XTL

joined 2 years ago
[–] XTL@sopuli.xyz 1 points 12 hours ago

Thanks, I'm cured.

[–] XTL@sopuli.xyz 48 points 3 days ago

Too little, too late. But better than nothing, I guess.

[–] XTL@sopuli.xyz 9 points 3 days ago (1 children)

But are you eating enough to be a country?

[–] XTL@sopuli.xyz 17 points 3 days ago (2 children)
[–] XTL@sopuli.xyz 1 points 3 days ago
[–] XTL@sopuli.xyz 4 points 4 days ago

Sounds like Gnunet or sone other P2P system?

 

Oikea uutisotsikko tällä kertaa lehden kautta kun sattui tulemaan ensiksi vastaan.

 

Firefox may be incompatible with DFSG and probably other similar principles and TOS.

From the bug report:

The new Terms of Use, from what I can see, are in violation of the DFSG points 5 and 6:

  1. No discrimination against persons or groups

Rationale:

The terms of use grant Mozilla the right to terminate anyone's access:

Mozilla can suspend or end anyone’s access to Firefox at any
time for any reason

https://www.mozilla.org/en-US/about/legal/terms/firefox/#mozilla-can-update-or-terminate-this-agreement

  1. No discrimination against fields of endeavor

Rationale:

The terms of use don't allow you to use Firefox to break the law. While this seems a reasonable term, it wouldn't be so reasonable for a disident in an oppressive country.

you agree that you will not use Firefox to [...] violate any
applicable laws or regulations.

...

Apart from these violations of the DFSG, Firefox has now permission to leak user data to Mozilla, and who knows who else they decide to sell it later. This is a security bug.

You give Mozilla all rights necessary to operate Firefox,
including processing data as we describe in the Firefox Privacy
Notice, as well as acting on your behalf to help you navigate
the internet.  When you upload or input information through
Firefox, you hereby grant us a nonexclusive, royalty-free,
worldwide license to use that information to [...]
 

Tarkoituksena on edelleen jatkaa rakentamistyöt loppuun heti, kun sijoittaja on löytynyt. Neuvottelut ovat tämän osalta kesken. Kerromme tarkemmasta aikataulusta heti tämän jälkeen, kertoo hotellia rakennuttavan SRV:n aluejohtaja Juha Huhtanen Ylelle sähköpostitse.

Rakentamisen siirtymisestä uutisoi ensimmäisenä Kaleva. Lehti kertoi aiemmin marraskuussa, että projektille ei ollut vielä löytynyt sijoittajakumppania.

Torihotellin piti alun perin valmistua vuonna 2019. Projektin on käynnistänyt oululaisen liikemiehen Jyrki Hallikaisen ja hänen perheensä yhtiö MGP Services Oy. Hallikainen tunnetaan konkurssiin ajautuneesta Uros-yhtiöstä.

Hotellin rakennustyöt pysähtyivät helmikuussa 2022 siihen, ettei sitä rakentanut rakennusyhtiö SRV saanut maksuvaikeuksiin ajautuneelta rakennuttajalta maksuja laskuihinsa.

Sittemmin hotellin kiinteistöyhtiö asetettiin konkurssiin ja hotellikin jäi konkurssipesän hallintaan. Töiden keskeytyessä hotellista oli rakennettu noin puolet.

184
hmmm (infosec.pub)
submitted 4 months ago* (last edited 4 months ago) by XTL@sopuli.xyz to c/hmmm@lemmy.world
 

2020-luvulla Oulun kaupunginjohto on ajautunut kohusta toiseen.

Kaksi entistä johtajaa on syytteessä virkarikoksista, aiempi kaupunginjohtaja savustettiin virastaan ulos ja viimeisimpänä käänteenä kahdesta johtajasta on meneillään poliisin esiselvitys.

Vaasan yliopiston hallintotieteiden emeritusprofessori Ari Salminen toteaa, että pohjimmiltaan Oulun kaupungin ylimmässä johdossa tuntuu vallitsevan jopa korruptiivinen kulttuuri.

 

Since zig has good cross platform compiler support, libraries that improve cross platform support are also interesting.

This one is also potentially cross language.

 

”SE ON historian suurin hyökkäys vapauttamme kohtaan”, Yhdysvaltain presidentti Joe Biden totesi yhdessä sosiaalisen median viestissään heinäkuussa.

”[Se] tuhoaa Amerikan”, hän varoitti toisessa.

”Googlatkaa Project 2025”, hän kehotti kolmannessa.

 

GDPR rights are being ignored. In practice, this leads to a situation where Microsoft is trying to contractually dump most of its legal responsibilities under the GDPR on schools that provide Microsoft 365 Education services to their pupils or students.

Trying to find out exactly what privacy policies or documents apply to the use of Microsoft 365 Education is an expedition in itself. There is a serious lack of transparency, forcing users and schools to navigate a maze of privacy policies, documents, terms and contracts that all seem to apply. The information provided in these documents is always slightly different, but consistently vague about what actually happens to children’s data when they use Microsoft 365 Education services.

Maartje de Graaf, data protection lawyer at noyb: “Microsoft provides such vague information that even a qualified lawyer can’t fully understand how the company processes personal data in Microsoft 365 Education. It is almost impossible for children or their parents to uncover the extent of Microsoft’s data collection.”

Felix Mikolasch, data protection lawyer at noyb: “Our analysis of the data flows is very worrying. Microsoft 365 Education appears to track users regardless of their age. This practice is likely to affect hundreds of thousands of pupils and students in the EU and EEA. Authorities should finally step up and effectively enforce the rights of minors.”

As the terms and conditions and the privacy documentation of Microsoft 365 Education are uniform for the EU/EEA, all children living in these countries are exposed to the same violations of their GDPR rights. Therefore, noyb also suggests that the authority should impose a fine on Microsoft.

 

Hardware and embedded software engineer Kévin Courdesses has replicated research into breaking the flash encryption on selected Espressif ESP32 microcontrollers — including the ESP32-C3 and ESP32-C6 — using side-channel attacks to extract data and even bypass secure boot functionality.

"I recently read the Unlimited Results: Breaking Firmware Encryption of ESP32-V3 (Abdellatif et al, 2023) paper," Courdesses explains. "This paper is about breaking the firmware encryption feature of the ESP32 SoC [System on Chip] using a side-channel attack. This was an interesting read, and soon, I wanted to try to reproduce these results. To understand everything about this attack, I wanted to start from scratch, even if it meant sometimes reinventing the wheel."

view more: next ›