Technology

328 readers
274 users here now

Share interesting Technology news and links.

Rules:

  1. No paywalled sites at all.
  2. News articles has to be recent, not older than 2 weeks (14 days).
  3. No videos.
  4. Post only direct links.

To encourage more original sources and keep this space commercial free as much as I could, the following websites are Blacklisted:

More sites will be added to the blacklist as needed.

Encouraged:

founded 2 months ago
MODERATORS
1
 
 

PDF.

Trump Media and Technology Group Corp. (Nasdaq, NYSE Texas: DJT) ("Trump Media" or the "Company"), operator of the social media platform Truth Social, the streaming platform Truth+, and the FinTech brand Truth.Fi, announced today that the company has begun public Beta testing its new AI search feature, Truth Search AI, on the Truth Social platform.

Powered by Perplexity, a software and AI company dedicated to providing direct, contextually accurate answers with transparent citations, Truth Search AI is intended to enhance the Truth Social platform and exponentially increase the amount of information available to its users.

2
3
4
5
 
 

The advertising industry’s anticipated shift away from third-party cookies led to the proliferation and normalisation of first-party identification architectures online. Marketed as ‘privacy-friendly,’ the new technologies promise to deliver the efficiencies that advertisers have become accustomed to, while addressing privacy concerns from third-party cookies. Such tension calls for a better understanding of the privacy implications from first-party online identification architectures. We evaluate first-party user identification mechanisms by (1) surveying the literature to create a typology that synthesises existing privacy concerns in third-party cookie-based identification, and (2) applying our typology to evaluate the privacy of prime examples in what we frame as three distinct types of first-party ID architectures — Universal IDs, Onboarding ID, and Walled Garden ID. We analyse technical documentation and code repositories from each architecture type and show how first-party ID solutions still enable cross-site tracking over longer periods of time and encourage sensitive user targeting. First-party ID solutions do create mechanisms to ease opting out from tracking, but the implementation of those mechanisms is questionable. Our findings demonstrate how the advertising industry is trying to maintain its existing structure and replicate the tracking functionalities on which it has grown reliant.

6
 
 

Paper.

You used to believe that adversarial attacks against AI-powered systems are complex, impractical, and too academic. In reality, an indirect prompt injection in a Google invitation is all you need to exploit Gemini for Workspace's agentic architecture to trigger the following outcomes:

  • Toxic content generation
  • Spamming
  • Deleting events from the user's calendar
  • Opening the windows in a victim's apartment
  • Activating the boiler in a victim's apartment
  • Turning the light off in a victim's apartment
  • Video streaming a user via Zoom
  • Exfiltrating a user's emails via the browser
  • Geolocating the user via the browser
7
8
9
10
11
12
 
 

Article in Hebrew

The tech giant developed a customized version of its cloud platform for Israel’s Unit 8200, which is housing audio files of millions of calls by Palestinians in Gaza and the West Bank, a joint investigation reveals.

The Israeli army’s elite cyber warfare unit is using Microsoft’s cloud servers to store masses of intelligence on Palestinians in the West Bank and Gaza — information that has been used to plan deadly airstrikes and shape military operations, an investigation by +972 Magazine, Local Call, and the Guardian can reveal.

Unit 8200, roughly equivalent in function to the U.S. National Security Agency (NSA), has transferred audio files of millions of calls by Palestinians in the occupied territories onto Microsoft’s cloud computing platform, Azure, operationalizing what is likely one of the world’s largest and most intrusive collections of surveillance data over a single population group. This is according to interviews with 11 Microsoft and Israeli intelligence sources in addition to a cache of leaked internal Microsoft documents obtained by the Guardian.

In a meeting at Microsoft’s headquarters in Seattle in late 2021, the then-head of Unit 8200, Yossi Sariel, won the support of the tech giant’s CEO, Satya Nadella, to develop a customized and segregated area within Azure that has facilitated the army’s mass surveillance project. According to the sources, Sariel approached Microsoft because the scope of Israel’s intelligence on millions of Palestinians in the West Bank and Gaza is so vast that it cannot be stored on military servers alone.

Microsoft’s immense storage and computing power capabilities enabled what multiple Israeli sources described as the project’s ambitious goal: to store “a million calls an hour.”

Following the 2021 meeting, a dedicated team of Microsoft engineers began working directly with Unit 8200 to build a model that would allow the intelligence unit to use the American company’s cloud services from within its own bases. According to one intelligence source, some of these Microsoft employees were themselves alumni of Unit 8200, which made the collaboration “much easier.”

According to the Guardian’s reporting, the leaked documents suggest that 11,500 terabytes of Israeli military data — equivalent to roughly 200 million hours of audio — were being stored on Microsoft’s servers in the Netherlands by July of this year, while smaller portions were being stored in Ireland and Israel. It is not possible to tell how much of this data belongs specifically to Unit 8200; as a previous investigation by +972, Local Call, and the Guardian revealed earlier this year, dozens of Israeli army units have purchased cloud computing services from Microsoft, and the company has a footprint in all major military infrastructures in Israel.

13
14
15
16
17
18
19
20
 
 
  • Rise in accessible AI tools significantly lowered the barrier to entry for cyber attackers, enabling them to create and deploy malicious bots at scale
  • For the first time in a decade, automated traffic surpassed human activity, accounting for 51% of all web traffic
  • API-directed attacks surged to 44% of advanced bot traffic, with the travel sector topping the list for bot attacks overall
21
22
23
24
25
view more: next ›