ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Miscellaneous Tech News

    News
    83
    7.4k
    2.6m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @black3dynamite
      last edited by

      @black3dynamite said in Miscellaneous Tech News:

      https://www.omgubuntu.co.uk/2019/08/microsoft-is-bringing-exfat-to-the-linux-kernel

      Nice, that'll be very helpful.

      1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch @scottalanmiller
        last edited by

        @scottalanmiller said in Miscellaneous Tech News:

        BBC News - Facial recognition: School ID checks lead to GDPR fine
        https://www.bbc.co.uk/news/technology-49489154

        That's fucked. Why would you have any expectation of privacy in a public school?

        DustinB3403D 1 Reply Last reply Reply Quote 0
        • DustinB3403D
          DustinB3403 @JaredBusch
          last edited by

          @JaredBusch said in Miscellaneous Tech News:

          @scottalanmiller said in Miscellaneous Tech News:

          BBC News - Facial recognition: School ID checks lead to GDPR fine
          https://www.bbc.co.uk/news/technology-49489154

          That's fucked. Why would you have any expectation of privacy in a public school?

          Why would anyone have any expectation of privacy in public?

          1 Reply Last reply Reply Quote 0
          • notverypunnyN
            notverypunny
            last edited by

            Privacy is one thing, I imagine that the underlying concern is the persistence and use of the data that's being collected without peoples' permission

            JaredBuschJ 1 Reply Last reply Reply Quote 1
            • JaredBuschJ
              JaredBusch @notverypunny
              last edited by

              @notverypunny said in Miscellaneous Tech News:

              Privacy is one thing, I imagine that the underlying concern is the persistence and use of the data that's being collected without peoples' permission

              Except it was used with permission

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @JaredBusch
                last edited by

                @JaredBusch said in Miscellaneous Tech News:

                @notverypunny said in Miscellaneous Tech News:

                Privacy is one thing, I imagine that the underlying concern is the persistence and use of the data that's being collected without peoples' permission

                Except it was used with permission

                Exactly. And they don't need to keep the video - just record the results of the facial recognition.

                1 Reply Last reply Reply Quote 0
                • mlnewsM
                  mlnews
                  last edited by

                  Unix at 50: How the OS that powered smartphones started from failure

                  Today, Unix powers iOS and Android—its legend begins with a gator and a trio of researchers.
                  Maybe its pervasiveness has long obscured its origins. But Unix, the operating system that in one derivative or another powers nearly all smartphones sold worldwide, was born 50 years ago from the failure of an ambitious project that involved titans like Bell Labs, GE, and MIT. Largely the brainchild of a few programmers at Bell Labs, the unlikely story of Unix begins with a meeting on the top floor of an otherwise unremarkable annex at the sprawling Bell Labs complex in Murray Hill, New Jersey. It was a bright, cold Monday, the last day of March 1969, and the computer sciences department was hosting distinguished guests: Bill Baker, a Bell Labs vice president, and Ed David, the director of research. Baker was about to pull the plug on Multics (a condensed form of MULTiplexed Information and Computing Service), a software project that the computer sciences department had been working on for four years. Multics was two years overdue, way over budget, and functional only in the loosest possible understanding of the term.

                  1 Reply Last reply Reply Quote 0
                  • mlnewsM
                    mlnews
                    last edited by

                    State by State: Alaskans Spend the Most Time in Front of Screens

                    Without even including time at work, watching TV, or playing games, the results reveal state-by-state that Americans spend from 45 minutes to over 3 hours a day online.
                    If you've ever heard of the American Time Use Survey (from the Bureau of Labor Statistics), you probably have time on your hands. According to the survey, most people don't—it measures time spent doing just about everything, from work, to volunteering, to taking care of kids. It also happens to ask people how much time they spend in front of screens. The folks at authorized Verizon reseller VerizonSpecials.com decided to look at the data in the ATUS and see what the average leisure time spent online really amounts to, using data collected from 2013 to 2017. This doesn't even include what we really spend most of our time doing on screens: watching TV, gaming, and, mostly, working. It's all about all that other mind-numbing screen-staring we do for "fun," including browsing, social networking, watching online video, and waiting for things to download. Then they broke it down by state (but only 47 states are included—Maryland, Rhode Island, and Hawaii didn't have enough data).

                    1 Reply Last reply Reply Quote 0
                    • mlnewsM
                      mlnews
                      last edited by

                      Which OS Will Huawei's New Phones Run? Stay Tuned

                      Huawei's new Mate 30 smartphones will likely launch without Google apps such as Maps and Google Play, the search giant says. But it's unclear if the devices will run open-source Android or Huawei's own HarmonyOS.
                      With a US blacklist still in place, Huawei's new smartphones will likely launch without Google apps such as Maps and Google Play, the search giant says. The Trump administration has banned US companies from doing business with Huawei, ostensibly due to security concerns, but President Trump has suggested the blacklist could be lifted as part of a trade deal. A temporary reprieve will not apply to Huawei's next flagships, the Mate 30 and Mate 30 Pro, which are set to launch in late September. So barring a trade deal in the coming days, Huawei's upcoming mobile phones cannot be sold with licensed Google apps and services because of the ban, a Google spokesperson tells Reuters. Reportedly, the US Commerce Department has received more than 130 applications from various companies for licenses to sell their products to Huawei. None have been approved.

                      1 Reply Last reply Reply Quote 0
                      • mlnewsM
                        mlnews
                        last edited by

                        Google finds 'indiscriminate iPhone attack lasting years'

                        Security researchers at Google have found evidence of a “sustained effort” to hack iPhones over a period of at least two years.
                        The attack was said to be carried out using websites which would discreetly implant malicious software to gather contacts, images and other data. Google’s analysis suggested the booby-trapped websites were said to have been visited thousands of times per week. Apple told the BBC it did not wish to comment. The attack was shared in great detail in a series of technical posts written by British cybersecurity expert Ian Beer, a member of Project Zero, Google’s taskforce for finding new security vulnerabilities, known as zero days. "There was no target discrimination,” Mr Beer wrote. “Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant."

                        1 Reply Last reply Reply Quote 0
                        • mlnewsM
                          mlnews
                          last edited by

                          Apple gives third-party repair shops more access to authorized parts

                          The program provides parts and resources for out-of-warranty iPhones.
                          Apple has been a bit of a mixed bag when it comes to iPhones and independent repair shops. Earlier this month, we discovered that people are running into problems with third-party iPhone XR, iPhone XS, and iPhone XS Max repairs due to a particular chip on the battery. And repair specialists like iFixit have repeatedly called Cupertino's design decisions "user-hostile." But on Thursday, Apple announced a new independent repair program for out-of-warranty iPhones. "To better meet our customers’ needs, we’re making it easier for independent providers across the US to tap into the same resources as our Apple Authorized Service Provider network,” said Jeff Williams, Apple’s chief operating officer in a press release. "When a repair is needed, a customer should have confidence the repair is done right. We believe the safest and most reliable repair is one handled by a trained technician using genuine parts that have been properly engineered and rigorously tested."

                          1 Reply Last reply Reply Quote 1
                          • mlnewsM
                            mlnews
                            last edited by

                            Facebook Testing Feature That Would Hide 'Like' Counts

                            The total likes and reactions a post receives will reportedly only be accessible to the post's creator. Followers will see if their Facebook friends liked or reacted to the post.
                            Facebook might soon hide "like" counts in a bid to protect your mental health. Facebook has been prototyping the feature in its Android app, according to Jane Manchun Wong, an independent developer and privacy researcher. She spotted the code for the test feature while reverse-engineering the app. The total likes and reactions a post receives will only be accessible to the post's creator, according to Wong. Followers will see if their Facebook friends liked or reacted to the post, but will not see the total count. At the most, Facebook will only give viewers of the post a full list of which users liked/reacted to a post. So to find out the total count, viewers will have manually count up all the likes/reactions and then do the math. Facebook-owned Instagram has also been testing hiding like counts from public view. "It's because we want people to worry a little bit less about how many likes they're getting on Instagram and spend a bit more time connecting with the people they care about," Instagram chief Adam Mosseri said in April.

                            1 Reply Last reply Reply Quote 0
                            • mlnewsM
                              mlnews
                              last edited by

                              Kobo debuts Libra H2O e-reader, updates software with more tools for readers

                              Kobo adds new UI tools for those who love taking notes and bookmarking as they read.
                              Nearly one year after releasing the Forma e-reader, Kobo returns today with a new slab dubbed the Kobo Libra H2O. The $169 e-reader retains the skeleton of the Forma, but is actually a smaller device. It has a 7-inch, 1680×1264, 300ppi E Ink display, down from the Forma's 8-inch display, but it has the same side-chin with page-turn buttons. Notably, Kobo moved the power button from the edge of the e-reader to the back of the device, and it's now a slightly indented circle that's easy to discern from the device's slightly textured back.

                              1 Reply Last reply Reply Quote 0
                              • mlnewsM
                                mlnews
                                last edited by

                                How to build Fedora container images

                                With the rise of containers and container technology, all major Linux distributions nowadays provide a container base image. This article presents how the Fedora project builds its base image. It also shows you how to use it to create a layered image.
                                Before we look at how the Fedora container base image is built, let’s define a base image and a layered image. A simple way to define a base image is an image that has no parent layer. But what does that concretely mean? It means a base image usually contains only the root file system (rootfs) of an operating system. The base image generally provides the tools needed to install software in order to create layered images.

                                1 Reply Last reply Reply Quote 0
                                • black3dynamiteB
                                  black3dynamite
                                  last edited by

                                  https://www.omgubuntu.co.uk/2019/09/ubuntu-dock-trash-external-drives

                                  1 Reply Last reply Reply Quote 0
                                  • mlnewsM
                                    mlnews
                                    last edited by

                                    Twitter Suspends 'Tweet via SMS' Feature After Account Hijacks

                                    'We're taking this step because of vulnerabilities that need to be addressed by mobile carriers and our reliance on having a linked phone number for two-factor authentication,' Twitter says.
                                    Twitter is temporarily shutting off the "Tweet via SMS" message feature after hackers likely abused it to hijack CEO Jack Dorsey's account. Last Friday, hackers briefly took over the @jack account by tricking Dorsey's cellular carrier into handing over his mobile phone number. So far, Twitter hasn't provided all the details about the break-in. However, getting Dorsey's phone number wouldn't be enough to hijack his account. It'd also require inputting the correct password. But the hackers appear to have found a way around this obstacle by exploiting the Tweet via SMS feature. To tweet via SMS, all you have to do is register your mobile phone number with your Twitter account. Then from your smartphone, you can send an SMS message to a special "short code" number (in the US, it's 40404). In response, Twitter will match the SMS message to your account, and automatically post it as a tweet.

                                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @mlnews
                                      last edited by

                                      @mlnews good to see someone big recognizing the massive insecurity that is SMS.

                                      1 Reply Last reply Reply Quote 0
                                      • mlnewsM
                                        mlnews
                                        last edited by

                                        Android 10 Review

                                        Clear your schedule: this is our longest Android review ever.
                                        It is once again time for Google's big yearly Android rollout. This year we're up to "Android 10," though if we're counting by API levels (which actually go up one per release) this is the 29th release of Android. For most of 2019, this new software snack has been in beta under the name "Android Q," and we've seen a whopping six beta releases. Normally that "Q" would turn into a snack-themed codename with the final release, but this year the "Q" apparently stands for "Quitters"—the codename branding is dead. Android is going on a textual diet and it's just "Android 10," with no snacks attached.

                                        1 Reply Last reply Reply Quote 0
                                        • mlnewsM
                                          mlnews
                                          last edited by scottalanmiller

                                          Google's 'secret web tracking pages' explained

                                          Google has been accused of using hidden webpages that are assigned to users to provide more information to advertisers about their every move online.
                                          The allegation has been added to a complaint lodged with the Irish Data Protection Commission. The tech firm insists it acts in accordance with EU privacy laws. It comes a day after Google was fined $170m (£138m) by a US watchdog for illegally capturing data from children and targeting them with adverts. Privacy-focused web browser Brave has published details of an investigation it conducted into a Google ad system known as Authorised Buyers, which was previously known as DoubleClick. It sent the findings to the Irish data commissioner as a supplementary part of a complaint filed last year. Chief policy officer Johnny Ryan used Google's Chrome browser to conduct his research. He had no logins, cookies or browsing history on the device so was, in effect, a new user.

                                          1 Reply Last reply Reply Quote 0
                                          • black3dynamiteB
                                            black3dynamite
                                            last edited by

                                            https://www.omgubuntu.co.uk/2019/09/dell-linux-website

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 372
                                            • 373
                                            • 1 / 373
                                            • First post
                                              Last post