ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Miscellaneous Tech News

    News
    83
    7.4k
    2.6m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Topic temporarily locked for fork..... hold on.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        If you want to discuss the "Admission of Guilt" topic, it is here:

        https://mangolassi.it/topic/20868/is-admitting-that-someone-s-suspicion-of-guilt-is-correct-constitute-admission-of-guilt

        1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @Dashrender
          last edited by

          @Dashrender said in Miscellaneous Tech News:

          @DustinB3403 said in Miscellaneous Tech News:

          @Dashrender said in Miscellaneous Tech News:

          @bnrstnr said in Miscellaneous Tech News:

          @scottalanmiller said in Miscellaneous Tech News:

          @bnrstnr said in Miscellaneous Tech News:

          No, the defense could claim he meant his Christmas list...

          Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.

          Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.

          I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.

          @Dashrender that doesn't matter.

          Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.

          It needs to be provided willfully by the defendant and no coerced AKA compelled speech.

          To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.

          In a no body murder case - if the defendant admits to guilt, that's it.

          Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.

          Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....

          DashrenderD 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @scottalanmiller
            last edited by

            @scottalanmiller said in Miscellaneous Tech News:

            @Dashrender said in Miscellaneous Tech News:

            @DustinB3403 said in Miscellaneous Tech News:

            @Dashrender said in Miscellaneous Tech News:

            @bnrstnr said in Miscellaneous Tech News:

            @scottalanmiller said in Miscellaneous Tech News:

            @bnrstnr said in Miscellaneous Tech News:

            No, the defense could claim he meant his Christmas list...

            Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.

            Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.

            I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.

            @Dashrender that doesn't matter.

            Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.

            It needs to be provided willfully by the defendant and no coerced AKA compelled speech.

            To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.

            In a no body murder case - if the defendant admits to guilt, that's it.

            Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.

            Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....

            yep.. i stepped away...

            JaredBuschJ 1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch @Dashrender
              last edited by

              @Dashrender said in Miscellaneous Tech News:

              @scottalanmiller said in Miscellaneous Tech News:

              @Dashrender said in Miscellaneous Tech News:

              @DustinB3403 said in Miscellaneous Tech News:

              @Dashrender said in Miscellaneous Tech News:

              @bnrstnr said in Miscellaneous Tech News:

              @scottalanmiller said in Miscellaneous Tech News:

              @bnrstnr said in Miscellaneous Tech News:

              No, the defense could claim he meant his Christmas list...

              Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.

              Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.

              I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.

              @Dashrender that doesn't matter.

              Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.

              It needs to be provided willfully by the defendant and no coerced AKA compelled speech.

              To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.

              In a no body murder case - if the defendant admits to guilt, that's it.

              Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.

              Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....

              yep.. i stepped away...

              but seriously how did you miss the lock post and the new topic post. do you never reload after being away for a long time?

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @JaredBusch
                last edited by

                @JaredBusch said in Miscellaneous Tech News:

                @Dashrender said in Miscellaneous Tech News:

                @scottalanmiller said in Miscellaneous Tech News:

                @Dashrender said in Miscellaneous Tech News:

                @DustinB3403 said in Miscellaneous Tech News:

                @Dashrender said in Miscellaneous Tech News:

                @bnrstnr said in Miscellaneous Tech News:

                @scottalanmiller said in Miscellaneous Tech News:

                @bnrstnr said in Miscellaneous Tech News:

                No, the defense could claim he meant his Christmas list...

                Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.

                Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.

                I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.

                @Dashrender that doesn't matter.

                Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.

                It needs to be provided willfully by the defendant and no coerced AKA compelled speech.

                To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.

                In a no body murder case - if the defendant admits to guilt, that's it.

                Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.

                Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....

                yep.. i stepped away...

                but seriously how did you miss the lock post and the new topic post. do you never reload after being away for a long time?

                nope, I don't.

                1 Reply Last reply Reply Quote 0
                • mlnewsM
                  mlnews
                  last edited by

                  China Now Requires a Face Scan for Every New Phone Purchase

                  If you want to buy a new phone or switch phone service in China, a face scan is now mandatory as part of the setup process alongside showing your national ID.
                  China is well known as a surveillance state, but the government continues to increase its ability to identify and therefore track individuals. That's why it's now mandatory to provide a face scan when registering a new phone or signing up for a phone service in the country. As the BBC reports, in what the Chinese government is describing as a way to "protect the legitimate rights and interest of citizens in cyberspace," a new layer of identity verification has been introduced for smartphones this month. When purchasing a new phone or signing up for a phone service such as a mobile data plan, individuals will be required to have their face scanned as well as presenting their national identification card. Before now, a national ID and photos were required.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @mlnews
                    last edited by

                    @mlnews said in Miscellaneous Tech News:

                    China Now Requires a Face Scan for Every New Phone Purchase

                    If you want to buy a new phone or switch phone service in China, a face scan is now mandatory as part of the setup process alongside showing your national ID.
                    China is well known as a surveillance state, but the government continues to increase its ability to identify and therefore track individuals. That's why it's now mandatory to provide a face scan when registering a new phone or signing up for a phone service in the country. As the BBC reports, in what the Chinese government is describing as a way to "protect the legitimate rights and interest of citizens in cyberspace," a new layer of identity verification has been introduced for smartphones this month. When purchasing a new phone or signing up for a phone service such as a mobile data plan, individuals will be required to have their face scanned as well as presenting their national identification card. Before now, a national ID and photos were required.

                    Well, that’s one way to get a huge sample of Chinese faces into a FB for AI use.

                    DustinB3403D 1 Reply Last reply Reply Quote 1
                    • DustinB3403D
                      DustinB3403 @Dashrender
                      last edited by

                      @Dashrender said in Miscellaneous Tech News:

                      Well, that’s one way to get a huge sample of Chinese faces into a FB for AI use.

                      Or a really simple way to track and identify your masses.

                      1 Reply Last reply Reply Quote 0
                      • mlnewsM
                        mlnews
                        last edited by

                        Samsung starts Android 10 update at a record pace: Only three months late

                        International Exynos models get Android 10, but the US will have to wait.
                        Samsung is starting the slow and arduous process of updating its flagship smartphone to the latest version of Android: Android 10. This is just the beginning of the Android 10 rollout for Samsung, which, according to tracking from SamMobile, starts with Exynos-powered Galaxy S10s in European and Asian countries, including Germany, South Korea, the UK, India, Poland, and Spain. Android 10 came out on September 3, and with the first devices landing the update on November 28, Samsung took 86 days to begin to rollout stable builds of Android 10 across its user base. Samsung still has a long way to go to release Android 10 to everyone with a Galaxy S10, though. Devices in Europe, Africa, and most of Asia ship with a Samsung Exynos SoC, while devices in North America, South America, and China ship with a Qualcomm Snapdragon SoC. So far only the Exynos units have gotten the update.

                        1 Reply Last reply Reply Quote 0
                        • nadnerBN
                          nadnerB
                          last edited by nadnerB

                          https://www.itnews.com.au/news/aussie-broadband-pauses-ipv6-trial-due-to-cisco-bug-534851

                          The internet provider said it had been forced to pause the trial after a patch released by Cisco for the bug contained a new bug that then caused an unrelated issue.
                           
                          ...the ASRs are currently impacted by a firmware bug that “causes the DHCP [Dynamic Host Configuration Protocol] process on the routers to crash, so customers are not able to reauthenticate,” Aussie Broadband said in a customer advisory.
                          ...
                          The bug has official recognition from Cisco - and is one of five that Aussie Broadband has uncovered in Cisco code over the past 18 months “that have not been discovered previously”.

                          1 Reply Last reply Reply Quote 0
                          • mlnewsM
                            mlnews
                            last edited by

                            New crypto-cracking record reached, with less help than usual from Moore’s Law

                            795-bit factoring and discrete logarithms achieved using more efficient algorithms.
                            Researchers have reached a new milestone in the annals of cryptography with the factoring of the largest RSA key size ever computed and a matching computation of the largest-ever integer discrete logarithm. New records of this type occur regularly as the performance of computer hardware increases over time. The records announced on Monday evening are more significant because they were achieved considerably faster than hardware improvements alone would predict, thanks to enhancements in software used and the algorithms it implemented. Many public-key encryption algorithms rely on extremely large numbers that are the product of two prime numbers. Other encryption algorithms base their security on the difficulty of solving certain discrete logarithm problems. With sufficiently big enough key sizes, there is no known way to crack the encryption they provide. The factoring of the large numbers and the computing of a discrete logarithm defeat the cryptographic assurances for a given key size and force users to ratchet up the number of bits of entropy it uses.

                            1 Reply Last reply Reply Quote 0
                            • black3dynamiteB
                              black3dynamite
                              last edited by

                              Elementary OS 5.1 Hera
                              https://www.omgubuntu.co.uk/2019/12/elementary-os-5-1-hera-release

                              1 Reply Last reply Reply Quote 1
                              • mlnewsM
                                mlnews
                                last edited by

                                HackerOne breach lets outside hacker read customers’ private bug reports

                                Company security analyst sent session cookie allowing account take-over.
                                As a leading vulnerability reporting platform, HackerOne has paid hackers more than $23 million on behalf of more than 100 customers, including Twitter, Slack, and the US Pentagon. The company’s position also gives it access to unimaginable amounts of sensitive data. Now, the company has paid a $20,000 bounty out of its own pocket after accidentally giving an outside hacker the ability to read and modify some customer bug reports. The outsider—a HackerOne community member who had a proven track record of finding and privately reporting vulnerabilities through the platform—had been communicating late last month with one of the company’s security analysts. In one message, the HackerOne analyst sent the community member parts of a cURL command that mistakenly included a valid session cookie that gave anyone with possession of it the ability to read and partially modify data the analyst had access to.

                                1 Reply Last reply Reply Quote 0
                                • mlnewsM
                                  mlnews
                                  last edited by

                                  5G on the horizon: here’s what it is and what’s coming

                                  5G is many things—but the most interesting part is what it will eventually become.
                                  The long-touted fifth generation of wireless communications is not magic. We’re sorry if unending hype over the world-changing possibilities of 5G has led you to expect otherwise. But the next generation in mobile broadband will still have to obey the current generation of the laws of physics that govern how far a signal can travel when sent in particular wavelengths of the radio spectrum and how much data it can carry. For some of us, the results will yield the billions of bits per second in throughput that figure in many 5G sales pitches, going back to early specifications for this standard. For everybody else, 5G will more likely deliver a pleasant and appreciated upgrade rather than a bandwidth renaissance.

                                  1 Reply Last reply Reply Quote 0
                                  • black3dynamiteB
                                    black3dynamite
                                    last edited by

                                    Proxmox 6.1

                                    https://forum.proxmox.com/threads/proxmox-ve-6-1-released.61138/

                                    https://pve.proxmox.com/wiki/Roadmap#Proxmox_VE_6.1

                                    1 Reply Last reply Reply Quote 0
                                    • DanpD
                                      Danp
                                      last edited by

                                      https://www.zdnet.com/article/20-vps-providers-to-shut-down-on-monday-giving-customers-two-days-to-save-their-data/

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @Danp
                                        last edited by

                                        @Danp said in Miscellaneous Tech News:

                                        https://www.zdnet.com/article/20-vps-providers-to-shut-down-on-monday-giving-customers-two-days-to-save-their-data/

                                        That article keeps jumping between them being web hosts or VPS hosts. They might be both, but the author is acting like the two are the same thing, which they are not at all.

                                        JaredBuschJ 1 Reply Last reply Reply Quote 0
                                        • JaredBuschJ
                                          JaredBusch @scottalanmiller
                                          last edited by JaredBusch

                                          @scottalanmiller said in Miscellaneous Tech News:

                                          @Danp said in Miscellaneous Tech News:

                                          https://www.zdnet.com/article/20-vps-providers-to-shut-down-on-monday-giving-customers-two-days-to-save-their-data/

                                          That article keeps jumping between them being web hosts or VPS hosts. They might be both, but the author is acting like the two are the same thing, which they are not at all.

                                          Sounds like both. I mean if you are going to run a scam, why limit yourself?

                                          Related Note: This is why you don't scrape the bottom of the price barrel when looking at providers.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 2
                                          • scottalanmillerS
                                            scottalanmiller @JaredBusch
                                            last edited by

                                            @JaredBusch said in Miscellaneous Tech News:

                                            @scottalanmiller said in Miscellaneous Tech News:

                                            @Danp said in Miscellaneous Tech News:

                                            https://www.zdnet.com/article/20-vps-providers-to-shut-down-on-monday-giving-customers-two-days-to-save-their-data/

                                            That article keeps jumping between them being web hosts or VPS hosts. They might be both, but the author is acting like the two are the same thing, which they are not at all.

                                            Sounds like both. I mean if you are going to run a scam, why limit yourself?

                                            Related Note: This is why you don't scrape the bottom of the price barrel when looking at providers.

                                            And use ones no one has ever heard of.

                                            1 Reply Last reply Reply Quote 2
                                            • 1
                                            • 2
                                            • 263
                                            • 264
                                            • 265
                                            • 266
                                            • 267
                                            • 372
                                            • 373
                                            • 265 / 373
                                            • First post
                                              Last post