豆瓣 douban.com
1.33K subscribers
177K photos
37K videos
7.05K files
165K links
豆瓣最受欢迎的书评 豆瓣最受欢迎的影评 豆瓣最受欢迎的乐评
豆瓣网 WikiHow Skills Quora Books Movies Music
豆瓣 @doubancom
知乎 @zhihubaidu
微信 @weixinCN
谣言 @TruthRumors
微博 @weibonews
Download Telegram
有点像为了crazy in love一碟醋包的一盘饺子… (评论: Dangerously in Love)

吸入芜幹鞑评论: Dangerously in Love

评价: 还行

via 豆瓣最受欢迎的乐评 (author: 吸入芜幹鞑)

Invalid media: image
太精彩了 (评论: 唐宫奇案之青雾风鸣)

JYM.评论: 唐宫奇案之青雾风鸣

评价: 力荐

via 豆瓣最受欢迎的影评 (author: JYM.)

Invalid media: image
我将辞职在家研究这张封面与音乐的关系 (评论: KUN)

MUSIC PAPER评论: KUN

评价: 还行

via 豆瓣最受欢迎的乐评 (author: MUSIC PAPER)

Invalid media: image
台湾流行音乐200《洪荣宏专辑(三)》 (评论: 洪荣宏专辑三)

丁蟹评论: 洪荣宏专辑三

评价: 还行

via 豆瓣最受欢迎的乐评 (author: 丁蟹)

Invalid media: image
狂躁如鞭炮齐发 (评论: 至尊马蒂)

落木Lin评论: 至尊马蒂

评价: 还行

via 豆瓣最受欢迎的影评 (author: 落木Lin)

Invalid media: image
They Said 119丨JOYCE就以斯:诚实面对自己 (评论: 才华换桃花)

五摆五折评论: 才华换桃花

评价: 推荐

via 豆瓣最受欢迎的乐评 (author: 五摆五折)

Invalid media: image
七里香:兼顾商业与艺术的创作高峰 (评论: 七里香)

真的是无评论: 七里香

评价:

via 豆瓣最受欢迎的乐评 (author: 真的是无)

Invalid media: image
比神奇先生还神奇的是编剧的脑回路 (评论: 神奇4侠:初露锋芒)

夏多先生评论: 神奇4侠:初露锋芒

评价: 还行

via 豆瓣最受欢迎的影评 (author: 夏多先生)

Invalid media: image
台湾流行音乐200《让我欢喜让我忧》 (评论: 让我欢喜让我忧)

丁蟹评论: 让我欢喜让我忧

评价: 还行

via 豆瓣最受欢迎的乐评 (author: 丁蟹)

Invalid media: image
《傻儿师长》新篇:当方言剧穿越时空的复兴幽默 (评论: 傻儿师长)

散打评书二代人评论: 傻儿师长

评价: 推荐

via 豆瓣最受欢迎的影评 (author: 散打评书二代人)

Invalid media: image
Claim Your Payout From the 23andMe Data Breach Before It's Too Late

If you were affected by 23andMe's data breach—which involved the information of approximately 6.4 million U.S. residents—you have just a few more days to claim your compensation. Following the 2023 credential-stuffing attack, 23AndMe in 2024 agreed to a $30–$50 million payout for impacted consumers. The genetic testing company then filed for Chapter 11 bankruptcy in 2025 (introducing new privacy concerns around the potential sale of customer data). The courts approved the deal last month, and class members have until Feb. 17 to submit claims related to the cyber incident.

How much you'll receive from the 23andMe settlement

There are several tiers of payouts with the 23andMe settlement. Users with an "extraordinary claim"—those who experienced identity theft or fraudulent tax filings as a result of the breach—could qualify for up to $10,000 to reimburse verified expenses, including costs for physical or cyber security systems as well as mental health treatment.

Claimants who received notices that certain health information was leaked in the breach will be paid up to $165. Eligible data include raw genotype data, health reports (including health predisposition reports, wellness reports, and carrier status reports), and self-reported health conditions. Individuals residing in Alaska, California, Illinois, and Oregon will receive an additional $100 thanks to state privacy laws. Note that payments will likely take time to be distributed.

The settlement also provides for five years of identity monitoring services through a customized program called Privacy & Medical Shield + Genetic Monitoring. This is available to all class members regardless of payout.

How to file a 23andMe claim

Consumers who were impacted by the 2023 data breach can file a Cyber Security Incident Claim, which must be submitted by Feb. 17, 2026 (unless you received a notice in 2026 indicating otherwise). To be eligible, you must have been a 23andMe customer between May 1, 2023 and October 1, 2023 and have received a notice (via letter or email) that your information was compromised in the breach. You also must attest that you incurred damages (monetary or non-monetary) as a result of the incident.

Claims can be filed online via the settlement website, or you can mail a hard copy of your claim form (postmarked by Feb. 17) to the address listed. To complete a claim, you must provide some personal information as well as details about the harm incurred with supporting documentation, such as bank or credit card statements substantiating losses.

via Lifehacker (author: Emily Long)
明虚暗实的月之暗面,浪漫而孤独的太空歌剧——专辑推荐5.The Dark Side of the Moon-Pink Floyd (评论: The Dark Side of the Moon)

へ星评论: The Dark Side of the Moon

评价: 力荐

via 豆瓣最受欢迎的乐评 (author: へ星)

Invalid media: image
明虚暗实的月之暗面,浪漫而孤独的太空歌剧——专辑推荐5.The Dark Side of the Moon-Pink Floyd (评论: The Dark Side of the Moon)

へ星评论: The Dark Side of the Moon

评价: 力荐

via 豆瓣最受欢迎的乐评 (author: へ星)

Invalid media: image
How to Get Access to T-Mobile’s Free Live Translation Beta

Live translation is probably the most genuinely useful thing to come out of the AI boom, but if you want to use it during a phone call, you usually need to use a specific device or a separate app. T-Mobile is looking to change that. The carrier announced today that it will soon introduce live translation to all phones connected to its 5G or 4G networks, and to get in on the action, you're going to want to sign up for the beta now.

According to a press release sent to journalists today, the new feature will kick in for you automatically once you're selected for it, no matter what phone app or device you use. All you'll need to do to access it is type in "87" on the keypad during a phone call. Which means that, yes, it will also be compatible with feature phones, aka classic-style flip phones with physical buttons.

How T-Mobile live translation works

The device you use doesn't matter because all of the computing for the translation will happen on T-Mobile's end, rather than on your device. The downside is that you won't get to pick which AI model the translation uses, and T-Mobile hasn't yet to provide any indication of which one it will use. You'll also just have to trust T-Mobile's servers with any audio recorded from your conversation. T-Mobile spokesperson Mason Miller told Lifehacker's sister site PCMag via email that, "[T-Mobile does] not save call recordings or transcripts," but the company will certainly ave to run your data through its servers at some point to make the feature work. By comparison, competing translation apps often rely on downloaded language packs and on-device models.

Still, I see where T-Mobile is coming from with this offering: When live translation is limited to specific devices or apps, it vastly impacts its usability, since both callers need to have a compatible device for it to work. Processing translation over the cloud makes it more likely you'll be able to use it exactly when you need it—and as a bonus, only one caller will actually need to be on T-Mobile's 5G or 4G network to pull this trick off.

While T-Mobile's press release focuses on 5G, the carrier confirmed availability for the feature on 4G to The Verge earlier today. The Verge also reports that, in addition to dialing 87, beta participants will eventually be able to trigger live translation by saying "Hey T-Mobile" instead.

When T-Mobile live translations will go live

Testing for T-Mobile's live translation will begin "for selected users" this spring, with more general availability planned for "later this year." The feature will be free during the beta, although a surcharge might be added after it goes into wide release. "We will share more on pricing and plan details closer to commercial launch," Miller told PCMag.

To sign up for the beta and put your hat in the ring for selection, head over to t-mobile.com/benefits/live-translation.

via Lifehacker (author: Michelle Ehrhardt)
Microsoft's February Patch Tuesday Update Fixes Six Zero-Day Exploits

Microsoft's February security update is a big one. This latest "Patch Tuesday" fixes 58 vulnerabilities in total, six of which are zero-day flaws. As a reminder, a zero-day is a vulnerability that has been either actively exploited in the wild or publicly disclosed before an official fix is released by the developer.

As BleepingComputer reports, security flaws were found in the following categories: 25 elevation-of-privilege vulnerabilities, five security feature bypass vulnerabilities, 12 remote code-execution vulnerabilities, six information disclosure vulnerabilities, three denial of service vulnerabilities, and seven spoofing vulnerabilities. Three of the elevation of privilege vulnerabilities and two of the information disclosure vulnerabilities are considered "critical." (These numbers do not include the three Microsoft Edge vulnerabilities patched earlier in February.)

Patch Tuesday updates are typically released around 10 am PT on the second Tuesday of every month, and your device should receive them automatically. BleepingComputer reports that this month's release also includes Secure Boot certificate updates for 2011 certificates that are expiring in June.

Six zero-days patched in February

Three of the six actively exploited zero-days fixed in February are security feature bypass vulnerabilities:

CVE-2026-21510: This is a flaw the Windows Shell that allows an attacker to execute content without warning or gaining user consent, though the user does need to open a malicious link or shortcut file.
CVE-2026-21513: This MSHTML Framework vulnerability allows an unauthorized attacker to bypass a security feature over a network. Microsoft has not released details on how this flaw was exploited.
CVE-2026-21514: This vulnerability in Microsoft Word allows an attacker to bypasses OLE mitigations in Microsoft 365 and Microsoft Office once a user has opened a malicious Office file.

All three of the above flaws have been attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group along with an anonymous researcher for CVE-2026-21510 and CVE-2026-21514.

Two of the zero-days are elevation of privilege vulnerabilities. CVE-2026-21519 is a Desktop Windows Manager flaw that allows an attacker to gain SYSTEM privileges, while CVE-2026-21533 is a Windows Remote Desktop Services flaw that allows an attacker to elevate privileges locally. The former has been attributed to MSTIC and MSRC, while the latter was discovered by the Advanced Research Team at CrowdStrike.

Finally, CVE-2026-21525 is a denial of service vulnerability in the Windows Remote Access Connection Manager that allows an unauthorized attacker to deny service locally. This flaw was discovered by the ACROS Security team with 0patch—it was reportedly found in a public malware repository in December 2025.

via Lifehacker (author: Emily Long)