Chrome is designed to let google spy on you in order to serve behavioural ads. So it should be no wonder third parties are using it to inject malware into your devices. The only reason these are "exploits" is because someone other than Google, the world's largest advertising company, is using them.
SCOOP: Footage from a food delivery robot in Los Angeles was given to the LAPD and used to secure a criminal conviction, according to internal emails I got using a public records request
This lightning-to-HDMI adapter designed to look like an Apple product is the worst gadget I have ever tested: It demands your location, browsing data, access to photos, and spams you with ads. Requires power and is detected as a "computer."
It's so bad that I am actually impressed a product like this actually exists. These things are actually out there in the wild. Lots of people say they inadvertently bought on Amazon
Well this thing is an absolutely bloody behemoth.
To be honest I think I can call my first #AppleLisaClone done!
Ugh. Google has patched yet another 0day in yet another media-encoding library that's nearly ubiquitous. Libvpx is in a ton of Linux projects (citation: https://pastebin.com/TdkC4pDv). Wikipedia says it's used by YouTube, Netflix, Amazon, JW Player, Brightcove, and Telestream. It also appears to be used in iOS.
If anyone has reasons to think this vulnerability is limited to Chrome, please let me know. Preliminarily, though, I'm inclined to think this is yet another vuln under active exploit that's going to make a ton of software vulnerable to RCE exploits.
The 0day is tracked as CVE-2023-5217.
This is important. My mother is currently facing substantial issues regarding her arms, making it difficult for her to effectively operate her keyboard for work. Her computer is running on Fedora Kinoite, and she's in need of reliable voice dictation software to facilitate her job comfortably.
While I'm currently assisting her, it's not really a sustainable long-term solution. If anyone is aware of a high-quality speech-to-text software, preferably one that can function offline and is open-source, please do let me know. This is crucial because the content of her work is confidential, and we need a reliable and secure solution.
Boosts are welcomed.
Has anyone started an "enshittification watch" website?
Like, just list every notable company or service with a slider bar showing where along that curve they currently fall, with links to notes, analysis, and receipts.
Who is resisting, who is at risk, who is sliding, and who is too far gone.
It's clear that it's gotten much riskier to rely on quite a large swath of the commercial tech landscape. If that's the game they're going to play, seems like we should at least be keeping track with intention so folks can make informed decisions.
[Announcing] fossilphant — a static-site generator to self-host your posts from Mastodon archives https://github.com/swaldman/fossilphant#readme
Check out examples, themes with paging https://www.mchange.com/projects/fossilphant/example/shatter/ or as one tall page https://www.mchange.com/projects/fossilphant/example/tower/
My current instance is sunsetting, and I want to make sure the banalities I posted here remain forever public.
If you are in similar straits, I'd love it if you gave this a try!
In a pinch, I once ran my trailer's lights, furnace blower, and water pump -- sparingly -- through a cold winter night, on that first 1500VA unit. It had no trouble turning that water pump to full pressure even halfway through discharge. Really respectable performance.
FWIW my experience with CyberPower UPSes has been excellent; the first PFCLCD1500 I bought went ten years before it blew an IC. Customers are thrilled with them. APC is a speck in the rear view mirror but a Tripp-Lite double conversion unit is likely my next upgrade. Remember ... all line-interactive power supplies have limitations, and a little $40 750VA battery box is no less prone to defects than any other.
CISA, the FBI and NSA just jointly published a report on the threat from deepfakes. It's a fairly comprehensive look at deepfake threats to date, and includes some recommendations for how to spot and anticipate them.
hardwired analogue telephones can be altered to allow electricity through to the microphone whilst on hook, sounds in the room are relayed back to the Telephone Exchange and monitored (whilst not altering the normal working of the telephone). It was a common tactic in East Germany (all the phones were wired this way) but did also get used against selected targets (usually political activists) in Western Europe (link below shows this on a UK phone)
Hello #fediblockmeta, many people are discussing #thebadspace #blocklist after they blocked tech.lgbt, but few people went through all 355 pages to look at it the #badspace contents. I did that and want to share my findings.
I don't want attention or followers, but I want this post shared, so I am posting from an alt.
(I'm usually critical of reductively identifying individual responsibility with that of a nation and state, and I might not use "we" that way most of the time, but this message is intended to agitate Americans. Thanks for understanding)