settings - cafes, comedy clubs, night clubs, basketball courts - to hang out and play games.

Meta claims it has 300,000 monthly users: tiny when compared to the billions of people on Facebook and Instagram.

...

[–] [email protected] 2 points 1 year ago

I saw some research a while back around giving computers personality traits or having them respond more human like, and college students found it super creepy. If you watch how people interact with assistants, it's very different than from interacting with humans.

 

Panos Panay did not present at Microsoft's recent Windows event in New York City—his departure from the titanic technology corporation was announced on September 18; so only three days before an official unveiling of new Surface products. Panay and his (now former) executive colleagues painted a positive picture regarding the move onto pastures new. News reports emerged about an alleged high level hiring by Amazon, with Panay overseeing Alexa and Echo divisions—replacing Dave Limp, SVP of Amazon Devices & Services. A Business Insider report suggests that Microsoft's former chief product officer was unhappy about budget cuts affecting his Surface division—certain insiders were not surprised when Panay announced his retirement from the big M.

The transfer to Amazon was in the works for a while, according to cited inside sources—Microsoft reportedly implemented a round of major budget cuts and product cancellations that did not sit well with Panay. The Surface department experienced "significant" downscaling, and plans for next-generation Surface Headphones were jettisoned. Business Insider proposed that funds had been reassigned to more important internal ventures—mainly artificial intelligence. Many folks were looking forward to Panay taking the stage in NYC earlier this week, but Brett Ostrum (Corporate Vice President of Surface Devices) ultimately acted as his replacement—with a showcasing of the company's latest portable Windows devices. Attendees were somewhat surprised to see Microsoft CEO Satya Nadella turn up as well—it is possible that he was added to the roster for "some extra firepower."

 

Right to repair has no cannier, more dedicated adversary than Apple, a company whose most innovative work is dreaming up new ways to sneakily sabotage electronics repair while claiming to be a caring environmental steward, a lie that covers up the mountains of e-waste that Apple dooms our descendants to wade through.

...

Today, it costs about a quarter to add a system-on-a-chip to even the tiniest parts. These SOCs can run DRM. Here's how that DRM works: when you put a new part in a device, the SOC and the device's main controller communicate with one another. They perform a cryptographic protocol: the part says, "Here's my serial number," and then the main controller prompts the user to enter a manufacturer-supplied secret code, and the master controller sends a signed version of this to the part, and the part and the system then recognize each other.

This process has many names, but because it was first used in the automotive sector, it's widely known as VIN-Locking (VIN stands for "vehicle identification number," the unique number given to every car by its manufacturer). VIN-locking is used by automakers to block independent mechanics from repairing your car; even if they use the manufacturer's own parts, the parts and the engine will refuse to work together until the manufacturer's rep keys in the unlock code:

 

The United States is already a global leader in traffic-related fatalities, with a thirty-percent jump in the last decade. That’s in contrast to every other developed country, which saw a decline.

...

The electric Ford Lightning, for example, is a whopping 6,500 pounds. The Hummer EV is even heavier, clocking in at 9,000 pounds. Its battery alone weighs more than a Honda Civic. Experts have pointed out the significant safety ramifications of this transition for a while, but it’s still not clear that we’ve prepared the regulatory and policy landscape for such a transition.

Even if you don’t want a giant, extremely heavy EV, the tendency to purchase such vehicles creates an arm race for everyone interested in protecting their family on the road. That in turn causes a shift away from smaller EVs in a bid to feed the elemental materials needed for ever larger EV batteries.

...

“Norway, a pioneer in EV use, is considering a weight-based tax to steer buyers away from the fattest EVs (the Norwegian government recently eliminated EV purchase incentives). France already has one on SUVs. Buyers of new diesel and gasoline vehicles must pay a tax of €10 ($14.58) a kilo (2.2 pounds) above 1.8 tons. The weight threshold is to be reduced. EVs are exempt, but as those vehicles become heavier and more popular, it seems they will get swept into the weight-based tax net.”

A smattering of localities have tried to prepare for the threat. DC, for example, has imposed a creative vehicle registration fee schedule that has heavy EV truck and SUV owners paying higher registration fees than lighter EV sedans. But it’s an outlier.

 

SpaceX has received the Federal Communications Commission's (FCC) approval to operate upgraded Starlink user terminals. These dishes are the first of their kind that will be deployed to users after SpaceX's partial buildup of its second generation Starlink constellation, and the approval came a couple of days back. SpaceX had filed two applications with the FCC, for user terminals that are designed to operate in one place and its Earth Stations in Motion (ESIMs) that are for users who want to use Starlink while on the go. The latest application for the user terminals also shows that SpaceX plans to launch a new portable terminal with lower power.

...

The latest user terminal application granted by the FCC features a new dish that SpaceX describes is for mobile use. These terminals have been collectively dubbed as fixed terminals (UT3) and they come in two variants. Each of these has two versions, one for consumer users and the other for occupational users.

UT3 version 2, the mobility version, significantly reduces the transmit duty cycle or the time the dish spends communicating with the orbiting satellites for its consumer variant. Its duty cycle is 9.7%, while the current Starlink dish, commonly called the flat dish, has a duty cycle of 14%. UT3 also reduces the maximum power sent to the antenna at 1.37 Watts and reduces the EIRP to 33.2 dBW.

...

 

The European Commission has re-imposed a fine of around €376.36 million on Intel for a previously established abuse of dominant position in the market for computer chips called x86 central processing units ('CPUs'). Intel engaged in a series of anticompetitive practices aimed at excluding competitors from the relevant market in breach of EU antitrust rules.

With today's decision, we are re-imposing a €376.36 million fine on Intel for having abused its dominant position in the computer chips market. Intel paid its customers to limit, delay or cancel the sale of products containing computer chips of its main rival. This is illegal under our competition rules. Our decision shows the Commission's commitment to ensure that very serious antitrust breaches do not go unsanctioned. - Commissioner Didier Reynders, in charge of competition policy

view more: next ›