Admin of lemmy.name, he/him

  • 20 Posts
  • 39 Comments
Joined 1Y ago
cake
Cake day: Jun 29, 2023

help-circle
rss
> The complaint outlined the process by which minors can use the Roblox platform to gamble. After purchasing Robux through the platform, they can navigate to one of the gaming website defendants’ “virtual casinos” outside the Roblox ecosystem and link their Robux wallet to the gambling website, meaning Roblox can still keep track of electronic transfers, the lawsuit said. > While Roblox could halt this “illegal gambling ring,” Colvin and Sass argued that it’s “significantly enriched” by the scheme. They allege that Roblox charges a 30% fee on the websites’ conversion of Robux back into dollars, raking in “millions in annual cash fees.”
fedilink

Read the thread in full, it’s much worse than The Verge makes it out to be - that was actually one of my contentions with this article when posting.


I don’t think this take is accurate at all. Her actions in that thread appear (to me) entirely as a result of her environment, and honestly there is no basis for the idea she is not of sound mind. The victim blaming is really offputting.

If they’re true, it’s more than likely this kind of abuse was happening throughout the organization and continued up until these allegations, so I’m glad she came out with them.


> Last night, at approximately 2AM ET, a former employee, Madison Reeve, posted a thread on X, the platform formerly known as Twitter, accusing Linus Media Group of cultivating a toxic work environment and encouraging a work culture that was detrimental to her health as well as sexual harassment directed at her by Linus Media Group employees. > “I chose to quit my role at LTT because it, and the working environment I was facing, were ruining my mental health,” her statement begins. “My work was called ‘dogshit’ I was called ‘incompetent’. When I would reach out to managers and try to get help with these situations, I would be told to ‘put on my big girl pants’ and be ‘more assertive’.” > Reeve went on to accuse the company of barring her from videos after she reported being “grabbed multiple times in the office” and being told to “calm my tits” and “stop being such a bitch.” Madisons' thread: https://threadreaderapp.com/thread/1691693740254228741.html (Content warning: self harm)
fedilink

Oracle, SUSE and others caught up in RHEL drama hit back with OpenELA
> A non-profit called the Open Enterprise Linux Association (OpenELA) has been formed by Oracle, SUSE, CIQ, and other organizations that make Red Hat Enterprise Linux (RHEL) and CentOS rebuilds. > So far they're promising to "establish and make accessible the sources, tooling, and assets to all members, collaborators, and the open source Enterprise Linux distribution developers to create and maintain 1:1 downstream derivatives of EL."
fedilink

> The Civil Liability for Doxing Act, which takes effect on January 1, 2024, passed after a unanimous vote. It allows victims to recover damages and to request "a temporary restraining order, emergency order of protection, or preliminary or permanent injunction to restrain and prevent the disclosure or continued disclosure of a person's personally identifiable information or sensitive personal information." > It's the first law of its kind in the Midwest, the Daily Herald reported, and is part of a push by the Anti-Defamation League (ADL) to pass similar laws at the state and federal levels. ADL's Midwest regional director, David Goldenberg, told the Daily Herald that ADL has seen doxxing become "over the past few years" an effective way of "weaponizing" the Internet. ADL has helped similar laws pass in Maryland, Nevada, Oregon, and Washington.
fedilink

Chrome to shield encryption keys from promised quantum computers
> Devon O'Brien, technical program manager for Chrome security, explained on Thursday that starting in Chrome 116 – due August 15 – Google's browser will include support for X25519Kyber768, an alphanumeric salad that desperately needs a catchy name. > The unwieldy term is a concatenation of X25519, an elliptic curve algorithm that's currently used in the key agreement process for establishing a secure TLS connection, and Kyber-768, a quantum-resistant KEM that last year won NIST's blessing for post-quantum cryptography.
fedilink

Pokémon Company Uses Fan Music In Trailer Without Crediting The Fan - Techdirt
> Fans are expressing their concerns after The Pokémon Company seemingly used fan-created music in a recent trailer for the Pokémon Scarlet & Violet DLC, The Hidden Treasure of Area Zero. The uproar began shortly after today’s Pokémon Presents wrapped up. While many tuned in for updates on things like Detective Pikachu Returns and the aforementioned add-on content, musician NightDefined (a.k.a. ND) noticed that some of the footage featured music they created. In many cases, it might be an honor for a fan to see their Pokemon fan music creation used by a company they admire, but for ND, it was also a surprise.
fedilink

USB-C confirmed for the iPhone 15 in new leaked images - Macworld
> We’ve known that the iPhone is switching to USB-C for a while now, but there was always a possibility that Apple would stick with Lightning for one more year. Based on the latest leaked images, however, Apple is all-in on USB-C for the iPhone 15 and iPhone 15 Pro models, with USB-C parts for the iPhone 15, iPhone 15 Plus, and iPhone 15 Pro Max all shown in a leaked image by X user fix Apple. > With the switch to USB-C, nearly all of Apple’s devices will have adopted the new standard, with only AirPods, Mac accessories, and the iPhone SE remaining aside from older iPhones and the 9th-gen iPad.
fedilink

tl;dr: Customer Content encompasses all data originating from your machine sent to Zoom servers.


It never is by default. In fact, they got in a bit of a fiasco early on (before their current E2EE implementation) for using the term “end to end encrypted” after it was revealed they were simply referring to TLS.


Maybe, it’s definitely a possibility. What’s weird is the original uploader (https://1337x.to/user/VitaminX/) remains unaffected and users were reporting this up to 3 days before it was taken down with very compelling evidence - the miner was barely hidden and only when it blew up on Reddit was any action taken.


Absolutely. It took a bit of digging, but I found an archive with some of the comments: https://web.archive.org/web/20230805153327/https://www.1337x.to/torrent/5753101/Baldurs-Gate-3-GOG-Digital-Deluxe-Edition-Multi13-Baldur-s/

It only goes up to yesterday, so some of the recent comments (especially from mods) are missing - but this should provide sufficient evidence. Mods’ combative and defensive comments from today were widely viewed (just look at Reddit), their authenticity is not under question. That being said, comments from Ex0duS5150 are present, proving mods were aware of the listing early on.

User comments provide proof that malware was uploaded (and 1337x mods themselves admitted it was malware in the Reddit response), yet VitaminX remains unaffected on the site: https://1337x.to/user/VitaminX/


Also, to be clear, there is no evidence one way or the other that 1337x mods took a share of the money - not what anyone here really cares about anyways. What’s being put under scrutiny is the fact that they defended a listing which was clearly malware only until it gained attention on Reddit and similar.


You replied to this comment:

I think there’s been comments calling out the malware that have been deleted, possibly by the admins. In addition the infected torrentes stayed up for a long while (not sure if they still are or not)

… with this reply:

Haven’t seen any evidence of either of those things though…

Can you see how I would misunderstand what you were talking about here?


They admit the listing existed in that statement, and there are easily accessible records of 1337x mods defending the listing prior to its deletion (such as the comment I had also provided in my post). You may need to re-read it?

I can provide additional sources if necessary.




1337x mod response on Reddit, seemingly confirming the existence of the torrent: https://i.imgur.com/ij4CXIm.png

They appear to be implying that it was only checked, verified to be malware and deleted… after the listing was vigorously defended by mods and users complaining that it was malware were banned. Very odd.

EDIT: Found an archived copy of the listing before it was taken down by 1337x mods. Includes some comments (up to yesterday).

https://web.archive.org/web/20230805153327/https://www.1337x.to/torrent/5753101/Baldurs-Gate-3-GOG-Digital-Deluxe-Edition-Multi13-Baldur-s/

User comments provide proof that malware was uploaded (and 1337x mods themselves admitted it was malware in the Reddit response), yet VitaminX remains unaffected on the site: https://1337x.to/user/VitaminX/


There are preserved comments from the 1337x mods, such as:

Ex0duS5150: the next user posting, “Trojan found” is getting the ban hammer. Stop it with the n00bishness. this torrent is not dirty if you dont know what your doing stop DLing torrents.

reply:

IGGGAMESCOM: @Ex0duS5150: thank you so much for this reassurance buddy, now I can breathe a sigh of relief instead of having to “fight” with those guys, lol.


If the admins endorse malware, it’s best to assume the entire site is compromised.


It’s worth noting that KaiOS, a fork of Firefox OS, has been successful - particularly in developing markets.


You’re correct, I mistakenly copied the wrong section. (Posted this from my phone)

Fixed!


Relevant text: > 10.4 Customer License Grant. You agree to grant and hereby grant Zoom a perpetual, worldwide, non-exclusive, royalty-free, sublicensable, and transferable license and all other rights required or necessary to redistribute, publish, import, access, use, store, transmit, review, disclose, preserve, extract, modify, reproduce, share, use, display, copy, distribute, translate, transcribe, create derivative works, and process Customer Content and to perform all acts with respect to the Customer Content: (i) as may be necessary for Zoom to provide the Services to you, including to support the Services; (ii) **for the purpose of product and service development, marketing, analytics, quality assurance, machine learning, artificial intelligence,** training, testing, improvement of the Services, Software, or Zoom’s other products, services, and software, or any combination thereof; and (iii) for any other purpose relating to any use or other act permitted in accordance with Section 10.3. If you have any Proprietary Rights in or to Service Generated Data or Aggregated Anonymous Data, you hereby grant Zoom a perpetual, irrevocable, worldwide, non-exclusive, royalty-free, sublicensable, and transferable license and all other rights required or necessary to enable Zoom to exercise its rights pertaining to Service Generated Data and Aggregated Anonymous Data, as the case may be, in accordance with this Agreement.
fedilink

We’ve already seen this play out in several countries where web blocking is widely implemented (eg Russia, China.) People (generally) flock to state-endorsed alternatives rather than going through the effort of finding bypasses.

(As an aside, Chrome would probably comply with it. It’d be a lot more damaging for them than smaller browsers to block the entirety of France.)


Do you genuinely believe an average computer user, when presented with a block page, would attempt to circumvent it?

Maybe a small minority would, but overall I find it extremely unlikely. It takes a lot less effort to just download an alternative.


Theoretically yes, but I’d think that would just result in users switching to browsers which do comply with the law (Chrome, probably)


> The case started in August 2021 with a complaint that de Paço was upset about the Portuguese and English language versions of the articles about him. The first judicial pass went well. But that’s where the good news ends. The next level of Portugal’s court system decided the lower court was wrong about everything, which means that — for now — the person wanting to memory hole past allegations at least temporarily has the upper hand. The Portuguese court ruled against them on 13 July, and demanded that the Foundation turn over personal data about multiple users who worked on the article. > Obviously, Wikimedia is not just going to hand over user info just because this court weirdly decided it’s the guy who just wants people to stop making (apparently) factual allegations against him. Not only would this surrender of info go against Wikimedia’s own standards, it goes against European law, which does not align with this strange decision by Portugal’s appellate-level court.
fedilink

France’s browser-based website blocking proposal sets a disastrous precedent for the open internet
> In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. Article 6 (para II and III) of the SREN Bill would force browser providers to create the means to mandatorily block websites present on a government provided list. Such a move will overturn decades of established content moderation norms and provide a playbook for authoritarian governments that will easily negate the existence of censorship circumvention tools. > While motivated by a legitimate concern, this move to block websites directly within the browser would be disastrous for the open internet and disproportionate to the goals of the legal proposal – fighting fraud. It will also set a worrying precedent and create technical capabilities that other regimes will leverage for far more nefarious purposes. Leveraging existing malware and phishing protection offerings rather than replacing them with government provided, device level block-lists is a far better route to achieve the goals of the legislation.
fedilink

> Tribal Secretary Sam Strong said in an interview with MPR News that it’s an opportunity to regulate business at a time when fentanyl is being found more often in cannabis products. > “Fentanyl has been taking a deadly toll in our community,” said Strong. “We want to make sure that we’re protecting those that choose to participate.” Reservations throughout the state are expected to start selling recreational cannabis before licensed shops, who may have to wait until 2025.
fedilink


>Meta briefly made Threads available on the web before pulling profiles offline a few hours later. The Verge was able to access Meta CEO Mark Zuckerberg’s first thread (is that what we call them?!) using the web app, and many other brands and creators including Netflix, Gary Vee, and Instagram. >The head of Instagram, Adam Mosseri, already has nearly 2,500 followers, and Zuckerberg has less than 2,000, so it’s safe to say that early Threads access has only been provided to a few thousand testers so far. Alessandro Paluzzi has discovered some of the brands and creators that got early access.
fedilink

I love RedReader, but I know that the accessibility exemption is temporary. It could end whenever.

It just makes more sense to move to Lemmy regardless.


>Microsoft and OpenAI were sued on Wednesday by sixteen pseudonymous individuals who claim the companies' AI products based on ChatGPT collected and divulged their personal information without adequate notice or consent. >The [complaint](https://storage.courtlistener.com/recap/gov.uscourts.cand.414754/gov.uscourts.cand.414754.1.0.pdf) [PDF], filed in federal court in San Francisco, California, alleges the two businesses ignored the legal means of obtaining data for their AI models and chose to gather it without paying for it. >"Despite established protocols for the purchase and use of personal information, Defendants took a different approach: theft," the complaint says. "They systematically scraped 300 billion words from the internet, 'books, articles, websites and posts – including personal information obtained without consent.' OpenAI did so in secret, and without registering as a data broker as it was required to do under applicable law."
fedilink

>Chipmaker TSMC said on Friday that one of its hardware suppliers experienced a “security incident” that allowed the attackers to obtain configurations and settings for some of the servers the company uses in its corporate network. The disclosure came a day after the LockBit ransomware crime syndicate listed TSMC on its extortion site and threatened to publish the data unless it received a payment of $70 million. >The hardware supplier, Kinmax Technology, confirmed that one of its test environments had been attacked by an external group, which was then able to retrieve configuration files and other parameter information. The company said it learned of the breach on Thursday and immediately shut down the compromised systems and notified the affected customer.
fedilink

I find it interesting that even the conservancy can’t really say whether or not it’s OK legally definitively. Here’s hoping someone still takes them to court over this, wins, and sets precedence that it’s a violation of the GPL (extremely unlikely, but a guy can dream)

I remember people talking about potential scenarios very similar to this when Red Hat was acquired. They were right.


We clearly have a disconnect here. There’s a reason I always put a quote to act as summary in the description of my article posts, they provide more detail than the title could. At the end of the day, I think providing the original title regardless of its perceived quality is the better option when these posts are glorified links anyways. (I assure you it was not from AI, The Register has pretty high journalistic standards.)


When most people think of clickbait, there is a disconnect between the content presented and the title. There is no such disconnect in this case. Your interpretation of the word is an outlier, and even if I agreed that it was clickbait, you still haven’t convinced me it is a bad thing in this specific scenario.


Yeah - even if it technically isn’t legal, GPL violators have a long history of getting away with it. IBM has a legal team that’ll scare almost anyone away.


It could be argued that is also a restriction disallowed by the GPL (in my mind any terms that bring negative consequences for expressing your rights given by the license are restrictions), but at that point it’s really beyond my expertise on this subject. I’m not sure if the GPLv3 even defines this at all - maybe Red Hat is banking on that ambiguity.


Accidentally deleted my last comment… but a summary of what I had said, I don’t think it’s clickbait. This is an inflection point for the entire space and I actually considered changing the title because I didn’t think it properly expressed just how damaging it is. It restricts people receiving RHEL source, compromising existing derivatives and essentially closing off the possibility of any more. RHEL is an extremely influential distro, others will follow its lead. Also, it’s a copy and paste of the original title.

If you think anything I’ve said here is incorrect or you have a different perspective, I’m totally open for discourse. Just don’t go around leaving negative comments without explaining yourself - I was hoping this community would be better than Reddit too.

(Lemmy REALLY needs a confirmation box for that. Not the first time lol)


…I don’t see how this is clickbait, this is a major damaging move to downstream distros. They can no longer use RHEL source. Also, I just copy and pasted the original article’s title. RHEL is an extremely influential distro, others will follow its lead.

I actually considered changing it at first because I didn’t think it properly conveyed just how damaging to open source this is. This is an inflection point for the entire space. Red Hat is one of the most influential distros and others will follow its lead.

If you disagree with my take, fair, but tell me why. Same for all the people upvoting @carlyman’s comment. I want to have real discourse with you all, and I will change the title if you have good reasoning that it is in fact inaccurate. Like you said, we don’t want this to be like Reddit.


Another excerpt from the GPLv3 that explicitly describes and disallows what Red Hat is doing - you are explicitly not allowed to add any restrictions when you redistribute GPLv3 licensed software:

If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term.

…aaand an additional excerpt which disallows Red Hat’s restrictions:

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License.

(note: “original licensors” is not Red Hat regarding any software other than their own. Red Hat cannot change or infringe upon rights received from upstream.) and ANOTHER excerpt:

If you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code.

I was confused they didn’t think of this either, but the language in the license is very clear. I see no way it cannot be infringing - the only way you can be restricted from redistributing GPLv3’d source is if you publish it incorrectly. If you override these rights in any way, you lose your license to distribute the GPLed software and it turns into piracy.

That’s ignoring the variety of other OSS licenses used for software in their repositories, many of which have similar (or even broader) redistribution rights.

Relevant GPLv3 language:

Section 4. Conveying Verbatim Copies.

"You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program."


Section 5. Conveying Modified Source Versions.

"You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so."

Most of their stuff is under the GPL. It’s a GPL violation to not allow their customers to share the source. I’m guessing they’ll reverse this decision (or selectively release everything they’re obligated to) within a week.


> A superficially modest [blog post](https://www.redhat.com/en/blog/furthering-evolution-centos-stream) from a senior Hatter announces that going forward, the company will only publish the source code of its CentOS Stream product to the world. In other words, only paying customers will be able to obtain the source code to Red Hat Enterprise Linux… And under the terms of their contracts with the Hat, that means that they can't publish it.
fedilink

> AI programs such as TensorFlow, PyTorch, and Hugging Face Hub work well under their open source licenses. The new AI artifacts are another story. Datasets, models, weights, etc. don't fit squarely into the traditional copyright model. (OSI director) Maffulli argued that the tech community should devise something new that aligns better with our objectives, rather than relying on "hacks." >Specifically, open source licenses designed for software, Maffulli noted, might not be the best fit for AI artifacts. For instance, while MIT License's broad freedoms could potentially apply to a model, questions arise for more complex licenses like Apache or the GPL. Maffulli also addressed the challenges of applying open source principles to sensitive fields like healthcare, where regulations around data access pose unique hurdles.
fedilink

I think this might be true for iOS, isn’t the case on Android.


Yup, a lot of very sophisticated mobile malware does not have persistence. His advice holds up.


At the current usage, I really doubt it. If a significant amount of people start using RSS readers as an alternative to the third party clients they were using previously, it’s a possibility.


This strikes me as very exploitative. Capitalizing on loneliness to enrich yourself gives me bad vibes (especially when the users of this thing may actually be worse off mentally in the end, as @cnnrduncan mentioned).

I have no doubts that for some users, it’ll turn into a cycle. They’ll feel lonelier each time they use it, which pushes them to use it more, and so on. I had the same feelings about Replika years before ChatGPT became a thing.


>As Biden noted, the FCC "proposed a new rule that would require cable and satellite TV providers to give consumers the all-in price for the service they're offering up front." The proposed rule would force companies like Comcast, Charter Spectrum, and DirecTV to publish more accurate prices.
fedilink

0.18 will also massively improve the user experience for y’all (whenever Beehaw updates). They ripped out the old websockets architecture, which eliminates all of the weird glitches like upvotes disappearing or random posts popping up in your feed.


> Judge Kevin Castel on Thursday issued an opinion and order on sanctions that found Peter LoDuca, Steven A. Schwartz, and the law firm of Levidow, Levidow & Oberman P.C. had "abandoned their responsibilities when they submitted non-existent judicial opinions with fake quotes and citations created by the artificial intelligence tool ChatGPT, then continued to stand by the fake opinions after judicial orders called their existence into question." >To punish the attorneys, the judge directed each to pay a $5,000 fine to the court, to notify their client, and to notify each real judge falsely identified as the author of the cited fake cases.
fedilink


No, but I had the Game Boy printer back in the day! Printed a lot of Pokédex entries with that guy.


improving.duckduckgo.com is not something they try to hide, you can easily disable it in your search engine settings. DDG was launched in 2008 and has a pretty solid track record - I think we can forgive the Names DB thing at this point.


Tesla FSD is generally being regarded as a joke, Twitter is being flooded by dozens (or maybe even more) lawsuits for nonpayment - it seems like maybe Neuralink/SpaceX are his only businesses that aren’t doomed at this point?


Very exciting! Jerboa is nice but it’s always great to have alternatives.


Beautiful article, perfectly articulates my feelings on this. Maybe Lemmy and the rest of the Fediverse can help us break the cycle.