1
74

Hey Beeple and visitors to Beehaw: I think we need to have a discussion about !technology@beehaw.org, community culture, and moderation. First, some of the reasons that I think we need to have this conversation.

  1. Technology got big fast and has stayed Beehaw's most active community.
  2. Technology gets more reports (about double in the last month by a rough hand count) than the next highest community that I moderate (Politics, and this is during election season in a month that involved a disastrous debate, an assassination attempt on a candidate, and a major party's presumptive nominee dropping out of the race)
  3. For a long time, I and other mods have felt that Technology at times isn’t living up to the Beehaw ethos. More often than I like I see comments in this community where users are being abusive or insulting toward one another, often without any provocation other than the perception that the other user’s opinion is wrong.

Because of these reasons, we have decided that we may need to be a little more hands-on with our moderation of Technology. Here’s what that might mean:

  1. Mods will be more actively removing comments that are unkind or abusive, that involve personal attacks, or that just have really bad vibes.
    a. We will always try to be fair, but you may not always agree with our moderation decisions. Please try to respect those decisions anyway. We will generally try to moderate in a way that is a) proportional, and b) gradual.
    b. We are more likely to respond to particularly bad behavior from off-instance users with pre-emptive bans. This is not because off-instance users are worse, or less valuable, but simply that we aren't able to vet users from other instances and don't interact with them with the same frequency, and other instances may have less strict sign-up policies than Beehaw, making it more difficult to play whack-a-mole.
  2. We will need you to report early and often. The drawbacks of getting reports for something that doesn't require our intervention are outweighed by the benefits of us being able to get to a situation before it spirals out of control. By all means, if you’re not sure if something has risen to the level of violating our rule, say so in the report reason, but I'd personally rather get reports early than late, when a thread has spiraled into an all out flamewar.
    a. That said, please don't report people for being wrong, unless they are doing so in a way that is actually dangerous to others. It would be better for you to kindly disagree with them in a nice comment.
    b. Please, feel free to try and de-escalate arguments and remind one another of the humanity of the people behind the usernames. Remember to Be(e) Nice even when disagreeing with one another. Yes, even Windows users.
  3. We will try to be more proactive in stepping in when arguments are happening and trying to remind folks to Be(e) Nice.
    a. This isn't always possible. Mods are all volunteers with jobs and lives, and things often get out of hand before we are aware of the problem due to the size of the community and mod team.
    b. This isn't always helpful, but we try to make these kinds of gentle reminders our first resort when we get to things early enough. It’s also usually useful in gauging whether someone is a good fit for Beehaw. If someone responds with abuse to a gentle nudge about their behavior, it’s generally a good indication that they either aren’t aware of or don’t care about the type of community we are trying to maintain.

I know our philosophy posts can be long and sometimes a little meandering (personally that's why I love them) but do take the time to read them if you haven't. If you can't/won't or just need a reminder, though, I'll try to distill the parts that I think are most salient to this particular post:

  1. Be(e) nice. By nice, we don't mean merely being polite, or in the surface-level "oh bless your heart" kind of way; we mean be kind.
  2. Remember the human. The users that you interact with on Beehaw (and most likely other parts of the internet) are people, and people should be treated kindly and in good-faith whenever possible.
  3. Assume good faith. Whenever possible, and until demonstrated otherwise, assume that users don't have a secret, evil agenda. If you think they might be saying or implying something you think is bad, ask them to clarify (kindly) and give them a chance to explain. Most likely, they've communicated themselves poorly, or you've misunderstood. After all of that, it's possible that you may disagree with them still, but we can disagree about Technology and still give one another the respect due to other humans.
2
28

I just set up my Loops account in order to beta test the iOS app.

Uploaded my first video here: https://loops.video/v/5s_wUUCHsZ

So far so good.

3
50
submitted 13 hours ago by Templa@beehaw.org to c/technology@beehaw.org

spoilerIt seems the Honey Coupon extension wasn't just making money by tracking purchases from users, but also by taking credit for the sales for PayPal (since they are owned by it) by changing your local cookies. Pretty shady if you ask me.

4
199

Archived link

Opinionated article by Alexander Hanff, a computer scientist and privacy technologist who helped develop Europe's GDPR (General Data Protection Regulation) and ePrivacy rules.

We cannot allow Big Tech to continue to ignore our fundamental human rights. Had such an approach been taken 25 years ago in relation to privacy and data protection, arguably we would not have the situation we have to today, where some platforms routinely ignore their legal obligations at the detriment of society.

Legislators did not understand the impact of weak laws or weak enforcement 25 years ago, but we have enough hindsight now to ensure we don’t make the same mistakes moving forward. The time to regulate unlawful AI training is now, and we must learn from mistakes past to ensure that we provide effective deterrents and consequences to such ubiquitous law breaking in the future.

5
65
Should you bother with... mini PCs? (www.rockpapershotgun.com)
6
55

Albania's prime minister has announced the government intends to block access to TikTok for one year after the killing of a schoolboy last month raised fears about the influence of social media on children.

Speaking on Saturday Edi Rama declared the proposed ban would start in January.

[...]

The blocking of TikTok comes less than a month after the 14-year-old student was killed and another injured in a fight near a school in southern Tirana which had its roots in a confrontation on social media.

The killing sparked a debate in Albania among parents, psychologists and educational institutions about the impact of social networks on young people.

"In China, TikTok promotes how students can take courses, how to protect nature, how to keep traditions, but on the TikTok outside China we see only scum and mud. Why do we need this?", Rama said.

TikTok is already banned in India, which was one of the app's largest markets before it was outlawed in June 2020. It is also blocked in Iran, Nepal, Afghanistan and Somalia.

TikTok is also fighting against a law passed by the US Congress which would ban the app from 19 January unless it is sold by ByteDance - its Chinese parent

company.

7
172
submitted 3 days ago* (last edited 3 days ago) by along_the_road@beehaw.org to c/technology@beehaw.org
8
25

Archived version

Download study (pdf)

GitHub, the de-facto platform for open-source software development, provides a set of social-media-like features to signal high-quality repositories. Among them, the star count is the most widely used popularity signal, but it is also at risk of being artificially inflated (i.e., faked), decreasing its value as a decision-making signal and posing a security risk to all GitHub users.

A recent paper by Cornell University published on Arxiv, the researchers present a systematic, global, and longitudinal measurement study of fake stars in GitHub: StarScout, a scalable tool able to detect anomalous starring behaviors (i.e., low activity and lockstep) across the entire GitHub metadata.

Analyzing the data collected using StarScout, they find that:

(1) fake-star-related activities have rapidly surged since 2024

(2) the user profile characteristics of fake stargazers are not distinct from average GitHub users, but many of them have highly abnormal activity patterns

(3) the majority of fake stars are used to promote short-lived malware repositories masquerading as pirating software, game cheats, or cryptocurrency bots

(4) some repositories may have acquired fake stars for growth hacking, but fake stars only have a promotion effect in the short term (i.e., less than two months) and become a burden in the long term.

The study has implications for platform moderators, open-source practitioners, and supply chain security researchers.

9
104
submitted 4 days ago* (last edited 4 days ago) by thelucky8@beehaw.org to c/technology@beehaw.org

Archived

Here is the report (pdf) -- (archived)

Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats, making the consequences of this vulnerability far-reaching.

The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the account holder with any indication of trouble.

[Edit to insert the original link to the Oasis site.]

10
56
11
24
12
41
13
13
submitted 3 days ago by z3rOR0ne@lemmy.ml to c/technology@beehaw.org

Brian Merchant and Paris Marx are back with the very first guest of System Crash: Molly White! With Molly’s help, we walk through the biggest stories in the crypto world. We explore the resurgence of crypto, how its backers influenced the election and won Trump’s favor, what the crypto industry wants from the incoming administration—and how it plans to wield power.

14
130
15
40
submitted 5 days ago by alyaza@beehaw.org to c/technology@beehaw.org

The gig economy’s labor model and its algorithmic management technologies now have a foothold in one of the largest labor sectors in the country: health care. On-demand nursing companies such as CareRev, Clipboard Health, ShiftKey, and ShiftMed have promised hospitals more control and nurses more flexibility. Through original interviews with 29 “gig” nurses and nursing assistants, this brief finds that these apps encourage nurses to work for less pay, fail to provide certainty about scheduling and the amount or nature of work, take little to no accountability for worker safety, and can threaten patient well-being by placing nurses in unfamiliar clinical environments with no onboarding or facility training. On-demand nursing platforms are also using the Uber playbook to lobby state legislatures in an attempt to exempt themselves from existing labor regulations. In the wake of the COVID-19 pandemic, nurses have fled the profession as a result of poor working conditions, creating what some have incorrectly identified as a “nursing shortage.” As gig nursing platforms falsely promise to empower workers and meet their needs, it is up to legislators, policymakers, civic leaders, and community organizations to act to solve the real problems at the root of this crisis.

16
94
submitted 5 days ago by chobeat@lemmy.ml to c/technology@beehaw.org
17
23
18
34
19
41

Original article paywalled

Authorities in the US are considering a ban on TP-Link internet routers over national security concerns due to their repeated links to Chinese cyberattacks. Investigators at the Commerce, Defense, and Justice departments have all launched probes into the company [...] with TP-Link reportedly being subpoenaed by an office of the Commerce Department.

[...]

TP-Link holds roughly 65 percent of the US router market for homes and small businesses, and its internet communications products are used by the Defense Department and other federal government agencies. The company’s market dominance is at least partly driven by the extreme low cost of its routers. The US Justice Department is investigating whether TP-Link sells products for less than they cost to produce in violation of a law that prohibits attempts at monopolies.

[...]

20
78
submitted 6 days ago by chobeat@lemmy.ml to c/technology@beehaw.org
21
22
submitted 6 days ago by Troy@beehaw.org to c/technology@beehaw.org

Study download: Progress in Diversifying the Global Solar PV Supply Chain (pdf)

TLDR:

Until the end of this decade, China and Chinese manufacturers will retain some domination over the global solar PV chain. However, the global solar PV supply chain is becoming more robust thanks to the diversification of crystalline silicon modules manufacturing capacity in the United States, Europe, Southeast Asia, and India, according to a report by Japan's Renewable Energy Institute.

In the 2030s, improvements in solar PV recycling and the widespread adoption of new technologies like perovskite cells, which development is led by China (glass substrate) and Japan (film substrate), will provide new opportunities to further diversify the global solar PV supply chain.

This progress will strengthen worldwide energy security and facilitate the much-needed acceleration of the energy transition.

Geographic concentration of the global solar supply chain exposes the supply chain to some drawbacks, the report finds. The potential disruption risks associated with this type of concentration include natural hazards such as earthquakes and fires, and extreme weather events such as drought and flooding. "For instance, in 2020 and 2022, the global production of polysilicon was reduced because of flooding and fire issues at a handful of Chinese plants," the study says.

The report also mentions both the situation in China's Xinjiang region and Uyghur forced labour as well as China's coal intensity as concerns with China's dominance of global solar supply chain as main drivers of diversification. While citing "human rights violations, unfair trade practices, and environmental pollution," the study criticizes that "the lack of transparency [across supply chains within China] has made it increasingly difficult to verify whether supply chains are free from risk of Uyghur forced labor and reduces trust in the solar industry."

Key Findings:

• As of September 2024, 99% of the world’s solar PV modules manufacturing capacity was based on crystalline silicon because this technology is inexpensive, performant, and durable. Approximately three-fourths of the economic value of crystalline silicon modules come from four minerals: silicon, silver, aluminum, and copper, which productions are generally not excessively geographically concentrated.

• Throughout the entire solar PV supply chain (i.e., polysilicon, ingots, wafers, cells, and modules), the shares of China and Chinese manufacturers often largely exceeded 80% and they were sometimes close to 100%. It is undesirable for any supply chain to be so dependent on a single country. This is the reason why diversification efforts are led across the world (e.g., United States, Europe, Japan, Southeast Asia and India).

• The Chinese industry dominates the solar PV supply chain because it has managed to maximize economies of scale and because it is well-organized around vertically integrated companies. Moreover, the Chinese solar PV industry is innovative and effectively supported by its government. Also, it benefits from affordable electricity prices, which is critical as solar PV manufacturing is electricity intensive.

• The Chinese solar PV industry is confronted with harsh criticisms due to human rights violations, unfair trade practices, and environmental pollution due to its reliance on coal power. Furthermore, China’s aggressive export strategy is blamed for solar PV products oversupply resulting in rock-bottom prices and economic losses.

• In the United States, a combination of subsidies (i.e., tax credits) and protectionist measures have been implemented. Many new projects have been announced, they now need to be realized.

• Europe tries to balance its own interests between increasing its manufacturing capacity and taking advantage of cheap Chinese imports. So far, priority has been given to demand over domestic supply as reducing electricity prices and greenhouse gas emissions are deemed more urgent issues.

• Japan puts the emphasis on perovskite cells, a promising technology that is not fully ready for commercial deployment yet. This strategy should, however, not be used as an excuse for not more proactively installing crystalline silicon. Affordable and rapid decarbonization does not need to wait for perovskite to become mainstream.

• Despite catching less attention, Southeast Asia and India significantly contribute to the diversification of the solar PV supply chain. In Southeast Asia, labor costs are low, and energy is subsidized. In India domestic-content requirements and customs duties have been implemented.

• In addition to these efforts, solar PV recycling and new technologies, like perovskite, hold the potential to be alternatives to Chinese crystalline silicon modules in the 2030s. To take off, these solutions need more governmental support.

22
34
A New Social (www.anew.social)

Seen on Bluesky minutes ago.

From the mission page:

We're betting on services built on open protocols like ActivityPub and ATProto, and focused on making it easier to connect and move between platforms. We will work directly with developers to continue ensuring competition in the open social web, with a focus on advocating for users every step of the way.

23
23
24
12
25
143

Archive

The Russian disinformation network Matryoshka has launched a new campaign aimed at convincing social media users that scholars and professors from top global universities are calling for the West to lift sanctions against Russia. In the videos, well-known academics can purportedly be heard urging Ukraine to surrender “historically Russian lands” — and even portraying Volodymyr Zelensky as a vampire. The campaign spreads this disinformation by cloning the voices of real professors using artificial intelligence (AI) tools.

The campaign was uncovered by the Bot Blocker project (which goes by the @antibot4navalny handle on X). The videos all follow a similar structure: a speaker introduces themselves, often citing an affiliation with renowned institutions like Cambridge, Harvard, Princeton, or the University of Bristol. The footage then transitions to segments without the speaker on screen — while their voice supposedly continues. During these moments, the voice promotes claims that Europe is suffering under anti-Russian sanctions, that the West must stop providing Ukraine with weapons and financial aid, that Zelensky is sending Ukrainian soldiers to their deaths, and that Ukraine must cede its territories to Russia.

Investigations by The Insider and Bot Blocker confirmed that the opening sections, in which the speakers appear and introduce themselves in person, were taken from real videos. The other portions, however, were artificially generated using AI, which effectively cloned the academics’ voices.

[...]

In [one] video, [Historian and University of Bristol Professor Ronald] Hutton begins by discussing the study of folklore. However, the footage then shifts to a portrait of Volodymyr Zelensky as a cloned version of Hutton's voice claims that the Ukrainian president is a vampire feeding on the lives of his citizens sent to fight in the war with Russia. The original video, from which the introductory segment was taken, genuinely focuses on folklore and vampires — but makes no reference to Zelensky or Ukraine. The Insider and Bot Blocker have identified other original recordings that were manipulated for similar fake videos.

[...]

The creators of these fake videos have used the voices and images of real academics from institutions including Cambridge, Harvard, Princeton, the University of Bristol, the University of Cumbria, and Sciences Po (Paris Institute of Political Studies). They also manipulated footage from events like the Bank of America Chicago Marathon.

[...]

The disinformation campaign known as Matryoshka began no later than September 2023, as first reported by Bot Blocker. Initially, the campaign organizers posted messages on Twitter (now X) addressed to Western media, urging them to “verify information” that proved to be fabricated materials containing anti-Ukrainian propaganda created by the organizers themselves. These posts were then widely shared by stolen accounts, allowing the content to spread rapidly across the platform.

The bots operate in a coordinated manner. One account might share a photo of supposed graffiti in Los Angeles depicting President Zelensky as a beggar, while another account calls on journalists to confirm whether the image is real or fake. In most cases, the bots spread defamatory videos targeting Ukrainians, often overlaid with logos of credible media outlets to lend an appearance of authenticity.

[...]

view more: next ›

Technology

37800 readers
306 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS