Skip Navigation

Posts
33
Comments
137
Joined
2 yr. ago

  • There seem to be published scientific paper that some scientists disagreed. There are alcohol-free mouthwashes too.

  • He's obviously using the Force.

  • Listerine seems to help remove plaque effectively. Since start using it in the middle of the night when I wake up, not getting regularly cleaned doesn't seem to be a problem anymore. This is coupled with flossing and thorough brushing of course.

  • I hope to much thrilling from your audience. 👍 👍 👍

  • While corporate America focuses on mainly profits, "fighting for human rights" are just empty slogan, because corporate America is already exploiting human misery for profits. For government, it's going to be "to prevent China from becoming the dominant tech power in the developing world" that's going to drive this sort of initiative, which most likely will have mixed results or fail miserably altogether. Chinese exports are already driving the non-elite consumer markets in the developing worlds.

  • Oh, come on, practically all the males have sex with their sometime lonely selves, and cameras are everywhere now. I'd personally put a privacy shutter on my webcam.

  • You definitely don't want this stuff to escape into the atmosphere.

  • When I forgot part of my my old password, I came up with a list of words that I possibly could have come up with and tried those. I eventually found it even if I was panicky the whole time. If I were you, I would list the words and try them in the order of probabilities.

    Un/Fortunately, BW is implemented to rate-limit password brute-forcing. I feel you about your CAPTCHA hell, and I hate their surreal sunflower CAPTCHA (maybe to make it as repulsive as possible to the hackers?).

  • True.

    • Automatic patch => automatic installation of malware
    • Manual patch => unpatched vulnerabilities

    Screwed either way.

  • Yeah, this is definitely a problem with brand new services, especially when the native app isn't appealing. For example, I use Liftoff for Lemmy. Open-sourced✅ In official Appstore✅ Relatively transparent who the developer is✅ No special permission starting off✅ Relatively few downloads📛 .

    When a mobile app doesn't ask for permissions, it's definitely less nerve-racking than the more permissive desktop environments where the apps don't have to be special to do considerable damages.

  • Speaking about Windows PC.

    1. Not everybody thinks they need such security because it's their home computer.
    2. Enabling device encryption necessitates the backup of the encryption key (and backup of the data files); otherwise, you may lose all the contents when things go wrong (like the key disappears after an update). People who don't understand the tech may not know where their backup keys are.
    3. Windows Home encryption is a hassle since you don't have finer-grain control over the encryption, unlike Bitlocker on Windows Pro. This is the lamest scheme for Windows. You only get practical basic security with Windows Pro.
    4. Enabling system drive encryption may make your system backup/recovery harder or impossible in some configurations. Figuring this out may require some technical expertise.
  • Spokespeople for NCTA and pharmaceutical company Gilead said that they immediately paused their ad spending on X after CNN flagged their ads on the pro-Nazi account.

    Alt-speak: we only care if the media report that our ad placements were next to questionable contents.

  • Apparently, Google has also taken to suck deez nuts.

  • Shoppers of Dell Australia's website who were buying a computer would see an offer for a Dell display with a lower price next to a higher price with a strikethrough line. That suggested to shoppers that the price they'd pay for the monitor if they added it to their cart now would be lower than the monitor's usual cost. But it turns out the strikethrough prices weren't the typical costs. Sometimes, the lower price was actually higher than what Dell Australia typically charged.

    Don't believe in ads, folks. If prices are important for you, do you own research.

  • Whatever happens on the inside of a robotaxi is generally visible on the outside to bystanders and other motorists, The Standard notes of the AV's "fishbowl-like" design.

    "While [autonomous vehicles] will likely be monitored to deter passengers having sex or using drugs in them, and to prevent violence, such surveillance may be rapidly overcome, disabled or removed," the study said. "Private [autonomous vehicles] may also be put to commercial use, as it is just a small leap to imagine Amsterdam’s Red Light District ‘on the move.’"

    Convenient meetups, plus the additional benefits for certain fetishes.

    But don't worry, folks, we'll take this opportunity to put even more surveillance tech in for you to keep you safe and meanwhile, perfectly maintain your privacy. 🤪

  • Technology @beehaw.org

    Facial recognition tech lands innocent woman with bogus carjacking charge

    Technology @beehaw.org

    AnonAddy has rebranded as addy.io

    Technology @beehaw.org

    Twitter Blue to X Phishing Breakout – Gridinsoft Blogs

    Technology @lemmy.world

    TunnelCrack: Widespread design flaws in VPN clients

    Technology @lemmy.world

    No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign

    Technology @lemmy.world

    Phishing campaigns are using Google AMP URLs to avoid detection

    Dad Jokes @lemmy.world

    Not me!

    Technology @lemmy.world

    Your Computer Should Say What You Tell It To Say - Google is adding code to Chrome that will send tamper-proof information about your operating system and other software, and share it with websites

    Technology @lemmy.world

    This Disinformation Is Just for You; Generative AI Makes Disinformation More Targeted and Effective

    Technology @lemmy.world

    They Didn’t Ask to Go Viral. Posting on Social Media Without Consent Is Immoral

    Cybersecurity @sh.itjust.works

    FakeSG enters the 'FakeUpdates' arena to deliver NetSupport RAT: pretending to be a fake browser update and once installed, giving hackers remote control of the computer.

    Cybersecurity @sh.itjust.works

    WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

    Cybersecurity @sh.itjust.works

    Zero-day deploys remote code execution vulnerability via Word documents