有点像为了crazy in love一碟醋包的一盘饺子… (评论: Dangerously in Love)
吸入芜幹鞑评论: Dangerously in Love
评价: 还行
via 豆瓣最受欢迎的乐评 (author: 吸入芜幹鞑)
Invalid media: image
吸入芜幹鞑评论: Dangerously in Love
评价: 还行
via 豆瓣最受欢迎的乐评 (author: 吸入芜幹鞑)
Invalid media: image
我将辞职在家研究这张封面与音乐的关系 (评论: KUN)
MUSIC PAPER评论: KUN
评价: 还行
via 豆瓣最受欢迎的乐评 (author: MUSIC PAPER)
Invalid media: image
MUSIC PAPER评论: KUN
评价: 还行
via 豆瓣最受欢迎的乐评 (author: MUSIC PAPER)
Invalid media: image
These Nothing Headphones Are at Their Lowest Price Ever Right Now
via Lifehacker (author: Pradershika Sharma)
via Lifehacker (author: Pradershika Sharma)
Telegraph
These Nothing Headphones Are at Their Lowest Price Ever Righ…
We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication. At $239, down from its usual $299, the Nothing Headphone (1) is currently at its lowest price ever, according to price trackers—and…
The 2024 Kindle Scribe With Premium Pen Is Over $100 Off Right Now
via Lifehacker (author: Pradershika Sharma)
via Lifehacker (author: Pradershika Sharma)
Telegraph
The 2024 Kindle Scribe With Premium Pen Is Over $100 Off Rig…
We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication. The 64GB refurbished Amazon Kindle Scribe is down to $278.99 right now, which is its lowest price to date, according to price trackers.…
Claim Your Payout From the 23andMe Data Breach Before It's Too Late
If you were affected by 23andMe's data breach—which involved the information of approximately 6.4 million U.S. residents—you have just a few more days to claim your compensation. Following the 2023 credential-stuffing attack, 23AndMe in 2024 agreed to a $30–$50 million payout for impacted consumers. The genetic testing company then filed for Chapter 11 bankruptcy in 2025 (introducing new privacy concerns around the potential sale of customer data). The courts approved the deal last month, and class members have until Feb. 17 to submit claims related to the cyber incident.
How much you'll receive from the 23andMe settlement
There are several tiers of payouts with the 23andMe settlement. Users with an "extraordinary claim"—those who experienced identity theft or fraudulent tax filings as a result of the breach—could qualify for up to $10,000 to reimburse verified expenses, including costs for physical or cyber security systems as well as mental health treatment.
Claimants who received notices that certain health information was leaked in the breach will be paid up to $165. Eligible data include raw genotype data, health reports (including health predisposition reports, wellness reports, and carrier status reports), and self-reported health conditions. Individuals residing in Alaska, California, Illinois, and Oregon will receive an additional $100 thanks to state privacy laws. Note that payments will likely take time to be distributed.
The settlement also provides for five years of identity monitoring services through a customized program called Privacy & Medical Shield + Genetic Monitoring. This is available to all class members regardless of payout.
How to file a 23andMe claim
Consumers who were impacted by the 2023 data breach can file a Cyber Security Incident Claim, which must be submitted by Feb. 17, 2026 (unless you received a notice in 2026 indicating otherwise). To be eligible, you must have been a 23andMe customer between May 1, 2023 and October 1, 2023 and have received a notice (via letter or email) that your information was compromised in the breach. You also must attest that you incurred damages (monetary or non-monetary) as a result of the incident.
Claims can be filed online via the settlement website, or you can mail a hard copy of your claim form (postmarked by Feb. 17) to the address listed. To complete a claim, you must provide some personal information as well as details about the harm incurred with supporting documentation, such as bank or credit card statements substantiating losses.
via Lifehacker (author: Emily Long)
If you were affected by 23andMe's data breach—which involved the information of approximately 6.4 million U.S. residents—you have just a few more days to claim your compensation. Following the 2023 credential-stuffing attack, 23AndMe in 2024 agreed to a $30–$50 million payout for impacted consumers. The genetic testing company then filed for Chapter 11 bankruptcy in 2025 (introducing new privacy concerns around the potential sale of customer data). The courts approved the deal last month, and class members have until Feb. 17 to submit claims related to the cyber incident.
How much you'll receive from the 23andMe settlement
There are several tiers of payouts with the 23andMe settlement. Users with an "extraordinary claim"—those who experienced identity theft or fraudulent tax filings as a result of the breach—could qualify for up to $10,000 to reimburse verified expenses, including costs for physical or cyber security systems as well as mental health treatment.
Claimants who received notices that certain health information was leaked in the breach will be paid up to $165. Eligible data include raw genotype data, health reports (including health predisposition reports, wellness reports, and carrier status reports), and self-reported health conditions. Individuals residing in Alaska, California, Illinois, and Oregon will receive an additional $100 thanks to state privacy laws. Note that payments will likely take time to be distributed.
The settlement also provides for five years of identity monitoring services through a customized program called Privacy & Medical Shield + Genetic Monitoring. This is available to all class members regardless of payout.
How to file a 23andMe claim
Consumers who were impacted by the 2023 data breach can file a Cyber Security Incident Claim, which must be submitted by Feb. 17, 2026 (unless you received a notice in 2026 indicating otherwise). To be eligible, you must have been a 23andMe customer between May 1, 2023 and October 1, 2023 and have received a notice (via letter or email) that your information was compromised in the breach. You also must attest that you incurred damages (monetary or non-monetary) as a result of the incident.
Claims can be filed online via the settlement website, or you can mail a hard copy of your claim form (postmarked by Feb. 17) to the address listed. To complete a claim, you must provide some personal information as well as details about the harm incurred with supporting documentation, such as bank or credit card statements substantiating losses.
via Lifehacker (author: Emily Long)
The Best Kitchen Gadgets to Make Cooking Weeknight Dinners So Much Easier
via Lifehacker (author: Jeff Somers)
via Lifehacker (author: Jeff Somers)
Telegraph
The Best Kitchen Gadgets to Make Cooking Weeknight Dinners S…
We may earn a commission from links on this page. Cooking can be a creative outlet, a way of showing affection, and a way to take control of your health. But cooking can also be stressful and time-consuming, especially on a weeknight when you're already exhausted…
明虚暗实的月之暗面,浪漫而孤独的太空歌剧——专辑推荐5.The Dark Side of the Moon-Pink Floyd (评论: The Dark Side of the Moon)
へ星评论: The Dark Side of the Moon
评价: 力荐
via 豆瓣最受欢迎的乐评 (author: へ星)
Invalid media: image
へ星评论: The Dark Side of the Moon
评价: 力荐
via 豆瓣最受欢迎的乐评 (author: へ星)
Invalid media: image
明虚暗实的月之暗面,浪漫而孤独的太空歌剧——专辑推荐5.The Dark Side of the Moon-Pink Floyd (评论: The Dark Side of the Moon)
へ星评论: The Dark Side of the Moon
评价: 力荐
via 豆瓣最受欢迎的乐评 (author: へ星)
Invalid media: image
へ星评论: The Dark Side of the Moon
评价: 力荐
via 豆瓣最受欢迎的乐评 (author: へ星)
Invalid media: image
How to Get Access to T-Mobile’s Free Live Translation Beta
Live translation is probably the most genuinely useful thing to come out of the AI boom, but if you want to use it during a phone call, you usually need to use a specific device or a separate app. T-Mobile is looking to change that. The carrier announced today that it will soon introduce live translation to all phones connected to its 5G or 4G networks, and to get in on the action, you're going to want to sign up for the beta now.
According to a press release sent to journalists today, the new feature will kick in for you automatically once you're selected for it, no matter what phone app or device you use. All you'll need to do to access it is type in "87" on the keypad during a phone call. Which means that, yes, it will also be compatible with feature phones, aka classic-style flip phones with physical buttons.
How T-Mobile live translation works
The device you use doesn't matter because all of the computing for the translation will happen on T-Mobile's end, rather than on your device. The downside is that you won't get to pick which AI model the translation uses, and T-Mobile hasn't yet to provide any indication of which one it will use. You'll also just have to trust T-Mobile's servers with any audio recorded from your conversation. T-Mobile spokesperson Mason Miller told Lifehacker's sister site PCMag via email that, "[T-Mobile does] not save call recordings or transcripts," but the company will certainly ave to run your data through its servers at some point to make the feature work. By comparison, competing translation apps often rely on downloaded language packs and on-device models.
Still, I see where T-Mobile is coming from with this offering: When live translation is limited to specific devices or apps, it vastly impacts its usability, since both callers need to have a compatible device for it to work. Processing translation over the cloud makes it more likely you'll be able to use it exactly when you need it—and as a bonus, only one caller will actually need to be on T-Mobile's 5G or 4G network to pull this trick off.
While T-Mobile's press release focuses on 5G, the carrier confirmed availability for the feature on 4G to The Verge earlier today. The Verge also reports that, in addition to dialing 87, beta participants will eventually be able to trigger live translation by saying "Hey T-Mobile" instead.
When T-Mobile live translations will go live
Testing for T-Mobile's live translation will begin "for selected users" this spring, with more general availability planned for "later this year." The feature will be free during the beta, although a surcharge might be added after it goes into wide release. "We will share more on pricing and plan details closer to commercial launch," Miller told PCMag.
To sign up for the beta and put your hat in the ring for selection, head over to t-mobile.com/benefits/live-translation.
via Lifehacker (author: Michelle Ehrhardt)
Live translation is probably the most genuinely useful thing to come out of the AI boom, but if you want to use it during a phone call, you usually need to use a specific device or a separate app. T-Mobile is looking to change that. The carrier announced today that it will soon introduce live translation to all phones connected to its 5G or 4G networks, and to get in on the action, you're going to want to sign up for the beta now.
According to a press release sent to journalists today, the new feature will kick in for you automatically once you're selected for it, no matter what phone app or device you use. All you'll need to do to access it is type in "87" on the keypad during a phone call. Which means that, yes, it will also be compatible with feature phones, aka classic-style flip phones with physical buttons.
How T-Mobile live translation works
The device you use doesn't matter because all of the computing for the translation will happen on T-Mobile's end, rather than on your device. The downside is that you won't get to pick which AI model the translation uses, and T-Mobile hasn't yet to provide any indication of which one it will use. You'll also just have to trust T-Mobile's servers with any audio recorded from your conversation. T-Mobile spokesperson Mason Miller told Lifehacker's sister site PCMag via email that, "[T-Mobile does] not save call recordings or transcripts," but the company will certainly ave to run your data through its servers at some point to make the feature work. By comparison, competing translation apps often rely on downloaded language packs and on-device models.
Still, I see where T-Mobile is coming from with this offering: When live translation is limited to specific devices or apps, it vastly impacts its usability, since both callers need to have a compatible device for it to work. Processing translation over the cloud makes it more likely you'll be able to use it exactly when you need it—and as a bonus, only one caller will actually need to be on T-Mobile's 5G or 4G network to pull this trick off.
While T-Mobile's press release focuses on 5G, the carrier confirmed availability for the feature on 4G to The Verge earlier today. The Verge also reports that, in addition to dialing 87, beta participants will eventually be able to trigger live translation by saying "Hey T-Mobile" instead.
When T-Mobile live translations will go live
Testing for T-Mobile's live translation will begin "for selected users" this spring, with more general availability planned for "later this year." The feature will be free during the beta, although a surcharge might be added after it goes into wide release. "We will share more on pricing and plan details closer to commercial launch," Miller told PCMag.
To sign up for the beta and put your hat in the ring for selection, head over to t-mobile.com/benefits/live-translation.
via Lifehacker (author: Michelle Ehrhardt)
Microsoft's February Patch Tuesday Update Fixes Six Zero-Day Exploits
Microsoft's February security update is a big one. This latest "Patch Tuesday" fixes 58 vulnerabilities in total, six of which are zero-day flaws. As a reminder, a zero-day is a vulnerability that has been either actively exploited in the wild or publicly disclosed before an official fix is released by the developer.
As BleepingComputer reports, security flaws were found in the following categories: 25 elevation-of-privilege vulnerabilities, five security feature bypass vulnerabilities, 12 remote code-execution vulnerabilities, six information disclosure vulnerabilities, three denial of service vulnerabilities, and seven spoofing vulnerabilities. Three of the elevation of privilege vulnerabilities and two of the information disclosure vulnerabilities are considered "critical." (These numbers do not include the three Microsoft Edge vulnerabilities patched earlier in February.)
Patch Tuesday updates are typically released around 10 am PT on the second Tuesday of every month, and your device should receive them automatically. BleepingComputer reports that this month's release also includes Secure Boot certificate updates for 2011 certificates that are expiring in June.
Six zero-days patched in February
Three of the six actively exploited zero-days fixed in February are security feature bypass vulnerabilities:
● CVE-2026-21510: This is a flaw the Windows Shell that allows an attacker to execute content without warning or gaining user consent, though the user does need to open a malicious link or shortcut file.
● CVE-2026-21513: This MSHTML Framework vulnerability allows an unauthorized attacker to bypass a security feature over a network. Microsoft has not released details on how this flaw was exploited.
● CVE-2026-21514: This vulnerability in Microsoft Word allows an attacker to bypasses OLE mitigations in Microsoft 365 and Microsoft Office once a user has opened a malicious Office file.
All three of the above flaws have been attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group along with an anonymous researcher for CVE-2026-21510 and CVE-2026-21514.
Two of the zero-days are elevation of privilege vulnerabilities. CVE-2026-21519 is a Desktop Windows Manager flaw that allows an attacker to gain SYSTEM privileges, while CVE-2026-21533 is a Windows Remote Desktop Services flaw that allows an attacker to elevate privileges locally. The former has been attributed to MSTIC and MSRC, while the latter was discovered by the Advanced Research Team at CrowdStrike.
Finally, CVE-2026-21525 is a denial of service vulnerability in the Windows Remote Access Connection Manager that allows an unauthorized attacker to deny service locally. This flaw was discovered by the ACROS Security team with 0patch—it was reportedly found in a public malware repository in December 2025.
via Lifehacker (author: Emily Long)
Microsoft's February security update is a big one. This latest "Patch Tuesday" fixes 58 vulnerabilities in total, six of which are zero-day flaws. As a reminder, a zero-day is a vulnerability that has been either actively exploited in the wild or publicly disclosed before an official fix is released by the developer.
As BleepingComputer reports, security flaws were found in the following categories: 25 elevation-of-privilege vulnerabilities, five security feature bypass vulnerabilities, 12 remote code-execution vulnerabilities, six information disclosure vulnerabilities, three denial of service vulnerabilities, and seven spoofing vulnerabilities. Three of the elevation of privilege vulnerabilities and two of the information disclosure vulnerabilities are considered "critical." (These numbers do not include the three Microsoft Edge vulnerabilities patched earlier in February.)
Patch Tuesday updates are typically released around 10 am PT on the second Tuesday of every month, and your device should receive them automatically. BleepingComputer reports that this month's release also includes Secure Boot certificate updates for 2011 certificates that are expiring in June.
Six zero-days patched in February
Three of the six actively exploited zero-days fixed in February are security feature bypass vulnerabilities:
● CVE-2026-21510: This is a flaw the Windows Shell that allows an attacker to execute content without warning or gaining user consent, though the user does need to open a malicious link or shortcut file.
● CVE-2026-21513: This MSHTML Framework vulnerability allows an unauthorized attacker to bypass a security feature over a network. Microsoft has not released details on how this flaw was exploited.
● CVE-2026-21514: This vulnerability in Microsoft Word allows an attacker to bypasses OLE mitigations in Microsoft 365 and Microsoft Office once a user has opened a malicious Office file.
All three of the above flaws have been attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group along with an anonymous researcher for CVE-2026-21510 and CVE-2026-21514.
Two of the zero-days are elevation of privilege vulnerabilities. CVE-2026-21519 is a Desktop Windows Manager flaw that allows an attacker to gain SYSTEM privileges, while CVE-2026-21533 is a Windows Remote Desktop Services flaw that allows an attacker to elevate privileges locally. The former has been attributed to MSTIC and MSRC, while the latter was discovered by the Advanced Research Team at CrowdStrike.
Finally, CVE-2026-21525 is a denial of service vulnerability in the Windows Remote Access Connection Manager that allows an unauthorized attacker to deny service locally. This flaw was discovered by the ACROS Security team with 0patch—it was reportedly found in a public malware repository in December 2025.
via Lifehacker (author: Emily Long)