Forwarded from Hacker News
Arthur Rosa - WQ6E
Out of Ideas
Today, OpenAI announced their latest βadvancementβ in the form of Deep Research - a system that they claim is able to perform βmulti-step research on the internet for complex tasksβ. They say it takes just 5-30 minutes to complete research tasks that wouldβ¦
Forwarded from Hacker News
Dedoimedo
Windows 11 - There's still nothing worth my time
Short review of Windows 11 following December 2024 patching, including fast updates, unchanged privacy configuration, extremely slow Windows Explorer with no option to disable the modern interface, numerous ergonomic and aesthetic problems, declining marketβ¦
Forwarded from Hacker News
GitHub
No download link for extensions under Version History Β· Issue #1135 Β· microsoft/vsmarketplace
Describe the bug New, direct-download, installation instructions indicate that users should choose an OS-appropriate version from the Download link under the Version History section of the extensio...
Forwarded from Hacker News
Forwarded from Hacker News
National Security Agency/Central Security Service
Joint Publications Focus on Mitigation Strategies for Edge Devices
FORT MEADE, Md. - The National Security Agency (NSA) has joined the Australian Signals Directorateβs Australian Cyber Security Centre (ASDβs ACSC), the Canadian Centre for Cyber Security
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
End of Life Date
endoflife.date is a platform that aggregates and presents end-of-life (EOL) and support lifecycle information for various products in a clear and concise manner. It currently tracks 369 products across categories such as programming languages, devices, databases, operating systems, frameworks, desktop applications, server applications, cloud services, and standards
π Links:
- Website
- Source code
Developer: EOLD
π·οΈ Tags: #Website
endoflife.date is a platform that aggregates and presents end-of-life (EOL) and support lifecycle information for various products in a clear and concise manner. It currently tracks 369 products across categories such as programming languages, devices, databases, operating systems, frameworks, desktop applications, server applications, cloud services, and standards
π Links:
- Website
- Source code
Developer: EOLD
π·οΈ Tags: #Website
Forwarded from The Hacker News
π₯ Major policy reversal -- US Treasury LIFTS sanctions on Tornado Cash!
After accusing it of laundering $7.6B for North Korea's Lazarus hacker Group, the Treasury now says it "overstepped its authority."
π€― Rare twist: A court ruled smart contracts aren't "property," leaving OFAC powerless.
Alexey Pertsev, co-founder, jailed in Netherlands, while others face US charges.
See the full story now: https://thehackernews.com/2025/03/us-treasury-lifts-tornado-cash.html
After accusing it of laundering $7.6B for North Korea's Lazarus hacker Group, the Treasury now says it "overstepped its authority."
π€― Rare twist: A court ruled smart contracts aren't "property," leaving OFAC powerless.
Alexey Pertsev, co-founder, jailed in Netherlands, while others face US charges.
See the full story now: https://thehackernews.com/2025/03/us-treasury-lifts-tornado-cash.html
Forwarded from Gizchina.com
POCO F7 Ultra: the budget flagship to surpass OnePlus and Galaxy?
https://www.gizchina.com/2025/03/22/poco-f7-ultra-the-budget-flagship-to-surpass-oneplus-and-galaxy/
https://www.gizchina.com/2025/03/22/poco-f7-ultra-the-budget-flagship-to-surpass-oneplus-and-galaxy/
Forwarded from ATT β’ Tech News (Agam)
Court Reserves Order on ProtonMail Ban, Urges Government Action
On March 21, 2025, the Karnataka High Court reserved its order on a petition seeking a ban on Proton Mail. The court deemed the petition's national security concerns and potential criminal misuse issues as serious matters.
The Union Government made reference to a mutual assistance agreement with Switzerland while detailing the specific procedures necessary for blocking.
The advocate for the company argued that the servers are outside of India and are not amenable to Indian Laws.
The government faced court pressure to act and the case remains pending as of now, with no decision announced.
π LiveLaw
π§βπ» @agamtechtricks
On March 21, 2025, the Karnataka High Court reserved its order on a petition seeking a ban on Proton Mail. The court deemed the petition's national security concerns and potential criminal misuse issues as serious matters.
The Union Government made reference to a mutual assistance agreement with Switzerland while detailing the specific procedures necessary for blocking.
The advocate for the company argued that the servers are outside of India and are not amenable to Indian Laws.
The government faced court pressure to act and the case remains pending as of now, with no decision announced.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from ATT β’ Tech News (Agam)
A Win for Encryption: France Rejects Backdoor Mandate
The French National Assembly on March 20, 2025, voted against Article 8 from an anti-drug trafficking bill that would have gutted end-to-end encryption. The proposal required messaging platforms such as Signal and WhatsApp to implement backdoor access through a "ghost participant" model for encrypted communications.
The Assembly made privacy its top priority achieving a major victory. The EU's Chat Control proposal represents one of many similar measures that continue to exist globally. The presence of backdoors in systems creates vulnerabilities that cybercriminals can exploit.
π EFF
π§βπ» @agamtechtricks
The French National Assembly on March 20, 2025, voted against Article 8 from an anti-drug trafficking bill that would have gutted end-to-end encryption. The proposal required messaging platforms such as Signal and WhatsApp to implement backdoor access through a "ghost participant" model for encrypted communications.
The Assembly made privacy its top priority achieving a major victory. The EU's Chat Control proposal represents one of many similar measures that continue to exist globally. The presence of backdoors in systems creates vulnerabilities that cybercriminals can exploit.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)