Tea

joined 1 week ago
[–] Tea@programming.dev 8 points 2 hours ago* (last edited 2 hours ago)

Yes brother, it's outdated....

The new app name is Mastodon. 😆

I literally wrote a long memes (including a Linardo DiCaprio gif from the wolf of wall street movie) filled comment to tell you to delete your Twitter account and use Mastodon, but I deleted it, because I thought you might misunderstand me and think that it's offensive.

Just wanted to say that.

 

Anora was the big winner at the Oscars a week ago, securing awards for best picture, actress, and director, among others. This major achievement puts the movie in the spotlight and increases interest through both legal and illegal channels. Fresh data collected by TorrentFreak shows that pirate downloads surged right after the awards ceremony ended.

 
  • X, the former Twitter, has experienced a worldwide outage as of 12PM on Monday CAT.
  • This is likely the first major outage of the company since Musk took ownership in 2022.
  • The outage seems to have only lasted for about half an hour.
37
submitted 7 hours ago* (last edited 7 hours ago) by Tea@programming.dev to c/technology@lemmy.world
 

Companies are turning to tech solutions to screen candidates. Critics and job seekers have concerns.

 
  • CR researchers were able to easily create a voice clone based on publicly available audio in four of the six products in the test set:
  1. These products did not employ any technical mechanisms to ensure researchers had the speaker’s consent to generate a clone or to limit the cloning to the user’s own voice. These companies—ElevenLabs, Speechify, PlayHT, and Lovo—required only that researchers check a box confirming that they had the legal right to clone the voice or make a similar self-attestation.
  2. Descript and Resemble AI took steps to make it more difficult for customers to misuse their products by creating a non-consensual voice clone.
  • Four of the six companies (Speechify, Lovo, PlayHT, and Descript) required only a customer’s name and/or email address to make an account.
 

It's just one of 6,000 apps that New Zealand thinks might be best tamed with ERP

 

In December 2024, Microsoft Threat Intelligence identified a malware campaign stemming from pirate streaming sites. Using iframe malvertising redirector URLs to generate revenue, and redirects up to five layers deep, malware payloads hosted on GitHub, Discord and Dropbox, acted as a dropper for additional payloads hosted elsewhere. Microsoft says the goal was to steal information and it believes almost a million devices were infected.

[–] Tea@programming.dev -5 points 1 day ago (4 children)
 

A woman from Dunfermline has spoken of her shock after an Apple voice-to-text service mistakenly inserted a reference to sex - and an apparent insult - into a message left by a garage.

collapsed inline media

~The is what Mrs Littlejohn saw on the voicemail screen in the Phone app on her iPhone after receiving a voicemail from the garage.~

[–] Tea@programming.dev 4 points 1 day ago (1 children)

💜Thank you for correcting me.

I edited it now 😄

[–] Tea@programming.dev 8 points 1 day ago* (last edited 1 day ago) (4 children)

I actually wanted to keep the title short, but I think it would be better to edit the title to avoid any confusion to make it clear that it's manufactured in China, rather than saying it in the current way.

Edit: I edited the title to reflect the details better.

 

A tale of good versus evil played out on the large screen in the sanctuary of St. Paul’s Lutheran church in Finland. Jesus was shown in robes with long hair and a beard, while Satan was dressed in more modern clothes but with a menacing frown and higher-pitched voice — all created by artificial intelligence.

 

Source Link Privacy.
collapsed inline mediaPrivacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 "backdoor" that wasn't.

[–] Tea@programming.dev 13 points 2 days ago (1 children)

I just wanted to encourage you to upload your videos to PeerTube.

[–] Tea@programming.dev 9 points 2 days ago (1 children)

[Not Serious] 3 numbers more.

[–] Tea@programming.dev 1 points 3 days ago

Civil rights advocates say they are concerned that the Trump administration will penalize pro-Palestinian students who have not violated any laws or expressed support for Hamas. They also are expressing concern about the use of AI, a new technology that has advanced even since Oct. 7, to surveil students.

Advocates for and against the administration’s efforts both say they expect them to wind up in court. For now, though, the crackdown is already creating a chill on college campuses, according to the NPR report, which found that some foreign students are increasingly hesitant about participating in any pro-Palestinian events, even when they are not demonstrations against Israel.

[–] Tea@programming.dev 7 points 3 days ago

From their about us page:

The Forward has always been a not-for-profit association and is supported by the contributions of its readers.

[–] Tea@programming.dev 7 points 1 week ago (1 children)

Hi,

This is not my project, I just liked it.

[–] Tea@programming.dev 2 points 1 week ago

You are right, I think it might worth suggesting it to the author on codeberg.

[–] Tea@programming.dev 1 points 1 week ago* (last edited 1 week ago) (2 children)

your license

I am not the project leader.

There's too many unknowns

Public domain?

You can do with the project what ever you want with no restrictions.

view more: next ›