Zum Inhalt der Seite gehen

Suche

Beiträge, die mit TECH getaggt sind


Back in 2021, we launched a series of stories documenting the key ways that the ultrawealthy — #billionaires like #ElonMusk, Jeff Bezos, and Peter Thiel — avoid #taxes. Here are 10 of their strategies.

#Finance #Law #Tech #Journalism

https://propub.li/4fQL3uY


The decline of tech media outlets is unmistakable.

Banner ads have been obsolete for years, AI and Google are eroding search traffic, and flooding subscribers with endless deals only accelerates their downfall. #media #tech
The image showcases a list of articles from Engadget about Cyber Monday deals for 2024. Here's an overview of the highlighted deals:

1. The Best Cyber Monday SSD Deals for 2024

Save on storage gear from brands like Samsung, WD, Crucial, and others.

Article posted 8 hours ago.



2. Cyber Monday Subscription Deals for 2024

Covers the best sales on streaming services and subscriptions, including Disney+, Peacock, Hulu, and MasterClass.

Article posted 8 hours ago.



3. Anker Cyber Monday Deals

Highlights big savings on popular Anker products such as power banks, wireless chargers, and more.

Article posted 9 hours ago.



4. The Best Cyber Monday TV Deals for 2024

Save on televisions from brands like Samsung, LG, Sony, Hisense, and others.

Article posted 9 hours ago.




The articles focus on significant discounts across tech products and services, catering to consumers looking for Cyber Monday deals.
The image showcases a list of Cyber Monday deals for 2024 from Engadget. Here's an overview of the highlighted articles:

1. The Best Cyber Monday Kitchen Deals

Save up to 44% on kitchen products from brands like Ninja, Breville, and KitchenAid.

Article posted 9 hours ago.



2. The Best Cyber Monday Speaker Deals for 2024

Big discounts on speakers from JBL, Sonos, Echo, Marshall, and more.

Article posted 9 hours ago.



3. Amazon Cyber Monday Deals

Features sales on Kindles, Echo speakers, Ring doorbells, and more. Aside from Black Friday, this is one of Amazon's biggest sales events.

Article posted 10 hours ago.



4. The 70 Best Cyber Monday Tech Deals Under $50

A curated list of affordable tech deals, focusing on items priced below $50, including accessories and small gadgets.

Article posted 10 hours ago.




The articles focus on a range of discounted items, from kitchen appliances to tech accessories, appealing to budget-conscious shoppers looking for Cyber Monday bargains.


Half-Life 2 is getting a huge 20th Anniversary Update.

Half-Life 2 is getting a major update in celebration of the classic title’s 20th anniversary. In addition to Steam Workshop support directly within the game, Valve has fixed bugs and restored some content, added new graphics settings, updated gamepad controls and a whole lot more.

https://www.half-life.com/en/halflife2/20th

#halflife2 #20th #anniversary #update #valve #retro #gaming #art #engineer #media #tech #news
Valve is now including the Episode One and Episode Two expansions with the base game. They’ll be accessible from the Half-Life 2 menu, and Valve says that “you will automatically advance to the next expansion after completing each one.” You’ll also be able to access the Steam Workshop within the Extras menu, which means you’ll no longer have to leave the game to enable mods.

If you want to access the older version of Half-Life 2, that’s still an option: you’ll just have to roll back to “a publicly visible Beta branch named ‘steam_legacy’” and grab the “Pre-20th Anniversary Build,” Valve says.
[ImageSource: Valve]

Valve says it also made massive updates to Half-Life 2’s maps, which will fix “longstanding bugs, restore content and features lost to time, and improve the quality of a few things like lightmap resolution and fog.” There’s a new option to play with the original launch day blood and fire effects as well, and Valve has updated Half-Life 2’s gamepad controls to “match” last year’s Half-Life 1 anniversary update.

<https://www.theverge.com/2023/11/17/23965754/half-life-25th-anniversary-update>

And finally Valve added 3.5 hours of new developer commentary within the game. The company also is printing an expanded second edition of the Raising the Bar book about the game’s development, which includes “the Half-Life 2 development story, with never-before-seen concept art from Episode One and Episode Two, along with ideas and experiments for the third episode that never came to be.” The book will return to print in 2025.

Maybe soon we’ll get Half-Life 3? Maybe?


A hive mind #askfedi #tech question, please:

After months of doing watchalongs on here, & the laughs from the #totp crowd, I’d love to try a “disco” night, set up like a real time synched playlist to those who want to join in.

If it works, we could have different people as ‘DJ’ on diff nights.

Only thing is, I’m not sure how best to do that:

Been reading up on apps like Funkwhale, but it’s not clear whether it’d share DRM tracks.

Is posting a Spotify playlist link the best I can do? 😬


As more publishers cut content licensing deals with ChatGPT-maker OpenAI, a study put out this week by the Tow Center for Digital Journalism — looking at how the AI chatbot produces citations (i.e. sources) for publishers’ content — suggests that publishers remain at the mercy of the generative AI tool’s tendency to invent or otherwise misrepresent information, regardless of whether or not they’re allowing OpenAI to crawl their content. Read more from @Techcrunch.

https://flip.it/zr0ABn
#Tech #AI #ChatGPT #ArtificialIntelligence #Journalism


#Poll in #Germany says majority would support social #media ban for minors after #Australia approves legislation banning popular sites such as #TikTok & #Facebook for citizens under 16: #tech #news #Europe #socialmedia https://www.dw.com/en/most-in-germany-want-australia-style-social-media-ban-poll/a-70926144


Critical WordPress Anti-Spam Plugin Flaws expose 200k+ Sites to Remote Attacks

Two critical security flaws impacting the Spam protection, Anti-Spam & FireWall plugin WordPress could allow an unauthenticated attacker to install & enable malicious plugins on susceptible sites.

https://www.wordfence.com/blog/2024/11/200000-wordpress-sites-affected-by-unauthenticated-critical-vulnerabilities-in-anti-spam-by-cleantalk-wordpress-plugin/

#wordpress #it #security #privacy #engineer #media #tech #news
The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0. They were addressed in versions 6.44 and 6.45.

According to Wordfence, both vulnerabilities concern an authorization bypass issue that could allow a malicious actor to install and activate arbitrary plugins. This could then pave the way for remote code execution if the activated plugin is vulnerable of its own.

The plugin is "vulnerable to unauthorized Arbitrary Plugin Installation due to a missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44," security researcher István Márton said, referring to CVE-2024-10781. On the other hand, CVE-2024-10542 stems from an authorization bypass via reverse DNS spoofing on the checkWithoutToken() function.

Regardless of the bypass method, successful exploitation of the two shortcomings could allow an attacker to install, activate, deactivate or even uninstall plugins.

<⚠️Users of the plugin are advised to ensure that their sites are updated to the latest patched version to safeguard against potential threats.⚠️>


To #blind people: I'm seeking someone who knows how to use #BrailleBlaster with large books. I need help understanding page numbering and getting it working in a book I'm transcribing and proofreading.

I've tried following the manual and asked for help on the BrailleBlaster mailing list, but the explanation given by another list member didn't help. I can't afford Duxbury and the other translation software I've tried, Sao Mai Braille, doesn't support a lot of US standards for UEB.

I would really appreciate any help with this!

#Braille #BrailleProofreading #BrailleTranscription #tech #technology #AssistiveTechnology #Accessibility

@mastoblind @main


So a while ago I was building this xeon workstation. https://lemmygrad.ml/post/372601
I'm thinking about selling what I have off...

I might be better off just collecting SBCs...
They make some pretty fancy ones these days.

#blog #tech


Firefox & Windows Zero-Days exploited by Russian RomCom Threat Actor’s.

IT-security researchers at ESET have exposed a malicious campaign by the Russia-linked RomCom group, which combined two previously unknown (zero-day) vulnerabilities to compromise targeted systems including Windows and Firefox.

https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/

#firefox #windows #zerodays #backdoor #it #security #privacy #engineer #media #tech #news
RomCom Exploits Double Zero-Day: RomCom, a Russia-linked group used previously unknown vulnerabilities in Firefox and Windows in a sophisticated attack campaign.

The attack chain, first detected on October 8th, started with a vulnerability in Mozilla Firefox and Thunderbird, (CVE-2024-9680, CVSS score 9.8). If a user with a vulnerable browser visited a customized webpage, malicious code could run within the browser’s restricted environment without any user interaction. This vulnerability, a “use-after-free” bug in the animation feature of Firefox, was quickly addressed by Mozilla within 24 hours of being notified by ESET.

However, the attack didn’t stop there. RomCom chained this browser vulnerability with another zero-day flaw in Windows (CVE-2024-49039, CVSS score 8.8) to bypass the browser’s security “sandbox.” This second vulnerability allowed the attackers to run code with the privileges of the logged-in user, taking control of the system. Microsoft released a fix for this issue on November 12th.

This cyberattack campaign goes on to show the importance of quick vulnerability disclosure and patching. It also emphasises the need for users to remain alert and keep their software up to date to prevent exploitation of zero-day vulnerabilities.
[ImageSource: ESET]

RomCom Victims Heatmap

ESET’s investigation shows that RomCom targeted various sectors, including government entities in Ukraine, the pharmaceutical industry in the US and the legal sector in Germany, for both espionage and cybercrime purposes. The group, also known as Storm-0978, Tropical Scorpius or UNC2596, is known for both opportunistic attacks and targeted espionage.

From October 10th to November 4th, ESET’s data showed that users visiting these malicious websites were primarily located in Europe and North America, with the number of victims ranging from one to as many as 250 in some countries.
[ImageSource: ESET]

RomCom Attack Flow

The exploit chain worked by first redirecting users to fake websites, which used domains designed to appear legitimate and included the names of other organizations, before sending them to a server hosting the exploit code.

These fake sites often used the prefix or suffix “redir” or “red” to a legitimate domain, and the redirection at the end of the attack took the victims to the legitimate website, hiding the attack. Once the exploit successfully ran, it installed RomCom’s custom backdoor, giving the attackers remote access and control over the infected machine.

"The compromise chain is composed of a fake website that redirects the potential victim to the server hosting the exploit and should the exploit succeed, shellcode is executed that downloads and executes the RomCom backdoor," said ESET researcher Damien Schaeffer.


Hey! What do you think you're doing? Just scrolling your feed without clicking here to see the newest Dev Weekly!? I invite you to read it, like it, and share it with your friends!

https://blog.codeminer42.com/codeminer42-dev-weekly-39/

#blog #codeminer42 #tech #news #weekly


In global first, #Australia bans access to all social #media for minors under the age of 16: #tech #socialmedia #news https://www.nbcnews.com/news/world/australia-passes-landmark-social-media-ban-children-16-rcna181124


Next thing you know, tech journalists will be advocating for blogs to stop having RSS feeds because it can be scraped. This is why I sparingly read Tech Chrunch. Trust me, open API's shouldn't be the thing you should worry about, kids. https://techcrunch.com/2024/11/27/blueskys-open-api-means-anyone-can-scrape-your-data-for-ai-training/ #Tech #Technology #Journalism


Taking a Curated Look at Black Friday Sales

A small hand-selected list of design, gaming, technology and more based websites or services that are participating in the Black Friday sale.

https://www.adamsdesk.com/posts/black-friday-sales/

#blog #BlackFriday #tech #gaming #design #100DaysToOffload
A large barcode in the shape of a gift box sits in the middle of a black background. The gift box has a big red ribbon in the middle and a bow on top. Part way down the barcode a break opens up with text that reads, Great sales up to 65%. At the bottom of the gift box it reads in bold text, Black Friday.


Apple fixes 2 Zero-Days exploited to breach MacOS Systems. :apple_inc:

Apple has released emergency security updates for macOS Sequoia that fix two zero-day vulnerabilities that “may have been actively exploited on Intel-based Mac systems”. As per usual, Apple didn’t share details about the attacks in which patched vulnerabilities are exploited.

[CVE-2024-44309 & CVE-2024-44308]

https://support.apple.com/en-us/121753

#apple #macos #update #it #security #privacy #engineer #media #tech #news
Apple has transitioned to using Intel processors on Macs in June 2006 and stopped shipping them altogether in June 2023, after starting using its own silicon in 2020.

The two vulnerabilities “may have been actively exploited on Intel-based Mac systems”, but it’s unclear at this time whether that means that they can’t be exploited on Apple-based Macs.

[⚠️In any case, all MacOS Sequoia users should update their systems as soon as possible.⚠️]

CVE-2024-44309 affects WebKit, the browser engine used in the Safari web browser and all iOS and iPadOS web browsers, and can be triggered when it’s made to process maliciously crafted web content. It can enable a cross site scripting (XSS) attack.

CVE-2024-44308 affects JavaScriptCore (the built-in JavaScript engine for WebKit) and can likewise be exploited via maliciously crafted web content. It can lead to arbitrary code execution.

<Both vulnerabilities have been reported by security researchers Clément Lecigne and Benoît Sevens of Google’s Threat Analysis Group (TAG).>
Apple has also released security patches for iOS, iPadOS, visionOS and its Safari web browser. The updates are available for the following devices and operating systems:

• iOS 18.1.1 and iPadOS 18.1.1 - iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later
<https://support.apple.com/en-us/121752>
• iOS 17.7.2 and iPadOS 17.7.2 - iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later
<https://support.apple.com/en-us/121754>
• macOS Sequoia 15.1.1 - Macs running macOS Sequoia
<https://support.apple.com/en-us/121753>
• visionOS 2.1.1 - Apple Vision Pro
<https://support.apple.com/en-us/121755>
• Safari 18.1.1 - Macs running macOS Ventura and macOS Sonoma
<https://support.apple.com/en-us/121756>


💡 Raspberry Pi Pico 2 W: il microcontrollore Wireless da 5 Euro

https://gomoot.com/raspberry-pi-pico-2-w-il-microcontrollore-wireless-da-5-euro

#arm #blog #iot #microcontroller #news #picks #pico2w #raspberry #riscv #tech #tecnologia #wifi #wireless


LLVM-Powered Devirtualization
https://blog.thalium.re/posts/llvm-powered-devirtualization/
#ycombinator #blog #tech


Question to other #bloggers and #website owners: I have a previous blog at https://rarebird15.mataroa.blog (link may not work since I set it to redirect to my new domain), and I want to move my posts to #WordPress. I exported them in #Markdown format. Does anyone know the best way to get these posts into WordPress? I found a #NodeJS package called Markdown to WordPress, but it no longer seems to work.
#tech #websites #blog #blogs #technology


NodeStealer Malware targets Facebook Ad Accounts and harvesting Credit Card Data.

Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims Facebook Ads Manager accounts and harvest credit card data stored in web browsers.

https://www.netskope.com/blog/python-nodestealer-targets-facebook-ads-manager-with-new-techniques

#facebook #socialmedia #ads #malware #it #security #privacy #engineer #media #tech #news
"They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement," Netskope Threat Labs researcher Jan Michael Alcantara said in a report. "New techniques used by NodeStealer include using Windows Restart Manager to unlock browser database files, adding junk code and using a batch script to dynamically generate and execute the Python script."

NodeStealer, first publicly documented by Meta in May 2023, started off as JavaScript malware before evolving into a Python stealer capable of gathering data related to Facebook accounts in order to facilitate their takeover.

The latest analysis from Netskopke shows that NodeStealer artifacts have begun to target Facebook Ads Manager accounts that are used to manage ad campaigns across Facebook and Instagram, in addition to striking Facebook Business accounts.
[ImageSource: Netskope Threat Labs]

"We recently found several Python NodeStealer samples that collect budget details of the account using Facebook Graph API," Michael Alcantara explained. "The samples initially generate an access token by logging into adsmanager.facebook[.]com using cookies collected on the victim's machine."

Aside from collecting the tokens and business-related information tied to those accounts, the malware includes a check that's explicitly designed to avoid infecting machines located in Vietnam as a way to evade law enforcement actions, further solidifying its origins.
[ImageSource: Netskope Threat Labs]

On top of that, certain NodeStealer samples have been found to use the legitimate Windows Restart Manager to unlock SQLite database files that are possibly being used by other processes. This is done so in an attempt to siphon credit card data from various web browsers.

Data exfiltration is achieved using Telegram, underscoring that the messaging platform still continues to be a crucial vector for threat actors despite recent changes to its policy.

Malvertising via Facebook is a lucrative infection pathway, often impersonating trusted brands to disseminate all kinds of malware. This is evidenced by the emergence of a new campaign starting November 3, 2024, that has mimicked the Bitwarden password manager software through Facebook sponsored ads to install a rogue Google Chrome extension.

<https://www.bitdefender.com/en-us/blog/labs/inside-bitdefender-labs-investigation-of-a-malicious-facebook-ad-campaign-targeting-bitwarden-users>


Super-Lightweight Operating System boots off a 1.44MB Floppy Disk. 💾

[KolibriOS lets you do simple tasks and even play games on your legacy PC.]

While most operating systems are written in C and C++, KolibriOS is written in pure x86 assembly and as a result small and lightweight enough to run off a standard 1.44 MB floppy disk.

https://en.wikipedia.org/wiki/KolibriOS

#kolibrios #floppydisk #x86 #assembler #code #programming #retrocomputing #retro #gaming #it #engineer #media #tech #news
Since then, KolibriOS has become widely multi-platform while maintaining a 32-bit focus and becoming lightweight enough to run on any PC with an i585-compatible CPU, 8MB of RAM and a VESA-compatible video card.

As those system requirements and the option to install it with storage as minute as a 1.44MB floppy drive indicate, this operating system is explicitly targeted at legacy PC hardware.

With the CD-ROM version having the advantage of more software being provided with it, including shareware versions of DOOM and Wolfenstein 3D.
[ImageSource: KolibriOS]

Screenshot of the KolibriOS desktop on first boot with default wallpaper.

As a fork of 32-bit MenuetOS back in 2004, KolibriOS has since followed its own course, sticking to the x86 codebase and requiring only a modest system with an i586-compatible CPU. Unlike MenuetOS’ proprietary x86_64 version, there’s no 64-bit in KolibriOS, but at this level you probably won’t miss it.

<https://wiki.kolibrios.org/wiki/Hardware_Support#Network>
[ImageSource: KolibriOS]

A curiosity recently caught our eye—that curiosity is KolibriOS, a super-lightweight and ultra-fast OS designed for legacy PCs with its floppy drive-friendly install size of just 1.44 MB.

The OS was really fast, stable, runs DOOM smoothly and overall seems to be a great small OS for x86 platforms that could give an old system a new lease on life.

<https://youtu.be/LjvG54xszoY>


The implications of merging Android with Chrome OS

#ChromeOSFlex #chromeos #android #google #blog #tech #TechLovers #technology #developers

https://terryjking8.wordpress.com/2024/11/24/the-future-of-chromeos/


5 Vulnerabilities found in Ubuntu's Needrestart.

That could allow a local attacker to gain root privileges without requiring user interaction. Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates.

https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart

#linux #ubuntu #it #security #privacy #engineer #tech #media #news
Multiple decade-old security vulnerabilities have been disclosed in the needrestart package.

The vulnerabilities are believed to have existed since the introduction of interpreter support in needrestart 0.8, which was released on April 27, 2014.

"These needrestart exploits allow Local Privilege Escalation (LPE) which means that a local attacker is able to gain root privileges," Ubuntu said in an advisory, noting they have been addressed in version 3.8.

<https://ubuntu.com/blog/needrestart-local-privilege-escalation>

The 5 flaws are listed below:

• CVE-2024-48990 [CVSS score: 7.8] - A vulnerability that allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
• CVE-2024-48991 [CVSS score: 7.8] - A vulnerability that allows local attackers to execute arbitrary code as root by winning a race condition & tricking needrestart into running their own, fake Python interpreter.
• CVE-2024-48992 [CVSS score: 7.8] - A vulnerability that allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
• CVE-2024-11003 [CVSS score: 7.8] and CVE-2024-10224 [CVSS score: 5.3] - Two vulnerabilities that allows a local attacker to execute arbitrary shell commands as root by taking advantage of an issue in the libmodule-scandeps-perl package. (before version 1.36)


💡 A Minecraft Movie: tra entusiasmo e scetticismo

https://gomoot.com/a-minecraft-movie-tra-entusiasmo-e-scetticismo

#blog #film #jackblack #minecraft #movie #news #picks #teaser #tech #tecnologia #trailer #warnerbros


Our mission is to bring you the best journalism out there, and of course that includes newsletters. This week, we’re pleased to add five great newsletters about media and tech to Flipboard, from esteemed reporters like @om, @harrymccracken, @oliverdarcy, @thekenyeung and @mathewi. Read more about them in our blogpost, and tell us in the comments if there's another newsletter you'd love to see on Flipboard.

https://about.flipboard.com/inside-flipboard/tech-and-media-newsletters-on-flipboard/

#Flipboard #Newsletter #Tech #Media #Journalism #IndependentJournalist #NewsInfluencers


T-Mobile US monitoring China's 'Industry-wide Attack' amid fresh Security Breach Fears.

T-Mobile has joined a list of major organizations like AT&T, Verizon & Lumen Technologies that have been singled out as part of what appears to be a full-blown Chinese threat actors cyber espionage campaign.

https://www.wsj.com/politics/national-security/t-mobile-hacked-in-massive-chinese-breach-of-telecom-networks-4b2d7f92

#us #telecom #companies #breach #it #security #privacy #engineer #media #tech #news
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.

The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets." It's not clear what information was taken, if any, during the malicious activity.

"T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been impacted in any significant way, and we have no evidence of impacts to customer information," a spokesperson for the company was quoted as saying to The Wall Street Journal. "We will continue to monitor this closely, working with industry peers and the relevant authorities."
The FBI and CISA noted that the cyber-attacks the telecoms providers resulted in the "theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to US law enforcement requests pursuant to court orders."

Previous reports suggested that the Chinese snoops, after breaking into the telco’s networks, accessed the wiretapping backdoor-like systems used for court-ordered surveillance and targeted phones belonging to people affiliated with US Democratic presidential candidate Kamala Harris, as well as Republican president-elect Donald Trump and VP-elect JD Vance.

<https://www.fbi.gov/news/press-releases/joint-statement-from-fbi-and-cisa-on-the-peoples-republic-of-china-targeting-of-commercial-telecommunications-infrastructure>


"Open social media offers a chance to escape the cycle of good product turns bad product and wiping the slate clean to start again. Instead, open social media offers the chance to build in a space where you can easily hop-skip-jump to the next best platform without losing your community."

Check out what @saskia had to say about Bluesky continuing to grow.

https://forbetter.ghost.io/even-more-bluesky-growth/

#Fediverse #Mastodon #SocialMedia #Bluesky #X #OpenSocial #SocialWeb #Tech


Is there a way to stop the companies, mostly gardening/farming supply stores, from sending me emails to "remind me" of what I've looked at, in my periodic window shopping & list making????

As I'd prefer not to fully cut off & never buy anything from all these places, but this pushy sales tactic definitely makes that a temptation, because if I had similar in person, I'd definitely never buy anything at said retailer?

#Tech #Gardening #Sales