Suche
Beiträge, die mit Software getaggt sind
#AI is cheating
Source: theatlantic.com/technology/arc…
#technology #Training #Software #cheat #cheater #fail #problem
Chatbots Are Cheating on Their Benchmark Tests
AI programs train on questions they’re later tested on. So how do we know if they’re getting smarter?Alex Reisner (The Atlantic)
Enjoy #freedom: opensourcealternative.to
#foss #floss #Software #OpenSource
Open Source Alternatives To Proprietary Software
The world's largest directory for open source software. Discover 500+ popular open source alternatives to proprietary software products. 100% free.opensourcealternative.to
#Research finds 12,000 ‘Live’ #API Keys and ßPasswords in #DeepSeek's #Training Data
Source: trufflesecurity.com/blog/resea…
#ai #technology #security #privacy #fail #password #Problem #cybersecurity #news #Software
Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data ◆ Truffle Security Co.
We scanned Common Crawl - a massive dataset used to train LLMs like DeepSeek - and found ~12,000 hardcoded live API keys and passwords. This highlights a growing issue: LLMs trained on insecure code may inadvertently generate unsafe outputs.trufflesecurity.com
As #Israel uses US-made #AI models in #war, concerns arise about tech’s role in who lives and who dies
Source: apnews.com/article/israel-pale…
The investigation also revealed new details of how AI systems select targets and ways they can go wrong, including faulty data or flawed #algorithms. It was based on internal documents, data and exclusive interviews with current and former Israeli officials and company employees.
#cyberwar #technology #death #humanity #Military #Research #Problem #news #ethics #humanrights #economy #collateraldamage #algorithm #Software
How US tech giants' AI is changing the face of warfare in Gaza and Lebanon
U.S. tech giants have quietly empowered Israel to track and kill many more alleged militants more quickly in Gaza and Lebanon through a sharp spike in artificial intelligence and computing services.Michael Biesecker (AP News)
#Microsoft begins turning off #uBlockOrigin and other extensions in #Edge
Source: neowin.net/news/microsoft-begi…
#Windows #Browser #Software #news #www #web #internet #economy #advertisement #adblocker #Problem
Microsoft begins turning off uBlock Origin and other extensions in Edge
Microsoft is now in the process of turning off Manifest V2-based extensions in Edge, such as uBlock Origin. However, not everything is lost at this point.Taras Buria (Neowin)
Find my #hacker: How #Apple's #network can be a potential #tracking tool
Source: cec.gmu.edu/news/2025-02/find-…
#AirTag sends #Bluetooth messages to nearby Apple devices, which then anonymously relay its #location via Apple #Cloud to the owner for tracking. Their attack method can turn a device—whether it's a #desktop, #smartphone, or #IoT device—into an "AirTag" without Apple's permission, at which point the network begins tracking.
Turn of Bluetooth whenever you can! 😱
#news #technology #Software #Problem #hack #security #privacy #surveillance #spy #vulnerability
Find my hacker: How Apple's network can be a potential tracking tool
George Mason researchers discovered that Apple's "Find My" service can be used for malicious purposes.College of Engineering and Computing
After #community #protest: #Firefox #update on their "Terms of Use"
Source: blog.mozilla.org/en/products/f…
Our intent was just to be as clear as possible about how we make Firefox work, but in doing so we also created some #confusion and #concern. With that in mind, we’re updating the language to more clearly reflect the limited scope of how #Mozilla interacts with #user #data.
#news #Software #privacy #security #internet #Browser #Problem #www #web #freedom
An update on our Terms of Use
We’ve been listening to some of our community’s concerns with parts of the TOU, specifically about licensing. Our intent was just to be as clear as possible about how we make Firefox work, but in doing so we also created some confusion and concern.Jenifer Boscacci (The Mozilla Blog)
Thousands of exposed #GitHub repositories, now private, can still be accessed through #Copilot
Source: techcrunch.com/2025/02/26/thou…
#ai #technology #news #security #Software #privacy #fail #problem
Thousands of exposed GitHub repositories, now private, can still be accessed through Copilot | TechCrunch
Data exposed even briefly can live on in generative AI chatbots long after the data is made private.Carly Page (TechCrunch)
I wonder what PHP would win if the codebase was rewritten entirely in Rust.
My bet? Given the Rust ecosystem, we would be months away of truly async, green threads, non blocking IO, and a complete performant web server implementation.
Cc @thephpf @php @phpfig @phpc
#PHP #Rust #Programming #WebDevelopment #WebDev #Software #SoftwareDevelopment #Web #Internet #ProgrammingLanguages #WebServer #OpenSource #OSS #FOSS #ThePHPFoundation
No, #Privacy is Not Dead: Beware the All-or-Nothing Mindset
source: privacyguides.org/articles/202…
No, Privacy is Not Dead: Beware the All-or-Nothing Mindset
Privacy is only dead if we let it die. Be careful about the all-or-nothing mindset in data privacy, it can do more damage than good to the cause. While striving for improvements, do not forget to cheer and celebrate each small win.www.privacyguides.org
#CallOfDuty: #BlackOps 6 challenges #Steam’s stance against undisclosed #AI #art, and Steam won’t do anything about it
Source: reddit.com/r/Steam/comments/1h…
The 6 fingers problem...😐
Digitale Insouveränität: Bund gibt wieder mehr für Microsoft-Lizenzen aus
Die Kosten der Bundesverwaltung für die Nutzung von Lizenzen für Produkte und Services von Microsoft sind 2024 von 197,7 auf 204,5 Millionen Euro gestiegen.
#Unboxing the #OpenWrtOne #Router with open #Software and open #Hardware and with the coolest #features at the moment!
The only instructions you receive are printed directly on the packaging. A great extension option is the #MikroBus: mikroe.com/mikrobus - It has both a #serial and an #I2C bus via which #IoT sensors can be connected.
There is also the option of connecting an #SSD, which I used immediately. I would also like to use the router as a #weather #monitoring station via appropriate sensors and then save the data on the SSD and have it evaluated and displayed via a #web #server.
The accessories supplied include a power supply unit, antennas, some screws and jumpers as well as a screwdriver. However, the screws on the case were so tight that I needed a better tool to open it.
I plan to provide my neighborhood with free #wifi via the router. I also want to run some web applications there and make them publicly accessible on the #Internet. So stay tuned and I will tell you here about the #configuration, #installation and results ...
mikroBUS - MIKROE
The mikroBUS™ socket comprises a pair of 1×8 female headers with a proprietary pin configuration and silkscreen markings.MIKROE
#NASA has a list of 10 rules for #software development
cs.otago.ac.nz/cosc345/resourc…
#Python #JavaScript #TypeScript #Java #CPlusPlus #PHP #Shell #Go #Ruby #GitHub #programming
#SSH into #RaspberryPi from Outside Home #Network Using #Tailscale
source: itsfoss.com/tailscale-raspberr…
Its key mechanics include:
* #Mesh #Networking: Devices in your Tailscale network (or "tailnet") connect directly to each other where possible, creating a mesh of encrypted connections.
* End-to-End #Encryption: All traffic is encrypted from one device to another, ensuring privacy and security.
* #NAT Traversal: Tailscale automatically handles NAT traversal and #firewall configurations, so you don’t need to worry about setting up port forwarding or exposing services.
* Auto-Routing: Once your devices are connected to the #tailnet, Tailscale automatically routes traffic between them as needed.
#router #administration #security #software #foss #floss #howto #tutorial #knowledge #linux
SSH into Raspberry Pi from Outside Home Network Using Tailscale
Learn how you can use Tailscale to secure connect to your Raspberry Pi from outside your home network.Abhishek Kumar (It's FOSS)
Chose your secure #messenger 🔐
Source: securemessagingapps.com
Tell me your choice and why in the comments 😌 please...
#internet #communication #chat #encryption #security #privacy #surveillance #spy #tracking #cybersecurity #Software #e2e
Secure Messaging Apps Comparison | Privacy Matters
This site compares secure messaging apps from a security & privacy point of view. These include Facebook Messenger, iMessage, Skype, Signal, Simplex, Google Messenger, Threema, Riot, Wire, Telegram, and Wickrwww.securemessagingapps.com
Evaluating #Security Risk in #DeepSeek and Other Frontier Reasoning Models
source: blogs.cisco.com/security/evalu…
#jailbreak #ai #technology #software #news
Evaluating Security Risk in DeepSeek - Cisco Blogs
The performance of DeepSeek models has made a clear impact, but are these models safe and secure? We use algorithmic AI vulnerability testing to find out.Paul Kassianik (Cisco Systems)
#Google is preparing to let you run #Linux apps on #Android, just like #ChromeOS
Source: androidauthority.com/android-l…
Thanks Goggle for nothing but I already have a #terminal under Android with #termux: termux.com
#Linux #smartphone #commandline #Software #news
Linux Terminal app could be coming to Android, just like ChromeOS - Android Authority
Google is developing a Terminal app for Android that'll let you run Linux apps. It'll download and run Debian in a VM for you.Mishaal Rahman (Android Authority)
#Google screws up #update for #Pixel 4a reduces nominal charge by 50 percent
source: social.treehouse.systems/@marc…
This is looking like a real hackjob.
...
And then there's that battery "debug" profile. #Battery capacity goes down from 3080mAh to 1539mAh! Half! It says "debug" but I'm pretty sure it's not just "debug", it's the crippled profile.
#software #fail #bug #energy #smartphone #news #analysis
Hector Martin (@marcan@treehouse.systems)
So there's a bunch of noise going around a sneaky forced Google Pixel 4a update that seems to cripple batteries... and this is quite interesting. Old kernel: ``` Linux version 4.14.Treehouse Mastodon
This fact sheet details an #analysis of three #firmware package versions of the Contec CMS8000, a patient #monitor used by the U.S. #Healthcare and Public #Health (HPH) sector. Analysts discovered that an embedded #backdoor function with a hard-coded IP address ...
source: cisa.gov/resources-tools/resou…
#surveillance #privacy #economy #software #security #fail #news #problem
Contec CMS8000 Contains a Backdoor | CISA
This fact sheet details an analysis of three firmware package versions of the Contec CMS8000, a patient monitor used by the U.S. Healthcare and Public Health (HPH) sector.Cybersecurity and Infrastructure Security Agency CISA