in reply to Gombang

Whoa, interesting that "bini" means wife in Bahasa Indonesia, which is kind of opposite of the Tagalog meaning of "binibini." Reminds me of the difference of Tagalog "salamat" and Indonesian "selamat."

Incidentally, BINI has a song "Born To Win" that they translated to Bahasa Indonesia.

#TootSEA #Indonesia #Philippines #PlayListSEA #BINI #Asian #PPop #Languages

youtube.com/watch?v=yNAPz-CCk6…

This entry was edited (1 year ago)

👀🔎 La scorsa settimana le aziende Big Tech hanno pubblicato i loro primi report su come valutano i rischi sistemici delle loro piattaforme per gli utenti ai sensi del Digital Services Act dell'UE. Ecco cosa abbiamo scoperto finora: 🧵

Il post di People vs BigTech

@Etica Digitale (Feddit)

Il modello di business basato sulla sorveglianza, i sistemi di raccomandazione tossici e le caratteristiche di progettazione che creano dipendenza (il vero modello di business di questi giganti della tecnologia) non sono considerati fonti di rischi sistemici.

Invece, i report si concentrano sul sintomo (comportamento scorretto dell'utente, moderazione inefficace dei contenuti), ignorando la causa principale: una cattiva progettazione della piattaforma.

Ciò nonostante, le prove schiaccianti che questi sistemi causano danni, tra cui la diffusione e l'amplificazione dell'odio, della disinformazione, della divisione e l'invasione della nostra privacy per profilarci e sfruttare le nostre vulnerabilità a scopo di lucro.

Non affrontando i rischi legati alla progettazione della piattaforma e ai modelli di business, le aziende Big Tech hanno ignorato anni di ricerche indipendenti su questo tema, anche da parte dei membri di #PeoplevsBigTech

Le grandi aziende tecnologiche affermano di consultare stakeholder esterni per valutare e mitigare i rischi, ma sembra che nessuna delle +120 organizzazioni in @PeoplevsBigTech, comprese quelle che hanno pubblicato ricerche sui rischi sistemici relativi alle piattaforme di social media, sia stata consultata. La DSA afferma che dovrebbero. Coincidenza?

Ci sono anche lacune nei report, ad esempio Facebook non riesce a spiegare perché identifica alcuni rischi come bassi. Alcuni report non vanno molto oltre ciò che era già di dominio pubblico, con pochissimi dati concreti su metriche ed efficacia.

Sebbene la maggior parte delle aziende Big Tech fornisca informazioni su come mitigano i rischi identificati (alcuni dei quali sono stati suggeriti da gruppi della società civile ed esperti), nessuna di esse fornisce informazioni sull'efficacia di queste misure di mitigazione.

Ad esempio, Facebook cita l'uso di etichette di disinformazione e YouTube evidenzia la funzionalità "Breaking News Shelf" come esempi di misure di mitigazione, ma non ci vengono forniti dettagli significativi sulla loro efficacia.
Abbiamo bisogno di prove che queste misure di mitigazione funzionino (o meno) per poter giudicare se siano efficaci. Finora la ricerca ha dimostrato che le piattaforme dei social media sono progettate per coinvolgere, far infuriare e creare dipendenza, danneggiando la nostra salute mentale. Se ci sono prove del contrario, vogliamo vederle!

Anche la società civile deve essere consultata in modo significativo sui rischi sistemici correlati alle piattaforme dei social media. Avendo pubblicato molte ricerche indipendenti su questo tema, sappiamo una cosa o due sui rischi 😉

Restate sintonizzati per un'analisi più dettagliata dei report nelle prossime settimane 📑 Nel frattempo, potete trovare alcune delle nostre ricerche precedenti relative ai rischi delle piattaforme di social media qui e di seguito:

globalwitness.org/en/campaigns…

panoptykon.org/sites/default/f…

panoptykon.org/sites/default/f…

panoptykon.org/sites/default/f…

en.panoptykon.org/sites/defaul…

Ringraziamo il servizio di The Reader App per l'unroll

This entry was edited (1 year ago)

Welcome Daniel Pouzzner as #curl commit author 1323: github.com/curl/curl/pull/1565…
#curl

the next HTTP cookie draft to come, after 6265bis is published: johannhof.github.io/draft-anne…

New era of slop security reports for open source

sethmlarson.dev/slop-security-…

Yup, you guessed it. It's the LLM-garbage. Again.

Today's DecRecs is this site which lists speculative fiction in translation (into English), and I'm linking you to this page which lists SF in translation available for free, categorized by year:

sfintranslation.com/?page_id=2…
And here is SF in translation categorized by original language (if it's freely available to be read, the link will be included after the title):
sfintranslation.com/?page_id=1…
#DecRecs

Food, homemade tarte flambée (not vegan)

Sensitive content

This entry was edited (1 year ago)
in reply to Federico Mena Quintero

Food, homemade tarte flambée (not vegan)

Sensitive content

Basic Galactic Astrogation, or: How To Talk About Directions In Space

* north (up, towards the zenith, north generally the direction of the earth's north pole, but adjusted to be perpendicular with the galactic plane)
* south (down, towards the nadir, opposite of north)

* coreward (pointing from Sol towards Sag A)
* rimward (opposite of coreward)

* leading (left if viewed from clockwise spin which is convention for some reason, south facing north, bottom up; right if viewed with counterclockwise spin, top down. also sometimes called spinward)
* trailing (right if viewed from clockwise spin, left if viewed from counterclockwise spin. opposite of leading)

This entry was edited (1 year ago)

FBI releases PSA warning about all the ways that cybercriminals are using AI to commit fraud on a larger scale and to increase the success of their scams. The advisory warns about deepfaked videos and voice calls, as well as AI generated profile images to impersonate people.

Among their recommendations:

-Create a secret word or phrase with your family to verify their identity.

-Look for subtle imperfections in images and videos, such as distorted hands or feet, unrealistic teeth or eyes, indistinct or irregular faces, unrealistic accessories such as glasses or jewelry, inaccurate shadows, watermarks, lag time, voice matching, and unrealistic movements.

-Listen closely to the tone and word choice to distinguish between a legitimate phone call from a loved one and an AI-generated vocal cloning.

-If possible, limit online content of your image or voice, make social media accounts private, and limit followers to people you know to minimize fraudsters' capabilities to use generative AI software to create fraudulent identities for social engineering.

-Verify the identity of the person calling you by hanging up the phone, researching the contact of the bank or organization purporting to call you, and call the phone number directly.

-Never share sensitive information with people you have met only online or over the phone.

-Do not send money, gift cards, cryptocurrency, or other assets to people you do not know or have met only online or over the phone.

ic3.gov/PSA/2024/PSA241203

This entry was edited (1 year ago)

reshared this

in reply to BrianKrebs

I would add to this list is something I have tried to do with those in my immediate orbit who need a little more help against scams and spams: Set their phone so that incoming calls are limited to people on their contacts list; all the rest go to voicemail. At this point, we are way beyond expecting everyone to be experts at spotting fake this or that.

reshared this

Today I got the chance to ask our computer graphics professor a question that I asked myself quite some time ago: what the fuck is the color pink?

Like, the color right before infrared is red, the color right before ultraviolet is violet. And every other color is some wavelength between those two colors. EXCEPT FOR PINK!?

On a hue color wheel pink is between red and violet, so it's wavelength has to be somewhere around there, right??

Well, turns out pink is the color humans perceive when red and violet are mixed (duh), meaning the red and blue cones are stimulated. Since both cones respond to wavelengths on the opposite ends of the visible spectrum, there is no monochromatic wavelength that would trigger both, hence there is no wavelength that looks pink.

That's also the reason pink does not appear in a rainbow, because there white sunlight light, a mixture of (almost, hi Astro-fedi) all monochromatic wavelengths, is refracted based on wavelength, so no mixed colors occur in it.

I love that Walmart is a free AIRA access point. That should have happened a long time ago. However, it bothers me that they are talking about how they are committed to accessibility for the blind and visually impaired, when there iPhone app has been broken for quite some time now, among other accessibility issues throughout the shopping experience for us there. I am positive they know the search in the app is broken. Free AIRA is a tool, not a crutch. Not everyone wants a third-party in the middle of their shopping experience.
chainstoreage.com/walmart-prov…

U.S. seeks to end subminimum wage for workers with disabilities - Bloomberg apple.news/AO-Aj2kfJTSqPLx8Cqv…

I've noticed a concerning trend of "slop security reports" being sent to open source projects. Here are thoughts about what platforms, reporters, and maintainers can do to push back:

#oss #opensource #security

sethmlarson.dev/slop-security-…

This entry was edited (1 year ago)

reshared this

Reason to celebrate: the email client #Thunderbird celebrates its 20th birthday. Please remember the parent #Netscape-Suite too. It's been 30 years.

@thunderbird #mozilla

20 Years of Thunderbird
updates.thunderbird.net/en-US/…

Our #GivingTuesday campaign is officially LIVE!

We’re raising $75,000 to fund a new hire: ✨ Trust & Safety Lead ✨

A crucial role in protecting Mastodon’s growing community by strengthening our trust & safety tools incl. #moderation & server blocklists.

Your support is an investment in the future of a decentralised, free and respectful online community, where every user feels safe & supported.

Thank you for being part of this movement! 💪

Donate what you can today: givebutter.com/givingmastodon

Thanks for using us and for your feedback on the folders! We have a Mozilla Connect suggestion on this if you'd like to upvote/comment on it: connect.mozilla.org/t5/ideas/t…

The ACT (Accessibility Conformance Testing) Rules Community Group and related Task Force are looking for feedback from voice control users.

They have created a test site with 27 controls and a corresponding survey:
docs.google.com/forms/d/e/1FAI…

This is to inform WCAG SC 2.5.3 Label in Name support.

#a11 #accessibility

#AndroidAppRain at apt.izzysoft.de/fdroid today brings you 9 updated and 1 added apps:

* Redomi: Open songs from different platforms to your favourite one 🛡️

1 update had to be rejected: WeatherMaster was compiled for debug and thus the APK was not accepted for update.

RB status: 359 apps (29.4%)

At apt.izzysoft.de/magisk 2 #Magisk #modules where updated.

Enjoy your #free #Android #apps with the #IzzyOnDroid repo :awesome:

Synapse 1.120.2 was just released with several security fixes: github.com/element-hq/synapse/…
You should really update now and while the last 2 CVEs say, they were fixed on 1.106, to my knowledge that is only true if you enabled authenticated media, which only became the default in 1.120, so you really want to update even for those or at least update your config.

Thank you! :)

#matrix #synapse #security

Wow, what a clusterfuck: 404media.co/a-total-meltdown-b… (article by @jasonkoebler)

Thinking about it, their conclusion that “the app-ification of everything can lead to some pretty absurd scenarios” isn’t necessarily correct. It isn’t the app-ification – it’s delegating control to some server on the internet which is expected to have 100% availability. It’s the same issue with you losing access to your local e-books or games because a vendor went out of business. Same thing is increasingly happening to hardware which seemingly has little reason to rely on internet services.

I can think of several possible solutions which don’t rely on internet connectivity at all or only require a connection at the time of the reservation (unproblematic: without connectivity no reservation confirmation). These would deposit a token on user’s device which can be verified locally, without relying on the vendor’s server.

While this wouldn’t be hard to implement, it would require the vendor to consider their centralization a potential weakness. This isn’t aligned with their incentives however, as centralizing the system makes it easier to control everything and collect every last piece of data.

This entry was edited (1 year ago)