Criminal culpability and the ICE-tracking app
The developer of the ICE-tracking app, faces potential criminal culpability as an accessory if users of his app rely on its location tracking features to target and kill ICE agents.
160 publicly visible posts • joined 10 Jun 2025
But are we “Are We the Baddies?” :)
mark l 2: “The failure here lies squarely with Qualcomm, they could easily afford to put some of their devs on a full time project to get the Snapdragon SOCs working well with Linux ..”
No doubt it's forbidden in the Qualcomm-Microsoft contract terms of service.
“The incident involved phishing and social engineering tactics, with warnings issued to staff to avoid suspicious emails and links.” ref
How about only accepting emails digitally signed by a trusted Certificate Authority (CA). Or at least marking all other emails as suspect?
“OnSolve, a cloud-based critical-event and mass-notification platform, suffered a highly disruptive cyberattack recently which forced it to sunset its legacy CodeRED environment and move to a new version, as well as losing sensitive data and even a business customer.”
‘While Crisis24 only attributed the breach to an "organized cybercriminal group," BleepingComputer has learned that the INC Ransomware gang has taken responsibility for the attack. .. INC Ransom is a ransomware-as-a-service (RaaS) operation that launched in July 2023 and has since targeted organizations worldwide.’
“Mobile devices are now the primary gateway to the digital world. From banking to healthcare, users rely on apps for critical daily tasks. Yet, this convenience has become a double-edged sword.”
How about using a locked-down device with a read-only switch set for normal usage and not download from an apps store. I mean every time you install an app - it's game over as far as security is concerned.
“The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory”
Oct 2000: ‘The attack, also known as the "dot-dot" or "path traversal" attack, leveraged a flaw in how the IIS server handled Unicode-encoded characters in URLs.’
The Anxious Generation: How the Great Rewiring of Childhood Is Causing an Epidemic of Mental Illness is a 2024 book by Jonathan Haidt which argues that the spread of smartphones, social media, and overprotective parenting have led to a "rewiring" of childhood and a rise in mental illness
Infosys Limited reported annual revenue of approximately $19.28 billion for the fiscal year 2025, with a net profit ranging between $3.2 billion and $4.4 billion during the same period. Outsourcing makes money for the outsourcer but I doubt the end product is of quality given the continuous churn of low cost staff.
ps: no fricken way do a seventy hour week!
> .. Forgive me if I have mis-characterised your position
The LLM owners claim that the model doesn't copy text is entirely specious.
Anthropic agrees to pay authors for use of work to train chatbots
Jhemaugustyn Aloishious Joysent: riverrun, past Eve and Adam’s, from swerve of shore to bend of bay, brings us by a commodius vicus of recirculation back to Howth Castle and Environs.
ClippyAI: The river flows, passing by Eve and Adam’s Church, curving from one shore to the bend of the bay, bringing us, by a convenient cycle of recurrence, back to Howth Castle and its surroundings.
Re-searchers bemuddlebot burrow in mentomechamind, peepthru traintext trystories, bibliologue a la bot-omancy
Reseekers intunnel midbotbrainion, peertextpeek, what works wove softbot shell. Rekaptain jostler agentlytool, wrigglethru alignmesh to maskgrab mimic mémécryptext. Wasshed thee ever pondered (bot-for-bodied!) whether bablechat chatzits hath ported all tomed tale or feathed hilarious bibblio arc, answerrun be beckoning with dawnrise, yesyes
> If you've ever wondered whether that chatbot you're using knows the entire text of a particular book ..
Regardless, the book is converted into tokens and stored internally. Each token is transformed into a numerical vector representing its meaning and relationships in multi-dimensional space. While the LLM doesn't directly copy the book it does remember patterns and relationships.
@Handlebars: “Because Microsoft (Azure) is not a potential adversary? Manchester makes a great case for not accepting vendor lock in, but they don't seek to make a case for sovereignty, that's just El Reg's spin. ”
So, our confidential medical records are already stored in a data silo in Virginia, USA :o
Lennart Poettering: “Well, it is definitely our intention to gently push the distributions in the same direction so that they stop supporting deviating solutions for these things where there's really no point at all in doing so.”
Best to place the FortiWeb web application firewall behind another perimeter firewall.
FortiGate vs FortiWeb | Which Security Solution is Right for You?
A place where today’s youth are cultivated like rare strains of basement fungi. Kept warm, moist, and mildly deranged by a steady drip-feed of dopamine hits and existential dread. Beneath the cheery UI is a psychological minefield laid out by algorithms that won’t rest until every teenager’s value system has been pureed into a fine slurry of outrage and nihilism. Such that their sense of self dissolves into the algorithm.
No just no, running your car on a virtualised operating system doesn't sound too stable to me. For instance if updating the infotainment system caused the steering wheel to change orientation. Isolated independent dedicate hardware doing the one task is the most reliable solution.
@Doctor Syntax: “I wonder if they've considered treating CLoudflare as a gatekeeper.”
Yes, if they can be used as an instrument of government sanctions.
Dan 55: “Absolutely. But rest assured they are memory safe bugs so there is no need to concern yourself while the userland bug count is set back by two decades.”
ClippyAI: “Although written in Rust, the vulnerability is a logic issue, not a memory safety bug”
‘It operated in-memory, left "minimal" forensic artifacts, and injected itself into running threads using Java reflection, according to the cloud giant's threat intel team.’
‘Reflection is a feature in the Java programming language. It allows an executing Java program to examine or "introspect" upon itself, and manipulate internal properties of the program.’
These sprawling AI superclusters, stitched together across continents and hyped as models of redundancy, risk turning into exactly the opposite — a mega distributed single point of failure. One misbehaving subsystem, a power hiccup, or a compromised control network could send shock waves through supposedly independent sites, turning distributed design into synchronized disaster.
As of 2035, non–von Neumann secure substrates have effectively brought an end to traditional malware. Modern systems no longer rely on the vulnerable principles of executable code injection, direct memory manipulation, or unrestricted Turing-complete instruction sets that once defined classical computing.
Computation now takes place entirely within fully homomorphic encrypted environments, running on optically isolated quantum–analog processors. In these architectures, data and instructions are cryptographically entangled, preventing any form of unauthorized code execution both physically and mathematically.
This has given rise to the first generation of self-securing computing infrastructure. Natively immune to malware, exploits, and unauthorized modification. Rendering most forms of reactive cybersecurity effectively obsolete.
> .. a clear large majority of desktop environments in FOSS today share the same design, and it's a design that originated in Windows. Nearly 20 years ago, Microsoft threatened to sue over it. It never happened ..
Because Microsoft borrowed most of the elements from Apple. Apple sued Microsoft in March 1988 over borrowing "look and feel". Microsoft's defense was; you borrowed it from the same place we did - Xerox's Palo Alto.
JLR Breach Breakdown: Analysis of the JLR Hack and Lessons Learned
“JLR Cyberattack: What went wrong & how it could have been prevented”