lemmy.net.au

43 readers
2 users here now

This instance is hosted in Sydney, Australia and Maintained by Australian administrators.

Feel free to create and/or Join communities for any topics that interest you!

Rules are very simple

Mobile apps

https://join-lemmy.org/apps

What is Lemmy?

Lemmy is a selfhosted social link aggregation and discussion platform. It is completely free and open, and not controlled by any company. This means that there is no advertising, tracking, or secret algorithms. Content is organized into communities, so it is easy to subscribe to topics that you are interested in, and ignore others. Voting is used to bring the most interesting items to the top.

Think of it as an opensource alternative to reddit!

founded 11 months ago
ADMINS
13901
13902
 
 

A great article about the future of Internet concerning AI.

13903
 
 

On November 4, 1952, CBS News used the UNIVAC computer to predict the U.S. presidential election. Early data pointed to an easy win for Dwight D. Eisenhower, but skeptical anchors delayed announcing it. When the results came in, UNIVAC was right, marking the first time a computer accurately forecast a national election.

13904
 
 

cross-posted from: https://lemmy.sdf.org/post/45192281

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.

13905
 
 

cross-posted from: https://lemmy.sdf.org/post/45192281

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.

13906
 
 

Archived

[...]

In a historic breach of China’s censorship infrastructure, internal data were leaked from Chinese infrastructure firms associated with the Great Firewall (GFW) in September this year. Researchers now estimate that the data has a volume of approximately 600 GB.

The material includes more than 100,000 documents, internal source code, work logs, configuration files, emails, technical manuals, and operational runbooks. The number of files in the dump is reported to be in the thousands, though exact totals vary by source.

[...]

An unexpected but critical component of the breach is the metadata embedded within documents and logs. Authorship tags, file paths, and computer hostnames have linked hundreds of documents to individual users, systems, and organizations. These human fingerprints offer unprecedented visibility into the organizational structure behind the GFW’s operation. Engineers, data analysts, lab researchers, and regional technicians are all traceable by name or system alias. Many entries refer to known ISPs, national labs, or university-affiliated nodes, suggesting that the enforcement apparatus spans a wide constellation of public-private partnerships, military-academic collaborations, and centralized policy deployment.

Together, these findings constitute a unique technical cross-section of the Chinese censorship-industrial complex, revealing not just what is filtered or how, but who enforces it, who maintains the infrastructure, and how decisions flow through the layered topology of digital control.

[...]

The current report represents only the first installment in a three-part investigative series into the unprecedented breach of China’s censorship apparatus. While this Part 1 has centered on exposing the dataset’s contents and evaluating its technical, organizational, and strategic significance, it is only the beginning. The sheer scale and complexity of the leak, over 500GB of internal GFW infrastructure data, demands a methodical, layered approach to fully grasp its implications.

The next two parts in this series will delve even deeper, uncovering the architecture of China’s censorship regime and examining the wider consequences for global digital governance.

Part 2 of the series will look into the architecture and will offer a forensic reconstruction of how the Great Firewall actually works at the technical level, mapping the core design of the censorship stack. This includes how packets are intercepted, filtered, redirected, or dropped; how apps like Psiphon and V2Ray are detected at the protocol level; and how traffic shaping is deployed based on geography, ISP, or session context.

Part 3 will the geopolitics and the fallout will address the broader implications. This breach does more than just reveal technical controls, it changes the strategic calculus of censorship resistance. We will assess how the exposure reshapes China’s ability to sustain its domestic information control and international cyber operations, and how it informs countermeasures by VPN developers, privacy advocates, and democratic governments. Ethical and legal questions will also be raised: what does responsible engagement with such data look like?

[...]

With this series, we aim to present not just the most complete picture yet of the GFW, but a roadmap for pushing back against the machinery of state censorship.

13907
13908
13909
13910
13911
13912
 
 

The election of Jay Jones is proof the libs don't care anymore about civility and just want to destroy Republicans.

I think if we get pod save America to read Lenin we could make America communist is like a month.

13913
 
 

cross-posted from: https://lemmy.zip/post/52518366

In the Netherlands, commercial companies such as hotel chains, holiday parks, and cruise ship rental companies are earning good money from this crisis. A thriving market has emerged, where substantial profits can be made from emergency solutions, while the quality of care is often substandard.

The reception crisis in the Netherlands is not caused by a particularly high influx of asylum seekers. This demographic has fluctuated around 55,000 per year since 2022, following a temporary dip between 2016 and 2021.

The crisis is caused by the closure of asylum reception centres.

A hotel room for an asylum seeker costs the COA an average of €250 per night, or €91,000 per year, while Fletcher advertises to regular hotel guests and tourists, with hotel stays for less than €50 per night.

The newspaper AD previously uncovered that the COA was spending €110,000 a day to rent a cruise ship to house refugees and newspaper NRC revealed how savvy entrepreneurs profited from asylum housing on river ships by exploiting cheap migrant labour.

An investigation by Investico journalists revealed how commercial companies turned medical care in asylum centres into a profit model, supplying doctors and nurses at exorbitant rates.

13914
 
 

In the Netherlands, commercial companies such as hotel chains, holiday parks, and cruise ship rental companies are earning good money from this crisis. A thriving market has emerged, where substantial profits can be made from emergency solutions, while the quality of care is often substandard.

The reception crisis in the Netherlands is not caused by a particularly high influx of asylum seekers. This demographic has fluctuated around 55,000 per year since 2022, following a temporary dip between 2016 and 2021.

The crisis is caused by the closure of asylum reception centres.

A hotel room for an asylum seeker costs the COA an average of €250 per night, or €91,000 per year, while Fletcher advertises to regular hotel guests and tourists, with hotel stays for less than €50 per night.

The newspaper AD previously uncovered that the COA was spending €110,000 a day to rent a cruise ship to house refugees and newspaper NRC revealed how savvy entrepreneurs profited from asylum housing on river ships by exploiting cheap migrant labour.

An investigation by Investico journalists revealed how commercial companies turned medical care in asylum centres into a profit model, supplying doctors and nurses at exorbitant rates.

13915
 
 

A palliative care nurse in Germany has been sentenced to life in prison after he was convicted of the murder of 10 patients and the attempted murder of 27 others.

Prosecutors alleged that the man, who has not been publicly named, injected his mostly elderly patients with painkillers or sedatives in an effort to ease his workload during shifts overnight.

The offences were committed between December 2023 and May 2024 in a hospital in Wuerselen, in western Germany.

13916
 
 

I used to hear about pickup artists all the time—books, forums, “negging,” the whole thing. Now it seems like they’ve vanished, and the only people left are “alpha male” influencers selling courses. Did the pickup artists go extinct, rebrand, or achieve enlightenment?

13917
 
 

“At present, the lede and the overall presentation state, in Wikipedia’s voice, that Israel is committing genocide, although that claim is highly contested,” Wales said. He added that a “neutral approach would begin with a formulation such as: ‘Multiple governments, NGOs, and legal bodies have described or rejected the characterization of Israel’s actions in Gaza as genocide.’” Currently, the article bases its position that a genocide exists on conclusions from United Nations investigations, the International Association of Genocide Scholars, and “multiple human rights groups,” among others.

13918
 
 

cross-posted from: https://lemmy.zip/post/52517681

Nexperia, Chinese-owned but based in the Netherlands, makes billions of simple but ubiquitous chips that auto suppliers use in parts ranging from brakes and electric windows to lights and entertainment systems.

Nissan Motor will cut production of its top-selling Rogue SUV in Japan by about 900 vehicles from next week due to a short supply of chips from Nexperia, according to a person familiar with the matter.

Germany, home to major automakers such as Audi, BMW and Mercedes-Benz, said it was lobbying China in the interests of German customers of Nexperia through all available channels.

European carmakers and suppliers have rushed to apply to China for Nexperia chip export exemptions, which need to be paid for in Chinese currency, or have sought alternative suppliers.

13919
 
 

Nexperia, Chinese-owned but based in the Netherlands, makes billions of simple but ubiquitous chips that auto suppliers use in parts ranging from brakes and electric windows to lights and entertainment systems.

Nissan Motor will cut production of its top-selling Rogue SUV in Japan by about 900 vehicles from next week due to a short supply of chips from Nexperia, according to a person familiar with the matter.

Germany, home to major automakers such as Audi, BMW and Mercedes-Benz, said it was lobbying China in the interests of German customers of Nexperia through all available channels.

European carmakers and suppliers have rushed to apply to China for Nexperia chip export exemptions, which need to be paid for in Chinese currency, or have sought alternative suppliers.

13920
13921
 
 
13922
 
 

Taking melatonin to fall asleep might come with an unexpected side effect, according to new research from the American Heart Association.

A review of health records from more than 130,000 adults found that people who used melatonin for a year or longer were significantly more likely to develop heart failure, be hospitalized for it, or die from any cause within five years.

The findings were presented on Monday at the association’s Scientific Sessions 2025 in New Orleans.

“Melatonin supplements may not be as harmless as commonly assumed,” Dr. Ekenedilichukwu Nnadi, the study’s lead author, said in a statement. “If our study is confirmed, this could affect how doctors counsel patients about sleep aids.”

13923
13924
 
 
  • Description: Aku and Sila are back in this co-op adventure full of puzzles, friendship, and fun! Biped 2 is the exciting sequel about two bipedal robots who work together on incredible adventures.
  • Price: $19.99 ($17.99 till 12 November)
  • Link: https://www.nintendo.com/us/store/products/biped-2-switch
13925
 
 

An Australian teenager has faced court for allegedly defacing a large blue sculpture of a mythical creature by sticking googly eyes on it.

Amelia Vanderhorst, 19, appeared via phone at Mount Gambier Magistrates Court in South Australia on Tuesday charged with one count of property damage.

In a statement at the time of the September incident, the local council said CCTV footage showed a person putting artificial eyes on the artwork which locals have nicknamed the "Blue Blob".

view more: ‹ prev next ›