-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Aug 16, 2023


Programming Leftovers

Gemini Articles of Interest



Not call: Open source gurus urge you to dump Zoom


↺ Not call: Open source gurus urge you to dump Zoom


> The Software Freedom Conservancy (SFC) is calling on free and open source software (FOSS) contributors to stop using Zoom video conferencing in light of the software maker's terms-of-service scandal.


> Back in March, Zoom quietly changed its fine print to include a clause in section 10.4 that assigned the video-chat biz perpetual, royalty-free rights to use "customer content" to train machine learning models.



US consumer protection agency announces plans to regulate sale of personal data


↺ US consumer protection agency announces plans to regulate sale of personal data


> The announcement comes following years of heated questions surrounding personal data security in the US, especially around major controversies like Cambridge Analytica accessing Facebook data and other breaches. China and the EU both have stricter data privacy regulations than the US, which has raised questions about US policy and led to some changes to accommodate US trade with the EU. Congress has also paid more attention to data privacy issues, with TikTok’s CEO recently testifying before the US House Committee on Energy and Commerce, though Congress has yet to pass major data security legislation.



We've added the Tor Browser to Browserling


↺ We've added the Tor Browser to Browserling


> You can now test your websites in multiple Tor browser versions as well as access onion links.



Zoom Can Spy on Your Calls and Use the Conversation to Train AI, But Says That It Won’t


↺ Zoom Can Spy on Your Calls and Use the Conversation to Train AI, But Says That It Won’t


> It’s a stupid way to run a technological revolution. We should not have to rely on the benevolence of for-profit corporations to protect our rights. It’s not their job, and it shouldn’t be.



You're not seeing double – yet another UK copshop is confessing to a data leak


↺ You're not seeing double – yet another UK copshop is confessing to a data leak


> The latest blunder follows a litany of recent errors elsewhere in the forces: Police Service in Northern Ireland (PSNI) last week confirmed it unwittingly exposed a spreadsheet containing details of serving police officers; and this week Cumbria constabulary said it mistakenly published the names, salaries and allowances for all officers and staff online.



Microsoft may store your conversations with Bing if you're not an enterprise user


↺ Microsoft may store your conversations with Bing if you're not an enterprise user


> The details emerged as companies face fresh challenges with the rise of generative AI. People want to know what corporations are doing with information provided by users. And users are likewise curious about what they can do with the content generated by AI. Microsoft addresses these issues in a new clause titled "AI Services" in its terms of service.



AI bots are so good at mimicking the human brain and vision that CAPTCHAs are useless


↺ AI bots are so good at mimicking the human brain and vision that CAPTCHAs are useless


> The paper noted that in a contextualized setting human solving time slows down to 22 seconds, indicating that in this more natural setting, AI bots are faster than humans at solving the puzzle.



Hacker Forum Credentials Found on 120,000 PCs Infected With Info-Stealer Malware [Ed: Windows TCO]


↺ Hacker Forum Credentials Found on 120,000 PCs Infected With Info-Stealer Malware


> Israeli threat intelligence company Hudson Rock has identified credentials associated with cybercrime forums on roughly 120,000 computers infected with information stealers.


> The systems were discovered during the analysis of a database of more than 14.5 million machines infected with info-stealers, many of which belong to hackers, Hudson Rock says.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Fri Jun 14 05:35:59 2024