lemmy.net.au

45 readers
1 users here now

This instance is hosted in Sydney, Australia and Maintained by Australian administrators.

Feel free to create and/or Join communities for any topics that interest you!

Rules are very simple

Mobile apps

https://join-lemmy.org/apps

What is Lemmy?

Lemmy is a selfhosted social link aggregation and discussion platform. It is completely free and open, and not controlled by any company. This means that there is no advertising, tracking, or secret algorithms. Content is organized into communities, so it is easy to subscribe to topics that you are interested in, and ignore others. Voting is used to bring the most interesting items to the top.

Think of it as an opensource alternative to reddit!

founded 1 year ago
ADMINS
726
 
 

cross-posted from : https://lemmy.zip/post/60494710

German exports recorded their sharpest decline in more than a ​year and a half in January due to falling ‌demand from China and Europe, federal statistics office data showed on Tuesday.

727
728
 
 

From the official Dutch Intelligence and Security Service


information.

“Despite their end-to-end encryption option, messaging apps such as Signal and WhatsApp should not be used as channels for classified, confidential or sensitive information,” states Director of the MIVD, vice-admiral Peter Reesink.

Individual accounts

An interesting aspect of this Russian campaign is that it does not exploit any technical vulnerabilities of the messaging services. The attackers instead make malicious use of legitimate security features of the apps. Director-General of the AIVD Simone Smit states, “It is not the case that Signal or WhatsApp as a whole have been compromised. Individual user accounts are being targeted.”

To increase resilience against this Russian campaign, MIVD and AIVD have published a Cyber Advisory explaining how to identify and respond to attacks. The advisory also give instructions for Signal users on how to identify potentially compromised contacts.

All Signal users can personally check whether there are any potentially compromised contacts in their group chats. If you see any people who appear twice in the list of members (under the same or a slightly different name), this may be evidence of either a compromised account or a new account created by a victim.If you suspect this to be the case, report this to the information security department of your organisation. Together you can try to verify (preferably using a channel other than Signal or WhatsApp, such as an email or a telephone call) whether it is correct that the account in question appears twice in the chat group contact list. Should this not be the case, ask the group administrator to remove both accounts from the group chat, after which the legitimate account holder can request to rejoin the group. Please remain vigilant for group members who are not recognised by the rest of the group. The actor may occasionally change the display name of a compromised account to remain unnoticed in chat groups, for example to names such as 'Deleted account'. If a member’s display name changes, the group will receive a notification. When the change is the legitimate transition to 'Deleted account', no notification is sent. Actor-controlled accounts can also gain entry to the group via an obtained Group Link, of which the group always receives a notification. In all such unauthorised scenarios, ask the group administrator to remove the offending accounts from the chat.If there is any indication that the group administrator themselves may have been compromised, it is advisable to exit the group and create a new one. |

729
730
 
 

He deleted his account but if you search AntipodeanPatr1 on Twitter it will show the threads he previously made and trans MLs like Leannenist called him out for transphobia.

Eureka Initiative is a clone of ACP as a clone of CPUSA

Edit: a comrade did osint and found his YouTube interview by Eureka

https://m.youtube.com/watch?v=-APp9Z0SeqM

731
 
 

The second-generation Blade battery can charge from 10-70% in just about five minutes and from 10-97% in under 10 minutes. More impressively, the company showcased the battery charging flawlessly from 20-97% at -22°F (-30°C) in just about 12 minutes, only around three minutes slower than it charges in normal temperatures.

...

The EV was plugged in at 9% state of charge with 93 kilometers of range (57 miles). In 9 minutes and 51 seconds, it charged up to 97% with the range prediction in their gauge cluster displaying 1,008 kilometers (626 miles). This is likely calibrated for the China Light-Duty Test Cycle (CLTC), which tends to be more optimistic than the Environmental Protection Agency (EPA) test cycle in the U.S.

Still, these charging speeds are way faster than the 20-40 minute charging stops on the latest EVs in the U.S. The new BYD EVs can basically recharge in nearly the same time it takes to refill a gas car. Even the new 1,500 kilowatt (1.5 megawatt) Flash charging stations are arranged like a traditional gas station for cars to quickly drive in and drive out.

732
 
 

Before the intervention, Nexperia produced wafers in Europe and packaged them into ‌chips ⁠in China. Afterwards, the company fractured, with Nexperia China declaring independence and Nexperia Europe halting wafer shipments to China, citing nonpayment.

In its statement, Nexperia China said it has begun ​using 12-inch wafers ​to make ⁠products including bipolar discrete devices, Schottky rectifiers and electrostatic discharge devices - all simple chips that ​Nexperia also makes.

733
 
 

Hi everyone

I'm trying to degoogle as much as possible. I've heard about this thing called calDAV and cardDAV but I have no idea how to use it.

With radicale, do I need to install some other somewhere in order to use it?

I'm just looking for basic useage for myself only at this stage. I'd like to be able to self host my own calendar and contacts. Is radicale appropriate for this?

Is it safe to self host a calendar?

Can a self hosted calendar still send and receive invites to other calendars?

Any help greatly appreciated, thank you

734
735
 
 

After 15 months of a fragile ceasefire, Lebanon woke up on March 2 to the familiar sounds of Israeli bombs. As the violence escalates and tens of thousands are displaced, Lebanon’s social divisions threaten to worsen an already dire situation.

736
 
 

Stolen from r/FalloutMemes

737
 
 

Capitol Police officers and Senator Sheehy broke his arm as they removed and arrested him.

[Source](https:// reddit.com/comments/1rnpf9c)

Video of Brian McGinnis's arm being broken in Congress:

Article on Brian McGinnis's arm being broken in Congress

738
 
 

A wide range of anonymous X (Twitter) users have reported that their real names are suddenly being Googled in Israel shortly after they began criticizing the country for its actions in Palestine. Some connected the phenomenon to Au10tix, the software X requires users (even anonymous ones) to use in order to verify their real identities.

Au10tix is an Israeli company founded and staffed by former Israeli spies from the elite Israeli military intelligence group Unit 8200. MintPress News investigates this disturbing phenomenon.

“The Largest Honeypot Operation On the Planet”

“I’m not even kidding when I say my full legal name, including my middle name, has been searched up in Israel 11 times in the past day,” wrote TransFemPOTUS, an anonymous X user who has been highly critical of Israel’s actions.

This was not an isolated incident. “So apparently my full legal name got searched for in Israel the other day,” revealed TheAtlantean9, an anonymous far-left user with a Palestinian flag in their bio.

Meanwhile, artist Bionico Bandito stated that “My full name got searched 100 times in Israel when I posted this,” referring to a cartoon depicting associates of Jeffrey Epstein being executed.

Across the world, from conservative Japanese accounts to American conspiracy theorists, anonymous users are reporting that data from Google Trends shows their real names, not divulged anywhere online, are being mass searched in Israel.

How could this be happening? Some laid the blame at Au10tix’s door. “Only Au10tix and X holds my data obtained from ID verification,” wrote one user in a viral post, adding, “The rumors are absolutely true.”

“Israel is now 100% confirmed to be Googling anonymous users on X and their family members shortly after they speak out against the country,” wrote another, concluding that, “X is now the largest honeypot operation on the planet.”

The theory centers around Israeli security company Au10tix, who, in 2023, was tasked with verifying users’ identities, a prerequisite for joining X’s premium service which allows users a far greater reach.

The process requires individuals to upload a picture of their passport or other photo I.D., and allow Au10tix to scan their face via their device’s camera. Au10tix claims that it deletes users’ data within 72 hours of receiving it. However, the fact that the company was founded and is staffed by veterans of notorious Israeli spying group Unit 8200 – a group that has been behind many of the most outrageous hacking, infiltration, and cyberwarfare scandals of the past decade – has led many to be extremely suspicious.

The idea that Au10tix itself, or the Israeli government could be using the data given to it by users in order to combat online criticism is far from outlandish. The Department of Homeland Security is already known to be doing the same, sending hundreds of subpoenas to Google, Facebook, Instagram, Reddit, Discord, and other large social media apps demanding they share the personal information and identities of anonymous users who have criticized the actions of Immigration Customs and Enforcement (ICE). Government officials confirmed to The New York Times that platforms have often complied with their requests.

Au10tix was founded in 2002 by Ron Atzmon, a Unit 8200 veteran whose father was treasurer of Benjamin Netanyahu’s Likud Party. It got its start providing hi-tech security systems at airports and other venues, before branching out into the online sphere.

Atzmon does not hide his strong political views. His professional LinkedIn profile is littered with posts supporting Israel, or condemning American students protesting Israel’s attack on Gaza, comparing them to the Ku Klux Klan, or reposting videos of far–right commentator Douglas Murray presenting the protestors as antisemitic supporters of terror.

A significant number of Au10tix’s employees are also ex-Israeli spooks. Until 2016, Eliran Levi was a Unit 8200 agent. In 2022, the company hired him as a developer. Others, however, go straight from the intelligence services into Au10tix. Lior Emuna, for instance, left her job as an intelligence analyst at Unit 8200 to join Au10tix. She is now an analytics manager. And in 2019, Sara Benita left her position as a mobile communications systems operator at Unit 8200 to become an engineer for the company. Director of product management, Shay Rechter, meanwhile, was a senior Israeli Defense Forces (IDF) commander before joining the organization.

Unit 8200 is the IDF’s most elite intelligence unit. Often described as “Israel’s Harvard,” it serves as the centerpiece of the country’s hi-tech spying and military apparatus. The unit is dedicated to surveillance, cyberwarfare, and online manipulation operations, and has been responsible for many of the most shocking acts of tech-based sabotage and terror in recent years.

This includes the 2024 Lebanese pager attack, where agents smuggled thousands of booby-trapped electronic devices into the country, exploding them en masse, killing 42 people and wounding thousands more. The event was widely condemned, even by former director of the CIA, Leon Panetta, as an act of terrorism.

Unit 8200 also created the notorious Pegasus software that was used to spy on more than 50,000 journalists, politicians, diplomats, business leaders and human rights defenders worldwide. Confirmed targets included President Emmanuel Macron of France, Prime Minister Imran Khan of Pakistan, and Iraqi president, Barham Salih.

Known purchasers of Pegasus include the Central Intelligence Agency and the government of Saudi Arabia, who used it to spy on Washington Post journalist Jamal Khashoggi before he was assassinated by Saudi agents in Türkiye. All sales of Pegasus had to be approved by the Israeli government, who reportedly had access to the data Pegasus’ foreign customers were accruing.

Unit 8200 also reportedly produced malware that attacked Microsoft Windows operating systems, using loopholes it found to attack control systems, delete hard drives, and shut down key systems, such as the energy infrastructure of Iran.

Surely their most deadly endeavor, however, is Project Lavender. The group developed the Lavender software, which uses A.I. and big data to develop a profile on every person in Gaza (including children), assigning them a score of 1-100, based on individuals’ perceived connections to Hamas. A wide range of characteristics, including sharing similar work schedules to or being in a WhatsApp group with a known Hamas member, would raise one’s score. If an individual’s number reached a certain level, they would automatically be put on a list.

These A.I.-driven kill lists allowed the IDF to find a way around what they called “targeting bottlenecks,” with Lavender identifying over 37,000 Palestinians to be executed in the first few weeks of the attack alone. There was little-to-no human oversight on these systems.

Lavender is known to be distinctly hit-or-miss. Many professions with similar communication patterns to Hamas, including police and firefighters, or even people with the same name as a resistance fighter, were flagged for execution. IDF sources themselves suggest a 10% false positive rate.

Unit 8200 was able to do this thanks to the massive surveillance apparatus it has built up over time. Palestinians’ every public move is watched over by facial recognition cameras. Their calls, texts, and emails are monitored. Dossiers on every Palestinian, including their medical history, sex lives and search histories, are compiled, so that this information can be used for extortion or blackmail later. If, for example, an individual is cheating on their spouse, desperately needs a medical operation, or is secretly homosexual, this can be used as leverage to turn civilians into informants and spies for Israel. One former Unit 8200 operative said that as part of his training, he was assigned to memorize different Arabic words for “gay” so that he could listen out for them in conversations.

This is why X working with Au10tix, an organization established and run by agents of foreign power, compelling users to give it their most intimate personal details, is so controversial. Unit 8200 exists to carry out cyberwarfare and clandestine spying operations around the world, and it is an open question to what extent anyone ever truly retires from the business of espionage.

While its reputation is highly controversial around the world, Unit 8200 is considered the most prestigious group within the Israeli military. In a country with mandatory national service, parents spend fortunes on science and math classes for their children, hoping they will make the highly-competitive selection process, knowing that it represents a fast track to a lucrative career in the country’s burgeoning hi-tech sector. Hundreds end up working at Google, Amazon, Facebook, and other big American tech platforms.

Au10tix has insisted that it does not store users’ personal data, including their identities. But when a company is founded, headed and staffed by individuals from one of the most infamous spying organizations on the planet – one whose modus operandi has been to infiltrate, surveil, and blackmail both its allies and its opponents – the question arises: why would we trust them?

739
 
 

cross-posted from : https://lemmy.zip/post/60489436

Before the intervention, Nexperia produced wafers in Europe and packaged them into ‌chips ⁠in China. Afterwards, the company fractured, with Nexperia China declaring independence and Nexperia Europe halting wafer shipments to China, citing nonpayment.

In its statement, Nexperia China said it has begun ​using 12-inch wafers ​to make ⁠products including bipolar discrete devices, Schottky rectifiers and electrostatic discharge devices - all simple chips that ​Nexperia also makes.

740
741
742
 
 

OpenAI claims it has accomplished what Anthropic couldn’t: securing a Pentagon contract that won’t cross professed red lines against dragnet domestic spying and the use of artificial intelligence to order lethal military strikes. Just don’t expect any proof.

Sam Altman, OpenAI’s CEO, announced the company’s big win with the Defense Department in a post on X on February 27.

“Two of our most important safety principles are prohibitions on domestic mass surveillance and human responsibility for the use of force, including for autonomous weapon systems,” he wrote. The Pentagon “agrees with these principles, reflects them in law and policy, and we put them into our agreement.”

The deal came after the very public implosion of what was to be a similar contract between the U.S. military and Anthropic, one of OpenAI’s chief rivals. Anthropic had said negotiations collapsed because it could not enshrine prohibitions against killer robots and domestic spying in its contract. The company’s insistence on these two points earned it the wrath of the Pentagon and President Donald Trump, who ordered the government to phase out use of Anthropic’s tools within six months.

But if the government booted Anthropic for refusing mass surveillance and autonomous weapons, how could OpenAI take over the contract without having the same problem?

OpenAI has attempted to square this circle through a string of posts to X by company executives and researchers, including Katrina Mulligan, its national security chief, and a claim by Altman that the company negotiated stricter protections around domestic surveillance.

The company and the government, however, are not releasing the only proof that matters: the contract itself.

The Department of Defense did not respond to a request for comment.

743
 
 

STOP THAT RIGHT NOW. NO POOPING.

NO POOPING

744
745
 
 

China's exports surge 22% in January-February, driven by robust electronics demand

Economists surprised by growth in clothing, textiles, and bags exports

Trade surplus tops expectations, reaching $213.6 billion in first two months

746
747
 
 

This is a follow-up to banning puberty blockers for children under 16 in 2023, pausing or cancelling all trials recently, and the banning of trans people from gendered bathrooms this year.

It's a progressive attack on trans rights, where evidence of the safety and benefits of trans healthcare is ignored and decisions is taken out of the hands of trans people, trans children and their parents. They're treated as people unable to make decisions for themselves. A tactic often used against women, disabled people and black people historically.

In this particular case, it's still breaking news but I've heard the way they fit the data to their desired result was to make the filters on what was to be accepted as evidence extremely narrow. Things like "all subjects in the study must have never taken puberty blockers, but must be on hormones and born male". When they find that no study exactly matches their criteria, they throw up their hands and say "we just don't know if it's safe" and ban all healthcare.

It doesn't matter how many experts criticise these choices and peer-review the reports. We've been shown by the Cass Review (still referenced in these decisions, despite its provably terrible quality) that all evidence outside the transphobic agenda will be ignored and every possible side-effect of treatment will be used as justification to eradicate trans people.

748
 
 
749
750
 
 
view more: ‹ prev next ›