Squire1039

joined 1 year ago
 

Google Warns of Privacy Risks with New AI Assistant "Gemini"

Key Points:

  • Google's new AI assistant, Gemini, collects your conversations, location, feedback, and usage information.
  • Be cautious: This includes your actual conversations, not just summaries. They are stored for 3 years, even after deleting activity.
  • Don't share sensitive information: Google may use it to improve AI and might share it with human reviewers.
  • Even turning off activity tracking doesn't prevent conversations from being saved for 72 hours.

Additional Notes:

  • This applies to all Gemini apps, not just the main assistant.
  • Google claims they don't sell your information but use it for internal purposes.
 
[–] Squire1039@lemm.ee 3 points 8 months ago (1 children)

Haha. So, a doublet is in a way, like a dress with a skirt. The longer one covers your exposed crotch. Breathtaking indeed!

Until the late 15thCentury, it was common for men to wear a long tunic or doublet – essentially, a dress – with hose (tights) on their legs. Then the fashion changed. Doublets gradually inched their way upwards over the years, becoming so short that they no longer covered the crotch. This was particularly dangerous, because the hose men wore at the time came individually, like socks, leaving open spaces that were somewhat… revealing.

 

Summary

In the Renaissance period, codpieces emerged as fashionable accessories for men, initially serving practical purposes such as covering the crotch gap left by shorter doublets. They evolved into exaggerated, often phallic-shaped adornments made of luxurious fabrics and embellishments, symbolizing virility and military prowess. Henry VIII famously popularized them, using their figurative associations to bolster his image of fertility. However, by the late 16th century, codpieces fell out of fashion, giving way to other trends like peascod doublets. Today, very few authentic codpieces remain, but they continue to captivate public interest in historical contexts and even resurface in modern fashion and entertainment, albeit in smaller forms.

Comment

Quick, let me grab my money!

 

Bug:

Affected versions 12.23.1-12.72.0 (May 2022-Feb 2024) with split tunneling feature.

Impact:

Exposed visited domains to user's ISP, potentially leaking browsing history.

Affected users:

Windows users with active split tunneling (about 1%).

Fix:

Upgrade to version 12.73.0 (removes split tunneling temporarily).

Alternatives:

Disable split tunneling or use ExpressVPN version 10.

Note:

All other traffic and content remain encrypted.

[–] Squire1039@lemm.ee 8 points 8 months ago

It potentially can help verifying that a recorded message/digital data originates from you (or any other person). It can't help with the misinformation in the data itself. See also: https://lemm.ee/post/23366395

[–] Squire1039@lemm.ee 4 points 8 months ago

That's a good turtle friend.

[–] Squire1039@lemm.ee 5 points 8 months ago

I guess you shouldn't expect any tech company to provide anything "forever," as forever for them, and the fine prints, mean totally different things than what you and I think it is.

 

Key Points:

  • Apple opposed a right-to-repair bill in Oregon, despite previously supporting a weaker one in California.
  • The key difference is Oregon's restriction on "parts pairing," which locks repairs to Apple or authorized shops.
  • Apple argues this protects security and privacy, but critics say it creates a repair monopoly and e-waste.
  • Apple claims their system eases repair and maintain data security, while Google doesn't have such a requirement
  • Apple refused suggestions to revise the bill
  • Cybersecurity experts argue parts pairing is unnecessary for security and hinders sustainable repair.
[–] Squire1039@lemm.ee 4 points 9 months ago

I'll cry for Australia and Taiwan. I guess you can't remain in the first world forever. 🤷‍♂️ /s

 

Summary:

A hacker group called ResumeLooters stole personal data from over 2 million job seekers across 65 websites, mainly in Asia but also affecting others in the US, Europe, and South America. They used SQL injection and cross-site scripting (XSS) attacks to access names, phone numbers, emails, and dates of birth, as well as information about job seekers’ experience, employment history, and other sensitive personal data, which is now being sold online. Be cautious about what information you share online and consider checking your digital footprint for potential exposure.

The attacks primarily focused on the Asia-Pacific (APAC) region, targeting sites in Australia, Taiwan, China, Thailand, India, and Vietnam. However, other compromised companies were located in other regions, including Brazil, Italy, Mexico, Russia, Turkey, and the US.

[–] Squire1039@lemm.ee 17 points 9 months ago (15 children)
 

Comment

Well, this articles promotes Protons' products a bit, but the info is interesting anyway.

Summary

The article discusses the value of your data to big tech companies, mainly focusing on Google and Facebook.

Key Points:

  • Facebook: Makes $42.34 per user globally, with US/Canada users valued much higher at $217.26. They recently offered an ad-free option for €9.99/month, suggesting a higher internal valuation.
  • Google: Earns around $47 per user globally from Search ads, but this varies greatly by region (US users generate $393).
  • Other Big Tech: Amazon, Apple, Microsoft also generate billions from ads.
  • Beyond ads: Data is sold in less obvious ways (ISPs, car companies, grocery stores). Black market prices exist for stolen data (credit cards, etc.).
  • Total value: Hundreds of dollars per year are extracted from each user by various companies.
  • Privacy concerns: The article questions the ethical implications of big tech profiting from user data without informed consent. It emphasizes the importance of privacy and using encrypted services like Proton to protect your data.

Overall, the article urges readers to be aware of the value of their data and take steps to protect it from exploitation.

[–] Squire1039@lemm.ee 4 points 9 months ago

This is one of my most favorite /c on Lemmy. I have not seen CSAM since the last lengthy and regrettable CSAM-attack takedown. I have not seen posts about people being encouraged to leave either. So, you are doing great for some of us. Thanks.

[–] Squire1039@lemm.ee 3 points 9 months ago

Can you curse regularly?

Haha, apparently, there is no direct law against cursing, but they can still throw these at you:

Disorderly behavior: Under the Miscellaneous Offences (Public Order and Nuisance) Act, using abusive or insulting language in public can be considered disorderly behavior. This offense carries a maximum penalty of 6 months imprisonment, a fine of up to S$2,000, or both. The key factors here are the volume, tone, and target of the language. Shouting profanities at someone in a way that creates a disturbance could fall under this category.

Abusing a public servant: The Protection from Harassment Act protects public servants from verbal abuse, including threats and insults. Using abusive language towards a police officer, teacher, or other public service worker while they're performing their duties is an offense with a maximum penalty of 12 months imprisonment, a fine of up to S$5,000, or both.

The above comment also is in SGD, not much solace.

[–] Squire1039@lemm.ee 8 points 9 months ago

I bet they don't have to do too much to enforce some of these laws. Singapore is one of the places (along with Japan) with really low crime rate. The legend (see youtube) is that, if you leave your iPhone on a table in a coffee shop, you can come back to claim it a few hours later. A good part of it is probably because of socioeconomic reasons.

Otherwise, I also bet it's just your getting caught by the authorities (with whatever Orwellian technologies they use to catch you) and your being reported by people surrounding you.

[–] Squire1039@lemm.ee 12 points 9 months ago

I must say, you are a fine-avoiding citizen! ;-)

[–] Squire1039@lemm.ee 39 points 9 months ago

There are some functions like that, like Passkey signing. For Bitlocker, the encryption/decryption key is transferred to the CPU (and RAM) in order for it to operate. The problem described here has been around for a while, but putting it on a key like that makes the attack method available to "everyone". There has been a solution for a while too: 1) put in pre-boot Bitlocker PIN, and 2) use integrated TPM like the article mentions.

[–] Squire1039@lemm.ee 39 points 9 months ago (10 children)

Meanwhile, other laws in Singapore (with some exceptions):

  • No Smoking in Public. Fines up to $200, increasing to $1,000 if taken to court.
  • E-Cigarettes are Prohibited. Fines up to $10,000, imprisonment up to 6 months; subsequent offence up to $20,000, mprisonment up to 12 months.
  • No Eating or Drinking on Public Transport. Fine up to $500.
  • No Playing Musical Instruments in Public. Fine up to $1,000.
  • No Connecting to Someone Else’s Wi-Fi. Fine up to $10,000, imprisonment up to 3 years; subsequent offence up to $20,000, imprisonment up to 5 years.
  • No Importing or Selling Chewing Gum. Importation fine up to $100,000 or imprisonment up to 2 years; subsequent offence up to $200,000 or imprisonment up to 3 years. Sale fine up to $2,000.
  • No Drinking After 10.30pm. Fine up to $1,000 (first offence), up to $2,000 and/or imprisonment up to 3 months (repeat offence).
  • Don’t Feed the Pigeons. Fine up to $500.
  • Don’t Feed Any Wildlife. Fine up to $5,000, or up to $10,000 for subsequent offences.
  • Flush the Toilet. Fine up to $1,000.
  • No Littering. Fine up to $2,000 (first conviction), $4,000 (second conviction), $10,000 (subsequent convictions).
  • No Singing Explicit Lyrics. Imprisonment up to three months and/or a fine.

Life is grand!

 

Summary

  • Elon Musk claims the fiery end of Starship's 2nd flight was due to venting liquid oxygen without a payload.
  • He suggests a payload would have consumed the oxygen, preventing the fire and explosion.
  • The writer questions the "venting causing fire" logic and highlights SpaceX's iterative learning approach.
  • Despite the explosion, SpaceX considers the launch a success due to technical achievements.
  • Next launch planned soon, aiming for orbit and other ambitious goals.
  • NASA's Artemis program delays offer SpaceX potentially helpful extra time.
 

Key Points:

  • Researchers tested how large language models (LLMs) handle international conflict simulations.
  • Most models escalated conflicts, with one even readily resorting to nuclear attacks.
  • This raises concerns about using AI in military and diplomatic decision-making.

The Study:

  • Researchers used five AI models to play a turn-based conflict game with simulated nations.
  • Models could choose actions like waiting, making alliances, or even launching nuclear attacks.
  • Results showed all models escalated conflicts to some degree, with varying levels of aggression.

Concerns:

  • Unpredictability: Models' reasoning for escalation was unclear, making their behavior difficult to predict.
  • Dangerous Biases: Models may have learned to escalate from the data they were trained on, potentially reflecting biases in international relations literature.
  • High Stakes: Using AI in real-world diplomacy or military decisions could have disastrous consequences.

Conclusion:

This study highlights the potential dangers of using AI in high-stakes situations like international relations. Further research is needed to ensure responsible development and deployment of AI technology.

 

Summary:

Cory Doctorow recounts being scammed by a phone-phisher who posed as a bank representative, tricking them into divulging their credit card number. Despite the author's knowledge of scams and fraud, they fell victim to the scheme due to being on vacation, using unfamiliar ATMs, and feeling rushed and distracted. The fraudster exploited vulnerabilities in the bank's after-hours fraud center and the author's state of mind to obtain sensitive information. The author reflects on how AI-driven automated systems in banking may exacerbate such vulnerabilities, conditioning customers to interact with semi-automated systems that mimic phishing attempts. They emphasize the importance of raising awareness about scams and the need for companies to avoid creating new vulnerabilities in their systems.

 

Summary

OnlyFake, an underground website, employs neural networks to swiftly produce convincing fake IDs for just $15, potentially facilitating bank fraud and money laundering. Verified by 404 Media, the service allows users to input desired information and a passport photo, generating realistic IDs, even mimicking signatures. With its purported use of neural networks and generators, OnlyFake claims to churn out up to 20,000 documents daily, mainly for US identities. The IDs, backed by real-looking backgrounds, can pass online verification, posing challenges to platforms like OKX cryptocurrency exchange. While some companies, such as Jumio and Coinbase, aim to counter such fraud, OnlyFake's AI-powered IDs present a formidable challenge. Wick, the service's owner, aims to expand its capabilities, potentially including face and selfie generation. Discussions within OnlyFake's community suggest a pursuit of solutions for video verification challenges. Senator Ron Wyden warns of the growing threat posed by AI-based tools, urging the adoption of secure authentication methods. This revelation comes amidst a broader trend of AI-driven fraud, exemplified by AI-generated voices and images, highlighting the need for robust cybersecurity measures.

view more: ‹ prev next ›