Zum Inhalt der Seite gehen

Suche

Beiträge, die mit TECH getaggt sind


Hey everyone! Stop what you are doing and check out the first Dev Weekly of April. It's a great way to stay updated about the tech world. Share it with your friends!

https://blog.codeminer42.com/codeminer42-dev-weekly-55/

#blog #codeminer42 #tech #news #weekly


It’s not procrastination if you’re optimizing your Workspaces. 💭

#Vivaldi #Browser #Tech #Apps


#Smartphone and social media harms: why we failed in our duty of #care

"...Why has it taken a #Netflix show to focus minds and ignite interest in the serious consequences of social #media...?"

#SocialMedia #Health #Adolescents #Adolescence #Life #Tech #Technology

https://www.bmj.com/content/389/bmj.r658


What’s your #1 go-to button in the panel, and what comes in second? 🤔

#Vivaldi #Browser #Apps #Tech #Mail #Calendar #Tasks


:linux: New Ubuntu Linux Security Bypasses require manual Mitigations.

Three security bypasses have been discovered in Ubuntu Linux’s unprivileged user namespace restrictions, which could be enable a local attacker to exploit vulnerabilities in kernel components.

http://blog.qualys.com/vulnerabilities-threat-research/2025/03/27/qualys-tru-discovers-three-bypasses-of-ubuntu-unprivileged-user-namespace-restrictions

#ubuntu #linux #bypasses #it #security #privacy #engineer #media #tech #news
The three issues allow local unprivileged users to create user namespaces with full administrative capabilities and impact Ubuntu versions 23.10, where unprivileged user namespaces restrictions are enabled, and 24.04 which has them active by default. [Linux user namespaces allow users to act as root inside an isolated sandbox (namespace) without having the same privileges on the host.]

Researchers at cloud security and compliance company Qualys provides technical details for the three bypass methods.

<http://www.qualys.com/2025/three-bypasses-of-Ubuntu-unprivileged-user-namespace-restrictions.txt>

⚠️In a bulletin published on the official discussion forum [Ubuntu Discourse], the company shared the following hardening steps that administrators should consider:⚠️

• Enable kernel.apparmor_restrict_unprivileged_unconfined=1 to block aa-exec abuse. [not enabled by default]
• Disable broad AppArmor profiles for busybox & Nautilus, which allow namespace creation.
• Optionally apply a stricter bwrap AppArmor profile for applications like Nautilus that rely on user namespaces.
• Use aa-status to identify and disable other risky profiles.

<https://discourse.ubuntu.com/t/understanding-apparmor-user-namespace-restriction/58007>


💡 Josef Fares: dal cinema ai videogiochi, un’emozione continua

https://gomoot.com/josef-fares-dal-cinema-ai-videogiochi-unemozione-continua/

#blog #hazelightgames #joseffares #news #picks #tech #tecnologia


Question you should ask yourself today: Can I get my entire office to ditch Big Tech and embrace the Vivaldi way of life? 🙂‍↔️

#Vivaldi #Browsers #Tech #BigTech #LittleTech


Little Bits: Issue #23 For March 2025

A mountain of bits (links) awaits in exploration along with a message to remember to enjoy and be gracious to ourselves with intention.

https://www.adamsdesk.com/posts/little-bits-issue-23/

#blog #OpenSource #FreeSoftware #tech #news #LinkDump
Over the top view of a wall of white binary text with a blue background that has an explosion in the middle coming towards the viewer sits large bold text that reads, 'Little Bits issue #23'.


👋🏼 #introduction though I'm not new here, but moved to my #selfhosted #Mastodon instance half a year ago 📦.

I'm Florian 👨🏼‍💻, #IT/computer science student at #RWTHAachen 🇩🇪🎓 and #tech enthusiast.
I do lots of #selfhosting in my #homelab, develop apps with #Flutter 📲, but also websites 🌐 and other #software 💻.

I'm very passionate about emergency #medicine 🩺 and work as a #paramedic (Rettungssanitäter 🇩🇪) on the #ambulance 🚑 in #ems 🚨.
I love water sports, be it #sailing ⛵, #diving 🤿 or #swimming 🏊🏼‍♂️.


:firefox: Mozilla warns Windows Users of critical Firefox Sandbox Escape Flaw.

The vulnerability impacts the latest Firefox standard and extended support releases (ESR) designed for organizations that require extended support for mass deployments. Mozilla fixed the security flaw in Firefox 136.0.4 & Firefox ESR versions 115.21.1 + 128.8.1.

https://www.mozilla.org/en-US/security/advisories/mfsa2025-19/#CVE-2025-2857

#mozilla #firefox #update #it #security #privacy #engineer #media #tech #news
Mozilla has released Firefox 136.0.4 to patch a critical security vulnerability that can let attackers escape the web browser's sandbox on Windows systems. Tracked as CVE-2025-2857, this flaw is described as an "incorrect handle could lead to sandbox escapes" and was reported by Mozilla developer Andrew McCreight.

While Mozilla didn't share technical details regarding CVE-2025-2857, it said the vulnerability is similar to a Chrome zero-day exploited in attacks and patched by Google last week.

"Following the sanbdox escape in CVE-2025-2783, various Firefox developers identified a similar pattern in our IPC code. Attackers were able to confuse the parent process into leaking handles into unpriviled [sic] child processes leading to a sandbox escape," Mozilla said in a advisory. "The original vulnerability was being exploited in the wild. This only affects Firefox on Windows. Other operating systems are unaffected."


Ich werde den Verdacht nicht los, dass #OpenSource zu einem #Ablasshandel #Geschäftsmodell der großen #Tech-Firmen wird um den Kartellstrafen vorsorglich zu umgehen.

zB #Google hält #Mozilla am leben und #Adobe, #Epic uva sponsern #Blender und so weiter. So existiert eine frei zugängliche angebliche #Konkurrenz und kann von sich weisen, dass man ein Monopolist sei. Abgesehen davon, dass damit auch noch unterschwellig seine #Dienste unter die Leute gebracht wird, so zu sagen als Gegenleistung.


#Geopolitics LegalWonks. Sample below.

(Editor’s Note: This article is part of the Just Security symposium “Thinking Beyond Risks: #Tech and Atrocity Prevention,” organized with the Programme on International Peace and Security at the Oxford Institute for #Ethics, Law and Armed Conflict. Readers can find here an introduction and other articles in the series as they are published.)

When #AI Fuels Atrocities — And How It Can Help Prevent Them
https://www.justsecurity.org/109612/ai-can-fuel-or-prevent-atrocities/ #artificialintelligence
The third, and perhaps most concerning, threat vector is generative AI’s ability to broadly disrupt information environments through what researchers have called compositional deepfakes. This sophisticated technique embeds AI-generated content within layers of authentic material — Microsoft Chief Scientific Officer Eric Horvitz explains that, in a compositional deepfake, “a sequence of two fabricated ‘past’ deepfake media pieces are injected between two world occurrences and time-stamped as happening at appropriate times between the two events. Moving into the future in this canonical synthetic history, an in-world event is fabricated to complete the persuasive storyline.” In other words, fabricated past events are injected between real-world occurrences to shape a manipulated perception of history and complete a persuasive storyline. This creates an information ecosystem in which truth and falsehood are sown together and become increasingly difficult to unravel.


#BookReview: “How #Tech #Billionaires on the Right Bought the Loudest Voices on the Left”

'Owned: How Tech Billionaires on the Right Bought the Loudest Voices on the Left, examines how new wealth has drawn some formerly progressive journalists. Owned looks at #MattTaibbi and #GlennGreenwald (who was always right wing libertarian with axes to grind that suited the left, as is snowden) once idealistic-sounding, left-leaning voices who shifted right'
https://accuracy.org/release/how-tech-billionaires-on-the-right-bought-the-loudest-voices-on-the-left/ #fakeleftists #proglibs


Looking to integrate Korifi with your Go applications? ✨ I've published a blog post that walks you through connecting to Korifi on a Kind cluster. It includes authentication tips and code examples for getting started. Check it out here: https://gciavarrini.github.io/blog/go_korifi/

#korifi #cloudfoundry #blog #go #golang #kubernetes #Tech #technology


A Game Boy Speedometer, just because you can.

The “world’s worst digital dash”, a Nintendo Game Boy as a digital speedometer. Interfacing the handheld with the vehicle’s CAN bus system, this project has something to offer.

🖇️Check my Image Description’s🖇️

https://github.com/JohnSutley/Worlds-Worst-Digital-Dash

#diy #retro #gameboy #speedometer #car #canbus #system #it #engineer #artist #media #maker #tech #art #progamming #news
Months of work have gone into decoding the Game Boy’s data bus and creating a schematic for the interface board. Tricking the Game Boy into thinking it was loading a game, while actually displaying incoming speed data. The screen’s low resolution and slow refresh rate rendered it barely readable in a moving vehicle. But [John]’s goal wasn’t practicality — it was just proving it could be done.
[ImageSource: John Sutley]

Showing real-time vehicle speed on the Game Boy sounds like it should be relatively easy, but the iconic game system wasn’t exactly built for such a task. Its 2 MHz CPU and 160×144 pixel dot-matrix screen were every kid’s dream in 1989, but using it as a car dashboard is pushing it. To bridge that gap, [John] designed two custom circuit boards.

One interfaces with the Game Boy, intercepting its memory requests and feeding it data from a microcontroller. The other processes the CAN bus signals, translating speed information into a form the Game Boy can display. [John] used inexpensive tools and software to read the CAN bus data, and used GBDK-2020 to write the software in C.


Saturday shoutout to those who wake up, open their browser, and it’s Vivaldi. 🏆🙇‍♂️

#Browser #Vivaldi #Apps #Tech


Hey everyone! The latest Dev Weekly of March just dropped! Be sure to check it out and share it with your friends.

https://blog.codeminer42.com/codeminer42-dev-weekly-54/

#blog #codeminer42 #tech #news #weekly


My #tech prediction:

Despite the hype from Silicon Valley, my belief is the generative #AI and LLM bubble is nearing its bursting point.

Like with the dot com crash, Wall Street and Investors are getting impatient and want to see profitability.

Most AI startups aren't even close. And mass adoption of AI tools still hasn't become ubiquitous among the general public - and probably never will.

Most "features" are over-hyped and AIs can still "hallucinate" (lie) when providing information - a very big issue the tech industry is trying to downplay.

Startups are going to either shut down or be acquired by the bigger players.

Also, like the dot com bust, only the biggest, most deep-pocketed players are going to remain standing after the shakeout.

I think the AI landscape is going to start imploding as early as the end of this year.

AI will still play a role, but not be as revolutionary as the tech industry wants us to believe.
#ai #tech


One of many notable takeaways from 'Careless People':

The creators and top execs of Meta do not allow their own children on it.

Think about that.

#carelesspeople #facebook #tech
Image of cover to book 'Careless People' by Sarah Wynn-Williams.


💡 GPT-4o riceve la generazione immagini integrata in ChatGPT

https://gomoot.com/gpt-4o-riceve-la-generazione-immagini-integrata-in-chatgpt

#ai #blog #gpt4o #ia #news #openai #picks #tech #tecnologia


New Mac Attack is tricking Users into thinking their Computer is locked.

According to LayerX Labs, who have been tracking this campaign for more than a year, the phishing attack attempts to trick Mac users into thinking that their computers have been “locked” via a fake security warning that pops up while users are browsing the web.

https://layerxsecurity.com/blog/layerx-identifies-new-phishing-campaign-targeted-at-mac-users/

#apple #macos #it #security #privacy #engineer #media #tech #news