IllNess

joined 2 years ago
[–] IllNess 7 points 4 months ago* (last edited 4 months ago)

Imagine Senate passes a law to put cameras in all toilet motion sensor. People still go, "If you have nothing to hide, then you have nothing to worry about. Genital recognition technology is used to identify criminals! Do you want criminals to get away?!"

[–] IllNess 3 points 4 months ago

"GO TO YOUR HOME?! DON'T YOU LIKE YOUR HOME?! ARE YOU TOO GOOD FOR YOUR HOME?!"

[–] IllNess 7 points 4 months ago (2 children)

Yeah I understand.

People, like me, don't use these Microsoft files anymore but I understand I would be incredibly frustrated if one, that I need to open, lands on my lap and I can't open it.

It's just that I wonder how much code is used to even read these shitty files properly. I wonder how many human programming hours is used to deal with them that can be used to progress LibreOffice in some other way? I wonder how many times a LibreOffice programmer is yelling at their screen "WHY THE FUCK DID YOU GO TO A NEW LINE?!"

[–] IllNess 23 points 4 months ago (4 children)

Privacy matters.

The government and corporations abused this information by stopping protestors getting to their destination.

Protestors can atleast use faraday bags or just leave their phones at home. Now they can't even get to important events.

Now this information is being used by ICE to arrest immigrants.

Considering how conservative views and Nazis are coming back in to fashion, this is very scary for anyone not white and male.

[–] IllNess 7 points 4 months ago (4 children)

I understand that Microsoft documents are everywhere so I hope in some point in the future, LibreOffice would ditch all support of Microsoft files and make it an optional option during installation and as a plugin.

[–] IllNess 25 points 4 months ago

I also admire these people.

They will get fired. Same thing happened at Google. But I hope that isn't the case.

Microsoft has invested a ton of money in Israel. If in the unlikely event that they are able to be convinced to leave Israel, that would be huge.

[–] IllNess 72 points 4 months ago (1 children)

I wonder what big trial was coming up that involved one of those videos? 🤔

[–] IllNess 3 points 4 months ago

I should really keep up with Windows news even if I don't use it.

Thank you for the info and thank you for posting.

[–] IllNess 3 points 4 months ago (2 children)

That's a good point. Beta users save a lot, I mean a lot, of headaches for stable users. I am not sure if Windows even does beta and alpha versions anymore.

[–] IllNess 23 points 4 months ago

It's scarier. They will track everything you are doing not and not have to guess what device you are using behind a shared IP address.

[–] IllNess 46 points 4 months ago (1 children)

21 states have laws for age verification on porn sites. 4 more states are in the process of passing laws for age verification. That's nearly half the states...

[–] IllNess 3 points 4 months ago (1 children)

This site is getting their feed from these news sources' RSS feed. If you'd like to get the same feed, just follow each individual news source

 

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

 

"On February 21, 2024, Cencora, Inc. (the "Company"), learned that data from its information systems had been exfiltrated, some of which may contain personal information," reads the SEC filing.

Cencora says they have not determined if the incident will materially impact their finances or operations.

 

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

 

After negotiations failed when the game studio refused to pay the $2 million ransom, Rhysida dumped 1,67 TB of documents on its dark web leak site.

"We are aware that the stolen data includes personal information belonging to our employees, former employees, and independent contractors."

 

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

 

"SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

 

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
 

The five malicious apps are:

  1. Phone Cleaner - File Explorer (com.volabs.androidcleaner)
  2. PDF Viewer - File Explorer (com.xolab.fileexplorer)
  3. PDF Reader - Viewer & Editor (com.jumbodub.fileexplorerpdfviewer)
  4. Phone Cleaner: File Explorer (com.appiclouds.phonecleaner)
  5. PDF Reader: File Manager (com.tragisoap.fileandpdfmanager)
view more: ‹ prev next ›