1
132
submitted 3 days ago by [email protected] to c/[email protected]
2
83
submitted 3 days ago by [email protected] to c/[email protected]

Apple has complied with the Chinese government's request to remove several popular communication apps from its app store, including WhatsApp, Threads, Signal, and Telegram, due to national security concerns. This action was taken following a directive from the Cyberspace Administration of China. These apps have been crucial for political dissidents globally, especially in China where political expression is heavily regulated. Despite previous reliance on VPNs to access these platforms, they are now unavailable for download in China through the official app store. This move by Apple comes amidst increasing tensions between the U.S. and China in the realm of consumer technology, with discussions in the U.S. Senate about the future of TikTok, a popular social media app owned by a Chinese parent company

3
247
submitted 3 days ago by [email protected] to c/[email protected]

"Google issued a stern warning to its employees, with the company’s vice president of global security, Chris Rackow, saying, “If you’re one of the few who are tempted to think we’re going to overlook conduct that violates our policies, think again,” according to an internal memo obtained by CNBC."

4
68
submitted 3 days ago by [email protected] to c/[email protected]
5
123
submitted 4 days ago by [email protected] to c/[email protected]

cross-posted from: https://infosec.pub/post/11194362

49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest level Imperva has reported since it began monitoring automated traffic in 2013. For the fifth consecutive year, the proportion of web traffic associated with bad bots grew to 32% in 2023, up from 30.2% in 2022, while traffic from human users decreased to 50.4%. Automated traffic is costing organizations billions (USD) annually due to attacks … More → The post Bots dominate internet activity, account for nearly half of all traffic appeared first on Help Net Security.

6
60
submitted 4 days ago by [email protected] to c/[email protected]

Caveat: It isn't available in the app store in the EU, and is instead only available via the developer's marketplace, AltStore¹. As far as I can tell, this genuinely isn't because of greed, but because of a little detail in Apple's EU rules (possibly wrong):

[...] Developers can choose to remain on the App Store’s current business terms or adopt the new business terms for iOS apps in the EU.

Developers operating under the new business terms for EU apps will have the option to distribute their iOS apps in the EU via the App Store, Web Distribution, and/or alternative app marketplaces. [...] Developers who achieve exceptional scale on iOS, with apps that have over one million first annual installs in the past 12 months in the EU, will pay a Core Technology Fee. ²

The problem being, if you're under the old terms, there is no "Core Technology Fee." However, in order to distribute on another marketplace, you must opt into the new terms, meaning you now have to pay the fee even on apps that are distributed on Apple's app store. Thus, if you distribute on the iOS app store in the EU for free, and lets say it gets 2 million installs, you get 1 million installs free... and you now owe Apple half a million dollars.

  1. https://news.ycombinator.com/item?id=40067556
  2. https://developer.apple.com/support/core-technology-fee/
7
53
submitted 5 days ago by [email protected] to c/[email protected]
8
36
submitted 4 days ago by [email protected] to c/[email protected]
9
24
submitted 4 days ago by [email protected] to c/[email protected]
10
27
submitted 5 days ago by [email protected] to c/[email protected]

I work for the support department of a large multinational imaging company. Starting yesterday, we started getting tons of calls from customers who have been sending email from their devices from Gmail domains who are not able to send emails to M365 users. A bit of snooping in our test M365 domain shows that they are being dropped as spam from M365. What's odd is that I cannot find any mention of this behavior anywhere on the Internet. Has anyone else seen this yet?

11
95
submitted 6 days ago by [email protected] to c/[email protected]

The nonprofit company is contemplating federating Ghost over ActivityPub. There is a survey asking users about their usage of ActivityPub platforms like Mastodon and how they expect ActivityPub functionality to work in Ghost.

12
483
submitted 1 week ago by [email protected] to c/[email protected]

Credit to @bontchev

13
82
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]
14
21
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]

I am no stranger to Excel and Tech in general, however this stumped me! This all occurred on the corporate laptop where we connect to the network remotely using a security token ID. Any help is extremely appreciated as I would hate to have to do hours of re-work. Adulting is hard.

I was working in an Excel spreadsheet, when suddenly the Excel application started glitching. Any updates to a given cell would not immediately reflect. I could only view the change after toggling to a different tab and returning to the tab with the updated cell. Instead of clicking the Save button, I clicked the Exit button on the Excel file as I know a pop-up would be triggered if changes were made since the most recent save. The file closed with no pop-ups, so I figured that was because I had already recently saved the file which I remember doing. I then rebooted the laptop, logged in again with new token as we do each time, expecting to see all my updates when re-opening the file. Especially because the time stamp of the file clearly indicated the moment right before the reboot. But the file had completely reverted to the original state! I even checked many other local folders including Downloads, Documents, Desktop. I checked the Recent Files panel within the Excel file but all versions were also in original state. I looked for the Auto-recovery panel but none was available.

I'm panicking as I'm really in a bind and time crunch. I considered consulting our IT team but they are usually so slow and would most likely be too late, if they can even recover the updated file. Is it possible to recover the updated file in general now? What was the issue in this series of events, and what would have been the best solution? Any other advice or insight to help me out? Thank you all!

15
34
submitted 1 week ago by [email protected] to c/[email protected]

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies thanks to a breakthrough by scientists at Oxford’s Department of Physics guaranteeing security and privacy. The advance promises to unlock the transformative potential of cloud-based quantum computing and is detailed in a new study published in Physical Review Letters.

In the new study, the researchers use an approach known as ‘blind quantum computing’, which connects two totally separate quantum computing entities – potentially an individual at home or in an office accessing a cloud server – in a completely secure way. Importantly, their new methods could be scaled up to large quantum computations.

16
415
submitted 1 week ago by [email protected] to c/[email protected]
17
186
submitted 1 week ago by [email protected] to c/[email protected]

'Privacy. That's Apple,’ the slogan proclaims. New research from Aalto University in Finland begs to differ.

The researchers studied eight default apps, the ones that are pretty much unavoidable on a new device, be it a computer, tablet or mobile phone: Safari, Siri, Family Sharing, iMessage, FaceTime, Location Services, Find My and Touch ID. They collected all publicly available privacy-related information on these apps, from technical documentation to privacy policies and user manuals.

'Due to the way the user interface is designed, users don’t know what is going on. For example, the user is given the option to enable or not enable Siri, Apple's virtual assistant. But enabling only refers to whether you use Siri's voice control. Siri collects data in the background from other apps you use, regardless of your choice, unless you understand how to go into the settings and specifically change that,’ says Associate Professor Janne Lindqvist, head of the computer science department at Aalto.

'The online instructions for restricting data access are very complex and confusing, and the steps required are scattered in different places. There’s no clear direction on whether to go to the app settings, the central settings – or even both,’ says Amel Bourdoucen, a doctoral researcher at Aalto.

In addition, the instructions didn’t list all the necessary steps or explain how collected data is processed.

The researchers also demonstrated these problems experimentally. They interviewed users and asked them to try changing the settings.

‘It turned out that the participants weren’t able to prevent any of the apps from sharing their data with other applications or the service provider,’ Bourdoucen says.

18
84
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]
19
80
submitted 1 week ago by [email protected] to c/[email protected]

follow-up Mastodon thread from the author: https://hackers.town/@lori/112255132348604770

20
31
submitted 1 week ago by [email protected] to c/[email protected]

A video about the Minuteman ICBM's guidance computer by Alexander the ok.

He even made a simulator for it, in case you want to try out what it would have been like to program an ICBM's guidance computer in the 60's 😁

21
61
submitted 1 week ago by [email protected] to c/[email protected]

Almost 90 per cent of the global supply for polysilicon, a common raw material in electronic devices and solar panels, comes from China, and about half of that comes from Xinjiang, the north-western province that is home to the Uyghurs, says Grace Forrest, founder of Walk Free, a charity dedicating to fight forced labour.

The organization has exposed modern slavery, forced and child labour throughout the renewable energy supply chain, with evidence of state-imposed forced labour of Uyghurs and other Turkic and Muslim majority groups in China in the making and supply of solar panels and other renewable technologies.

It has also shone a light on the slave-like conditions in the Democratic Republic of Congo, where cobalt is mined by workers for its use in rechargeable batteries for laptop computers and mobile phones.

"We have an opportunity to build an economy that isn’t coming from colonial lines and yet, right now, a green economy absolutely will be built on forced and child labour," Forrest says.

“So the message really is, you cannot harm people in the name of saving the planet.”

Walk Free's latest Global Slavery Index estimated that 50 million people were living in modern slavery – either in forced labour or forced marriage – on any given day in 2021.

22
308
submitted 1 week ago by [email protected] to c/[email protected]
23
44
submitted 1 week ago by [email protected] to c/[email protected]

Cross posted from: https://beehaw.org/post/13091735

In November 2019, the US government’s National Security Commission on Artificial Intelligence (NSCAI), an influential body chaired by former Google CEO and executive chairman Eric Schmidt, warned that China was using artificial intelligence to “advance an autocratic agenda.”

Just two months earlier, Schmidt was also seeking potential personal connections to China’s AI industry on a visit to Beijing, newly disclosed emails reveal. Separately, tax filings show that a nonprofit private foundation overseen by Schmidt and his wife contributed to a fund that feeds into a private equity firm that has made investments in numerous Chinese tech firms, including those in AI.

24
97
submitted 1 week ago by [email protected] to c/[email protected]

Needs archive.is link!

25
97
submitted 1 week ago by [email protected] to c/[email protected]
view more: next ›

Technology

37132 readers
113 users here now

Rumors, happenings, and innovations in the technology sphere. If it's technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS