remixtures

joined 2 years ago
 

"In part one of this series on age verification in the European Union, we gave an overview of the state of the debate in the EU and introduced an age verification app, or mini-wallet, that the European Commission has commissioned. In this post, we will take a more detailed look at the app, how it will work and what some of its shortcomings are.

According to the original tender and the app’s recently published specifications, the Commission is soliciting the creation of a mobile application that will act as a digital wallet by storing a proof of age to enable users to verify their ages and access age-restricted content.

After downloading the app, a user would request proof of their age. For this crucial step, the Commission foresees users relying on a variety of age verification methods, including national eID schemes, physical ID cards (acknowledging that biometric analysis would be necessary for identifying a user corresponding to an ID), linking the app to another app that contains information about a user’s age, like a banking app, or age assessment through third parties like post offices.

In the next step, the age verification app would generate a proof of age. Once the user would access a website restricting content for certain age cohorts, the platform would request proof of the user’s age through the app. The app would then present proof of the user’s age via the app, allowing online services to verify the age attestation and the user would then access age-restricted websites or content in question. The goal is to build an app that will be aligned and allows for integration with the architecture of the upcoming EU Digital Identity Wallet."

https://www.eff.org/deeplinks/2025/04/age-verification-european-union-mini-id-wallet

#EU #AgeVerification #DigitalID #DigitalIDWallet #Privacy #Surveillance #DataProtection #Censorship

 

"Spyware maker NSO Group will have to pay more than $167 million in damages to WhatsApp for a 2019 hacking campaign against more than 1,400 users.

On Tuesday, after a five-year legal battle, a jury ruled that NSO Group must pay $167,254,000 in punitive damages and around $444,719 in compensatory damages.

This is a huge legal win for WhatsApp, which had asked for more than $400,000 in compensatory damages, based on the time its employees had to dedicate to remediate the attacks, investigate them, and push fixes to patch the vulnerability abused by NSO Group, as well as unspecified punitive damages.

WhatsApp’s spokesperson Zade Alsawah said in a statement that “our court case has made history as the first victory against illegal spyware that threatens the safety and privacy of everyone.”"

https://techcrunch.com/2025/05/06/nso-group-must-pay-more-than-167-million-in-damages-to-whatsapp-for-spyware-campaign/

#CyberSecurity #NSOGroup #Spyware #Pegasus #WhatsApp

 

"As early as 2017, Wynn-Williams writes, Facebook was exploring ways to expand its ad targeting abilities to thirteen-to-seventeen-year-olds across Facebook and Instagram — a decidedly vulnerable group, often in the throes of adolescent image and social crises.

Though Facebook's ad algorithms are notoriously opaque, in 2017 The Australian alleged that the company had crafted a pitch deck for advertisers bragging that it could exploit "moments of psychological vulnerability" in its users by targeting terms like "worthless," "insecure," "stressed," "defeated," "anxious," "stupid," "useless," and "like a failure."

The social media company likewise tracked when adolescent girls deleted selfies, "so it can serve a beauty ad to them at that moment," according to Wynn-Williams. Other examples of Facebook's ad lechery are said to include the targeting of young mothers based on their emotional state, as well as emotional indexes mapped to racial groups, like a "Hispanic and African American Feeling Fantastic Over-index."

"To me, this type of surveillance and monetization of young teens’ sense of worthlessness feels like a concrete step toward the dystopian future Facebook’s critics had long warned of," Wynn-Williams reflects."

https://futurism.com/facebook-beauty-targeted-ads

#SocialMedia #Facebook #Meta #Australia #AdTech #SurveillanceCapitalism #AdTargeting #Privacy #DataProtection

 

"Hackers have targeted GlobalX Air, one of the main airlines the Trump administration is using as part of its deportation efforts, and stolen what they say are flight records and passenger manifests of all of its flights, including those for deportation, 404 Media has learned.

The data, which the hackers contacted 404 Media and other journalists about unprompted, could provide granular insight into who exactly has been deported on GlobalX flights, when, and to where, with GlobalX being the charter company that facilitated the deportation of hundreds of Venezuelans to El Salvador.

“Anonymous has decided to enforce the Judge's order since you and your sycophant staff ignore lawful orders that go against your fascist plans,” a defacement message posted to GlobalX’s website reads. Anonymous, well-known for its use of the Guy Fawkes mask, is an umbrella some hackers operate under when performing what they see as hacktivism."

https://www.404media.co/globalx-airline-for-trumps-deportations-hacked/

#USA #Trump #Deportations #Immigration #ICE #ElSalvador #CyberSecurity #GlobalX #Hacking #Hackitivism #Anonymous

 

Karl Marx in America

Andrew Hartman

(University of Chicago Press)

The vital and untold story of Karl Marx’s stamp on American life.

"To read Karl Marx is to contemplate a world created by capitalism. People have long viewed the United States as the quintessential anti-Marxist nation, but Marx’s ideas have inspired a wide range of people to formulate a more precise sense of the stakes of the American project. Historians have highlighted the imprint made on the United States by Enlightenment thinkers such as Adam Smith, John Locke, and Thomas Paine, but Marx is rarely considered alongside these figures. Yet his ideas are the most relevant today because of capitalism’s centrality to American life.

In Karl Marx in America, historian Andrew Hartman argues that even though Karl Marx never visited America, the country has been infused, shaped, and transformed by him. Since the beginning of the Civil War, Marx has been a specter in the American machine. During the Gilded Age, socialists read Marx as an antidote to the unchecked power of corporations. In the Great Depression, communists turned to Marx in hopes of transcending the destructive capitalist economy. The young activists of the 1960s were inspired by Marx as they gathered to protest an overseas war. Marx’s influence today is evident, too, as Americans have become increasingly attuned to issues of inequality, labor, and power.

After decades of being pushed to the far-left corner of intellectual thought, Marx’s ideologies have crossed over into the mainstream and are more alive than ever. Working-class consciousness is on the rise, and, as Marx argued, the future of a capitalist society rests in the hands of the people who work at the point of production. A valuable resource for anyone interested in Marx’s influence on American political discourse, Karl Marx in America is a thought-provoking account of the past, present, and future."

https://press.uchicago.edu/ucp/books/book/chicago/K/bo245100866.html

#USA #Marx #History #PoliticalEconomy #Capitalism

 

"A hacker has breached and stolen customer data from TeleMessage, an obscure Israeli company that sells modified versions of Signal and other messaging apps to the U.S. government to archive messages, 404 Media has learned. The data stolen by the hacker contains the contents of some direct messages and group chats sent using its Signal clone, as well as modified versions of WhatsApp, Telegram, and WeChat. TeleMessage was recently the center of a wave of media coverage after Mike Waltz accidentally revealed he used the tool in a cabinet meeting with President Trump.

The hack shows that an app gathering messages of the highest ranking officials in the government—Waltz’s chats on the app include recipients that appear to be Marco Rubio, Tulsi Gabbard, and JD Vance—contained serious vulnerabilities that allowed a hacker to trivially access the archived chats of some people who used the same tool. The hacker has not obtained the messages of cabinet members, Waltz, and people he spoke to, but the hack shows that the archived chat logs are not end-to-end encrypted between the modified version of the messaging app and the ultimate archive destination controlled by the TeleMessage customer.

Data related to Customs and Border Protection (CBP), the cryptocurrency giant Coinbase, and other financial institutions are included in the hacked material, according to screenshots of messages and backend systems obtained by 404 Media."

https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/

#CyberSecurity #Signal #Messaging #Telemessage #Hacking

 

"Bluntly, the Y-axis simply doesn’t make much sense. And needless to say, if the Y-axis doesn’t make sense, you can’t meaningfully use the graph to make predictions. Computers can answer some questions reliably now, for example, and some not, and the graph tells us nothing about which is which or when any specific question will be solved. Or consider songwriting; Dylan wrote some in an afternoon; Leonard Cohen took half a decade on and off to write Hallelujah. Should we average the two figures? Should we sample Dylan songs more heavily because he wrote more of them? Where should songwriting go on the figure? The whole thing strikes us as absurd.

Finally, the only thing METR looked at was “software tasks”. Software might be very different from other domains, in which case the graph (even it did make sense) might not apply. In the technical paper, the authors actually get this right: they discuss carefully the possibility that the tasks used for testing might not be representative of real-world software engineering tasks. They certainly don't claim that the findings of the paper apply to tasks in general. But the social media posts make that unwarranted leap.

That giant leap seems especially unwarranted given that there has likely been a lot of recent data augmentation directed towards software benchmarks in particular (where this is feasible). In other domains where direct, verifiable augmentation is less feasible, results might be quite different. (Witness the failed letter ‘r’ labeling task depicted above.) Unfortunately, literally none of the tweets we saw even considered the possibility that a problematic graph specific to software tasks might not generalize to literally all other aspects of cognition.

We can only shake our heads."

https://garymarcus.substack.com/p/the-latest-ai-scaling-graph-and-why

#AI #GenerativeAI #LLMs #Chatbots #Automation #Benchmarks #SoftwareDevelopment #Programming #AIHype

[–] [email protected] 1 points 6 days ago

"Israel’s tech world is small, and Israel leads the world in exports of spyware and digital forensics tools. Former Israeli Defense Forces intelligence officials have gone on to found tech companies, especially in the field of spyware and surveillance. Companies like NSO Group, maker of the controversial Pegasus spyware, were founded and staffed by Israeli officials. The company was sanctioned by the Biden Administration. Israeli spyware firms have become known for selling their products to oppressive regimes around the world, where the tech is often used to target human rights advocates, journalists, and dissidents.

TeleMessage was founded in 1999, the same year its founder left his Israeli military intelligence job. The company found early success in the burgeoning world of text message technology. The company grew and eventually pivoted to focusing on extracting messages from common communication platforms for the purposes of archiving, often to meet record keeping regulations.

Tech professionals have moved between companies like TeleMessage and some of the leading Israeli spyware firms. For example, Alon Falah, a technical support manager at TeleMessage until 2021, left the company to join NSO Group, according to his LinkedIn profile. Another employee, Itzhak Demoza, joined Telemessage last year after a stint at Cellebrite, maker of hardware and software widely used by law enforcement to extract data from smartphones."

https://www.dropsitenews.com/p/mikewaltz-tech-israel-nationalsecurity-signal

 

"Apple Inc. is teaming up with startup Anthropic PBC on a new “vibe-coding” software platform that will use artificial intelligence to write, edit and test code on behalf of programmers.

The system is a new version of Xcode, Apple’s programming software, that will integrate Anthropic’s Claude Sonnet model, according to people with knowledge of the matter. Apple will roll out the software internally and hasn’t yet decided whether to launch it publicly, said the people, who asked not to be identified because the initiative hasn’t been announced.

The work shows how Apple is using AI to improve its internal workflow, aiming to speed up and modernize product development. The approach is similar to one used by companies such as Windsurf and Cursor maker Anysphere, which offer advanced AI coding assistants popular with software developers."

https://www.bloomberg.com/news/articles/2025-05-02/apple-anthropic-team-up-to-build-ai-powered-vibe-coding-platform

#AI #GenerativeAI #Apple #Xcode #Anthropic #Claude #VibeCoding #LLMs #Chatbots #SoftwareDevelopment #Programming

[–] [email protected] 1 points 6 days ago

@[email protected] Well, it's not inherently extremely difficult to learn how to program. You could learn all the essential stuff from a YouTube video that is 10-hours long or a book that is 400-pages long. The difficulty comes from learning what is feasible and practical to do with computer logic. You have to get the requirements really right and knowing if the generated code is doing what is supposed to do. Syntax is relatively easy. What is difficult is to learn how to solve problems. This requires thinking like a computer scientist. Ultimately, it all depends on the level of complexity of your project.

[–] [email protected] 2 points 6 days ago (1 children)

@[email protected] Tell me about. I'm not a professional developer but more of a technical writer. As someone who has been in charge of reviewing and editing documentation explaining the functional requirements of a moderately complex project, I found it extremely difficult to get both the product and development sides in agreement.

 

"Elon Musk’s Department of Government Efficiency has torn through Washington at breakneck speed. During the first 100 days of President Donald Trump’s second term, DOGE has played a central role in cutting more than 200,000 federal jobs. The organization has over that same time implemented aggressive cost-cutting measures (including to foreign food aid and medical research), overhauled longtime government cybersecurity systems, and targeted federal diversity, equity, and inclusion programs for elimination.

Most of these changes have been driven, in part, by AI tools—a move that has sparked serious concerns among experts. Critics say the rushed, untested use of artificial intelligence could lead to wrongful firings, mishandling of sensitive data, and lasting damage to core public services.

“It’s misguided for us to think that people who control technology and the associated power levers are naive about AI’s capabilities,” says Julia Stoyanovich, director of the Center for Responsible AI at New York University. “And their goal is not to do things better, or to make it so that everything is more efficient; rather, their goal is just to reduce the size of government, to reduce government spending, and to do this in a way that is just disorienting to everybody in society.”"

https://www.fastcompany.com/91324480/doge-used-ai-to-reshape-the-government-in-just-100-days

#USA #Trump #Musk #DOGE #AI #Privacy #DataProtection #CyberSecurity #Austerity

 

"Usually, AdSense ads appear in search results and are scattered around websites. Google ran a small test of chatbot ads late last year, partnering with select AI startups, including AI search apps iAsk and Liner.

The testing must have gone well because Google is now allowing more chatbot makers to sign up for AdSense. "AdSense for Search is available for websites that want to show relevant ads in their conversational AI experiences," said a Google spokesperson.

If people continue shifting to using AI chatbots to find information, this expansion of AdSense could help prop up profits. There's no hint of advertising in Google's own Gemini chatbot or AI Mode search, but the day may be coming when you won't get the clean, ad-free experience at no cost."

https://arstechnica.com/ai/2025/05/google-is-quietly-testing-ads-in-ai-chatbots/

#AI #GenerativeAI #Google #Ads #LLMs #Chatbots #AdTech #Surveillance #Privacy #Gemini #AdSense

 

"I think there is a real need for a book on actual vibe coding: helping people who are not software developers—and who don’t want to become developers—learn how to use vibe coding techniques safely, effectively and responsibly to solve their problems.

This is a rich, deep topic! Most of the population of the world are never going to learn to code, but thanks to vibe coding tools those people now have a path to building custom software.

Everyone deserves the right to automate tedious things in their lives with a computer. They shouldn’t have to learn programming in order to do that. That is who vibe coding is for. It’s not for people who are software engineers already!

There are so many questions to be answered here. What kind of projects can be built in this way? How can you avoid the traps around security, privacy, reliability and a risk of over-spending? How can you navigate the jagged frontier of things that can be achieved in this way versus things that are completely impossible?

A book for people like that could be a genuine bestseller! But because three authors and the staff of two publishers didn’t read to the end of the tweet we now need to find a new buzzy term for that, despite having the perfect term for it already."

https://simonwillison.net/2025/May/1/not-vibe-coding/

#AI #GenerativeAI #LLMs #Chatbots #SoftwareDevelopment #Programming #VibeCoding

 

"On Thursday Reuters published a photograph of Waltz checking his mobile phone during a cabinet meeting held by Donald Trump. The screen appears to show messages from various top level government officials, including JD Vance, Tulsi Gabbard, and Marco Rubio.

At the bottom of Waltz’s phone’s screen is a message that looks like Signal’s regular PIN verification message. This sometimes appears to encourage users to remember their PIN, which can stop people from taking over their account.

But the message is slightly different: it asks Waltz to verify his “TM SGNL PIN.” This is not the message that is displayed on an official version of Signal.

Instead TM SGNL appears to refer to a piece of software from a company called TeleMessage which makes clones of popular messaging apps but adds an archiving capability to each of them. A page on TeleMessage’s website tells users how to install “TM SGNL.” On that page, it describes how the tool can “capture” Signal messages on iOS, Android, and desktop."

https://www.404media.co/mike-waltz-accidentally-reveals-obscure-app-the-government-is-using-to-archive-signal-messages/

#USA #Trump #Signal #Messaging #Privacy #DigitalArchiving #TeleMessage

[–] [email protected] 1 points 1 week ago

"Unknown hackers last month targeted leaders of the exiled Uyghur community in a campaign involving Windows spyware, researchers revealed Monday.

Citizen Lab, a digital rights research group based at the University of Toronto, detailed an espionage campaign against members of the World Uyghur Congress (WUC), an organization that represents the Muslim-minority group, which has for years faced repression, discrimination, surveillance, and hacking from China’s government."

https://techcrunch.com/2025/04/28/citizen-lab-says-exiled-uyghur-leaders-targeted-with-windows-spyware/

[–] [email protected] 1 points 2 weeks ago

"The company, in other words, is "careless." Warned of imminent harms to its users, to democracy, to its own employees, the top executives simply do not care. They ignore the warnings and the consequences, or pay lip service to them. They don't care.
(...)
But there's another meaning to "careless" that lurks just below the surface of this excellent memoir: "careless" in the sense of "arrogant" – in the sense of not caring about the consequences of their actions.

To me, this was the most important – but least-developed – lesson of Careless People. When Wynn-Williams lands at Facebook, she finds herself surrounded by oafs and sociopaths, cartoonishly selfish and shitty people, who, nevertheless, have built a service that she loves and values, along with hundreds of millions of other people.

She's not wrong to be excited about Facebook, or its potential. The company may be run by careless people, but they are still prudent, behaving as though the consequences of screwing up matter."

[–] [email protected] 1 points 2 weeks ago

"So yeah, it looks like "ultrathink" is a Claude Code feature - presumably that 31999 is a number that affects the token thinking budget, especially since "megathink" maps to 1e4 tokens (10,000) and just plain "think" maps to 4,000."

https://simonwillison.net/2025/Apr/19/claude-code-best-practices/

[–] [email protected] 1 points 2 weeks ago

"The DOGE employees, who are effectively led by White House adviser and billionaire tech CEO Elon Musk, appeared to have their sights set on accessing the NLRB's internal systems. They've said their unit's overall mission is to review agency data for compliance with the new administration's policies and to cut costs and maximize efficiency.

But according to an official whistleblower disclosure shared with Congress and other federal overseers that was obtained by NPR, subsequent interviews with the whistleblower and records of internal communications, technical staff members were alarmed about what DOGE engineers did when they were granted access, particularly when those staffers noticed a spike in data leaving the agency. It's possible that the data included sensitive information on unions, ongoing legal cases and corporate secrets — data that four labor law experts tell NPR should almost never leave the NLRB and that has nothing to do with making the government more efficient or cutting spending.

Meanwhile, according to the disclosure and records of internal communications, members of the DOGE team asked that their activities not be logged on the system and then appeared to try to cover their tracks behind them, turning off monitoring tools and manually deleting records of their access — evasive behavior that several cybersecurity experts interviewed by NPR compared to what criminal or state-sponsored hackers might do."

https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security

[–] [email protected] 1 points 2 weeks ago* (last edited 2 weeks ago)

@grober_Unfug Try Gemini-2.5 Pro Preview. It's the best LLM. Alternatively, you can always try o3, OpenAI's latest LLM: https://lmarena.ai/.

BTW: I'm not the author of the post above :)

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

@kvadd Yes, but data brokers can buy that information for ad targeting and marketing purposes. These usages should be specifically outlawed, according to the GDPR.

[–] [email protected] 2 points 1 month ago

"Browsers keep track of the pages that a user has visited, and they use this information to style anchor elements on a page differently if a user has visited that link before. Most browsers give visited links a different color by default; some web developers rely on the :visited CSS selector to style visited links according to their own preferences.

It is well-known that styling visited links differently from unvisited links opens the door to side-channel attacks that leak the user’s browsing history. One notable attack used window.getComputedStyle and the methods that return a NodeList of HTMLCollection of anchor elements (e.g. document.querySelectorAll, document.getElementsByTagName, etc.) to inspect the styles of each link that was rendered on the page. Once attackers had the style of each link, it was possible to determine whether each link had been visited, leaking sensitive information that should have only been known to the user.

In 2010, browsers implemented a mitigation for this attack: (1) when sites queried link styling, the browser always returned the “unvisited” style, and (2) developers were now limited in what styles could be applied to links. However, these mitigations were complicated for both browsers to implement and web developers to adjust to, and there are proponents of removing these mitigations altogether." https://github.com/explainers-by-googlers/Partitioning-visited-links-history

[–] [email protected] 1 points 1 month ago (1 children)

@Alabaster_[email protected] OK, smart ass. Here's a little conversation I had with Gemini 2.5 LLM from Google about this topic. It's backed up with official sources: https://aistudio.google.com/app/prompts?state=%7B%22ids%22:%5B%221B0JecBTkQJ9wVjOnhM81piNPjrq3QbzU%22%5D,%22action%22:%22open%22,%22userId%22:%22113653798100742351191%22,%22resourceKeys%22:%7B%7D%7D&usp=sharing. Are you satisfied?

[–] [email protected] 1 points 1 month ago (3 children)

@Alabaster_[email protected] I just quoted an article that was authored by Robert Delwood. I don't have to justify anything. I don't own you a detailed empirical study of my position, sorry.

view more: next ›